hickory-dns – Uses hickory-resolver as DNS resolver instead of tokio‘s builtin.local-http – Allow using HTTP protocol for sslocal local-http-native-tls – Support HTTPS with native-tlslocal-http-rustls – Support HTTPS with rustlslocal-tunnel – Allow using tunnel protocol for sslocallocal-socks4 – Allow using SOCKS4/4a protocol for sslocallocal-redir – Allow using redir (transparent proxy) protocol for sslocallocal-dns – Allow using dns protocol for sslocal, serves as a DNS server proxying queries to local or remote DNS servers by ACL ruleslocal-fake-dns – FakeDNS, allocating an IP address for each individual Query from a specific IP poollocal-tun – TUN interface support for sslocallocal-online-config – SIP008 Online Configuration Deliverystream-cipher – Enable deprecated stream ciphers. WARN: stream ciphers are UNSAFE!aead-cipher-extra – Enable non-standard AEAD ciphersaead-cipher-2022 – Enable AEAD-2022 ciphers (SIP022)aead-cipher-2022-extra – Enable AEAD-2022 extra ciphers (non-standard ciphers)This project uses system (libc) memory allocator (Rust’s default). But it also allows you to use other famous allocators by features:
jemalloc – Uses jemalloc as global memory allocatormimalloc – Uses mi-malloc as global memory allocatortcmalloc – Uses TCMalloc as global memory allocator. It tries to link system-wide tcmalloc by default, use vendored from source with tcmalloc-vendored.snmalloc – Uses snmalloc as global memory allocatorrpmalloc – Uses rpmalloc as global memory allocator# Install from crates.io
cargo install shadowsocks-rust then you can find sslocal and ssserver in $CARGO_HOME/bin.
For macOS and Linux, you can install it using Homebrew:
brew install shadowsocks-rust For more information click here.
What is a Software Supply Chain Attack? A software supply chain attack occurs when a…
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…
A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…
How Does a Firewall Work Step by Step? What Is a Firewall and How Does…
People trying to securely connect to work are being tricked into doing the exact opposite.…