hickory-dns – Uses hickory-resolver as DNS resolver instead of tokio‘s builtin.local-http – Allow using HTTP protocol for sslocal local-http-native-tls – Support HTTPS with native-tlslocal-http-rustls – Support HTTPS with rustlslocal-tunnel – Allow using tunnel protocol for sslocallocal-socks4 – Allow using SOCKS4/4a protocol for sslocallocal-redir – Allow using redir (transparent proxy) protocol for sslocallocal-dns – Allow using dns protocol for sslocal, serves as a DNS server proxying queries to local or remote DNS servers by ACL ruleslocal-fake-dns – FakeDNS, allocating an IP address for each individual Query from a specific IP poollocal-tun – TUN interface support for sslocallocal-online-config – SIP008 Online Configuration Deliverystream-cipher – Enable deprecated stream ciphers. WARN: stream ciphers are UNSAFE!aead-cipher-extra – Enable non-standard AEAD ciphersaead-cipher-2022 – Enable AEAD-2022 ciphers (SIP022)aead-cipher-2022-extra – Enable AEAD-2022 extra ciphers (non-standard ciphers)This project uses system (libc) memory allocator (Rust’s default). But it also allows you to use other famous allocators by features:
jemalloc – Uses jemalloc as global memory allocatormimalloc – Uses mi-malloc as global memory allocatortcmalloc – Uses TCMalloc as global memory allocator. It tries to link system-wide tcmalloc by default, use vendored from source with tcmalloc-vendored.snmalloc – Uses snmalloc as global memory allocatorrpmalloc – Uses rpmalloc as global memory allocator# Install from crates.io
cargo install shadowsocks-rust then you can find sslocal and ssserver in $CARGO_HOME/bin.
For macOS and Linux, you can install it using Homebrew:
brew install shadowsocks-rust For more information click here.
Java remains one of the most widely used programming platforms for servers, enterprise applications, Android…
Ubuntu users often download software directly from developer websites instead of using the default app…
Installing Ubuntu 26.04 LTS is only the first step toward building a smooth, secure, and…
What is a Software Supply Chain Attack? A software supply chain attack occurs when a…
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…