Open FirewallĪ server firewall is recommended but optional. In our examples on the rest of this page, we will use the result: Qi0n04pcO38SFROxnIspyE0WRwwMjVEf 1.2. The result will have 32 base-64 characters. Because of the argument 24, it will be based on 24 bytes or 192 bits. The openssl rand -base64 function gives you a random number, expressed in base-64 notation. In our examples on the rest of this page, we will use the result: 21429Īlso generate a random password: openssl rand -base64 24 The shell function RANDOM gives you a pseudo-random integer between 7, so after evaluating the arithmetical expression, you will end up with a port number between 101. First generate a random port number like this: echo $((1024 + $RANDOM))
#LINUX SHADOWSOCKS CLIENT PASSWORD#
You will need an unusual port number and a strong password for your Shadowsocks server. We give instructions for the example of a Windows client, although clients for other platforms are also available. The server installation procedure on this page was tested with a virtual private server (VPS) running Ubuntu 21.04, so the process will be similar on recent versions of Debian. This is a port of Shadowsocks to Rust, a fast and memory-efficient language designed to power performance-critical services. New development takes place in Shadowsocks-Rust. However, Shadowsocks-Libev is now receiving bug fixes only. Shadowsocks-Libev was a rewrite in pure C which aimed to keep resource usage as low as possible. The original Shadowsocks was written in Python. Shadowsocks is an important tool for censorship circumvention. Shadowsocks-Rust on Linux Server and Windows Client