Shadowsocks is a secure split proxy loosely based on SOCKS5. It’s widely used in china. I found a vulnerability in shadowsocks protocol which break the confidentiality of shadowsocks stream cipher. A passive attacker can easily decrypt all the encrypted shadowsocks packet using our redirect attack. Even more, a man-in-the-middle attacker can modify traffic in real time like there is no encryption at all.
Details of the attack can be found in the pdf. And a POC can be found in the python code.
Vulnerable versions
shadowsocks-py, shadowsocoks-go, shadowsocoks-nodejs
Suggestions
Do not use : shadowsocks-py, shadowsocoks-go, shadowsocoks-nodejs.
Only Use: shadowsocks-libev, go-shadowsocks2 and only use the AEAD ciphers。
from https://github.com/edwardz246003/shadowsocks
No comments:
Post a Comment