Security Analysis of Shadowsocks(R) Protocol

被引:3
作者
Ji, Qingbing [1 ,2 ]
Rao, Zhihong [1 ,2 ]
Chen, Man [2 ]
Luo, Jie [2 ]
机构
[1] Northwestern Polytech Univ, Sch Cybersecur, Xian 710072, Peoples R China
[2] 30 Inst CETC, Chengdu 610041, Peoples R China
关键词
D O I
10.1155/2022/4862571
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Shadowsocks(R) is a proxy software based on Socks5, which is the collective name of shadowsocks and shadowsocksR. Shadowsocks(R) is a private protocol without a handshake negotiation mechanism. Peng broke the confidentiality of shadowsocks by exploiting vulnerability in the shadowsocks protocol and decrypted the shadowsocks packets encrypted with none-AEAD encryption options using a redirection attack. Chen et al. started with the cryptographic algorithm used by shadowsocks(R) and preliminarily discussed the confidentiality of user data under the protection of shadowsocks(R) in theory. Based on Chen's work, this paper further clarifies the shadowsocks(R) protocol format and studies the encryption mechanism of shadowsocks(R) from the perspective of protocol analysis. The vulnerability of the shadowsocks(R) encryption mechanism is found, and an attack method of shadowsocks(R) is proposed. The attack method is a passive attack and can decrypt the shadowsocks packets encrypted with any encryption option. Compared with Peng's attack method, the method is more effective and more suitable for actual attacks. Finally, some methods to improve the protocol security of shadowsocks(R) are proposed.
引用
收藏
页数:6
相关论文
共 7 条
[1]  
[Anonymous], 2007, SP80038D NAT I STAND
[2]   The Random Forest based Detection of Shadowsock's Traffic [J].
Deng, Ziye ;
Liu, Zihan ;
Chen, Zhouguo ;
Guo, Yubin .
2017 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT HUMAN-MACHINE SYSTEMS AND CYBERNETICS (IHMSC 2017), VOL 2, 2017, :75-78
[3]  
Dworkin M., 2001, SP80038A NAT I STAND
[4]  
Hangsong H., 2018, SOFTWARE GUIDE, V17, P200
[5]  
Ji Qingbing, 2021, Emerging Trends in Intelligent and Interactive Systems and Applications. Proceedings of the 5th International Conference on Intelligent, Interactive Systems and Applications (IISA2020). Advances in Intelligent Systems and Computing (AISC 1304), P53, DOI 10.1007/978-3-030-63784-2_8
[6]  
Man C., 2020, COMMUNICATIONS TECHN, V53, P1240
[7]   Flow Context and Host Behavior Based Shadowsocks's Traffic Identification [J].
Zeng, Xuemei ;
Chen, Xingshu ;
Shao, Guolin ;
He, Tao ;
Han, Zhenhui ;
Wen, Yi ;
Wang, Qixu .
IEEE ACCESS, 2019, 7 :41017-41032