Setting up shadowsocks-go on a vps with v2ray obfuscation.
DEAL Carding Club.WARNING: This guide is not suitable for low-end VPS's and VPS's with OpenVZ virtualization. All of the commands are run by root user.
Installing shadowsocks-go
The latest ss-go release can be found on their github page: https://github.com/shadowsocks/go-shadowsocks2/releases
.
updating apt
apt update && apt upgrade -y
creating a directory for binaries
mkdir /etc/ss-go && cd /etc/ss-go
download ss-go binary from github
wget https://github.com/shadowsocks/go-shadowsocks2/releases/download/v0.1.3/shadowsocks2-linux.gz
unpack it
gzip -d shadowsocks2-linux.gz
rename it so it's easy to work with
mv /etc/ss-go/shadowsocks2-linux /etc/ss-go/ss-go
make it executable
chmod +x /etc/ss-go/ss-go
give ss-go enough rights to take up needed ports
setcap “cap_net_bind_service=+eip” /etc/ss-go/ss-go
Installing v2ray-plugin
Again, the latest release should be on their github page. Choose the one appropriate for your architecture.
download the plugin
unpack it
tar -xf v2ray-plugin-linux-amd64-8cea1a3.tar.gz
move and rename it
mv v2ray-plugin_linux_amd64 /etc/ss-go/ss-go/v2ray-plugin
give v2ray-plugin access to priviliged ports
setcap 'cap_net_bind_service=+eip' /etc/ss-go/ss-go/v2ray-plugin
make a systemd service
nano /etc/systemd/system/ss-go.service
Just copy that to the file above:
[Unit]
Description=simple-obfuscation standalone server service
Documentation=Shadowsocks-go with V2Ray Websocket obfuscation
After=network.target
[Service]
Type=simple
User=nobody
Group=nogroup
CapabilityBoundingSet=CAP_NET_BIND_SERVICE
AmbientCapabilities=CAP_NET_BIND_SERVICE
LimitNOFILE=51200
ExecStart=/etc/ss-go/ss-go -s 0.0.0.0:12345 -password ВАШ_ПАРОЛЬ -cipher AEAD_CHACHA20_POLY1305 -udp
[Install]
WantedBy=multi-user.target
Look at the bold text — here, after -s
, you need to insert your VPS's IP, or home ip (127.0.0.1) or 0.0.0.0 and port — in the latter case shadowsocks will be available как through localhost AND through direct client connection. (e.g. if you need UDP traffic).
Reload the systemd units, launch ss-go service, enable it to load automaticly and check the status:
systemctl daemon-reload && systemctl restart ss-go.service && systemctl enable ss-go.service && systemctl status ss-go.service
Congrats, if everything went right, your system's traffic is routed through VPS and obfuscated using V2Ray.
IMPORTANT LINKS:
OUR CHANNEL - CLICK HERE
OUR CHAT - CLICK HERE
REVIEWS ABOUT WORKING WITH US - CLICK HERE
PREVIOUS ARTICLES:
Work Safely: How to stop leaving pieces of evidence at your hard drives.
Carding Amazon and other shops with American Express CC's
Drops: How to find them and work with them.