-
Notifications
You must be signed in to change notification settings - Fork 567
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Redirect attack on Shadowsocks stream ciphers #154
Comments
Interesting attack. Now we could finally get rid of stream ciphers (after deprecating them for years)! To clarify: go-shadowsocks2 (not to be confused with the deprecated shadowsocks-go) supports AEAD ciphers from the very beginning, in addition to shadowsocks-libev, so the author's recommendation at the end is slightly incorrect. |
We have had active probing against stream ciphers since forever and that is already enough reason to not use stream ciphers already. (remember OTA?) I think stream ciphers are kept for improving performance if it is used along with plugins (shadowsocks/shadowsocks-libev#2581). Again this is a niche usage of stream cipher and personally I would prefer it gone. |
Should we remove all stream ciphers from the officially supported implementations now? Can't wait to delete legacy code! 😄 |
Windows implementation will remove all (maybe except few oldest cipher for special case) non-AEAD cipher in next major release. We're rewriting encryption using BouncyCastle, as they are not safe, we needn't implement them now. |
@studentmain What's the (rough) time frame for the next major release? And why still keep some old ciphers around? 😂 |
@madeye I'm removing all stream ciphers from go-ss2. Do you have any plan to deprecate them in ss-libev as well? |
When it down (or we give up).
|
@studentmain So maybe just leave |
I'd prefer The reason I mentioned |
The best practice is deprecating stream ciphers, not removing them: shadowsocks/shadowsocks-libev#2581 |
@studentmain I see, so it's more about removing some dependencies. @madeye Fair enough. I'm removing them in go-ss2 to force the deprecation. |
For go-ss2 I don't need to consider the client-side use case that much as I don't think many people use it as a client??? |
I'm actually considering using a golang/rust implementation for shadowsocks-android because libev is too cumbersome to work with... 😆 |
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
And AES-192-GCM which no one ever uses anyway.
ss-windows deprecated all stream cipher in v4.1.10 According to my recently survey. In 47 users, only 31(65%) user are using AEAD cipher. 12(25%) user are using aes-cfb, 12(25%) user are using chacha20-ietf, 13(27%) user are using rc4-md5. 5(10%) user are using chacha20 or salsa20. |
https://github.com/edwardz246003/shadowsocks
The text was updated successfully, but these errors were encountered: