-
Notifications
You must be signed in to change notification settings - Fork 555
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SIP002 - Optional extension configurations as query strings in ss URLs #27
Comments
I prefer disabled by default, even the config is available, especially for the experimental obfuscating.
I think if the extension is configured, we may also export the settings. |
Hi, guys. Firstly, thanks for your discussions @Mygod @madeye . I’m not a expert on TCP/IP protocol. I'm interested in computer science, but I major in physics and write codes for science researches. Maybe, I could provide some views from a pure user rather than a developer. When I heard @madeye want to deprecate obfuscation in the next release of shadowsocks-libev, I forked a 2.6.0 version branch into into my repositories immediately. I definitely understand why you think it's a dirty hack for given ISPs and breaks KISS principle. But as a user, I don't like the design of seperating obfuscation into simple-obfs. I'm a zealot of minimalist lifestyle and a practitioner for KISS principle, which means I will choose to enable The same problem is happen to obfuscation. But obfuscation is a little different with kcptun protocol,
If there is no necessary, clients don't need to make too many changes. For now, I'm glad to try this new feature just like enable UDP reply, Fast-open and One-time authentication. Yeah, I like obfuscation as a option Imaging someone wants to use both kcptun and simple-obfs for multi-user configuration now, I think it's a terrible, trivial and dirty work to configure during different tools. It is not KISS at all. Hence, please could you reconsider carefully whether to remove this new feature in the next release of shadowsocks-libev? Or just keep a fundanmental and recommended implementation of obfuscation in shadowsocks-libev, but also provide plugin supports to another obfuscations (like obfs4proxy). A much better solution also is welcome. Anyway, I think your discussions are meaningful! It's a good try for further developments of shadowsocks protocol. Just keep it and make community of shadowsocks better. These are my humble opinions. And I appreciate your time to read these. Thanks for your efforts. PS: the following is not a technical content, just a little personal opinion. I'm sorry for that I'm too lazy to open a new email and send to @madeye. I have some foreign friends who live and work in China. I volunteer to provide shadowsocks service to them for free. Some of them wanted to donate to me and I rufused all the time. Of course, I always got lots of thanks or became respected. "For the freedom of internet" someone said. They don't know who is the hero in the background. But, I know. I think all these honors should belong to you(@madeye) and @clowwindy. What's more, to everyone(shadowsocks.org members and others) who contributes to shadowsocks protocol and makes it better. That's how open source works! Finally, Happy New Year! 🎉 Cheers! |
@lqhuang Wow! It's really the longest feedback we have received in this issue tracker. Thanks for your feedback and suggestion! I think one misunderstanding here is that we would remove simple-obfs from shadowsocks. Instead, we will keep providing simple-obfs as a plugin service of shadowsocks. In other words, for the end users, nothing will change in the next release, although the command line may change to The biggest advantage from this design is that we can have more and more plugin services designed for shadowsocks without modifying the upstream, e.g. shadowsocks-libev. In the multi-user scenario, if you're using shadowsocks-manager, everything will work as usual. The server will automatically start the plugin service defined in the config or the command line. However, if you're with any third-party panel, changes may be required. At last, KCPTUN, simple-obfs and all the future plugins are all optional. If you haven't experienced serious QoS, please don't enable them. Especially, as simple-obfs is actually a "dirty hack for given ISPs", it may introduce additional characteristics to shadowsocks protocol. Thanks again for your feedback. Please keep watching our projects and send us more feedbacks! |
@madeye Thanks for your illustration! It's easier to understand now! Pherhaps I was misleaded by the manual page of simple-obfs. I admit that Thanks again for your replay. You're doing a great work:) |
What about encoding a plugin's settings into one BASE64 string? Then the URL looks like To follow #28, we should remove |
The problem is that this approach may not be cross platform. For example,
executable name can change.
|
Hmm. The executable name should be the same even in a cross platform scenario? The developer of plugins should take care of this, make sure no conflict between different plugins. For platform specific settings, users may have to modify them after importing, e.g. interface name to bind. I think shadowsocks clients are only required to pass the arguments to the plugin, never parse them. |
Should plugin provide configuration user interface? In that case plugin would need to do the argument parsing. For example, I may want to use /data/data/com.github.shadowsocks.plugin.kcptun/lib/libkcptun.so as executable path. What about this? |
I prefer no specific UI for different plugins. IMO, a shadowsocks-android plugin package should provide an interface to copy binaries from its data directory to shadowsocks-android's. In addition, the name of the executable should keep consistent on all the platforms. This name can also be passed from plugin package to shadowsocks-android. |
Want to pitch about the Matrix URIs scheme for the configuration, e.g.:
Which makes grouping more easily. |
@em0minate We don't support multiple plugins though. Also:
|
|
Quick demo to illustrate the parsing: const { parse } = require('url');
const uri = 'ss://passwd:method@hostname:7070/kcptun;mode=fast;crypt=aes/obfs;host=foobar.io';
const { protocol, auth, hostname, port, pathname } = parse(uri);
console.info(protocol, auth, hostname, port);
const plugins = pathname
.split('/')
.filter(Boolean)
.map(s => s.replace(';', '?').replace(/;/g, '&'))
.map(s => parse(s, true))
.map(({pathname, query}) => ({[pathname]: query}))
;
const options = Object.assign({}, ...plugins);
console.info(options);
|
Hello, I have added kcptun to ShadowsocksX-ng recently.Add kcptun configures to the qrcode like
The codes has been push to develop branch on github, but has not released a new version. Any suggestions? |
The porposal of @em0minate looks quite interesting. What do you think? @Mygod @qiuyuzhou Thanks for the implementation, please wait for @Mygod's final decision. |
What if plugin uses non-standard CLI though? This would imply a change to SIP003. |
@Mygod Could you elaborate more on "non-standard CLI"? Is there any example? |
@madeye Maybe like: Actually there's no constraint that one must use getopt-style command line options. One could even use inline bash scripts. |
@Mygod OK, we should add a restriction in SIP003. |
And even if you do that, every client from now on will be forced to parse CLI to generate QR code. And what about illegal characters? (URL encode/decode?) |
@Mygod Hmm.. You're right. What about this #27 (comment)? We encode the CLI in BASE64? |
Although I have to say this is actually a more cross-platform solution. For example, options in Windows are by convention prepended by '/' while in getopt they are prepended by one or two |
Personally I prefer to URL/base64 encoding CLI if we're not bombing SIP003. |
Unless a plugin is implemented as native Win32 application, I don't think we would have issues in CLI. In addition, to support cross-platform, a SIP003 plugin should support POSIX getopt() instead of Win32 getopt(). |
@Mygod Agreed. |
@Mygod OK, that should not be a problem for us. At least all the official desktop and mobile clients support the legacy BASE64 URL. |
Should we also keep support for generating old format if the user wishes to use it? |
@Mygod I think it should be useful today. |
@Mygod What about generating legacy URL for configs without plugins? It makes sense and won't break backward compatibility. |
I don't think that's a good idea. |
Well can we set up a standard of URIs? Could someone please tell me what currently used URIs look like? Edit: |
@madeye Should we settle this now? |
Yes, could you also add a wiki page about the new URL? |
No. 🙃 |
😓 |
@madeye I'll let you decide which one we would use. 😛 |
So what's the conclusion? |
@Mygod I think it's settled as #27 (comment). |
@madeye Will you please give an example of KCPTun? Is that like this:
|
Since SIP022 have already make Futher more, go2-shadowsocks2 assumes userinfo is not encoded: https://github.com/shadowsocks/go-shadowsocks2/blob/71a35d3383128957db1327991445fca643feb4e2/main.go#L189-L201 So here I suggest SIP002 should allow userinfo to not being encoded, and implementations should handle both 2 forms. For AEAD-2022 ciphers, userinfo in SIP002 MUST NOT be encoded (just for unifying all implementations' behaviors). Suggestions have been added to https://github.com/shadowsocks/shadowsocks-org/wiki/SIP002-URI-Scheme |
I think it's too late to change SIP002. A alternative change is adding |
I think it is Ok to just change SIP002's spec about allowing plain text user-info, because you can always use the old SIP002 URL to represent SIP022 methods. So plain text user-info is just an extension of SIP002. |
So, some clients have to implement fallback logic for the initial scheme and previous SIP002 scheme, which seems too complicated. |
It's actually quite simple: just look for |
That's basically what I proposed initially (except I went with |
Seems no further objections to the change. Let's finalize SIP002 to allow non-encoded user-info. |
ss://v2;xxx |
Shadowsocks Improvement Proposal 002 (actually why don't we just use issue number to refer to them instead)
Optional configurations as query strings in ss URLs
Since #26, there are at least two optional extension for shadowsocks as far as I can tell:
There may be more extensions in the future. So what about adding them to ss URLs? For example, we can have
ss://...?kcpport=8839&kcpcli=--crypt+none......#a+name
for easier configuration. Clients that don't support the extensions can safely ignore them.What should be included:
What shouldn't:
Problems:
Final version:
SIP002 purposed a new URL schema, following RFC3986:
The last
/
should be appended if query or fragment is present. Example:ss://YmYtY2ZiOnRlc3Q@192.168.100.1:8888/?plugin=url-encoded-plugin-argument-value&unsupported-arguments=should-be-ignored#Dummy+profile+name
. This kind of URIs can be parsed by standard libraries provided by most languages.For plugin argument, we use the similar format as
TOR_PT_SERVER_TRANSPORT_OPTIONS
, which have the format likesimple-obfs;obfs=http;obfs-host=www.baidu.com
where colons, semicolons, equal signs and backslashes MUST be escaped with a backslash.The text was updated successfully, but these errors were encountered: