Shadowsocks + Cloak by Script
Cloak disguises a proxy or VPN server as a web server in order to evade deep packet inspection (DPI). The disguised server secretly implements Shadowsocks, OpenVPN, or Tor.
In this article, we deploy Shadowsocks and Cloak by using a pre-written script. This will be easier than manually issuing the instructions to install the software on the server.
SSH into your server. Update your existing software. Make sure your firewall is open for TCP input on port 443.
In a browser, visit https://github.com/HirbodBehnam/Shadowsocks-Cloak-Installer. Copy the command to run the script.
Paste the command into your terminal emulator. Respond to the questions the script asks with your preferred answers.
If you have an Android client, install Shadowsocks and Cloak on your Android device, then scan the QR code on the screen.
If you have a Windows client, copy the
ss:// URL, and save it in Notepad.
If you have a Linux client, save the detailed parameters.
Install Shadowsocks for Windows from https://github.com/shadowsocks/shadowsocks-windows/releases.
Download Cloak for Windows from https://github.com/cbeuw/Cloak/releases.
Cut and paste the Cloak executable into the same folder as the Shadowsocks executable.
ss:// link that you saved.
Launch Shadowsocks. Import the
ss:// URL from the clipboard. Insert the actual name of the cloak executable as the name of your Shadowsocks plugin program.
Configure your browser to use the proxy on
Visit https://www.dnsleaktest.com to check that your are using your remote proxy server and not your local PC to access the Internet.