Shadowsocks + Cloak by Script

Cloak disguises a proxy or VPN server as a web server in order to evade deep packet inspection (DPI). The disguised server secretly implements Shadowsocks, OpenVPN, or Tor.

Shadowsocks + Cloak

In this article, we deploy Shadowsocks and Cloak by using a pre-written script. This will be easier than manually issuing the instructions to install the software on the server.

1. Set Up the Server

SSH into your server. Update your existing software. Make sure your firewall is open for TCP input on port 443.

In a browser, visit https://github.com/HirbodBehnam/Shadowsocks-Cloak-Installer. Copy the command to run the script.

Paste the command into your terminal emulator. Respond to the questions the script asks with your preferred answers.

2. Collect Parameters

If you have an Android client, install Shadowsocks and Cloak on your Android device, then scan the QR code on the screen.

If you have a Windows client, copy the ss:// URL, and save it in Notepad.

If you have a Linux client, save the detailed parameters.

3. Set Up Windows Client

Install Shadowsocks for Windows from https://github.com/shadowsocks/shadowsocks-windows/releases.

Download Cloak for Windows from https://github.com/cbeuw/Cloak/releases.

Cut and paste the Cloak executable into the same folder as the Shadowsocks executable.

Retrieve the ss:// link that you saved.

Launch Shadowsocks. Import the ss:// URL from the clipboard. Insert the actual name of the cloak executable as the name of your Shadowsocks plugin program.

Configure your browser to use the proxy on 127.0.0.1, port 1080.

Visit https://www.dnsleaktest.com to check that your are using your remote proxy server and not your local PC to access the Internet.