Shadow on the wall / Risks and flaws with Shadowsocks
There is a document write by X41 D-Sec team.
https://github.com/x41sec/slides/tree/master/2018-passthesalt
There's nothing to do. I believe exploitation of autoban.py is already known before this. The other exploitation is already fixed (see https://github.com/shadowsocks/shadowsocks-libev/issues/1734). I think in real world exploitation of the bug in ss-manager in shadowsocks-libev isn't possible unless the user intentionally misconfigured it like allowing end user to customize their passwords (you should not do that). And the rest of the talk is unrelated to this organization.
@Mygod, unfortunately shadowsocks-libev allows localhost access, which exposes the ss-manager (and any other service running on localhost) to any client. This is something that should be fixed asap.
@fortuna
https://github.com/shadowsocks/shadowsocks-libev/blob/master/README.md#security-tips
@madeye, the argument that ss-server is insecure by default still stands, even if there are ways of securing it. localhost access should be disabled by default, and only be enabled by those that know what they are doing.
@chenshaoju the security issues are not of the Shadowsocks protocol. Maybe this issue should be moved to the shadowsocks-libev repository.