fix: ss2022-128 + ss裸aes-128-gcm 双节点

This commit is contained in:
mango
2026-02-14 20:51:14 +08:00
parent 28fd8a4c2a
commit 52fad77177

View File

@@ -97,14 +97,14 @@ get_ip() {
gen_config() {
SERVER_IP=$(get_ip)
# ss2022 端口和密钥
# ss2022-128 + ss裸128 端口和密钥
PORT_2022=$((RANDOM % 10000 + 20000))
PORT_128=$((RANDOM % 10000 + 30000))
KEY_2022=$(gen_key_256)
KEY_128=$(gen_key_128)
PORT_RAW=$((RANDOM % 10000 + 30000))
KEY_2022=$(gen_key_128)
KEY_RAW=$(openssl rand -base64 16)
METHOD_2022="2022-blake3-aes-256-gcm"
METHOD_128="2022-blake3-aes-128-gcm"
METHOD_2022="2022-blake3-aes-128-gcm"
METHOD_RAW="aes-128-gcm"
mkdir -p /etc/shadowsocks-rust
@@ -122,9 +122,9 @@ gen_config() {
},
{
"server": "0.0.0.0",
"server_port": ${PORT_128},
"method": "${METHOD_128}",
"password": "${KEY_128}",
"server_port": ${PORT_RAW},
"method": "${METHOD_RAW}",
"password": "${KEY_RAW}",
"timeout": 300,
"fast_open": true
}
@@ -171,12 +171,11 @@ gen_subscribe() {
mkdir -p "$SUB_DIR"
# SS URI 格式: ss://method:password@host:port#name
# ss2022 用 SIP008 格式
URI_2022="ss://$(echo -n "${METHOD_2022}:${KEY_2022}" | base64 -w0)@${SERVER_IP}:${PORT_2022}#SS2022-256"
URI_128="ss://$(echo -n "${METHOD_128}:${KEY_128}" | base64 -w0)@${SERVER_IP}:${PORT_128}#SS2022-128"
URI_2022="ss://$(echo -n "${METHOD_2022}:${KEY_2022}" | base64 -w0)@${SERVER_IP}:${PORT_2022}#SS2022-128"
URI_RAW="ss://$(echo -n "${METHOD_RAW}:${KEY_RAW}" | base64 -w0)@${SERVER_IP}:${PORT_RAW}#SS-AES-128"
# Base64 订阅
echo -e "${URI_2022}\n${URI_128}" | base64 -w0 > "$SUB_DIR/subscribe.txt"
echo -e "${URI_2022}\n${URI_RAW}" | base64 -w0 > "$SUB_DIR/subscribe.txt"
# Surge 配置
cat > "$SUB_DIR/surge.conf" << EOF
@@ -185,11 +184,11 @@ gen_subscribe() {
# 服务器: ${SERVER_IP}
[Proxy]
SS2022-256 = ss, ${SERVER_IP}, ${PORT_2022}, encrypt-method=${METHOD_2022}, password=${KEY_2022}
SS2022-128 = ss, ${SERVER_IP}, ${PORT_128}, encrypt-method=${METHOD_128}, password=${KEY_128}
SS2022-128 = ss, ${SERVER_IP}, ${PORT_2022}, encrypt-method=${METHOD_2022}, password=${KEY_2022}
SS-AES-128 = ss, ${SERVER_IP}, ${PORT_RAW}, encrypt-method=${METHOD_RAW}, password=${KEY_RAW}
[Proxy Group]
Proxy = select, SS2022-256, SS2022-128, DIRECT
Proxy = select, SS2022-128, SS-AES-128, DIRECT
EOF
# Clash 配置
@@ -198,19 +197,19 @@ EOF
# 生成时间: $(date '+%Y-%m-%d %H:%M:%S')
proxies:
- name: SS2022-256
- name: SS2022-128
type: ss
server: ${SERVER_IP}
port: ${PORT_2022}
cipher: ${METHOD_2022}
password: "${KEY_2022}"
- name: SS2022-128
- name: SS-AES-128
type: ss
server: ${SERVER_IP}
port: ${PORT_128}
cipher: ${METHOD_128}
password: "${KEY_128}"
port: ${PORT_RAW}
cipher: ${METHOD_RAW}
password: "${KEY_RAW}"
EOF
# 纯文本信息
@@ -221,25 +220,25 @@ EOF
服务器IP: ${SERVER_IP}
========================================
【节点1】SS2022-AES-256
【节点1】SS2022-AES-128 (新协议)
地址: ${SERVER_IP}
端口: ${PORT_2022}
加密: ${METHOD_2022}
密码: ${KEY_2022}
【节点2】SS2022-AES-128
【节点2】SS-AES-128 (传统协议)
地址: ${SERVER_IP}
端口: ${PORT_128}
加密: ${METHOD_128}
密码: ${KEY_128}
端口: ${PORT_RAW}
加密: ${METHOD_RAW}
密码: ${KEY_RAW}
【SS 订阅链接】
${URI_2022}
${URI_128}
${URI_RAW}
【Surge 配置】
SS2022-256 = ss, ${SERVER_IP}, ${PORT_2022}, encrypt-method=${METHOD_2022}, password=${KEY_2022}
SS2022-128 = ss, ${SERVER_IP}, ${PORT_128}, encrypt-method=${METHOD_128}, password=${KEY_128}
SS2022-128 = ss, ${SERVER_IP}, ${PORT_2022}, encrypt-method=${METHOD_2022}, password=${KEY_2022}
SS-AES-128 = ss, ${SERVER_IP}, ${PORT_RAW}, encrypt-method=${METHOD_RAW}, password=${KEY_RAW}
========================================
EOF
@@ -252,27 +251,27 @@ show_result() {
echo -e "${CYAN} 🚀 Shadowsocks-Rust 安装完成${NC}"
echo -e "${CYAN}════════════════════════════════════════${NC}"
echo ""
echo -e "${GREEN}【节点1】SS2022-AES-256${NC}"
echo -e "${GREEN}【节点1】SS2022-AES-128 (新协议)${NC}"
echo -e " 地址: ${SERVER_IP}"
echo -e " 端口: ${YELLOW}${PORT_2022}${NC}"
echo -e " 加密: ${METHOD_2022}"
echo -e " 密码: ${YELLOW}${KEY_2022}${NC}"
echo ""
echo -e "${GREEN}【节点2】SS2022-AES-128${NC}"
echo -e "${GREEN}【节点2】SS-AES-128 (传统协议)${NC}"
echo -e " 地址: ${SERVER_IP}"
echo -e " 端口: ${YELLOW}${PORT_128}${NC}"
echo -e " 加密: ${METHOD_128}"
echo -e " 密码: ${YELLOW}${KEY_128}${NC}"
echo -e " 端口: ${YELLOW}${PORT_RAW}${NC}"
echo -e " 加密: ${METHOD_RAW}"
echo -e " 密码: ${YELLOW}${KEY_RAW}${NC}"
echo ""
echo -e "${CYAN}────────────────────────────────────────${NC}"
echo -e "${GREEN}【Surge 格式】${NC}"
echo -e " SS2022-256 = ss, ${SERVER_IP}, ${PORT_2022}, encrypt-method=${METHOD_2022}, password=${KEY_2022}"
echo -e " SS2022-128 = ss, ${SERVER_IP}, ${PORT_128}, encrypt-method=${METHOD_128}, password=${KEY_128}"
echo -e " SS2022-128 = ss, ${SERVER_IP}, ${PORT_2022}, encrypt-method=${METHOD_2022}, password=${KEY_2022}"
echo -e " SS-AES-128 = ss, ${SERVER_IP}, ${PORT_RAW}, encrypt-method=${METHOD_RAW}, password=${KEY_RAW}"
echo ""
echo -e "${CYAN}────────────────────────────────────────${NC}"
echo -e "${GREEN}【SS 链接】${NC}"
echo -e " ${URI_2022}"
echo -e " ${URI_128}"
echo -e " ${URI_RAW}"
echo ""
echo -e "${CYAN}────────────────────────────────────────${NC}"
echo -e "${GREEN}【文件位置】${NC}"