Here’s a quick setup guide to use Shadowsocks proxy with obfuscation so you can use unfiltered internet access in Airports or Aeroplanes, etc.
I’ll be using Ubuntu 22.04 for this
Mandatory system update
apt update && apt upgrade -y
Install Shadowsocks
apt install shadowsocks-libev -y
After the installation edit the configuration file
/etc/shadowsocks-libev/config.json
{
"server": "0.0.0.0",
"server_port": 443,
"password": "USE_A_STRONG_PASSWORD_HERE_FROM_YOUR_PASSWORD_MANAGER",
"timeout": 300,
"method": "aes-256-gcm",
"fast_open": true,
"mode": "tcp_and_udp",
"plugin": "obfs-server",
"plugin_opts": "obfs=http"
}
Install obfuscation
apt install simple-obfs -y
Start and enable Shadowsocks proxy server
systemctl enable shadowsocks-libev
systemctl start shadowsocks-libev
Check if it is running (should say active (running))
# systemctl status shadowsocks-libev.service
* shadowsocks-libev.service - Shadowsocks-libev Default Server Service
Loaded: loaded (/lib/systemd/system/shadowsocks-libev.service; enabled; vendor preset: enabled)
Active: active (running) since Thu 2025-09-18 01:16:33 UTC; 34s ago
Docs: man:shadowsocks-libev(8)
Main PID: 26097 (ss-server)
Tasks: 1 (limit: 4647)
Memory: 484.0K
CPU: 11ms
CGroup: /system.slice/shadowsocks-libev.service
`-26097 /usr/bin/ss-server -c /etc/shadowsocks-libev/config.json
Sep 18 01:16:33 sam-server-tmp-1 systemd[1]: Started Shadowsocks-libev Default Server Service.
Sep 18 01:16:33 sam-server-tmp-1 ss-server[26097]: 2025-09-18 01:16:33 INFO: using tcp fast open
Sep 18 01:16:33 sam-server-tmp-1 ss-server[26097]: 2025-09-18 01:16:33 INFO: UDP relay enabled
Sep 18 01:16:33 sam-server-tmp-1 ss-server[26097]: 2025-09-18 01:16:33 INFO: initializing ciphers... aes-256-gcm
Sep 18 01:16:33 sam-server-tmp-1 ss-server[26097]: 2025-09-18 01:16:33 INFO: tcp server listening at 0.0.0.0:443
Sep 18 01:16:33 sam-server-tmp-1 ss-server[26097]: 2025-09-18 01:16:33 INFO: udp server listening at 0.0.0.0:443
You can then use a basic configuration in your Shadowsocks proxy client like this:
- Server IP: your server’s IP
- Port:
443 - Password: same as in config
- Encryption:
aes-256-gcm(or whatever you set)
Please check Reddit, etc for a client that you can use as many can contain malware.
Example of one I am using right now on OSX is: