question-mark
Stuck on an issue?

Lightrun Answers was designed to reduce the constant googling that comes with debugging 3rd party libraries. It collects links to all the places you might be looking at while hunting down a tough bug.

And, if you’re still stuck at the end, we’re happy to hop on a call to see how we can help out.

Customizable encryption method

See original GitHub issue

Right now the encryptionMethod is fixed to chacha20-ietf-poly1305:

https://github.com/Jigsaw-Code/outline-server/blob/037430d732d7e7bcfd2fc0f33cdbee39ce66fe79/src/shadowbox/server/server_access_key.ts#L87

Here are the recommended methods in shadowsocks:

  • aes-128-gcm, aes-256-gcm
  • chacha20-ietf-poly1305

Modern hardwares (CPUs) have crypto instructions that support AES encryption & decryption, so using AES would improve throughput and battery life on protable devices & routers.

Possible solutions:

  1. Configure encryptionMethod with environment variable OUTLINE_USER_ENCRYPTION_METHOD
  2. Configure encryptionMethod with API parameters
  3. Configure encryptionMethod in the configuration file

The 1st one would be the simplest solution.

Issue Analytics

  • State:closed
  • Created 2 years ago
  • Reactions:1
  • Comments:7 (4 by maintainers)

github_iconTop GitHub Comments

3reactions
fortunacommented, Oct 20, 2021
0reactions
62w71stcommented, Oct 1, 2022

@fortuna #1002 is awaiting an approval for the workflows to be run and also your review. You wrote “Please re-request review once this is ready…” but I don’t see that option on the pull request. Can you take a look pls?

Read more comments on GitHub >

github_iconTop Results From Across the Web

Custom Building Cryptography Algorithms (Hybrid ...
Hybrid Encryption is a concept in cryptography which combines/merge one/two cryptography algorithms to generate more effective encrypted text.
Read more >
US10666437B2 - Customizable encryption/decryption algorithm
Systems (100) and methods (700) for customizing a cryptographic algorithm. The methods comprise: providing an electronic device with the cryptographic ...
Read more >
Creating your own encryption and decryption algorithm
Creating crypto algorithms in general isn't bad, but assuming they're secure without spending time analyzing them or researching the history of ...
Read more >
CUSTOMIZED DATA ENCRYPTION ALGORITHM - IJSER
It is a block oriented cipher technique i.e the plaintext is first divided into blocks and then processed to convert into an unreadable...
Read more >
Design and implementation of a customized encryption ...
If the attacker has access to shared keys between devices, it doesn't take long to decrypt the information by using any of the...
Read more >

github_iconTop Related Medium Post

No results found

github_iconTop Related StackOverflow Question

No results found

github_iconTroubleshoot Live Code

Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free

github_iconTop Related Reddit Thread

No results found

github_iconTop Related Hackernoon Post

No results found

github_iconTop Related Tweet

No results found

github_iconTop Related Dev.to Post

No results found

github_iconTop Related Hashnode Post

No results found