From Shadowsocks to Trojan: Evolution and Security Assessment of Modern VPN Proxy Protocols

5/17/2026 · 2 min

Introduction

As internet censorship and traffic monitoring technologies evolve, traditional VPN protocols (e.g., PPTP, L2TP/IPsec) are being phased out due to their obvious fingerprints and vulnerability to Deep Packet Inspection (DPI). New-generation proxy protocols like Shadowsocks, V2Ray, and Trojan have emerged, employing obfuscation, encryption, and masquerading to provide stable connections while evading detection. This article traces the evolution of these protocols and assesses their security.

Shadowsocks: The Pioneer of Lightweight Encrypted Proxies

Shadowsocks (SS), originally developed by Clowwindy, uses a SOCKS5 proxy architecture with symmetric encryption (e.g., AES-256-CFB) and a one-time password (OTP) mechanism. Its key advantages are lightweight design, simple configuration, and traffic patterns similar to HTTPS, which initially bypassed the Great Firewall (GFW) effectively. However, as DPI improved, SS's fixed encryption algorithms and handshake signatures became identifiable, leading to widespread server blocking.

V2Ray: Multi-Protocol Fusion and Dynamic Ports

V2Ray, the core component of Project V, supports multiple proxy protocols (e.g., VMess, Shadowsocks, Socks) and introduces dynamic ports, traffic obfuscation (e.g., WebSocket+TLS), and routing rules. The VMess protocol uses UUIDs for user identification and timestamp verification to prevent replay attacks. V2Ray's flexibility allows it to adapt to complex network environments, but its configuration is complex, and VMess still has certain fingerprint features, such as fixed header lengths.

Trojan: Masquerading as HTTPS Traffic

Trojan's design philosophy is to "masquerade as normal HTTPS traffic." It directly uses TLS encryption and encapsulates proxy traffic within HTTP/1.1 GET or POST requests, making the traffic nearly indistinguishable from regular web browsing. Trojan does not introduce additional encryption layers, relying instead on TLS for encryption and integrity, resulting in low performance overhead. Its main strength is difficulty for DPI to identify, as the traffic looks like standard HTTPS. However, Trojan's weakness lies in potential blocking if TLS certificates are tampered with or server IPs are heavily monitored.

Security Assessment and Comparison

| Protocol | Encryption | Anti-Detection | Performance | Configuration Complexity | |----------|------------|----------------|-------------|--------------------------| | Shadowsocks | Symmetric | Medium (DPI-prone) | High | Low | | V2Ray (VMess) | Custom+TLS | High (obfuscatable) | Medium | High | | Trojan | TLS | Very High (HTTPS mimicry) | High | Medium |

From a security perspective, Trojan excels in anti-detection but depends on TLS strength; V2Ray offers the richest features at the cost of complexity; Shadowsocks remains popular for its simplicity but requires obfuscation plugins (e.g., v2ray-plugin) to enhance security.

Future Trends

Future proxy protocols will emphasize "featurelessness," such as using QUIC (UDP-based TLS) or WireGuard. Meanwhile, machine learning-driven DPI is advancing, requiring protocol developers to continuously update obfuscation strategies. Users should consider network environment, performance needs, and security levels when choosing a protocol.

Related reading

Related articles

V2Ray vs. Mainstream Proxy Protocols: Analysis of Performance, Security, and Applicable Scenarios
This article provides an in-depth comparison between V2Ray and mainstream proxy protocols like Shadowsocks, Trojan, and WireGuard. It analyzes key dimensions including transmission performance, security mechanisms, censorship resistance, and applicable scenarios, offering professional guidance for users to select the most suitable network acceleration and privacy protection solution based on their specific needs.
Read more
Deep Dive into VPN Proxy Protocols: A Comparative Analysis of WireGuard, OpenVPN, and Shadowsocks in Anti-Censorship Capabilities
This article provides an in-depth comparison of WireGuard, OpenVPN, and Shadowsocks in terms of anti-censorship capabilities, analyzing their encryption mechanisms, traffic characteristics, and deployment flexibility to help readers choose the most suitable protocol for their needs.
Read more
Deep Dive into V2Ray Protocols: Technical Evolution and Security Considerations from VMess to XTLS
This article provides an in-depth analysis of the technical evolution of V2Ray core protocols from VMess to XTLS, covering protocol design principles, encryption mechanisms, performance optimization, and security considerations to help readers understand the characteristics and applicable scenarios of different protocols.
Read more
VLESS Protocol Security Assessment: Analysis of Encryption Mechanisms, Traffic Obfuscation, and Potential Risks
This article provides a comprehensive security assessment of the VLESS protocol, delving into its design philosophy of unencrypted payloads, the implementation of encrypted transport layers such as TLS/XTLS, the application of traffic obfuscation techniques (e.g., WebSocket, gRPC, Reality), and explores its advantages and potential risks in terms of censorship resistance, performance, and security balance, offering deployment and configuration guidance for advanced users and network administrators.
Read more
VLESS and the Xray Ecosystem: Technical Evolution and Application Scenarios of the Next-Generation Proxy Protocol Stack
This article delves into the VLESS protocol and its central role within the Xray ecosystem, analyzing its technical evolution compared to VMess, its key features, and detailing its diverse application scenarios in modern network environments.
Read more
In-Depth Analysis of the VMess Protocol: Mechanisms, Security, and Anti-Detection Capabilities
This article provides an in-depth analysis of the VMess protocol's core mechanisms, security features, and anti-detection capabilities, covering encryption, authentication, transport obfuscation, and protocol evolution for network acceleration and security professionals.
Read more

FAQ

What is the main difference between Shadowsocks and Trojan?
Shadowsocks uses symmetric encryption with relatively fixed traffic patterns, making it easier for DPI to identify. Trojan relies on TLS encryption and masquerades as HTTPS traffic, offering stronger anti-detection but requiring a valid TLS certificate.
What advantages does V2Ray have over Trojan?
V2Ray supports multiple protocols and complex routing rules, allowing flexible traffic obfuscation (e.g., WebSocket+TLS). It suits users needing highly customized network environments, though configuration is more complex.
Is the Trojan protocol absolutely secure?
Trojan's security depends on TLS strength and server IP concealment. If the TLS certificate is hijacked or the server IP is heavily monitored, it may still be blocked. No protocol is absolutely secure; additional protective measures are needed.
Read more