You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/changelog.md
+276Lines changed: 276 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,6 +2,23 @@
2
2
icon: material/alert-decagram
3
3
---
4
4
5
+
#### 1.13.0-beta.7
6
+
7
+
* Fixes and improvements
8
+
9
+
#### 1.13.0-beta.6
10
+
11
+
* Update uTLS to v1.8.2 **1**
12
+
* Fixes and improvements
13
+
14
+
**1**:
15
+
16
+
This update fixes missing padding extension for Chrome 120+ fingerprints.
17
+
18
+
Also, documentation has been updated with a warning about uTLS fingerprinting vulnerabilities.
19
+
uTLS is not recommended for censorship circumvention due to fundamental architectural limitations;
20
+
use NaiveProxy instead for TLS fingerprint resistance.
21
+
5
22
#### 1.12.17
6
23
7
24
* Update uTLS to v1.8.2 **1**
@@ -15,18 +32,204 @@ Also, documentation has been updated with a warning about uTLS fingerprinting vu
15
32
uTLS is not recommended for censorship circumvention due to fundamental architectural limitations;
16
33
use NaiveProxy instead for TLS fingerprint resistance.
17
34
35
+
#### 1.13.0-beta.5
36
+
37
+
* Fixes and improvements
38
+
18
39
#### 1.12.16
19
40
20
41
* Fixes and improvements
21
42
43
+
#### 1.13.0-beta.4
44
+
45
+
* Apple/Android: Add support for sharing configurations via [QRS](https://github.com/qifi-dev/qrs)
46
+
* Android: Add support for resisting VPN detection via Xposed
47
+
* Update quic-go to v0.59.0
48
+
* Fixes and improvements
49
+
50
+
#### 1.13.0-beta.2
51
+
52
+
* Add `bind_address_no_port` option for dial fields **1**
53
+
* Fixes and improvements
54
+
55
+
**1**:
56
+
57
+
Adds the Linux socket option `IP_BIND_ADDRESS_NO_PORT` support when explicitly binding to a source address.
58
+
59
+
This allows reusing the same source port for multiple connections, improving scalability for high-concurrency proxy scenarios.
60
+
61
+
See [Dial Fields](/configuration/shared/dial/#bind_address_no_port).
62
+
63
+
#### 1.13.0-beta.1
64
+
65
+
* Add system interface support for Tailscale endpoint **1**
66
+
* Fixes and improvements
67
+
68
+
**1**:
69
+
70
+
Tailscale endpoint can now create a system TUN interface to handle traffic directly.
71
+
72
+
See [Tailscale endpoint](/configuration/endpoint/tailscale/#system_interface).
73
+
22
74
#### 1.12.15
23
75
24
76
* Fixes and improvements
25
77
78
+
#### 1.13.0-alpha.36
79
+
80
+
* Downgrade quic-go to v0.57.1
81
+
* Fixes and improvements
82
+
83
+
#### 1.13.0-alpha.35
84
+
85
+
* Add pre-match support for `auto_redirect`**1**
86
+
* Fixes and improvements
87
+
88
+
**1**:
89
+
90
+
`auto_redirect` now allows you to bypass sing-box for connections based on routing rules.
91
+
92
+
A new rule action `bypass` is introduced to support this feature. When matched during pre-match, the connection will bypass sing-box and connect directly.
93
+
94
+
This feature requires Linux with `auto_redirect` enabled.
95
+
96
+
See [Pre-match](/configuration/shared/pre-match/) and [Rule Action](/configuration/route/rule_action/#bypass).
97
+
98
+
#### 1.13.0-alpha.34
99
+
100
+
* Add Chrome Root Store certificate option **1**
101
+
* Add new options for ACME DNS-01 challenge providers **2**
102
+
* Add Wi-Fi state support for Linux and Windows **3**
103
+
* Update naiveproxy to 143.0.7499.109
104
+
* Update quic-go to v0.58.0
105
+
* Update tailscale to v1.92.4
106
+
* Drop support for go1.23 **4**
107
+
* Drop support for Android 5.0 **5**
108
+
109
+
**1**:
110
+
111
+
Adds `chrome` as a new certificate store option alongside `mozilla`.
112
+
Both stores filter out China-based CA certificates.
113
+
114
+
See [Certificate](/configuration/certificate/#store).
115
+
116
+
**2**:
117
+
118
+
See [DNS-01 Challenge](/configuration/shared/dns01_challenge/).
119
+
120
+
**3**:
121
+
122
+
sing-box can now monitor Wi-Fi state on Linux and Windows to enable routing rules based on `wifi_ssid` and `wifi_bssid`.
123
+
124
+
See [Wi-Fi State](/configuration/shared/wifi-state/).
125
+
126
+
**4**:
127
+
128
+
Due to maintenance difficulties, sing-box 1.13.0 requires at least Go 1.24 to compile.
129
+
130
+
**5**:
131
+
132
+
Due to maintenance difficulties, sing-box 1.13.0 will be the last version to support Android 5.0,
133
+
and only through a separate legacy build (with `-legacy-android-5` suffix).
134
+
135
+
For standalone binaries, the minimum Android version has been raised to Android 6.0,
136
+
since Termux requires Android 7.0 or later.
137
+
26
138
#### 1.12.14
27
139
28
140
* Fixes and improvements
29
141
142
+
#### 1.13.0-alpha.33
143
+
144
+
* Fixes and improvements
145
+
146
+
#### 1.13.0-alpha.32
147
+
148
+
* Remove `certificate_public_key_sha256` option for NaiveProxy outbound **1**
149
+
* Fixes and improvements
150
+
151
+
**1**:
152
+
153
+
Self-signed certificates change traffic behavior significantly, which defeats the purpose of NaiveProxy's design to resist traffic analysis.
154
+
For this reason, and due to maintenance costs, there is no reason to continue supporting `certificate_public_key_sha256`, which was designed to simplify the use of self-signed certificates.
155
+
156
+
#### 1.13.0-alpha.31
157
+
158
+
* Add QUIC support for NaiveProxy outbound **1**
159
+
* Add QUIC congestion control option for NaiveProxy **2**
160
+
* Fixes and improvements
161
+
162
+
**1**:
163
+
164
+
NaiveProxy outbound now supports QUIC.
165
+
166
+
See [NaiveProxy outbound](/configuration/outbound/naive/#quic).
167
+
168
+
**2**:
169
+
170
+
NaiveProxy inbound and outbound now supports configurable QUIC congestion control algorithms, including BBR and BBRv2.
171
+
172
+
See [NaiveProxy inbound](/configuration/inbound/naive/#quic_congestion_control) and [NaiveProxy outbound](/configuration/outbound/naive/#quic_congestion_control).
173
+
174
+
#### 1.13.0-alpha.30
175
+
176
+
* Add ECH support for NaiveProxy outbound **1**
177
+
* Add `tls.ech.query_server_name` option **2**
178
+
* Fix NaiveProxy outbound on Windows **3**
179
+
* Add OpenAI Codex Multiplexer service **4**
180
+
* Fixes and improvements
181
+
182
+
**1**:
183
+
184
+
See [NaiveProxy outbound](/configuration/outbound/naive/#tls).
185
+
186
+
**2**:
187
+
188
+
See [TLS](/configuration/shared/tls/#query_server_name).
189
+
190
+
**3**:
191
+
192
+
Each Windows release now includes `libcronet.dll`.
193
+
Ensure this file is in the same directory as `sing-box.exe` or in a directory listed in `PATH`.
194
+
195
+
**4**:
196
+
197
+
See [OCM](/configuration/service/ocm).
198
+
199
+
#### 1.13.0-alpha.29
200
+
201
+
* Add UDP over TCP support for naiveproxy outbound **1**
202
+
* Fixes and improvements
203
+
204
+
**1**:
205
+
206
+
See [NaiveProxy outbound](/configuration/outbound/naive/#udp_over_tcp).
207
+
208
+
#### 1.13.0-alpha.28
209
+
210
+
* Add naiveproxy outbound **1**
211
+
* Add `disable_tcp_keep_alive`, `tcp_keep_alive` and `tcp_keep_alive_interval` options for dial fields **2**
212
+
* Update default TCP keep-alive initial period from 10 minutes to 5 minutes
213
+
* Update quic-go to v0.57.1
214
+
* Fixes and improvements
215
+
216
+
**1**:
217
+
218
+
Only available on Apple platforms, Android, Windows and some Linux architectures.
219
+
220
+
See [NaiveProxy outbound](/configuration/outbound/naive/).
221
+
222
+
**2**:
223
+
224
+
See [Dial Fields](/configuration/shared/dial/#tcp_keep_alive).
225
+
226
+
*__Unfortunately, for non-technical reasons, we are currently unable to notarize the standalone version of the macOS client:
227
+
because system extensions require signatures to function, we have had to temporarily halt its release.__
228
+
229
+
__We plan to fix the App Store release issue and launch a new standalone desktop client, but until then,
230
+
only clients on TestFlight will be available (unless you have an Apple Developer Program and compile from source code).__
231
+
232
+
30
233
#### 1.12.13
31
234
32
235
* Fix naive inbound
@@ -42,10 +245,49 @@ only clients on TestFlight will be available (unless you have an Apple Developer
42
245
43
246
* Fixes and improvements
44
247
248
+
#### 1.13.0-alpha.26
249
+
250
+
* Update quic-go to v0.55.0
251
+
* Fix memory leak in hysteria2
252
+
* Fixes and improvements
253
+
45
254
#### 1.12.11
46
255
47
256
* Fixes and improvements
48
257
258
+
#### 1.13.0-alpha.24
259
+
260
+
* Add Claude Code Multiplexer service **1**
261
+
* Fixes and improvements
262
+
263
+
**1**:
264
+
265
+
CCM (Claude Code Multiplexer) service allows you to access your local Claude Code subscription remotely through custom tokens, eliminating the need for OAuth authentication on remote clients.
266
+
267
+
See [CCM](/configuration/service/ccm).
268
+
269
+
#### 1.13.0-alpha.23
270
+
271
+
* Fix compatibility with MPTCP **1**
272
+
* Fixes and improvements
273
+
274
+
**1**:
275
+
276
+
`auto_redirect` now rejects MPTCP connections by default to fix compatibility issues,
277
+
but you can change it to bypass the sing-box via the new `exclude_mptcp` option.
278
+
279
+
See [TUN](/configuration/inbound/tun/#exclude_mptcp).
280
+
281
+
#### 1.13.0-alpha.22
282
+
283
+
* Update uTLS to v1.8.1 **1**
284
+
* Fixes and improvements
285
+
286
+
**1**:
287
+
288
+
This update fixes an critical issue that could cause simulated Chrome fingerprints to be detected,
289
+
see https://github.com/refraction-networking/utls/pull/375.
290
+
49
291
#### 1.12.10
50
292
51
293
* Update uTLS to v1.8.1 **1**
@@ -56,18 +298,52 @@ only clients on TestFlight will be available (unless you have an Apple Developer
56
298
This update fixes an critical issue that could cause simulated Chrome fingerprints to be detected,
57
299
see https://github.com/refraction-networking/utls/pull/375.
58
300
301
+
#### 1.13.0-alpha.21
302
+
303
+
* Fix missing mTLS support in client options **1**
304
+
* Fixes and improvements
305
+
306
+
See [TLS](/configuration/shared/tls/).
307
+
59
308
#### 1.12.9
60
309
61
310
* Fixes and improvements
62
311
312
+
#### 1.13.0-alpha.16
313
+
314
+
* Add curve preferences, pinned public key SHA256 and mTLS for TLS options **1**
315
+
* Fixes and improvements
316
+
317
+
See [TLS](/configuration/shared/tls/).
318
+
319
+
#### 1.13.0-alpha.15
320
+
321
+
* Update quic-go to v0.54.0
322
+
* Update gVisor to v20250811
323
+
* Update Tailscale to v1.86.5
324
+
* Fixes and improvements
325
+
63
326
#### 1.12.8
64
327
65
328
* Fixes and improvements
66
329
330
+
#### 1.13.0-alpha.11
331
+
332
+
* Fixes and improvements
333
+
67
334
#### 1.12.5
68
335
69
336
* Fixes and improvements
70
337
338
+
#### 1.13.0-alpha.10
339
+
340
+
* Improve kTLS support **1**
341
+
* Fixes and improvements
342
+
343
+
**1**:
344
+
345
+
kTLS is now compatible with custom TLS implementations other than uTLS.
0 commit comments