Skip to content

Commit 36c095f

Browse files
committed
documentation: Bump version
1 parent 71c0ed3 commit 36c095f

File tree

1 file changed

+279
-0
lines changed

1 file changed

+279
-0
lines changed

docs/changelog.md

Lines changed: 279 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,27 +2,130 @@
22
icon: material/alert-decagram
33
---
44

5+
#### 1.12.0-beta.28
6+
7+
* Fixes and improvements
8+
59
### 1.11.14
610

711
* Fixes and improvements
812

913
_We are temporarily unable to update sing-box apps on the App Store because the reviewer mistakenly found that we
1014
violated the rules (TestFlight users are not affected)._
1115

16+
#### 1.12.0-beta.24
17+
18+
* Allow `tls_fragment` and `tls_record_fragment` to be enabled together **1**
19+
* Also add fragment options for TLS client configuration **2**
20+
* Fixes and improvements
21+
22+
**1**:
23+
24+
For debugging only, it is recommended to disable if record fragmentation works.
25+
26+
See [Route Action](/configuration/route/rule_action/#tls_fragment).
27+
28+
**2**:
29+
30+
See [TLS](/configuration/shared/tls/).
31+
32+
#### 1.12.0-beta.23
33+
34+
* Add loopback address support for tun **1**
35+
* Add cache support for ssm-api **2**
36+
* Fixes and improvements
37+
38+
**1**:
39+
40+
TUN now implements SideStore's StosVPN.
41+
42+
See [Tun](/configuration/inbound/tun/#loopback_address).
43+
44+
**2**:
45+
46+
See [SSM API Service](/configuration/service/ssm-api/#cache_path).
47+
48+
#### 1.12.0-beta.21
49+
50+
* Fix missing `home` option for DERP service **1**
51+
* Fixes and improvements
52+
53+
**1**:
54+
55+
You can now choose what the DERP home page shows, just like with derper's `-home` flag.
56+
57+
See [DERP](/configuration/service/derp/#home).
58+
1259
### 1.11.13
1360

1461
* Fixes and improvements
1562

1663
_We are temporarily unable to update sing-box apps on the App Store because the reviewer mistakenly found that we
1764
violated the rules (TestFlight users are not affected)._
1865

66+
#### 1.12.0-beta.17
67+
68+
* Update quic-go to v0.52.0
69+
* Fixes and improvements
70+
71+
#### 1.12.0-beta.15
72+
73+
* Add DERP service **1**
74+
* Add Resolved service and DNS server **2**
75+
* Add SSM API service **3**
76+
* Fixes and improvements
77+
78+
**1**:
79+
80+
DERP service is a Tailscale DERP server, similar to [derper](https://pkg.go.dev/tailscale.com/cmd/derper).
81+
82+
See [DERP Service](/configuration/service/derp/).
83+
84+
**2**:
85+
86+
Resolved service is a fake systemd-resolved DBUS service to receive DNS settings from other programs
87+
(e.g. NetworkManager) and provide DNS resolution.
88+
89+
See [Resolved Service](/configuration/service/resolved/) and [Resolved DNS Server](/configuration/dns/server/resolved/).
90+
91+
**3**:
92+
93+
SSM API service is a RESTful API server for managing Shadowsocks servers.
94+
95+
See [SSM API Service](/configuration/service/ssm-api/).
96+
1997
### 1.11.11
2098

2199
* Fixes and improvements
22100

23101
_We are temporarily unable to update sing-box apps on the App Store because the reviewer mistakenly found that we
24102
violated the rules (TestFlight users are not affected)._
25103

104+
#### 1.12.0-beta.13
105+
106+
* Add TLS record fragment route options **1**
107+
* Add missing `accept_routes` option for Tailscale **2**
108+
* Fixes and improvements
109+
110+
**1**:
111+
112+
See [Route Action](/configuration/route/rule_action/#tls_record_fragment).
113+
114+
**2**:
115+
116+
See [Tailscale](/configuration/endpoint/tailscale/#accept_routes).
117+
118+
#### 1.12.0-beta.10
119+
120+
* Add control options for listeners **1**
121+
* Fixes and improvements
122+
123+
**1**:
124+
125+
You can now set `bind_interface`, `routing_mark` and `reuse_addr` in Listen Fields.
126+
127+
See [Listen Fields](/configuration/shared/listen/).
128+
26129
### 1.11.10
27130

28131
* Undeprecate the `block` outbound **1**
@@ -36,13 +139,22 @@ we decided to temporarily undeprecate the `block` outbound until a replacement i
36139
_We are temporarily unable to update sing-box apps on the App Store because the reviewer mistakenly found that we
37140
violated the rules (TestFlight users are not affected)._
38141

142+
#### 1.12.0-beta.9
143+
144+
* Update quic-go to v0.51.0
145+
* Fixes and improvements
146+
39147
### 1.11.9
40148

41149
* Fixes and improvements
42150

43151
_We are temporarily unable to update sing-box apps on the App Store because the reviewer mistakenly found that we
44152
violated the rules (TestFlight users are not affected)._
45153

154+
#### 1.12.0-beta.5
155+
156+
* Fixes and improvements
157+
46158
### 1.11.8
47159

48160
* Improve `auto_redirect` **1**
@@ -56,42 +168,209 @@ see [Tun](/configuration/inbound/tun/#auto_redirect).
56168
_We are temporarily unable to update sing-box apps on the App Store because the reviewer mistakenly found that we
57169
violated the rules (TestFlight users are not affected)._
58170

171+
#### 1.12.0-beta.3
172+
173+
* Fixes and improvements
174+
59175
### 1.11.7
60176

61177
* Fixes and improvements
62178

63179
_We are temporarily unable to update sing-box apps on the App Store because the reviewer mistakenly found that we
64180
violated the rules (TestFlight users are not affected)._
65181

182+
#### 1.12.0-beta.1
183+
184+
* Fixes and improvements
185+
186+
**1**:
187+
188+
Now `auto_redirect` fixes compatibility issues between tun and Docker bridge networks,
189+
see [Tun](/configuration/inbound/tun/#auto_redirect).
190+
66191
### 1.11.6
67192

68193
* Fixes and improvements
69194

70195
_We are temporarily unable to update sing-box apps on the App Store because the reviewer mistakenly found that we
71196
violated the rules (TestFlight users are not affected)._
72197

198+
#### 1.12.0-alpha.19
199+
200+
* Update gVisor to 20250319.0
201+
* Fixes and improvements
202+
203+
#### 1.12.0-alpha.18
204+
205+
* Add wildcard SNI support for ShadowTLS inbound **1**
206+
* Fixes and improvements
207+
208+
**1**:
209+
210+
See [ShadowTLS](/configuration/inbound/shadowtls/#wildcard_sni).
211+
212+
#### 1.12.0-alpha.17
213+
214+
* Add NTP sniffer **1**
215+
* Fixes and improvements
216+
217+
**1**:
218+
219+
See [Protocol Sniff](/configuration/route/sniff/).
220+
221+
#### 1.12.0-alpha.16
222+
223+
* Update `domain_resolver` behavior **1**
224+
* Fixes and improvements
225+
226+
**1**:
227+
228+
`route.default_domain_resolver` or `outbound.domain_resolver` is now optional when only one DNS server is configured.
229+
230+
See [Dial Fields](/configuration/shared/dial/#domain_resolver).
231+
73232
### 1.11.5
74233

75234
* Fixes and improvements
76235

77236
_We are temporarily unable to update sing-box apps on the App Store because the reviewer mistakenly found that we
78237
violated the rules (TestFlight users are not affected)._
79238

239+
#### 1.12.0-alpha.13
240+
241+
* Move `predefined` DNS server to DNS rule action **1**
242+
* Fixes and improvements
243+
244+
**1**:
245+
246+
See [DNS Rule Action](/configuration/dns/rule_action/#predefined).
247+
80248
### 1.11.4
81249

82250
* Fixes and improvements
83251

252+
#### 1.12.0-alpha.11
253+
254+
* Fixes and improvements
255+
256+
#### 1.12.0-alpha.10
257+
258+
* Add AnyTLS protocol **1**
259+
* Improve `resolve` route action **2**
260+
* Migrate to stdlib ECH implementation **3**
261+
* Fixes and improvements
262+
263+
**1**:
264+
265+
The new AnyTLS protocol claims to mitigate TLS proxy traffic characteristics and comes with a new multiplexing scheme.
266+
267+
See [AnyTLS Inbound](/configuration/inbound/anytls/) and [AnyTLS Outbound](/configuration/outbound/anytls/).
268+
269+
**2**:
270+
271+
`resolve` route action now accepts `disable_cache` and other options like in DNS route actions, see [Route Action](/configuration/route/rule_action).
272+
273+
**3**:
274+
275+
See [TLS](/configuration/shared/tls).
276+
277+
The build tag `with_ech` is no longer needed and has been removed.
278+
279+
#### 1.12.0-alpha.7
280+
281+
* Add Tailscale DNS server **1**
282+
* Fixes and improvements
283+
284+
**1**:
285+
286+
See [Tailscale](/configuration/dns/server/tailscale/).
287+
288+
#### 1.12.0-alpha.6
289+
290+
* Add Tailscale endpoint **1**
291+
* Drop support for go1.22 **2**
292+
* Fixes and improvements
293+
294+
**1**:
295+
296+
See [Tailscale](/configuration/endpoint/tailscale/).
297+
298+
**2**:
299+
300+
Due to maintenance difficulties, sing-box 1.12.0 requires at least Go 1.23 to compile.
301+
302+
For Windows 7 users, legacy binaries now continue to compile with Go 1.23 and patches from [MetaCubeX/go](https://github.com/MetaCubeX/go).
303+
84304
### 1.11.3
85305

86306
* Fixes and improvements
87307

88308
_This version overwrites 1.11.2, as incorrect binaries were released due to a bug in the continuous integration
89309
process._
90310

311+
#### 1.12.0-alpha.5
312+
313+
* Fixes and improvements
314+
91315
### 1.11.1
92316

93317
* Fixes and improvements
94318

319+
#### 1.12.0-alpha.2
320+
321+
* Update quic-go to v0.49.0
322+
* Fixes and improvements
323+
324+
#### 1.12.0-alpha.1
325+
326+
* Refactor DNS servers **1**
327+
* Add domain resolver options**2**
328+
* Add TLS fragment route options **3**
329+
* Add certificate options **4**
330+
331+
**1**:
332+
333+
DNS servers are refactored for better performance and scalability.
334+
335+
See [DNS server](/configuration/dns/server/).
336+
337+
For migration, see [Migrate to new DNS server formats](/migration/#migrate-to-new-dns-servers).
338+
339+
Compatibility for old formats will be removed in sing-box 1.14.0.
340+
341+
**2**:
342+
343+
Legacy `outbound` DNS rules are deprecated
344+
and can be replaced by the new `domain_resolver` option.
345+
346+
See [Dial Fields](/configuration/shared/dial/#domain_resolver) and
347+
[Route](/configuration/route/#default_domain_resolver).
348+
349+
For migration,
350+
see [Migrate outbound DNS rule items to domain resolver](/migration/#migrate-outbound-dns-rule-items-to-domain-resolver).
351+
352+
**3**:
353+
354+
The new TLS fragment route options allow you to fragment TLS handshakes to bypass firewalls.
355+
356+
This feature is intended to circumvent simple firewalls based on **plaintext packet matching**, and should not be used
357+
to circumvent real censorship.
358+
359+
Since it is not designed for performance, it should not be applied to all connections, but only to server names that are
360+
known to be blocked.
361+
362+
See [Route Action](/configuration/route/rule_action/#tls_fragment).
363+
364+
**4**:
365+
366+
New certificate options allow you to manage the default list of trusted X509 CA certificates.
367+
368+
For the system certificate list, fixed Go not reading Android trusted certificates correctly.
369+
370+
You can also use the Mozilla Included List instead, or add trusted certificates yourself.
371+
372+
See [Certificate](/configuration/certificate/).
373+
95374
### 1.11.0
96375

97376
Important changes since 1.10:

0 commit comments

Comments
 (0)