Skip to content

Commit 99c6ef0

Browse files
committed
documentation: Bump version
1 parent 286439f commit 99c6ef0

File tree

1 file changed

+231
-0
lines changed

1 file changed

+231
-0
lines changed

docs/changelog.md

Lines changed: 231 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,68 @@
22
icon: material/alert-decagram
33
---
44

5+
#### 1.12.0-beta.16
6+
7+
* Fixes and improvements
8+
9+
#### 1.12.0-beta.15
10+
11+
* Add DERP service **1**
12+
* Add Resolved service and DNS server **2**
13+
* Add SSM API service **3**
14+
* Fixes and improvements
15+
16+
**1**:
17+
18+
DERP service is a Tailscale DERP server, similar to [derper](https://pkg.go.dev/tailscale.com/cmd/derper).
19+
20+
See [DERP Service](/configuration/service/derp/).
21+
22+
**2**:
23+
24+
Resolved service is a fake systemd-resolved DBUS service to receive DNS settings from other programs
25+
(e.g. NetworkManager) and provide DNS resolution.
26+
27+
See [Resolved Service](/configuration/service/resolved/) and [Resolved DNS Server](/configuration/dns/server/resolved/).
28+
29+
**3**:
30+
31+
SSM API service is a RESTful API server for managing Shadowsocks servers.
32+
33+
See [SSM API Service](/configuration/service/ssm-api/).
34+
535
### 1.11.11
636

737
* Fixes and improvements
838

939
_We are temporarily unable to update sing-box apps on the App Store because the reviewer mistakenly found that we
1040
violated the rules (TestFlight users are not affected)._
1141

42+
#### 1.12.0-beta.13
43+
44+
* Add TLS record fragment route options **1**
45+
* Add missing `accept_routes` option for Tailscale **2**
46+
* Fixes and improvements
47+
48+
**1**:
49+
50+
See [Route Action](/configuration/route/rule_action/#tls_record_fragment).
51+
52+
**2**:
53+
54+
See [Tailscale](/configuration/endpoint/tailscale/#accept_routes).
55+
56+
#### 1.12.0-beta.10
57+
58+
* Add control options for listeners **1**
59+
* Fixes and improvements
60+
61+
**1**:
62+
63+
You can now set `bind_interface`, `routing_mark` and `reuse_addr` in Listen Fields.
64+
65+
See [Listen Fields](/configuration/shared/listen/).
66+
1267
### 1.11.10
1368

1469
* Undeprecate the `block` outbound **1**
@@ -22,13 +77,22 @@ we decided to temporarily undeprecate the `block` outbound until a replacement i
2277
_We are temporarily unable to update sing-box apps on the App Store because the reviewer mistakenly found that we
2378
violated the rules (TestFlight users are not affected)._
2479

80+
#### 1.12.0-beta.9
81+
82+
* Update quic-go to v0.51.0
83+
* Fixes and improvements
84+
2585
### 1.11.9
2686

2787
* Fixes and improvements
2888

2989
_We are temporarily unable to update sing-box apps on the App Store because the reviewer mistakenly found that we
3090
violated the rules (TestFlight users are not affected)._
3191

92+
#### 1.12.0-beta.5
93+
94+
* Fixes and improvements
95+
3296
### 1.11.8
3397

3498
* Improve `auto_redirect` **1**
@@ -42,42 +106,209 @@ see [Tun](/configuration/inbound/tun/#auto_redirect).
42106
_We are temporarily unable to update sing-box apps on the App Store because the reviewer mistakenly found that we
43107
violated the rules (TestFlight users are not affected)._
44108

109+
#### 1.12.0-beta.3
110+
111+
* Fixes and improvements
112+
45113
### 1.11.7
46114

47115
* Fixes and improvements
48116

49117
_We are temporarily unable to update sing-box apps on the App Store because the reviewer mistakenly found that we
50118
violated the rules (TestFlight users are not affected)._
51119

120+
#### 1.12.0-beta.1
121+
122+
* Fixes and improvements
123+
124+
**1**:
125+
126+
Now `auto_redirect` fixes compatibility issues between tun and Docker bridge networks,
127+
see [Tun](/configuration/inbound/tun/#auto_redirect).
128+
52129
### 1.11.6
53130

54131
* Fixes and improvements
55132

56133
_We are temporarily unable to update sing-box apps on the App Store because the reviewer mistakenly found that we
57134
violated the rules (TestFlight users are not affected)._
58135

136+
#### 1.12.0-alpha.19
137+
138+
* Update gVisor to 20250319.0
139+
* Fixes and improvements
140+
141+
#### 1.12.0-alpha.18
142+
143+
* Add wildcard SNI support for ShadowTLS inbound **1**
144+
* Fixes and improvements
145+
146+
**1**:
147+
148+
See [ShadowTLS](/configuration/inbound/shadowtls/#wildcard_sni).
149+
150+
#### 1.12.0-alpha.17
151+
152+
* Add NTP sniffer **1**
153+
* Fixes and improvements
154+
155+
**1**:
156+
157+
See [Protocol Sniff](/configuration/route/sniff/).
158+
159+
#### 1.12.0-alpha.16
160+
161+
* Update `domain_resolver` behavior **1**
162+
* Fixes and improvements
163+
164+
**1**:
165+
166+
`route.default_domain_resolver` or `outbound.domain_resolver` is now optional when only one DNS server is configured.
167+
168+
See [Dial Fields](/configuration/shared/dial/#domain_resolver).
169+
59170
### 1.11.5
60171

61172
* Fixes and improvements
62173

63174
_We are temporarily unable to update sing-box apps on the App Store because the reviewer mistakenly found that we
64175
violated the rules (TestFlight users are not affected)._
65176

177+
#### 1.12.0-alpha.13
178+
179+
* Move `predefined` DNS server to DNS rule action **1**
180+
* Fixes and improvements
181+
182+
**1**:
183+
184+
See [DNS Rule Action](/configuration/dns/rule_action/#predefined).
185+
66186
### 1.11.4
67187

68188
* Fixes and improvements
69189

190+
#### 1.12.0-alpha.11
191+
192+
* Fixes and improvements
193+
194+
#### 1.12.0-alpha.10
195+
196+
* Add AnyTLS protocol **1**
197+
* Improve `resolve` route action **2**
198+
* Migrate to stdlib ECH implementation **3**
199+
* Fixes and improvements
200+
201+
**1**:
202+
203+
The new AnyTLS protocol claims to mitigate TLS proxy traffic characteristics and comes with a new multiplexing scheme.
204+
205+
See [AnyTLS Inbound](/configuration/inbound/anytls/) and [AnyTLS Outbound](/configuration/outbound/anytls/).
206+
207+
**2**:
208+
209+
`resolve` route action now accepts `disable_cache` and other options like in DNS route actions, see [Route Action](/configuration/route/rule_action).
210+
211+
**3**:
212+
213+
See [TLS](/configuration/shared/tls).
214+
215+
The build tag `with_ech` is no longer needed and has been removed.
216+
217+
#### 1.12.0-alpha.7
218+
219+
* Add Tailscale DNS server **1**
220+
* Fixes and improvements
221+
222+
**1**:
223+
224+
See [Tailscale](/configuration/dns/server/tailscale/).
225+
226+
#### 1.12.0-alpha.6
227+
228+
* Add Tailscale endpoint **1**
229+
* Drop support for go1.22 **2**
230+
* Fixes and improvements
231+
232+
**1**:
233+
234+
See [Tailscale](/configuration/endpoint/tailscale/).
235+
236+
**2**:
237+
238+
Due to maintenance difficulties, sing-box 1.12.0 requires at least Go 1.23 to compile.
239+
240+
For Windows 7 users, legacy binaries now continue to compile with Go 1.23 and patches from [MetaCubeX/go](https://github.com/MetaCubeX/go).
241+
70242
### 1.11.3
71243

72244
* Fixes and improvements
73245

74246
_This version overwrites 1.11.2, as incorrect binaries were released due to a bug in the continuous integration
75247
process._
76248

249+
#### 1.12.0-alpha.5
250+
251+
* Fixes and improvements
252+
77253
### 1.11.1
78254

79255
* Fixes and improvements
80256

257+
#### 1.12.0-alpha.2
258+
259+
* Update quic-go to v0.49.0
260+
* Fixes and improvements
261+
262+
#### 1.12.0-alpha.1
263+
264+
* Refactor DNS servers **1**
265+
* Add domain resolver options**2**
266+
* Add TLS fragment route options **3**
267+
* Add certificate options **4**
268+
269+
**1**:
270+
271+
DNS servers are refactored for better performance and scalability.
272+
273+
See [DNS server](/configuration/dns/server/).
274+
275+
For migration, see [Migrate to new DNS server formats](/migration/#migrate-to-new-dns-servers).
276+
277+
Compatibility for old formats will be removed in sing-box 1.14.0.
278+
279+
**2**:
280+
281+
Legacy `outbound` DNS rules are deprecated
282+
and can be replaced by the new `domain_resolver` option.
283+
284+
See [Dial Fields](/configuration/shared/dial/#domain_resolver) and
285+
[Route](/configuration/route/#default_domain_resolver).
286+
287+
For migration,
288+
see [Migrate outbound DNS rule items to domain resolver](/migration/#migrate-outbound-dns-rule-items-to-domain-resolver).
289+
290+
**3**:
291+
292+
The new TLS fragment route options allow you to fragment TLS handshakes to bypass firewalls.
293+
294+
This feature is intended to circumvent simple firewalls based on **plaintext packet matching**, and should not be used
295+
to circumvent real censorship.
296+
297+
Since it is not designed for performance, it should not be applied to all connections, but only to server names that are
298+
known to be blocked.
299+
300+
See [Route Action](/configuration/route/rule_action/#tls_fragment).
301+
302+
**4**:
303+
304+
New certificate options allow you to manage the default list of trusted X509 CA certificates.
305+
306+
For the system certificate list, fixed Go not reading Android trusted certificates correctly.
307+
308+
You can also use the Mozilla Included List instead, or add trusted certificates yourself.
309+
310+
See [Certificate](/configuration/certificate/).
311+
81312
### 1.11.0
82313

83314
Important changes since 1.10:

0 commit comments

Comments
 (0)