Skip to content

Commit 4e73574

Browse files
committed
documentation: Bump version
1 parent 8881882 commit 4e73574

File tree

1 file changed

+204
-0
lines changed

1 file changed

+204
-0
lines changed

docs/changelog.md

Lines changed: 204 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,10 +2,141 @@
22
icon: material/alert-decagram
33
---
44

5+
#### 1.13.0-alpha.34
6+
7+
* Add Chrome Root Store certificate option **1**
8+
* Add new options for ACME DNS-01 challenge providers **2**
9+
* Add Wi-Fi state support for Linux and Windows **3**
10+
* Update naiveproxy to 143.0.7499.109
11+
* Update quic-go to v0.58.0
12+
* Update tailscale to v1.92.4
13+
* Drop support for go1.23 **4**
14+
* Drop support for Android 5.0 **5**
15+
16+
**1**:
17+
18+
Adds `chrome` as a new certificate store option alongside `mozilla`.
19+
Both stores filter out China-based CA certificates.
20+
21+
See [Certificate](/configuration/certificate/#store).
22+
23+
**2**:
24+
25+
See [DNS-01 Challenge](/configuration/shared/dns01_challenge/).
26+
27+
**3**:
28+
29+
sing-box can now monitor Wi-Fi state on Linux and Windows to enable routing rules based on `wifi_ssid` and `wifi_bssid`.
30+
31+
See [Wi-Fi State](/configuration/shared/wifi-state/).
32+
33+
**4**:
34+
35+
Due to maintenance difficulties, sing-box 1.13.0 requires at least Go 1.24 to compile.
36+
37+
**5**:
38+
39+
Due to maintenance difficulties, sing-box 1.13.0 will be the last version to support Android 5.0,
40+
and only through a separate legacy build (with `-legacy-android-5` suffix).
41+
42+
For standalone binaries, the minimum Android version has been raised to Android 6.0,
43+
since Termux requires Android 7.0 or later.
44+
545
#### 1.12.14
646

747
* Fixes and improvements
848

49+
#### 1.13.0-alpha.33
50+
51+
* Fixes and improvements
52+
53+
#### 1.13.0-alpha.32
54+
55+
* Remove `certificate_public_key_sha256` option for NaiveProxy outbound **1**
56+
* Fixes and improvements
57+
58+
**1**:
59+
60+
Self-signed certificates change traffic behavior significantly, which defeats the purpose of NaiveProxy's design to resist traffic analysis.
61+
For this reason, and due to maintenance costs, there is no reason to continue supporting `certificate_public_key_sha256`, which was designed to simplify the use of self-signed certificates.
62+
63+
#### 1.13.0-alpha.31
64+
65+
* Add QUIC support for NaiveProxy outbound **1**
66+
* Add QUIC congestion control option for NaiveProxy **2**
67+
* Fixes and improvements
68+
69+
**1**:
70+
71+
NaiveProxy outbound now supports QUIC.
72+
73+
See [NaiveProxy outbound](/configuration/outbound/naive/#quic).
74+
75+
**2**:
76+
77+
NaiveProxy inbound and outbound now supports configurable QUIC congestion control algorithms, including BBR and BBRv2.
78+
79+
See [NaiveProxy inbound](/configuration/inbound/naive/#quic_congestion_control) and [NaiveProxy outbound](/configuration/outbound/naive/#quic_congestion_control).
80+
81+
#### 1.13.0-alpha.30
82+
83+
* Add ECH support for NaiveProxy outbound **1**
84+
* Add `tls.ech.query_server_name` option **2**
85+
* Fix NaiveProxy outbound on Windows **3**
86+
* Add OpenAI Codex Multiplexer service **4**
87+
* Fixes and improvements
88+
89+
**1**:
90+
91+
See [NaiveProxy outbound](/configuration/outbound/naive/#tls).
92+
93+
**2**:
94+
95+
See [TLS](/configuration/shared/tls/#query_server_name).
96+
97+
**3**:
98+
99+
Each Windows release now includes `libcronet.dll`.
100+
Ensure this file is in the same directory as `sing-box.exe` or in a directory listed in `PATH`.
101+
102+
**4**:
103+
104+
See [OCM](/configuration/service/ocm).
105+
106+
#### 1.13.0-alpha.29
107+
108+
* Add UDP over TCP support for naiveproxy outbound **1**
109+
* Fixes and improvements
110+
111+
**1**:
112+
113+
See [NaiveProxy outbound](/configuration/outbound/naive/#udp_over_tcp).
114+
115+
#### 1.13.0-alpha.28
116+
117+
* Add naiveproxy outbound **1**
118+
* Add `disable_tcp_keep_alive`, `tcp_keep_alive` and `tcp_keep_alive_interval` options for dial fields **2**
119+
* Update default TCP keep-alive initial period from 10 minutes to 5 minutes
120+
* Update quic-go to v0.57.1
121+
* Fixes and improvements
122+
123+
**1**:
124+
125+
Only available on Apple platforms, Android, Windows and some Linux architectures.
126+
127+
See [NaiveProxy outbound](/configuration/outbound/naive/).
128+
129+
**2**:
130+
131+
See [Dial Fields](/configuration/shared/dial/#tcp_keep_alive).
132+
133+
* __Unfortunately, for non-technical reasons, we are currently unable to notarize the standalone version of the macOS client:
134+
because system extensions require signatures to function, we have had to temporarily halt its release.__
135+
136+
__We plan to fix the App Store release issue and launch a new standalone desktop client, but until then,
137+
only clients on TestFlight will be available (unless you have an Apple Developer Program and compile from source code).__
138+
139+
9140
#### 1.12.13
10141

11142
* Fix naive inbound
@@ -21,10 +152,49 @@ only clients on TestFlight will be available (unless you have an Apple Developer
21152

22153
* Fixes and improvements
23154

155+
#### 1.13.0-alpha.26
156+
157+
* Update quic-go to v0.55.0
158+
* Fix memory leak in hysteria2
159+
* Fixes and improvements
160+
24161
#### 1.12.11
25162

26163
* Fixes and improvements
27164

165+
#### 1.13.0-alpha.24
166+
167+
* Add Claude Code Multiplexer service **1**
168+
* Fixes and improvements
169+
170+
**1**:
171+
172+
CCM (Claude Code Multiplexer) service allows you to access your local Claude Code subscription remotely through custom tokens, eliminating the need for OAuth authentication on remote clients.
173+
174+
See [CCM](/configuration/service/ccm).
175+
176+
#### 1.13.0-alpha.23
177+
178+
* Fix compatibility with MPTCP **1**
179+
* Fixes and improvements
180+
181+
**1**:
182+
183+
`auto_redirect` now rejects MPTCP connections by default to fix compatibility issues,
184+
but you can change it to bypass the sing-box via the new `exclude_mptcp` option.
185+
186+
See [TUN](/configuration/inbound/tun/#exclude_mptcp).
187+
188+
#### 1.13.0-alpha.22
189+
190+
* Update uTLS to v1.8.1 **1**
191+
* Fixes and improvements
192+
193+
**1**:
194+
195+
This update fixes an critical issue that could cause simulated Chrome fingerprints to be detected,
196+
see https://github.com/refraction-networking/utls/pull/375.
197+
28198
#### 1.12.10
29199

30200
* Update uTLS to v1.8.1 **1**
@@ -35,18 +205,52 @@ only clients on TestFlight will be available (unless you have an Apple Developer
35205
This update fixes an critical issue that could cause simulated Chrome fingerprints to be detected,
36206
see https://github.com/refraction-networking/utls/pull/375.
37207

208+
#### 1.13.0-alpha.21
209+
210+
* Fix missing mTLS support in client options **1**
211+
* Fixes and improvements
212+
213+
See [TLS](/configuration/shared/tls/).
214+
38215
#### 1.12.9
39216

40217
* Fixes and improvements
41218

219+
#### 1.13.0-alpha.16
220+
221+
* Add curve preferences, pinned public key SHA256 and mTLS for TLS options **1**
222+
* Fixes and improvements
223+
224+
See [TLS](/configuration/shared/tls/).
225+
226+
#### 1.13.0-alpha.15
227+
228+
* Update quic-go to v0.54.0
229+
* Update gVisor to v20250811
230+
* Update Tailscale to v1.86.5
231+
* Fixes and improvements
232+
42233
#### 1.12.8
43234

44235
* Fixes and improvements
45236

237+
#### 1.13.0-alpha.11
238+
239+
* Fixes and improvements
240+
46241
#### 1.12.5
47242

48243
* Fixes and improvements
49244

245+
#### 1.13.0-alpha.10
246+
247+
* Improve kTLS support **1**
248+
* Fixes and improvements
249+
250+
**1**:
251+
252+
kTLS is now compatible with custom TLS implementations other than uTLS.
253+
50254
#### 1.12.4
51255

52256
* Fixes and improvements

0 commit comments

Comments
 (0)