|
2 | 2 | icon: material/alert-decagram
|
3 | 3 | ---
|
4 | 4 |
|
| 5 | +#### 1.12.0-beta.2 |
| 6 | + |
| 7 | +* Fixes and improvements |
| 8 | + |
5 | 9 | ### 1.11.7
|
6 | 10 |
|
7 | 11 | * Fixes and improvements
|
8 | 12 |
|
9 | 13 | _We are temporarily unable to update sing-box apps on the App Store because the reviewer mistakenly found that we violated the rules (TestFlight users are not affected)._
|
10 | 14 |
|
| 15 | +#### 1.12.0-beta.1 |
| 16 | + |
| 17 | +* Fixes and improvements |
| 18 | + |
| 19 | +**1**: |
| 20 | + |
| 21 | +Now `auto_redirect` fixes compatibility issues between tun and Docker bridge networks, |
| 22 | +see [Tun](/configuration/inbound/tun/#auto_redirect). |
| 23 | + |
11 | 24 | ### 1.11.6
|
12 | 25 |
|
13 | 26 | * Fixes and improvements
|
14 | 27 |
|
15 | 28 | _We are temporarily unable to update sing-box apps on the App Store because the reviewer mistakenly found that we violated the rules (TestFlight users are not affected)._
|
16 | 29 |
|
| 30 | +#### 1.12.0-alpha.19 |
| 31 | + |
| 32 | +* Update gVisor to 20250319.0 |
| 33 | +* Fixes and improvements |
| 34 | + |
| 35 | +#### 1.12.0-alpha.18 |
| 36 | + |
| 37 | +* Add wildcard SNI support for ShadowTLS inbound **1** |
| 38 | +* Fixes and improvements |
| 39 | + |
| 40 | +**1**: |
| 41 | + |
| 42 | +See [ShadowTLS](/configuration/inbound/shadowtls/#wildcard_sni). |
| 43 | + |
| 44 | +#### 1.12.0-alpha.17 |
| 45 | + |
| 46 | +* Add NTP sniffer **1** |
| 47 | +* Fixes and improvements |
| 48 | + |
| 49 | +**1**: |
| 50 | + |
| 51 | +See [Protocol Sniff](/configuration/route/sniff/). |
| 52 | + |
| 53 | +#### 1.12.0-alpha.16 |
| 54 | + |
| 55 | +* Update `domain_resolver` behavior **1** |
| 56 | +* Fixes and improvements |
| 57 | + |
| 58 | +**1**: |
| 59 | + |
| 60 | +`route.default_domain_resolver` or `outbound.domain_resolver` is now optional when only one DNS server is configured. |
| 61 | + |
| 62 | +See [Dial Fields](/configuration/shared/dial/#domain_resolver). |
| 63 | + |
17 | 64 | ### 1.11.5
|
18 | 65 |
|
19 | 66 | * Fixes and improvements
|
20 | 67 |
|
21 | 68 | _We are temporarily unable to update sing-box apps on the App Store because the reviewer mistakenly found that we violated the rules (TestFlight users are not affected)._
|
22 | 69 |
|
| 70 | +#### 1.12.0-alpha.13 |
| 71 | + |
| 72 | +* Move `predefined` DNS server to DNS rule action **1** |
| 73 | +* Fixes and improvements |
| 74 | + |
| 75 | +**1**: |
| 76 | + |
| 77 | +See [DNS Rule Action](/configuration/dns/rule_action/#predefined). |
| 78 | + |
23 | 79 | ### 1.11.4
|
24 | 80 |
|
25 | 81 | * Fixes and improvements
|
26 | 82 |
|
| 83 | +#### 1.12.0-alpha.11 |
| 84 | + |
| 85 | +* Fixes and improvements |
| 86 | + |
| 87 | +#### 1.12.0-alpha.10 |
| 88 | + |
| 89 | +* Add AnyTLS protocol **1** |
| 90 | +* Improve `resolve` route action **2** |
| 91 | +* Migrate to stdlib ECH implementation **3** |
| 92 | +* Fixes and improvements |
| 93 | + |
| 94 | +**1**: |
| 95 | + |
| 96 | +The new AnyTLS protocol claims to mitigate TLS proxy traffic characteristics and comes with a new multiplexing scheme. |
| 97 | + |
| 98 | +See [AnyTLS Inbound](/configuration/inbound/anytls/) and [AnyTLS Outbound](/configuration/outbound/anytls/). |
| 99 | + |
| 100 | +**2**: |
| 101 | + |
| 102 | +`resolve` route action now accepts `disable_cache` and other options like in DNS route actions, see [Route Action](/configuration/route/rule_action). |
| 103 | + |
| 104 | +**3**: |
| 105 | + |
| 106 | +See [TLS](/configuration/shared/tls). |
| 107 | + |
| 108 | +The build tag `with_ech` is no longer needed and has been removed. |
| 109 | + |
| 110 | +#### 1.12.0-alpha.7 |
| 111 | + |
| 112 | +* Add Tailscale DNS server **1** |
| 113 | +* Fixes and improvements |
| 114 | + |
| 115 | +**1**: |
| 116 | + |
| 117 | +See [Tailscale](/configuration/dns/server/tailscale/). |
| 118 | + |
| 119 | +#### 1.12.0-alpha.6 |
| 120 | + |
| 121 | +* Add Tailscale endpoint **1** |
| 122 | +* Drop support for go1.22 **2** |
| 123 | +* Fixes and improvements |
| 124 | + |
| 125 | +**1**: |
| 126 | + |
| 127 | +See [Tailscale](/configuration/endpoint/tailscale/). |
| 128 | + |
| 129 | +**2**: |
| 130 | + |
| 131 | +Due to maintenance difficulties, sing-box 1.12.0 requires at least Go 1.23 to compile. |
| 132 | + |
| 133 | +For Windows 7 users, legacy binaries now continue to compile with Go 1.23 and patches from [MetaCubeX/go](https://github.com/MetaCubeX/go). |
| 134 | + |
27 | 135 | ### 1.11.3
|
28 | 136 |
|
29 | 137 | * Fixes and improvements
|
30 | 138 |
|
31 | 139 | _This version overwrites 1.11.2, as incorrect binaries were released due to a bug in the continuous integration process._
|
32 | 140 |
|
| 141 | +#### 1.12.0-alpha.5 |
| 142 | + |
| 143 | +* Fixes and improvements |
| 144 | + |
33 | 145 | ### 1.11.1
|
34 | 146 |
|
35 | 147 | * Fixes and improvements
|
36 | 148 |
|
| 149 | +#### 1.12.0-alpha.2 |
| 150 | + |
| 151 | +* Update quic-go to v0.49.0 |
| 152 | +* Fixes and improvements |
| 153 | + |
| 154 | +#### 1.12.0-alpha.1 |
| 155 | + |
| 156 | +* Refactor DNS servers **1** |
| 157 | +* Add domain resolver options**2** |
| 158 | +* Add TLS fragment route options **3** |
| 159 | +* Add certificate options **4** |
| 160 | + |
| 161 | +**1**: |
| 162 | + |
| 163 | +DNS servers are refactored for better performance and scalability. |
| 164 | + |
| 165 | +See [DNS server](/configuration/dns/server/). |
| 166 | + |
| 167 | +For migration, see [Migrate to new DNS server formats](/migration/#migrate-to-new-dns-servers). |
| 168 | + |
| 169 | +Compatibility for old formats will be removed in sing-box 1.14.0. |
| 170 | + |
| 171 | +**2**: |
| 172 | + |
| 173 | +Legacy `outbound` DNS rules are deprecated |
| 174 | +and can be replaced by the new `domain_resolver` option. |
| 175 | + |
| 176 | +See [Dial Fields](/configuration/shared/dial/#domain_resolver) and |
| 177 | +[Route](/configuration/route/#default_domain_resolver). |
| 178 | + |
| 179 | +For migration, |
| 180 | +see [Migrate outbound DNS rule items to domain resolver](/migration/#migrate-outbound-dns-rule-items-to-domain-resolver). |
| 181 | + |
| 182 | +**3**: |
| 183 | + |
| 184 | +The new TLS fragment route options allow you to fragment TLS handshakes to bypass firewalls. |
| 185 | + |
| 186 | +This feature is intended to circumvent simple firewalls based on **plaintext packet matching**, and should not be used |
| 187 | +to circumvent real censorship. |
| 188 | + |
| 189 | +Since it is not designed for performance, it should not be applied to all connections, but only to server names that are |
| 190 | +known to be blocked. |
| 191 | + |
| 192 | +See [Route Action](/configuration/route/rule_action/#tls_fragment). |
| 193 | + |
| 194 | +**4**: |
| 195 | + |
| 196 | +New certificate options allow you to manage the default list of trusted X509 CA certificates. |
| 197 | + |
| 198 | +For the system certificate list, fixed Go not reading Android trusted certificates correctly. |
| 199 | + |
| 200 | +You can also use the Mozilla Included List instead, or add trusted certificates yourself. |
| 201 | + |
| 202 | +See [Certificate](/configuration/certificate/). |
| 203 | + |
37 | 204 | ### 1.11.0
|
38 | 205 |
|
39 | 206 | Important changes since 1.10:
|
|
0 commit comments