Skip to content

Commit baab618

Browse files
committed
documentation: Bump version
1 parent 0e9a38e commit baab618

File tree

1 file changed

+171
-0
lines changed

1 file changed

+171
-0
lines changed

docs/changelog.md

Lines changed: 171 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,10 @@
22
icon: material/alert-decagram
33
---
44

5+
#### 1.12.0-beta.4
6+
7+
* Fixes and improvements
8+
59
### 1.11.8
610

711
* Improve `auto_redirect` **1**
@@ -14,38 +18,205 @@ see [Tun](/configuration/inbound/tun/#auto_redirect).
1418

1519
_We are temporarily unable to update sing-box apps on the App Store because the reviewer mistakenly found that we violated the rules (TestFlight users are not affected)._
1620

21+
#### 1.12.0-beta.3
22+
23+
* Fixes and improvements
24+
1725
### 1.11.7
1826

1927
* Fixes and improvements
2028

2129
_We are temporarily unable to update sing-box apps on the App Store because the reviewer mistakenly found that we violated the rules (TestFlight users are not affected)._
2230

31+
#### 1.12.0-beta.1
32+
33+
* Fixes and improvements
34+
35+
**1**:
36+
37+
Now `auto_redirect` fixes compatibility issues between tun and Docker bridge networks,
38+
see [Tun](/configuration/inbound/tun/#auto_redirect).
39+
2340
### 1.11.6
2441

2542
* Fixes and improvements
2643

2744
_We are temporarily unable to update sing-box apps on the App Store because the reviewer mistakenly found that we violated the rules (TestFlight users are not affected)._
2845

46+
#### 1.12.0-alpha.19
47+
48+
* Update gVisor to 20250319.0
49+
* Fixes and improvements
50+
51+
#### 1.12.0-alpha.18
52+
53+
* Add wildcard SNI support for ShadowTLS inbound **1**
54+
* Fixes and improvements
55+
56+
**1**:
57+
58+
See [ShadowTLS](/configuration/inbound/shadowtls/#wildcard_sni).
59+
60+
#### 1.12.0-alpha.17
61+
62+
* Add NTP sniffer **1**
63+
* Fixes and improvements
64+
65+
**1**:
66+
67+
See [Protocol Sniff](/configuration/route/sniff/).
68+
69+
#### 1.12.0-alpha.16
70+
71+
* Update `domain_resolver` behavior **1**
72+
* Fixes and improvements
73+
74+
**1**:
75+
76+
`route.default_domain_resolver` or `outbound.domain_resolver` is now optional when only one DNS server is configured.
77+
78+
See [Dial Fields](/configuration/shared/dial/#domain_resolver).
79+
2980
### 1.11.5
3081

3182
* Fixes and improvements
3283

3384
_We are temporarily unable to update sing-box apps on the App Store because the reviewer mistakenly found that we violated the rules (TestFlight users are not affected)._
3485

86+
#### 1.12.0-alpha.13
87+
88+
* Move `predefined` DNS server to DNS rule action **1**
89+
* Fixes and improvements
90+
91+
**1**:
92+
93+
See [DNS Rule Action](/configuration/dns/rule_action/#predefined).
94+
3595
### 1.11.4
3696

3797
* Fixes and improvements
3898

99+
#### 1.12.0-alpha.11
100+
101+
* Fixes and improvements
102+
103+
#### 1.12.0-alpha.10
104+
105+
* Add AnyTLS protocol **1**
106+
* Improve `resolve` route action **2**
107+
* Migrate to stdlib ECH implementation **3**
108+
* Fixes and improvements
109+
110+
**1**:
111+
112+
The new AnyTLS protocol claims to mitigate TLS proxy traffic characteristics and comes with a new multiplexing scheme.
113+
114+
See [AnyTLS Inbound](/configuration/inbound/anytls/) and [AnyTLS Outbound](/configuration/outbound/anytls/).
115+
116+
**2**:
117+
118+
`resolve` route action now accepts `disable_cache` and other options like in DNS route actions, see [Route Action](/configuration/route/rule_action).
119+
120+
**3**:
121+
122+
See [TLS](/configuration/shared/tls).
123+
124+
The build tag `with_ech` is no longer needed and has been removed.
125+
126+
#### 1.12.0-alpha.7
127+
128+
* Add Tailscale DNS server **1**
129+
* Fixes and improvements
130+
131+
**1**:
132+
133+
See [Tailscale](/configuration/dns/server/tailscale/).
134+
135+
#### 1.12.0-alpha.6
136+
137+
* Add Tailscale endpoint **1**
138+
* Drop support for go1.22 **2**
139+
* Fixes and improvements
140+
141+
**1**:
142+
143+
See [Tailscale](/configuration/endpoint/tailscale/).
144+
145+
**2**:
146+
147+
Due to maintenance difficulties, sing-box 1.12.0 requires at least Go 1.23 to compile.
148+
149+
For Windows 7 users, legacy binaries now continue to compile with Go 1.23 and patches from [MetaCubeX/go](https://github.com/MetaCubeX/go).
150+
39151
### 1.11.3
40152

41153
* Fixes and improvements
42154

43155
_This version overwrites 1.11.2, as incorrect binaries were released due to a bug in the continuous integration process._
44156

157+
#### 1.12.0-alpha.5
158+
159+
* Fixes and improvements
160+
45161
### 1.11.1
46162

47163
* Fixes and improvements
48164

165+
#### 1.12.0-alpha.2
166+
167+
* Update quic-go to v0.49.0
168+
* Fixes and improvements
169+
170+
#### 1.12.0-alpha.1
171+
172+
* Refactor DNS servers **1**
173+
* Add domain resolver options**2**
174+
* Add TLS fragment route options **3**
175+
* Add certificate options **4**
176+
177+
**1**:
178+
179+
DNS servers are refactored for better performance and scalability.
180+
181+
See [DNS server](/configuration/dns/server/).
182+
183+
For migration, see [Migrate to new DNS server formats](/migration/#migrate-to-new-dns-servers).
184+
185+
Compatibility for old formats will be removed in sing-box 1.14.0.
186+
187+
**2**:
188+
189+
Legacy `outbound` DNS rules are deprecated
190+
and can be replaced by the new `domain_resolver` option.
191+
192+
See [Dial Fields](/configuration/shared/dial/#domain_resolver) and
193+
[Route](/configuration/route/#default_domain_resolver).
194+
195+
For migration,
196+
see [Migrate outbound DNS rule items to domain resolver](/migration/#migrate-outbound-dns-rule-items-to-domain-resolver).
197+
198+
**3**:
199+
200+
The new TLS fragment route options allow you to fragment TLS handshakes to bypass firewalls.
201+
202+
This feature is intended to circumvent simple firewalls based on **plaintext packet matching**, and should not be used
203+
to circumvent real censorship.
204+
205+
Since it is not designed for performance, it should not be applied to all connections, but only to server names that are
206+
known to be blocked.
207+
208+
See [Route Action](/configuration/route/rule_action/#tls_fragment).
209+
210+
**4**:
211+
212+
New certificate options allow you to manage the default list of trusted X509 CA certificates.
213+
214+
For the system certificate list, fixed Go not reading Android trusted certificates correctly.
215+
216+
You can also use the Mozilla Included List instead, or add trusted certificates yourself.
217+
218+
See [Certificate](/configuration/certificate/).
219+
49220
### 1.11.0
50221

51222
Important changes since 1.10:

0 commit comments

Comments
 (0)