sing-box/docs/changelog.md
2024-11-13 14:33:23 +08:00

67 KiB

icon
material/alert-decagram

1.11.0-alpha.14

  • Add multi network dialing 1
  • Fixes and improvements

1:

Similar to Surge's strategy.

New options allow you to connect using multiple network interfaces, prefer or only use one type of interface, and configure a timeout to fallback to other interfaces.

See Dial Fields, Rule Action and Route.

1.11.0-alpha.13

  • Fixes and improvements

1.11.0-alpha.12

  • Merge route options to route actions 1
  • Add network_type, network_is_expensive and network_is_constrainted rule items 2
  • Fixes and improvements

1:

Route options in DNS route actions will no longer be considered deprecated, see DNS Route Action.

Also, now udp_disable_domain_unmapping and udp_connect can also be configured in route action, see Route Action.

2:

When using in graphical clients, new routing rule items allow you to match on network type (WIFI, cellular, etc.), whether the network is expensive, and whether Low Data Mode is enabled.

See Route Rule, DNS Route Rule and Headless Rule.

1.11.0-alpha.9

  • Improve tun compatibility 1
  • Fixes and improvements

1:

When gvisor tun stack is enabled, even if the request passes routing, if the outbound connection establishment fails, the connection still does not need to be established and a TCP RST is replied.

1.11.0-alpha.7

  • Introducing rule actions 1

1:

New rule actions replace legacy inbound fields and special outbound fields, and can be used for pre-matching 2.

See Rule, Rule Action, DNS Rule and DNS Rule Action.

For migration, see Migrate legacy special outbounds to rule actions, Migrate legacy inbound fields to rule actions and Migrate legacy DNS route options to rule actions.

2:

Similar to Surge's pre-matching.

Specifically, new rule actions allow you to reject connections with TCP RST (for TCP connections) and ICMP port unreachable (for UDP packets) before connection established to improve tun's compatibility.

See Rule Action.

1.11.0-alpha.6

  • Update quic-go to v0.48.1
  • Set gateway for tun correctly
  • Fixes and improvements

1.11.0-alpha.2

  • Add warnings for usage of deprecated features
  • Fixes and improvements

1.11.0-alpha.1

  • Update quic-go to v0.48.0
  • Fixes and improvements

1.10.1

  • Fixes and improvements

1.10.0

Important changes since 1.9:

  • Introducing auto-redirect 1
  • Add AdGuard DNS Filter support 2
  • TUN address fields are merged 3
  • Add custom options for auto-route and auto-redirect 4
  • Drop support for go1.18 and go1.19 5
  • Add tailing comma support in JSON configuration
  • Improve sniffers 6
  • Add new inline rule-set type 7
  • Add access control options for Clash API 8
  • Add rule_set_ip_cidr_accept_empty DNS address filter rule item 9
  • Add auto reload support for local rule-set
  • Update fsnotify usages 10
  • Add IP address support for rule-set match command
  • Add rule-set decompile command
  • Add process_path_regex rule item
  • Update uTLS to v1.6.7 11
  • Optimize memory usages of rule-sets 12

1:

The new auto-redirect feature allows TUN to automatically configure connection redirection to improve proxy performance.

When auto-redirect is enabled, new route address set options will allow you to automatically configure destination IP CIDR rules from a specified rule set to the firewall.

Specified or unspecified destinations will bypass the sing-box routes to get better performance (for example, keep hardware offloading of direct traffics on the router).

See TUN.

2:

The new feature allows you to use AdGuard DNS Filter lists in a sing-box without AdGuard Home.

See AdGuard DNS Filter.

3:

See Migration.

4:

See iproute2_table_index, iproute2_rule_index, auto_redirect_input_mark and auto_redirect_output_mark.

5:

Due to maintenance difficulties, sing-box 1.10.0 requires at least Go 1.20 to compile.

6:

BitTorrent, DTLS, RDP, SSH sniffers are added.

Now the QUIC sniffer can correctly extract the server name from Chromium requests and can identify common QUIC clients, including Chromium, Safari, Firefox, quic-go (including uquic disguised as Chrome).

7:

The new rule-set type inline (which also becomes the default type) allows you to write headless rules directly without creating a rule-set file.

8:

With new access control options, not only can you allow Clash dashboards to access the Clash API on your local network, you can also manually limit the websites that can access the API instead of allowing everyone.

See Clash API.

9:

See DNS Rule.

10:

sing-box now uses fsnotify correctly and will not cancel watching if the target file is deleted or recreated via rename (e.g. mv).

This affects all path options that support reload, including tls.certificate_path, tls.key_path, tls.ech.key_path and rule_set.path.

11:

Some legacy chrome fingerprints have been removed and will fallback to chrome, see utls.

12:

See Source Format.

1.9.7

  • Fixes and improvements

1.10.0-beta.11

  • Update uTLS to v1.6.7 1

1:

Some legacy chrome fingerprints have been removed and will fallback to chrome, see utls.

1.10.0-beta.10

  • Add process_path_regex rule item
  • Fixes and improvements

The macOS standalone versions of sing-box (>=1.9.5/<1.10.0-beta.11) now silently fail and require manual granting of the Full Disk Access permission to system extension to start, probably due to Apple's changed security policy. We will prompt users about this in feature versions.

1.9.6

  • Fixes and improvements

1.9.5

  • Update quic-go to v0.47.0
  • Fix direct dialer not resolving domain
  • Fix no error return when empty DNS cache retrieved
  • Fix build with go1.23
  • Fix stream sniffer
  • Fix bad redirect in clash-api
  • Fix wireguard events chan leak
  • Fix cached conn eats up read deadlines
  • Fix disconnected interface selected as default in windows
  • Update Bundle Identifiers for Apple platform clients 1

1:

See Migration.

We are still working on getting all sing-box apps back on the App Store, which should be completed within a week (SFI on the App Store and others on TestFlight are already available).

1.10.0-beta.8

  • Fixes and improvements

With the help of a netizen, we are in the process of getting sing-box apps back on the App Store, which should be completed within a month (TestFlight is already available).

1.10.0-beta.7

  • Update quic-go to v0.47.0
  • Fixes and improvements

1.10.0-beta.6

  • Add RDP sniffer
  • Fixes and improvements

1.10.0-beta.5

  • Add PNA support for Clash API
  • Fixes and improvements

1.10.0-beta.3

  • Add SSH sniffer
  • Fixes and improvements

1.10.0-beta.2

  • Build with go1.23
  • Fixes and improvements

1.9.4

  • Update quic-go to v0.46.0
  • Update Hysteria2 BBR congestion control
  • Filter HTTPS ipv4hint/ipv6hint with domain strategy
  • Fix crash on Android when using process rules
  • Fix non-IP queries accepted by address filter rules
  • Fix UDP server for shadowsocks AEAD multi-user inbounds
  • Fix default next protos for v2ray QUIC transport
  • Fix default end value of port range configuration options
  • Fix reset v2ray transports
  • Fix panic caused by rule-set generation of duplicate keys for domain_suffix
  • Fix UDP connnection leak when sniffing
  • Fixes and improvements

Due to problems with our Apple developer account, sing-box apps on Apple platforms are temporarily unavailable for download or update. If your company or organization is willing to help us return to the App Store, please contact us.

1.10.0-alpha.29

  • Update quic-go to v0.46.0
  • Fixes and improvements

1.10.0-alpha.25

  • Add AdGuard DNS Filter support 1

1:

The new feature allows you to use AdGuard DNS Filter lists in a sing-box without AdGuard Home.

See AdGuard DNS Filter.

1.10.0-alpha.23

  • Add Chromium support for QUIC sniffer
  • Add client type detect support for QUIC sniffer 1
  • Fixes and improvements

1:

Now the QUIC sniffer can correctly extract the server name from Chromium requests and can identify common QUIC clients, including Chromium, Safari, Firefox, quic-go (including uquic disguised as Chrome).

See Protocol Sniff and Route Rule.

1.10.0-alpha.22

  • Optimize memory usages of rule-sets 1
  • Fixes and improvements

1:

See Source Format.

1.10.0-alpha.20

  • Add DTLS sniffer
  • Fixes and improvements

1.10.0-alpha.19

  • Add rule-set decompile command
  • Add IP address support for rule-set match command
  • Fixes and improvements

1.10.0-alpha.18

  • Add new inline rule-set type 1
  • Add auto reload support for local rule-set
  • Update fsnotify usages 2
  • Fixes and improvements

1:

The new rule-set type inline (which also becomes the default type) allows you to write headless rules directly without creating a rule-set file.

2:

sing-box now uses fsnotify correctly and will not cancel watching if the target file is deleted or recreated via rename (e.g. mv).

This affects all path options that support reload, including tls.certificate_path, tls.key_path, tls.ech.key_path and rule_set.path.

1.10.0-alpha.17

  • Some chaotic changes 1
  • rule_set_ipcidr_match_source rule items are renamed 2
  • Add rule_set_ip_cidr_accept_empty DNS address filter rule item 3
  • Update quic-go to v0.45.1
  • Fixes and improvements

1:

Something may be broken, please actively report problems with this version.

2:

rule_set_ipcidr_match_source route and DNS rule items are renamed to rule_set_ip_cidr_match_source and will be remove in sing-box 1.11.0.

3:

See DNS Rule.

1.10.0-alpha.16

  • Add custom options for auto-route and auto-redirect 1
  • Fixes and improvements

1:

See iproute2_table_index, iproute2_rule_index, auto_redirect_input_mark and auto_redirect_output_mark.

1.10.0-alpha.13

  • TUN address fields are merged 1
  • Add route address set support for auto-redirect 2

1:

See Migration.

2:

The new feature will allow you to configure the destination IP CIDR rules in the specified rule-sets to the firewall automatically.

Specified or unspecified destinations will bypass the sing-box routes to get better performance (for example, keep hardware offloading of direct traffics on the router).

See route_address_set and route_exclude_address_set.

1.10.0-alpha.12

  • Fix auto-redirect not configuring nftables forward chain correctly
  • Fixes and improvements

1.9.3

  • Fixes and improvements

1.10.0-alpha.10

  • Fixes and improvements

1.9.2

  • Fixes and improvements

1.10.0-alpha.8

  • Drop support for go1.18 and go1.19 1
  • Update quic-go to v0.45.0
  • Update Hysteria2 BBR congestion control
  • Fixes and improvements

1:

Due to maintenance difficulties, sing-box 1.10.0 requires at least Go 1.20 to compile.

1.9.1

  • Fixes and improvements

1.10.0-alpha.7

  • Fixes and improvements

1.10.0-alpha.5

  • Improve auto-redirect 1

1:

nftables support and DNS hijacking has been added.

Tun inbounds with auto_route and auto_redirect now works as expected on routers without intervention.

1.10.0-alpha.4

  • Fix auto-redirect 1
  • Improve auto-route on linux 2

1:

Tun inbounds with auto_route and auto_redirect now works as expected on routers.

2:

Tun inbounds with auto_route and strict_route now works as expected on routers and servers, but the usages of exclude_interface need to be updated.

1.10.0-alpha.2

  • Move auto-redirect to Tun 1
  • Fixes and improvements

1:

Linux support are added.

See Tun.

1.10.0-alpha.1

  • Add tailing comma support in JSON configuration
  • Add simple auto-redirect for Android 1
  • Add BitTorrent sniffer 2

1:

It allows you to use redirect inbound in the sing-box Android client and automatically configures IPv4 TCP redirection via su.

This may alleviate the symptoms of some OCD patients who think that redirect can effectively save power compared to the system HTTP Proxy.

See Redirect.

2:

See Protocol Sniff.

1.9.0

  • Fixes and improvements

Important changes since 1.8:

  • domain_suffix behavior update 1
  • process_path format update on Windows 2
  • Add address filter DNS rule items 3
  • Add support for client-subnet DNS options 4
  • Add rejected DNS response cache support 5
  • Add bypass_domain and search_domain platform HTTP proxy options 6
  • Fix missing rule_set_ipcidr_match_source item in DNS rules 7
  • Handle Windows power events
  • Always disable cache for fake-ip DNS transport if dns.independent_cache disabled
  • Improve DNS truncate behavior
  • Update Hysteria protocol
  • Update quic-go to v0.43.1
  • Update gVisor to 20240422.0
  • Mitigating TunnelVision attacks 8

1:

See Migration.

2:

See Migration.

3:

The new DNS feature allows you to more precisely bypass Chinese websites via DNS leaks. Do not use plain local DNS if using this method.

See Address Filter Fields.

Client example updated.

4:

See DNS, DNS Server and DNS Rules.

Since this feature makes the scenario mentioned in alpha.1 no longer leak DNS requests, the Client example has been updated.

5:

The new feature allows you to cache the check results of Address filter DNS rule items until expiration.

6:

See TUN inbound.

7:

See DNS Rule.

8:

See TunnelVision.

1.9.0-rc.22

  • Fixes and improvements

1.9.0-rc.20

  • Prioritize *_route_address in linux auto-route
  • Fix *_route_address in darwin auto-route

1.8.14

  • Fix hysteria2 panic
  • Fixes and improvements

1.9.0-rc.18

  • Add custom prefix support in EDNS0 client subnet options
  • Fix hysteria2 crash
  • Fix store_rdrc corrupted
  • Update quic-go to v0.43.1
  • Fixes and improvements

1.9.0-rc.16

  • Mitigating TunnelVision attacks 1
  • Fixes and improvements

1:

See TunnelVision.

1.9.0-rc.15

  • Fixes and improvements

1.8.13

  • Fix fake-ip mapping
  • Fixes and improvements

1.9.0-rc.14

  • Fixes and improvements

1.9.0-rc.13

  • Update Hysteria protocol
  • Update quic-go to v0.43.0
  • Update gVisor to 20240422.0
  • Fixes and improvements

1.8.12

  • Now we have official APT and DNF repositories 1
  • Fix packet MTU for QUIC protocols
  • Fixes and improvements

1:

Including stable and beta versions, see https://sing-box.sagernet.org/installation/package-manager/

1.9.0-rc.11

  • Fixes and improvements

1.8.11

  • Fixes and improvements

1.8.10

  • Fixes and improvements

1.9.0-beta.17

  • Update quic-go to v0.42.0
  • Fixes and improvements

1.9.0-beta.16

  • Fixes and improvements

Our Testflight distribution has been temporarily blocked by Apple (possibly due to too many beta versions) and you cannot join the test, install or update the sing-box beta app right now. Please wait patiently for processing.

1.9.0-beta.14

  • Update gVisor to 20240212.0-65-g71212d503
  • Fixes and improvements

1.8.9

  • Fixes and improvements

1.8.8

  • Fixes and improvements

1.9.0-beta.7

  • Fixes and improvements

1.9.0-beta.6

  • Fix address filter DNS rule items 1
  • Fix DNS outbound responding with wrong data
  • Fixes and improvements

1:

Fixed an issue where address filter DNS rule was incorrectly rejected under certain circumstances. If you have enabled store_rdrc to save results, consider clearing the cache file.

1.8.7

  • Fixes and improvements

1.9.0-alpha.15

  • Fixes and improvements

1.9.0-alpha.14

  • Improve DNS truncate behavior
  • Fixes and improvements

1.9.0-alpha.13

  • Fixes and improvements

1.8.6

  • Fixes and improvements

1.9.0-alpha.12

  • Handle Windows power events
  • Always disable cache for fake-ip DNS transport if dns.independent_cache disabled
  • Fixes and improvements

1.9.0-alpha.11

  • Fix missing rule_set_ipcidr_match_source item in DNS rules 1
  • Fixes and improvements

1:

See DNS Rule.

1.9.0-alpha.10

  • Add bypass_domain and search_domain platform HTTP proxy options 1
  • Fixes and improvements

1:

See TUN inbound.

1.9.0-alpha.8

  • Add rejected DNS response cache support 1
  • Fixes and improvements

1:

The new feature allows you to cache the check results of Address filter DNS rule items until expiration.

1.9.0-alpha.7

  • Update gVisor to 20240206.0
  • Fixes and improvements

1.9.0-alpha.6

  • Fixes and improvements

1.9.0-alpha.3

  • Update quic-go to v0.41.0
  • Fixes and improvements

1.9.0-alpha.2

  • Add support for client-subnet DNS options 1
  • Fixes and improvements

1:

See DNS, DNS Server and DNS Rules.

Since this feature makes the scenario mentioned in alpha.1 no longer leak DNS requests, the Client example has been updated.

1.9.0-alpha.1

  • domain_suffix behavior update 1
  • process_path format update on Windows 2
  • Add address filter DNS rule items 3

1:

See Migration.

2:

See Migration.

3:

The new DNS feature allows you to more precisely bypass Chinese websites via DNS leaks. Do not use plain local DNS if using this method.

See Address Filter Fields.

Client example updated.

1.8.5

  • Fixes and improvements

1.8.4

  • Fixes and improvements

1.8.2

  • Fixes and improvements

1.8.1

  • Fixes and improvements

1.8.0

  • Fixes and improvements

Important changes since 1.7:

  • Migrate cache file from Clash API to independent options 1
  • Introducing rule-set 2
  • Add sing-box geoip, sing-box geosite and sing-box rule-set commands 3
  • Allow nested logical rules 4
  • Independent source_ip_is_private and ip_is_private rules 5
  • Add context to JSON decode error message 6
  • Reject internal fake-ip queries 7
  • Add GSO support for TUN and WireGuard system interface 8
  • Add idle_timeout for URLTest outbound 9
  • Add simple loopback detect
  • Optimize memory usage of idle connections
  • Update uTLS to 1.5.4 10
  • Update dependencies 11

1:

See Cache File and Migration.

2:

rule-set is independent collections of rules that can be compiled into binaries to improve performance. Compared to legacy GeoIP and Geosite resources, it can include more types of rules, load faster, use less memory, and update automatically.

See Route#rule_set, Route Rule, DNS Rule, rule-set, Source Format and Headless Rule.

For GEO resources migration, see Migrate GeoIP to rule-sets and Migrate Geosite to rule-sets.

3:

New commands manage GeoIP, Geosite and rule-set resources, and help you migrate GEO resources to rule-sets.

4:

Logical rules in route rules, DNS rules, and the new headless rule now allow nesting of logical rules.

5:

The private GeoIP country never existed and was actually implemented inside V2Ray. Since GeoIP was deprecated, we made this rule independent, see Migration.

6:

JSON parse errors will now include the current key path. Only takes effect when compiled with Go 1.21+.

7:

All internal DNS queries now skip DNS rules with server type fakeip, and the default DNS server can no longer be fakeip.

This change is intended to break incorrect usage and essentially requires no action.

8:

See TUN inbound and WireGuard outbound.

9:

When URLTest is idle for a certain period of time, the scheduled delay test will be paused.

10:

Added some new fingerprints. Also, starting with this release, uTLS requires at least Go 1.20.

11:

Updated cloudflare-tls, gomobile, smux, tfo-go and wireguard-go to latest, quic-go to 0.40.1 and gvisor to 20231204.0

1.8.0-rc.11

  • Fixes and improvements

1.7.8

  • Fixes and improvements

1.8.0-rc.10

  • Fixes and improvements

1.7.7

  • Fix V2Ray transport path validation behavior 1
  • Fixes and improvements

1:

See V2Ray transport.

1.8.0-rc.7

  • Fixes and improvements

1.8.0-rc.3

  • Fix V2Ray transport path validation behavior 1
  • Fixes and improvements

1:

See V2Ray transport.

1.7.6

  • Fixes and improvements

1.8.0-rc.1

  • Fixes and improvements

1.8.0-beta.9

  • Add simple loopback detect
  • Fixes and improvements

1.7.5

  • Fixes and improvements

1.8.0-alpha.17

  • Add GSO support for TUN and WireGuard system interface 1
  • Update uTLS to 1.5.4 2
  • Update dependencies 3
  • Fixes and improvements

1:

See TUN inbound and WireGuard outbound.

2:

Added some new fingerprints. Also, starting with this release, uTLS requires at least Go 1.20.

3:

Updated cloudflare-tls, gomobile, smux, tfo-go and wireguard-go to latest, and gvisor to 20231204.0

This may break something, good luck!

1.7.4

  • Fixes and improvements

Due to the long waiting time, this version is no longer waiting for approval by the Apple App Store, so updates to Apple Platforms will be delayed.

1.8.0-alpha.16

  • Fixes and improvements

1.8.0-alpha.15

  • Some chaotic changes 1
  • Fixes and improvements

1:

Designed to optimize memory usage of idle connections, may take effect on the following protocols:

Protocol TCP UDP
HTTP proxy server :material-check: /
SOCKS5 :material-close: :material-check:
Shadowsocks none/AEAD/AEAD2022 :material-check: :material-check:
Trojan / :material-check:
TUIC/Hysteria/Hysteria2 :material-close: :material-check:
Multiplex :material-close: :material-check:
Plain TLS (Trojan/VLESS without extra sub-protocols) :material-check: /
Other protocols :material-close: :material-close:

At the same time, everything existing may be broken, please actively report problems with this version.

1.8.0-alpha.13

  • Fixes and improvements

1.8.0-alpha.10

  • Add idle_timeout for URLTest outbound 1
  • Fixes and improvements

1:

When URLTest is idle for a certain period of time, the scheduled delay test will be paused.

1.7.2

  • Fixes and improvements

1.8.0-alpha.8

  • Add context to JSON decode error message 1
  • Reject internal fake-ip queries 2
  • Fixes and improvements

1:

JSON parse errors will now include the current key path. Only takes effect when compiled with Go 1.21+.

2:

All internal DNS queries now skip DNS rules with server type fakeip, and the default DNS server can no longer be fakeip.

This change is intended to break incorrect usage and essentially requires no action.

1.8.0-alpha.7

  • Fixes and improvements

1.7.1

  • Fixes and improvements

1.8.0-alpha.6

  • Fix rule-set matching logic 1
  • Fixes and improvements

1:

Now the rules in the rule_set rule item can be logically considered to be merged into the rule using rule-sets, rather than completely following the AND logic.

1.8.0-alpha.5

  • Parallel rule-set initialization
  • Independent source_ip_is_private and ip_is_private rules 1

1:

The private GeoIP country never existed and was actually implemented inside V2Ray. Since GeoIP was deprecated, we made this rule independent, see Migration.

1.8.0-alpha.1

  • Migrate cache file from Clash API to independent options 1
  • Introducing rule-set 2
  • Add sing-box geoip, sing-box geosite and sing-box rule-set commands 3
  • Allow nested logical rules 4

1:

See Cache File and Migration.

2:

rule-set is independent collections of rules that can be compiled into binaries to improve performance. Compared to legacy GeoIP and Geosite resources, it can include more types of rules, load faster, use less memory, and update automatically.

See Route#rule_set, Route Rule, DNS Rule, rule-set, Source Format and Headless Rule.

For GEO resources migration, see Migrate GeoIP to rule-sets and Migrate Geosite to rule-sets.

3:

New commands manage GeoIP, Geosite and rule-set resources, and help you migrate GEO resources to rule-sets.

4:

Logical rules in route rules, DNS rules, and the new headless rule now allow nesting of logical rules.

1.7.0

  • Fixes and improvements

Important changes since 1.6:

1:

If enabled, for UDP proxy requests addressed to a domain, the original packet address will be sent in the response instead of the mapped domain.

This option is used for compatibility with clients that do not support receiving UDP packets with domain addresses, such as Surge.

2:

Introduced in V2Ray 5.10.0.

The new HTTPUpgrade transport has better performance than WebSocket and is better suited for CDN abuse.

3:

Starting in 1.7.0, multiplexing support is no longer enabled by default and needs to be turned on explicitly in inbound options.

4

Hysteria Brutal Congestion Control Algorithm in TCP. A kernel module needs to be installed on the Linux server, see TCP Brutal for details.

5:

Only supported in graphical clients on Android and Apple platforms.

1.7.0-rc.3

  • Fixes and improvements

1.6.7

  • macOS: Add button for uninstall SystemExtension in the standalone graphical client
  • Fix missing UDP user context on TUIC/Hysteria2 inbounds
  • Fixes and improvements

1.7.0-rc.2

  • Fix missing UDP user context on TUIC/Hysteria2 inbounds
  • macOS: Add button for uninstall SystemExtension in the standalone graphical client

1.6.6

  • Fixes and improvements

1.7.0-rc.1

  • Fixes and improvements

1.7.0-beta.5

  • Update gVisor to 20231113.0
  • Fixes and improvements

1.7.0-beta.4

  • Add wifi_ssid and wifi_bssid route and DNS rules 1
  • Fixes and improvements

1:

Only supported in graphical clients on Android and Apple platforms.

1.7.0-beta.3

  • Fix zero TTL was incorrectly reset
  • Fixes and improvements

1.6.5

  • Fix crash if TUIC inbound authentication failed
  • Fixes and improvements

1.7.0-beta.2

  • Fix crash if TUIC inbound authentication failed
  • Update quic-go to v0.40.0
  • Fixes and improvements

1.6.4

  • Fixes and improvements

1.7.0-beta.1

  • Fixes and improvements

1.6.3

  • iOS/Android: Fix profile auto update
  • Fixes and improvements

1.7.0-alpha.11

  • iOS/Android: Fix profile auto update
  • Fixes and improvements

1.7.0-alpha.10

  • Fix tcp-brutal not working with TLS
  • Fix Android client not closing in some cases
  • Fixes and improvements

1.6.2

  • Fixes and improvements

1.6.1

  • Our Android client is now available in the Google Play Store ▶️
  • Fixes and improvements

1.7.0-alpha.6

  • Fixes and improvements

1.7.0-alpha.4

  • Migrate multiplex and UoT server to inbound 1
  • Add TCP Brutal support for multiplex 2

1:

Starting in 1.7.0, multiplexing support is no longer enabled by default and needs to be turned on explicitly in inbound options.

2

Hysteria Brutal Congestion Control Algorithm in TCP. A kernel module needs to be installed on the Linux server, see TCP Brutal for details.

1.7.0-alpha.3

1:

Introduced in V2Ray 5.10.0.

The new HTTPUpgrade transport has better performance than WebSocket and is better suited for CDN abuse.

1.6.0

  • Fixes and improvements

Important changes since 1.5:

  • Our Apple tvOS client is now available in the App Store 🍎
  • Update BBR congestion control for TUIC and Hysteria2 1
  • Update brutal congestion control for Hysteria2
  • Add brutal_debug option for Hysteria2
  • Update legacy Hysteria protocol 2
  • Add TLS self sign key pair generate command
  • Remove Deprecated Features by agreement

1:

None of the existing Golang BBR congestion control implementations have been reviewed or unit tested. This update is intended to address the multi-send defects of the old implementation and may introduce new issues.

2

Based on discussions with the original author, the brutal CC and QUIC protocol parameters of the old protocol (Hysteria 1) have been updated to be consistent with Hysteria 2

1.7.0-alpha.2

  • Fix bugs introduced in 1.7.0-alpha.1

1.7.0-alpha.1

1:

If enabled, for UDP proxy requests addressed to a domain, the original packet address will be sent in the response instead of the mapped domain.

This option is used for compatibility with clients that do not support receiving UDP packets with domain addresses, such as Surge.

1.5.5

  • Fix IPv6 auto_route for Linux 1
  • Add legacy builds for old Windows and macOS systems 2
  • Fixes and improvements

1:

When auto_route is enabled and strict_route is disabled, the device can now be reached from external IPv6 addresses.

2:

Built using Go 1.20, the last version that will run on Windows 7, 8, Server 2008, Server 2012 and macOS 10.13 High Sierra, 10.14 Mojave.

1.6.0-rc.4

  • Fixes and improvements

1.6.0-rc.1

  • Add legacy builds for old Windows and macOS systems 1
  • Fixes and improvements

1:

Built using Go 1.20, the last version that will run on Windows 7, 8, Server 2008, Server 2012 and macOS 10.13 High Sierra, 10.14 Mojave.

1.6.0-beta.4

  • Fix IPv6 auto_route for Linux 1
  • Fixes and improvements

1:

When auto_route is enabled and strict_route is disabled, the device can now be reached from external IPv6 addresses.

1.5.4

  • Fix Clash cache crash on arm32 devices
  • Fixes and improvements

1.6.0-beta.3

  • Update the legacy Hysteria protocol 1
  • Fixes and improvements

1

Based on discussions with the original author, the brutal CC and QUIC protocol parameters of the old protocol (Hysteria 1) have been updated to be consistent with Hysteria 2

1.6.0-beta.2

  • Add TLS self sign key pair generate command
  • Update brutal congestion control for Hysteria2
  • Fix Clash cache crash on arm32 devices
  • Update golang.org/x/net to v0.17.0
  • Fixes and improvements

1.6.0-beta.3

  • Update the legacy Hysteria protocol 1
  • Fixes and improvements

1

Based on discussions with the original author, the brutal CC and QUIC protocol parameters of the old protocol (Hysteria 1) have been updated to be consistent with Hysteria 2

1.6.0-beta.2

  • Add TLS self sign key pair generate command
  • Update brutal congestion control for Hysteria2
  • Fix Clash cache crash on arm32 devices
  • Update golang.org/x/net to v0.17.0
  • Fixes and improvements

1.5.3

  • Fix compatibility with Android 14
  • Fixes and improvements

1.6.0-beta.1

  • Fixes and improvements

1.6.0-alpha.5

  • Fix compatibility with Android 14
  • Update BBR congestion control for TUIC and Hysteria2 1
  • Fixes and improvements

1:

None of the existing Golang BBR congestion control implementations have been reviewed or unit tested. This update is intended to fix a memory leak flaw in the new implementation introduced in 1.6.0-alpha.1 and may introduce new issues.

1.6.0-alpha.4

  • Add brutal_debug option for Hysteria2
  • Fixes and improvements

1.5.2

  • Our Apple tvOS client is now available in the App Store 🍎
  • Fixes and improvements

1.6.0-alpha.3

  • Fixes and improvements

1.6.0-alpha.2

  • Fixes and improvements

1.5.1

  • Fixes and improvements

1.6.0-alpha.1

  • Update BBR congestion control for TUIC and Hysteria2 1
  • Update quic-go to v0.39.0
  • Update gVisor to 20230814.0
  • Remove Deprecated Features by agreement
  • Fixes and improvements

1:

None of the existing Golang BBR congestion control implementations have been reviewed or unit tested. This update is intended to address the multi-send defects of the old implementation and may introduce new issues.

1.5.0

  • Fixes and improvements

Important changes since 1.4:

  • Add TLS ECH server support
  • Improve TLS TCH client configuration
  • Add TLS ECH key pair generator 1
  • Add TLS ECH support for QUIC based protocols 2
  • Add KDE support for the set_system_proxy option in HTTP inbound
  • Add Hysteria2 protocol support 3
  • Add interrupt_exist_connections option for Selector and URLTest outbounds 4
  • Add DNS01 challenge support for ACME TLS certificate issuer 5
  • Add merge command 6
  • Mark Deprecated Features

1:

Command: sing-box generate ech-keypair <plain_server_name> [--pq-signature-schemes-enabled]

2:

All inbounds and outbounds are supported, including Naiveproxy, Hysteria[/2], TUIC and V2ray QUIC transport.

3:

See Hysteria2 inbound and Hysteria2 outbound

For protocol description, please refer to https://v2.hysteria.network

4:

Interrupt existing connections when the selected outbound has changed.

Only inbound connections are affected by this setting, internal connections will always be interrupted.

5:

Only Alibaba Cloud DNS and Cloudflare are supported, see ACME Fields and DNS01 Challenge Fields.

6:

This command also parses path resources that appear in the configuration file and replaces them with embedded configuration, such as TLS certificates or SSH private keys.

1.5.0-rc.6

  • Fixes and improvements

1.4.6

  • Fixes and improvements

1.5.0-rc.5

  • Fixed an improper authentication vulnerability in the SOCKS5 inbound
  • Fixes and improvements

Security Advisory

This update fixes an improper authentication vulnerability in the sing-box SOCKS inbound. This vulnerability allows an attacker to craft special requests to bypass user authentication. All users exposing SOCKS servers with user authentication in an insecure environment are advised to update immediately.

此更新修复了 sing-box SOCKS 入站中的一个不正确身份验证漏洞。 该漏洞允许攻击者制作特殊请求来绕过用户身份验证。建议所有将使用用户认证的 SOCKS 服务器暴露在不安全环境下的用户立更新。

1.4.5

  • Fixed an improper authentication vulnerability in the SOCKS5 inbound
  • Fixes and improvements

Security Advisory

This update fixes an improper authentication vulnerability in the sing-box SOCKS inbound. This vulnerability allows an attacker to craft special requests to bypass user authentication. All users exposing SOCKS servers with user authentication in an insecure environment are advised to update immediately.

此更新修复了 sing-box SOCKS 入站中的一个不正确身份验证漏洞。 该漏洞允许攻击者制作特殊请求来绕过用户身份验证。建议所有将使用用户认证的 SOCKS 服务器暴露在不安全环境下的用户立更新。

1.5.0-rc.3

  • Fixes and improvements

1.5.0-beta.12

  • Add merge command 1
  • Fixes and improvements

1:

This command also parses path resources that appear in the configuration file and replaces them with embedded configuration, such as TLS certificates or SSH private keys.

Merge configurations

Usage:
  sing-box merge [output] [flags]

Flags:
  -h, --help   help for merge

Global Flags:
  -c, --config stringArray             set configuration file path
  -C, --config-directory stringArray   set configuration directory path
  -D, --directory string               set working directory
      --disable-color                  disable color output

1.5.0-beta.11

  • Add DNS01 challenge support for ACME TLS certificate issuer 1
  • Fixes and improvements

1:

Only Alibaba Cloud DNS and Cloudflare are supported, see ACME Fields and DNS01 Challenge Fields.

1.5.0-beta.10

  • Add interrupt_exist_connections option for Selector and URLTest outbounds 1
  • Fixes and improvements

1:

Interrupt existing connections when the selected outbound has changed.

Only inbound connections are affected by this setting, internal connections will always be interrupted.

1.4.3

  • Fixes and improvements

1.5.0-beta.8

  • Fixes and improvements

1.4.2

  • Fixes and improvements

1.5.0-beta.6

  • Fix compatibility issues with official Hysteria2 server and client
  • Fixes and improvements
  • Mark deprecated features

1.5.0-beta.3

  • Fixes and improvements
  • Updated Hysteria2 documentation 1

1:

Added notes indicating compatibility issues with the official Hysteria2 server and client when using fastOpen=false or UDP MTU >= 1200.

1.5.0-beta.2

  • Add hysteria2 protocol support 1
  • Fixes and improvements

1:

See Hysteria2 inbound and Hysteria2 outbound

For protocol description, please refer to https://v2.hysteria.network

1.5.0-beta.1

  • Add TLS ECH server support
  • Improve TLS TCH client configuration
  • Add TLS ECH key pair generator 1
  • Add TLS ECH support for QUIC based protocols 2
  • Add KDE support for the set_system_proxy option in HTTP inbound

1:

Command: sing-box generate ech-keypair <plain_server_name> [--pq-signature-schemes-enabled]

2:

All inbounds and outbounds are supported, including Naiveproxy, Hysteria, TUIC and V2ray QUIC transport.

1.4.1

  • Fixes and improvements

1.4.0

  • Fix bugs and update dependencies

Important changes since 1.3:

  • Add TUIC support 1
  • Add udp_over_stream option for TUIC client 2
  • Add MultiPath TCP support 3
  • Add include_interface and exclude_interface options for tun inbound
  • Pause recurring tasks when no network or device idle
  • Improve Android and Apple platform clients

1:

See TUIC inbound and TUIC outbound

2:

This is the TUIC port of the UDP over TCP protocol, designed to provide a QUIC stream based UDP relay mode that TUIC does not provide. Since it is an add-on protocol, you will need to use sing-box or another program compatible with the protocol as a server.

This mode has no positive effect in a proper UDP proxy scenario and should only be applied to relay streaming UDP traffic (basically QUIC streams).

3:

Requires sing-box to be compiled with Go 1.21.

1.4.0-rc.3

  • Fixes and improvements

1.4.0-rc.2

  • Fixes and improvements

1.4.0-rc.1

  • Fix TUIC UDP

1.4.0-beta.6

  • Add udp_over_stream option for TUIC client 1
  • Add include_interface and exclude_interface options for tun inbound
  • Fixes and improvements

1:

This is the TUIC port of the UDP over TCP protocol, designed to provide a QUIC stream based UDP relay mode that TUIC does not provide. Since it is an add-on protocol, you will need to use sing-box or another program compatible with the protocol as a server.

This mode has no positive effect in a proper UDP proxy scenario and should only be applied to relay streaming UDP traffic (basically QUIC streams).

1.4.0-beta.5

  • Fixes and improvements

1.4.0-beta.4

  • Graphical clients: Persistence group expansion state
  • Fixes and improvements

1.4.0-beta.3

  • Fixes and improvements

1.4.0-beta.2

  • Add MultiPath TCP support 1
  • Drop QUIC support for Go 1.18 and 1.19 due to upstream changes
  • Fixes and improvements

1:

Requires sing-box to be compiled with Go 1.21.

1.4.0-beta.1

  • Add TUIC support 1
  • Pause recurring tasks when no network or device idle
  • Fixes and improvements

1:

See TUIC inbound and TUIC outbound

1.3.6

  • Fixes and improvements

1.3.5

  • Fixes and improvements
  • Introducing our Apple tvOS client applications 1
  • Add per app proxy and app installed/updated trigger support for Android client
  • Add profile sharing support for Android/iOS/macOS clients

1:

Due to the requirement of tvOS 17, the app cannot be submitted to the App Store for the time being, and can only be downloaded through TestFlight.

1.3.4

  • Fixes and improvements
  • We're now on the App Store, always free! It should be noted that due to stricter and slower review, the release of Store versions will be delayed.
  • We've made a standalone version of the macOS client (the original Application Extension relies on App Store distribution), which you can download as SFM-version-universal.zip in the release artifacts.

1.3.3

  • Fixes and improvements

1.3.1-rc.1

  • Fix bugs and update dependencies

1.3.1-beta.3

  • Introducing our new iOS and macOS client applications **1 **
  • Fixes and improvements

1:

The old testflight link and app are no longer valid.

1.3.1-beta.2

  • Fix bugs and update dependencies

1.3.1-beta.1

  • Fixes and improvements

1.3.0

  • Fix bugs and update dependencies

Important changes since 1.2:

  • Add FakeIP support 1
  • Improve multiplex 2
  • Add DNS reverse mapping support
  • Add rewrite_ttl DNS rule action
  • Add store_fakeip Clash API option
  • Add multi-peer support for WireGuard outbound
  • Add loopback detect
  • Add Clash.Meta API compatibility for Clash API
  • Download Yacd-meta by default if the specified Clash external_ui directory is empty
  • Add path and headers option for HTTP outbound
  • Perform URLTest recheck after network changes
  • Fix system tun stack for ios
  • Fix network monitor for android/ios
  • Update VLESS and XUDP protocol
  • Make splice work with traffic statistics systems like Clash API
  • Significantly reduces memory usage of idle connections
  • Improve DNS caching
  • Add independent_cache option for DNS
  • Reimplemented shadowsocks client
  • Add multiplex support for VLESS outbound
  • Automatically add Windows firewall rules in order for the system tun stack to work
  • Fix TLS 1.2 support for shadow-tls client
  • Add cache_id option for Clash cache file
  • Fix local DNS transport for Android

1:

See FAQ for more information.

2:

Added new h2mux multiplex protocol and padding multiplex option, see Multiplex.

1.3-rc2

  • Fix local DNS transport for Android
  • Fix bugs and update dependencies

1.3-rc1

  • Fix bugs and update dependencies

1.3-beta14

  • Fixes and improvements

1.3-beta13

  • Fix resolving fakeip domains 1
  • Deprecate L3 routing
  • Fix bugs and update dependencies

1:

If the destination address of the connection is obtained from fakeip, dns rules with server type fakeip will be skipped.

1.3-beta12

  • Automatically add Windows firewall rules in order for the system tun stack to work
  • Fix TLS 1.2 support for shadow-tls client
  • Add cache_id option for Clash cache file
  • Fixes and improvements

1.3-beta11

  • Fix bugs and update dependencies

1.3-beta10

  • Improve direct copy 1
  • Improve DNS caching
  • Add independent_cache option for DNS
  • Reimplemented shadowsocks client 2
  • Add multiplex support for VLESS outbound
  • Set TCP keepalive for WireGuard gVisor TCP connections
  • Fixes and improvements

1:

  • Make splice work with traffic statistics systems like Clash API
  • Significantly reduces memory usage of idle connections

2:

Improved performance and reduced memory usage.

1.3-beta9

  • Improve multiplex 1
  • Fixes and improvements

1:

Added new h2mux multiplex protocol and padding multiplex option, see Multiplex.

1.2.6

  • Fix bugs and update dependencies

1.3-beta8

  • Fix system tun stack for ios
  • Fix network monitor for android/ios
  • Update VLESS and XUDP protocol 1
  • Fixes and improvements

*1:

This is an incompatible update for XUDP in VLESS if vision flow is enabled.

1.3-beta7

  • Add path and headers options for HTTP outbound
  • Add multi-user support for Shadowsocks legacy AEAD inbound
  • Fixes and improvements

1.2.4

  • Fixes and improvements

1.3-beta6

  • Fix WireGuard reconnect
  • Perform URLTest recheck after network changes
  • Fix bugs and update dependencies

1.3-beta5

  • Add Clash.Meta API compatibility for Clash API
  • Download Yacd-meta by default if the specified Clash external_ui directory is empty
  • Add path and headers option for HTTP outbound
  • Fixes and improvements

1.3-beta4

  • Fix bugs

1.3-beta2

  • Download clash-dashboard if the specified Clash external_ui directory is empty
  • Fix bugs and update dependencies

1.3-beta1

1:

It can currently be used to route connections directly to WireGuard or block connections at the IP layer.

2:

See FAQ for more information.

1.2.3

  • Introducing our new Android client application
  • Improve UDP domain destination NAT
  • Update reality protocol
  • Fix TTL calculation for DNS response
  • Fix v2ray HTTP transport compatibility
  • Fix bugs and update dependencies

1.2.2

  • Accept any outbound in dns rule 1
  • Fix bugs and update dependencies

1:

Now you can use the any outbound rule to match server address queries instead of filling in all server domains to domain rule.

1.2.1

  • Fix missing default host in v2ray http transport`s request
  • Flush DNS cache for macOS when tun start/close
  • Fix tun's DNS hijacking compatibility with systemd-resolved

1.2.0

  • Fix bugs and update dependencies

Important changes since 1.1:

1.2-rc1

  • Fix bugs and update dependencies

1.2-beta10

  • Add multiple configuration support 1
  • Fix bugs and update dependencies

1:

Now you can pass the parameter --config or -c multiple times, or use the new parameter --config-directory or -C to load all configuration files in a directory.

Loaded configuration files are sorted by name. If you want to control the merge order, add a numeric prefix to the file name.

1.1.7

  • Improve the stability of the VMESS server
  • Fix auto_detect_interface incorrectly identifying the default interface on Windows
  • Fix bugs and update dependencies

1.2-beta9

  • Introducing the UDP over TCP protocol version 2
  • Add health check support for http-based v2ray transports
  • Remove length limit on short_id for reality TLS config
  • Fix bugs and update dependencies

1.2-beta8

  • Update reality and uTLS libraries
  • Fix auto_detect_interface incorrectly identifying the default interface on Windows

1.2-beta7

  • Fix the compatibility issue between VLESS's vision sub-protocol and the Xray-core client
  • Improve the stability of the VMESS server

1.2-beta6

1.2-beta5

1.1.6

  • Improve vmess request
  • Fix ipv6 redirect on Linux
  • Fix match geoip private
  • Fix parse hysteria UDP message
  • Fix socks connect response
  • Disable vmess header protection if transport enabled
  • Update QUIC v2 version number and initial salt

1.2-beta4

  • Add NTP service
  • Add Add multiple server names and multi-user support for shadowtls
  • Add strict mode support for shadowtls v3
  • Add uTLS support for shadowtls v3

1.2-beta3

  • Update QUIC v2 version number and initial salt
  • Fix shadowtls v3 implementation

1.2-beta2

  • Add ShadowTLS protocol v3
  • Add fallback support for v2ray transport
  • Fix parse hysteria UDP message
  • Fix socks connect response
  • Disable vmess header protection if transport enabled

1.2-beta1

1.1.5

  • Add Go 1.20 support
  • Fix inbound default DF value
  • Fix auth_user route for naive inbound
  • Fix gRPC lite header
  • Ignore domain case in route rules

1.1.4

  • Fix DNS log
  • Fix write to h2 conn after closed
  • Fix create UDP DNS transport from plain IPv6 address

1.1.2

  • Fix http proxy auth
  • Fix user from stream packet conn
  • Fix DNS response TTL
  • Fix override packet conn
  • Skip override system proxy bypass list
  • Improve DNS log

1.1.1

  • Fix acme config
  • Fix vmess packet conn
  • Suppress quic-go set DF error

1.1

  • Fix close clash cache

Important changes since 1.0:

  • Add support for use with android VPNService
  • Add tun support for WireGuard outbound
  • Add system tun stack
  • Add comment filter for config
  • Add option for allow optional proxy protocol header
  • Add Clash mode and persistence support
  • Add TLS ECH and uTLS support for outbound TLS options
  • Add internal simple-obfs and v2ray-plugin
  • Add ShadowsocksR outbound
  • Add VLESS outbound and XUDP
  • Skip wait for hysteria tcp handshake response
  • Add v2ray mux support for all inbound
  • Add XUDP support for VMess
  • Improve websocket writer
  • Refine tproxy write back
  • Fix DNS leak caused by Windows' ordinary multihomed DNS resolution behavior
  • Add sniff_timeout listen option
  • Add custom route support for tun
  • Add option for custom wireguard reserved bytes
  • Split bind_address into ipv4 and ipv6
  • Add ShadowTLS v1 and v2 support

1.1-rc1

  • Fix TLS config for h2 server
  • Fix crash when input bad method in shadowsocks multi-user inbound
  • Fix listen UDP
  • Fix check invalid packet on macOS

1.1-beta18

  • Enhance defense against active probe for shadowtls server 1

1:

The fallback_after option has been removed.

1.1-beta17

  • Fix shadowtls server 1

1:

Added fallback_after option.

1.0.7

  • Add support for new x/h2 deadline
  • Fix copy pipe
  • Fix decrypt xplus packet
  • Fix macOS Ventura process name match
  • Fix smux keepalive
  • Fix vmess request buffer
  • Fix h2c transport
  • Fix tor geoip
  • Fix udp connect for mux client
  • Fix default dns transport strategy

1.1-beta16

  • Improve shadowtls server
  • Fix default dns transport strategy
  • Update uTLS to v1.2.0

1.1-beta15

  • Add support for new x/h2 deadline
  • Fix udp connect for mux client
  • Fix dns buffer
  • Fix quic dns retry
  • Fix create TLS config
  • Fix websocket alpn
  • Fix tor geoip

1.1-beta14

  • Add multi-user support for hysteria inbound 1
  • Add custom tls client support for std grpc
  • Fix smux keep alive
  • Fix vmess request buffer
  • Fix default local DNS server behavior
  • Fix h2c transport

1:

The auth and auth_str fields have been replaced by the users field.

1.1-beta13

  • Add custom worker count option for WireGuard outbound
  • Split bind_address into ipv4 and ipv6
  • Move WFP manipulation to strict route
  • Fix WireGuard outbound panic when close
  • Fix macOS Ventura process name match
  • Fix QUIC connection migration by @HyNetwork
  • Fix handling QUIC client SNI by @HyNetwork

1.1-beta12

  • Fix uTLS config
  • Update quic-go to v0.30.0
  • Update cloudflare-tls to go1.18.7

1.1-beta11

  • Add option for custom wireguard reserved bytes
  • Fix shadowtls v2
  • Fix h3 dns transport
  • Fix copy pipe
  • Fix decrypt xplus packet
  • Fix v2ray api
  • Suppress no network error
  • Improve local dns transport

1.1-beta10

  • Add sniff_timeout listen option
  • Add custom route support for tun 1
  • Fix interface monitor
  • Fix websocket headroom
  • Fix uTLS handshake
  • Fix ssh outbound
  • Fix sniff fragmented quic client hello
  • Fix DF for hysteria
  • Fix naive overflow
  • Check destination before udp connect
  • Update uTLS to v1.1.5
  • Update tfo-go to v2.0.2
  • Update fsnotify to v1.6.0
  • Update grpc to v1.50.1

1:

The strict_route on windows is removed.

1.0.6

  • Fix ssh outbound
  • Fix sniff fragmented quic client hello
  • Fix naive overflow
  • Check destination before udp connect

1.1-beta9

1:

2:

See ShadowTLS inbound and ShadowTLS outbound

1.1-beta8

  • Fix leaks on close
  • Improve websocket writer
  • Refine tproxy write back
  • Refine 4in6 processing
  • Fix shadowsocks plugins
  • Fix missing source address from transport connection
  • Fix fqdn socks5 outbound connection
  • Fix read source address from grpc-go

1.0.5

  • Fix missing source address from transport connection
  • Fix fqdn socks5 outbound connection
  • Fix read source address from grpc-go

1.1-beta7

  • Add v2ray mux and XUDP support for VMess inbound
  • Add XUDP support for VMess outbound
  • Disable DF on direct outbound by default
  • Fix bugs in 1.1-beta6

1.1-beta6

1.1-beta5

  • Print tags in version command
  • Redirect clash hello to external ui
  • Move shadowsocksr implementation to clash
  • Make gVisor optional 1
  • Refactor to miekg/dns
  • Refactor bind control
  • Fix build on go1.18
  • Fix clash store-selected
  • Fix close grpc conn
  • Fix port rule match logic
  • Fix clash api proxy type

1:

The build tag no_gvisor is replaced by with_gvisor.

The default tun stack is changed to system.

1.0.4

  • Fix close grpc conn
  • Fix port rule match logic
  • Fix clash api proxy type

1.1-beta4

1.0.3

  • Fix socks4 client
  • Fix hysteria inbound
  • Fix concurrent write

1.1-beta3

  • Fix using custom TLS client in http2 client
  • Fix bugs in 1.1-beta2

1.1-beta2

  • Add Clash mode and persistence support 1
  • Add TLS ECH and uTLS support for outbound TLS options 2
  • Fix socks4 request
  • Fix processing empty dns result

1:

Switching modes using the Clash API, and store-selected are now supported, see Experimental.

2:

ECH (Encrypted Client Hello) is a TLS extension that allows a client to encrypt the first part of its ClientHello message, see TLS#ECH.

uTLS is a fork of "crypto/tls", which provides ClientHello fingerprinting resistance, see TLS#uTLS.

1.0.2

  • Fix socks4 request
  • Fix processing empty dns result

1.1-beta1

  • Add support for use with android VPNService 1
  • Add tun support for WireGuard outbound 2
  • Add system tun stack 3
  • Add comment filter for config 4
  • Add option for allow optional proxy protocol header
  • Add half close for smux
  • Set UDP DF by default 5
  • Set default tun mtu to 9000
  • Update gVisor to 20220905.0

1:

In previous versions, Android VPN would not work with tun enabled.

The usage of tun over VPN and VPN over tun is now supported, see Tun Inbound.

2:

In previous releases, WireGuard outbound support was backed by the lower performance gVisor virtual interface.

It achieves the same performance as wireguard-go by providing automatic system interface support.

3:

It does not depend on gVisor and has better performance in some cases.

It is less compatible and may not be available in some environments.

4:

Annotated json configuration files are now supported.

5:

UDP fragmentation is now blocked by default.

Including shadowsocks-libev, shadowsocks-rust and quic-go all disable segmentation by default.

See Dial Fields and Listen Fields.

1.0.1

  • Fix match 4in6 address in ip_cidr
  • Fix clash api log level format error
  • Fix clash api unknown proxy type

1.0

  • Fix wireguard reconnect
  • Fix naive inbound
  • Fix json format error message
  • Fix processing vmess termination signal
  • Fix hysteria stream error
  • Fix listener close when proxyproto failed

1.0-rc1

  • Fix write log timestamp
  • Fix write zero
  • Fix dial parallel in direct outbound
  • Fix write trojan udp
  • Fix DNS routing
  • Add attribute support for geosite
  • Update documentation for Dial Fields

1.0-beta3

  • Add chained inbound support
  • Add process_path rule item
  • Add macOS redirect support
  • Add ShadowTLS Inbound, Outbound and Examples
  • Fix search android package in non-owner users
  • Fix socksaddr type condition
  • Fix smux session status
  • Refactor inbound and outbound documentation
  • Minor fixes

1.0-beta2

  • Add strict_route option for Tun inbound
  • Add packetaddr support for VMess outbound
  • Add better performing alternative gRPC implementation
  • Add docker image
  • Fix sniff override destination

1.0-beta1

  • Initial release
2022/08/26
  • Fix ipv6 route on linux
  • Fix read DNS message
2022/08/25
  • Let vmess use zero instead of auto if TLS enabled
  • Add trojan fallback for ALPN
  • Improve ip_cidr rule
  • Fix format bind_address
  • Fix http proxy with compressed response
  • Fix route connections
2022/08/24
  • Fix naive padding
  • Fix unix search path
  • Fix close non-duplex connections
  • Add ACME EAB support
  • Fix early close on windows and catch any
  • Initial zh-CN document translation
2022/08/23
  • Add V2Ray Transport support for VMess and Trojan
  • Allow plain http request in Naive inbound (It can now be used with nginx)
  • Add proxy protocol support
  • Free memory after start
  • Parse X-Forward-For in HTTP requests
  • Handle SIGHUP signal
2022/08/22
  • Add strategy setting for each DNS server
  • Add bind address to outbound options
2022/08/21
2022/08/20
  • Attempt to unwrap ip-in-fqdn socksaddr
  • Fix read packages in android 12
  • Fix route on some android devices
  • Improve linux process searcher
  • Fix write socks5 username password auth request
  • Skip bind connection with private destination to interface
  • Add Trojan connection fallback
2022/08/19
2022/08/18
  • Fix find process with lwip stack
  • Fix crash on shadowsocks server
  • Fix crash on darwin tun
  • Fix write log to file
2022/08/17
  • Improve async dns transports
2022/08/16
  • Add ip_version (route/dns) rule item
  • Add WireGuard outbound
2022/08/15
  • Add uid, android user and package rules support in Tun routing.
2022/08/13
  • Fix dns concurrent write
2022/08/12
  • Performance improvements
  • Add UoT option for SOCKS outbound
2022/08/11
  • Add UoT option for Shadowsocks outbound, UoT support for all inbounds
2022/08/10
  • Add full-featured Naive inbound
  • Fix default dns server option #9 by iKirby
2022/08/09

No changelog before.