sing-box/docs/changelog.md

2597 lines
67 KiB
Markdown
Raw Normal View History

---
icon: material/alert-decagram
---
2024-11-13 22:07:16 +08:00
#### 1.11.0-alpha.15
* Improve multi network dialing **1**
* Fixes and improvements
**1**:
New options allow you to configure the network strategy flexibly.
See [Dial Fields](/configuration/shared/dial/#network_strategy),
[Rule Action](/configuration/route/rule_action/#network_strategy)
and [Route](/configuration/route/#default_network_strategy).
2024-11-12 23:08:11 +08:00
#### 1.11.0-alpha.14
* Add multi network dialing **1**
* Fixes and improvements
**1**:
Similar to Surge's strategy.
New options allow you to connect using multiple network interfaces,
prefer or only use one type of interface,
and configure a timeout to fallback to other interfaces.
See [Dial Fields](/configuration/shared/dial/#network_strategy),
[Rule Action](/configuration/route/rule_action/#network_strategy)
and [Route](/configuration/route/#default_network_strategy).
2024-11-12 11:25:30 +08:00
#### 1.11.0-alpha.13
* Fixes and improvements
2024-11-11 19:33:54 +08:00
#### 1.11.0-alpha.12
2024-11-06 22:59:02 +08:00
2024-11-11 19:33:54 +08:00
* Merge route options to route actions **1**
* Add `network_type`, `network_is_expensive` and `network_is_constrainted` rule items **2**
2024-11-06 22:59:02 +08:00
* Fixes and improvements
2024-11-11 19:33:54 +08:00
**1**:
Route options in DNS route actions will no longer be considered deprecated,
see [DNS Route Action](/configuration/dns/rule_action/).
Also, now `udp_disable_domain_unmapping` and `udp_connect` can also be configured in route action,
see [Route Action](/configuration/route/rule_action/).
**2**:
When using in graphical clients, new routing rule items allow you to match on
network type (WIFI, cellular, etc.), whether the network is expensive, and whether Low Data Mode is enabled.
See [Route Rule](/configuration/route/rule/), [DNS Route Rule](/configuration/dns/rule/)
and [Headless Rule](/configuration/rule-set/headless-rule/).
2024-11-06 22:59:02 +08:00
#### 1.11.0-alpha.9
* Improve tun compatibility **1**
* Fixes and improvements
**1**:
When `gvisor` tun stack is enabled, even if the request passes routing,
if the outbound connection establishment fails,
the connection still does not need to be established and a TCP RST is replied.
#### 1.11.0-alpha.7
* Introducing rule actions **1**
**1**:
New rule actions replace legacy inbound fields and special outbound fields,
and can be used for pre-matching **2**.
See [Rule](/configuration/route/rule/),
[Rule Action](/configuration/route/rule_action/),
[DNS Rule](/configuration/dns/rule/) and
[DNS Rule Action](/configuration/dns/rule_action/).
For migration, see
2024-11-11 19:33:54 +08:00
[Migrate legacy special outbounds to rule actions](/migration/#migrate-legacy-special-outbounds-to-rule-actions),
2024-11-06 22:59:02 +08:00
[Migrate legacy inbound fields to rule actions](/migration/#migrate-legacy-inbound-fields-to-rule-actions)
and [Migrate legacy DNS route options to rule actions](/migration/#migrate-legacy-dns-route-options-to-rule-actions).
**2**:
Similar to Surge's pre-matching.
2024-11-12 23:08:11 +08:00
Specifically, new rule actions allow you to reject connections with
2024-11-06 22:59:02 +08:00
TCP RST (for TCP connections) and ICMP port unreachable (for UDP packets)
before connection established to improve tun's compatibility.
See [Rule Action](/configuration/route/rule_action/).
#### 1.11.0-alpha.6
* Update quic-go to v0.48.1
* Set gateway for tun correctly
* Fixes and improvements
#### 1.11.0-alpha.2
* Add warnings for usage of deprecated features
* Fixes and improvements
#### 1.11.0-alpha.1
* Update quic-go to v0.48.0
* Fixes and improvements
2024-10-16 20:48:05 +08:00
### 1.10.1
* Fixes and improvements
2024-10-13 13:20:49 +08:00
### 1.10.0
Important changes since 1.9:
* Introducing auto-redirect **1**
* Add AdGuard DNS Filter support **2**
* TUN address fields are merged **3**
* Add custom options for `auto-route` and `auto-redirect` **4**
* Drop support for go1.18 and go1.19 **5**
* Add tailing comma support in JSON configuration
* Improve sniffers **6**
* Add new `inline` rule-set type **7**
* Add access control options for Clash API **8**
* Add `rule_set_ip_cidr_accept_empty` DNS address filter rule item **9**
* Add auto reload support for local rule-set
* Update fsnotify usages **10**
* Add IP address support for `rule-set match` command
* Add `rule-set decompile` command
* Add `process_path_regex` rule item
* Update uTLS to v1.6.7 **11**
* Optimize memory usages of rule-sets **12**
**1**:
The new auto-redirect feature allows TUN to automatically
configure connection redirection to improve proxy performance.
2024-11-06 22:59:02 +08:00
When auto-redirect is enabled, new route address set options will allow you to
2024-10-13 13:20:49 +08:00
automatically configure destination IP CIDR rules from a specified rule set to the firewall.
Specified or unspecified destinations will bypass the sing-box routes to get better performance
(for example, keep hardware offloading of direct traffics on the router).
See [TUN](/configuration/inbound/tun).
**2**:
The new feature allows you to use AdGuard DNS Filter lists in a sing-box without AdGuard Home.
See [AdGuard DNS Filter](/configuration/rule-set/adguard/).
**3**:
See [Migration](/migration/#tun-address-fields-are-merged).
**4**:
See [iproute2_table_index](/configuration/inbound/tun/#iproute2_table_index),
[iproute2_rule_index](/configuration/inbound/tun/#iproute2_rule_index),
[auto_redirect_input_mark](/configuration/inbound/tun/#auto_redirect_input_mark) and
[auto_redirect_output_mark](/configuration/inbound/tun/#auto_redirect_output_mark).
**5**:
Due to maintenance difficulties, sing-box 1.10.0 requires at least Go 1.20 to compile.
**6**:
BitTorrent, DTLS, RDP, SSH sniffers are added.
Now the QUIC sniffer can correctly extract the server name from Chromium requests and
can identify common QUIC clients, including
Chromium, Safari, Firefox, quic-go (including uquic disguised as Chrome).
**7**:
The new [rule-set](/configuration/rule-set/) type inline (which also becomes the default type)
allows you to write headless rules directly without creating a rule-set file.
**8**:
2024-11-12 23:08:11 +08:00
With new access control options, not only can you allow Clash dashboards
2024-10-13 13:20:49 +08:00
to access the Clash API on your local network,
you can also manually limit the websites that can access the API instead of allowing everyone.
See [Clash API](/configuration/experimental/clash-api/).
**9**:
See [DNS Rule](/configuration/dns/rule/#rule_set_ip_cidr_accept_empty).
**10**:
sing-box now uses fsnotify correctly and will not cancel watching
if the target file is deleted or recreated via rename (e.g. `mv`).
This affects all path options that support reload, including
`tls.certificate_path`, `tls.key_path`, `tls.ech.key_path` and `rule_set.path`.
**11**:
Some legacy chrome fingerprints have been removed and will fallback to chrome,
see [utls](/configuration/shared/tls#utls).
**12**:
See [Source Format](/configuration/rule-set/source-format/#version).
2024-10-05 09:57:15 +08:00
### 1.9.7
* Fixes and improvements
2024-10-13 13:20:49 +08:00
#### 1.10.0-beta.11
* Update uTLS to v1.6.7 **1**
**1**:
Some legacy chrome fingerprints have been removed and will fallback to chrome,
see [utls](/configuration/shared/tls#utls).
#### 1.10.0-beta.10
* Add `process_path_regex` rule item
* Fixes and improvements
_The macOS standalone versions of sing-box (>=1.9.5/<1.10.0-beta.11) now silently fail and require manual granting of
the **Full Disk Access** permission to system extension to start, probably due to Apple's changed security policy. We
will prompt users about this in feature versions._
2024-09-20 21:08:26 +08:00
### 1.9.6
* Fixes and improvements
2024-09-15 12:42:27 +08:00
### 1.9.5
* Update quic-go to v0.47.0
* Fix direct dialer not resolving domain
* Fix no error return when empty DNS cache retrieved
* Fix build with go1.23
* Fix stream sniffer
* Fix bad redirect in clash-api
* Fix wireguard events chan leak
* Fix cached conn eats up read deadlines
* Fix disconnected interface selected as default in windows
* Update Bundle Identifiers for Apple platform clients **1**
**1**:
See [Migration](/migration/#bundle-identifier-updates-in-apple-platform-clients).
2024-10-13 13:20:49 +08:00
We are still working on getting all sing-box apps back on the App Store, which should be completed within a week
2024-09-15 12:42:27 +08:00
(SFI on the App Store and others on TestFlight are already available).
2024-10-13 13:20:49 +08:00
#### 1.10.0-beta.8
* Fixes and improvements
_With the help of a netizen, we are in the process of getting sing-box apps back on the App Store, which should be
completed within a month (TestFlight is already available)._
#### 1.10.0-beta.7
* Update quic-go to v0.47.0
* Fixes and improvements
#### 1.10.0-beta.6
* Add RDP sniffer
* Fixes and improvements
#### 1.10.0-beta.5
* Add PNA support for [Clash API](/configuration/experimental/clash-api/)
* Fixes and improvements
#### 1.10.0-beta.3
* Add SSH sniffer
* Fixes and improvements
#### 1.10.0-beta.2
* Build with go1.23
* Fixes and improvements
2024-08-19 06:52:19 +08:00
### 1.9.4
* Update quic-go to v0.46.0
* Update Hysteria2 BBR congestion control
* Filter HTTPS ipv4hint/ipv6hint with domain strategy
* Fix crash on Android when using process rules
* Fix non-IP queries accepted by address filter rules
* Fix UDP server for shadowsocks AEAD multi-user inbounds
* Fix default next protos for v2ray QUIC transport
* Fix default end value of port range configuration options
* Fix reset v2ray transports
* Fix panic caused by rule-set generation of duplicate keys for `domain_suffix`
* Fix UDP connnection leak when sniffing
* Fixes and improvements
2024-06-09 13:18:08 +08:00
2024-09-15 12:42:27 +08:00
_Due to problems with our Apple developer account,
sing-box apps on Apple platforms are temporarily unavailable for download or update.
If your company or organization is willing to help us return to the App Store,
please [contact us](mailto:contact@sagernet.org)._
2024-10-13 13:20:49 +08:00
#### 1.10.0-alpha.29
* Update quic-go to v0.46.0
* Fixes and improvements
#### 1.10.0-alpha.25
* Add AdGuard DNS Filter support **1**
**1**:
The new feature allows you to use AdGuard DNS Filter lists in a sing-box without AdGuard Home.
See [AdGuard DNS Filter](/configuration/rule-set/adguard/).
#### 1.10.0-alpha.23
* Add Chromium support for QUIC sniffer
* Add client type detect support for QUIC sniffer **1**
* Fixes and improvements
**1**:
Now the QUIC sniffer can correctly extract the server name from Chromium requests and
can identify common QUIC clients, including
Chromium, Safari, Firefox, quic-go (including uquic disguised as Chrome).
See [Protocol Sniff](/configuration/route/sniff/) and [Route Rule](/configuration/route/rule/#client).
#### 1.10.0-alpha.22
* Optimize memory usages of rule-sets **1**
* Fixes and improvements
**1**:
See [Source Format](/configuration/rule-set/source-format/#version).
#### 1.10.0-alpha.20
* Add DTLS sniffer
* Fixes and improvements
#### 1.10.0-alpha.19
* Add `rule-set decompile` command
* Add IP address support for `rule-set match` command
* Fixes and improvements
#### 1.10.0-alpha.18
* Add new `inline` rule-set type **1**
* Add auto reload support for local rule-set
* Update fsnotify usages **2**
* Fixes and improvements
**1**:
The new [rule-set](/configuration/rule-set/) type inline (which also becomes the default type)
allows you to write headless rules directly without creating a rule-set file.
**2**:
sing-box now uses fsnotify correctly and will not cancel watching
if the target file is deleted or recreated via rename (e.g. `mv`).
This affects all path options that support reload, including
`tls.certificate_path`, `tls.key_path`, `tls.ech.key_path` and `rule_set.path`.
#### 1.10.0-alpha.17
* Some chaotic changes **1**
* `rule_set_ipcidr_match_source` rule items are renamed **2**
* Add `rule_set_ip_cidr_accept_empty` DNS address filter rule item **3**
* Update quic-go to v0.45.1
* Fixes and improvements
**1**:
Something may be broken, please actively report problems with this version.
**2**:
`rule_set_ipcidr_match_source` route and DNS rule items are renamed to
`rule_set_ip_cidr_match_source` and will be remove in sing-box 1.11.0.
**3**:
See [DNS Rule](/configuration/dns/rule/#rule_set_ip_cidr_accept_empty).
#### 1.10.0-alpha.16
* Add custom options for `auto-route` and `auto-redirect` **1**
* Fixes and improvements
**1**:
See [iproute2_table_index](/configuration/inbound/tun/#iproute2_table_index),
[iproute2_rule_index](/configuration/inbound/tun/#iproute2_rule_index),
[auto_redirect_input_mark](/configuration/inbound/tun/#auto_redirect_input_mark) and
[auto_redirect_output_mark](/configuration/inbound/tun/#auto_redirect_output_mark).
#### 1.10.0-alpha.13
* TUN address fields are merged **1**
* Add route address set support for auto-redirect **2**
**1**:
See [Migration](/migration/#tun-address-fields-are-merged).
**2**:
The new feature will allow you to configure the destination IP CIDR rules
in the specified rule-sets to the firewall automatically.
Specified or unspecified destinations will bypass the sing-box routes to get better performance
(for example, keep hardware offloading of direct traffics on the router).
See [route_address_set](/configuration/inbound/tun/#route_address_set)
and [route_exclude_address_set](/configuration/inbound/tun/#route_exclude_address_set).
#### 1.10.0-alpha.12
* Fix auto-redirect not configuring nftables forward chain correctly
* Fixes and improvements
2024-06-09 13:18:08 +08:00
### 1.9.3
* Fixes and improvements
2024-10-13 13:20:49 +08:00
#### 1.10.0-alpha.10
* Fixes and improvements
2024-06-08 18:59:12 +08:00
### 1.9.2
* Fixes and improvements
2024-10-13 13:20:49 +08:00
#### 1.10.0-alpha.8
* Drop support for go1.18 and go1.19 **1**
* Update quic-go to v0.45.0
* Update Hysteria2 BBR congestion control
* Fixes and improvements
**1**:
Due to maintenance difficulties, sing-box 1.10.0 requires at least Go 1.20 to compile.
2024-06-07 15:04:04 +08:00
### 1.9.1
* Fixes and improvements
2024-10-13 13:20:49 +08:00
#### 1.10.0-alpha.7
* Fixes and improvements
#### 1.10.0-alpha.5
* Improve auto-redirect **1**
**1**:
nftables support and DNS hijacking has been added.
Tun inbounds with `auto_route` and `auto_redirect` now works as expected on routers **without intervention**.
#### 1.10.0-alpha.4
* Fix auto-redirect **1**
* Improve auto-route on linux **2**
**1**:
Tun inbounds with `auto_route` and `auto_redirect` now works as expected on routers.
**2**:
Tun inbounds with `auto_route` and `strict_route` now works as expected on routers and servers,
but the usages of [exclude_interface](/configuration/inbound/tun/#exclude_interface) need to be updated.
#### 1.10.0-alpha.2
* Move auto-redirect to Tun **1**
* Fixes and improvements
**1**:
Linux support are added.
See [Tun](/configuration/inbound/tun/#auto_redirect).
#### 1.10.0-alpha.1
* Add tailing comma support in JSON configuration
* Add simple auto-redirect for Android **1**
* Add BitTorrent sniffer **2**
**1**:
It allows you to use redirect inbound in the sing-box Android client
and automatically configures IPv4 TCP redirection via su.
This may alleviate the symptoms of some OCD patients who think that
redirect can effectively save power compared to the system HTTP Proxy.
See [Redirect](/configuration/inbound/redirect/).
**2**:
See [Protocol Sniff](/configuration/route/sniff/).
2024-05-25 10:08:18 +08:00
### 1.9.0
* Fixes and improvements
Important changes since 1.8:
* `domain_suffix` behavior update **1**
* `process_path` format update on Windows **2**
* Add address filter DNS rule items **3**
* Add support for `client-subnet` DNS options **4**
* Add rejected DNS response cache support **5**
* Add `bypass_domain` and `search_domain` platform HTTP proxy options **6**
* Fix missing `rule_set_ipcidr_match_source` item in DNS rules **7**
* Handle Windows power events
* Always disable cache for fake-ip DNS transport if `dns.independent_cache` disabled
* Improve DNS truncate behavior
* Update Hysteria protocol
* Update quic-go to v0.43.1
* Update gVisor to 20240422.0
* Mitigating TunnelVision attacks **8**
**1**:
See [Migration](/migration/#domain_suffix-behavior-update).
**2**:
See [Migration](/migration/#process_path-format-update-on-windows).
**3**:
The new DNS feature allows you to more precisely bypass Chinese websites via **DNS leaks**. Do not use plain local DNS
if using this method.
See [Address Filter Fields](/configuration/dns/rule#address-filter-fields).
[Client example](/manual/proxy/client#traffic-bypass-usage-for-chinese-users) updated.
**4**:
See [DNS](/configuration/dns), [DNS Server](/configuration/dns/server) and [DNS Rules](/configuration/dns/rule).
Since this feature makes the scenario mentioned in `alpha.1` no longer leak DNS requests,
the [Client example](/manual/proxy/client#traffic-bypass-usage-for-chinese-users) has been updated.
**5**:
The new feature allows you to cache the check results of
[Address filter DNS rule items](/configuration/dns/rule/#address-filter-fields) until expiration.
**6**:
See [TUN](/configuration/inbound/tun) inbound.
**7**:
See [DNS Rule](/configuration/dns/rule/).
**8**:
See [TunnelVision](/manual/misc/tunnelvision).
2024-04-26 20:37:25 +08:00
#### 1.9.0-rc.22
* Fixes and improvements
#### 1.9.0-rc.20
* Prioritize `*_route_address` in linux auto-route
* Fix `*_route_address` in darwin auto-route
2024-05-18 16:51:06 +08:00
#### 1.8.14
* Fix hysteria2 panic
* Fixes and improvements
2024-04-26 20:37:25 +08:00
#### 1.9.0-rc.18
* Add custom prefix support in EDNS0 client subnet options
* Fix hysteria2 crash
* Fix `store_rdrc` corrupted
* Update quic-go to v0.43.1
* Fixes and improvements
#### 1.9.0-rc.16
* Mitigating TunnelVision attacks **1**
* Fixes and improvements
**1**:
See [TunnelVision](/manual/misc/tunnelvision).
#### 1.9.0-rc.15
* Fixes and improvements
2024-05-03 16:26:38 +08:00
#### 1.8.13
* Fix fake-ip mapping
* Fixes and improvements
2024-04-26 20:37:25 +08:00
#### 1.9.0-rc.14
* Fixes and improvements
#### 1.9.0-rc.13
* Update Hysteria protocol
* Update quic-go to v0.43.0
* Update gVisor to 20240422.0
* Fixes and improvements
2024-04-23 14:04:25 +08:00
#### 1.8.12
* Now we have official APT and DNF repositories **1**
* Fix packet MTU for QUIC protocols
* Fixes and improvements
**1**:
Including stable and beta versions, see https://sing-box.sagernet.org/installation/package-manager/
2024-04-26 20:37:25 +08:00
#### 1.9.0-rc.11
* Fixes and improvements
2024-03-29 12:52:42 +08:00
#### 1.8.11
* Fixes and improvements
2024-03-21 23:21:37 +08:00
#### 1.8.10
* Fixes and improvements
2024-04-26 20:37:25 +08:00
#### 1.9.0-beta.17
* Update `quic-go` to v0.42.0
* Fixes and improvements
#### 1.9.0-beta.16
* Fixes and improvements
_Our Testflight distribution has been temporarily blocked by Apple (possibly due to too many beta versions)
and you cannot join the test, install or update the sing-box beta app right now.
Please wait patiently for processing._
#### 1.9.0-beta.14
* Update gVisor to 20240212.0-65-g71212d503
* Fixes and improvements
2024-03-15 16:24:31 +08:00
#### 1.8.9
* Fixes and improvements
2024-03-02 14:30:23 +08:00
#### 1.8.8
* Fixes and improvements
2024-04-26 20:37:25 +08:00
#### 1.9.0-beta.7
* Fixes and improvements
#### 1.9.0-beta.6
* Fix address filter DNS rule items **1**
* Fix DNS outbound responding with wrong data
* Fixes and improvements
**1**:
Fixed an issue where address filter DNS rule was incorrectly rejected under certain circumstances.
If you have enabled `store_rdrc` to save results, consider clearing the cache file.
2024-02-26 22:56:04 +08:00
#### 1.8.7
* Fixes and improvements
2024-04-26 20:37:25 +08:00
#### 1.9.0-alpha.15
* Fixes and improvements
#### 1.9.0-alpha.14
* Improve DNS truncate behavior
* Fixes and improvements
#### 1.9.0-alpha.13
* Fixes and improvements
2024-02-16 15:06:59 +08:00
#### 1.8.6
* Fixes and improvements
2024-04-26 20:37:25 +08:00
#### 1.9.0-alpha.12
* Handle Windows power events
* Always disable cache for fake-ip DNS transport if `dns.independent_cache` disabled
* Fixes and improvements
#### 1.9.0-alpha.11
* Fix missing `rule_set_ipcidr_match_source` item in DNS rules **1**
* Fixes and improvements
**1**:
See [DNS Rule](/configuration/dns/rule/).
#### 1.9.0-alpha.10
* Add `bypass_domain` and `search_domain` platform HTTP proxy options **1**
* Fixes and improvements
**1**:
See [TUN](/configuration/inbound/tun) inbound.
#### 1.9.0-alpha.8
* Add rejected DNS response cache support **1**
* Fixes and improvements
**1**:
The new feature allows you to cache the check results of
[Address filter DNS rule items](/configuration/dns/rule/#address-filter-fields) until expiration.
#### 1.9.0-alpha.7
* Update gVisor to 20240206.0
* Fixes and improvements
#### 1.9.0-alpha.6
* Fixes and improvements
#### 1.9.0-alpha.3
* Update `quic-go` to v0.41.0
* Fixes and improvements
#### 1.9.0-alpha.2
* Add support for `client-subnet` DNS options **1**
* Fixes and improvements
**1**:
See [DNS](/configuration/dns), [DNS Server](/configuration/dns/server) and [DNS Rules](/configuration/dns/rule).
Since this feature makes the scenario mentioned in `alpha.1` no longer leak DNS requests,
the [Client example](/manual/proxy/client#traffic-bypass-usage-for-chinese-users) has been updated.
#### 1.9.0-alpha.1
* `domain_suffix` behavior update **1**
* `process_path` format update on Windows **2**
* Add address filter DNS rule items **3**
**1**:
See [Migration](/migration/#domain_suffix-behavior-update).
**2**:
See [Migration](/migration/#process_path-format-update-on-windows).
**3**:
The new DNS feature allows you to more precisely bypass Chinese websites via **DNS leaks**. Do not use plain local DNS
if using this method.
See [Address Filter Fields](/configuration/dns/rule#address-filter-fields).
[Client example](/manual/proxy/client#traffic-bypass-usage-for-chinese-users) updated.
2024-02-02 11:34:08 +08:00
#### 1.8.5
* Fixes and improvements
2024-01-20 16:36:26 +08:00
#### 1.8.4
* Fixes and improvements
2024-01-14 13:07:37 +08:00
#### 1.8.2
* Fixes and improvements
2024-01-07 16:47:14 +08:00
#### 1.8.1
* Fixes and improvements
2024-05-25 10:08:18 +08:00
### 1.8.0
2023-12-19 19:17:44 +08:00
* Fixes and improvements
Important changes since 1.7:
* Migrate cache file from Clash API to independent options **1**
2024-06-26 00:45:10 +08:00
* Introducing [rule-set](/configuration/rule-set/) **2**
2023-12-19 19:17:44 +08:00
* Add `sing-box geoip`, `sing-box geosite` and `sing-box rule-set` commands **3**
* Allow nested logical rules **4**
* Independent `source_ip_is_private` and `ip_is_private` rules **5**
* Add context to JSON decode error message **6**
* Reject internal fake-ip queries **7**
* Add GSO support for TUN and WireGuard system interface **8**
* Add `idle_timeout` for URLTest outbound **9**
* Add simple loopback detect
* Optimize memory usage of idle connections
* Update uTLS to 1.5.4 **10**
* Update dependencies **11**
**1**:
See [Cache File](/configuration/experimental/cache-file/) and
[Migration](/migration/#migrate-cache-file-from-clash-api-to-independent-options).
**2**:
2024-06-26 00:45:10 +08:00
rule-set is independent collections of rules that can be compiled into binaries to improve performance.
2023-12-19 19:17:44 +08:00
Compared to legacy GeoIP and Geosite resources,
it can include more types of rules, load faster,
use less memory, and update automatically.
See [Route#rule_set](/configuration/route/#rule_set),
[Route Rule](/configuration/route/rule/),
[DNS Rule](/configuration/dns/rule/),
2024-06-26 00:45:10 +08:00
[rule-set](/configuration/rule-set/),
2023-12-19 19:17:44 +08:00
[Source Format](/configuration/rule-set/source-format/) and
[Headless Rule](/configuration/rule-set/headless-rule/).
2024-06-26 00:45:10 +08:00
For GEO resources migration, see [Migrate GeoIP to rule-sets](/migration/#migrate-geoip-to-rule-sets) and
[Migrate Geosite to rule-sets](/migration/#migrate-geosite-to-rule-sets).
2023-12-19 19:17:44 +08:00
**3**:
2024-06-26 00:45:10 +08:00
New commands manage GeoIP, Geosite and rule-set resources, and help you migrate GEO resources to rule-sets.
2023-12-19 19:17:44 +08:00
**4**:
Logical rules in route rules, DNS rules, and the new headless rule now allow nesting of logical rules.
**5**:
The `private` GeoIP country never existed and was actually implemented inside V2Ray.
Since GeoIP was deprecated, we made this rule independent, see [Migration](/migration/#migrate-geoip-to-rule-sets).
**6**:
JSON parse errors will now include the current key path.
Only takes effect when compiled with Go 1.21+.
**7**:
All internal DNS queries now skip DNS rules with `server` type `fakeip`,
and the default DNS server can no longer be `fakeip`.
This change is intended to break incorrect usage and essentially requires no action.
**8**:
See [TUN](/configuration/inbound/tun/) inbound and [WireGuard](/configuration/outbound/wireguard/) outbound.
**9**:
When URLTest is idle for a certain period of time, the scheduled delay test will be paused.
**10**:
Added some new [fingerprints](/configuration/shared/tls#utls).
Also, starting with this release, uTLS requires at least Go 1.20.
**11**:
2024-03-02 14:30:23 +08:00
Updated `cloudflare-tls`, `gomobile`, `smux`, `tfo-go` and `wireguard-go` to latest, `quic-go` to `0.40.1` and `gvisor`
to `20231204.0`
2023-12-19 19:17:44 +08:00
#### 1.8.0-rc.11
* Fixes and improvements
2024-01-02 14:31:53 +08:00
#### 1.7.8
* Fixes and improvements
2023-12-19 19:17:44 +08:00
#### 1.8.0-rc.10
* Fixes and improvements
2023-12-29 18:00:19 +08:00
#### 1.7.7
* Fix V2Ray transport `path` validation behavior **1**
* Fixes and improvements
**1**:
See [V2Ray transport](/configuration/shared/v2ray-transport/).
2023-12-19 19:17:44 +08:00
#### 1.8.0-rc.7
* Fixes and improvements
#### 1.8.0-rc.3
* Fix V2Ray transport `path` validation behavior **1**
* Fixes and improvements
**1**:
See [V2Ray transport](/configuration/shared/v2ray-transport/).
2023-12-19 19:17:44 +08:00
#### 1.7.6
* Fixes and improvements
2023-12-19 19:17:44 +08:00
#### 1.8.0-rc.1
* Fixes and improvements
#### 1.8.0-beta.9
* Add simple loopback detect
* Fixes and improvements
2023-12-11 21:40:32 +08:00
#### 1.7.5
* Fixes and improvements
2023-12-19 19:17:44 +08:00
#### 1.8.0-alpha.17
* Add GSO support for TUN and WireGuard system interface **1**
* Update uTLS to 1.5.4 **2**
* Update dependencies **3**
* Fixes and improvements
**1**:
See [TUN](/configuration/inbound/tun/) inbound and [WireGuard](/configuration/outbound/wireguard/) outbound.
**2**:
Added some new [fingerprints](/configuration/shared/tls#utls).
Also, starting with this release, uTLS requires at least Go 1.20.
**3**:
Updated `cloudflare-tls`, `gomobile`, `smux`, `tfo-go` and `wireguard-go` to latest, and `gvisor` to `20231204.0`
This may break something, good luck!
2023-12-09 00:20:24 +08:00
#### 1.7.4
2023-12-07 22:40:18 +08:00
* Fixes and improvements
2023-12-19 19:17:44 +08:00
_Due to the long waiting time, this version is no longer waiting for approval
2023-12-07 22:40:18 +08:00
by the Apple App Store, so updates to Apple Platforms will be delayed._
2023-12-19 19:17:44 +08:00
#### 1.8.0-alpha.16
* Fixes and improvements
#### 1.8.0-alpha.15
* Some chaotic changes **1**
* Fixes and improvements
**1**:
Designed to optimize memory usage of idle connections, may take effect on the following protocols:
| Protocol | TCP | UDP |
|------------------------------------------------------|------------------|------------------|
| HTTP proxy server | :material-check: | / |
| SOCKS5 | :material-close: | :material-check: |
| Shadowsocks none/AEAD/AEAD2022 | :material-check: | :material-check: |
| Trojan | / | :material-check: |
| TUIC/Hysteria/Hysteria2 | :material-close: | :material-check: |
| Multiplex | :material-close: | :material-check: |
| Plain TLS (Trojan/VLESS without extra sub-protocols) | :material-check: | / |
| Other protocols | :material-close: | :material-close: |
At the same time, everything existing may be broken, please actively report problems with this version.
#### 1.8.0-alpha.13
* Fixes and improvements
#### 1.8.0-alpha.10
* Add `idle_timeout` for URLTest outbound **1**
* Fixes and improvements
**1**:
When URLTest is idle for a certain period of time, the scheduled delay test will be paused.
2023-12-02 17:57:39 +08:00
#### 1.7.2
* Fixes and improvements
2023-12-19 19:17:44 +08:00
#### 1.8.0-alpha.8
* Add context to JSON decode error message **1**
* Reject internal fake-ip queries **2**
* Fixes and improvements
**1**:
JSON parse errors will now include the current key path.
Only takes effect when compiled with Go 1.21+.
**2**:
All internal DNS queries now skip DNS rules with `server` type `fakeip`,
and the default DNS server can no longer be `fakeip`.
This change is intended to break incorrect usage and essentially requires no action.
#### 1.8.0-alpha.7
* Fixes and improvements
2023-12-01 14:10:52 +08:00
#### 1.7.1
* Fixes and improvements
2023-12-19 19:17:44 +08:00
#### 1.8.0-alpha.6
* Fix rule-set matching logic **1**
* Fixes and improvements
**1**:
2024-06-26 00:45:10 +08:00
Now the rules in the `rule_set` rule item can be logically considered to be merged into the rule using rule-sets,
2023-12-19 19:17:44 +08:00
rather than completely following the AND logic.
#### 1.8.0-alpha.5
* Parallel rule-set initialization
* Independent `source_ip_is_private` and `ip_is_private` rules **1**
**1**:
The `private` GeoIP country never existed and was actually implemented inside V2Ray.
Since GeoIP was deprecated, we made this rule independent, see [Migration](/migration/#migrate-geoip-to-rule-sets).
#### 1.8.0-alpha.1
* Migrate cache file from Clash API to independent options **1**
2024-06-26 00:45:10 +08:00
* Introducing [rule-set](/configuration/rule-set/) **2**
2023-12-19 19:17:44 +08:00
* Add `sing-box geoip`, `sing-box geosite` and `sing-box rule-set` commands **3**
* Allow nested logical rules **4**
**1**:
See [Cache File](/configuration/experimental/cache-file/) and
[Migration](/migration/#migrate-cache-file-from-clash-api-to-independent-options).
**2**:
2024-06-26 00:45:10 +08:00
rule-set is independent collections of rules that can be compiled into binaries to improve performance.
2023-12-19 19:17:44 +08:00
Compared to legacy GeoIP and Geosite resources,
it can include more types of rules, load faster,
use less memory, and update automatically.
See [Route#rule_set](/configuration/route/#rule_set),
[Route Rule](/configuration/route/rule/),
[DNS Rule](/configuration/dns/rule/),
2024-06-26 00:45:10 +08:00
[rule-set](/configuration/rule-set/),
2023-12-19 19:17:44 +08:00
[Source Format](/configuration/rule-set/source-format/) and
[Headless Rule](/configuration/rule-set/headless-rule/).
2024-06-26 00:45:10 +08:00
For GEO resources migration, see [Migrate GeoIP to rule-sets](/migration/#migrate-geoip-to-rule-sets) and
[Migrate Geosite to rule-sets](/migration/#migrate-geosite-to-rule-sets).
2023-12-19 19:17:44 +08:00
**3**:
2024-06-26 00:45:10 +08:00
New commands manage GeoIP, Geosite and rule-set resources, and help you migrate GEO resources to rule-sets.
2023-12-19 19:17:44 +08:00
**4**:
Logical rules in route rules, DNS rules, and the new headless rule now allow nesting of logical rules.
2024-05-25 10:08:18 +08:00
### 1.7.0
2023-11-29 21:01:28 +08:00
* Fixes and improvements
Important changes since 1.6:
2023-12-14 22:23:52 +08:00
* Add [exclude route support](/configuration/inbound/tun/) for TUN inbound
* Add `udp_disable_domain_unmapping` [inbound listen option](/configuration/shared/listen/) **1**
2023-11-29 21:01:28 +08:00
* Add [HTTPUpgrade V2Ray transport](/configuration/shared/v2ray-transport#HTTPUpgrade) support **2**
* Migrate multiplex and UoT server to inbound **3**
* Add TCP Brutal support for multiplex **4**
* Add `wifi_ssid` and `wifi_bssid` route and DNS rules **5**
* Update quic-go to v0.40.0
* Update gVisor to 20231113.0
**1**:
If enabled, for UDP proxy requests addressed to a domain,
the original packet address will be sent in the response instead of the mapped domain.
This option is used for compatibility with clients that
do not support receiving UDP packets with domain addresses, such as Surge.
**2**:
Introduced in V2Ray 5.10.0.
The new HTTPUpgrade transport has better performance than WebSocket and is better suited for CDN abuse.
**3**:
2023-12-07 22:40:18 +08:00
Starting in 1.7.0, multiplexing support is no longer enabled by default
2023-12-19 19:17:44 +08:00
and needs to be turned on explicitly in inbound
options.
2023-11-29 21:01:28 +08:00
**4**
2023-12-07 22:40:18 +08:00
Hysteria Brutal Congestion Control Algorithm in TCP. A kernel module needs to be installed on the Linux server,
2023-12-14 22:23:52 +08:00
see [TCP Brutal](/configuration/shared/tcp-brutal/) for details.
2023-11-29 21:01:28 +08:00
**5**:
Only supported in graphical clients on Android and Apple platforms.
2023-11-29 21:01:28 +08:00
#### 1.7.0-rc.3
* Fixes and improvements
2023-11-24 20:01:34 +08:00
#### 1.6.7
* macOS: Add button for uninstall SystemExtension in the standalone graphical client
* Fix missing UDP user context on TUIC/Hysteria2 inbounds
* Fixes and improvements
#### 1.7.0-rc.2
* Fix missing UDP user context on TUIC/Hysteria2 inbounds
* macOS: Add button for uninstall SystemExtension in the standalone graphical client
2023-11-20 18:44:31 +08:00
#### 1.6.6
* Fixes and improvements
#### 1.7.0-rc.1
* Fixes and improvements
#### 1.7.0-beta.5
* Update gVisor to 20231113.0
* Fixes and improvements
#### 1.7.0-beta.4
* Add `wifi_ssid` and `wifi_bssid` route and DNS rules **1**
* Fixes and improvements
**1**:
Only supported in graphical clients on Android and Apple platforms.
#### 1.7.0-beta.3
* Fix zero TTL was incorrectly reset
* Fixes and improvements
2023-11-14 20:14:01 +08:00
#### 1.6.5
* Fix crash if TUIC inbound authentication failed
* Fixes and improvements
#### 1.7.0-beta.2
* Fix crash if TUIC inbound authentication failed
* Update quic-go to v0.40.0
* Fixes and improvements
2023-11-13 13:39:30 +08:00
#### 1.6.4
* Fixes and improvements
#### 1.7.0-beta.1
* Fixes and improvements
2023-11-09 15:56:45 +08:00
#### 1.6.3
* iOS/Android: Fix profile auto update
* Fixes and improvements
#### 1.7.0-alpha.11
* iOS/Android: Fix profile auto update
* Fixes and improvements
#### 1.7.0-alpha.10
* Fix tcp-brutal not working with TLS
* Fix Android client not closing in some cases
* Fixes and improvements
2023-11-06 20:02:00 +08:00
#### 1.6.2
* Fixes and improvements
2023-11-05 16:03:39 +08:00
#### 1.6.1
2023-12-14 22:23:52 +08:00
* Our [Android client](/installation/clients/sfa/) is now available in the Google Play Store ▶️
2023-11-05 16:03:39 +08:00
* Fixes and improvements
#### 1.7.0-alpha.6
* Fixes and improvements
#### 1.7.0-alpha.4
* Migrate multiplex and UoT server to inbound **1**
* Add TCP Brutal support for multiplex **2**
**1**:
2023-12-07 22:40:18 +08:00
Starting in 1.7.0, multiplexing support is no longer enabled by default and needs to be turned on explicitly in inbound
options.
**2**
2023-12-07 22:40:18 +08:00
Hysteria Brutal Congestion Control Algorithm in TCP. A kernel module needs to be installed on the Linux server,
2023-12-14 22:23:52 +08:00
see [TCP Brutal](/configuration/shared/tcp-brutal/) for details.
#### 1.7.0-alpha.3
* Add [HTTPUpgrade V2Ray transport](/configuration/shared/v2ray-transport#HTTPUpgrade) support **1**
* Fixes and improvements
**1**:
Introduced in V2Ray 5.10.0.
The new HTTPUpgrade transport has better performance than WebSocket and is better suited for CDN abuse.
2024-05-25 10:08:18 +08:00
### 1.6.0
2023-10-25 12:00:00 +08:00
* Fixes and improvements
Important changes since 1.5:
2023-12-14 22:23:52 +08:00
* Our [Apple tvOS client](/installation/clients/sft/) is now available in the App Store 🍎
2023-10-25 12:00:00 +08:00
* Update BBR congestion control for TUIC and Hysteria2 **1**
* Update brutal congestion control for Hysteria2
* Add `brutal_debug` option for Hysteria2
* Update legacy Hysteria protocol **2**
* Add TLS self sign key pair generate command
2023-12-14 22:23:52 +08:00
* Remove [Deprecated Features](/deprecated/) by agreement
2023-10-25 12:00:00 +08:00
**1**:
None of the existing Golang BBR congestion control implementations have been reviewed or unit tested.
This update is intended to address the multi-send defects of the old implementation and may introduce new issues.
**2**
Based on discussions with the original author, the brutal CC and QUIC protocol parameters of
the old protocol (Hysteria 1) have been updated to be consistent with Hysteria 2
#### 1.7.0-alpha.2
* Fix bugs introduced in 1.7.0-alpha.1
#### 1.7.0-alpha.1
2023-12-14 22:23:52 +08:00
* Add [exclude route support](/configuration/inbound/tun/) for TUN inbound
* Add `udp_disable_domain_unmapping` [inbound listen option](/configuration/shared/listen/) **1**
* Fixes and improvements
**1**:
If enabled, for UDP proxy requests addressed to a domain,
the original packet address will be sent in the response instead of the mapped domain.
This option is used for compatibility with clients that
do not support receiving UDP packets with domain addresses, such as Surge.
2023-10-25 12:00:00 +08:00
2023-10-25 12:00:00 +08:00
#### 1.5.5
* Fix IPv6 `auto_route` for Linux **1**
* Add legacy builds for old Windows and macOS systems **2**
* Fixes and improvements
**1**:
When `auto_route` is enabled and `strict_route` is disabled, the device can now be reached from external IPv6 addresses.
**2**:
2023-12-07 22:40:18 +08:00
Built using Go 1.20, the last version that will run on
2023-12-19 19:17:44 +08:00
Windows 7, 8, Server 2008, Server 2012 and macOS 10.13 High
Sierra, 10.14 Mojave.
2023-10-25 12:00:00 +08:00
#### 1.6.0-rc.4
* Fixes and improvements
#### 1.6.0-rc.1
* Add legacy builds for old Windows and macOS systems **1**
* Fixes and improvements
**1**:
2023-12-07 22:40:18 +08:00
Built using Go 1.20, the last version that will run on
2023-12-19 19:17:44 +08:00
Windows 7, 8, Server 2008, Server 2012 and macOS 10.13 High
Sierra, 10.14 Mojave.
2023-10-25 12:00:00 +08:00
#### 1.6.0-beta.4
* Fix IPv6 `auto_route` for Linux **1**
* Fixes and improvements
**1**:
When `auto_route` is enabled and `strict_route` is disabled, the device can now be reached from external IPv6 addresses.
2023-10-21 12:00:00 +08:00
#### 1.5.4
* Fix Clash cache crash on arm32 devices
* Fixes and improvements
2023-10-25 12:00:00 +08:00
#### 1.6.0-beta.3
* Update the legacy Hysteria protocol **1**
* Fixes and improvements
**1**
Based on discussions with the original author, the brutal CC and QUIC protocol parameters of
the old protocol (Hysteria 1) have been updated to be consistent with Hysteria 2
#### 1.6.0-beta.2
* Add TLS self sign key pair generate command
* Update brutal congestion control for Hysteria2
* Fix Clash cache crash on arm32 devices
* Update golang.org/x/net to v0.17.0
* Fixes and improvements
#### 1.6.0-beta.3
* Update the legacy Hysteria protocol **1**
* Fixes and improvements
**1**
2023-10-25 12:00:00 +08:00
Based on discussions with the original author, the brutal CC and QUIC protocol parameters of
the old protocol (Hysteria 1) have been updated to be consistent with Hysteria 2
#### 1.6.0-beta.2
* Add TLS self sign key pair generate command
* Update brutal congestion control for Hysteria2
* Fix Clash cache crash on arm32 devices
* Update golang.org/x/net to v0.17.0
* Fixes and improvements
2023-10-10 15:12:13 +08:00
#### 1.5.3
* Fix compatibility with Android 14
* Fixes and improvements
2023-10-25 12:00:00 +08:00
#### 1.6.0-beta.1
* Fixes and improvements
#### 1.6.0-alpha.5
* Fix compatibility with Android 14
* Update BBR congestion control for TUIC and Hysteria2 **1**
* Fixes and improvements
**1**:
None of the existing Golang BBR congestion control implementations have been reviewed or unit tested.
This update is intended to fix a memory leak flaw in the new implementation introduced in 1.6.0-alpha.1 and may
introduce new issues.
#### 1.6.0-alpha.4
* Add `brutal_debug` option for Hysteria2
* Fixes and improvements
2023-10-06 17:10:53 +08:00
#### 1.5.2
2023-12-14 22:23:52 +08:00
* Our [Apple tvOS client](/installation/clients/sft/) is now available in the App Store 🍎
2023-10-06 17:10:53 +08:00
* Fixes and improvements
2023-10-25 12:00:00 +08:00
#### 1.6.0-alpha.3
* Fixes and improvements
#### 1.6.0-alpha.2
* Fixes and improvements
2023-09-30 23:03:07 +08:00
#### 1.5.1
* Fixes and improvements
2023-10-25 12:00:00 +08:00
#### 1.6.0-alpha.1
* Update BBR congestion control for TUIC and Hysteria2 **1**
* Update quic-go to v0.39.0
* Update gVisor to 20230814.0
2023-12-14 22:23:52 +08:00
* Remove [Deprecated Features](/deprecated/) by agreement
2023-10-25 12:00:00 +08:00
* Fixes and improvements
**1**:
None of the existing Golang BBR congestion control implementations have been reviewed or unit tested.
This update is intended to address the multi-send defects of the old implementation and may introduce new issues.
2024-05-25 10:08:18 +08:00
### 1.5.0
2023-09-28 16:02:54 +08:00
* Fixes and improvements
Important changes since 1.4:
2023-12-14 22:23:52 +08:00
* Add TLS [ECH server](/configuration/shared/tls/) support
2023-09-28 16:02:54 +08:00
* Improve TLS TCH client configuration
* Add TLS ECH key pair generator **1**
* Add TLS ECH support for QUIC based protocols **2**
* Add KDE support for the `set_system_proxy` option in HTTP inbound
* Add Hysteria2 protocol support **3**
* Add `interrupt_exist_connections` option for `Selector` and `URLTest` outbounds **4**
* Add DNS01 challenge support for ACME TLS certificate issuer **5**
* Add `merge` command **6**
2023-12-14 22:23:52 +08:00
* Mark [Deprecated Features](/deprecated/)
2023-09-28 16:02:54 +08:00
**1**:
Command: `sing-box generate ech-keypair <plain_server_name> [--pq-signature-schemes-enabled]`
**2**:
All inbounds and outbounds are supported, including `Naiveproxy`, `Hysteria[/2]`, `TUIC` and `V2ray QUIC transport`.
**3**:
2023-12-14 22:23:52 +08:00
See [Hysteria2 inbound](/configuration/inbound/hysteria2/) and [Hysteria2 outbound](/configuration/outbound/hysteria2/)
2023-09-28 16:02:54 +08:00
For protocol description, please refer to [https://v2.hysteria.network](https://v2.hysteria.network)
**4**:
Interrupt existing connections when the selected outbound has changed.
Only inbound connections are affected by this setting, internal connections will always be interrupted.
**5**:
Only `Alibaba Cloud DNS` and `Cloudflare` are supported, see [ACME Fields](/configuration/shared/tls#acme-fields)
2023-12-14 22:23:52 +08:00
and [DNS01 Challenge Fields](/configuration/shared/dns01_challenge/).
2023-09-28 16:02:54 +08:00
**6**:
This command also parses path resources that appear in the configuration file and replaces them with embedded
configuration, such as TLS certificates or SSH private keys.
2023-09-27 13:18:03 +08:00
#### 1.5.0-rc.6
* Fixes and improvements
#### 1.4.6
* Fixes and improvements
2023-09-25 18:03:53 +08:00
#### 1.5.0-rc.5
* Fixed an improper authentication vulnerability in the SOCKS5 inbound
* Fixes and improvements
**Security Advisory**
This update fixes an improper authentication vulnerability in the sing-box SOCKS inbound. This vulnerability allows an
attacker to craft special requests to bypass user authentication. All users exposing SOCKS servers with user
authentication in an insecure environment are advised to update immediately.
此更新修复了 sing-box SOCKS 入站中的一个不正确身份验证漏洞。 该漏洞允许攻击者制作特殊请求来绕过用户身份验证。建议所有将使用用户认证的
SOCKS 服务器暴露在不安全环境下的用户立更新。
#### 1.4.5
* Fixed an improper authentication vulnerability in the SOCKS5 inbound
* Fixes and improvements
**Security Advisory**
This update fixes an improper authentication vulnerability in the sing-box SOCKS inbound. This vulnerability allows an
attacker to craft special requests to bypass user authentication. All users exposing SOCKS servers with user
authentication in an insecure environment are advised to update immediately.
此更新修复了 sing-box SOCKS 入站中的一个不正确身份验证漏洞。 该漏洞允许攻击者制作特殊请求来绕过用户身份验证。建议所有将使用用户认证的
SOCKS 服务器暴露在不安全环境下的用户立更新。
2023-09-23 20:32:29 +08:00
#### 1.5.0-rc.3
2023-09-20 14:14:47 +08:00
* Fixes and improvements
2023-09-19 19:59:29 +08:00
#### 1.5.0-beta.12
* Add `merge` command **1**
* Fixes and improvements
**1**:
This command also parses path resources that appear in the configuration file and replaces them with embedded
configuration, such as TLS certificates or SSH private keys.
```
2023-09-23 20:32:29 +08:00
Merge configurations
2023-09-19 19:59:29 +08:00
Usage:
sing-box merge [output] [flags]
Flags:
-h, --help help for merge
Global Flags:
-c, --config stringArray set configuration file path
-C, --config-directory stringArray set configuration directory path
-D, --directory string set working directory
--disable-color disable color output
```
2023-09-16 23:45:40 +08:00
#### 1.5.0-beta.11
* Add DNS01 challenge support for ACME TLS certificate issuer **1**
* Fixes and improvements
**1**:
Only `Alibaba Cloud DNS` and `Cloudflare` are supported,
see [ACME Fields](/configuration/shared/tls#acme-fields)
2023-12-14 22:23:52 +08:00
and [DNS01 Challenge Fields](/configuration/shared/dns01_challenge/).
2023-09-16 23:45:40 +08:00
#### 1.5.0-beta.10
* Add `interrupt_exist_connections` option for `Selector` and `URLTest` outbounds **1**
* Fixes and improvements
**1**:
Interrupt existing connections when the selected outbound has changed.
Only inbound connections are affected by this setting, internal connections will always be interrupted.
#### 1.4.3
* Fixes and improvements
2023-09-09 22:46:20 +08:00
#### 1.5.0-beta.8
* Fixes and improvements
#### 1.4.2
* Fixes and improvements
#### 1.5.0-beta.6
* Fix compatibility issues with official Hysteria2 server and client
* Fixes and improvements
2023-12-14 22:23:52 +08:00
* Mark [deprecated features](/deprecated/)
2023-09-09 22:46:20 +08:00
#### 1.5.0-beta.3
* Fixes and improvements
* Updated Hysteria2 documentation **1**
**1**:
Added notes indicating compatibility issues with the official
Hysteria2 server and client when using `fastOpen=false` or UDP MTU >= 1200.
#### 1.5.0-beta.2
* Add hysteria2 protocol support **1**
* Fixes and improvements
**1**:
2023-12-14 22:23:52 +08:00
See [Hysteria2 inbound](/configuration/inbound/hysteria2/) and [Hysteria2 outbound](/configuration/outbound/hysteria2/)
2023-09-09 22:46:20 +08:00
For protocol description, please refer to [https://v2.hysteria.network](https://v2.hysteria.network)
#### 1.5.0-beta.1
2023-12-14 22:23:52 +08:00
* Add TLS [ECH server](/configuration/shared/tls/) support
2023-09-09 22:46:20 +08:00
* Improve TLS TCH client configuration
* Add TLS ECH key pair generator **1**
* Add TLS ECH support for QUIC based protocols **2**
* Add KDE support for the `set_system_proxy` option in HTTP inbound
**1**:
2023-09-28 16:02:54 +08:00
Command: `sing-box generate ech-keypair <plain_server_name> [--pq-signature-schemes-enabled]`
2023-09-09 22:46:20 +08:00
**2**:
All inbounds and outbounds are supported, including `Naiveproxy`, `Hysteria`, `TUIC` and `V2ray QUIC transport`.
2023-08-31 14:03:52 +08:00
#### 1.4.1
* Fixes and improvements
2024-05-25 10:08:18 +08:00
### 1.4.0
2023-08-26 20:47:19 +08:00
* Fix bugs and update dependencies
Important changes since 1.3:
* Add TUIC support **1**
* Add `udp_over_stream` option for TUIC client **2**
* Add MultiPath TCP support **3**
* Add `include_interface` and `exclude_interface` options for tun inbound
* Pause recurring tasks when no network or device idle
* Improve Android and Apple platform clients
*1*:
2023-12-14 22:23:52 +08:00
See [TUIC inbound](/configuration/inbound/tuic/)
and [TUIC outbound](/configuration/outbound/tuic/)
2023-08-26 20:47:19 +08:00
**2**:
2023-12-14 22:23:52 +08:00
This is the TUIC port of the [UDP over TCP protocol](/configuration/shared/udp-over-tcp/), designed to provide a QUIC
2023-08-26 20:47:19 +08:00
stream based UDP relay mode that TUIC does not provide. Since it is an add-on protocol, you will need to use sing-box or
another program compatible with the protocol as a server.
This mode has no positive effect in a proper UDP proxy scenario and should only be applied to relay streaming UDP
traffic (basically QUIC streams).
*3*:
Requires sing-box to be compiled with Go 1.21.
2023-08-25 20:33:16 +08:00
#### 1.4.0-rc.3
* Fixes and improvements
#### 1.4.0-rc.2
* Fixes and improvements
2023-08-21 18:24:31 +08:00
#### 1.4.0-rc.1
* Fix TUIC UDP
2023-08-20 14:15:11 +08:00
#### 1.4.0-beta.6
* Add `udp_over_stream` option for TUIC client **1**
* Add `include_interface` and `exclude_interface` options for tun inbound
* Fixes and improvements
**1**:
2023-12-14 22:23:52 +08:00
This is the TUIC port of the [UDP over TCP protocol](/configuration/shared/udp-over-tcp/), designed to provide a QUIC
2023-08-20 14:15:11 +08:00
stream based UDP relay mode that TUIC does not provide. Since it is an add-on protocol, you will need to use sing-box or
another program compatible with the protocol as a server.
This mode has no positive effect in a proper UDP proxy scenario and should only be applied to relay streaming UDP
traffic (basically QUIC streams).
#### 1.4.0-beta.5
* Fixes and improvements
#### 1.4.0-beta.4
* Graphical clients: Persistence group expansion state
* Fixes and improvements
#### 1.4.0-beta.3
* Fixes and improvements
#### 1.4.0-beta.2
* Add MultiPath TCP support **1**
* Drop QUIC support for Go 1.18 and 1.19 due to upstream changes
* Fixes and improvements
*1*:
Requires sing-box to be compiled with Go 1.21.
#### 1.4.0-beta.1
* Add TUIC support **1**
* Pause recurring tasks when no network or device idle
* Fixes and improvements
*1*:
2023-12-14 22:23:52 +08:00
See [TUIC inbound](/configuration/inbound/tuic/)
and [TUIC outbound](/configuration/outbound/tuic/)
2023-08-20 14:15:11 +08:00
2023-08-05 21:36:46 +08:00
#### 1.3.6
* Fixes and improvements
2023-07-31 09:41:42 +08:00
#### 1.3.5
* Fixes and improvements
2023-12-14 22:23:52 +08:00
* Introducing our [Apple tvOS](/installation/clients/sft/) client applications **1**
2023-07-31 09:41:42 +08:00
* Add per app proxy and app installed/updated trigger support for Android client
* Add profile sharing support for Android/iOS/macOS clients
**1**:
2023-08-20 14:15:11 +08:00
Due to the requirement of tvOS 17, the app cannot be submitted to the App Store for the time being, and can only be
downloaded through TestFlight.
2023-07-31 09:41:42 +08:00
2023-07-25 08:29:27 +08:00
#### 1.3.4
* Fixes and improvements
2023-08-20 14:15:11 +08:00
* We're now on the [App Store](https://apps.apple.com/us/app/sing-box/id6451272673), always free! It should be noted
that due to stricter and slower review, the release of Store versions will be delayed.
* We've made a standalone version of the macOS client (the original Application Extension relies on App Store
distribution), which you can download as SFM-version-universal.zip in the release artifacts.
2023-07-25 08:29:27 +08:00
2023-07-24 16:53:10 +08:00
#### 1.3.3
* Fixes and improvements
2023-07-19 14:45:35 +08:00
#### 1.3.1-rc.1
* Fix bugs and update dependencies
2023-07-11 15:45:26 +08:00
#### 1.3.1-beta.3
2023-12-19 19:17:44 +08:00
* Introducing our [new iOS](/installation/clients/sfi/) and [macOS](/installation/clients/sfm/) client applications **1
**
2023-07-11 15:45:26 +08:00
* Fixes and improvements
**1**:
The old testflight link and app are no longer valid.
2023-07-09 07:54:08 +08:00
#### 1.3.1-beta.2
* Fix bugs and update dependencies
2023-07-07 14:23:45 +08:00
#### 1.3.1-beta.1
* Fixes and improvements
2024-05-25 10:08:18 +08:00
### 1.3.0
2023-06-26 19:38:47 +08:00
* Fix bugs and update dependencies
Important changes since 1.2:
2023-12-14 22:23:52 +08:00
* Add [FakeIP](/configuration/dns/fakeip/) support **1**
2023-06-26 19:38:47 +08:00
* Improve multiplex **2**
* Add [DNS reverse mapping](/configuration/dns#reverse_mapping) support
* Add `rewrite_ttl` DNS rule action
* Add `store_fakeip` Clash API option
* Add multi-peer support for [WireGuard](/configuration/outbound/wireguard#peers) outbound
* Add loopback detect
* Add Clash.Meta API compatibility for Clash API
* Download Yacd-meta by default if the specified Clash `external_ui` directory is empty
* Add path and headers option for HTTP outbound
* Perform URLTest recheck after network changes
* Fix `system` tun stack for ios
* Fix network monitor for android/ios
* Update VLESS and XUDP protocol
* Make splice work with traffic statistics systems like Clash API
* Significantly reduces memory usage of idle connections
* Improve DNS caching
* Add `independent_cache` [option](/configuration/dns#independent_cache) for DNS
* Reimplemented shadowsocks client
* Add multiplex support for VLESS outbound
* Automatically add Windows firewall rules in order for the system tun stack to work
* Fix TLS 1.2 support for shadow-tls client
* Add `cache_id` [option](/configuration/experimental#cache_id) for Clash cache file
* Fix `local` DNS transport for Android
*1*:
2023-12-14 22:23:52 +08:00
See [FAQ](/faq/fakeip/) for more information.
2023-06-26 19:38:47 +08:00
*2*:
2023-12-14 22:23:52 +08:00
Added new `h2mux` multiplex protocol and `padding` multiplex option, see [Multiplex](/configuration/shared/multiplex/).
2023-06-26 19:38:47 +08:00
2023-06-19 13:31:38 +08:00
#### 1.3-rc2
* Fix `local` DNS transport for Android
* Fix bugs and update dependencies
2023-06-17 12:21:18 +08:00
#### 1.3-rc1
* Fix bugs and update dependencies
2023-06-14 16:28:44 +08:00
#### 1.3-beta14
* Fixes and improvements
2023-06-07 21:10:01 +08:00
#### 1.3-beta13
2023-05-19 15:47:10 +08:00
2023-06-07 21:10:01 +08:00
* Fix resolving fakeip domains **1**
* Deprecate L3 routing
2023-05-19 15:47:10 +08:00
* Fix bugs and update dependencies
2023-06-07 21:10:01 +08:00
**1**:
If the destination address of the connection is obtained from fakeip, dns rules with server type fakeip will be skipped.
#### 1.3-beta12
* Automatically add Windows firewall rules in order for the system tun stack to work
* Fix TLS 1.2 support for shadow-tls client
* Add `cache_id` [option](/configuration/experimental#cache_id) for Clash cache file
* Fixes and improvements
#### 1.3-beta11
* Fix bugs and update dependencies
#### 1.3-beta10
* Improve direct copy **1**
* Improve DNS caching
* Add `independent_cache` [option](/configuration/dns#independent_cache) for DNS
* Reimplemented shadowsocks client **2**
* Add multiplex support for VLESS outbound
* Set TCP keepalive for WireGuard gVisor TCP connections
* Fixes and improvements
**1**:
* Make splice work with traffic statistics systems like Clash API
* Significantly reduces memory usage of idle connections
**2**:
Improved performance and reduced memory usage.
#### 1.3-beta9
* Improve multiplex **1**
* Fixes and improvements
*1*:
2023-12-14 22:23:52 +08:00
Added new `h2mux` multiplex protocol and `padding` multiplex option, see [Multiplex](/configuration/shared/multiplex/).
2023-06-07 21:10:01 +08:00
2023-04-21 17:51:23 +08:00
#### 1.2.6
2023-04-16 16:16:03 +08:00
2023-04-21 17:51:23 +08:00
* Fix bugs and update dependencies
2023-04-16 16:16:03 +08:00
2023-06-07 21:10:01 +08:00
#### 1.3-beta8
* Fix `system` tun stack for ios
* Fix network monitor for android/ios
* Update VLESS and XUDP protocol **1**
* Fixes and improvements
*1:
This is an incompatible update for XUDP in VLESS if vision flow is enabled.
#### 1.3-beta7
* Add `path` and `headers` options for HTTP outbound
* Add multi-user support for Shadowsocks legacy AEAD inbound
* Fixes and improvements
#### 1.2.4
* Fixes and improvements
#### 1.3-beta6
* Fix WireGuard reconnect
* Perform URLTest recheck after network changes
* Fix bugs and update dependencies
#### 1.3-beta5
* Add Clash.Meta API compatibility for Clash API
* Download Yacd-meta by default if the specified Clash `external_ui` directory is empty
* Add path and headers option for HTTP outbound
* Fixes and improvements
#### 1.3-beta4
* Fix bugs
#### 1.3-beta2
* Download clash-dashboard if the specified Clash `external_ui` directory is empty
* Fix bugs and update dependencies
#### 1.3-beta1
* Add [DNS reverse mapping](/configuration/dns#reverse_mapping) support
2023-12-14 22:23:52 +08:00
* Add [L3 routing](/configuration/route/ip-rule/) support **1**
2023-06-07 21:10:01 +08:00
* Add `rewrite_ttl` DNS rule action
2023-12-14 22:23:52 +08:00
* Add [FakeIP](/configuration/dns/fakeip/) support **2**
2023-06-07 21:10:01 +08:00
* Add `store_fakeip` Clash API option
* Add multi-peer support for [WireGuard](/configuration/outbound/wireguard#peers) outbound
* Add loopback detect
*1*:
2023-12-14 22:23:52 +08:00
It can currently be used to [route connections directly to WireGuard](/examples/wireguard-direct/) or block connections
2023-06-07 21:10:01 +08:00
at the IP layer.
*2*:
2023-12-14 22:23:52 +08:00
See [FAQ](/faq/fakeip/) for more information.
2023-06-07 21:10:01 +08:00
2023-04-07 19:17:36 +08:00
#### 1.2.3
2023-12-14 22:23:52 +08:00
* Introducing our [new Android client application](/installation/clients/sfa/)
2023-04-07 19:17:36 +08:00
* Improve UDP domain destination NAT
* Update reality protocol
* Fix TTL calculation for DNS response
* Fix v2ray HTTP transport compatibility
* Fix bugs and update dependencies
2023-03-31 16:29:08 +08:00
#### 1.2.2
* Accept `any` outbound in dns rule **1**
* Fix bugs and update dependencies
*1*:
2023-04-07 19:17:36 +08:00
Now you can use the `any` outbound rule to match server address queries instead of filling in all server domains
to `domain` rule.
2023-03-31 16:29:08 +08:00
2023-03-27 08:20:10 +08:00
#### 1.2.1
* Fix missing default host in v2ray http transport`s request
* Flush DNS cache for macOS when tun start/close
* Fix tun's DNS hijacking compatibility with systemd-resolved
2024-05-25 10:08:18 +08:00
### 1.2.0
2023-03-24 08:04:36 +08:00
* Fix bugs and update dependencies
Important changes since 1.1:
2023-12-14 22:23:52 +08:00
* Introducing our [new iOS client application](/installation/clients/sfi/)
* Introducing [UDP over TCP protocol version 2](/configuration/shared/udp-over-tcp/)
2023-03-24 08:04:36 +08:00
* Add [platform options](/configuration/inbound/tun#platform) for tun inbound
* Add [ShadowTLS protocol v3](https://github.com/ihciah/shadow-tls/blob/master/docs/protocol-v3-en.md)
2023-12-14 22:23:52 +08:00
* Add [VLESS server](/configuration/inbound/vless/) and [vision](/configuration/outbound/vless#flow) support
* Add [reality TLS](/configuration/shared/tls/) support
* Add [NTP service](/configuration/ntp/)
* Add [DHCP DNS server](/configuration/dns/server/) support
* Add SSH [host key validation](/configuration/outbound/ssh/) support
* Add [query_type](/configuration/dns/rule/) DNS rule item
2023-03-24 08:04:36 +08:00
* Add fallback support for v2ray transport
* Add custom TLS server support for http based v2ray transports
* Add health check support for http-based v2ray transports
* Add multiple configuration support
2023-03-23 07:54:24 +08:00
#### 1.2-rc1
* Fix bugs and update dependencies
2023-03-20 17:32:59 +08:00
#### 1.2-beta10
* Add multiple configuration support **1**
* Fix bugs and update dependencies
*1*:
2023-03-23 07:54:24 +08:00
Now you can pass the parameter `--config` or `-c` multiple times, or use the new parameter `--config-directory` or `-C`
to load all configuration files in a directory.
2023-03-20 17:32:59 +08:00
2023-03-23 07:54:24 +08:00
Loaded configuration files are sorted by name. If you want to control the merge order, add a numeric prefix to the file
name.
2023-03-20 17:32:59 +08:00
2023-03-17 15:40:41 +08:00
#### 1.1.7
* Improve the stability of the VMESS server
* Fix `auto_detect_interface` incorrectly identifying the default interface on Windows
* Fix bugs and update dependencies
2023-03-17 13:00:09 +08:00
#### 1.2-beta9
2023-12-14 22:23:52 +08:00
* Introducing the [UDP over TCP protocol version 2](/configuration/shared/udp-over-tcp/)
2023-03-17 13:00:09 +08:00
* Add health check support for http-based v2ray transports
* Remove length limit on short_id for reality TLS config
* Fix bugs and update dependencies
2023-03-09 23:16:38 +08:00
#### 1.2-beta8
* Update reality and uTLS libraries
* Fix `auto_detect_interface` incorrectly identifying the default interface on Windows
2023-03-08 14:51:52 +08:00
#### 1.2-beta7
* Fix the compatibility issue between VLESS's vision sub-protocol and the Xray-core client
* Improve the stability of the VMESS server
2023-03-05 21:48:36 +08:00
#### 1.2-beta6
2023-12-14 22:23:52 +08:00
* Introducing our [new iOS client application](/installation/clients/sfi/)
2023-03-05 21:48:36 +08:00
* Add [platform options](/configuration/inbound/tun#platform) for tun inbound
* Add custom TLS server support for http based v2ray transports
* Add generate commands
* Enable XUDP by default in VLESS
* Update reality server
* Update vision protocol
* Fixed [user flow in vless server](/configuration/inbound/vless#usersflow)
* Bug fixes
* Update dependencies
2023-02-25 16:23:51 +08:00
#### 1.2-beta5
2023-12-14 22:23:52 +08:00
* Add [VLESS server](/configuration/inbound/vless/) and [vision](/configuration/outbound/vless#flow) support
* Add [reality TLS](/configuration/shared/tls/) support
2023-02-25 16:23:51 +08:00
* Fix match private address
2023-02-22 11:24:51 +08:00
#### 1.1.6
* Improve vmess request
* Fix ipv6 redirect on Linux
* Fix match geoip private
* Fix parse hysteria UDP message
* Fix socks connect response
* Disable vmess header protection if transport enabled
* Update QUIC v2 version number and initial salt
2023-02-21 20:20:17 +08:00
#### 1.2-beta4
2023-12-14 22:23:52 +08:00
* Add [NTP service](/configuration/ntp/)
2023-02-21 20:20:17 +08:00
* Add Add multiple server names and multi-user support for shadowtls
* Add strict mode support for shadowtls v3
2023-02-21 21:18:43 +08:00
* Add uTLS support for shadowtls v3
2023-02-21 20:20:17 +08:00
2023-02-19 17:44:43 +08:00
#### 1.2-beta3
* Update QUIC v2 version number and initial salt
* Fix shadowtls v3 implementation
2023-02-18 15:02:27 +08:00
#### 1.2-beta2
* Add [ShadowTLS protocol v3](https://github.com/ihciah/shadow-tls/blob/master/docs/protocol-v3-en.md)
* Add fallback support for v2ray transport
* Fix parse hysteria UDP message
* Fix socks connect response
* Disable vmess header protection if transport enabled
2023-02-08 17:18:18 +08:00
#### 1.2-beta1
2023-12-14 22:23:52 +08:00
* Add [DHCP DNS server](/configuration/dns/server/) support
* Add SSH [host key validation](/configuration/outbound/ssh/) support
* Add [query_type](/configuration/dns/rule/) DNS rule item
2023-02-08 17:18:18 +08:00
* Add v2ray [user stats](/configuration/experimental#statsusers) api
* Add new clash DNS query api
* Improve vmess request
* Fix ipv6 redirect on Linux
* Fix match geoip private
2023-02-02 16:11:29 +08:00
#### 1.1.5
* Add Go 1.20 support
* Fix inbound default DF value
* Fix auth_user route for naive inbound
* Fix gRPC lite header
* Ignore domain case in route rules
2023-01-14 16:01:07 +08:00
#### 1.1.4
* Fix DNS log
* Fix write to h2 conn after closed
* Fix create UDP DNS transport from plain IPv6 address
2023-01-03 10:53:38 +08:00
#### 1.1.2
* Fix http proxy auth
* Fix user from stream packet conn
* Fix DNS response TTL
* Fix override packet conn
* Skip override system proxy bypass list
* Improve DNS log
2022-12-11 14:40:03 +08:00
#### 1.1.1
* Fix acme config
* Fix vmess packet conn
* Suppress quic-go set DF error
2022-12-03 13:31:25 +08:00
#### 1.1
* Fix close clash cache
Important changes since 1.0:
* Add support for use with android VPNService
* Add tun support for WireGuard outbound
* Add system tun stack
* Add comment filter for config
* Add option for allow optional proxy protocol header
* Add Clash mode and persistence support
* Add TLS ECH and uTLS support for outbound TLS options
* Add internal simple-obfs and v2ray-plugin
* Add ShadowsocksR outbound
* Add VLESS outbound and XUDP
* Skip wait for hysteria tcp handshake response
* Add v2ray mux support for all inbound
2023-03-17 13:00:09 +08:00
* Add XUDP support for VMess
2022-12-03 13:31:25 +08:00
* Improve websocket writer
* Refine tproxy write back
* Fix DNS leak caused by
Windows' ordinary multihomed DNS resolution behavior
* Add sniff_timeout listen option
* Add custom route support for tun
* Add option for custom wireguard reserved bytes
* Split bind_address into ipv4 and ipv6
* Add ShadowTLS v1 and v2 support
2022-11-28 12:52:12 +08:00
#### 1.1-rc1
* Fix TLS config for h2 server
* Fix crash when input bad method in shadowsocks multi-user inbound
* Fix listen UDP
* Fix check invalid packet on macOS
2022-11-25 22:49:30 +08:00
#### 1.1-beta18
2022-11-26 11:06:57 +08:00
* Enhance defense against active probe for shadowtls server **1**
2022-11-25 22:49:30 +08:00
**1**:
The `fallback_after` option has been removed.
2022-11-21 21:12:11 +08:00
#### 1.1-beta17
* Fix shadowtls server **1**
*1*:
2022-11-25 22:49:30 +08:00
Added [fallback_after](/configuration/inbound/shadowtls#fallback_after) option.
2022-11-21 21:12:11 +08:00
2022-11-21 14:57:22 +08:00
#### 1.0.7
* Add support for new x/h2 deadline
* Fix copy pipe
* Fix decrypt xplus packet
* Fix macOS Ventura process name match
* Fix smux keepalive
* Fix vmess request buffer
* Fix h2c transport
* Fix tor geoip
* Fix udp connect for mux client
* Fix default dns transport strategy
2022-11-15 20:29:33 +08:00
#### 1.1-beta16
* Improve shadowtls server
* Fix default dns transport strategy
* Update uTLS to v1.2.0
2022-11-09 11:49:01 +08:00
#### 1.1-beta15
* Add support for new x/h2 deadline
* Fix udp connect for mux client
* Fix dns buffer
* Fix quic dns retry
2022-11-15 20:29:33 +08:00
* Fix create TLS config
2022-11-09 11:49:01 +08:00
* Fix websocket alpn
* Fix tor geoip
2022-11-09 11:40:36 +08:00
#### 1.1-beta14
* Add multi-user support for hysteria inbound **1**
* Add custom tls client support for std grpc
* Fix smux keep alive
* Fix vmess request buffer
* Fix default local DNS server behavior
* Fix h2c transport
*1*:
The `auth` and `auth_str` fields have been replaced by the `users` field.
2022-11-03 12:07:16 +08:00
#### 1.1-beta13
* Add custom worker count option for WireGuard outbound
2022-11-03 12:07:16 +08:00
* Split bind_address into ipv4 and ipv6
* Move WFP manipulation to strict route
2022-11-03 12:07:16 +08:00
* Fix WireGuard outbound panic when close
* Fix macOS Ventura process name match
2022-11-08 13:31:55 +08:00
* Fix QUIC connection migration by @HyNetwork
* Fix handling QUIC client SNI by @HyNetwork
2022-11-03 12:07:16 +08:00
2022-10-31 13:56:51 +08:00
#### 1.1-beta12
* Fix uTLS config
* Update quic-go to v0.30.0
* Update cloudflare-tls to go1.18.7
2022-10-25 21:26:28 +08:00
#### 1.1-beta11
2022-10-29 18:00:05 +08:00
* Add option for custom wireguard reserved bytes
2022-10-25 21:26:28 +08:00
* Fix shadowtls v2
* Fix h3 dns transport
* Fix copy pipe
2022-10-29 18:00:05 +08:00
* Fix decrypt xplus packet
* Fix v2ray api
* Suppress no network error
* Improve local dns transport
2022-10-25 21:26:28 +08:00
2022-10-19 10:43:59 +08:00
#### 1.1-beta10
* Add [sniff_timeout](/configuration/shared/listen#sniff_timeout) listen option
* Add [custom route](/configuration/inbound/tun#inet4_route_address) support for tun **1**
* Fix interface monitor
* Fix websocket headroom
* Fix uTLS handshake
* Fix ssh outbound
* Fix sniff fragmented quic client hello
* Fix DF for hysteria
* Fix naive overflow
* Check destination before udp connect
* Update uTLS to v1.1.5
* Update tfo-go to v2.0.2
* Update fsnotify to v1.6.0
* Update grpc to v1.50.1
*1*:
The `strict_route` on windows is removed.
#### 1.0.6
* Fix ssh outbound
* Fix sniff fragmented quic client hello
* Fix naive overflow
* Check destination before udp connect
2022-10-01 11:48:46 +08:00
#### 1.1-beta9
2022-10-06 22:51:51 +08:00
* Fix windows route **1**
* Add [v2ray statistics api](/configuration/experimental#v2ray-api-fields)
* Add ShadowTLS v2 support **2**
* Fixes and improvements
2022-10-01 11:48:46 +08:00
**1**:
* Fix DNS leak caused by
Windows' [ordinary multihomed DNS resolution behavior](https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd197552%28v%3Dws.10%29)
* Flush Windows DNS cache when start/close
2022-10-06 22:51:51 +08:00
**2**:
See [ShadowTLS inbound](/configuration/inbound/shadowtls#version)
and [ShadowTLS outbound](/configuration/outbound/shadowtls#version)
2022-10-06 22:51:51 +08:00
2022-09-25 16:23:30 +08:00
#### 1.1-beta8
* Fix leaks on close
* Improve websocket writer
* Refine tproxy write back
* Refine 4in6 processing
* Fix shadowsocks plugins
* Fix missing source address from transport connection
* Fix fqdn socks5 outbound connection
* Fix read source address from grpc-go
#### 1.0.5
* Fix missing source address from transport connection
* Fix fqdn socks5 outbound connection
* Fix read source address from grpc-go
2022-09-23 10:30:07 +08:00
#### 1.1-beta7
* Add v2ray mux and XUDP support for VMess inbound
* Add XUDP support for VMess outbound
* Disable DF on direct outbound by default
* Fix bugs in 1.1-beta6
2022-09-16 15:48:31 +08:00
#### 1.1-beta6
2023-12-14 22:23:52 +08:00
* Add [URLTest outbound](/configuration/outbound/urltest/)
2022-09-16 15:48:31 +08:00
* Fix bugs in 1.1-beta5
2022-09-15 13:25:51 +08:00
#### 1.1-beta5
* Print tags in version command
* Redirect clash hello to external ui
* Move shadowsocksr implementation to clash
* Make gVisor optional **1**
* Refactor to miekg/dns
* Refactor bind control
* Fix build on go1.18
* Fix clash store-selected
* Fix close grpc conn
* Fix port rule match logic
* Fix clash api proxy type
*1*:
The build tag `no_gvisor` is replaced by `with_gvisor`.
The default tun stack is changed to system.
#### 1.0.4
* Fix close grpc conn
* Fix port rule match logic
* Fix clash api proxy type
2022-09-13 11:24:33 +08:00
#### 1.1-beta4
* Add internal simple-obfs and v2ray-plugin [Shadowsocks plugins](/configuration/outbound/shadowsocks#plugin)
2023-12-14 22:23:52 +08:00
* Add [ShadowsocksR outbound](/configuration/outbound/shadowsocksr/)
* Add [VLESS outbound and XUDP](/configuration/outbound/vless/)
2022-09-13 11:24:33 +08:00
* Skip wait for hysteria tcp handshake response
* Fix socks4 client
* Fix hysteria inbound
* Fix concurrent write
#### 1.0.3
* Fix socks4 client
* Fix hysteria inbound
* Fix concurrent write
2022-09-11 10:57:51 +08:00
#### 1.1-beta3
* Fix using custom TLS client in http2 client
* Fix bugs in 1.1-beta2
2022-09-10 22:42:20 +08:00
#### 1.1-beta2
* Add Clash mode and persistence support **1**
* Add TLS ECH and uTLS support for outbound TLS options **2**
* Fix socks4 request
* Fix processing empty dns result
*1*:
Switching modes using the Clash API, and `store-selected` are now supported,
2023-12-14 22:23:52 +08:00
see [Experimental](/configuration/experimental/).
2022-09-10 22:42:20 +08:00
*2*:
ECH (Encrypted Client Hello) is a TLS extension that allows a client to encrypt the first part of its ClientHello
message, see [TLS#ECH](/configuration/shared/tls#ech).
uTLS is a fork of "crypto/tls", which provides ClientHello fingerprinting resistance,
see [TLS#uTLS](/configuration/shared/tls#utls).
#### 1.0.2
* Fix socks4 request
* Fix processing empty dns result
2022-09-09 15:40:35 +08:00
#### 1.1-beta1
* Add support for use with android VPNService **1**
* Add tun support for WireGuard outbound **2**
* Add system tun stack **3**
* Add comment filter for config **4**
* Add option for allow optional proxy protocol header
* Add half close for smux
* Set UDP DF by default **5**
* Set default tun mtu to 9000
* Update gVisor to 20220905.0
*1*:
In previous versions, Android VPN would not work with tun enabled.
The usage of tun over VPN and VPN over tun is now supported, see [Tun Inbound](/configuration/inbound/tun#auto_route).
*2*:
In previous releases, WireGuard outbound support was backed by the lower performance gVisor virtual interface.
It achieves the same performance as wireguard-go by providing automatic system interface support.
*3*:
It does not depend on gVisor and has better performance in some cases.
It is less compatible and may not be available in some environments.
*4*:
Annotated json configuration files are now supported.
*5*:
UDP fragmentation is now blocked by default.
Including shadowsocks-libev, shadowsocks-rust and quic-go all disable segmentation by default.
See [Dial Fields](/configuration/shared/dial#udp_fragment)
and [Listen Fields](/configuration/shared/listen#udp_fragment).
2022-09-09 14:43:42 +08:00
#### 1.0.1
* Fix match 4in6 address in ip_cidr
* Fix clash api log level format error
* Fix clash api unknown proxy type
2022-09-07 23:10:12 +08:00
#### 1.0
* Fix wireguard reconnect
* Fix naive inbound
* Fix json format error message
* Fix processing vmess termination signal
* Fix hysteria stream error
* Fix listener close when proxyproto failed
2022-09-04 13:13:54 +08:00
#### 1.0-rc1
* Fix write log timestamp
* Fix write zero
* Fix dial parallel in direct outbound
* Fix write trojan udp
* Fix DNS routing
* Add attribute support for geosite
2023-12-14 22:23:52 +08:00
* Update documentation for [Dial Fields](/configuration/shared/dial/)
2022-09-04 13:13:54 +08:00
2022-08-31 14:33:52 +08:00
#### 1.0-beta3
* Add [chained inbound](/configuration/shared/listen#detour) support
* Add process_path rule item
* Add macOS redirect support
2023-12-14 22:23:52 +08:00
* Add ShadowTLS [Inbound](/configuration/inbound/shadowtls/), [Outbound](/configuration/outbound/shadowtls/)
and [Examples](/examples/shadowtls/)
2022-08-31 14:33:52 +08:00
* Fix search android package in non-owner users
* Fix socksaddr type condition
* Fix smux session status
* Refactor inbound and outbound documentation
* Minor fixes
2022-08-27 21:32:20 +08:00
#### 1.0-beta2
* Add strict_route option for [Tun inbound](/configuration/inbound/tun#strict_route)
* Add packetaddr support for [VMess outbound](/configuration/outbound/vmess#packet_addr)
* Add better performing alternative gRPC implementation
2022-08-28 11:27:51 +08:00
* Add [docker image](https://github.com/SagerNet/sing-box/pkgs/container/sing-box)
2022-08-27 21:32:20 +08:00
* Fix sniff override destination
2022-08-26 16:33:12 +08:00
#### 1.0-beta1
* Initial release
##### 2022/08/26
2022-08-26 12:30:31 +08:00
* Fix ipv6 route on linux
2022-08-26 16:33:12 +08:00
* Fix read DNS message
2022-08-26 12:30:31 +08:00
2022-08-26 16:33:12 +08:00
##### 2022/08/25
2022-08-25 22:49:23 +08:00
* Let vmess use zero instead of auto if TLS enabled
* Add trojan fallback for ALPN
* Improve ip_cidr rule
* Fix format bind_address
* Fix http proxy with compressed response
* Fix route connections
2022-08-26 16:33:12 +08:00
##### 2022/08/24
2022-08-25 10:01:50 +08:00
* Fix naive padding
* Fix unix search path
* Fix close non-duplex connections
* Add ACME EAB support
* Fix early close on windows and catch any
* Initial zh-CN document translation
2022-08-26 16:33:12 +08:00
##### 2022/08/23
2022-08-23 23:15:56 +08:00
2023-12-14 22:23:52 +08:00
* Add [V2Ray Transport](/configuration/shared/v2ray-transport/) support for VMess and Trojan
2022-08-23 23:15:56 +08:00
* Allow plain http request in Naive inbound (It can now be used with nginx)
* Add proxy protocol support
* Free memory after start
* Parse X-Forward-For in HTTP requests
* Handle SIGHUP signal
2022-08-26 16:33:12 +08:00
##### 2022/08/22
2022-08-22 12:43:21 +08:00
2023-12-14 22:23:52 +08:00
* Add strategy setting for each [DNS server](/configuration/dns/server/)
2022-08-22 14:28:23 +08:00
* Add bind address to outbound options
2022-08-22 12:43:21 +08:00
2022-08-26 16:33:12 +08:00
##### 2022/08/21
2022-08-21 00:59:49 +08:00
2023-12-14 22:23:52 +08:00
* Add [Tor outbound](/configuration/outbound/tor/)
* Add [SSH outbound](/configuration/outbound/ssh/)
2022-08-21 00:59:49 +08:00
2022-08-26 16:33:12 +08:00
##### 2022/08/20
2022-08-20 20:54:20 +08:00
* Attempt to unwrap ip-in-fqdn socksaddr
* Fix read packages in android 12
* Fix route on some android devices
* Improve linux process searcher
* Fix write socks5 username password auth request
* Skip bind connection with private destination to interface
2022-08-20 21:14:51 +08:00
* Add [Trojan connection fallback](/configuration/inbound/trojan#fallback)
2022-08-20 20:54:20 +08:00
2022-08-26 16:33:12 +08:00
##### 2022/08/19
2022-08-19 19:02:32 +08:00
2023-12-14 22:23:52 +08:00
* Add Hysteria [Inbound](/configuration/inbound/hysteria/) and [Outbund](/configuration/outbound/hysteria/)
* Add [ACME TLS certificate issuer](/configuration/shared/tls/)
2022-08-19 19:02:32 +08:00
* Allow read config from stdin (-c stdin)
* Update gVisor to 20220815.0
2022-08-26 16:33:12 +08:00
##### 2022/08/18
2022-08-19 19:02:32 +08:00
* Fix find process with lwip stack
* Fix crash on shadowsocks server
* Fix crash on darwin tun
* Fix write log to file
2022-08-26 16:33:12 +08:00
##### 2022/08/17
2022-08-19 19:02:32 +08:00
* Improve async dns transports
2022-08-26 16:33:12 +08:00
##### 2022/08/16
2022-08-17 15:19:10 +08:00
* Add ip_version (route/dns) rule item
2023-12-14 22:23:52 +08:00
* Add [WireGuard](/configuration/outbound/wireguard/) outbound
2022-08-17 15:19:10 +08:00
2022-08-26 16:33:12 +08:00
##### 2022/08/15
2023-12-14 22:23:52 +08:00
* Add uid, android user and package rules support in [Tun](/configuration/inbound/tun/) routing.
2022-08-26 16:33:12 +08:00
##### 2022/08/13
* Fix dns concurrent write
2022-08-26 16:33:12 +08:00
##### 2022/08/12
2022-08-12 17:55:52 +08:00
* Performance improvements
2023-12-14 22:23:52 +08:00
* Add UoT option for [SOCKS](/configuration/outbound/socks/) outbound
2022-08-12 17:55:52 +08:00
2022-08-26 16:33:12 +08:00
##### 2022/08/11
2022-08-11 10:36:28 +08:00
2023-12-14 22:23:52 +08:00
* Add UoT option for [Shadowsocks](/configuration/outbound/shadowsocks/) outbound, UoT support for all inbounds
2022-08-11 10:36:28 +08:00
2022-08-26 16:33:12 +08:00
##### 2022/08/10
2022-08-10 21:17:02 +08:00
2023-12-14 22:23:52 +08:00
* Add full-featured [Naive](/configuration/inbound/naive/) inbound
2022-08-10 21:17:02 +08:00
* Fix default dns server option [#9] by iKirby
2022-08-26 16:33:12 +08:00
##### 2022/08/09
2022-08-08 20:57:50 +08:00
2022-08-10 21:17:02 +08:00
No changelog before.
2022-08-31 14:33:52 +08:00
[#9]: https://github.com/SagerNet/sing-box/pull/9