|
2 | 2 | icon: material/alert-decagram
|
3 | 3 | ---
|
4 | 4 |
|
| 5 | +#### 1.12.0-alpha.3 |
| 6 | + |
| 7 | +* Fixes and improvements |
| 8 | + |
5 | 9 | ### 1.11.1
|
6 | 10 |
|
7 | 11 | * Fixes and improvements
|
8 | 12 |
|
| 13 | +#### 1.12.0-alpha.2 |
| 14 | + |
| 15 | +* Update quic-go to v0.49.0 |
| 16 | +* Fixes and improvements |
| 17 | + |
| 18 | +#### 1.12.0-alpha.1 |
| 19 | + |
| 20 | +* Refactor DNS servers **1** |
| 21 | +* Add domain resolver options**2** |
| 22 | +* Add TLS fragment route options **3** |
| 23 | +* Add certificate options **4** |
| 24 | + |
| 25 | +**1**: |
| 26 | + |
| 27 | +DNS servers are refactored for better performance and scalability. |
| 28 | + |
| 29 | +See [DNS server](/configuration/dns/server/). |
| 30 | + |
| 31 | +For migration, see [Migrate to new DNS server formats](/migration/#migrate-to-new-dns-servers). |
| 32 | + |
| 33 | +Compatibility for old formats will be removed in sing-box 1.14.0. |
| 34 | + |
| 35 | +**2**: |
| 36 | + |
| 37 | +Legacy `outbound` DNS rules are deprecated |
| 38 | +and can be replaced by the new `domain_resolver` option. |
| 39 | + |
| 40 | +See [Dial Fields](/configuration/shared/dial/#domain_resolver) and |
| 41 | +[Route](/configuration/route/#default_domain_resolver). |
| 42 | + |
| 43 | +For migration, see [Migrate outbound DNS rule items to domain resolver](/migration/#migrate-outbound-dns-rule-items-to-domain-resolver). |
| 44 | + |
| 45 | +**3**: |
| 46 | + |
| 47 | +The new TLS fragment route options allow you to fragment TLS handshakes to bypass firewalls. |
| 48 | + |
| 49 | +This feature is intended to circumvent simple firewalls based on **plaintext packet matching**, and should not be used to circumvent real censorship. |
| 50 | + |
| 51 | +Since it is not designed for performance, it should not be applied to all connections, but only to server names that are known to be blocked. |
| 52 | + |
| 53 | +See [Route Action](/configuration/route/rule_action/#tls_fragment). |
| 54 | + |
| 55 | +**4**: |
| 56 | + |
| 57 | +New certificate options allow you to manage the default list of trusted X509 CA certificates. |
| 58 | + |
| 59 | +For the system certificate list, fixed Go not reading Android trusted certificates correctly. |
| 60 | + |
| 61 | +You can also use the Mozilla Included List instead, or add trusted certificates yourself. |
| 62 | + |
| 63 | +See [Certificate](/configuration/certificate/). |
| 64 | + |
9 | 65 | ### 1.11.0
|
10 | 66 |
|
11 | 67 | Important changes since 1.10:
|
|
0 commit comments