Skip to content

Commit 8769d13

Browse files
committed
documentation: Bump version
1 parent f6f74a7 commit 8769d13

File tree

1 file changed

+98
-0
lines changed

1 file changed

+98
-0
lines changed

docs/changelog.md

Lines changed: 98 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,31 @@
22
icon: material/alert-decagram
33
---
44

5+
#### 1.13.0-alpha.28
6+
7+
* Add naiveproxy outbound **1**
8+
* Add `disable_tcp_keep_alive`, `tcp_keep_alive` and `tcp_keep_alive_interval` options for dial fields **2**
9+
* Update default TCP keep-alive initial period from 10 minutes to 5 minutes
10+
* Update quic-go to v0.57.1
11+
* Fixes and improvements
12+
13+
**1**:
14+
15+
Only available on Apple platforms, Android, Windows and some Linux architectures.
16+
17+
See [NaiveProxy outbound](/configuration/outbound/naive/).
18+
19+
**2**:
20+
21+
See [Dial Fields](/configuration/shared/dial/#tcp_keep_alive).
22+
23+
* __Unfortunately, for non-technical reasons, we are currently unable to notarize the standalone version of the macOS client:
24+
because system extensions require signatures to function, we have had to temporarily halt its release.__
25+
26+
__We plan to fix the App Store release issue and launch a new standalone desktop client, but until then,
27+
only clients on TestFlight will be available (unless you have an Apple Developer Program and compile from source code).__
28+
29+
530
#### 1.12.13
631

732
* Fix naive inbound
@@ -17,10 +42,49 @@ only clients on TestFlight will be available (unless you have an Apple Developer
1742

1843
* Fixes and improvements
1944

45+
#### 1.13.0-alpha.26
46+
47+
* Update quic-go to v0.55.0
48+
* Fix memory leak in hysteria2
49+
* Fixes and improvements
50+
2051
#### 1.12.11
2152

2253
* Fixes and improvements
2354

55+
#### 1.13.0-alpha.24
56+
57+
* Add Claude Code Multiplexer service **1**
58+
* Fixes and improvements
59+
60+
**1**:
61+
62+
CCM (Claude Code Multiplexer) service allows you to access your local Claude Code subscription remotely through custom tokens, eliminating the need for OAuth authentication on remote clients.
63+
64+
See [CCM](/configuration/service/ccm).
65+
66+
#### 1.13.0-alpha.23
67+
68+
* Fix compatibility with MPTCP **1**
69+
* Fixes and improvements
70+
71+
**1**:
72+
73+
`auto_redirect` now rejects MPTCP connections by default to fix compatibility issues,
74+
but you can change it to bypass the sing-box via the new `exclude_mptcp` option.
75+
76+
See [TUN](/configuration/inbound/tun/#exclude_mptcp).
77+
78+
#### 1.13.0-alpha.22
79+
80+
* Update uTLS to v1.8.1 **1**
81+
* Fixes and improvements
82+
83+
**1**:
84+
85+
This update fixes an critical issue that could cause simulated Chrome fingerprints to be detected,
86+
see https://github.com/refraction-networking/utls/pull/375.
87+
2488
#### 1.12.10
2589

2690
* Update uTLS to v1.8.1 **1**
@@ -31,18 +95,52 @@ only clients on TestFlight will be available (unless you have an Apple Developer
3195
This update fixes an critical issue that could cause simulated Chrome fingerprints to be detected,
3296
see https://github.com/refraction-networking/utls/pull/375.
3397

98+
#### 1.13.0-alpha.21
99+
100+
* Fix missing mTLS support in client options **1**
101+
* Fixes and improvements
102+
103+
See [TLS](/configuration/shared/tls/).
104+
34105
#### 1.12.9
35106

36107
* Fixes and improvements
37108

109+
#### 1.13.0-alpha.16
110+
111+
* Add curve preferences, pinned public key SHA256 and mTLS for TLS options **1**
112+
* Fixes and improvements
113+
114+
See [TLS](/configuration/shared/tls/).
115+
116+
#### 1.13.0-alpha.15
117+
118+
* Update quic-go to v0.54.0
119+
* Update gVisor to v20250811
120+
* Update Tailscale to v1.86.5
121+
* Fixes and improvements
122+
38123
#### 1.12.8
39124

40125
* Fixes and improvements
41126

127+
#### 1.13.0-alpha.11
128+
129+
* Fixes and improvements
130+
42131
#### 1.12.5
43132

44133
* Fixes and improvements
45134

135+
#### 1.13.0-alpha.10
136+
137+
* Improve kTLS support **1**
138+
* Fixes and improvements
139+
140+
**1**:
141+
142+
kTLS is now compatible with custom TLS implementations other than uTLS.
143+
46144
#### 1.12.4
47145

48146
* Fixes and improvements

0 commit comments

Comments
 (0)