ChangeLog 4.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110
  1. Changes in version 0.5.0 - 2024-11-07:
  2. - Add snowflake transport to Lyrebird
  3. - Add event logging support for all transports
  4. Changes in version 0.4.0 - 2024-10-08:
  5. - Use go 1.21
  6. Changes in version 0.3.0 - 2024-08-07:
  7. - report lyrebird version and implementation to Tor
  8. - fix IPv6 support in webtunnel
  9. - simplify copyloop
  10. Changes in version 0.2.0 - 2024-03-27:
  11. - Socks5 Support general improvement
  12. - Fixed expected import path of package x25519ell2
  13. - Add WebTunnel Client Support
  14. - Updated dependencies
  15. Changes in version 0.1.0 - 2023-05-31:
  16. - Rename the project to lyrebird
  17. - Bring back meek uTLS support
  18. Changes in version 0.0.14 - 2022-09-04:
  19. - Fixed the incompete previous fix to the Elligator 2 subgroup issue (Thanks
  20. to David Fifield).
  21. Changes in version 0.0.13 - 2022-02-04:
  22. - Stop using utls entirely for TLS signature normalization (meek_lite).
  23. - Stop pinning the certificate chain for default bridges (meek_lite).
  24. Changes in version 0.0.12 - 2021-12-31:
  25. - Fix the long standing distinguishers associated with agl's Elligator2
  26. implementation (Thanks to Loup Vaillant).
  27. - Replace the extra25519 import with an internal package.
  28. - Update the Azure TLS certificate digest (Thanks to Philipp Winter).
  29. - Make the -unsafeLogging command line switch work.
  30. - Bump the version of the utls fork, add the Chrome 83 fingerprint.
  31. Changes in version 0.0.11 - 2019-06-21:
  32. - Update my e-mail address.
  33. - Change the obfs4 behavior for handling handshake failure to be more
  34. uniform. Thanks to Sergey Frolov for assistance.
  35. - Bump the version of the utls fork.
  36. Changes in version 0.0.10 - 2019-04-12:
  37. - Disable behavior distinctive to crypto/tls when using utls.
  38. - Bump the version of the utls fork.
  39. Changes in version 0.0.9 - 2019-02-05:
  40. - Various meek_lite code cleanups and bug fixes.
  41. - Bug 29077: uTLS for ClientHello camouflage (meek_lite).
  42. - More fixes to HTTP Basic auth.
  43. - (meek_lite) Pin the certificate chain public keys for the default
  44. Tor Browser Azure bridge (meek_lite).
  45. Changes in version 0.0.8 - 2019-01-20:
  46. - Bug 24793: Send the correct authorization HTTP header for basic auth.
  47. - (meek_lite) Explicitly set Content-Length to zero when there is no data
  48. to send.
  49. - Added optional support for building as a Go 1.11 module. Patch by mvdan.
  50. - Change the canonical upstream repo location to gitlab.
  51. Changes in version 0.0.7 - 2016-11-15:
  52. - Support configuring the obfs4 IAT parameter as the sole
  53. ServerTransportOption on bridges, and correctly checkpoint the argument
  54. to the state file.
  55. - Correctly use the derived epoch hour when generating the server obfs4
  56. ntor handshake response to be more tollerant of clock skew.
  57. - Reuse the read buffer when consuming obfs4 frames over the network to
  58. reduce memory consumption. Patch by oxtoacart.
  59. Changes in version 0.0.6 - 2016-01-25:
  60. - Delay transport factory initialization till after logging has been
  61. initialized.
  62. - Add a meek client implementation (WARNING: Does not support using a
  63. helper to normalize TLS signatures). The brave people that want to use
  64. it can do so as the "meek_lite" transport, with identical bridge lines
  65. to the real meek-client.
  66. Changes in version 0.0.5 - 2015-04-15:
  67. - Go vet/fmt fixes, and misc. code cleanups. Patches by mvdan.
  68. - Changed the go.net import path to the new location (golang.org/x/net).
  69. - Added limited support for detecting if the parent process crashes.
  70. - Support for tor feature #15335 (stdin based termination notification).
  71. - Moved the leveled logging wrappers into common/log so they are usable
  72. in transport implementations.
  73. - Added a DEBUG log level.
  74. - Use a bundled SOCKS 5 server instead of goptlib's SocksListener.
  75. Changes in version 0.0.4 - 2015-02-17
  76. - Improve the runtime performance of the obfs4 handshake tests.
  77. - Changed the go.crypto import path to the new location (golang.org/x/crypto).
  78. - Added client only support for ScrambleSuit.
  79. Changes in version 0.0.3 - 2014-10-01
  80. - Change the obfs4 bridge line format to use a "cert" argument instead of the
  81. previous "node-id" and "public-key" arguments. The "cert" consists of the
  82. Base64 encoded concatenation of the node ID and public key, with the
  83. trailing padding removed. Old style separated bridge lines are still valid,
  84. but the newer representation is slightly more compact.
  85. Changes in version 0.0.2 - 2014-09-26
  86. - Write an example client bridge line suitable for use with the running obfs4
  87. server instance to "obfs4_bridgeline.txt" for the convenience of bridge
  88. operators.
  89. - Add a man page for obfs4proxy.
  90. Changes in version 0.0.1 - 2014-09-03
  91. - Initial release.