Skip to content

Commit f580eb8

Browse files
committed
v2.6.3
1 parent 8b079f2 commit f580eb8

File tree

8 files changed

+32
-2
lines changed

8 files changed

+32
-2
lines changed

docs/docs/Changelog.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,15 @@ hide:
44
- navigation
55
---
66

7+
## 2.6.3
8+
9+
- Added mTLS support for client certificate authentication
10+
- Fixed a memory leak issue in tun mode
11+
- Fixed an issue where DNS resolution failed in tun mode on Linux systems using systemd-resolved
12+
- Fixed a bug in the ACL cache that caused rules with different ports or protocols to be applied to irrelevant connections
13+
- Removed the license-conflicted DoH library and replaced it with an in-house implementation
14+
- Fixed a race condition in UDP session handling
15+
716
## 2.6.2
817

918
- Updated quic-go to v0.52.0

docs/docs/Changelog.zh.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,15 @@ hide:
44
- navigation
55
---
66

7+
## 2.6.3
8+
9+
- 新增 mTLS 客户端证书验证
10+
- 修复 tun 模式下一个内存泄漏问题
11+
- 修复使用 systemd-resolved 的 Linux 设备上 tun 模式 DNS 解析失败的问题
12+
- 修复一个 ACL 中协议/端口不匹配的规则被错误应用到其他连接的 bug
13+
- 移除许可协议不兼容的 DoH 库,改为自行实现
14+
- 修复一个 UDP session 处理的线程安全问题
15+
716
## 2.6.2
817

918
- quic-go 更新到 v0.52.0

docs/docs/advanced/Full-Client-Config.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -51,12 +51,16 @@ tls:
5151
insecure: false # (2)!
5252
pinSHA256: BA:88:45:17:A1... # (3)!
5353
ca: custom_ca.crt # (4)!
54+
clientCertificate: client.crt # (5)!
55+
clientKey: client.key # (6)!
5456
```
5557

5658
1. Server name to use for TLS verification. If omitted, the server name will be extracted from the `server` field.
5759
2. Disable TLS verification.
5860
3. Verify the server's certificate fingerprint. You can obtain the fingerprint of your certificate using openssl: `openssl x509 -noout -fingerprint -sha256 -in your_cert.crt`
5961
4. Use a custom CA certificate for TLS verification.
62+
5. Use a client certificate for mTLS verification.
63+
6. Use a client key for mTLS verification.
6064

6165
## Transport
6266

docs/docs/advanced/Full-Client-Config.zh.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -51,12 +51,16 @@ tls:
5151
insecure: false # (2)!
5252
pinSHA256: BA:88:45:17:A1... # (3)!
5353
ca: custom_ca.crt # (4)!
54+
clientCertificate: client.crt # (5)!
55+
clientKey: client.key # (6)!
5456
```
5557

5658
1. 用于 TLS 验证的服务器名称。如果省略,服务器名称将从 `server` 字段中提取。
5759
2. 禁用 TLS 验证。
5860
3. 验证服务器的证书指纹。可以通过 openssl 获取证书指纹:`openssl x509 -noout -fingerprint -sha256 -in your_cert.crt`
5961
4. 使用自定义 CA。
62+
5. 使用客户端证书进行 mTLS 验证。
63+
6. 使用客户端密钥进行 mTLS 验证。
6064

6165
## 传输 (Transport)
6266

docs/docs/advanced/Full-Server-Config.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,13 +38,15 @@ You can have either `tls` or `acme`, but not both.
3838
cert: some.crt
3939
key: some.key
4040
sniGuard: strict | disable | dns-san # (2)!
41+
clientCA: client.crt # (3)!
4142
```
4243

4344
1. Certificates are read on every TLS handshake. This means you can update the files without restarting the server.
4445
2. Verify the SNI provided by the client. Accept the connection only when it matches what's in the certificate. Terminate the TLS handshake otherwise. <br>
4546
Set to `strict` to enforce this behavior. <br>
4647
Set to `disable` to disable this entirely. <br>
4748
The default is `dns-san`, which enables this feature only when the certificate contains the "Subject Alternative Name" extension with a domain name in it.
49+
3. Use a client CA for mTLS verification.
4850

4951
=== "ACME"
5052

docs/docs/advanced/Full-Server-Config.zh.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,13 +38,15 @@ listen: :443 # (1)!
3838
cert: some.crt
3939
key: some.key
4040
sniGuard: strict | disable | dns-san # (2)!
41+
clientCA: client.crt # (3)!
4142
```
4243

4344
1. 每次 TLS 握手时都会读取证书。可以原地更新证书文件而无需重启服务端。
4445
2. 验证客户端发送的 SNI。 与证书信息匹配时才建立连接, 否则终止 TLS 握手。<br>
4546
设置为 `strict` 以启用该功能。<br>
4647
设置为 `disable` 以禁用该功能。<br>
4748
默认为 `dns-san`, 仅当证书中包含「证书主题背景的备用名称」扩展且该扩展中包含域名时才启用该功能。
49+
3. 使用客户端 CA 进行 mTLS 验证。
4850

4951
=== "ACME"
5052

docs/docs/getting-started/Server-Installation-Script.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ bash <(curl -fsSL https://get.hy2.sh/)
4848
Install or upgrade to a specified version.
4949

5050
```sh
51-
bash <(curl -fsSL https://get.hy2.sh/) --version v2.6.2
51+
bash <(curl -fsSL https://get.hy2.sh/) --version v2.6.3
5252
```
5353

5454
### Uninstall

docs/docs/getting-started/Server-Installation-Script.zh.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ bash <(curl -fsSL https://get.hy2.sh/)
4848
安装或升级为指定版本,不进行版本检查。
4949

5050
```sh
51-
bash <(curl -fsSL https://get.hy2.sh/) --version v2.6.2
51+
bash <(curl -fsSL https://get.hy2.sh/) --version v2.6.3
5252
```
5353

5454
### 卸载

0 commit comments

Comments
 (0)