Update Changelog

This commit is contained in:
Ludvig Strigeus 2018-12-16 23:29:38 +01:00
parent d5ab432941
commit 671205e1de
2 changed files with 29 additions and 3 deletions

View file

@ -56,7 +56,7 @@ if command == 'build_tap':
SignExe(r'installer\tap\TunSafe-TAP-9.21.2.exe')
sys.exit(0)
if 1:
if command != 'skip_build':
RmTree(BASE + r'\build')
Run('%s TunSafe.sln /t:Clean;Rebuild /p:Configuration=Release /m /p:Platform=x64' % CONFIG["MSBUILD_PATH"])
Run('%s TunSafe.sln /t:Clean;Rebuild /p:Configuration=Release /m /p:Platform=Win32' % CONFIG["MSBUILD_PATH"])
@ -64,7 +64,7 @@ if 1:
if 1:
try:
os.mkdir(BASE + r'\installer\x86')
except FileExistsError:
except OSError:
pass
CopyFile(BASE + r'\build\Win32_Release\TunSafe.exe', BASE + r'\installer\x86\TunSafe.exe')
CopyFile(BASE + r'\build\Win32_Release\ts.exe', BASE + r'\installer\x86\TunSafe.com')
@ -73,7 +73,7 @@ if 1:
try:
os.mkdir(BASE + r'\installer\x64')
except FileExistsError:
except OSError:
pass
CopyFile(BASE + r'\build\x64_Release\TunSafe.exe', BASE + r'\installer\x64\TunSafe.exe')
CopyFile(BASE + r'\build\x64_Release\ts.exe', BASE + r'\installer\x64\TunSafe.com')

View file

@ -1,3 +1,29 @@
2018-12-16 - TunSafe v1.5-rc2
Changes:
1.Don't add endpoint route if route is not in included_routes
2.In BSD network code, don't add a route that's a subset of an Address
3.Don't add Excluded routes when Table=off
4.Display packet loss in Windows UI
5.Enable DNS block only if the DNS addr is a part of the routes
6.Support for WireGuard over TCP. Use Endpoint=tcp:// to connect
to a TCP server, and use ListenPortTCP=12345 to listen on TCP.
7.Add support for Two Factor authentication. Read more on:
https://github.com/TunSafe/TunSafe/wiki/Two-Factor-Authentication-with-TunSafe
8.Add support for a hybrid TCP/UDP mode that uses TCP for handshakes
and UDP for data traffic. This means that PersistentKeepalive can
be significantly raised to for example 300 seconds, since as long
as the TCP connection remains open through NAT then the WireGuard
connection will stay alive. Enable with Features=hybrid_tcp
9.Support for obfuscated WireGuard connections. Use ObfuscateKey=foo
in the [Interface] section to setup the obfuscator key. It needs
to be set to the same thing on both sides. There's also another
setting to masquerade TCP connections as TLS. Use ObfuscateTCP to
setup how TCP gets obfuscated. The default is to just make everything
look totally random. It can also be set to tls-chrome or tls-firefox
to make the traffic look like HTTPS traffic.
10.Display incoming invalid packets in Windows UI
2018-10-21 - TunSafe v1.5-rc1
Changes: