From 0b9137377ec20e5566baaa65dfe3eedff0036040 Mon Sep 17 00:00:00 2001 From: Anton Tolchanov <1687799+knyar@users.noreply.github.com> Date: Mon, 11 Mar 2024 15:45:55 +0000 Subject: [PATCH] Updated 1.60.0 (markdown) --- 1.60.0.md | 75 ++++++++++++++++++++++++------------------------------- 1 file changed, 32 insertions(+), 43 deletions(-) diff --git a/1.60.0.md b/1.60.0.md index 64a56cc..811c872 100644 --- a/1.60.0.md +++ b/1.60.0.md @@ -1,56 +1,45 @@ -## All Platforms +# All Platforms -* build Tailscale with Go 1.22 -* authentication: present users with a valid login page when attempting to login even after leaving device unattended for several days -* networking: mute noisy peer mtu discovery errors -* networking: expose gVisor metrics in debug mode -* port mapper: support legacy "urn:dslforum-org" port mapping services -* port mapper: fix crash when no support mapping services found -* ssh: log warning when unable to find SSH host keys -* serve: improve error message when running as non-root -* cloud servers: Detect when Tailscale is running on Digital Ocean and automatically use Digital Ocean's DNS resolvers (ask Andrew) -* app connectors: enable app connectors to install routes for domains that resolve to CNAME records -* app connectors: support pre-configured routes from control server -* web client: add new read-only mode -* tailscale status command: fix output formatting Tailnet includes location-based exit nodes +* Include ethtool information in bug report logs +* Disable unnecessary hostname canonicalization for Tailscale SSH connections +* Decrease verbosity of Wireguard logs +* Introduce a timeout for DNS over HTTP requests +* Add a Mullvad Family server to the list of well known DNS over HTTPS servers +* Add a per-client limit for TCP forwarding attempts in userspace mode. +* Prefer endpoints with link-local IPv6 addresses over private ones +* Avoid changing home DERP region when this would degrade connectivity +* Build Tailscale with Go 1.22.1 -## Windows +# Linux -* Fixed: tailscaled could be slow or cause increased CPU usage with large routing tables +* Fix infinite loop while configuring DNS on Amazon Linux 2023 +* Improve auto-update version detection on Alpine Linux +* Improve detection of IPv6 support in container environment -## Synology +# Windows -* fix stalling SMB transfers of large files +* Added support for `ManagedBy*` and `ResetToDefaults` system policy keys +* Improve handling of Tailscale Tunnel wintun adapter getting externally deleted -## macOS +# macOS -* Added: New UI to add/remove/switch between user accounts, including using custom control servers -* Added: New UI to change client preferences -* Added: New UI to manage updates for the Standalone variant of the client, including switching in-app between stable and unstable builds. -* Added: VPN On-Demand is now supported on macOS, to automatically connect/disconnect Tailscale when specific conditions are triggered -* Added: ‘Reset VPN Configuration’ menu item in the Debug Menu is now available to reset the system VPN configuration if needed -* Improved: An alert window is presented when the Tailscale network extension fails to start, providing suggested troubleshooting steps -* Improved: Tailscale appears in the macOS Dock when an app window is presented -* Improved: The devices list now shows all devices known to the control server, not only the ones seen in the last 4 days. -* Improved: The onboarding flow automatically advances once the user is connected -* Fixed: The authentication flow is now more reliable when Tailscale has been running for an extended period of time, and the session has expired server-side -* Fixed: Resolved a potential crash and excessive logging upon client launch -* Fixed: “Start on Login” is set correctly on macOS Ventura and earlier versions +* Improve Taildrop UI and notifications. +* Improve Tailnet lock settings UI. +* Describe system extension during onboarding. +* Allow toggling "Launch Tailscale on login" when Tailscale is disconnected. -## iOS / tvOS +# iOS -* Fixed: The authentication flow is now more reliable when Tailscale has been running for an extended period of time, and the session has expired server-side -* Fixed: Resolved a potential crash and excessive logging upon client launch -* Fixed: Stale devices are no longer presented in the devices list +* Remove unnecessary log messages triggered by changes to device power state and routing +* Disable TCP keepalives to improve battery usage -## Android +# Android -* Improved: Sort Mullvad exit nodes to make it easier to find best node for each location -* Fixed: Quick settings tile now works -* Fixed: Mullvad tunnels are no longer shown as regular nodes in UI +* Restore persisted settings on signin +* Improve handling of Always-on VPN intents +* Apply custom control server on first start -## Kubernetes operator +# Kubernetes operator -* New: a new ProxyClass custom resource that allows to provide custom configuration for cluster resources that the operator creates -* New: ACL tags for the operator can now be configured via Helm chart values -* Fixed: routing to Ingress backends that require an exact path without a slash (/) suffix \ No newline at end of file +* Gracefully handle an Ingress resource deployed before its backing Service resource. +* Fix DNAT rule management by egress proxies in nftables mode when IP address of `tailscale.com/tailnet-fqdn` changes. \ No newline at end of file