Skip to content

v4.24.2

Compare
Choose a tag to compare
@xiaokangwang xiaokangwang released this 10 Jun 10:17
· 1782 commits to master since this release
4eeb913

New Functions

  • VMess's new header format experiment begins. You can now enable VMessAEAD to be better protected. Documents EN CH are updated. See extra-VMessAEADdoc.zip for a more detailed explanation available in both Chinese and English.

  • mKCP can now be encrypted to resist recognition, address issue mentioned in v2ray/v2ray-core#2530 v2ray/v2ray-core#2253 v2ray/v2ray-core#2131. Documents EN CH are updated.

Breaking Changes

  • To slow down certain replay attacks, taint mechanic for VMess MD5 authentication data is introduced. Unless the server is under attack, a well-behaved client is not influenced. Pay attention to this change if you are designing a "V2Ray Panel", "Airport" or "V2Ray Service Provider". Documents EN CH are updated.

Minor fixes from #12 #10 included.

  • Updated Golang tool-chain. Thanks @RPRX
  • LocalAddr() in UDP workers will now return correct local addr. Thanks @zhuobixin

About AV warnings

We are aware some anti-virus software detects V2Ray as malware, which it isn't, but we can't afford to pay the fee needed to make them not detect V2Ray as malware. Microsoft's AV detects V2Ray as "Trojan:Win32/Wacatac.C!ml" , "Program:Win32/Wacapew.C!ml" each time we release a new version, and I have to manually contact them each time to remove it from the malware database. If you have more information to report please leave them here. These AVs are known to generate false-positive results: "Microsoft", "McAfee", "Cylance", "Symantec", "F-Secure", "SecureAge APEX", "Cybereason", "Cynet", "MaxSecure", "F-Secure", "Avira", "AVAST", "AVG", "Rising"(瑞星).