v1.9.2 Changelog
New Features
- Standalone NaiveProxy tunnel type — Direct NaiveProxy connection without SSH chaining, simpler setup with fewer credentials needed
- DoH server list import — Import DoH server URLs from text files for bulk scanning/testing
- Direct / + SSH toggle — NaiveProxy edit screen shows "Direct" and "+ SSH" labels
Bug Fixes
- SSH curve25519 key exchange — Fixed Algorithm negotiation fail when server only offers curve25519-sha256 by bundling BouncyCastle for X25519 support on Android
- Profile deletion while disconnected — Fixed bug where profiles couldn't be deleted after VPN stopped externally (stale connected
profile state)
Improvements
- Battery optimizations — Reduced DNS worker pool (10→5), increased keepalive interval (20s→40s), reduced DoH senders (32→12)
- Dynamic DNS pool in authoritative mode — Worker pool scales to 10 when using your own DNSTT servers for maximum throughput
- Added adaptive icon support
New Features
- Standalone NaiveProxy tunnel type — Direct NaiveProxy connection without SSH chaining, simpler setup with fewer credentials needed
- DoH server list import — Import DoH server URLs from text files for bulk scanning/testing
- Direct / + SSH toggle — NaiveProxy edit screen shows "Direct" and "+ SSH" labels
Bug Fixes
- SSH curve25519 key exchange — Fixed Algorithm negotiation fail when server only offers curve25519-sha256 by bundling BouncyCastle for X25519 support on Android
- Profile deletion while disconnected — Fixed bug where profiles couldn't be deleted after VPN stopped externally (stale connected
profile state)
Improvements
- Battery optimizations — Reduced DNS worker pool (10→5), increased keepalive interval (20s→40s), reduced DoH senders (32→12)
- Dynamic DNS pool in authoritative mode — Worker pool scales to 10 when using your own DNSTT servers for maximum throughput
- Added adaptive icon support
❤13❤🔥2👍2😭2
v2.0.1 Changelog
New Features
- Locked Profiles — Admins can now export profiles with a lock password for distribution. Locked
profiles hide all server details from end users while allowing connect/disconnect and delete.
Enter the admin password to permanently unlock.
- Auto-Reconnect — Automatically reconnects when the VPN drops or the network changes, with up
to 5 retries at 3-second intervals.
- DNS Scanner Selection Limit — Prevents selecting too many resolvers from the DNS scanner.
- Adaptive Icon — New adaptive launcher icon for modern Android home screens.
Bug Fixes
- DNSTT+SSH DNS Resolution — Fixed websites not loading on DNSTT+SSH by defaulting to the
server's local resolver (127.0.0.53) instead of external DNS (8.8.8.8), which often closes
long-lived TCP connections through SSH tunnels.
- SSH Session Liveness Detection — Active SSH keepalive probe every 30 seconds detects dead
sessions that passive checks miss (NAT timeout, server crash), triggering auto-reconnect
immediately.
- Fix NaiveProxy crash "Not a numeric address" when server hostname resolves to an IPv6 (AAAA)
address. DNS resolution now prefers IPv4, and IPv6 addresses are properly bracketed for
Chromium's host-resolver-rules parser.
New Features
- Locked Profiles — Admins can now export profiles with a lock password for distribution. Locked
profiles hide all server details from end users while allowing connect/disconnect and delete.
Enter the admin password to permanently unlock.
- Auto-Reconnect — Automatically reconnects when the VPN drops or the network changes, with up
to 5 retries at 3-second intervals.
- DNS Scanner Selection Limit — Prevents selecting too many resolvers from the DNS scanner.
- Adaptive Icon — New adaptive launcher icon for modern Android home screens.
Bug Fixes
- DNSTT+SSH DNS Resolution — Fixed websites not loading on DNSTT+SSH by defaulting to the
server's local resolver (127.0.0.53) instead of external DNS (8.8.8.8), which often closes
long-lived TCP connections through SSH tunnels.
- SSH Session Liveness Detection — Active SSH keepalive probe every 30 seconds detects dead
sessions that passive checks miss (NAT timeout, server crash), triggering auto-reconnect
immediately.
- Fix NaiveProxy crash "Not a numeric address" when server hostname resolves to an IPv6 (AAAA)
address. DNS resolution now prefers IPv4, and IPv6 addresses are properly bracketed for
Chromium's host-resolver-rules parser.
❤7👍5
What's New in v2.1.1
Encrypted Config Export
- Locked profiles now export as slipnet-enc:// links using AES-256-GCM encryption
- Ensures server credentials stay protected when sharing configs
End-to-End Tunnel Testing
- DNS scanner now supports E2E testing: verify resolvers work through actual DNSTT/Slipstream tunnels
- Transparent proxy detection to identify resolvers that interfere with tunnel traffic
- Default E2E timeout set to 7000ms
Faster TCP Fallback
- All non-DNS UDP is now rejected with ICMP Port Unreachable at the native level
- Apps like WhatsApp and browsers fall back to TCP instantly instead of waiting for timeouts
Battery Optimization
- New prompt on first connect to disable battery optimization for reliable background VPN
- Battery optimization setting added to Settings screen with current status
Locked Profile Privacy
- Locked profiles show "Locked" instead of the server domain in the profile list
- Tunnel type always visible below locked profiles
- DNS scanner uses google.com instead of the real domain for locked profiles
Other Changes
- Show all resolvers that respond (not just 4/4), with color-coded score
indicator
- Add score filter chips (All, 3+, 4/4) and Score sort option
- Added Telegram channel link (t.me/SlipNet_app) to About and Welcome dialogs
- Shared About dialog content between Settings and Welcome screens
- Locked DNSTT/Slipstream profiles can now edit DNS transport and resolvers
- Updated Tor to 0.4.9.5
- Dropped x86/x86_64 ABI support (ARM only)
Encrypted Config Export
- Locked profiles now export as slipnet-enc:// links using AES-256-GCM encryption
- Ensures server credentials stay protected when sharing configs
End-to-End Tunnel Testing
- DNS scanner now supports E2E testing: verify resolvers work through actual DNSTT/Slipstream tunnels
- Transparent proxy detection to identify resolvers that interfere with tunnel traffic
- Default E2E timeout set to 7000ms
Faster TCP Fallback
- All non-DNS UDP is now rejected with ICMP Port Unreachable at the native level
- Apps like WhatsApp and browsers fall back to TCP instantly instead of waiting for timeouts
Battery Optimization
- New prompt on first connect to disable battery optimization for reliable background VPN
- Battery optimization setting added to Settings screen with current status
Locked Profile Privacy
- Locked profiles show "Locked" instead of the server domain in the profile list
- Tunnel type always visible below locked profiles
- DNS scanner uses google.com instead of the real domain for locked profiles
Other Changes
- Show all resolvers that respond (not just 4/4), with color-coded score
indicator
- Add score filter chips (All, 3+, 4/4) and Score sort option
- Added Telegram channel link (t.me/SlipNet_app) to About and Welcome dialogs
- Shared About dialog content between Settings and Welcome screens
- Locked DNSTT/Slipstream profiles can now edit DNS transport and resolvers
- Updated Tor to 0.4.9.5
- Dropped x86/x86_64 ABI support (ARM only)
Telegram
SlipNet
https://github.com/anonvector/SlipNet
❤34
Forwarded from IRCF | اینترنت آزاد برای همه
آموزش اتصال به DNStt, DNStt+ssh و Slipstream از طریق SlipNet
یه عده به ماهیگیری علاقه دارن، میتونن کلمه
👉 telegra.ph/dnstt-slipstream-03-03
© Mohsen.IK
🔍 ircf.space
@ircfspace
یه عده به ماهیگیری علاقه دارن، میتونن کلمه
DNStt رو در همین کانال جستجو کنن، آموزش قدم به قدم راهاندازی و اسکریپتهای نصبش به دفعات ارسال شده. اونایی که در این وضعیت وخیم اینترنت نه شرایط پیکربندی رو دارن، نه از پس هزینه راهاندازی برمیان، میتونن از کانفیگها و سرورهای اهدایی استفاده کنن. 👉 telegra.ph/dnstt-slipstream-03-03
© Mohsen.IK
خون کسی از بقیه رنگیتر نیست و اگر قراره این ۱ درصد ترافیک قطع بشه، همه با هم قطع میشیم.
🔍 ircf.space
@ircfspace
Telegraph
dnstt-slipstream
آموزش اتصال به DNStt , DNStt+ssh و Slipstream از طریق SlipNet برنامه SlipNet برای اندروید منتشر شده، که میتونین آخرین آپدیتشو از لینک زیر دریافت کنین: https://github.com/anonvector/SlipNet/releases/latest روش اول: ایمپورت کانفیگ DNStt از طریق کد QR یا کانفیگ…
❤48👍5
Forwarded from ویکی تجربه - استخدام و بررسی شرکت ها
کسایی که dnstt یا Slipstream دارن، برن تو تنظیمات و توی SlipNet گزینهی Proxy Mode رو فعال کنن. بعدش پروکسی رو بذارن روی Psiphon؛ سرعت واقعاً بهتر میشه.
ایده اینه که هندشیک اولیهی سایفون از طریق SlipNet انجام بشه.
نکته: حواستون باشه، فقط HTTP Proxy جواب میده و SOCKS مشکل داره.
ایده اینه که هندشیک اولیهی سایفون از طریق SlipNet انجام بشه.
نکته: حواستون باشه، فقط HTTP Proxy جواب میده و SOCKS مشکل داره.
❤19🗿8👍2
Share your SlipNet profiles here:
کانفیگهای SlipNet را داخل گروه یا زیر این پست با بقیه به اشتراک بذارید.
https://t.me/+YS97dDhbdUs1OTI0
کانفیگهای SlipNet را داخل گروه یا زیر این پست با بقیه به اشتراک بذارید.
https://t.me/+YS97dDhbdUs1OTI0
Telegram
SlipNet chat
You’ve been invited to join this group on Telegram.
❤14👍6
If you are using Slipstream, change the Keep-Alive Interval (ms) to 5000. This will affect battery usage and improve connection stability.
اگر از Slipstream استفاده میکنید، مقدار Keep-Alive Interval (ms) را به 5000 تغییر دهید. این کار بر مصرف باتری تأثیر میذاره و پایداری اتصال را بهبود میده.
در حالت کلی پیشنهاد میشه از Dnstt استفاده کنید
اگر از Slipstream استفاده میکنید، مقدار Keep-Alive Interval (ms) را به 5000 تغییر دهید. این کار بر مصرف باتری تأثیر میذاره و پایداری اتصال را بهبود میده.
در حالت کلی پیشنهاد میشه از Dnstt استفاده کنید
❤39👍4
Forwarded from SamNet Tech
📡 این راهنما بهتون یاد میده چطور با استفاده از تونل DNS یک VPN بسازید که حتی موقع قطعی کامل اینترنت هم کم و بیش کار کنه. تونل DNS ترافیک شما رو داخل درخواستهای DNS رمزگذاری میکنه و چون DNS تقریباً هیچوقت بسته نمیشه، میتونید از پیامرسانها و وب استفاده کنید. توی این راهنما قدم به قدم نصب سرور، تنظیم DNS در Cloudflare، راهاندازی سه نوع تونل (Slipstream، DNSTT، SSH) و تنظیم اپلیکیشن SlipNet روی گوشی رو توضیح دادم.
📚🛜
https://telegra.ph/Complete-Guide-to-Setting-Up-a-DNS-Tunnel-03-04
📚🛜
https://telegra.ph/Complete-Guide-to-Setting-Up-a-DNS-Tunnel-03-04
Telegraph
Complete Guide to Setting Up a DNS Tunnel
این راهنما به شما کمک میکنه که روی سرور خودتون تونل DNS راه بندازید. تونل DNS دادهها رو داخل درخواستهای DNS رمزگذاری میکنه و چون DNS تقریباً هیچوقت فیلتر نمیشه، حتی در زمان قطعی کامل اینترنت هم کار میکنه. پروتکلهایی که نصب میکنیم: - Slipstream + SOCKS…
❤31🍌1
برای افزایش سرعت:
۱. محدود کردن اتصال به اپلیکیشنهای مورد نیاز:
وارد تنظیمات شوید و گزینه Enable split tunneling را فعال کنید.
در قسمت Mode، گزینه Only را انتخاب کنید.
روی Select Apps ضربه بزنید و اپلیکیشنهایی که میخواهید به اینترنت (تونل) دسترسی داشته باشند را انتخاب کنید (مانند تلگرام).
۲. فعالسازی فشردهسازی دیتا:
در تنظیمات، به قسمت SSH Tunnel بروید و گزینه Compression را فعال کنید.
___________
To increase speed:
1. Limit the connection to specific apps:
Go to settings and turn on Enable split tunneling.
Under Mode, select Only.
Tap on Select Apps and choose the applications you want to have access to the internet/tunnel (e.g., Telegram).
2. Enable Data Compression:
In settings, navigate to the SSH Tunnel section and turn on Compression.
۱. محدود کردن اتصال به اپلیکیشنهای مورد نیاز:
وارد تنظیمات شوید و گزینه Enable split tunneling را فعال کنید.
در قسمت Mode، گزینه Only را انتخاب کنید.
روی Select Apps ضربه بزنید و اپلیکیشنهایی که میخواهید به اینترنت (تونل) دسترسی داشته باشند را انتخاب کنید (مانند تلگرام).
۲. فعالسازی فشردهسازی دیتا:
در تنظیمات، به قسمت SSH Tunnel بروید و گزینه Compression را فعال کنید.
___________
To increase speed:
1. Limit the connection to specific apps:
Go to settings and turn on Enable split tunneling.
Under Mode, select Only.
Tap on Select Apps and choose the applications you want to have access to the internet/tunnel (e.g., Telegram).
2. Enable Data Compression:
In settings, navigate to the SSH Tunnel section and turn on Compression.
❤26👍7🔥1