New: SlipGate (NaiveProxy + SSH)
- New tunnel type: SlipGate — chains NaiveProxy (Chromium-based HTTPS tunnel) with SSH for a fully encrypted, censorship-resistant connection: https://github.com/anonvector/slipgate
- NaiveProxy mimics Chrome's TLS fingerprint, making tunnel traffic indistinguishable from normal HTTPS browsing
- NaiveBridge: manages NaiveProxy process lifecycle with SOCKS5 local proxy
- NaiveSocksProxy: bridges hev-socks5-tunnel to NaiveProxy with CONNECT and FWD_UDP support
- Pre-resolves server IP before connecting to prevent ISP DNS poisoning
Network Resilience
- SlipGate survives network changes (wifi ↔️ cellular) — full two-phase reconnection (NaiveProxy restart, then SSH re-establishment)
- Auto-tune SSH max channels per tunnel type for better performance
Reachability Test
- "Test Server Reachability" now works for all tunnel types (DNSTT, Slipstream, DoH, SlipGate) — only Snowflake/Tor is skipped
- Smart ping target selection per tunnel type (resolver host, DoH server, SSH host, etc.)
Deep Links
- Added slipnet:// URI deep link support — tap a link to import profiles directly
- New tunnel type: SlipGate — chains NaiveProxy (Chromium-based HTTPS tunnel) with SSH for a fully encrypted, censorship-resistant connection: https://github.com/anonvector/slipgate
- NaiveProxy mimics Chrome's TLS fingerprint, making tunnel traffic indistinguishable from normal HTTPS browsing
- NaiveBridge: manages NaiveProxy process lifecycle with SOCKS5 local proxy
- NaiveSocksProxy: bridges hev-socks5-tunnel to NaiveProxy with CONNECT and FWD_UDP support
- Pre-resolves server IP before connecting to prevent ISP DNS poisoning
Network Resilience
- SlipGate survives network changes (wifi ↔️ cellular) — full two-phase reconnection (NaiveProxy restart, then SSH re-establishment)
- Auto-tune SSH max channels per tunnel type for better performance
Reachability Test
- "Test Server Reachability" now works for all tunnel types (DNSTT, Slipstream, DoH, SlipGate) — only Snowflake/Tor is skipped
- Smart ping target selection per tunnel type (resolver host, DoH server, SSH host, etc.)
Deep Links
- Added slipnet:// URI deep link support — tap a link to import profiles directly
GitHub
GitHub - anonvector/slipgate: ⏺ SlipGate — Unified tunnel manager for Linux servers. Deploys and manages DNS tunnels (DNSTT, NoizDNS…
⏺ SlipGate — Unified tunnel manager for Linux servers. Deploys and manages DNS tunnels (DNSTT, NoizDNS, Slipstream) and HTTPS proxies (NaiveProxy) with systemd integration, multi-tunnel DNS routing...
❤16👍1🙏1
v1.9.2 Changelog
New Features
- Standalone NaiveProxy tunnel type — Direct NaiveProxy connection without SSH chaining, simpler setup with fewer credentials needed
- DoH server list import — Import DoH server URLs from text files for bulk scanning/testing
- Direct / + SSH toggle — NaiveProxy edit screen shows "Direct" and "+ SSH" labels
Bug Fixes
- SSH curve25519 key exchange — Fixed Algorithm negotiation fail when server only offers curve25519-sha256 by bundling BouncyCastle for X25519 support on Android
- Profile deletion while disconnected — Fixed bug where profiles couldn't be deleted after VPN stopped externally (stale connected
profile state)
Improvements
- Battery optimizations — Reduced DNS worker pool (10→5), increased keepalive interval (20s→40s), reduced DoH senders (32→12)
- Dynamic DNS pool in authoritative mode — Worker pool scales to 10 when using your own DNSTT servers for maximum throughput
- Added adaptive icon support
New Features
- Standalone NaiveProxy tunnel type — Direct NaiveProxy connection without SSH chaining, simpler setup with fewer credentials needed
- DoH server list import — Import DoH server URLs from text files for bulk scanning/testing
- Direct / + SSH toggle — NaiveProxy edit screen shows "Direct" and "+ SSH" labels
Bug Fixes
- SSH curve25519 key exchange — Fixed Algorithm negotiation fail when server only offers curve25519-sha256 by bundling BouncyCastle for X25519 support on Android
- Profile deletion while disconnected — Fixed bug where profiles couldn't be deleted after VPN stopped externally (stale connected
profile state)
Improvements
- Battery optimizations — Reduced DNS worker pool (10→5), increased keepalive interval (20s→40s), reduced DoH senders (32→12)
- Dynamic DNS pool in authoritative mode — Worker pool scales to 10 when using your own DNSTT servers for maximum throughput
- Added adaptive icon support
❤13❤🔥2👍2😭2
v2.0.1 Changelog
New Features
- Locked Profiles — Admins can now export profiles with a lock password for distribution. Locked
profiles hide all server details from end users while allowing connect/disconnect and delete.
Enter the admin password to permanently unlock.
- Auto-Reconnect — Automatically reconnects when the VPN drops or the network changes, with up
to 5 retries at 3-second intervals.
- DNS Scanner Selection Limit — Prevents selecting too many resolvers from the DNS scanner.
- Adaptive Icon — New adaptive launcher icon for modern Android home screens.
Bug Fixes
- DNSTT+SSH DNS Resolution — Fixed websites not loading on DNSTT+SSH by defaulting to the
server's local resolver (127.0.0.53) instead of external DNS (8.8.8.8), which often closes
long-lived TCP connections through SSH tunnels.
- SSH Session Liveness Detection — Active SSH keepalive probe every 30 seconds detects dead
sessions that passive checks miss (NAT timeout, server crash), triggering auto-reconnect
immediately.
- Fix NaiveProxy crash "Not a numeric address" when server hostname resolves to an IPv6 (AAAA)
address. DNS resolution now prefers IPv4, and IPv6 addresses are properly bracketed for
Chromium's host-resolver-rules parser.
New Features
- Locked Profiles — Admins can now export profiles with a lock password for distribution. Locked
profiles hide all server details from end users while allowing connect/disconnect and delete.
Enter the admin password to permanently unlock.
- Auto-Reconnect — Automatically reconnects when the VPN drops or the network changes, with up
to 5 retries at 3-second intervals.
- DNS Scanner Selection Limit — Prevents selecting too many resolvers from the DNS scanner.
- Adaptive Icon — New adaptive launcher icon for modern Android home screens.
Bug Fixes
- DNSTT+SSH DNS Resolution — Fixed websites not loading on DNSTT+SSH by defaulting to the
server's local resolver (127.0.0.53) instead of external DNS (8.8.8.8), which often closes
long-lived TCP connections through SSH tunnels.
- SSH Session Liveness Detection — Active SSH keepalive probe every 30 seconds detects dead
sessions that passive checks miss (NAT timeout, server crash), triggering auto-reconnect
immediately.
- Fix NaiveProxy crash "Not a numeric address" when server hostname resolves to an IPv6 (AAAA)
address. DNS resolution now prefers IPv4, and IPv6 addresses are properly bracketed for
Chromium's host-resolver-rules parser.
❤7👍5
What's New in v2.1.1
Encrypted Config Export
- Locked profiles now export as slipnet-enc:// links using AES-256-GCM encryption
- Ensures server credentials stay protected when sharing configs
End-to-End Tunnel Testing
- DNS scanner now supports E2E testing: verify resolvers work through actual DNSTT/Slipstream tunnels
- Transparent proxy detection to identify resolvers that interfere with tunnel traffic
- Default E2E timeout set to 7000ms
Faster TCP Fallback
- All non-DNS UDP is now rejected with ICMP Port Unreachable at the native level
- Apps like WhatsApp and browsers fall back to TCP instantly instead of waiting for timeouts
Battery Optimization
- New prompt on first connect to disable battery optimization for reliable background VPN
- Battery optimization setting added to Settings screen with current status
Locked Profile Privacy
- Locked profiles show "Locked" instead of the server domain in the profile list
- Tunnel type always visible below locked profiles
- DNS scanner uses google.com instead of the real domain for locked profiles
Other Changes
- Show all resolvers that respond (not just 4/4), with color-coded score
indicator
- Add score filter chips (All, 3+, 4/4) and Score sort option
- Added Telegram channel link (t.me/SlipNet_app) to About and Welcome dialogs
- Shared About dialog content between Settings and Welcome screens
- Locked DNSTT/Slipstream profiles can now edit DNS transport and resolvers
- Updated Tor to 0.4.9.5
- Dropped x86/x86_64 ABI support (ARM only)
Encrypted Config Export
- Locked profiles now export as slipnet-enc:// links using AES-256-GCM encryption
- Ensures server credentials stay protected when sharing configs
End-to-End Tunnel Testing
- DNS scanner now supports E2E testing: verify resolvers work through actual DNSTT/Slipstream tunnels
- Transparent proxy detection to identify resolvers that interfere with tunnel traffic
- Default E2E timeout set to 7000ms
Faster TCP Fallback
- All non-DNS UDP is now rejected with ICMP Port Unreachable at the native level
- Apps like WhatsApp and browsers fall back to TCP instantly instead of waiting for timeouts
Battery Optimization
- New prompt on first connect to disable battery optimization for reliable background VPN
- Battery optimization setting added to Settings screen with current status
Locked Profile Privacy
- Locked profiles show "Locked" instead of the server domain in the profile list
- Tunnel type always visible below locked profiles
- DNS scanner uses google.com instead of the real domain for locked profiles
Other Changes
- Show all resolvers that respond (not just 4/4), with color-coded score
indicator
- Add score filter chips (All, 3+, 4/4) and Score sort option
- Added Telegram channel link (t.me/SlipNet_app) to About and Welcome dialogs
- Shared About dialog content between Settings and Welcome screens
- Locked DNSTT/Slipstream profiles can now edit DNS transport and resolvers
- Updated Tor to 0.4.9.5
- Dropped x86/x86_64 ABI support (ARM only)
Telegram
SlipNet
https://github.com/anonvector/SlipNet
❤34
Forwarded from IRCF | اینترنت آزاد برای همه
آموزش اتصال به DNStt, DNStt+ssh و Slipstream از طریق SlipNet
یه عده به ماهیگیری علاقه دارن، میتونن کلمه
👉 telegra.ph/dnstt-slipstream-03-03
© Mohsen.IK
🔍 ircf.space
@ircfspace
یه عده به ماهیگیری علاقه دارن، میتونن کلمه
DNStt رو در همین کانال جستجو کنن، آموزش قدم به قدم راهاندازی و اسکریپتهای نصبش به دفعات ارسال شده. اونایی که در این وضعیت وخیم اینترنت نه شرایط پیکربندی رو دارن، نه از پس هزینه راهاندازی برمیان، میتونن از کانفیگها و سرورهای اهدایی استفاده کنن. 👉 telegra.ph/dnstt-slipstream-03-03
© Mohsen.IK
خون کسی از بقیه رنگیتر نیست و اگر قراره این ۱ درصد ترافیک قطع بشه، همه با هم قطع میشیم.
🔍 ircf.space
@ircfspace
Telegraph
dnstt-slipstream
آموزش اتصال به DNStt , DNStt+ssh و Slipstream از طریق SlipNet برنامه SlipNet برای اندروید منتشر شده، که میتونین آخرین آپدیتشو از لینک زیر دریافت کنین: https://github.com/anonvector/SlipNet/releases/latest روش اول: ایمپورت کانفیگ DNStt از طریق کد QR یا کانفیگ…
❤48👍5
Forwarded from ویکی تجربه - استخدام و بررسی شرکت ها
کسایی که dnstt یا Slipstream دارن، برن تو تنظیمات و توی SlipNet گزینهی Proxy Mode رو فعال کنن. بعدش پروکسی رو بذارن روی Psiphon؛ سرعت واقعاً بهتر میشه.
ایده اینه که هندشیک اولیهی سایفون از طریق SlipNet انجام بشه.
نکته: حواستون باشه، فقط HTTP Proxy جواب میده و SOCKS مشکل داره.
ایده اینه که هندشیک اولیهی سایفون از طریق SlipNet انجام بشه.
نکته: حواستون باشه، فقط HTTP Proxy جواب میده و SOCKS مشکل داره.
❤19🗿8👍2
Share your SlipNet profiles here:
کانفیگهای SlipNet را داخل گروه یا زیر این پست با بقیه به اشتراک بذارید.
https://t.me/+YS97dDhbdUs1OTI0
کانفیگهای SlipNet را داخل گروه یا زیر این پست با بقیه به اشتراک بذارید.
https://t.me/+YS97dDhbdUs1OTI0
Telegram
SlipNet chat
You’ve been invited to join this group on Telegram.
❤14👍6
If you are using Slipstream, change the Keep-Alive Interval (ms) to 5000. This will affect battery usage and improve connection stability.
اگر از Slipstream استفاده میکنید، مقدار Keep-Alive Interval (ms) را به 5000 تغییر دهید. این کار بر مصرف باتری تأثیر میذاره و پایداری اتصال را بهبود میده.
در حالت کلی پیشنهاد میشه از Dnstt استفاده کنید
اگر از Slipstream استفاده میکنید، مقدار Keep-Alive Interval (ms) را به 5000 تغییر دهید. این کار بر مصرف باتری تأثیر میذاره و پایداری اتصال را بهبود میده.
در حالت کلی پیشنهاد میشه از Dnstt استفاده کنید
❤39👍4