AdGuard Home - Package Updates
Pinned
AdGuard Home
-
[1.7.3]
- Update AdGuard Home to 0.108.0-b.31
- Full changelog
- The new HTTP API POST /control/protection, that updates protection state and adds an optional pause duration (#1333). The format of request body is described in openapi/openapi.yaml. The duration of this pause could also be set with the config field protection_disabled_until in dns section of the YAML configuration file.
- The ability to create a static DHCP lease from a dynamic one more easily (#3459).
- Two new HTTP APIs, PUT /control/stats/config/update and GET control/stats/config, which can be used to set and receive the query log configuration. See openapi/openapi.yaml for the full description.
- Two new HTTP APIs, PUT /control/querylog/config/update and GET control/querylog/config, which can be used to set and receive the statistics configuration. See openapi/openapi.yaml for the full description.
- The ability to set custom IP for EDNS Client Subnet by using the DNS-server configuration section on the DNS settings page in the UI (#1472).
- The ability to manage safesearch for each service by using the new safe_search field (#1163).
- ARPA domain names containing a subnet within private networks now also considered private, behaving closer to RFC 6761 (#5567).
-
[1.7.4]
- Update AdGuard Home to 0.108.0-b.32
- Full changelog
- Go version has been updated to prevent the possibility of exploiting the CVE-2023-24534, CVE-2023-24536, CVE-2023-24537, and CVE-2023-24538 Go vulnerabilities fixed in Go 1.19.8.
- The ability to make bootstrap DNS lookups prefer IPv6 addresses to IPv4 ones using the new dns.bootstrap_prefer_ipv6 configuration file property (#4262).
-
[1.7.5]
- Update AdGuard Home to 0.108.0-b.33
- Full changelog
- The ability to exclude client activity from the query log or statistics by using the new properties ignore_querylog and ignore_statistics of the items of the clients.persistent array (#1717, #4299). The UI changes are coming in the upcoming releases.
- Better profiling information when debug_pprof is set to true.
- IPv6 support in Safe Search for some services.
-
[1.7.6]
- Update AdGuard Home to 0.108.0-b.34
- Full changelog
- The ability to exclude client activity from the query log or statistics by editing client's settings on the respective page in the UI (#1717, #4299).
- Stored DHCP leases moved from leases.db to data/leases.json. The file format has also been optimized.
- Provided bootstrap servers are now used to resolve the hostnames of plain UDP/TCP upstream servers.
- The github.com/mdlayher/raw dependency has been temporarily returned to support raw connections on Darwin (#5712).
- Incorrect recording of blocked results as “Blocked by CNAME or IP” in the query log (#5725).
- All Safe Search services are unchecked by default.
-
[1.7.7]
- Update AdGuard Home to 0.108.0-b.35
- Full changelog
- Go version has been updated to prevent the possibility of exploiting the CVE-2023-29402, CVE-2023-29403, and CVE-2023-29404 Go vulnerabilities fixed in Go 1.19.10.
- The ability to edit rewrite rules via PUT /control/rewrite/update HTTP API (#1577).
- Unquoted IPv6 bind hosts with trailing colons erroneously considered unspecified addresses are now properly validated (#5752).
- Incorrect Content-Type header value in POST /control/version.json and GET /control/dhcp/interfaces HTTP APIs (#5716).
-
[1.7.8]
- Update AdGuard Home to 0.108.0-b.36
- Full changelog
- Startup errors on OpenWrt (#5872).
- Plain-UDP upstreams always falling back to TCP, causing outages and slowdowns (#5873, #5874).
-
[1.7.12]
- Update AdGuard Home to 0.108.0-b.40
- Full changelog
- Improved CPU and RAM consumption during updates of filtering-rule lists.
- Two unspecified IPs when a host is blocked in two filter lists (#5972).
- Incorrect setting of Parental Control cache size.
- Excessive RAM and CPU consumption by Safe Browsing and Parental Control filters (#5896).
-
[1.7.13]
- Update AdGuard Home to 0.108.0-b.41
- Full changelog
- Go version has been updated to prevent the possibility of exploiting the CVE-2023-29406 Go vulnerability fixed in Go 1.19.11.
- Ability to ignore queries for the root domain, such as NS . queries (#5990).
-
[1.7.14]
- Update AdGuard Home to 0.108.0-b.42
- Full changelog
- Occasional client information lookup failures that could lead to the DNS server getting stuck (#6006).
- bufio.Scanner: token too long and other errors when trying to add filtering-rule lists with lines over 1024 bytes long or containing cosmetic rules (#6003).
-
[1.7.15]
- Update AdGuard Home to 0.108.0-b.43
- Full changelog
- Go version has been updated to prevent the possibility of exploiting the CVE-2023-29409 Go vulnerability fixed in [Go 1.20.7][go-1.20.7].
- Improved reliability filtering-rule list updates on Unix systems.
- In this release, the schema version has changed from 24 to 25.
- Inability to block queries for the root domain, such as NS . queries, using the Disallowed domains feature on the DNS settings page (#6049). Users who want to block . queries should use the |.^ AdBlock rule or a similar regular expression.
- Client hostnames not resolving when upstream server responds with zero-TTL records (#6046).
-
[1.7.16]
- Update AdGuard Home to 0.108.0-b.44
- Full changelog
- IPv6 hints are now filtered in case IPv6 addresses resolving is disabled (#6122).
- The ability to set fallback DNS servers in the configuration file (#3701).
- While adding or updating blocklists, the title can now be parsed from ! Title: definition of the blocklist's source (#6020).
- The ability to filter DNS HTTPS records including IPv4/v6 hints (#6053).
- Two new metrics showing total number of responses from each upstream DNS server and their average processing time in the Web UI (#1453).
-
[1.8.0]
- Update AdGuard Home to 0.108.0-b.45
- Full changelog
- Go version has been updated to prevent the possibility of exploiting the CVE-2023-39318, CVE-2023-39319, and CVE-2023-39320 Go vulnerabilities fixed in Go 1.20.8.
- AdBlock-style syntax support for ignored domains in logs and statistics (#5720).
- Strict-Transport-Security header in the HTTP API and DNS-over-HTTPS responses when HTTPS is forced (#2998). See RFC 6797.
- UI for the schedule of the service-blocking pause (#951).
-
[1.8.1]
- Update AdGuard Home to 0.108.0-b.46
- Full changelog
- Incorrect original answer when a response is filtered (#6183).
- Comments in the Fallback DNS servers field in the UI (#6182).
- Empty or default Safe Browsing and Parental Control settings (#6181).
- Various UI issues.
-
[1.9.0]
- Update base image to 4.2.0
-
[1.10.0]
- Update AdGuard Home to 0.108.0-b.47
- Full changelog
- Go version has been updated to prevent the possibility of exploiting the CVE-2023-39323 and CVE-2023-39325 Go vulnerabilities fixed in Go 1.20.9 and Go 1.20.10.
- Ability to edit static leases on DHCP settings page (#1700).
- Ability to specify for how long clients should cache a filtered response, using the Blocked response TTL field on the DNS settings page (#4569).
-
[1.10.1]
- Update AdGuard Home to 0.108.0-b.47
- Full changelog
- "Block" and "Unblock" buttons of the query log moved to the tooltip menu (#684).
- Dashboard tables scroll issue (#6180).
- Issues with QUIC and HTTP/3 upstreams on FreeBSD (#6301).
- Panic on clearing query log (#6304).
- The time shown in the statistics is one hour less than the current time (#6296).
-
[1.10.2]
- Update AdGuard Home to 0.108.0-b.49
- Full changelog
- Go version has been updated to prevent the possibility of exploiting the CVE-2023-45283 and CVE-2023-45284 Go vulnerabilities fixed in Go 1.20.11.
- Ability to specify subnet lengths for IPv4 and IPv6 addresses, used for rate limiting requests, in the configuration file (#6368).
- Ability to specify multiple domain specific upstreams per line, e.g. [/domain1/../domain2/]upstream1 upstream2 .. upstreamN (#4977).
- Increased the height of the ready-to-use filter lists dialog (#6358).
- Improved logging of authentication failures (#6357).
- New properties dns.ratelimit_subnet_len_ipv4 and dns.ratelimit_subnet_len_ipv6 have been added to the configuration file (#6368).
- Schedule timezone not being sent (#6401).
- Average request processing time calculation (#6220).
- Redundant truncation of long client names in the Top Clients table (#6338).
- Scrolling column headers in the tables (#6337).
- $important,dnsrewrite rules not overriding allowlist rules (#6204).
- Dark mode DNS rewrite background (#6329).
- Issues with QUIC and HTTP/3 upstreams on Linux (#6335).