v1.2.1 Release Notes

Release Date: 2019-04-17 // almost 4 years ago
  • 🚀 This release includes a security fix for a vulnerability discovered in replay attack protection.

    Without this fix, an attacker can craft a packet with high sequence number to a client or server, and stop all future packets in the connection from being received.

    🚀 Please update to this release ASAP!

Previous changes from v1.1

  • 🚀 Changes in this release:

    1. Per-client timeouts can now be specified in the connect token ⏱ 2. Negative timeout values disable timeout (useful for debugging)
    2. Negative expire seconds disables token expiry (useful for debugging)
    3. Added netcode_client_get_port and netcode_server_get_port to get the bound socket ports when the bind address has port 0. 🚀 5. Golang and Rust implementations have been moved out to their own repositories so they can have different release cycles. ⚡️ 6. To implement per-client timeouts the code has been updated to NETCODE 1.01 spec.