summaryrefslogtreecommitdiff
path: root/ext/installfiles/windows/ZeroTier One.aip
AgeCommit message (Collapse)Author
2017-04-24Windows version bump.Adam Ierymenko
2017-03-17Windows installer version bump and a build fix.Adam Ierymenko
2017-03-14Windows version bump.Adam Ierymenko
2017-03-14Software update cleanup, and a fix for updates on Windows.Adam Ierymenko
2017-03-07Windows build process updates, and repackage everything using new EV ↵Adam Ierymenko
certificate and SHA256.
2017-03-07Windows build fixes.Adam Ierymenko
2017-01-13Windows update build in Advanced Installer, and warning removal.Adam Ierymenko
2016-12-23Windows installer updates.Adam Ierymenko
2016-07-211.1.14 Windows version stuffAdam Ierymenko
2016-07-14Windows installer now installs a batch file and Path variable settings to ↵Adam Ierymenko
make zerotier-cli work in the Windows CLI (1.1.12 MSI updated on web for this too) and a Chocolatey packaging job for ZeroTier One.
2016-06-29Windows: ship it!Adam Ierymenko
2016-03-02Windows cleanup.Adam Ierymenko
2015-12-21.Adam Ierymenko
2015-12-211.1.2 Windows build fixes, tweaks, etc.Adam Ierymenko
2015-11-17Just add a launch prerequisite for .NET 4.5 -- it's usually there, and if ↵Adam Ierymenko
not it can be easily installed. This is mostly an issue on old Windows Server systems, and in that case the admin will likely want to decide how to proceed.
2015-11-16Turns out it wasn't hard to add miniupnpc to the VS2012 project and just ↵Adam Ierymenko
have it build with the rest of the code.
2015-11-13Update installer to drag along a net-install binary for .NET 4.5 that it ↵Adam Ierymenko
runs if .NET 4.5 is not present... because yes we have to install Microsoft's own flagship runtime under some conditions. (Rare, but present.)
2015-11-12Remove old Windows NDIS5 tap driver -- I think this is dead.Adam Ierymenko
2015-08-13Windows driver (NDIS6) rebuild using earlier DDK revision to allow driver to ↵Adam Ierymenko
load in Windows 2008 Server and Windows Vista. Still issues with those platforms, but driver loads -- and shouldn't hurt newer versions (will test).
2015-07-30Bring back _winPokeAHole() to dynamically allocate firewall exception. ↵Adam Ierymenko
Shouldn't be needed but seems to help on Windows 8.
2015-07-30Because Windows, because Windows. Now it upgrades correctly from 1.0.1, ↵Adam Ierymenko
including automatic driver update from NDIS5 to NDIS6. Also a bit more robust on creating new ports, just in case.
2015-07-30Save enumeration of statically assigned IPs so they will always be ↵Adam Ierymenko
reassigned on device "power cycle."
2015-07-301.0.4 installer GUIDAdam Ierymenko
2015-07-30Kill the devcon.exe dependency by dynamically loading cfgmgr32, newdev, and ↵Adam Ierymenko
setupapi and using these functions directly.
2015-07-291.0.4 release installer changesAdam Ierymenko
2015-07-28Add miniupnpc builds for Windows, fix some Windows build warnings.Adam Ierymenko
2015-06-03Product code for 1.0.3 etc.Adam Ierymenko
2015-05-20Windows auto-update integration into OneService.Adam Ierymenko
2015-05-19Make tap driver even more defensive... seems to maybe fix the new network ↵Adam Ierymenko
problem. Have to test a bit more.
2015-05-19Windows build warning removal, be more defensive in Windows tap driver code, ↵Adam Ierymenko
and clean up service start/stop in installer.
2015-05-19Few more fixes to installer firewall rule settings.Adam Ierymenko
2015-05-19Get rid of old _winPokeAHole() hack in one.cpp and use Advanced Installer to ↵Adam Ierymenko
configure firewall rules (because we can now).
2015-05-19Enable right-click menu for copy/paste/etc. in Windows UI wrapper.Adam Ierymenko
2015-05-19Add 32-bit chained MSI for NDIS6 driver... now to go test on 32-bit Windows ↵Adam Ierymenko
(clean). (And Windows 10, and Windows Server, and ...)
2015-05-18A visit to the Windows house of pain:Adam Ierymenko
(1) Yes, you *can* create a mixed 32/64 bit Windows MSI installer that installs drivers. All you have to do is... umm... create individual sub-MSI files for each driver (one for 32, one for 64) and then package those in the main MSI files as "chained" MSI installers. Each of these must only be considered a prerequisite on 32 or 64 bit machines, respectively. (2) Upgrade Advanced Installer version, add rules to uninstall NDIS6 tap device on uninstall. (3) Fix IE issue in UI code.
2014-12-05VERSION 1.0.1Adam Ierymenko
This version is mostly a bug fix release. It fixes a bug that could cause the service to crash on Windows while running the GUI application. It also contains a number of fixes to the Linux installer and Linux support for systemd-based init systems. It also includes a minor tweak to the multicast algorithm. Version 1.0.0 sent multicasts in a deterministic order, while this version randomizes the order. The vast majority of users will notice nothing, but this may result in superior coverage for service announcements on very large networks. It's a hard variation to test, so we're releasing like this to gather information from users about the effect. Nothing will change on small networks, and ordinary multicast functions like ARP and NDP should be unaffected. The next version will likely focus on additional improvements to Microsoft Windows support, since there are several known Windows issues in need of attention. We're working on an NDIS6-based Tap driver that should address the driver issues experienced by a small number of Windows 7 users.
2014-10-30Fix for UI client.Adam Ierymenko
2014-10-29Windows service fix -- it helps if we actually launch the control socket thing.Adam Ierymenko
2014-08-22VERSION 0.9.2:Adam Ierymenko
The primary focus of this version is better integration with the Microsoft Windows operating system. Virtual networks should now be detected as "real" networks. For each network, a message box should pop up the first time the network is detected and classified allowing the user to choose its services and security designation. On Windows 7 this is "work," "home," or "public." On Windows 8 it's a simple choice of whether or not to enable file and printer sharing and other services. Several bugs have been fixed. Among these are a Windows threading issue, several minor threading deadlock issues that could manifest if rapidly adding and removing networks, and a command line interface issue. The network list now shows the network MAC address as well, a UI oversight in previous versions. A vectorized SSE implementation of Salsa20 is now included for improved encrypt/decrypt performance. The sending of low-TTL "firewall opener" packets has been disabled in this version, since they may not be necessary and may harm NAT traversal in some configurations. We will measure the effectiveness of NAT traversal and see if this change improves performance in the field. Finally, this version obsoletes both the Tokyo and Sydney supernodes in favor of a single larger supernode in Singapore. This decision was made on the basis of bandwidth costs-- both Tokyo and Sydney are significantly more expensive. We'd like to keep the basic service free, so keeping bandwidth costs for relaying low is important. Since NAT traversal works well and is constantly being improved, most users will not see a speed decrease from this. Some Chinese users may see improved performance since Singapore may be closer than Tokyo to many Chinese cities. The next major releases will focus on better Macintosh platform integration, further improvements to NAT traversal, and UI improvements.
2014-08-21Fix for crazy Windows threading bug... repeatedly adding and removing a ↵Adam Ierymenko
network now doesn't leave networks in limbo.
2014-08-20Version bump to 0.9.2 -- preparing for release...Adam Ierymenko
2014-08-04Windows Ethernet tap refactoring complete.Adam Ierymenko
2014-07-03VERSION 0.9.1: bug fixes and experimental bridging supportAdam Ierymenko
This version fixes several bugs including an issue with networks that have EtherType filtering disabled, a file permission issue that affected non-English versions of Windows, a multicast propagation bug that caused multicasts to be dropped more often than they should be, and an issue with IP auto-configuration. It also introduces experimental support for bridging between physical and virtual networks, a much-requested and powerful ability that's been planned from the start. ZeroTier One can now replace the functionality of ordinary VPNs, link multiple offices into a single LAN, and connect virtual machine backplanes in the cloud to physical networks at home, among other things. Bridging support isn't "officially" out yet, since the web UI part is still in development. But when that is done, an official announcement will be made on the blog and users can try it out. So far bridging has only been tested under Linux with the Linux kernel's native bridging driver. YMMV on other platforms. Try it out and let us know by filing bugs at GitHub or e-mailing them to "contact@zerotier.com".
2014-05-29Installer updates from 0.9.0 release -- only useful to me.Adam Ierymenko
2014-05-23Upgrade AIP for new version of Advanced Installer, bump to 0.9.0.Adam Ierymenko
2014-04-10VERSION 0.8.2Adam Ierymenko
This version fixes a few more issues with TCP tunneling including GitHub issue #63. It also adds automatic announcement and location of peers on physical LANs (GitHub issue #56) which should greatly improve performance if you happen to be on the same LAN or WiFi network as another peer. It can take 60 seconds or so for this to occur, but it should.
2014-04-09VERSION 0.8.1Adam Ierymenko
This, quick on the heels of 0.8.0, fixes the fact that TCP tunneling was broken. :) There was a bug that only manifested in some cases, and not on my testnet. I took the opportunity to clean up some of that logic generally. I need a better testnet, but that will have to wait until we exit beta and hopefully I can earn a little bit of money off this. A better testnet will require a big beefy virtualization box or two to run hundreds to thousands of KVMs. Also fixed a tiny cosmetic issue on Windows. Other than that no changes.
2014-04-08VERSION 0.8.0Adam Ierymenko
This version introduces a major new feature requested by several users, both via the user survey and otherwise: TCP tunneling. If you are not able to communicate over UDP/9993, ZeroTier One will switch to TCP connections to ZeroTier's supernodes. This is always slower than UDP, but will allow you to communicate behind all but the most extremely restrictive firewalls. This TCP traffic travels over port 443 and looks like HTTPS (SSL) traffic (though it isn't), since that port is almost always open. This also fixes several minor bugs and attempts to improve the robustness of Windows tap driver management. Several users have reported spurious issues with the Windows tap device, though I was unable to reproduce any of these with clean VMs. (Tried Windows 7 and 8.1, both x86 and x64. No luck.) But I tried to beef up the tap code anyway in the hopes of catching it. It now tries a lot harder to make sure the tap is up and running. There was some significant under the hood refactoring in support of TCP, so this was a non-trivial change. I bumped the version to 0.8 to indicate that more and more features are being crossed off the list as we approach 1.0 and exit from beta. After this, the next major feature will be LAN announcement to find direct paths to peers on the same physical LAN. But assuming that 0.8.0 goes smoothly, I am going to divert attention to the web site. A new design is coming that is much cleaner, sharper, and easier to use. Thank you all for all your excellent feedback! We're well on the way to a killer product that makes conventional VPNs and other kludges obsolete.
2014-04-08More Windows tap cleanup... seems solid. We'll see.Adam Ierymenko
2014-04-08Some installer stuff, complete refactoring of Windows side of newly split ↵Adam Ierymenko
tap driver. Seems to work. Now to see if the cleanup we did here gets rid of the zombie tap device issue on Windows.