Skip to content
Cloudflare Docs

Changelog

Subscribe to RSS

2025-06-05


WARP client for Windows (version 2025.5.735.1)

A new Beta release for the Windows WARP client is now available on the beta releases downloads page.

This release contains improvements and new exciting features, including SCCM VPN boundary support and post-quantum cryptography. By tunneling your corporate network traffic over Cloudflare, you can now gain the immediate protection of post-quantum cryptography without needing to upgrade any of your individual corporate applications or systems.

Changes and improvements

  • Fixed a device registration issue causing WARP connection failures when changing networks.
  • Captive portal improvements including showing connectivity status in the client and sending system notifications for captive portal sign in.
  • Fixed a bug where in Gateway with DoH mode, connection to DNS servers was not automatically restored after reconnecting WARP.
  • The WARP client now applies post-quantum cryptography end-to-end on enabled devices accessing resources behind a Cloudflare Tunnel. This feature can be enabled by MDM.
  • Improvement to gracefully handle changes made by MDM while WARP is not running.
  • Improvement for multi-user mode to avoid unnecessary key rotations when transitioning from a pre-login to a logged-in state.
  • Added a WARP client device posture check for SAN attributes to the client certificate check.
  • Fixed an issue affecting Split Tunnel Include mode, where traffic outside the tunnel was blocked when switching between Wi-Fi and ethernet networks.
  • Added SCCM VPN boundary support to device profile settings. With SCCM VPN boundary support enabled, operating systems will register WARP's local interface IP with the on-premise DNS server when reachable.

Known issues

  • We have received reports of performance issues from some customers that have upgraded to 24H2 with the Windows Filtering Platform and local device firewall rules. We highly recommend customers test this Windows client thoroughly before full deployment as we continue to work with Microsoft to resolve these issues.

  • Devices with KB5055523 installed may receive a warning about Win32/ClickFix.ABA being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to version 1.429.19.0 or later.

  • DNS resolution may be broken when the following conditions are all true:

    • WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.
    • A custom DNS server address is configured on the primary network adapter.
    • The custom DNS server address on the primary network adapter is changed while WARP is connected. To work around this issue, reconnect the WARP client by toggling off and back on.

2025-06-05


WARP client for macOS (version 2025.5.735.1)

A new Beta release for the macOS WARP client is now available on the beta releases downloads page.

This release contains improvements and new exciting features, including post-quantum cryptography. By tunneling your corporate network traffic over Cloudflare, you can now gain the immediate protection of post-quantum cryptography without needing to upgrade any of your individual corporate applications or systems.

Changes and improvements

  • Fixed an issue where the Cloudflare WARP application may not have automatically relaunched after an update.
  • Fixed a device registration issue causing WARP connection failures when changing networks.
  • Captive portal improvements including showing connectivity status in the client and sending system notifications for captive portal sign in.
  • The WARP client now applies post-quantum cryptography end-to-end on enabled devices accessing resources behind a Cloudflare Tunnel. This feature can be enabled by MDM.
  • Improvement to gracefully handle changes made by MDM while WARP is not running.
  • Fixed an issue affecting Split Tunnel Include mode, where traffic outside the tunnel was blocked when switching between Wi-Fi and ethernet networks.

Known issues

  • macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.4 or later.

2025-05-27


Gateway Protocol Detection Now Available for PAYGO and Free Plans

All Cloudflare One Gateway users can now use Protocol detection logging and filtering, including those on Pay-as-you-go and Free plans.

With Protocol Detection, admins can identify and enforce policies on traffic proxied through Gateway based on the underlying network protocol (for example, HTTP, TLS, or SSH), enabling more granular traffic control and security visibility no matter your plan tier.

This feature is available to enable in your account network settings for all accounts. For more information on using Protocol Detection, refer to the Protocol detection documentation.

2025-05-22


WARP client for Windows (version 2025.4.943.0)

A new GA release for the Windows WARP client is now available on the stable releases downloads page.

This release contains a hotfix for managed networks for the 2025.4.929.0 release.

Changes and improvements

  • Fixed an issue where it could take up to 3 minutes for the correct device profile to be applied in some circumstances. In the worst case, it should now only take up to 40 seconds. This will be improved further in a future release.

Known issues

  • DNS resolution may be broken when the following conditions are all true:

    • WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.
    • A custom DNS server address is configured on the primary network adapter.
    • The custom DNS server address on the primary network adapter is changed while WARP is connected.

    To work around this issue, reconnect the WARP client by toggling off and back on.

  • We have received reports of performance issues from some customers that have upgraded to 24H2 with the Windows Filtering Platform and local device firewall rules. Before rolling out this Windows version, we highly encourage customers to test thoroughly as we continue to debug with Microsoft.

  • Devices with KB5055523 installed may receive a warning about Win32/ClickFix.ABA being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to version 1.429.19.0 or later.

2025-05-22


WARP client for macOS (version 2025.4.943.0)

A new GA release for the macOS WARP client is now available on the stable releases downloads page.

This release contains a hotfix for managed networks for the 2025.4.929.0 release.

Changes and improvements

  • Fixed an issue where it could take up to 3 minutes for the correct device profile to be applied in some circumstances. In the worst case, it should now only take up to 40 seconds. This will be improved further in a future release.

Known issues

  • macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.4 or later.

2025-05-22


WARP client for Linux (version 2025.4.943.0)

A new GA release for the Linux WARP client is now available on the stable releases downloads page.

This release contains a hotfix for managed networks for the 2025.4.929.0 release.

Changes and improvements

  • Fixed an issue where it could take up to 3 minutes for the correct device profile to be applied in some circumstances. In the worst case, it should now only take up to 40 seconds. This will be improved further in a future release.

2025-05-16


New Access Analytics in the Cloudflare One Dashboard

A new Access Analytics dashboard is now available to all Cloudflare One customers. Customers can apply and combine multiple filters to dive into specific slices of their Access metrics. These filters include:

  • Logins granted and denied
  • Access events by type (SSO, Login, Logout)
  • Application name (Salesforce, Jira, Slack, etc.)
  • Identity provider (Okta, Google, Microsoft, onetimepin, etc.)
  • Users (chris@cloudflare.com, sally@cloudflare.com, rachel@cloudflare.com, etc.)
  • Countries (US, CA, UK, FR, BR, CN, etc.)
  • Source IP address
  • App type (self-hosted, Infrastructure, RDP, etc.)
Access Analytics

To access the new overview, log in to your Cloudflare Zero Trust dashboard and find Analytics in the side navigation bar.

2025-05-14


WARP client for Windows (version 2025.4.929.0)

A new GA release for the Windows WARP client is now available on the stable releases downloads page.

This release contains two significant changes all customers should be aware of:

  1. All DNS traffic now flows inside the WARP tunnel. Customers are no longer required to configure their local firewall rules to allow our DoH IP addresses and domains.
  2. When using MASQUE, the connection will fall back to HTTP/2 (TCP) when we detect that HTTP/3 traffic is blocked. This allows for a much more reliable connection on some public WiFi networks.

Changes and improvements

  • Fixed an issue causing reconnection loops when captive portals are detected.
  • Fixed an issue that caused WARP client disk encryption posture checks to fail due to missing drive names.
  • Fixed an issue where managed network policies could incorrectly report network location beacons as missing.
  • Improved DEX test error reporting.
  • Fixed an issue where some parts of the WARP Client UI were missing in high contrast mode.
  • Fixed an issue causing client notifications to fail in IPv6 only environments which prevented the client from receiving configuration changes to settings like device profile.
  • Added a TCP fallback for the MASQUE tunnel protocol to improve connectivity on networks that block UDP or HTTP/3 specifically.
  • Added new IP addresses for tunnel connectivity checks. If your organization uses a firewall or other policies you will need to exempt these IPs.
  • DNS over HTTPS traffic is now included in the WARP tunnel by default.
  • Improved the error message displayed in the client GUI when the rate limit for entering an incorrect admin override code is met.
  • Improved handling of non-SLAAC IPv6 interface addresses for better connectivity in IPv6 only environments.
  • Fixed an issue where frequent network changes could cause WARP to become unresponsive.
  • Improvement for WARP to check if tunnel connectivity fails or times out at device wake before attempting to reconnect.
  • Fixed an issue causing WARP connection disruptions after network changes.

Known issues

  • DNS resolution may be broken when the following conditions are all true:

    • WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.
    • A custom DNS server address is configured on the primary network adapter.
    • The custom DNS server address on the primary network adapter is changed while WARP is connected.

    To work around this issue, reconnect the WARP client by toggling off and back on.

  • We have received reports of performance issues from some customers that have upgraded to 24H2 with the Windows Filtering Platform and local device firewall rules. Before rolling out this Windows version, we highly encourage customers to test thoroughly as we continue to debug with Microsoft.

  • Devices with KB5055523 installed may receive a warning about Win32/ClickFix.ABA being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to version 1.429.19.0 or later.

2025-05-14


Domain Categories improvements

New categories added

Parent IDParent NameCategory IDCategory Name
1Ads66Advertisements
3Business & Economy185Personal Finance
3Business & Economy186Brokerage & Investing
21Security Threats187Compromised Domain
21Security Threats188Potentially Unwanted Software
6Education189Reference
9Government & Politics190Charity and Non-profit

Changes to existing categories

Original NameNew Name
ReligionReligion & Spirituality
GovernmentGovernment/Legal
RedirectURL Alias/Redirect

Refer to Gateway domain categories to learn more.

2025-05-13


New Applications Added for DNS Filtering

You can now create DNS policies to manage outbound traffic for an expanded list of applications. This update adds support for 273 new applications, giving you more control over your organization's outbound traffic.

With this update, you can:

  • Create DNS policies for a wider range of applications
  • Manage outbound traffic more effectively
  • Improve your organization's security and compliance posture

For more information on creating DNS policies, see our DNS policy documentation.

2025-05-13


SAML HTTP-POST bindings support for RBI

Remote Browser Isolation (RBI) now supports SAML HTTP-POST bindings, enabling seamless authentication for SSO-enabled applications that rely on POST-based SAML responses from Identity Providers (IdPs) within a Remote Browser Isolation session. This update resolves a previous limitation that caused 405 errors during login and improves compatibility with multi-factor authentication (MFA) flows.

With expanded support for major IdPs like Okta and Azure AD, this enhancement delivers a more consistent and user-friendly experience across authentication workflows. Learn how to set up Remote Browser Isolation.

2025-05-12


WARP client for Linux (version 2025.4.929.0)

A new GA release for the Linux WARP client is now available on the stable releases downloads page.

This release contains two significant changes all customers should be aware of:

  1. All DNS traffic now flows inside the WARP tunnel. Customers are no longer required to configure their local firewall rules to allow our DoH IP addresses and domains.
  2. When using MASQUE, the connection will fall back to HTTP/2 (TCP) when we detect that HTTP/3 traffic is blocked. This allows for a much more reliable connection on some public WiFi networks.

Changes and improvements

  • Fixed an issue where the managed network policies could incorrectly report network location beacons as missing.
  • Improved DEX test error reporting.
  • Fixed an issue causing client notifications to fail in IPv6 only environments which prevented the client from receiving configuration changes to settings like device profile.
  • Added a TCP fallback for the MASQUE tunnel protocol to improve connectivity on networks that block UDP or HTTP/3 specifically.
  • Added new IP addresses for tunnel connectivity checks. If your organization uses a firewall or other policies you will need to exempt these IPs.
  • Fixed an issue where frequent network changes could cause WARP to become unresponsive.
  • DNS over HTTPS traffic is now included in the WARP tunnel by default.
  • Improvement for WARP to check if tunnel connectivity fails or times out at device wake before attempting to reconnect.
  • Fixed an issue causing WARP connection disruptions after network changes.

2025-05-12


WARP client for macOS (version 2025.4.929.0)

A new GA release for the macOS WARP client is now available on the stable releases downloads page.

This release contains two significant changes all customers should be aware of:

  1. All DNS traffic now flows inside the WARP tunnel. Customers are no longer required to configure their local firewall rules to allow our DoH IP addresses and domains.
  2. When using MASQUE, the connection will fall back to HTTP/2 (TCP) when we detect that HTTP/3 traffic is blocked. This allows for a much more reliable connection on some public WiFi networks.

Changes and improvements

  • Fixed an issue where the managed network policies could incorrectly report network location beacons as missing.
  • Improved DEX test error reporting.
  • Fixed an issue causing client notifications to fail in IPv6 only environments which prevented the client from receiving configuration changes to settings like device profile.
  • Improved captive portal detection.
  • Added a TCP fallback for the MASQUE tunnel protocol to improve connectivity on networks that block UDP or HTTP/3 specifically.
  • Added new IP addresses for tunnel connectivity checks. If your organization uses a firewall or other policies you will need to exempt these IPs.
  • DNS over HTTPS traffic is now included in the WARP tunnel by default.
  • Improved the error message displayed in the client GUI when the rate limit for entering an incorrect admin override code is met.
  • Improved handling of non-SLAAC IPv6 interface addresses for better connectivity in IPv6 only environments.
  • Fixed an issue where frequent network changes could cause WARP to become unresponsive.
  • Improvement for WARP to check if tunnel connectivity fails or times out at device wake before attempting to reconnect.
  • Fixed an issue causing WARP connection disruptions after network changes.

Known issues

  • macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.4 or later.

2025-05-12


Case Sensitive Custom Word Lists

You can now configure custom word lists to enforce case sensitivity. This setting supports flexibility where needed and aims to reduce false positives where letter casing is critical.

dlp

2025-05-08


Open email attachments with Browser Isolation

You can now safely open email attachments to view and investigate them.

What this means is that messages now have a Attachments section. Here, you can view processed attachments and their classifications (for example, Malicious, Suspicious, Encrypted). Next to each attachment, a Browser Isolation icon allows your team to safely open the file in a clientless, isolated browser with no risk to the analyst or your environment.

To use this feature, you must:

  • Enable Clientless Web Isolation in your Zero Trust settings.
  • Have Browser Isolation (BISO) seats assigned.

For more details, refer to our setup guide.

Some attachment types may not render in Browser Isolation. If there is a file type that you would like to be opened with Browser Isolation, reach out to your Cloudflare contact.

This feature is available across all CES packages:

  • CES_ADVANTAGE
  • CES_ENTERPRISE
  • CES_ENTERPRISE_PHISHGUARD

2025-05-07


Send forensic copies to storage without DLP profiles

You can now send DLP forensic copies to third-party storage for any HTTP policy with an Allow or Block action, without needing to include a DLP profile. This change increases flexibility for data handling and forensic investigation use cases.

By default, Gateway will send all matched HTTP requests to your configured DLP Forensic Copy jobs.

DLP

2025-05-01


Browser Isolation Overview page for Zero Trust

A new Browser Isolation Overview page is now available in the Cloudflare Zero Trust dashboard. This centralized view simplifies the management of Remote Browser Isolation (RBI) deployments, providing:

This update consolidates previously disparate settings, accelerating deployment, improving visibility into isolation activity, and making it easier to ensure your protections are working effectively.

Browser Isolation Overview

To access the new overview, log in to your Cloudflare Zero Trust dashboard and find Browser Isolation in the side navigation bar.

2025-04-30


Dark Mode for Zero Trust Dashboard

The Cloudflare Zero Trust dashboard now supports Cloudflare's native dark mode for all accounts and plan types.

Zero Trust Dashboard will automatically accept your user-level preferences for system settings, so if your Dashboard appearance is set to 'system' or 'dark', the Zero Trust dashboard will enter dark mode whenever the rest of your Cloudflare account does.

Zero Trust dashboard supports dark mode

To update your view preference in the Zero Trust dashboard:

  1. Log into the Zero Trust dashboard.
  2. Select your user icon.
  3. Select Dark Mode.

2025-04-28


FQDN Filtering For Gateway Egress Policies

Cloudflare One administrators can now control which egress IP is used based on a destination's fully qualified domain name (FDQN) within Gateway Egress policies.

  • Host, Domain, Content Categories, and Application selectors are now available in the Gateway Egress policy builder in beta.
  • During the beta period, you can use these selectors with traffic on-ramped to Gateway with the WARP client, proxy endpoints (commonly deployed with PAC files), or Cloudflare Browser Isolation.
Egress by FQDN and Hostname

This will help apply egress IPs to your users' traffic when an upstream application or network requires it, while the rest of their traffic can take the most performant egress path.

2025-04-22


WARP client for Windows (version 2025.4.589.1)

A new Beta release for the Windows WARP client is now available on the beta releases downloads page.

Changes and improvements

  • Fixed an issue causing reconnection loops when captive portals are detected.
  • Fixed an issue that caused WARP client disk encryption posture checks to fail due to missing drive names.
  • Fixed an issue where managed network policies could incorrectly report network location beacons as missing.
  • Improved error reporting for DEX tests.
  • Improved WARP client UI high contrast mode.
  • Fixed an issue causing client notifications to fail in IPv6 only environments which prevented the client from receiving configuration changes to settings like device profile.
  • Added a TCP fallback for the MASQUE tunnel protocol to improve compatibility with networks on MASQUE.
  • Added new IP addresses for tunnel connectivity checks. If your organization uses a firewall or other policies you will need to exempt these IPs.
  • DNS over HTTPS traffic is now included in the WARP tunnel by default.
  • Improved the error message displayed in the client GUI when the rate limit for entering an incorrect admin override code is met.
  • Added a Collect Captive Portal Diag button in the client GUI to make it easier for users to collect captive portal debugging diagnostics.
  • Improved handling of non-SLAAC IPv6 interface addresses for better connectivity in IPv6 only environments.
  • Fixed an issue where frequent network changes could cause WARP to become unresponsive.

Known issues

  • DNS resolution may be broken when the following conditions are all true:

    • WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.
    • A custom DNS server address is configured on the primary network adapter.
    • The custom DNS server address on the primary network adapter is changed while WARP is connected.

    To work around this issue, reconnect the WARP client by toggling off and back on.

2025-04-22


WARP client for macOS (version 2025.4.589.1)

A new Beta release for the macOS WARP client is now available on the beta releases downloads page.

Changes and improvements

  • Fixed an issue where managed network policies could incorrectly report network location beacons as missing.
  • Improved DEX test error reporting.
  • Fixed an issue causing client notifications to fail in IPv6 only environments which prevented the client from receiving configuration changes to settings like device profile.
  • Improved captive portal detection.
  • Added a TCP fallback for the MASQUE tunnel protocol to improve compatibility with networks on MASQUE.
  • Added new IP addresses for tunnel connectivity checks. If your organization uses a firewall or other policies you will need to exempt these IPs.
  • DNS over HTTPS traffic is now included in the WARP tunnel by default.
  • Improved the error message displayed in the client GUI when the rate limit for entering an incorrect admin override code is met.
  • Added a Collect Captive Portal Diag button in the client GUI to make it easier for users to collect captive portal debugging diagnostics.
  • Improved handling of non-SLAAC IPv6 interface addresses for better connectivity in IPv6 only environments.
  • Fixed an issue where frequent network changes could cause WARP to become unresponsive.

Known issues

  • macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.4 or later.

2025-04-21


Access bulk policy tester

The Access bulk policy tester is now available in the Cloudflare Zero Trust dashboard. The bulk policy tester allows you to simulate Access policies against your entire user base before and after deploying any changes. The policy tester will simulate the configured policy against each user's last seen identity and device posture (if applicable).

Example policy tester

2025-04-14


New predefined detection entry for ICD-11

You now have access to the World Health Organization (WHO) 2025 edition of the International Classification of Diseases 11th Revision (ICD-11) as a predefined detection entry. The new dataset can be found in the Health Information predefined profile.

ICD-10 dataset remains available for use.

2025-04-11


HTTP redirect and custom block page redirect

You can now use more flexible redirect capabilities in Cloudflare One with Gateway.

  • A new Redirect action is available in the HTTP policy builder, allowing admins to redirect users to any URL when their request matches a policy. You can choose to preserve the original URL and query string, and optionally include policy context via query parameters.
  • For Block actions, admins can now configure a custom URL to display when access is denied. This block page redirect is set at the account level and can be overridden in DNS or HTTP policies. Policy context can also be passed along in the URL.

Learn more in our documentation for HTTP Redirect and Block page redirect.

2025-04-09


Cloudflare Zero Trust SCIM User and Group Provisioning Logs

Cloudflare Zero Trust SCIM provisioning now has a full audit log of all create, update and delete event from any SCIM Enabled IdP. The SCIM logs support filtering by IdP, Event type, Result and many more fields. This will help with debugging user and group update issues and questions.

SCIM logs can be found on the Zero Trust Dashboard under Logs -> SCIM provisioning.

Example SCIM Logs

2025-04-08


WARP client for Windows (version 2025.2.664.0)

A new GA release for the Windows WARP client is now available on the stable releases downloads page.

This release contains a hotfix for captive portal detection for the 2025.2.600.0 release.

Changes and improvements

  • Fix to reduce the number of browser tabs opened during captive portal logins.

Known issues

  • DNS resolution may be broken when the following conditions are all true:

    • WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.
    • A custom DNS server address is configured on the primary network adapter.
    • The custom DNS server address on the primary network adapter is changed while WARP is connected.

    To work around this issue, reconnect the WARP client by toggling off and back on.

2025-04-08


WARP client for macOS (version 2025.2.664.0)

A new GA release for the macOS WARP client is now available on the stable releases downloads page.

This release contains a hotfix for captive portal detection and PF state tables for the 2025.2.600.0 release.

Changes and improvements

  • Fix to reduce the number of browser tabs opened during captive portal logins.
  • Improvement to exclude local DNS traffic entries from PF state table to reduce risk of connectivity issues from exceeding table capacity.

Known issues

  • macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.4 or later.

2025-03-31


WARP client for macOS (version 2025.2.600.0)

A new GA release for the macOS WARP client is now available on the stable releases downloads page.

This release contains support for a new WARP setting, Global WARP override. It also includes significant improvements to our captive portal / public Wi-Fi detection logic. If you have experienced captive portal issues in the past, re-test and give this version a try.

Changes and improvements

  • Improved captive portal detection to make more public networks compatible and have faster detection.
  • Improved error messages shown in the app.
  • WARP tunnel protocol details can now be viewed using the warp-cli tunnel stats command.
  • Fixed an issue with device revocation and re-registration when switching configurations.
  • Added a new Global WARP override setting. This setting puts account administrators in control of disabling and enabling WARP across all devices registered to an account from the dashboard. Global WARP override is disabled by default.

Known issues

  • macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.3 or later.

2025-03-31


WARP client for Windows (version 2025.2.600.0)

A new GA release for the Windows WARP client is now available on the stable releases downloads page.

This release contains support for a new WARP setting, Global WARP override. It also includes significant improvements to our captive portal / public Wi-Fi detection logic. If you have experienced captive portal issues in the past, re-test and give this version a try.

Changes and improvements

  • Improved captive portal detection to make more public networks compatible and have faster detection.
  • Improved error messages shown in the app.
  • Added the ability to control if the WARP interface IPs are registered with DNS servers or not.
  • Removed DNS logs view from the Windows client GUI. DNS logs can be viewed as part of warp-diag or by viewing the log file on the user's local directory.
  • Fixed an issue that would result in a user receiving multiple re-authentication requests when waking their device from sleep.
  • WARP tunnel protocol details can now be viewed using the warp-cli tunnel stats command.
  • Improvements to Windows multi-user including support for fast user switching. If you are interested in testing this feature, reach out to your Cloudflare account team.
  • Fixed an issue with device revocation and re-registration when switching configurations.
  • Fixed an issue where DEX tests would run during certain sleep states where the networking stack was not fully up. This would result in failures that would be ignored.
  • Added a new Global WARP override setting. This setting puts account administrators in control of disabling and enabling WARP across all devices registered to an account from the dashboard. Global WARP override is disabled by default.

Known issues

  • DNS resolution may be broken when the following conditions are all true:

    • WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.
    • A custom DNS server address is configured on the primary network adapter.
    • The custom DNS server address on the primary network adapter is changed while WARP is connected.

    To work around this issue, reconnect the WARP client by toggling off and back on.

2025-03-31


WARP client for Linux (version 2025.2.600.0)

A new GA release for the Linux WARP client is now available on the stable releases downloads page.

This release contains support for a new WARP setting, Global WARP override. It also includes significant improvements to our captive portal / public Wi-Fi detection logic. If you have experienced captive portal issues in the past, re-test and give this version a try.

Changes and improvements

  • Improved captive portal detection to make more public networks compatible and have faster detection.
  • WARP tunnel protocol details can now be viewed using the warp-cli tunnel stats command.
  • Fixed an issue with device revocation and re-registration when switching configurations.
  • Added a new Global WARP override setting. This setting puts account administrators in control of disabling and enabling WARP across all devices registered to an account from the dashboard. Global WARP override is disabled by default.

2025-03-21


Secure DNS Locations Management User Role

We're excited to introduce the Cloudflare Zero Trust Secure DNS Locations Write role, designed to provide DNS filtering customers with granular control over third-party access when configuring their Protective DNS (PDNS) solutions.

Many DNS filtering customers rely on external service partners to manage their DNS location endpoints. This role allows you to grant access to external parties to administer DNS locations without overprovisioning their permissions.

Secure DNS Location Requirements:

  • Mandate usage of Bring your own DNS resolver IP addresses if available on the account.

  • Require source network filtering for IPv4/IPv6/DoT endpoints; token authentication or source network filtering for the DoH endpoint.

You can assign the new role via Cloudflare Dashboard (Manage Accounts > Members) or via API. For more information, refer to the Secure DNS Locations documentation.

2025-03-17


Cloudflare One Agent for Android (version 2.4)

A new GA release for the Android Cloudflare One Agent is now available in the Google Play Store. This release includes a new feature allowing team name insertion by URL during enrollment, as well as fixes and minor improvements.

Changes and improvements

  • Improved in-app error messages.
  • Improved mobile client login with support for team name insertion by URL.
  • Fixed an issue preventing admin split tunnel settings taking priority for traffic from certain applications.

2025-03-17


Cloudflare One Agent for iOS (version 1.10)

A new GA release for the Android Cloudflare One Agent is now available in the iOS App Store. This release includes a new feature allowing team name insertion by URL during enrollment, as well as fixes and minor improvements.

Changes and improvements

  • Improved in-app error messages.
  • Improved mobile client login with support for team name insertion by URL.
  • Bug fixes and performance improvements.

2025-03-13


WARP client for macOS (version 2025.2.460.1)

A new Beta release for the macOS WARP client is now available on the beta releases downloads page.

This release contains significant improvements to our captive portal / public Wi-Fi detection logic. If you have experienced captive portal issues in the past, re-test and give this version a try.

Changes and improvements

  • Improved captive portal detection to make more public networks compatible and have faster detection.
  • Improved error messages shown in the app.
  • WARP tunnel protocol details can now be viewed using the warp-cli tunnel stats command.
  • Fixed issue with device revocation and re-registration when switching configurations.

Known issues

  • macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.3 or later.

2025-03-13


WARP client for Windows (version 2025.2.460.1)

A new Beta release for the Windows WARP client is now available on the beta releases downloads page.

This release contains significant improvements to our captive portal / public Wi-Fi detection logic. If you have experienced captive portal issues in the past, re-test and give this version a try.

Changes and improvements

  • Improved captive portal detection to make more public networks compatible and have faster detection.
  • Improved error messages shown in the app.
  • Added the ability to control if the WARP interface IPs are registered with DNS servers or not.
  • Removed DNS logs view from the Windows client GUI. DNS logs can be viewed as part of warp-diag or by viewing the log file on the user's local directory.
  • Fixed issue that would result in a user receiving multiple re-authentication requests when waking their device from sleep.
  • WARP tunnel protocol details can now be viewed using the warp-cli tunnel stats command.
  • Improvements to Windows multi-user including support for fast user switching. If you are interested in testing this feature, reach out to your Cloudflare account team.
  • Fixed issue with device revocation and re-registration when switching configurations.
  • Fixed issue where DEX tests would run during certain sleep states where the networking stack was not fully up. This would result in failures that would be ignored.

Known issues

  • DNS resolution may be broken when the following conditions are all true:

    • WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.
    • A custom DNS server address is configured on the primary network adapter.
    • The custom DNS server address on the primary network adapter is changed while WARP is connected.

    To work around this issue, reconnect the WARP client by toggling off and back on.

2025-03-07


Cloudflare One Agent now supports Endpoint Monitoring

Digital Experience Monitoring (DEX) provides visibility into device, network, and application performance across your Cloudflare SASE deployment. The latest release of the Cloudflare One agent (v2025.1.861) now includes device endpoint monitoring capabilities to provide deeper visibility into end-user device performance which can be analyzed directly from the dashboard.

Device health metrics are now automatically collected, allowing administrators to:

  • View the last network a user was connected to
  • Monitor CPU and RAM utilization on devices
  • Identify resource-intensive processes running on endpoints
Device endpoint monitoring dashboard

This feature complements existing DEX features like synthetic application monitoring and network path visualization, creating a comprehensive troubleshooting workflow that connects application performance with device state.

For more details refer to our DEX documentation.

2025-03-04


Gain visibility into user actions in Zero Trust Browser Isolation sessions

We're excited to announce that new logging capabilities for Remote Browser Isolation (RBI) through Logpush are available in Beta starting today!

With these enhanced logs, administrators can gain visibility into end user behavior in the remote browser and track blocked data extraction attempts, along with the websites that triggered them, in an isolated session.

{
"AccountID": "$ACCOUNT_ID",
"Decision": "block",
"DomainName": "www.example.com",
"Timestamp": "2025-02-27T23:15:06Z",
"Type": "copy",
"UserID": "$USER_ID"
}

User Actions available:

  • Copy & Paste
  • Downloads & Uploads
  • Printing

Learn more about how to get started with Logpush in our documentation.

2025-03-03


New SAML and OIDC Fields and SAML transforms for Access for SaaS

Access for SaaS applications now include more configuration options to support a wider array of SaaS applications.

SAML and OIDC Field Additions

OIDC apps now include:

  • Group Filtering via RegEx
  • OIDC Claim mapping from an IdP
  • OIDC token lifetime control
  • Advanced OIDC auth flows including hybrid and implicit flows
OIDC field additions

SAML apps now include improved SAML attribute mapping from an IdP.

SAML field additions

SAML transformations

SAML identities sent to Access applications can be fully customized using JSONata expressions. This allows admins to configure the precise identity SAML statement sent to a SaaS application.

Configured SAML statement sent to application

2025-02-19


WARP client for Windows (version 2025.1.861.0)

A new GA release for the Windows WARP client is now available on the stable releases downloads page.

This release contains only improvements.

Changes and improvements

  • Improved command line interface for Access for Infrastructure with added function for filtering and ordering.
  • Fixed client connectivity issues when switching between managed network profiles that use different WARP protocols.
  • Added support for WARP desktop to use additional DoH endpoints to help reduce NAT congestion.
  • Improved connectivity check reliability in certain split tunnel configurations.
  • Improved reading of device DNS settings at connection restart.
  • Improved WARP connectivity in environments with virtual machine interfaces.
  • Improved Wireguard connection stability on reconnections.
  • Improved reliability of device posture checks for OS Version, Unique Client ID, Domain Joined, Disk Encryption, and Firewall attributes.
  • Added additional HTTP/3 QUIC connectivity test to warp-diag.
  • Added support for collection of system health metrics for enhanced device Digital Experience Monitoring.
  • Automated the removal of active registrations for devices with multiple registrations with the same Zero Trust organization.

Known issues

  • DNS resolution may be broken when the following conditions are all true:

    • WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.
    • A custom DNS server address is configured on the primary network adapter.
    • The custom DNS server address on the primary network adapter is changed while WARP is connected.

    To work around this issue, reconnect the WARP client by toggling off and back on.

2025-02-19


WARP client for macOS (version 2025.1.861.0)

A new GA release for the macOS WARP client is now available on the stable releases downloads page.

This release contains minor fixes and improvements.

Note: If using macOS Sequoia, Cloudflare recommends the use of macOS 15.3 or later. With macOS 15.3, Apple addressed several issues that may have caused the WARP client to not behave as expected when used with macOS 15.0.x.

Changes and improvements

  • Improved command line interface for Access for Infrastructure with added function for filtering and ordering.
  • Fixed client connectivity issues when switching between managed network profiles that use different WARP protocols.
  • Improved OS version posture checks on macOS for greater reliability and availability.
  • Added support for WARP desktop to use additional DoH endpoints to help reduce NAT congestion.
  • Improved Wireguard connection stability on reconnections.
  • Added additional HTTP/3 QUIC connectivity test to warp-diag.
  • Added support for collection of system health metrics for enhanced device Digital Experience Monitoring.
  • Automated the removal of active registrations for devices with multiple registrations with the same Zero Trust organization.
  • Fixes issues with deleted registration at start up.

Known issues

  • macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.3 or later.

2025-02-19


WARP client for Linux (version 2025.1.861.0)

A new GA release for the Linux WARP client is now available on the stable releases downloads page.

This release includes fixes and minor improvements.

Changes and improvements

  • Improved command line interface for Access for Infrastructure with added function for filtering and ordering.
  • Fixed client connectivity issues when switching between managed network profiles that use different WARP protocols.
  • Added support for WARP desktop to use additional DoH endpoints to help reduce NAT congestion.
  • Improved Wireguard connection stability on reconnections.
  • Added additional HTTP/3 QUIC connectivity test to warp-diag.
  • Added support for collection of system health metrics for enhanced device Digital Experience Monitoring.
  • Automated the removal of active registrations for devices with multiple registrations with the same Zero Trust organization.

2025-02-14


Configure your Magic WAN Connector to connect via static IP assigment

You can now locally configure your Magic WAN Connector to work in a static IP configuration.

This local method does not require having access to a DHCP Internet connection. However, it does require being comfortable with using tools to access the serial port on Magic WAN Connector as well as using a serial terminal client to access the Connector's environment.

For more details, refer to WAN with a static IP address.

2025-02-07


WARP client for macOS (version 2025.1.634.1)

A new Beta release for the macOS WARP client is now available on the beta releases downloads page.

This release contains only a hotfix from the 2025.1.447.1 release. Note: If using macOS Sequoia, Cloudflare recommends the use of macOS 15.2 or later. With macOS 15.2, Apple addressed several issues that may have caused the WARP client to not behave as expected when used with macOS 15.0.x. Changes and improvements - Improved device registration retrieval for graceful restarts Known issues - macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.2 or later.

2025-02-03


Block files that are password-protected, compressed, or otherwise unscannable.

Gateway HTTP policies can now block files that are password-protected, compressed, or otherwise unscannable.

These unscannable files are now matched with the Download and Upload File Types traffic selectors for HTTP policies:

  • Password-protected Microsoft Office document
  • Password-protected PDF
  • Password-protected ZIP archive
  • Unscannable ZIP archive

To get started inspecting and modifying behavior based on these and other rules, refer to HTTP filtering.

2025-01-28


WARP client for macOS (version 2025.1.447.1)

A new Beta release for the macOS WARP client is now available on the beta releases downloads page.

This release contains only improvements.

Note: If using macOS Sequoia, Cloudflare recommends the use of macOS 15.2 or later. With macOS 15.2, Apple addressed several issues that may have caused the WARP client to not behave as expected when used with macOS 15.0.x.

Changes and improvements

  • Improved command line interface for Access for Infrastructure with added function for filtering and ordering.
  • Fixed client connectivity issues when switching between managed network profiles that use different WARP protocols.
  • Improved OS version posture checks on macOS for greater reliability and availability.
  • Added support for WARP desktop to use additional DoH endpoints to help reduce NAT congestion.
  • Improved Wireguard connection stability on reconnections.
  • Added additional HTTP/3 QUIC connectivity test to warp-diag.

Known issues

  • macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.2 or later.

2025-01-28


WARP client for Windows (version 2025.1.447.1)

A new Beta release for the Windows WARP client is now available on the beta releases downloads page.

This release contains only improvements.

Changes and improvements

  • Improved command line interface for Access for Infrastructure with added function for filtering and ordering.
  • Fixed client connectivity issues when switching between managed network profiles that use different WARP protocols.
  • Added support for WARP desktop to use additional DoH endpoints to help reduce NAT congestion.
  • Improved Windows multi-user feature with minor bug fixes and optimizations.
  • Improved connectivity check reliability in certain split tunnel configurations.
  • Improved reading of device DNS settings at connection restart.
  • Improved WARP connectivity in environments with virtual machine interfaces.
  • Improved Wireguard connection stability on reconnections.
  • Improved reliability of device posture checks for OS Version, Unique Client ID, Domain Joined, Disk Encryption, and Firewall attributes.
  • Added additional HTTP/3 QUIC connectivity test to warp-diag.

Known issues

  • DNS resolution may be broken when the following conditions are all true:

    • WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.
    • A custom DNS server address is configured on the primary network adapter.
    • The custom DNS server address on the primary network adapter is changed while WARP is connected.

    To work around this issue, reconnect the WARP client by toggling off and back on.

2025-01-20


Detect source code leaks with Data Loss Prevention

You can now detect source code leaks with Data Loss Prevention (DLP) with predefined checks against common programming languages.

The following programming languages are validated with natural language processing (NLP).

  • C
  • C++
  • C#
  • Go
  • Haskell
  • Java
  • JavaScript
  • Lua
  • Python
  • R
  • Rust
  • Swift

DLP also supports confidence level for source code profiles.

For more details, refer to DLP profiles.

2025-01-09


WARP client for Windows (version 2024.12.760.0)

A new GA release for the Windows WARP client is now available on the stable releases downloads page.

This release contains only a hotfix from the 2024.12.554.0 release.

Changes and improvements:

  • Fixed an issue that could prevent clients with certain split tunnel configurations from connecting.

Known issues:

  • DNS resolution may be broken when the following conditions are all true:

    • WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.
    • A custom DNS server address is configured on the primary network adapter.
    • The custom DNS server address on the primary network adapter is changed while WARP is connected.

    To work around this issue, reconnect the WARP client by toggling off and back on.

2024-12-19


WARP client for macOS (version 2024.12.554.0)

A new GA release for the macOS WARP client is now available on the stable releases downloads page.

This release contains improvements to support custom Gateway certificate installation in addition to the changes and improvements included in version 2024.12.492.0.

Note: If using macOS Sequoia, Cloudflare recommends the use of macOS 15.2 or later. With macOS 15.2, Apple addressed several issues that may have caused the WARP client to not behave as expected when used with macOS 15.0 and 15.1.

Changes and improvements:

  • Adds support for installing all available custom Gateway certificates from an account to the system store.
  • Users can now get a list of installed certificates by running warp-cli certs.

Known issues:

  • macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.2 or later.

2024-12-19


WARP client for Windows (version 2024.12.554.0)

A new GA release for the Windows WARP client is now available on the stable releases downloads page.

This release contains improvements to support custom Gateway certificate installation in addition to the changes and improvements included in version 2024.12.492.0.

Changes and improvements:

  • Adds support for installing all available custom Gateway certificates from an account to the system store.
  • Users can now get a list of installed certificates by running warp-cli certs.

Known issues:

  • DNS resolution may be broken when the following conditions are all true:

    • WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.
    • A custom DNS server address is configured on the primary network adapter.
    • The custom DNS server address on the primary network adapter is changed while WARP is connected.

    To work around this issue, reconnect the WARP client by toggling off and back on.

2024-12-19


Troubleshoot tunnels with diagnostic logs

The latest cloudflared build 2024.12.2 introduces the ability to collect all the diagnostic logs needed to troubleshoot a cloudflared instance.

A diagnostic report collects data from a single instance of cloudflared running on the local machine and outputs it to a cloudflared-diag file.

The cloudflared-diag-YYYY-MM-DDThh-mm-ss.zip archive contains the files listed below. The data in a file either applies to the cloudflared instance being diagnosed (diagnosee) or the instance that triggered the diagnosis (diagnoser). For example, if your tunnel is running in a Docker container, the diagnosee is the Docker instance and the diagnoser is the host instance.

File nameDescriptionInstance
cli-configuration.jsonTunnel run parameters used when starting the tunneldiagnosee
cloudflared_logs.txtTunnel log file1diagnosee
configuration.jsonTunnel configuration parametersdiagnosee
goroutine.pprofgoroutine profile made available by pprofdiagnosee
heap.pprofheap profile made available by pprofdiagnosee
metrics.txtSnapshot of Tunnel metrics at the time of diagnosisdiagnosee
network.txtJSON traceroutes to Cloudflare's global network using IPv4 and IPv6diagnoser
raw-network.txtRaw traceroutes to Cloudflare's global network using IPv4 and IPv6diagnoser
systeminformation.jsonOperating system information and resource usagediagnosee
task-result.jsonResult of each diagnostic taskdiagnoser
tunnelstate.jsonTunnel connections at the time of diagnosisdiagnosee

Footnotes

  1. If the log file is blank, you may need to set --loglevel to debug when you start the tunnel. The --loglevel parameter is only required if you ran the tunnel from the CLI using a cloudflared tunnel run command. It is not necessary if the tunnel runs as a Linux/macOS service or runs in Docker/Kubernetes.

For more information, refer to Diagnostic logs.

2024-12-19


Increased transparency for phishing email submissions

You now have more transparency about team and user submissions for phishing emails through a Reclassification tab in the Zero Trust dashboard.

Reclassifications happen when users or admins submit a phish to Email Security. Cloudflare reviews and - in some cases - reclassifies these emails based on improvements to our machine learning models.

This new tab increases your visibility into this process, allowing you to view what submissions you have made and what the outcomes of those submissions are.

Use the Reclassification area to review submitted phishing emails

2024-12-19


WARP client for macOS (version 2024.12.492.0)

A new GA release for the macOS WARP client is now available on the stable releases downloads page.

This release contains minor fixes and improvements.

Note: If using macOS Sequoia, Cloudflare recommends the use of macOS 15.2 or later. With macOS 15.2, Apple addressed several issues that may have caused the WARP client to not behave as expected when used with macOS 15.0 and 15.1.

Changes and improvements:

  • Consumers can now set the tunnel protocol using warp-cli tunnel protocol set <protocol>.
  • Extended diagnostics collection time in warp-diag to ensure logs are captured reliably.
  • Improved captive portal support by disabling the firewall during captive portal login flows.
  • Improved reliability of connection establishment logic under degraded network conditions.
  • Improved reconnection speed when a Cloudflare server is in a degraded state.
  • Improved captive portal detection on certain public networks.
  • Fixed an issue where admin override displayed an incorrect override end time.
  • Reduced connectivity interruptions on WireGuard Split Tunnel Include mode configurations.
  • Fixed connectivity issues switching between managed network profiles with different configured protocols.
  • QLogs are now disabled by default and can be enabled with warp-cli debug qlog enable. The QLog setting from previous releases will no longer be respected.

Known issues:

  • macOS Sequoia: Due to changes Apple introduced in macOS 15.0, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.2 or later.

2024-12-19


WARP client for Linux (version 2024.12.554.0)

A new GA release for the Linux WARP client is now available on the stable releases downloads page.

This release includes fixes and minor improvements.

Changes and improvements

  • Consumers can now set the tunnel protocol using warp-cli tunnel protocol set <protocol>.
  • Extended diagnostics collection time in warp-diag to ensure logs are captured reliably.
  • Improved captive portal support by disabling the firewall during captive portal login flows.
  • Improved reliability of connection establishment logic under degraded network conditions.
  • Improved reconnection speed when a Cloudflare server is in a degraded state.
  • Improved captive portal detection on certain public networks.
  • Reduced connectivity interruptions on WireGuard Split Tunnel Include mode configurations.
  • Fixed connectivity issues switching between managed network profiles with different configured protocols.
  • QLogs are now disabled by default and can be enabled with warp-cli debug qlog enable. The QLog setting from previous releases will no longer be respected.

2024-12-18


WARP client for Windows (version 2024.12.492.0)

A new GA release for the Windows WARP client is now available on the stable releases downloads page.

This release contains minor fixes and improvements.

Changes and improvements:

  • Consumers can now set the tunnel protocol using warp-cli tunnel protocol set <protocol>.
  • Extended diagnostics collection time in warp-diag to ensure logs are captured reliably.
  • Improved captive portal support by disabling the firewall during captive portal login flows.
  • Improved captive portal detection on certain public networks.
  • Improved reconnection speed when a Cloudflare server is in a degraded state.
  • Fixed an issue where WARP may fail to remove certificates from the user store in Device Information Only mode.
  • Ensured at most one Powershell instance is opened when fetching the device serial number for posture checks.
  • Fixed an issue to prevent the daemon from following Windows junctions created by non-admin users that could be used to delete files as SYSTEM user and potentially gain SYSTEM user privileges.
  • Improved reliability of connection establishment logic under degraded network conditions.
  • Fixed an issue that caused high memory usage when viewing connection statistics for extended periods of time.
  • Improved WARP connectivity in environments with virtual interfaces from VirtualBox, VMware, and similar tools.
  • Reduced connectivity interruptions on WireGuard Split Tunnel Include mode configurations.
  • Fixed connectivity issues switching between managed network profiles with different configured protocols.
  • QLogs are now disabled by default and can be enabled with warp-cli debug qlog enable. The QLog setting from previous releases will no longer be respected.

Known issues:

  • DNS resolution may be broken when the following conditions are all true:

    • WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.
    • A custom DNS server address is configured on the primary network adapter.
    • The custom DNS server address on the primary network adapter is changed while WARP is connected.

    To work around this issue, reconnect the WARP client by toggling off and back on.

2024-12-17


Establish BGP peering over Direct CNI circuits

Magic WAN and Magic Transit customers can use the Cloudflare dashboard to configure and manage BGP peering between their networks and their Magic routing table when using a Direct CNI on-ramp.

Using BGP peering with a CNI allows customers to:

  • Automate the process of adding or removing networks and subnets.
  • Take advantage of failure detection and session recovery features.

With this functionality, customers can:

  • Establish an eBGP session between their devices and the Magic WAN / Magic Transit service when connected via CNI.
  • Secure the session by MD5 authentication to prevent misconfigurations.
  • Exchange routes dynamically between their devices and their Magic routing table.

Refer to Magic WAN BGP peering or Magic Transit BGP peering to learn more about this feature and how to set it up.

2024-12-13


WARP client for Windows (version 2024.12.326.1)

A new Beta release for the Windows WARP client is now available on the beta releases downloads page.

This release contains minor fixes and improvements.

Changes and improvements:

  • Fixed connectivity issues switching between managed network profiles with different configured protocols.
  • Added support for multiple users on shared Windows 10 and Windows 11 devices. Once a user completes the Windows login, all traffic to Cloudflare will be attributed to the currently active Windows user account. Contact your Customer Success Manager to request participation in this beta.

Known issues:

  • DNS resolution may be broken when the following conditions are all true:

    • WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.
    • A custom DNS server address is configured on the primary network adapter.
    • The custom DNS server address on the primary network adapter is changed while WARP is connected.

    To work around this issue, reconnect the WARP client by toggling off and back on.

2024-12-06


WARP client for Windows (version 2024.11.688.1)

A new Beta release for the Windows WARP client is now available on the beta releases downloads page.

This release contains minor fixes and improvements.

Changes and improvements:

  • Consumers can now set the tunnel protocol using "warp-cli tunnel protocol set ".
  • Extended diagnostics collection time in warp-diag to ensure logs are captured reliably.
  • Improved captive portal support by disabling the firewall during captive portal login flows.
  • Improved captive portal detection on certain public networks.
  • Improved reconnection speed when a Cloudflare server is in a degraded state.
  • Fixed an issue where WARP may fail to remove certificates from the user store in device information only mode.
  • Ensured at most one powershell instance is opened when fetching the device serial number for posture checks.
  • Fixed an issue to prevent the daemon from following Windows junctions created by non-admin users that could be used to delete files as SYSTEM user and potentially gain SYSTEM user privileges.
  • Improved reliability of connection establishment logic under degraded network conditions.
  • Fixed an issue that caused high memory usage when viewing connection statistics for extended periods of time.
  • Improved WARP connectivity in environments with virtual interfaces from VirtualBox, VMware, and similar tools.
  • Reduced connectivity interruptions on WireGuard include split tunnel configurations.

Known issues:

  • DNS resolution may be broken when the following conditions are all true:

    • WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.
    • A custom DNS server address is configured on the primary network adapter.
    • The custom DNS server address on the primary network adapter is changed while WARP is connected.

    To work around this issue, please reconnect the WARP client by toggling off and back on.

2024-12-05


WARP client for macOS (version 2024.11.688.1)

A new Beta release for the macOS WARP client is now available on the beta releases downloads page.

This release contains minor fixes and improvements.

Note: If using macOS Sequoia, Cloudflare recommends the use of macOS 15.1 or later. With macOS 15.1, Apple addressed several issues that may have caused the WARP client to not behave as expected when used with macOS 15.0.x.

Changes and improvements:

  • Consumers can now set the tunnel protocol using warp-cli tunnel protocol set <protocol>.
  • Extended diagnostics collection time in warp-diag to ensure logs are captured reliably.
  • Improved captive portal support by disabling the firewall during captive portal login flows.
  • Improved reliability of connection establishment logic under degraded network conditions.
  • Improved reconnection speed when a Cloudflare server is in a degraded state.
  • Improved captive portal detection on certain public networks.
  • Fixed an issue where admin override displayed an incorrect override end time.
  • Reduced connectivity interruptions on WireGuard Split Tunnel Include mode configurations.

Known issues:

  • macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.1 or later.

2024-12-05


Generate customized terraform files for building cloud network on-ramps

You can now generate customized terraform files for building cloud network on-ramps to Magic WAN.

Magic Cloud can scan and discover existing network resources and generate the required terraform files to automate cloud resource deployment using their existing infrastructure-as-code workflows for cloud automation.

You might want to do this to:

  • Review the proposed configuration for an on-ramp before deploying it with Cloudflare.
  • Deploy the on-ramp using your own infrastructure-as-code pipeline instead of deploying it with Cloudflare.

For more details, refer to Set up with Terraform.

2024-11-22


Find security misconfigurations in your AWS cloud environment

You can now use CASB to find security misconfigurations in your AWS cloud environment using Data Loss Prevention.

You can also connect your AWS compute account to extract and scan your S3 buckets for sensitive data while avoiding egress fees. CASB will scan any objects that exist in the bucket at the time of configuration.

To connect a compute account to your AWS integration:

  1. In Zero Trust, go to CASB > Integrations.
  2. Find and select your AWS integration.
  3. Select Open connection instructions.
  4. Follow the instructions provided to connect a new compute account.
  5. Select Refresh.

2024-11-18


WARP client for Windows (version 2024.11.309.0)

A new GA release for the Windows WARP client is now available on the stable releases downloads page.

This release contains minor fixes and improvements.

Changes and improvements:

  • Fixed an issue where SSH sessions and other application connections over TCP or UDP could drop when a device that is using MASQUE changes its primary network interface.
  • Fixed an issue to ensure the Cloudflare root certificate (or custom certificate) is installed in the trust store if not already there.
  • Fixed an issue with the WARP client becoming unresponsive during startup.
  • Extended diagnostics collection time in warp-diag to ensure logs are captured reliably.
  • Fixed an issue that was preventing proper operation of DNS-over-TLS (DoT) for consumer users.

Known issues:

  • DNS resolution may be broken when the following conditions are all true:

    • WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.
    • A custom DNS server address is configured on the primary network adapter.
    • The custom DNS server address on the primary network adapter is changed while WARP is connected.

    To work around this issue, reconnect the WARP client by toggling off and back on.

2024-11-18


WARP client for macOS (version 2024.11.309.0)

A new GA release for the macOS WARP client is now available on the stable releases downloads page.

This release contains reliability improvements and general bug fixes.

Changes and improvements:

  • Fixed an issue where SSH sessions and other application connections over TCP or UDP could drop when a device that is using MASQUE changes its primary network interface.
  • Fixed an issue to ensure the Cloudflare root certificate (or custom certificate) is installed in the trust store if not already there.
  • Fixed an issue with the WARP client becoming unresponsive during startup.
  • Extended warp-diag to collect system profiler firewall state as part of diagnostics.
  • Fixed an issue with the WARP client becoming unresponsive while handling LAN inclusion.
  • Fixed an issue where users were unable to connect with an IPC error message displayed in the UI.
  • Fixed an issue that was preventing proper operation of DNS-over-TLS (DoT) for consumer users.

Known issues:

  • macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.1 or later.

2024-11-18


WARP client for Linux (version 2024.11.309.0)

A new GA release for the Linux WARP client is now available on the stable releases downloads page.

This release contains reliability improvements and general bug fixes.

Changes and improvements

  • Fixed an issue where SSH sessions and other connections ould drop when a device that is using MASQUE changes its primary network interface.
  • Device posture client certificate checks now support PKCS#1.
  • Fixed an issue to ensure the Cloudflare root certificate (or custom certificate) is installed in the trust store if not already there.
  • Reduced unnecessary log messages when resolv.conf has no owner.
  • Fixed an issue with warp-diag printing benign TLS certificate errors.
  • Fixed an issue with the WARP client becoming unresponsive during startup.
  • Extended diagnostics collection time in warp-diag to ensure logs are captured reliably.
  • Fixed an issue that was preventing proper operation of DNS-over-TLS (DoT) for consumer users.

2024-11-05


WARP client for Windows (version 2024.10.537.1)

A new Beta release for the Windows WARP client is now available on the beta releases downloads page.

This release contains an exciting new feature along with reliability improvements and general bug fixes. Please take time over the next few weeks to play with the new functionality and let us know what you think on both the community forum and through your account teams.

New features:

  • Added the ability for administrators to initiate remote packet capture (PCAP) and warp-diag collection

Changes and improvements:

  • Improved reliability of connection establishment logic under degraded network conditions
  • Improved captive portal detection behavior by forcing captive portal checks outside the tunnel
  • Allow the ability to configure tunnel protocol for consumer registrations
  • Fixed an issue with the WARP client becoming unresponsive during startup
  • Extended diagnostics collection time in warp-diag to ensure logs are captured reliably

Known issues:

  • DNS resolution may be broken when the following condition are all true:

    • WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.
    • A custom DNS server address is configured on the primary network adapter.
    • The custom DNS server address on the primary network adapter is changed while WARP is connected.

    To work around this issue, please reconnect the WARP client by toggling off and back on.

2024-11-05


WARP client for macOS (version 2024.10.537.1)

A new Beta release for the macOS WARP client is now available on the beta releases downloads page.

This release contains an exciting new feature along with reliability improvements and general bug fixes. Please take time over the next few weeks to play with the new functionality and let us know what you think on both the community forum and through your account teams.

New features:

  • Added the ability for administrators to initiate remote packet capture (PCAP) and warp-diag collection

Changes and improvements:

  • Improved handling of multiple network interfaces on the system
  • Improved reliability of connection establishment logic under degraded network conditions
  • Improved captive portal detection behavior by forcing captive portal checks outside the tunnel
  • Allow the ability to configure tunnel protocol for consumer registrations
  • Fixed an issue with the WARP client becoming unresponsive during startup
  • Extended diagnostics collection time in warp-diag to ensure logs are captured reliably
  • Extended warp-diag to collect system profiler firewall state as part of diagnostics
  • Fixed an issue with the Cloudflare WARP GUI showing garbled text in some cases
  • Fixed an issue with the WARP client becoming unresponsive while handling LAN inclusion

Known issues:

  • The WARP client may not function correctly on macOS 15.0 (Sequoia). We recommend updating to macOS 15.1 to resolve these issues.

2024-10-22


WARP client for Windows (version 2024.10.279.1)

A new Beta release for the Windows WARP client is now available on the beta releases downloads page.

This release contains minor fixes and improvements.

Changes and improvements:

  • Fixed an issue where SSH sessions and other application connections over TCP or UDP could be dropped when using MASQUE and the device's primary network interface changed.
  • Fixed an issue to ensure the managed certificate is installed in the trust store if not already there.

Known issues:

  • DNS resolution may be broken when the following condition are all true:

    • WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.
    • A custom DNS server address is configured on the primary network adapter.
    • The custom DNS server address on the primary network adapter is changed while WARP is connected.

    To work around this issue, please reconnect the WARP client by toggling off and back on.

2024-10-22


WARP client for macOS (version 2024.10.279.1)

A new Beta release for the macOS WARP client is now available on the beta releases downloads page.

This release contains minor fixes and improvements.

Changes and improvements:

  • Fixed an issue where SSH sessions and other application connections over TCP or UDP could be dropped when using MASQUE and the device’s primary network interface changed.
  • Fixed an issue to ensure the managed certificate is installed in the trust store if not already there.

Known issues:

  • Cloudflare is investigating temporary networking issues caused by macOS 15 (Sequoia) changes that seem to affect some users and may be seen with any version of the WARP client.

2024-10-03


WARP client for Windows (version 2024.9.346.0)

A new GA release for the Windows WARP client is now available on the stable releases downloads page.

This release contains minor fixes and improvements.

Changes and improvements:

  • Added target list to the warp-cli to enhance the user experience with the Access for Infrastructure SSH solution.
  • Added pre-login configuration details to the warp-diag output.
  • Added a tunnel reset mtu subcommand to the warp-cli.
  • Added a JSON output option to the warp-cli.
  • Added the ability for warp-cli to use the team name provided in the MDM file for initial registration.
  • Added the ability to execute a PCAP on multiple interfaces with warp-cli and warp-dex.
  • Improved warp-dex default interface selection for PCAPs and changed warp-dex CLI output to JSON.
  • Fixed an issue where the client, when switching between WireGuard and MASQUE protocols, sometimes required a manual tunnel key reset.
  • Added MASQUE tunnel protocol support for the consumer version of WARP (1.1.1.1 w/ WARP).

Known issues:

  • Using MASQUE as the tunnel protocol may be incompatible if your organization has Regional Services enabled.

2024-10-03


WARP client for macOS (version 2024.9.346.0)

A new GA release for the macOS WARP client is now available on the stable releases downloads page.

This release contains minor fixes and improvements.

All customers running macOS Ventura 13.0 and above (including macOS Sequoia) are advised to upgrade to this release. This release fixes an incompatibility with the firewall that may sometimes result in the firewall becoming disabled.

Changes and improvements:

  • Added target list to the warp-cli to enhance the user experience with the Access for Infrastructure SSH solution.
  • Added a tunnel reset mtu subcommand to the warp-cli.
  • Added the ability for warp-cli to use the team name provided in the MDM file for initial registration.
  • Added a JSON output option to the warp-cli.
  • Added the ability to execute a PCAP on multiple interfaces with warp-cli and warp-dex.
  • Improved warp-dex default interface selection for PCAPs and changed warp-dex CLI output to JSON.
  • Improved application posture check compatibility with symbolically linked files.
  • Fixed an issue where the client, when switching between WireGuard and MASQUE protocols, sometimes required a manual tunnel key reset.
  • Added MASQUE tunnel protocol support for the consumer version of WARP (1.1.1.1 w/ WARP).

Known issues:

  • Using MASQUE as the tunnel protocol may be incompatible if your organization has Regional Services enabled.

2024-10-03


WARP client for Linux (version 2024.9.346.0)

A new GA release for the Linux WARP client is now available on the stable releases downloads page.

This release contains minor fixes and minor improvements.

Notable updates

  • Added target list to the warp-cli to enhance the user experience with the Access for Infrastructure SSH solution.
  • Added the ability to customize PCAP options in the warp-cli.
  • Added a list of installed applications in warp-diag.
  • Added a tunnel reset mtu subcommand to the warp-cli.
  • Added the ability for warp-cli to use the team name provided in the MDM file for initial registration.
  • Added a JSON output option to the warp-cli.
  • Added the ability to execute a PCAP on multiple interfaces with warp-cli.
  • Added MASQUE tunnel protocol support for the consumer version of WARP (1.1.1.1 w/ WARP).
  • Improved the performance of firewall operations when enforcing split tunnel configuration.
  • Fixed an issue where device posture certificate checks were unexpectedly failing.
  • Fixed an issue where the Linux GUI fails to open the browser login window when registering a new Zero Trust organization.
  • Fixed an issue where clients using service tokens failed to retry after a network change.
  • Fixed an issue where the client, when switching between WireGuard and MASQUE protocols, sometimes required a manual tunnel key reset.
  • Fixed a known issue which required users to re-register when an older single configuration MDM file was deployed after deploying the newer, multiple configuration format.
  • Deprecated warp-cli commands have been removed. If you have any workflows that use the deprecated commands, update to the new commands where necessary.

Known issues:

  • Using MASQUE as the tunnel protocol may be incompatible if your organization has Regional Services is enabled.

2024-10-02


Search for custom rules using rule name and/or ID

The Magic Firewall dashboard now allows you to search custom rules using the rule name and/or ID.

  1. Log into the Cloudflare dashboard and select your account.
  2. Go to Analytics & Logs > Network Analytics.
  3. Select Magic Firewall.
  4. Add a filter for Rule ID.
Search for firewall rules with rule IDs

Additionally, the rule ID URL link has been added to Network Analytics.

For more details about rules, refer to Add rules.

2024-09-26


WARP client for Windows (version 2024.8.458.0)

A new GA release for the Windows WARP client is now available on the stable releases downloads page.

This release contains minor fixes and improvements.

Notable updates

  • Added the ability to customize PCAP options in the warp-cli.
  • Added a list of installed applications in warp-diag.
  • Added a summary of warp-dex traceroute results in its JSON output.
  • Improved the performance of firewall operations when enforcing split tunnel configuration.
  • Reduced the time it takes for a WARP client update to complete.
  • Fixed an issue where clients using service tokens failed to retry the initial connection when there is no network connectivity on startup.
  • Fixed issues where incorrect DNS server addresses were being applied following reboots and network changes. Any incorrect static entries set by previous WARP versions must be manually reverted.
  • Fixed a known issue which required users to re-register when an older single configuration MDM file was deployed after deploying the newer, multiple configuration format.
  • Deprecated warp-cli commands have been removed. If you have any workflows that use the deprecated commands, please update to the new commands where necessary.

Known issues

  • Using MASQUE as the tunnel protocol may be incompatible if your organization has Regional Services enabled.
  • DNS resolution may be broken when the following condition are all true:
    • WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.
    • A custom DNS server address is configured on the primary network adapter.
    • The custom DNS server address on the primary network adapter is changed while WARP is connected. To work around this issue, please reconnect the WARP client by toggling off and back on.

2024-09-26


WARP client for macOS (version 2024.8.457.0)

A new GA release for the macOS WARP client is now available on the stable releases downloads page.

This release contains minor fixes and improvements.

Notable updates:

  • Added the ability to customize PCAP options in warp-cli.
  • Added a list of installed applications in warp-diag.
  • Added a summary of warp-dex traceroute results in its JSON output.
  • Improved the performance of firewall operations when enforcing Split Tunnels configuration.
  • Fixed an issue where the DNS logs were not being cleared when the user switched configurations.
  • Fixed an issue where clients using service tokens failed to retry after a network change.
  • Fixed a known issue which required users to re-register when an older single configuration MDM file was deployed after deploying the newer, multiple configuration format.
  • Fixed an issue which prevented the use of private IP ranges that overlapped with end users' home networks.
  • Deprecated warp-cli commands have been removed. If you have any workflows that use the deprecated commands, update to the new commands where necessary.

Known issues:

  • Cloudflare is investigating temporary networking issues on macOS 15 (Sequoia) that seem to affect some users.
  • Using MASQUE as the tunnel protocol may be incompatible if your organization has Regional Services enabled.

2024-08-26


WARP client for macOS (version 2024.8.309.1)

A new Beta release for the macOS WARP client is now available on the beta releases downloads page.

This is a release focused on fixes and improvements.

Changes and improvements:

  • Added the ability to customize PCAP options in the warp-cli.
  • Added a list of installed applications in warp-diag.
  • Added a summary of warp-dex traceroute results in its JSON output.
  • Improved the performance of firewall operations when enforcing split tunnel configuration.
  • Fixed an issue where the DNS logs were not being cleared when the user switched configurations.
  • Fixed a Known Issue which required users to re-register when an older single configuration MDM file was deployed after deploying the newer, multiple configuration format.
  • Fixed an issue which prevented the use of private IP ranges that overlapped with end user's home networks.
  • Deprecated warp-cli commands have been removed. If you have any workflows that use the deprecated commands, please update to the new commands where necessary.

Known issues:

  • Using MASQUE as the tunnel protocol may be incompatible if your organization has either of the following conditions:
    • Magic WAN is enabled but not the latest packet flow path for WARP. Please check the migration status with your account team.
    • Regional Services enabled.

2024-08-26


WARP client for Windows (version 2024.8.308.1)

A new Beta release for the Windows WARP client is now available on the beta releases downloads page.

This is a release focused on fixes and improvements.

Changes and improvements:

  • Added the ability to customize PCAP options in the warp-cli.
  • Added a list of installed applications in warp-diag.
  • Added a summary of warp-dex traceroute results in its JSON output.
  • Improved the performance of firewall operations when enforcing split tunnel configuration.
  • Reduced time it takes for a WARP client update to complete.
  • Fixed issues where incorrect DNS server addresses were being applied following reboots and network changes. Any incorrect static entries set by previous WARP versions must be manually reverted.
  • Fixed a Known Issue which required users to re-register when an older single configuration MDM file was deployed after deploying the newer, multiple configuration format.
  • Deprecated warp-cli commands have been removed. If you have any workflows that use the deprecated commands, please update to the new commands where necessary.

Known issues:

  • Using MASQUE as the tunnel protocol may be incompatible if your organization has either of the following conditions:

    • Magic WAN is enabled but not the latest packet flow path for WARP. Please check migration status with your account team.
    • Regional Services enabled.
  • DNS resolution may be broken when the following condition are all true:

    • WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.
    • A custom DNS server address is configured on the primary network adapter.
    • The custom DNS server address on the primary network adapter is changed while WARP is connected. To work around this issue, please reconnect the WARP client by toggling off and back on.

2024-08-15


WARP client for Linux (version 2024.6.497.0)

A new GA release for the Linux WARP client is now available on the stable releases downloads page.

This release includes some exciting new features. It also includes additional fixes and minor improvements.

New features

  • The WARP client now supports operation on Ubuntu 24.04.
  • Admins can now elect to have ZT WARP clients connect using the MASQUE protocol; this setting is in Device Profiles. Note: before MASQUE can be used, the global setting for Override local interface IP must be enabled. For more detail, refer to Device tunnel protocol. This feature will be rolled out to customers in stages over approximately the next month.
  • The Device Posture client certificate check has been substantially enhanced. The primary enhancement is the ability to check for client certificates that have unique common names, made unique by the inclusion of the device serial number or host name (for example, CN = 123456.mycompany, where 123456 is the device serial number).
  • TCP MSS clamping is now used where necessary to meet the MTU requirements of the tunnel interface. This will be especially helpful in Docker use cases.

Warning

  • Ubuntu 16.04 and 18.04 are not supported by this version of the client.
  • This is the last GA release that will be supporting older, deprecated warp-cli commands. There are two methods to identify these commands. One, when used in this release, the command will work but will also return a deprecation warning. And two, the deprecated commands do not appear in the output of warp-cli -h.

Known issues

  • There are certain known limitations preventing the use of the MASQUE tunnel protocol in certain scenarios. Do not use the MASQUE tunnel protocol if:
    • A Magic WAN integration is on the account and does not have the latest packet flow path for WARP traffic. To check the migration status, contact your account team.
    • Your account has Regional Services enabled.
  • The Linux client GUI does not yet support all GUI features found in the Windows and macOS clients. Future releases of the Linux client will be adding these GUI features.
  • The Zero Trust team name is not visible in the GUI if you upgraded from the previous GA release using an MDM tool.
  • Sometimes the WARP icon will remain gray (disconnected state) while in dark mode.

2024-07-30


WARP client for macOS (version 2024.6.474.0)

A new GA release for the macOS WARP client is now available on the stable releases downloads page.

This release only contains a hotfix from the 2024.6.416.0 release.

Notable updates

  • Fixed an issue which could cause alternate network detections to fail for hosts using TLS 1.2 which do not support TLS Extended Master Secret (EMS).
  • Improved the stability of device profile switching based on alternate network detection.

Known issues

  • If a user has an MDM file configured to support multiple profiles (for the switch configurations feature), and then changes to an MDM file configured for a single profile, the WARP client may not connect. The workaround is to use the warp-cli registration delete command to clear the registration, and then re-register the client.
  • There are certain known limitations preventing the use of the MASQUE tunnel protocol in certain scenarios. Do not use the MASQUE tunnel protocol if:
    • A Magic WAN integration is on the account and is not yet migrated to the warp_unified_flow. Please check migration status with your account team.
    • Your account has Regional Services enabled.

2024-07-30


WARP client for Windows (version 2024.6.473.0)

A new GA release for the Windows WARP client is now available on the stable releases downloads page.

This release only contains a hotfix from the 2024.6.415.0 release.

Notable updates

  • Fixed an issue which could cause alternate network detections to fail for hosts using TLS 1.2 which do not support TLS Extended Master Secret (EMS).
  • Improved the stability of device profile switching based on alternate network detection.

Known issues

  • If a user has an MDM file configured to support multiple profiles (for the switch configurations feature), and then changes to an MDM file configured for a single profile, the WARP client may not connect. The workaround is to use the warp-cli registration delete command to clear the registration, and then re-register the client.
  • There are certain known limitations preventing the use of the MASQUE tunnel protocol in certain scenarios. Do not use the MASQUE tunnel protocol if:
    • A Magic WAN integration is on the account and is not yet migrated to the warp_unified_flow. Please check migration status with your account team.
    • Your account has Regional Services enabled.

2024-06-28


WARP client for macOS (version 2024.6.416.0)

A new GA release for the macOS WARP client is now available on the stable releases downloads page.

This release includes some exciting new features. It also includes additional fixes and minor improvements.

New features

Additional changes and improvements

  • Fixed a known issue where the certificate was not always properly left behind in /Library/Application Support/Cloudflare/installed_cert.pem.
  • Fixed an issue where re-auth notifications were not cleared from the UI when the user switched configurations.
  • Fixed a macOS firewall rule that allowed all UDP traffic to go outside the tunnel. Relates to TunnelVision (CVE-2024-3661).
  • Fixed an issue that could cause the Cloudflare WARP menu bar application to disappear when switching configurations.

Warning

  • This is the last GA release that will be supporting older, deprecated warp-cli commands. There are two methods to identify these commands. One, when used in this release, the command will work but will also return a deprecation warning. And two, the deprecated commands do not appear in the output of warp-cli -h.

Known issues

  • If a user has an MDM file configured to support multiple profiles (for the switch configurations feature), and then changes to an MDM file configured for a single profile, the WARP client may not connect. The workaround is to use the warp-cli registration delete command to clear the registration, and then re-register the client.
  • There are certain known limitations preventing the use of the MASQUE tunnel protocol in certain scenarios. Do not use the MASQUE tunnel protocol if:
    • A Magic WAN integration is on the account and is not yet migrated to the warp_unified_flow. Please check migration status with your account team.
    • Your account has Regional Services enabled.
  • Managed network detection will fail for TLS 1.2 endpoints with EMS (Extended Master Secret) disabled

2024-06-28


WARP client for Windows (version 2024.6.415.0)

A new GA release for the Windows WARP client is now available on the stable releases downloads page.

This release includes some exciting new features. It also includes additional fixes and minor improvements.

New features

Additional changes and improvements

  • Added a new message explaining why WARP was unable to connect, to help with troubleshooting.
  • The upgrade window now uses international date formats.
  • Made a change to ensure DEX tests are not running when the tunnel is not up due to the device going to or waking from sleep. This is specific to devices using the S3 power model.
  • Fixed a known issue where the certificate was not always properly left behind in %ProgramData%\Cloudflare\installed_cert.pem.
  • Fixed an issue where ICMPv6 Neighbor Solicitation messages were being incorrectly sent on the WARP tunnel.
  • Fixed an issue where a silent upgrade was causing certain files to be deleted if the target upgrade version is the same as the current version.

Warning

  • This is the last GA release that will be supporting older, deprecated warp-cli commands. There are two methods to identify these commands. One, when used in this release, the command will work but will also return a deprecation warning. And two, the deprecated commands do not appear in the output of warp-cli -h.

Known issues

  • If a user has an MDM file configured to support multiple profiles (for the switch configurations feature), and then changes to an MDM file configured for a single profile, the WARP client may not connect. The workaround is to use the warp-cli registration delete command to clear the registration, and then re-register the client.
  • There are certain known limitations preventing the use of the MASQUE tunnel protocol in certain scenarios. Do not use the MASQUE tunnel protocol if:
    • A Magic WAN integration is on the account and is not yet migrated to the warp_unified_flow. Please check migration status with your account team.
    • Your account has Regional Services enabled.
  • Managed network detection will fail for TLS 1.2 endpoints with EMS (Extended Master Secret) disabled

2024-06-17


Exchange user risk scores with Okta

Beyond the controls in Zero Trust, you can now exchange user risk scores with Okta to inform SSO-level policies.

First, configure Zero Trust to send user risk scores to Okta.

  1. Set up the Okta SSO integration.
  2. In Zero Trust, go to Settings > Authentication.
  3. In Login methods, locate your Okta integration and select Edit.
  4. Turn on Send risk score to Okta.
  5. Select Save.
  6. Upon saving, Zero Trust will display the well-known URL for your organization. Copy the value.

Next, configure Okta to receive your risk scores.

  1. On your Okta admin dashboard, go to Security > Device Integrations.
  2. Go to Receive shared signals, then select Create stream.
  3. Name your integration. In Set up integration with, choose Well-known URL.
  4. In Well-known URL, enter the well-known URL value provided by Zero Trust.
  5. Select Create.

2024-06-16


Explore product updates for Cloudflare One

Welcome to your new home for product updates on Cloudflare One.

Our new changelog lets you read about changes in much more depth, offering in-depth examples, images, code samples, and even gifs.

If you are looking for older product updates, refer to the following locations.

Older product updates