Skip to content

Commit 5f6d868

Browse files
Create 2025-04-12-warp-ga-linux.mdx (#22427)
* Create 2025-04-12-warp-ga-linux.mdx Release notes for client version 2025.4.929.0 Linux GA release * Update 2025-04-12-warp-ga-linux.mdx added URL for DoH IP address or domain call out * Update and rename 2025-04-12-warp-ga-linux.mdx to 2025-05-12-warp-ga-linux.mdx added URL for a note reference
1 parent 2414ff4 commit 5f6d868

File tree

1 file changed

+22
-0
lines changed

1 file changed

+22
-0
lines changed
Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
---
2+
title: WARP client for Linux (version 2025.4.929.0)
3+
description: WARP client for Linux (version 2025.4.929.0)
4+
date: 2025-05-12T11:00:00Z
5+
---
6+
7+
A new GA release for the Linux WARP client is now available on the [Stable release downloads page](/cloudflare-one/connections/connect-devices/warp/download-warp/). This release contains two significant changes all customers should be aware of:
8+
9+
1. All DNS traffic now flows inside the WARP tunnel. Customers are no longer required to configure their local Firewall rules to allow our [DoH IP Address or domains](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#doh-ip).
10+
2. When using MASQUE, the connection will fall back to HTTP/2 (TCP) when we detect that HTTP/3 traffic is blocked. This allows for a much more reliable connection on some public WiFi networks.
11+
12+
**Changes and improvements**
13+
14+
- Fixed an issue where the managed network policies could incorrectly report network location beacons as missing.
15+
- Improved DEX Test Error reporting.
16+
- Fixed an issue causing client notifications to fail in IPv6 only environments which prevented the client from receiving configuration changes to settings like device profile.
17+
- Added a TCP fallback for the MASQUE tunnel protocol to improve connectivity on networks that block UDP or http/3 specifically.
18+
- Added new IP addresses for [tunnel connectivity checks](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#connectivity-check). If your organization uses a firewall or other policies you will need to exempt these IPs.
19+
- Fixed an issue where frequent network changes could cause WARP to become unresponsive.
20+
- DNS over HTTPS traffic is now included in the WARP tunnel by default.
21+
- Improvement for WARP to check if tunnel connectivity fails or times out at device wake before attempting to reconnect.
22+
- Fixed an issue causing WARP connection disruptions after network changes.

0 commit comments

Comments
 (0)