|
1 | 1 | releaseNotes: |- |
2 | 2 | This release contains two significant changes all customers should be aware of: |
3 | | - 1. All DNS traffic now flows inside the WARP tunnel. Customers are no longer required to configure their local Firewall rules to allow our [DoH IP Address or domains](https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#doh-ip). |
| 3 | + 1. All DNS traffic now flows inside the WARP tunnel. Customers are no longer required to configure their local firewall rules to allow our [DoH IP addresses and domains](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#doh-ip). |
4 | 4 | 2. When using MASQUE, the connection will fall back to HTTP/2 (TCP) when we detect that HTTP/3 traffic is blocked. This allows for a much more reliable connection on some public WiFi networks. |
5 | 5 |
|
6 | 6 |
|
7 | 7 | **Changes and improvements** |
8 | 8 | - Fixed an issue where the managed network policies could incorrectly report network location beacons as missing. |
9 | | - - Improved DEX Test Error reporting. |
| 9 | + - Improved DEX test error reporting. |
10 | 10 | - Fixed an issue causing client notifications to fail in IPv6 only environments which prevented the client from receiving configuration changes to settings like device profile. |
11 | 11 | - Improved captive portal detection. |
12 | | - - Added a TCP fallback for the MASQUE tunnel protocol to improve connectivity on networks that block UDP or http/3 specifically. |
13 | | - - Added new [IPs for Client Orchestration API](https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#connectivity-check) for operations like tunnel connectivity checks. If your organization uses a firewall or other policies you will need to exempt these IPs. |
| 12 | + - Added a TCP fallback for the MASQUE tunnel protocol to improve connectivity on networks that block UDP or HTTP/3 specifically. |
| 13 | + - Added new IP addresses for [tunnel connectivity checks](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#connectivity-checks). If your organization uses a firewall or other policies you will need to exempt these IPs. |
14 | 14 | - DNS over HTTPS traffic is now included in the WARP tunnel by default. |
15 | 15 | - Improved the error message displayed in the client GUI when the rate limit for entering an incorrect admin override code is met. |
16 | | - - Added a [Collect Captive Portal Diag](https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/captive-portals/#get-captive-portal-logs) button in the client GUI to make it easier for users to collect captive portal debugging diagnostics. |
17 | 16 | - Improved handling of non-SLAAC IPv6 interface addresses for better connectivity in IPv6 only environments. |
18 | 17 | - Fixed an issue where frequent network changes could cause WARP to become unresponsive. |
19 | 18 | - Improvement for WARP to check if tunnel connectivity fails or times out at device wake before attempting to reconnect. |
|
0 commit comments