Skip to content

Commit e75050d

Browse files
authored
[ZT] Fix WARP macOS/Linux release notes (#22439)
* macos edits * linux edits * fix tense
1 parent 7880cb3 commit e75050d

File tree

2 files changed

+8
-12
lines changed

2 files changed

+8
-12
lines changed

src/content/warp-releases/linux/ga/2025.4.929.0.yaml

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,7 @@ releaseNotes: >-
33
of:
44
55
1. All DNS traffic now flows inside the WARP tunnel. Customers are no longer
6-
required to configure their local Firewall rules to allow our DoH IP Address
7-
or domains.
6+
required to configure their local firewall rules to allow our [DoH IP addresses and domains](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#doh-ip).
87
98
2. When using MASQUE, the connection will fall back to HTTP/2 (TCP) when we
109
detect that HTTP/3 traffic is blocked. This allows for a much more reliable
@@ -16,18 +15,16 @@ releaseNotes: >-
1615
- Fixed an issue where the managed network policies could incorrectly report
1716
network location beacons as missing.
1817
19-
- Improved DEX Test Error reporting.
18+
- Improved DEX test error reporting.
2019
2120
- Fixed an issue causing client notifications to fail in IPv6 only
2221
environments which prevented the client from receiving configuration changes
2322
to settings like device profile.
2423
2524
- Added a TCP fallback for the MASQUE tunnel protocol to improve connectivity
26-
on networks that block UDP or http/3 specifically.
25+
on networks that block UDP or HTTP/3 specifically.
2726
28-
- Added new IPs for Client Orchestration API for operations like tunnel
29-
connectivity checks. If your organization uses a firewall or other policies
30-
you will need to exempt these IPs.
27+
- Added new IP addresses for [tunnel connectivity checks](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#connectivity-checks). If your organization uses a firewall or other policies you will need to exempt these IPs.
3128
3229
- Fixed an issue where frequent network changes could cause WARP to become
3330
unresponsive.

src/content/warp-releases/macos/ga/2025.4.929.0.yaml

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,18 @@
11
releaseNotes: |-
22
This release contains two significant changes all customers should be aware of:
3-
1. All DNS traffic now flows inside the WARP tunnel. Customers are no longer required to configure their local Firewall rules to allow our [DoH IP Address or domains](https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#doh-ip).
3+
1. All DNS traffic now flows inside the WARP tunnel. Customers are no longer required to configure their local firewall rules to allow our [DoH IP addresses and domains](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#doh-ip).
44
2. When using MASQUE, the connection will fall back to HTTP/2 (TCP) when we detect that HTTP/3 traffic is blocked. This allows for a much more reliable connection on some public WiFi networks.
55
66
77
**Changes and improvements**
88
- Fixed an issue where the managed network policies could incorrectly report network location beacons as missing.
9-
- Improved DEX Test Error reporting.
9+
- Improved DEX test error reporting.
1010
- Fixed an issue causing client notifications to fail in IPv6 only environments which prevented the client from receiving configuration changes to settings like device profile.
1111
- Improved captive portal detection.
12-
- Added a TCP fallback for the MASQUE tunnel protocol to improve connectivity on networks that block UDP or http/3 specifically.
13-
- Added new [IPs for Client Orchestration API](https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#connectivity-check) for operations like tunnel connectivity checks. If your organization uses a firewall or other policies you will need to exempt these IPs.
12+
- Added a TCP fallback for the MASQUE tunnel protocol to improve connectivity on networks that block UDP or HTTP/3 specifically.
13+
- Added new IP addresses for [tunnel connectivity checks](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#connectivity-checks). If your organization uses a firewall or other policies you will need to exempt these IPs.
1414
- DNS over HTTPS traffic is now included in the WARP tunnel by default.
1515
- Improved the error message displayed in the client GUI when the rate limit for entering an incorrect admin override code is met.
16-
- Added a [Collect Captive Portal Diag](https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/captive-portals/#get-captive-portal-logs) button in the client GUI to make it easier for users to collect captive portal debugging diagnostics.
1716
- Improved handling of non-SLAAC IPv6 interface addresses for better connectivity in IPv6 only environments.
1817
- Fixed an issue where frequent network changes could cause WARP to become unresponsive.
1918
- Improvement for WARP to check if tunnel connectivity fails or times out at device wake before attempting to reconnect.

0 commit comments

Comments
 (0)