-
Notifications
You must be signed in to change notification settings - Fork 10k
[ZT] WARP beta 2025.5.735.1 #22944
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Merged
[ZT] WARP beta 2025.5.735.1 #22944
Changes from 3 commits
Commits
File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,24 @@ | ||
| releaseNotes: >- | ||
| This release contains improvements and new exciting features, including [post-quantum cryptography](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/parameters/#enable_post_quantum). By tunneling your corporate network traffic over Cloudflare, you can now gain the immediate protection of post-quantum cryptography without needing to upgrade any of your individual corporate applications or systems. | ||
|
|
||
|
|
||
| **Changes and improvements** | ||
|
|
||
| - Fixed issue which sometimes results in WARP connection failing on mobile. | ||
| client should issue a get registration after a certain delay once we got the | ||
| rotate keys response back. | ||
|
|
||
| - Captive portal improvements including showing connectivity status in the | ||
| client and sending system notifications for captive portal sign in | ||
|
|
||
| - The WARP client now applies post-quantum cryptography end-to-end on enabled devices accessing resources behind a Cloudflare Tunnel. This feature can be [enabled by MDM](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/parameters/#enable_post_quantum). | ||
|
|
||
| - Improvement to gracefully handle changes made by MDM while WARP is not | ||
| running. | ||
|
|
||
| - Fixed an issue affecting Split Tunnel Include mode, where traffic outside the tunnel was blocked when switching between Wi-Fi and ethernet networks. | ||
| version: 2025.5.735.1 | ||
| releaseDate: 2025-06-05T19:47:54.412Z | ||
| packageURL: https://downloads.cloudflareclient.com/v1/download/noble-intel/version/2025.5.735.1 | ||
| packageSize: 44611254 | ||
| platformName: Linux | ||
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,19 @@ | ||
| releaseNotes: |- | ||
| This release contains improvements and new exciting features, including [post-quantum cryptography](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/parameters/#enable_post_quantum). By tunneling your corporate network traffic over Cloudflare, you can now gain the immediate protection of post-quantum cryptography without needing to upgrade any of your individual corporate applications or systems. | ||
|
|
||
| **Changes and improvements** | ||
| - Fixed an issue where the Cloudflare WARP application may not have automatically relaunched after an update. | ||
| - Fixed issue which sometimes results in WARP connection failing on mobile. client should issue a get registration after a certain delay once we got the rotate keys response back. | ||
ranbel marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
| - Captive portal improvements including showing connectivity status in the client and sending system notifications for captive portal sign in. | ||
| - The WARP client now applies post-quantum cryptography end-to-end on enabled devices accessing resources behind a Cloudflare Tunnel. This feature can be [enabled by MDM](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/parameters/#enable_post_quantum). | ||
| - Improvement to gracefully handle changes made by MDM while WARP is not running. | ||
| - Fixed an issue affecting Split Tunnel Include mode, where traffic outside the tunnel was blocked when switching between Wi-Fi and ethernet networks. | ||
|
|
||
| **Known issues** | ||
| - macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.4 or later. | ||
|
|
||
| version: 2025.5.735.1 | ||
| releaseDate: 2025-06-05T20:38:04.389Z | ||
| packageURL: https://downloads.cloudflareclient.com/v1/download/macos/version/2025.5.735.1 | ||
| packageSize: 95177399 | ||
| platformName: macOS | ||
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,30 @@ | ||
| releaseNotes: |- | ||
| This release contains improvements and new exciting features, including [SCCM VPN boundary support](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#sccm-vpn-boundary-support) and [post-quantum cryptography](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/parameters/#enable_post_quantum). By tunneling your corporate network traffic over Cloudflare, you can now gain the immediate protection of post-quantum cryptography without needing to upgrade any of your individual corporate applications or systems. | ||
|
|
||
| **Changes and improvements** | ||
| - Fixed a device registration issue causing WARP connection failures when changing networks. | ||
| - Captive portal improvements including showing connectivity status in the client and sending system notifications for captive portal sign in. | ||
| - Fixed a bug where in Gateway with DoH mode, connection to DNS servers was not automatically restored after reconnecting WARP. | ||
| - The WARP client now applies post-quantum cryptography end-to-end on enabled devices accessing resources behind a Cloudflare Tunnel. This feature can be [enabled by MDM](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/parameters/#enable_post_quantum). | ||
| - Improvement to gracefully handle changes made by MDM while WARP is not running. | ||
| - Improvement for multi-user mode to avoid unnecessary key rotations when transitioning from a pre-login to a logged-in state. | ||
| - Added a WARP client device posture check for SAN attributes to the [client certificate check](/cloudflare-one/identity/devices/warp-client-checks/client-certificate/). | ||
| - Fixed an issue affecting Split Tunnel Include mode, where traffic outside the tunnel was blocked when switching between Wi-Fi and ethernet networks. | ||
| - Added [SCCM VPN boundary support](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#sccm-vpn-boundary-support) to device profile settings. With SCCM VPN boundary support enabled, operating systems will register WARP's local interface IP with the on-premise DNS server when reachable. | ||
|
|
||
| **Known issues** | ||
| - We have received reports of performance issues from some customers that have upgraded to 24H2 with the Windows Filtering Platform and local device firewall rules. We highly recommend customers test this Windows client thoroughly before full deployment as we continue to work with Microsoft to resolve these issues. | ||
|
|
||
| - Devices with `KB5055523` installed may receive a warning about `Win32/ClickFix.ABA` being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to [version 1.429.19.0](https://www.microsoft.com/en-us/wdsi/definitions/antimalware-definition-release-notes?requestVersion=1.429.19.0) or later. | ||
|
|
||
| - DNS resolution may be broken when the following conditions are all true: | ||
| - WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode. | ||
| - A custom DNS server address is configured on the primary network adapter. | ||
| - The custom DNS server address on the primary network adapter is changed while WARP is connected. | ||
| To work around this issue, reconnect the WARP client by toggling off and back on. | ||
|
|
||
| version: 2025.5.735.1 | ||
| releaseDate: 2025-06-05T20:38:05.200Z | ||
| packageURL: https://downloads.cloudflareclient.com/v1/download/windows/version/2025.5.735.1 | ||
| packageSize: 129064960 | ||
| platformName: Windows |
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.