Skip to content
6 changes: 5 additions & 1 deletion src/content/warp-releases/linux/ga/2025.4.929.0.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ releaseNotes: |-
This release contains two significant changes all customers should be aware of:
1. All DNS traffic now flows inside the WARP tunnel. Customers are no longer required to configure their local firewall rules to allow our [DoH IP addresses and domains](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#doh-ip).
2. When using MASQUE, the connection will fall back to HTTP/2 (TCP) when we detect that HTTP/3 traffic is blocked. This allows for a much more reliable connection on some public WiFi networks.

**Changes and improvements**
- Fixed an issue where the managed network policies could incorrectly report network location beacons as missing.
- Improved DEX test error reporting.
Expand All @@ -13,6 +13,10 @@ releaseNotes: |-
- DNS over HTTPS traffic is now included in the WARP tunnel by default.
- Improvement for WARP to check if tunnel connectivity fails or times out at device wake before attempting to reconnect.
- Fixed an issue causing WARP connection disruptions after network changes.

**Known issues**
- Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to [Route traffic to fallback server](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/#route-traffic-to-fallback-server).

version: 2025.4.929.0
releaseDate: 2025-05-12T23:21:47.865Z
packageURL: https://downloads.cloudflareclient.com/v1/download/noble-intel/version/2025.4.929.0
Expand Down
4 changes: 4 additions & 0 deletions src/content/warp-releases/linux/ga/2025.4.943.0.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,10 @@ releaseNotes: |-

**Changes and improvements**
- Fixed an issue where it could take up to 3 minutes for the correct device profile to be applied in some circumstances. In the worst case, it should now only take up to 40 seconds. This will be improved further in a future release.

**Known issues**
- Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to [Route traffic to fallback server](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/#route-traffic-to-fallback-server).

version: 2025.4.943.0
releaseDate: 2025-05-22T19:22:32.439Z
packageURL: https://downloads.cloudflareclient.com/v1/download/noble-intel/version/2025.4.943.0
Expand Down
4 changes: 4 additions & 0 deletions src/content/warp-releases/linux/ga/2025.5.893.0.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,10 @@ releaseNotes: |-
- Improvement to handle client configuration changes made by MDM while WARP is not running.
- Fixed an issue affecting Split Tunnel Include mode, where traffic outside the tunnel was blocked when switching between Wi-Fi and Ethernet networks.
- Added a WARP client device posture check for SAN attributes to the [client certificate check](/cloudflare-one/identity/devices/warp-client-checks/client-certificate/).

**Known issues**
- Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to [Route traffic to fallback server](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/#route-traffic-to-fallback-server).

version: 2025.5.893.0
releaseDate: 2025-06-30T19:44:34.251Z
packageURL: https://downloads.cloudflareclient.com/v1/download/noble-intel/version/2025.5.893.0
Expand Down
4 changes: 4 additions & 0 deletions src/content/warp-releases/linux/ga/2025.7.176.0.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,10 @@ releaseNotes: >-
- Improvements to maintain [Global WARP override](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#global-warp-override) settings when [switching between organizations](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/switch-organizations/#switch-organizations-in-warp).

- Improvements to maintain client connectivity during network changes.

**Known issues**
- Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to [Route traffic to fallback server](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/#route-traffic-to-fallback-server).

version: 2025.7.176.0
releaseDate: 2025-09-30T20:20:30.460Z
packageURL: https://downloads.cloudflareclient.com/v1/download/fedora35-arm/version/2025.7.176.0
Expand Down
6 changes: 6 additions & 0 deletions src/content/warp-releases/linux/ga/2025.8.779.0.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,12 @@ releaseNotes: >-
**Changes and improvements**

- The MASQUE protocol is now the only protocol that can use [Proxy mode](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#proxy-mode). If you previously configured a device profile to use Proxy mode with Wireguard, you will need to select a new WARP mode or switch to the MASQUE protocol. Otherwise, all devices matching the profile will lose connectivity.


**Known issues**

- Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to [Route traffic to fallback server](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/#route-traffic-to-fallback-server).

version: 2025.8.779.0
releaseDate: 2025-10-07T19:20:00.003Z
packageURL: https://downloads.cloudflareclient.com/v1/download/bullseye-intel/version/2025.8.779.0
Expand Down