Skip to content

Clarify behaviour of connectivity.cloudflareclient.com #16241

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
jamie-sandbox opened this issue Aug 16, 2024 · 5 comments
Closed

Clarify behaviour of connectivity.cloudflareclient.com #16241

jamie-sandbox opened this issue Aug 16, 2024 · 5 comments
Assignees

Comments

@jamie-sandbox
Copy link
Contributor

Existing documentation URL(s)

https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#connectivity-check

What changes are you suggesting?

The documentation states that connectivity.cloudflareclient.com performs a check inside the WARP tunnel, and therefore does not need to be whitelisted on the firewall.

However, we are seeing thousands of requests to connectivity.cloudflareclient.com in the logs of our corporate proxy server, implying that connections are following the system proxy settings and are not going through the WARP tunnel all of the time.

This has been observed both in full WARP and DoH-only modes.

Please can the expected behaviour be clarified? Should we add connectivity.cloudflareclient.com to our PAC file to force it to bypass the proxy server?

Additional information

No response

@jamie-sandbox jamie-sandbox added content:edit Request for content edits documentation Documentation edits labels Aug 16, 2024
@kodster28 kodster28 assigned ranbel and unassigned kodster28 Aug 20, 2024
@Tinubu1234
Copy link

Please help me open my u

@deadlypants1973
Copy link
Contributor

@jamie-sandbox we answered your query about connectivity.cloudflareclient.com here: #16062. The dev docs are correct in their current state and you shouldn't have to worry about this functionality, but if there's a specific goal you have in mind, could you share that goal or could you close this issue and file a support ticket?

@jamie-sandbox
Copy link
Contributor Author

jamie-sandbox commented Feb 19, 2025

@deadlypants1973 Thanks for your response however this needs to be re-opened.

As stated in my original description, we are seeing lots of connections which are going outside of the tunnel (contrary to what the documentation would suggest).

We need clarification of:

a) Is this intentional, or a bug? (I suspect this is a bug)

b) If it is intentional, do we need to exempt this on our PAC file? Or is it acceptable for the connectivity checks to go through a corporate proxy?

It would be good if the documentation could reference this and state what the expected behaviour and configuration is.

@deadlypants1973
Copy link
Contributor

Hey @jamie-sandbox , Version 2025.2.600.0 (https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/download-warp/) should have a fix for this. There's a disclaimer that if connectivity.cloudflareclient.com's IP is excluded explicitly by the user, then it will continue to flow outside the tunnel. (But this should not be a common or a default setting.) However, now that connectivity.cloudflareclient.com is going inside the tunnel, the Windows firewall won't see any connections to that. You should not need to configure any allows for these static IPs (162.159.138.65 and 162.159.137.65)

Copy link
Contributor

github-actions bot commented May 3, 2025

This issue was closed automatically because there has been no response from the original author. As it stands currently, we don't have enough information to take action. If you believe this issue was closed in error, a) apologies and b) open a new issue and reference this one in the body.

@github-actions github-actions bot closed this as completed May 3, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

7 participants