Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

connectivity.cloudflareclient.com IP Addresses #16062

Open
jamie-sandbox opened this issue Aug 11, 2024 · 6 comments
Open

connectivity.cloudflareclient.com IP Addresses #16062

jamie-sandbox opened this issue Aug 11, 2024 · 6 comments
Assignees
Labels
content:edit Request for content edits documentation Documentation edits product:cloudflare-one

Comments

@jamie-sandbox
Copy link
Contributor

Existing documentation URL(s)

https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#connectivity-check

What changes are you suggesting?

The documentation states the following:

“Because this check happens inside of the tunnel, you do not need to add connectivity.cloudflareclient.com to your firewall allowlist.”

This is not necessarily correct, since on a Windows system with a firewall policy where outbound traffic is blocked by default, a rule must be added to allow warp-svc.exe to generate outbound network traffic to connectivity.cloudflareclient.com.

The hostname connectivity.cloudflareclient.com currently resolves to 162.159.138.65 and 162.159.137.65. However, these IPs are not referenced or contained elsewhere within the documentation.

Please can clarification be provided? Are 162.159.138.65 and 162.159.137.65 static addresses which we can create a firewall rule for? Or are they part of a range which we need to include the entirety of? If so, what is the range?

Additional information

No response

@jamie-sandbox jamie-sandbox added content:edit Request for content edits documentation Documentation edits labels Aug 11, 2024
@jamie-sandbox
Copy link
Contributor Author

Resolves to 162.159.138.65 and 162.159.137.65 when queried both inside and outside of the tunnel.

Hopefully these are static. 🙏

@deansundquist
Copy link
Contributor

The client doesn't use DNS resolution for its inside tunnel connectivity checks, and it doesn't use 162.159.138.65 nor 162.159.137.65.

@deansundquist
Copy link
Contributor

@jamie-sandbox and @deadlypants1973 I apologize but my last comment was incorrect. We do utilize DNS resolution for this, and we will attempt to connect to that IP address. (I was thinking about the outside tunnel checks, which are handled differently).

This traffic to this endpoint though should always be inside of the tunnel, when we connect to it. If it is not, the client will not be able to connect (unless you disable connectivity checks).

The reason we do not list this on our WARP with Firewall page is because it should be in the WARP tunnel, and not visible to any firewall that might sit between the Client and the Internet.

If you see connections to connectivity.cloudflareclient.com outside of the tunnel, we'd suggest opening a support case, as this is unexpected.

@jamie-sandbox
Copy link
Contributor Author

jamie-sandbox commented Feb 19, 2025

@deansundquist Thanks for your response.

From my original description:

on a Windows system with a firewall policy where outbound traffic is blocked by default, a rule must be added to allow warp-svc.exe to generate outbound network traffic to connectivity.cloudflareclient.com.

Unfortunately the question still is not fully answered. Even when the traffic is within the tunnel, we still need to configure the local Windows Firewall to allow warp-svc.exe to send traffic to the relevant addresses.

The documentation should state what these addresses are.

@deadlypants1973
Copy link
Contributor

#16241 (comment)

@deadlypants1973
Copy link
Contributor

@jamie-sandbox thank you for your reply. I have alerted the engineering team about this and they are looking into it. Will update!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
content:edit Request for content edits documentation Documentation edits product:cloudflare-one
Projects
None yet
Development

No branches or pull requests

7 participants