
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Tue, 14 Apr 2026 15:57:10 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Ending the "silent drop": how Dynamic Path MTU Discovery makes the Cloudflare One Client more resilient]]></title>
            <link>https://blog.cloudflare.com/client-dynamic-path-mtu-discovery/</link>
            <pubDate>Thu, 05 Mar 2026 14:00:00 GMT</pubDate>
            <description><![CDATA[ The Cloudflare One Client now features the ability to actively probe and adjust packet sizes. This update eliminates the problems caused by tunnel layering and MTU differences, providing more stability and resiliency.  ]]></description>
            <content:encoded><![CDATA[ <p></p><p>You’ve likely seen this support ticket countless times: a user’s Internet connection that worked just fine a moment ago for Slack and DNS lookups is suddenly hung the moment they attempt a large file upload, join a video call, or initiate an SSH session. The culprit isn't usually a bandwidth shortage or service outage issue, it is the "PMTUD Black Hole" — a frustration that occurs when packets are too large for a specific network path, but the network fails to communicate that limit back to the sender. This situation often happens when you’re locked into using networks you do not manage or vendors with <a href="https://www.cloudflare.com/learning/network-layer/what-is-mtu/"><u>maximum transmission unit</u></a> (MTU) restrictions, and you have no means to address the problem.</p><p>Today, we are moving past these legacy networking constraints. By implementing <a href="https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/warp/deployment/mdm-deployment/path-mtu-discovery/"><u>Path MTU Discovery</u></a> (PMTUD), the Cloudflare One Client has shifted from a passive observer to an active participant in path discovery.</p><p>Dynamic Path MTU Discovery allows the client to intelligently and dynamically adjust to the optimal packet size for most network paths using MTUs above <a href="https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/warp/deployment/mdm-deployment/path-mtu-discovery/#path-mtu-discovery"><u>1281 bytes</u></a>. This ensures that a user’s connection remains stable, whether they are on a high-speed corporate backbone or a restrictive cellular network.</p>
    <div>
      <h3>The “modern security meets legacy infrastructure” challenge<b> </b></h3>
      <a href="#the-modern-security-meets-legacy-infrastructure-challenge">
        
      </a>
    </div>
    <p>To understand the solution, we have to look at how modern security protocols interact with the diversity of global Internet infrastructure. The MTU represents the largest data packet size a device can send over a network without fragmentation: typically 1500 bytes for standard Ethernet.</p><p>As the Cloudflare One client has evolved to support modern enterprise-grade requirements (such as <a href="https://developers.cloudflare.com/ssl/edge-certificates/additional-options/cipher-suites/compliance-status/#fips-140-2"><u>FIPS 140-2 compliance</u></a>), the amount of metadata and encryption overhead within each packet has naturally increased. This is a deliberate choice to ensure our users have the highest level of protection available today.</p><p>However, much of the world’s Internet infrastructure was built decades ago with a rigid expectation of 1500-byte packets. On specialized networks like LTE/5G, satellite links, or public safety networks like FirstNet, the actual available space for data is often lower than the standard. When a secure, encrypted packet hits an older router with a lower limit (e.g., 1300 bytes), that router should ideally send an <a href="https://www.cloudflare.com/learning/ddos/glossary/internet-control-message-protocol-icmp/"><u>Internet Control Message Protocol</u></a> (ICMP) message stating "Destination Unreachable" back to the sender to request a smaller size.</p><p>But that doesn’t always happen. The "Black Hole" occurs when firewalls or middleboxes silently drop those ICMP feedback messages. Without this feedback, the sender keeps trying to send large packets that never arrive, and the application simply waits in a "zombie" state until the connection eventually times out.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/N8nwoU8QnWvDeM0yymBX0/2482b85f8ebade81520fdd950f968341/image2.png" />
          </figure>
    <div>
      <h3>Cloudflare’s solution: active probing with PMTUD</h3>
      <a href="#cloudflares-solution-active-probing-with-pmtud">
        
      </a>
    </div>
    <p>Cloudflare’s implementation of <a href="https://datatracker.ietf.org/doc/html/rfc8899"><u>RFC 8899 Datagram Packetization Layer Path MTU Discovery (PMTUD)</u></a> removes the reliance on these fragile, legacy feedback loops. Because our modern client utilizes the <a href="https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/warp/configure-warp/warp-settings/#device-tunnel-protocol"><u>MASQUE protocol</u></a> — built on top of Cloudflare’s open source <a href="https://github.com/cloudflare/quiche"><u>QUIC library</u></a> — the client can perform active, end-to-end interrogation of the network path.</p><p>Instead of waiting for an error message that might never come, the client proactively sends encrypted packets of varying sizes to the Cloudflare edge. This probe tests MTUs from the upper bound of the supported MTU range to the midpoint, until the client narrows down to the exact MTU to match. This is a sophisticated, non-disruptive handshake happening in the background. If the Cloudflare edge receives a specific-sized probe, it acknowledges it; if a probe is lost, the client instantly knows the precise capacity of that specific network segment.</p><p>The client then dynamically resizes its virtual interface MTU on the fly, by periodically validating the capacity of the path that we established at connection onset. This ensures that if, for example, a user moves from a 1500-MTU Wi-Fi network at a station to a 1300-MTU cellular backhaul in the field, the transition is seamless. The application session remains uninterrupted because the client has already negotiated the best possible path for those secure packets.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/bRWgjgUSJtxj6QQ7sn6Et/3dc26d7c97173909860d9c942202bf0e/image3.png" />
          </figure>
    <div>
      <h3>Real-world impact, from first responders to hybrid workers</h3>
      <a href="#real-world-impact-from-first-responders-to-hybrid-workers">
        
      </a>
    </div>
    <p>This technical shift has profound implications for mission-critical connectivity. Consider the reliability needs of a first responder using a vehicle-mounted router. These systems often navigate complex NAT-traversal and priority-routing layers that aggressively shrink the available MTU. Without PMTUD, critical software like Computer Aided Dispatch (CAD) systems may experience frequent disconnects during tower handoffs or signal fluctuations. By using active discovery, the Cloudflare One Client maintains a sticky connection that shields the application from the underlying network volatility.</p><p>This same logic applies to the global hybrid workforce. A road warrior working from a hotel in a different country often encounters legacy middleboxes and complex double-NAT environments. Instead of choppy video calls and stalled file transfers, the client identifies the bottleneck in seconds and optimizes the packet flow — before the user even notices a change.</p>
    <div>
      <h3>Get PMTUD for your devices</h3>
      <a href="#get-pmtud-for-your-devices">
        
      </a>
    </div>
    <p>Anyone using the Cloudflare One Client with the MASQUE protocol can try Path MTU Discovery now for free. Use our detailed <a href="https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/warp/deployment/mdm-deployment/path-mtu-discovery/"><u>documentation</u></a> to get started routing traffic through the Cloudflare edge with the speed and stability of PMTUD on your Windows, macOS, and Linux devices.</p><p>If you are new to Cloudflare One, you too can start protecting your first 50 users for free. Simply <a href="https://dash.cloudflare.com/sign-up/zero-trust"><u>create an account</u></a>, download the<a href="https://1.1.1.1/"> <u>Cloudflare One Client</u></a>, and follow our<a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/"> <u>onboarding guide</u></a> to experience a faster, more stable connection for your entire team.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Cloudflare One Client]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Connectivity]]></category>
            <category><![CDATA[SASE]]></category>
            <guid isPermaLink="false">XzwjagUzAbLvFCj2KNgGB</guid>
            <dc:creator>Koko Uko</dc:creator>
            <dc:creator>Rhett Griggs</dc:creator>
            <dc:creator>Todd Murray</dc:creator>
        </item>
        <item>
            <title><![CDATA[Mind the gap: new tools for continuous enforcement from boot to login]]></title>
            <link>https://blog.cloudflare.com/mandatory-authentication-mfa/</link>
            <pubDate>Wed, 04 Mar 2026 14:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare’s mandatory authentication and independent MFA protect organizations by ensuring continuous enforcement, from the moment a machine boots until sensitive resources are accessed. ]]></description>
            <content:encoded><![CDATA[ <p>One of our favorite ask-me-anything questions for company meetings or panels at security conferences is the classic: “What keeps you up at night?”</p><p>For a <a href="https://www.cloudflare.com/ciso/"><u>CISO</u></a>, that question is maybe a bit of a nightmare in itself. It does not have one single answer; it has dozens. It’s the constant tension between enabling a globally distributed workforce to do their best work, and ensuring that "best work" does not inadvertently open the door to a catastrophic breach.</p><p>We often talk about the "<a href="https://www.cloudflare.com/the-net/roadmap-zerotrust/"><u>zero trust journey</u></a>," but the reality is that the journey is almost certainly paved with friction. If security is too cumbersome, users find creative (and dangerous) ways around it. If it’s seamless at the cost of effectiveness, it might not be secure enough to stop a determined adversary.</p><p>Today, we are excited to announce two new tools in Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/"><u>SASE</u></a> toolbox designed to modernize remote access by eliminating the "dark corners" of your network security without adding friction to the user experience: mandatory authentication and Cloudflare’s own <a href="https://www.cloudflare.com/learning/access-management/what-is-multi-factor-authentication/"><u>multi-factor authentication (MFA)</u></a>. </p>
    <div>
      <h2>Addressing the gap between installation and enforcement</h2>
      <a href="#addressing-the-gap-between-installation-and-enforcement">
        
      </a>
    </div>
    <p>When you deploy the Cloudflare One Client, you gain incredible visibility and control. You can apply policies for permitted destinations, define the Internet traffic that routes through Cloudflare, and set up traffic inspection at both the application and network layer. But there has always been a visibility challenge from when there is no user actually authenticated.</p><p>This gap occurs in two primary scenarios:</p><ol><li><p>A new device: Cloudflare One Client is installed via mobile device management (MDM), but the user has not authenticated yet.</p></li><li><p>Re-authentication grey zone: The session expires, and the user, either out of forgetfulness or a desire to bypass restrictions, does not log back in.</p></li></ol><p>In either case, the device is now unknown. This is dangerous. You lose visibility, and your security posture reverts to whatever the local machine allows.</p>
    <div>
      <h3>Introducing mandatory authentication</h3>
      <a href="#introducing-mandatory-authentication">
        
      </a>
    </div>
    <p>To close this loop, we are introducing <b>mandatory authentication</b>. When enabled via your MDM configuration, the Cloudflare One Client becomes the gatekeeper of Internet access from the moment the machine boots up.</p><p>If a user is not actively authenticated, the Cloudflare One client will:</p><ul><li><p>Block all Internet traffic by default using the system firewall.</p></li><li><p>Allow traffic from the device client’s authentication flow using a process-specific exception.</p></li><li><p>Prompt users to authenticate, guiding them through the process, so they don’t have to hunt for the right buttons.</p></li></ul><p>By making authentication a prerequisite for connectivity, you ensure that every managed device is accounted for, all the time.</p><p><i>Note: mandatory authentication will become available in our Cloudflare One client on Windows initially, with support for other platforms to follow. </i></p>
    <div>
      <h2>When one source of trust is not enough</h2>
      <a href="#when-one-source-of-trust-is-not-enough">
        
      </a>
    </div>
    <p>Most organizations have moved toward <a href="https://www.cloudflare.com/learning/access-management/what-is-sso/"><u>single sign-on (SSO)</u></a> as their primary security anchor. If you use Okta, Entra ID, or Google, you likely require MFA at the initial login. That’s a great start, but in a modern threat landscape, it is no longer the finish line.</p><p>The hard truth is that <a href="https://www.cloudflare.com/learning/access-management/what-is-an-identity-provider/"><u>identity providers (IdPs)</u></a> are high-value targets. If an attacker successfully compromises a user’s SSO session, perhaps through a sophisticated session hijacking or social engineering, they effectively hold the keys to every application behind that SSO.</p>
    <div>
      <h3>Cloudflare’s independent MFA: a secondary root of trust</h3>
      <a href="#cloudflares-independent-mfa-a-secondary-root-of-trust">
        
      </a>
    </div>
    <p>This is where Cloudflare’s MFA can help. Think of this as a "step-up MFA" that lives at the network edge, independent of your IdP.</p><p>By remaining separate from your IdP, this introduces another authority that has to “sign off” on any user trying to access a protected resource. That means even if your primary IdP credentials are compromised or spoofed, an attacker will hit a wall when trying to access something like your production database—because they do not have access to the second factor.</p><p><a href="https://www.cloudflare.com/zero-trust/products/access/"><u>Cloudflare Access</u></a> will offer a few different means of providing MFA:</p><ul><li><p>Biometrics (i.e., Windows Hello, Apple Touch ID, and Apple Face ID)</p></li><li><p>Security key (WebAuthn and FIDO2 as well as PIV for SSH with Access for Infrastructure)</p></li><li><p>Time-based one-time password (TOTP) through authenticator apps</p></li></ul><p>Administrators will have the flexibility to define how users must authenticate and how often. This can be configured not only at a global level (i.e., establish mandatory MFA for all Access applications), but also with more granular controls for specific applications or policies. For example, your organization may decide to allow lower assurance MFA methods for chat apps, but require a security key for access to source code.</p><p>Or, you could enforce strong MFA to sensitive resources for third-parties like contractors, who otherwise may use a personal email or social identity like LinkedIn. You can also easily add modern MFA methods to legacy apps that don’t otherwise support it natively, without touching a line of code.</p><p>End users will be able to enroll an MFA device easily through their <a href="https://developers.cloudflare.com/cloudflare-one/access-controls/access-settings/app-launcher/"><u>App Launcher</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/soh6QIt80EoRsWAaTKLIc/9398094837a2ef71025f012f28ffbd2e/image2.jpg" />
          </figure><p><sup><i>Example of what customizing MFA settings for an Access policy may look like. Note: This is a mockup and may change.</i></sup></p><p>Cloudflare’s independent MFA is in closed beta with new customers being onboarded each week. You can <a href="https://www.cloudflare.com/lp/access-independent-mfa"><u>request access here</u></a> to try out this new feature!</p>
    <div>
      <h3>Helping CISOs sleep at night</h3>
      <a href="#helping-cisos-sleep-at-night">
        
      </a>
    </div>
    <p>Security is often a game of "closing the loop." By ensuring that devices are registered and authenticated before they can touch the open Internet and by requiring an independent second layer of verification for your most precious assets, we are making the "blast radius" of a potential attack significantly smaller.</p><p>These features don't just add security; they add certainty. Certainty that your policies are being enforced and certainty that a single compromised password won't lead to a total breach.</p><p>We are moving beyond simple access control and into a world of continuous, automated posture enforcement. And we’re just getting started.</p><p>Ready to lock down your fleet? You can <a href="https://dash.cloudflare.com/sign-up/zero-trust"><u>get started today</u></a> with Cloudflare One for free for up to 50 users. </p><p>We’re excited to see how you use these tools to harden your perimeter and simplify your users’ day-to-day workflows. As always, we’d love to hear your feedback! Join us in the <a href="https://community.cloudflare.com/"><u>Cloudflare Community</u></a> or reach out to your account team to share your thoughts.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Access]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[WARP]]></category>
            <guid isPermaLink="false">KiwO7JTmCDekuq75t4Jf4</guid>
            <dc:creator>Alex Holland</dc:creator>
            <dc:creator>Shahed El Baba</dc:creator>
            <dc:creator>Yi Huang</dc:creator>
            <dc:creator>Rhett Griggs</dc:creator>
        </item>
    </channel>
</rss>