diff --git a/website/content/docs/release-notes/v0_18_0.mdx b/website/content/docs/release-notes/v0_18_0.mdx
index 645c36f062..29c3753805 100644
--- a/website/content/docs/release-notes/v0_18_0.mdx
+++ b/website/content/docs/release-notes/v0_18_0.mdx
@@ -47,7 +47,7 @@ description: >-
Go version 1.23 x509 key pair behavior changes
- Boundary version 0.18.x uses Go version 1.23, which introduced a new x509 key pair behavior. Some VPN implementations struggle with the TLS handshake being sent over 2 frames instead of 1, which can lead to Boundary version 0.18.x controllers or workers being unable to establish SSH connections. As a workaround, you can revert back to the previous key pair behavior.
+ Boundary version 0.18.x uses Go version 1.23, which introduced a new TLS handshake behavior. Some VPN providers struggle with the TLS handshake being sent over 2 frames instead of 1, which can lead to Boundary version 0.18.x controllers, workers or clients being unable to establish connections. As a workaround, you can revert back to the previous TLS handshake behavior.
Learn more: Known issues and breaking changes
|
@@ -245,14 +245,14 @@ description: >-
0.18.x
- Boundary version 0.18.x controllers or workers are unable to establish SSH connections using the boundary connect ssh command
+ Boundary version 0.18.x CLI is unable to establish connections using the boundary connect command.
|
- Boundary version 0.18.x uses Go version 1.23, which introduced a new x509 key pair behavior. Some VPN implementations struggle with the TLS handshake being sent over 2 frames instead of 1, which can lead to Boundary version 0.18.x controllers or workers being unable to establish SSH connections.
+ Boundary version 0.18.x uses Go version 1.23, which introduced a new TLS handshake behavior. Some VPN providers struggle with the TLS handshake being sent over 2 frames instead of 1, which can lead to Boundary version 0.18.x controllers, workers or clients being unable to establish connections. As a workaround, you can revert back to the previous TLS handshake behavior.
- As a workaround, you can revert back to the previous key pair behavior by adding the tlskyber=0 and x509keypairleaf=0 parameters to the GODEBUG environment variable before the boundary connect ssh command . For example:
+ As a workaround, you can revert back to the previous TLS handshake behavior by adding the tlskyber=0 parameters to the GODEBUG environment variable before the boundary connect command. For example:
- GODEBUG=tlskyber=0,x509keypairleaf=0 boundary connect ssh -target-id<ID>
+ GODEBUG=tlskyber=0 boundary connect ssh -target-id <ID>
Learn more: Go 1.23 Release Notes
|