diff --git a/website/content/docs/release-notes/v0_18_0.mdx b/website/content/docs/release-notes/v0_18_0.mdx index 645c36f062..29c3753805 100644 --- a/website/content/docs/release-notes/v0_18_0.mdx +++ b/website/content/docs/release-notes/v0_18_0.mdx @@ -47,7 +47,7 @@ description: >- Go version 1.23 x509 key pair behavior changes - Boundary version 0.18.x uses Go version 1.23, which introduced a new x509 key pair behavior. Some VPN implementations struggle with the TLS handshake being sent over 2 frames instead of 1, which can lead to Boundary version 0.18.x controllers or workers being unable to establish SSH connections. As a workaround, you can revert back to the previous key pair behavior. + Boundary version 0.18.x uses Go version 1.23, which introduced a new TLS handshake behavior. Some VPN providers struggle with the TLS handshake being sent over 2 frames instead of 1, which can lead to Boundary version 0.18.x controllers, workers or clients being unable to establish connections. As a workaround, you can revert back to the previous TLS handshake behavior.

Learn more:  Known issues and breaking changes @@ -245,14 +245,14 @@ description: >- 0.18.x - Boundary version 0.18.x controllers or workers are unable to establish SSH connections using the boundary connect ssh command + Boundary version 0.18.x CLI is unable to establish connections using the boundary connect command. - Boundary version 0.18.x uses Go version 1.23, which introduced a new x509 key pair behavior. Some VPN implementations struggle with the TLS handshake being sent over 2 frames instead of 1, which can lead to Boundary version 0.18.x controllers or workers being unable to establish SSH connections. + Boundary version 0.18.x uses Go version 1.23, which introduced a new TLS handshake behavior. Some VPN providers struggle with the TLS handshake being sent over 2 frames instead of 1, which can lead to Boundary version 0.18.x controllers, workers or clients being unable to establish connections. As a workaround, you can revert back to the previous TLS handshake behavior.

- As a workaround, you can revert back to the previous key pair behavior by adding the tlskyber=0 and x509keypairleaf=0 parameters to the GODEBUG environment variable before the boundary connect ssh command. For example: + As a workaround, you can revert back to the previous TLS handshake behavior by adding the tlskyber=0 parameters to the GODEBUG environment variable before the boundary connect command. For example:

- GODEBUG=tlskyber=0,x509keypairleaf=0 boundary connect ssh -target-id<ID> + GODEBUG=tlskyber=0 boundary connect ssh -target-id <ID>

Learn more: Go 1.23 Release Notes