Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Go 1.23: Additional key exchange mechanism X25519Kyber768Draft00 causes AWS Network Firewall to drop packets #4663

Open
jseiser opened this issue Feb 6, 2025 · 2 comments
Labels
type/bug Something isn't working

Comments

@jseiser
Copy link

jseiser commented Feb 6, 2025

Describe the bug
Go 1.23 introduces a small change: https://tip.golang.org/doc/go1.23#cryptotlspkgcryptotls

This actually stops go apps from working behind the AWS Network firewall

To Reproduce
A really good explanation here: hashicorp/terraform-provider-aws#39311

Expected behavior
TLS Traffic flows through firewall

Environment:
AWS Gov Cloud behind AWS Network FIrewall

Additional Context
I believe it can be mitigated with: https://github.com/hashicorp/terraform-provider-aws/pull/39432/files#diff-33ef32bf6c23acb95f5902d7097b7a1d5128ca061167ec0716715b0b9eeaa5f6R7

@joe-elliott
Copy link
Member

Thanks for the heads up. Hopefully go fixes this before our next release. If not we can review how much pain its causing our users and use the linked fix. 🙏

@joe-elliott joe-elliott added the type/bug Something isn't working label Feb 6, 2025
@jseiser
Copy link
Author

jseiser commented Feb 6, 2025

It also doesnt appear that we can just swap the S3 bucket endpoint, since the helm chart deployments dont appear? to actually allow doing so.

grafana/helm-charts#3562

We found a way to work around this in the AWS Firewall

ssl_state:client_hello;

Needs to be present on all your TLS rules.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
type/bug Something isn't working
Projects
None yet
Development

No branches or pull requests

2 participants