This release adds two major new features and a few improvements and bugfixes.
- New Commercial Teleport Editions: "Pro" and "Business" allow users to purchase a Teleport subscription without signing contracts.
- Teleport now supports SSH session recording even for nodes running OpenSSH #1327 This feature is called "recording proxy mode".
- Users of open source edition of Teleport can now authenticate against Github #1445
- The Web UI now supports persistent URLs to Teleport nodes which can be integrated into 3rd party web apps. #1511
- Session recording can now be turned off #1430
- Teleport client
tsh
no longer supports being an SSH agent. We recommend using build-in SSH agents for MacOS and Linux, likessh-agent
fromopenssh-client
package.
There have been numerous small usability and performance improvements, but some notable fixed bugs are listed below:
- Resource (file descriptor) leak #1433
- Correct handling of the terminal type #1402
- Crash on startup #1395
This release is focused on fixing a few regressions in configuration and UI/UX.
- Updated documentation to accurately reflect 2.3 changes
- Web UI can use introspection so users can skip explicitly specifying SSH port #1410
- Fixed issue of 2FA users getting prematurely locked out #1347
- UI (regression) when invite link is expired, nothing is shown to the user #1400
- OIDC regression with some providers #1371
- Legacy configuration for trusted clusters regression: #1381
- Dynamic tokens for adding nodes: "access denied" #1348
This release focus was to increase Teleport user experience in the following areas:
- Easier configuration via
tctl
resource commands. - Improved documentation, with expanded 'examples' directory.
- Improved CLI interface.
- Web UI improvements.
- Web UI: users can connect to OpenSSH servers using the Web UI.
- Web UI now supports arbitrarty SSH logins, in addition to role-defined ones, for better compatibility with OpenSSH.
- CLI: trusted clusters can now be managed on the fly without having to edit Teleport configuration. #1137
- CLI:
tsh login
supports exporting a user identity into a file to be used later with OpenSSH. tsh agent
command has been deprecated: users are expected to use native SSH Agents on their platforms.
- More granular RBAC rules #1092
- Role definitions now support templates. #1120
- Authentication: Teleport now supports multilpe OIDC/SAML endpoints.
- Configuration: local authentication is always enabled as a fallback if a SAML/OIDC endpoints go offline.
- Configuration: SAML/OIDC endpoints can be created on the fly using
tctl
and without having to edit configuration file or restart Teleport. - Web UI: it is now easier to turn a trusted cluster on/off #1199.
- Proper handling of
ENV_SUPATH
from login.defs #1004 - Reverse tunnels would periodically lose connectivity. #1156
- tsh now stores user identities in a format compatible with OpenSSH. 1171.
- Updated YAML parsing library. #1226
- Fixed issue with SSH dial potentially hanging indefinitely. #1153
- Fixed issue where node did not have correct permissions. #1151
- Fixed issue with remote tunnel timeouts. #1140.
- Fixed issue with Trusted Clusters where a clusters could lose its signing keys. #1050.
- Fixed SAML signing certificate export in Enterprise. #1109.
- Fixed an issue where in certain situations
tctl ls
would not work. #1102.
- Added
--compat=oldssh
to bothtsh
andtctl
that can be used to request certificates in the legacy format (no roles in extensions). #1083
- Fixed multiple regressions when using SAML with dynamic roles. #1080
- HTTP CONNECT tunneling for Trusted Clusters. #860
- Long lived certificates and identity export which can be used for automation. #1033
- New terminal for Web UI. #933
- Read user environment files. #1014
- Improvements to Auth Server resiliency and availability. #1071
- Server side configuration of support ciphers, key exchange (KEX) algorithms, and MAC algorithms. #1062
- Renaming
tsh
tossh
or making a symlinktsh -> ssh
removes the need to typetsh ssh
, making it compatible with familiarssh user@host
. #929
- SAML 2.0. #1070
- Role mapping for Trusted Clusters. #983
- ACR parsing for OIDC identity providers. #901
- Improvements to OpenSSH interoperability.
tsh
profile is now always read. #1047- Correct signal handling when Teleport is launched using sysvinit. #981
- Role templates now automatically fill out default values when omitted. #912
- Fixed regression in TLP-01-009.
Teleport 2.0.5 contains a variety of security fixes. We strongly encourage anyone running Teleport 2.0.0 and above to upgrade to 2.0.5.
The most pressing issues (a phishing attack which can potentially be used to extract plaintext credentials and an attack where an already authenticated user can escalate privileges) can be resolved by upgrading the web proxy. However, however all nodes need to be upgraded to mitigate all vulnerabilities.
- Patch for TLP-01-001 and TLP-01-003: Check redirect.
- Patch for TLP-01-004: Always check is namespace is valid.
- Patch for TLP-01-005: Check user principal when joining session.
- Patch for TLP-01-006 and TLP-01-007: Validate Session ID.
- Patch for TLP-01-008: Use a fake hash for password authentication if user does not exist.
- Patch for TLP-01-009: Command injection in scp.
- Roles created the the Web UI now have
node
resource. #949
- Execute commands using user's shell. #943
- Allow users to read their own roles. #941
- Fix User CA import. #919
- Role template defaults. #916
- Skip UserInfo if not provided. #915
- Agent socket had wrong permissions. #936
- Introduced Dynamic Roles. #897
This is a major new release of Teleport.
- Native support for DynamoDB back-end for storing cluster state.
- It is now possible to turn off 2nd factor authentication.
- 2nd factor now uses TOTP. #522
- New and easy to use framework for implementing secret storage plug-ins.
- Audit log format has been finalized and documented.
- Experimental simple file-based secret storage back-end.
- SSH agent forwarding.
- Friendlier CLI error messages.
tsh login
is now compatible with SSH agents.
- Role-based access control (RBAC)
- Dynamic configuration: ability to manage roles and trusted clusters at runtime.
Full list of Github issues: https://github.com/gravitational/teleport/milestone/8
v1.3.2 is a maintenance release which fixes a Web UI issue when in some cases static web assets like custom fonts would not load properly.
- Issue #687 - broken web assets on some browsers.
v1.3.1 is a maintenance release which fixes a few issues found in 1.3
- Teleport session recorder can skip characters.
- U2F was enabled by default in "demo mode" if teleport.yaml file was missing.
- U2F documentation has been improved
This release includes several major new features and it's recommended for production use.
- Support for hardware U2F keys for 2nd factor authentication.
- CLI client profiles: tsh can now remember its --proxy setting.
- tctl auth sign command to allow administrators to generate user session keys
- Web UI is now served directly from the executable. There is no more need for web
assets in
/usr/local/share/teleport
- Multiple auth servers in config doesn't work if the last on is not reachable. #593
tsh scp -r
does not handle directory upload properly #606
This is a maintenance release and it's a drop-in replacement for previous versions.
- Usability bugfixes as can be seen here
- Updated documentation
- Added examples directory with sample configuration and systemd unit file.
This is a maintenance release meant to be a drop-in upgrade of previous versions.
- User experience improvements: nicer error messages
- Better compatibility with ssh command: -t flag can be used to force allocation of TTY
This release was recommended for production with one reservation: time-limited certificates did not work correctly in this release due to #529
- Improvements in performance and usability of the Web UI
- Smaller binary sizes thanks to Golang v1.7
- Wrong url to register new users. #497
- Logged in users inherit Teleport supplemental groups bug security. #507
- Joining a session running on a trusted cluster does not work. #504
This release only includes the addition of the ability to specify non-standard HTTPS port for Teleport proxy for tsh --proxy flag.
This release only includes one major bugfix #486 plus minor changes not exposed to OSS Teleport users.
- Guessing
advertise_ip
chooses IPv6 address space. #486
The first official release of Teleport!