Skip to content

Releases: gravitational/teleport

Teleport 1.3.2 Release

10 Jan 07:51
Compare
Choose a tag to compare

Description

v1.3.2 is a maintenance release which fixes a Web UI issue when in some cases static web assets like custom fonts would not load properly.

Fixes

Teleport 1.3.1 Release

21 Dec 01:25
Compare
Choose a tag to compare

Description

v1.3.1 is a maintenance release which fixes a few issues found in 1.3

Issues

  • Teleport session recorder can skip characters.
  • U2F was enabled by default in "demo mode" if teleport.yaml file was missing.

Improvements

  • U2F documentation has been improved.

Teleport v1.3 Relase

19 Dec 06:29
Compare
Choose a tag to compare
Teleport v1.3 Relase Pre-release
Pre-release

This release includes several major new features and it's recommended for production use.

New Features:

  • Support for hardware U2F keys for 2nd factor authentication.
  • CLI client profiles: tsh can now remember its --proxy setting.
  • tctl auth sign command to allow administrators to generate user session keys
  • Web UI is now served directly from the executable (no more need for web assets in /usr/local/share/teleport)

Bug Fixes:

  • Multiple auth servers in config doesn't work if the last on is not reachable. #593
  • tsh scp -r does not handle directory upload properly #606

Teleport 1.2 Release

10 Oct 23:43
Compare
Choose a tag to compare

This is a maintenance release and it's a drop-in replacement for previous versions.

Changes:

  • Usability bugfixes as can be seen here
  • Updated documentation
  • Added examples directory with sample configuration and systemd unit file.

Teleport 1.1.0 Release

16 Sep 00:05
Compare
Choose a tag to compare

This release is a drop-in upgrade of previous versions.

Changes

  • User experience improvements: nicer error messages
  • Better compatibility with ssh command: -t flag can be used to force allocation of TTY
  • Bugfixes

Teleport 1.0.5 Release

19 Aug 22:06
Compare
Choose a tag to compare

This release was recommended for production with one reservation: time-limited certificates did not work correctly in this release due to this bug

Changes

Teleport 1.0.4 Release

05 Aug 22:52
Compare
Choose a tag to compare
Pre-release

Warning

Teleport security has been improved since this release. It is highly recommended to upgrade to the latest production-recommended version.

Intro

This release only includes the addition of the ability to specify non-standard HTTPS port for Teleport proxy for tsh --proxy flag.

Teleport 1.0.3 Release

05 Aug 00:08
Compare
Choose a tag to compare

Warning

Teleport security has been improved since this release. It is highly recommended to upgrade to the latest production-recommended version.

Intro

Teleport has been quite stable since 1.0.0 release. This release only includes one major bugfix #486 plus minor changes not exposed to OSS Teleport users.

Changelist

  1. Fixed the regression of automatic configuration of host ip #486
  2. Improvements related to Gravitational's internal usage of Teleport

Teleport 1.0 Release

17 Jun 19:44
Compare
Choose a tag to compare

The first official release of Teleport!

The biggest reason that was preventing us from placing "Production ready v1.0" label on Teleport has been our desire to have it professionally audited and tested by security professionals. We have completed the audit and happy to report that Teleport now earns our approval for production use.

Warning

Teleport security has been improved since this release. It is highly recommended to upgrade to the latest production-recommended version.

New Features:

  • Support for logging out which clears temporary session keys
  • Support for connecting Teleport clusters together: see "Trusted Clusters" section in the documentation.
  • Account lock after N unsuccessful attempts

Other Changes:

  • Simplified build system: default source tarballs from Github are trivial to build.
  • Lots of minor bugfixes
  • Friendlier error messages

Compatibility with Beta Versions

Teleport YAML configuration format has changed slightly. Also, the format of key and session storage has evolved as well. We recommend beta users to wipe out /var/lib/teleport directory on servers and ~/.tsh directory on client machines.

Moving forward we are committed to backwards compatibility with configuration files and on-disk data.

NetAddr YAML marshaling and session env vars

11 Jun 04:05
Compare
Choose a tag to compare

Since the previous release:

  • NetAddr can be successfully marshaled to / unmarshaled from YAML.
  • Can set environment variables when opening a session.