Releases: gravitational/teleport
Pre release 2.5.0-beta.1
Improve cache performance, add metrics and logging.
This is a pre-release, use at your own risk: some migrations are data format can change from beta.
Pre release 2.5.0-alpha.6
IMPORTANT:: This is alpha pre-release. On disk format an migrations can change. Use at own risk.
Fix issue with multiple Auth servers returning events out of order.
Pre release 2.5.0-alpha.5
Alpha pre-release, use at your own risk. Data migrations may be not reversible.
- Removed extra error messages caused by LB health checks
- Switched to boltdb for local caching
- Remove newlines in token files
Pre release 2.5.0-alpha.4
Added ability to supply custom tokens for tctl nodes add
Pre-release 2.5.0-alpha.3
Use at your own risk.
Teleport 2.4.0
Teleport 2.4.0 adds two major new features and a few improvements and bugfixes.
New Features
- New Commercial Teleport Editions: "Pro" and "Business" allow users to
purchase a Teleport subscription without signing contracts. - Teleport now supports SSH session recording even for nodes running OpenSSH. #1327
This feature is called "recording proxy mode". - Users of open source edition of Teleport can now authenticate against Github. #1445
- The Web UI now supports persistent URLs to Teleport nodes which can be
integrated into 3rd party web apps. #1511 - Session recording can now be turned off #1430
Deprecated Features
- Teleport client
tsh
no longer supports being an SSH agent. We recommend
using build-in SSH agents for MacOS and Linux, likessh-agent
from
openssh-client
package.
Bug Fixes
There have been numerous small usability and performance improvements, but some
notable fixed bugs are listed below:
Teleport 2.4.0-rc.4
Description
Teleport 2.4.0-rc.4 is the fourth release candidate for Teleport 2.4.0.
Teleport 2.3.7
Description
Teleport 2.3.7 fixes a security vulnerability that allowed an attacker with direct network access to the Auth Server to write a client for the Auth Server that could by-pass second factor authentication.
We strongly encourage anyone running Teleport 2.3 to upgrade their Auth Server to 2.3.7 to mitigate this issue.
Bug Fixes
- Don't allow second factor by-pass. #1550
Teleport 2.2.8
Description
Teleport 2.2.8 fixes a security vulnerability that allowed an attacker with direct network access to the Auth Server to write a client for the Auth Server that could by-pass second factor authentication.
We strongly encourage anyone running Teleport 2.2 to upgrade their Auth Server to 2.2.8 to mitigate this issue.
Bug Fixes
- Don't allow second factor by-pass. #1550
v2.5.0-alpha.2
Minor fix in the webapi server. Release 2.5.0-alpha.2.