teleport

The easiest, and most secure way to access and protect all of your infrastructure.

AGPL-3.0 License

Stars
17.1K
Committers
305
teleport - Teleport 1.0.4 Release

Published by kontsevoy about 8 years ago

Warning

Teleport security has been improved since this release. It is highly recommended to upgrade to the latest production-recommended version.

Intro

This release only includes the addition of the ability to specify non-standard HTTPS port for Teleport proxy for tsh --proxy flag.

teleport - Teleport 1.0.3 Release

Published by kontsevoy about 8 years ago

Warning

Teleport security has been improved since this release. It is highly recommended to upgrade to the latest production-recommended version.

Intro

Teleport has been quite stable since 1.0.0 release. This release only includes one major bugfix #486 plus minor changes not exposed to OSS Teleport users.

Changelist

  1. Fixed the regression of automatic configuration of host ip #486
  2. Improvements related to Gravitational's internal usage of Teleport
teleport - Teleport 1.0 Release

Published by kontsevoy over 8 years ago

The first official release of Teleport!

The biggest reason that was preventing us from placing "Production ready v1.0" label on Teleport has been our desire to have it professionally audited and tested by security professionals. We have completed the audit and happy to report that Teleport now earns our approval for production use.

Warning

Teleport security has been improved since this release. It is highly recommended to upgrade to the latest production-recommended version.

New Features:

  • Support for logging out which clears temporary session keys
  • Support for connecting Teleport clusters together: see "Trusted Clusters" section in the documentation.
  • Account lock after N unsuccessful attempts

Other Changes:

  • Simplified build system: default source tarballs from Github are trivial to build.
  • Lots of minor bugfixes
  • Friendlier error messages

Compatibility with Beta Versions

Teleport YAML configuration format has changed slightly. Also, the format of key and session storage has evolved as well. We recommend beta users to wipe out /var/lib/teleport directory on servers and ~/.tsh directory on client machines.

Moving forward we are committed to backwards compatibility with configuration files and on-disk data.

teleport - NetAddr YAML marshaling and session env vars

Published by r0mant over 8 years ago

Since the previous release:

  • NetAddr can be successfully marshaled to / unmarshaled from YAML.
  • Can set environment variables when opening a session.
teleport - Bring back AuthIdentityEvent

Published by r0mant over 8 years ago

teleport - Skip reading local agent keys if SkipLocalAuth=true

Published by r0mant over 8 years ago

teleport - Properly report an error on reverse tunnel startup

Published by r0mant over 8 years ago

This release fixes an issue with the error not being logged in case of a failure in creating a reverse tunnel.

teleport - Provisioning tokens, user lookup and reconnecting logic

Published by klizhentas over 8 years ago

This release features:

  • Provisioning tokens to quickly spin up clusters
  • Advanced user shell lookup fixes
  • Reverse tunnels reconnecting logic
teleport - Audit Logs and OpenID Connect Authentication

Published by klizhentas over 8 years ago

This release includes:

  • Support for OpenID/OAuth2 connectors, enabling external authentication with Google Apps
  • Refactored and improved audit logging, session management and playback
  • Numerous fixes across Teleport's code base
teleport -

Published by klizhentas over 8 years ago

This release includes:

  • Support for OpenID/OAuth2 connectors, enabling external authentication with Google Apps
  • Refactored and improved audit logging, session management and playback
  • Numeruous fixes across Teleport's code base
teleport -

Published by klizhentas over 8 years ago

SSH for Clusters and Teams

Check out documentation for details

http://gravitational.com/teleport/

Security note

At this time Teleport is NOT recommended for production use, but the code is open and available for your security team to inspect. Currently Teleport is undergoing an independent security review. We will be more comfortable recommending it for production use once the review will have completed.