Skip to content

Commit

Permalink
Merge branch 'branch/v13' into bot/backport-39829-branch/v13
Browse files Browse the repository at this point in the history
  • Loading branch information
strideynet authored Mar 28, 2024
2 parents 0117d00 + bc2c723 commit f4d4404
Show file tree
Hide file tree
Showing 25 changed files with 1,710 additions and 1,625 deletions.
8 changes: 8 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,13 @@
# Changelog

## 13.4.21 (03/27/24)

* Fixed possible phishing links which could result in code execution with install and join scripts. [#39839](https://github.com/gravitational/teleport/pull/39839)
* Fixed MFA checks not being prompted when joining a session. [#39816](https://github.com/gravitational/teleport/pull/39816)
* Fixed broken SSO login landing page on certain versions of Google Chrome. [#39721](https://github.com/gravitational/teleport/pull/39721)
* Updated Electron to v29 in Teleport Connect. [#39659](https://github.com/gravitational/teleport/pull/39659)
* Fixed a bug in the discovery script failing when `jq` was not installed. [#39601](https://github.com/gravitational/teleport/pull/39601)

## 13.4.20 (03/16/24)

* Improved error messaging when creating resources fails because they already exist or updating resources fails because they were removed. [#39397](https://github.com/gravitational/teleport/pull/39397)
Expand Down
2 changes: 1 addition & 1 deletion Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@
# Stable releases: "1.0.0"
# Pre-releases: "1.0.0-alpha.1", "1.0.0-beta.2", "1.0.0-rc.3"
# Master/dev branch: "1.0.0-dev"
VERSION=13.4.20
VERSION=13.4.21

DOCKER_IMAGE ?= teleport

Expand Down
3 changes: 3 additions & 0 deletions api/proto/teleport/legacy/types/types.proto
Original file line number Diff line number Diff line change
Expand Up @@ -6238,6 +6238,9 @@ message JamfInventoryEntry {
// Must be either "NOOP" or "DELETE".
// Defaults to "NOOP".
string on_missing = 4 [(gogoproto.jsontag) = "on_missing,omitempty"];
// Custom page size for inventory queries.
// A server default is used if zeroed or negative.
int32 page_size = 5 [(gogoproto.jsontag) = "page_size,omitempty"];
}

// MessageWithHeader is a message with a resource header. This is used primarily
Expand Down
3,010 changes: 1,522 additions & 1,488 deletions api/types/types.pb.go

Large diffs are not rendered by default.

2 changes: 1 addition & 1 deletion api/version.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

4 changes: 2 additions & 2 deletions build.assets/macos/tsh/tsh.app/Contents/Info.plist
Original file line number Diff line number Diff line change
Expand Up @@ -19,13 +19,13 @@
<key>CFBundlePackageType</key>
<string>APPL</string>
<key>CFBundleShortVersionString</key>
<string>13.4.20</string>
<string>13.4.21</string>
<key>CFBundleSupportedPlatforms</key>
<array>
<string>MacOSX</string>
</array>
<key>CFBundleVersion</key>
<string>13.4.20</string>
<string>13.4.21</string>
<key>DTCompiler</key>
<string>com.apple.compilers.llvm.clang.1_0</string>
<key>DTPlatformBuild</key>
Expand Down
4 changes: 2 additions & 2 deletions build.assets/macos/tshdev/tsh.app/Contents/Info.plist
Original file line number Diff line number Diff line change
Expand Up @@ -17,13 +17,13 @@
<key>CFBundlePackageType</key>
<string>APPL</string>
<key>CFBundleShortVersionString</key>
<string>13.4.20</string>
<string>13.4.21</string>
<key>CFBundleSupportedPlatforms</key>
<array>
<string>MacOSX</string>
</array>
<key>CFBundleVersion</key>
<string>13.4.20</string>
<string>13.4.21</string>
<key>DTCompiler</key>
<string>com.apple.compilers.llvm.clang.1_0</string>
<key>DTPlatformBuild</key>
Expand Down
85 changes: 50 additions & 35 deletions docs/pages/desktop-access/troubleshooting.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -34,15 +34,15 @@ service changes.

### Smart card not supported for Account

You connect to a Windows host and get the error message: **"Signing in with a smart card
You connect to a Windows host and get the error message: **"Signing in with a smart card
isn't supported for your account."** or similar.

**Solution:** Review the Security-Kerberos Log on the Windows host for causes.

The Security-Kerberos Windows Event Log provides information on smart card-based
The Security-Kerberos Windows Event Log provides information on smart card-based
authentication attempts. This Event Log is not enabled by default.
Open the Windows Event Log and navigate to Event Viewer, Application and Services Logs,
Microsoft, Windows, Security-Kerberos, Operational. Enable this Event Log and attempt
Open the Windows Event Log and navigate to Event Viewer, Application and Services Logs,
Microsoft, Windows, Security-Kerberos, Operational. Enable this Event Log and attempt
to connect with Teleport Web UI to review log entries.

### Smart card certificate not trusted
Expand All @@ -56,9 +56,9 @@ authentication was not trusted"** (or similar).
This means that the host does not trust the Teleport CA.

First, make sure that you [import the Teleport CA into Group
Policy](./active-directory-manual.mdx#create-the-GPO-for-the-Teleport-certificate).
Note that if you have rotated the Teleport CA since the last import, you need to
fetch the new CA using the following command, replacing <Var name="teleport.example.com" />
Policy](./active-directory-manual.mdx#create-the-GPO-for-the-Teleport-certificate).
Note that if you have rotated the Teleport CA since the last import, you need to
fetch the new CA using the following command, replacing <Var name="teleport.example.com" />
with the address of your Teleport cluster:

```code
Expand All @@ -81,33 +81,33 @@ If your group policy prevents the desktop from seeing this PIN, the user will
remain at the login screen even though the smart card was detected.

**Solution:** Ensure that group policy allows specifying credentials during
RDP connection establishment.
RDP connection establishment.

Expand Computer Configuration, Administrative Templates, Windows Components,
Remote Desktop Services, and Remote Desktop Session Host.

Under Remote Desktop Session Host, select **Security**.

Right-click **Always prompt for password upon connection**, select **Edit**,
Right-click **Always prompt for password upon connection**, select **Edit**,
select **Disabled**, then click **OK**.

Note: despite mention of passwords in the name of this policy, no passwords are
Note: despite mention of passwords in the name of this policy, no passwords are
sent on the wire. This mechanism is used only to send the smart card PIN.

## New session "hangs"

### Host unreachable

You click **Connect** on a Windows host from the Teleport Web UI, and a new tab opens, but
nothing is displayed other than the top bar. After a while, an error is displayed about a
nothing is displayed other than the top bar. After a while, an error is displayed about a
failed connection.
In most case, this error occurs when the `windows_desktop_service` can't reach the target
In most case, this error occurs when the `windows_desktop_service` can't reach the target
Windows host.

**Solution:** Modify firewall rules to allow inbound RDP traffic

First, make sure that you open the RDP port and [allow remote desktop
connections](./active-directory-manual.mdx#allow-remote-desktop-connections)
First, make sure that you open the RDP port and [allow remote desktop
connections](./active-directory-manual.mdx#allow-remote-desktop-connections)
in the group policy object you have configured for Teleport connections.

If that does not help, check if the target host is online and try to `ping` it
Expand All @@ -131,24 +131,6 @@ Ensure that your firewalls allow inbound DNS traffic on port `53` from the
instance(s) running Teleport's Windows Desktop Service to the LDAP server
(Active Directory Domain Controller).

### RDP connection failed

You click **Connect** on a Windows host from the Teleport Web UI, a new tab opens but
nothing is displayed other than the top bar. You see an error that refers to a
failed RDP connection. You may also see errors similar to:

```text
Rdp(Io(Os { code: 54, kind: ConnectionReset, message: "Connection reset by peer" }))
```

**Solution:** Configure a certificate for RDP connections

This means that the desktop does not support secure cipher suites for TLS
connections.

Make sure that you [configure a certificate for RDP
connections](./active-directory-manual.mdx#step-47-configure-a-certificate-for-rdp-connections).

## Teleport fails to start

### Incorrect domain
Expand All @@ -171,7 +153,7 @@ field in the `ldap` section of `windows_desktop_service`.
Teleport fails to start with an error similar to:

```text
LDAP Result Code 200 "Network Error": dial tcp ad.example.com:389: i/o timeout
LDAP Result Code 200 "Network Error": dial tcp ad.example.com:636: i/o timeout
```

**Solution:** Check LDAP Address
Expand Down Expand Up @@ -286,6 +268,39 @@ Look for the "Require use of a specific security layer for remote (RDP)
connections" setting. The setting should be set to **Negotiate** or **SSL**, not
**RDP**.

### RDP connection failed

You click **Connect** on a Windows host from the Teleport Web UI, a new tab opens but
nothing is displayed other than the top bar. You see an error that refers to a
failed RDP connection. You may also see errors similar to:

```text
Rdp(Io(Os { code: 54, kind: ConnectionReset, message: "Connection reset by peer" }))
```

**Solution:** Configure a certificate for RDP connections

This means that the desktop does not support secure cipher suites for TLS
connections.

Make sure that you [configure a certificate for RDP
connections](./active-directory-manual.mdx#step-47-configure-a-certificate-for-rdp-connections).

### Expired smartcard certificate

The login screen displays an error of the form:

```
The smartcard certificate used for authentication has expired. Please contact your system administrator.
```

**Solution:** Check the system clock

Teleport's smartcard certificates are only valid for a short period of time
(roughly 5 minutes). If the system clock on the Teleport auth server and the
target Windows host disagree about the current time, the system may reject the
authentication attempt.

### Enhanced RDP security with CredSSP required

Attempts to connect to a desktop fail, and the logs show an error similar to:
Expand All @@ -301,7 +316,7 @@ Teleport currently requires that NLA is disabled in order to perform its
certificate-based passwordless login.

To disable NLA, follow the instructions to [allow remote
desktop connections](./active-directory-manual.mdx#allow-remote-desktop-connections)
desktop connections](./active-directory-manual.mdx#allow-remote-desktop-connections)
in the group policy object you have configured for Teleport connections.
If you are still encountering this error after disabling NLA in Active Directory,
run the following command from the Windows Command prompt as an administrator
Expand Down
2 changes: 1 addition & 1 deletion e
Submodule e updated from 0504a8 to cf486d
2 changes: 1 addition & 1 deletion examples/chart/teleport-cluster/Chart.yaml
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
.version: &version "13.4.20"
.version: &version "13.4.21"

name: teleport-cluster
apiVersion: v2
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
.version: &version "13.4.20"
.version: &version "13.4.21"

name: teleport-operator
apiVersion: v2
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
should add an operator side-car when operator is enabled:
1: |
image: public.ecr.aws/gravitational/teleport-operator:13.4.20
image: public.ecr.aws/gravitational/teleport-operator:13.4.21
imagePullPolicy: IfNotPresent
livenessProbe:
httpGet:
Expand Down Expand Up @@ -41,7 +41,7 @@ should add an operator side-car when operator is enabled:
- args:
- --diag-addr=0.0.0.0:3000
- --apply-on-startup=/etc/teleport/apply-on-startup.yaml
image: public.ecr.aws/gravitational/teleport-distroless:13.4.20
image: public.ecr.aws/gravitational/teleport-distroless:13.4.21
imagePullPolicy: IfNotPresent
lifecycle:
preStop:
Expand Down Expand Up @@ -174,7 +174,7 @@ should set nodeSelector when set in values:
- args:
- --diag-addr=0.0.0.0:3000
- --apply-on-startup=/etc/teleport/apply-on-startup.yaml
image: public.ecr.aws/gravitational/teleport-distroless:13.4.20
image: public.ecr.aws/gravitational/teleport-distroless:13.4.21
imagePullPolicy: IfNotPresent
lifecycle:
preStop:
Expand Down Expand Up @@ -271,7 +271,7 @@ should set resources when set in values:
- args:
- --diag-addr=0.0.0.0:3000
- --apply-on-startup=/etc/teleport/apply-on-startup.yaml
image: public.ecr.aws/gravitational/teleport-distroless:13.4.20
image: public.ecr.aws/gravitational/teleport-distroless:13.4.21
imagePullPolicy: IfNotPresent
lifecycle:
preStop:
Expand Down Expand Up @@ -357,7 +357,7 @@ should set securityContext when set in values:
- args:
- --diag-addr=0.0.0.0:3000
- --apply-on-startup=/etc/teleport/apply-on-startup.yaml
image: public.ecr.aws/gravitational/teleport-distroless:13.4.20
image: public.ecr.aws/gravitational/teleport-distroless:13.4.21
imagePullPolicy: IfNotPresent
lifecycle:
preStop:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ should provision initContainer correctly when set in values:
- wait
- no-resolve
- RELEASE-NAME-auth-v12.NAMESPACE.svc.cluster.local
image: public.ecr.aws/gravitational/teleport-distroless:13.4.20
image: public.ecr.aws/gravitational/teleport-distroless:13.4.21
name: wait-auth-update
- args:
- echo test
Expand Down Expand Up @@ -62,7 +62,7 @@ should set nodeSelector when set in values:
containers:
- args:
- --diag-addr=0.0.0.0:3000
image: public.ecr.aws/gravitational/teleport-distroless:13.4.20
image: public.ecr.aws/gravitational/teleport-distroless:13.4.21
imagePullPolicy: IfNotPresent
lifecycle:
preStop:
Expand Down Expand Up @@ -123,7 +123,7 @@ should set nodeSelector when set in values:
- wait
- no-resolve
- RELEASE-NAME-auth-v12.NAMESPACE.svc.cluster.local
image: public.ecr.aws/gravitational/teleport-distroless:13.4.20
image: public.ecr.aws/gravitational/teleport-distroless:13.4.21
name: wait-auth-update
nodeSelector:
environment: security
Expand Down Expand Up @@ -174,7 +174,7 @@ should set resources when set in values:
containers:
- args:
- --diag-addr=0.0.0.0:3000
image: public.ecr.aws/gravitational/teleport-distroless:13.4.20
image: public.ecr.aws/gravitational/teleport-distroless:13.4.21
imagePullPolicy: IfNotPresent
lifecycle:
preStop:
Expand Down Expand Up @@ -242,7 +242,7 @@ should set resources when set in values:
- wait
- no-resolve
- RELEASE-NAME-auth-v12.NAMESPACE.svc.cluster.local
image: public.ecr.aws/gravitational/teleport-distroless:13.4.20
image: public.ecr.aws/gravitational/teleport-distroless:13.4.21
name: wait-auth-update
serviceAccountName: RELEASE-NAME-proxy
terminationGracePeriodSeconds: 60
Expand Down Expand Up @@ -275,7 +275,7 @@ should set securityContext for initContainers when set in values:
containers:
- args:
- --diag-addr=0.0.0.0:3000
image: public.ecr.aws/gravitational/teleport-distroless:13.4.20
image: public.ecr.aws/gravitational/teleport-distroless:13.4.21
imagePullPolicy: IfNotPresent
lifecycle:
preStop:
Expand Down Expand Up @@ -343,7 +343,7 @@ should set securityContext for initContainers when set in values:
- wait
- no-resolve
- RELEASE-NAME-auth-v12.NAMESPACE.svc.cluster.local
image: public.ecr.aws/gravitational/teleport-distroless:13.4.20
image: public.ecr.aws/gravitational/teleport-distroless:13.4.21
name: wait-auth-update
securityContext:
allowPrivilegeEscalation: false
Expand Down Expand Up @@ -383,7 +383,7 @@ should set securityContext when set in values:
containers:
- args:
- --diag-addr=0.0.0.0:3000
image: public.ecr.aws/gravitational/teleport-distroless:13.4.20
image: public.ecr.aws/gravitational/teleport-distroless:13.4.21
imagePullPolicy: IfNotPresent
lifecycle:
preStop:
Expand Down Expand Up @@ -451,7 +451,7 @@ should set securityContext when set in values:
- wait
- no-resolve
- RELEASE-NAME-auth-v12.NAMESPACE.svc.cluster.local
image: public.ecr.aws/gravitational/teleport-distroless:13.4.20
image: public.ecr.aws/gravitational/teleport-distroless:13.4.21
name: wait-auth-update
securityContext:
allowPrivilegeEscalation: false
Expand Down
2 changes: 1 addition & 1 deletion examples/chart/teleport-kube-agent/Chart.yaml
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
.version: &version "13.4.20"
.version: &version "13.4.21"

name: teleport-kube-agent
apiVersion: v2
Expand Down
Loading

0 comments on commit f4d4404

Please sign in to comment.