Releases: gravitational/teleport
Teleport v1.3 Relase
This release includes several major new features and it's recommended for production use.
New Features:
- Support for hardware U2F keys for 2nd factor authentication.
- CLI client profiles:
tsh
can now remember its--proxy
setting. tctl auth sign
command to allow administrators to generate user session keys- Web UI is now served directly from the executable (no more need for web assets in
/usr/local/share/teleport
)
Bug Fixes:
Teleport 1.2 Release
This is a maintenance release and it's a drop-in replacement for previous versions.
Changes:
- Usability bugfixes as can be seen here
- Updated documentation
- Added
examples
directory with sample configuration and systemd unit file.
Teleport 1.1.0 Release
This release is a drop-in upgrade of previous versions.
Changes
- User experience improvements: nicer error messages
- Better compatibility with
ssh
command:-t
flag can be used to force allocation of TTY - Bugfixes
Teleport 1.0.5 Release
This release was recommended for production with one reservation: time-limited certificates did not work correctly in this release due to this bug
Changes
- Improvements in performance and usability of the Web UI
- Smaller binary sizes thanks to Golang v1.7
- Bugfixes: https://github.com/gravitational/teleport/milestone/6?closed=1
Teleport 1.0.4 Release
Warning
Teleport security has been improved since this release. It is highly recommended to upgrade to the latest production-recommended version.
Intro
This release only includes the addition of the ability to specify non-standard HTTPS port for Teleport proxy for tsh --proxy
flag.
Teleport 1.0.3 Release
Warning
Teleport security has been improved since this release. It is highly recommended to upgrade to the latest production-recommended version.
Intro
Teleport has been quite stable since 1.0.0 release. This release only includes one major bugfix #486 plus minor changes not exposed to OSS Teleport users.
Changelist
- Fixed the regression of automatic configuration of
host ip
#486 - Improvements related to Gravitational's internal usage of Teleport
Teleport 1.0 Release
The first official release of Teleport!
The biggest reason that was preventing us from placing "Production ready v1.0" label on Teleport has been our desire to have it professionally audited and tested by security professionals. We have completed the audit and happy to report that Teleport now earns our approval for production use.
Warning
Teleport security has been improved since this release. It is highly recommended to upgrade to the latest production-recommended version.
New Features:
- Support for
logging out
which clears temporary session keys - Support for connecting Teleport clusters together: see "Trusted Clusters" section in the documentation.
- Account lock after N unsuccessful attempts
Other Changes:
- Simplified build system: default source tarballs from Github are trivial to build.
- Lots of minor bugfixes
- Friendlier error messages
Compatibility with Beta Versions
Teleport YAML configuration format has changed slightly. Also, the format of key and session storage has evolved as well. We recommend beta users to wipe out /var/lib/teleport
directory on servers and ~/.tsh
directory on client machines.
Moving forward we are committed to backwards compatibility with configuration files and on-disk data.
NetAddr YAML marshaling and session env vars
Since the previous release:
- NetAddr can be successfully marshaled to / unmarshaled from YAML.
- Can set environment variables when opening a session.
Bring back AuthIdentityEvent
Merge pull request #448 from gravitational/sasha/identity recover back AuthIdentityEvent
Skip reading local agent keys if SkipLocalAuth=true
Merge pull request #446 from gravitational/ev/445 No need to read local agent keys if SkipLocalAuth=true