No More Backdoors: Know Who Has Access to What, Right Now
Jun 13
Register Today
Teleport logo

Teleport Blog - Teleport 2.7 Released: Improved performance, compliance settings and SCP for Web UI - Jul 27, 2018

Teleport 2.7 Released: Improved performance, compliance settings and SCP for Web UI

We are excited to announce the release of Teleport 2.7.

Before we cover the new features and improvements, let's introduce Teleport to the new readers of this blog.

What is Teleport?

Teleport gives engineers an easy SSH access for elastic compute infrastructure.

Teleport delivers hardened DevOps & SRE security best practices in a box to companies who have traditionally relied on static keys or complex DIY SSH bastion solutions.

By adopting Teleport in your organization you will:

  • Secure its infrastructure and easily pass compliance requirements.
  • Reduce the operational overhead of enforcing security best-practices.

Teleport allows low-level systems access to be controlled by who the user is within an organization, not based on which private key they have.

Teleport is open source and compatible with OpenSSH clients and servers. With OpenSSH nodes, it can still be used as a man-in-the-middle bastion (aka jump box), issuing SSH certificates and providing session recording and audit logs for legacy clusters located behind firewalls.

What's new in Teleport 2.7?

As usual, the full list of closed tickets can be found on Github. You can also glance at the CHANGELOG for a quick overview, but the two areas we have focused on for 2.7 are:

  • Performance improvements on large clusters (many thousands of servers).
  • Enhanced configurability for compliance purposes (PCI-DSS, SOC 2, GDPR, HIPAA, etc).
  • Secure copy (SCP) file transfer support within Teleport's optional web-based terminal.

As with any release, version 2.7 brings various enhancements to the user experience and makes it even easier to introduce modern privileged access patterns to systems administrators and end-users alike.

New Teleport Features

Web-based SSH secure copy (SCP) using the Teleport Proxy UI

The Teleport Web UI has proven to be immensely popular with its users. People use it as a great SSH certificate-based alternative to PuTTY or SecureCRT, others SSH on their phones / tablets via a browser.

A common request for the Web UI was to support uploading and downloading files via scp. Teleport 2.7 now supports this feature:


Compliance Enforcement of Idle SSH Connections

To satisfy various compliance requirements, like PCI-DSS, SOC2 and HIPAA, organizations must enforce certain policies around handling of idle SSH connections. In the past, Teleport relied on sensible defaults in its source code and administrators were required to recompile from source if they wanted a different behavior.

With this release, Teleport adds a couple of configuration settings you can tweak:

# snippet from /etc/teleport.yaml
    # Determines if SSH sessions to cluster nodes are forcefully terminated
    # after no activity from a client (idle client).
    # Examples: "30m", "1h" or "1h30m"
    client_idle_timeout: never

    # Determines if the clients will be forcefully disconnected when their
    # certificates expire in the middle of an active SSH session. (default is 'no')
    disconnect_expired_cert: no

Large Cluster SSH Performance Enhancements

This version also optimizes performance for those leveraging Teleport on large monolithic clusters. Some readers may question:

"Why would performance of an SSH service depend on how many nodes I have?"

The answer is that while the Teleport SSH daemon does not care about other nodes in a cluster, certain Teleport features are implemented by Auth Servers, not nodes. One example is searching for nodes by their labels. To support tens of thousands of nodes these features needed a performance boost which is delivered in version 2.7!

Upgrading Teleport

This release is meant to be a simple drop-in replacement for 2.6, but as usual, we recommend familiarizing yourself with the recommended upgrade procedure before upgrading to this version.

Teleport cybersecurity blog posts and tech news

Every other week we'll send a newsletter with the latest cybersecurity news and Teleport updates.

Talk to us!

For more information about Teleport, you can take a look at our documentation or the Teleport overview. Our source code and developer community is wide open, so feel free to dig in. Issues and/or pull requests are always welcome. Also, feel free to reach out via email if you'd like a demo or would like to connect directly with the team: [email protected].


Teleport Newsletter

Stay up-to-date with the newest Teleport releases by subscribing to our monthly updates.


Subscribe to our newsletter

PAM / Teleport