Releases: warp-tech/warpgate
Releases · warp-tech/warpgate
v0.7.2
v0.7.1
Security fixes
CVE-2023-28113 [6b3b49a]
A malicious client or target could negotiate insecure Diffie-Hellman key exchange parameters in way that leads to an insecure shared secret and breaks confidentiality of traffic (for their own connection only).
Commits
v0.7.0
Changes
Minimum required glibc version on Linux is now 2.18
Fixes
v0.6.5
Changes
- f967609: Added unattended setup command (
warpgate unattended-setup
) - fixes #409 - 7066dd5: Added password recovery command (
warpgate recover-access
) - fixes #410 - Added option to forward username to SSH targets as-is #445 (Alex Donec)
- Removed the 1 second auth delay on SSH - #459 (Eugene Pankov)
- c236da5: Added support for MySQL and PostgreSQL as database storage (
database_url
config option) - fixed #452
UI improvements
- 67866fe: added visual feedback to save buttons
- fd993c4: autofocus the OTP field - fixes #386
- 5bdddd3: allow cancelling authentication
Fixes
v0.6.4
v0.6.3
v0.6.2
v0.6.1
Major updates
- Targets, roles and users are now stored in the database instead of the config file
- Your existing data will be automatically migrated into the database
- To stave off the migration, set
config_provider: file
on the top level of your config file. File based target configuration will be removed in v0.7 however.
Changes
v0.5.1
v0.5.0
Major updates
- Added SSO support (OpenID Connect) for HTTP and SSH targets (#222)
- Added support for linking HTTP targets to subdomains
- HTTP: added support for tickets (as a GET parameter or Authorization header)
Changes
- HTTP: added
X-Forwarded-*
headers - HTTP: session cookie is now set for all subdomains
- UI: added proper connection instructions for tickets
- UI: added
test-target
CLI support for HTTP and MySQL targets - SSH: added support for AES-CTR ciphers, and diffie-hellman exchanges
- Sessions will be automatically killed if you revoke access by editing the config file
- Fixed
scp
not triggering target connection