Skip to content

Releases: ovh/the-bastion

v3.18.00

10 Dec 13:22
Compare
Choose a tag to compare

⚡ Security

  • No security fixes since previous release
  • Oldest release with no known security issue is v3.14.15 (2023-11-08)

💡 Highlights

A new restricted command has been added: assetForgetHostKey, which is the bastion-wide version of the selfForgetHostKey command. In other words, it removes a given asset's hostkey from all the bastion accounts' personal known_hosts file. This is particularely useful when a given asset is reinstalled or its IP is being reallocated, and you've left the bastion-wide default of StrictHostKeyChecking to 'ask': in that case, if this command is not used after the asset hostkeys have changed, each account will have to use selfForgetHostKey on their own, to tell the bastion that the previously known hostkey should be forgotten.

This new command makes it possible to sync the reinstallation of an asset with a bastion-wide reset of its hostkeys (e.g. using an automation account that will be granted the use of the assetForgetHostKey command), without requiring all the other accounts to do it on their own. On their next connection, the other accounts will just have to accept the new hostkey (if StrictHostKeyChecking is set to ask, which is the default), or the new hostkey will be auto-accepted in the absence of a known one (if StrictHostKeyChecking is set to accept-new).

A long-standing but has also been fixed with stalling downloads using scp (#486).

The list of changes can be found below, for an exhaustive (and boring) list, please refer to the commit log.

📌 Changes

  • feat: add assetForgetHostKey
  • fix: scp: downloads would sometimes stall (fix #486)

⏩ Upgrading

v3.17.01

23 Oct 12:15
Compare
Choose a tag to compare

⚡ Security

  • No security fixes since previous release
  • Oldest release with no known security issue is v3.14.15 (2023-11-08)

💡 Highlights

No specific highlight, as this release addresses a few issues and minor enhancements.

A more complete list of changes can be found below, for an exhaustive (and boring) list, please refer to the commit log.

📌 Changes

  • enh: interactive: handle CTRL+C nicely (fix #497)
  • fix: osh.pl: remove a warning on interactive mode timeout
  • fix: allow ssh-as in connect.pl
  • chore: fix bad scpup/scpupload scp/scpdownload references in help and doc (thanks @TomRicci!)

⏩ Upgrading

v3.17.00

14 Oct 15:01
Compare
Choose a tag to compare

⚡ Security

  • No security fixes since previous release
  • Oldest release with no known security issue is v3.14.15 (2023-11-08)

💡 Highlights

This releases updates the supported OS list as follows:

  • drop support for Ubuntu 16.04 and CentOS 7
  • add support for Ubuntu 24.04 LTS and OpenSUSE Leap 15.6

Appart from the supported OS list, this release has a lot of changes, the most important ones are summarized below.

Add support of rsync (#301). Now, for specific protocols (such as scp, sftp and rsync), instead of having a dedicated option for all the plugins, they share a new --protocol option, which will permit adding more protocols if needed, without requiring adding new named options. The previous options are still supported and will keep working, even if the documentation has been updated to only reference --protocol.

Add support of wildcards (also called "shell-style globbing characters"), namely ? and *,
when using the --user option for plugins such as groupAddServer, groupDelServer, groupAddGuestAccess,
groupDelGuestAccess, accountAddPersonalAccess, accountDelPersonalAccess, selfAddPersonalAccess,
selfDelPersonalAccess. This implements #461.

Add a new per-account option: egress session multiplexing (usage of the ControlPath and ControlMaster ssh client options), for accounts opening a large number of connections to the same hosts, such as is the case with e.g. Ansible usage. You'll find it in the accountModify documentation.

Worth noting is also a new plugin: groupSetServers, to permit setting the ACL (asset list) of a group in one shot, to attain a given wanted list, instead of having to rely in several groupAddServer and groupDelServer calls.

We also enable the [email protected] KEX algorithm by default on shipped versions
of sshd_config and ssh_config, read the specific upgrades instructions linked below if you're interested and this is not a new installation.

A more complete list of changes can be found below, for an exhaustive (and boring) list, please refer to the commit log.

📌 Changes

  • feat: support wildcards in --user (fix #461)
  • feat: add rsync support through the --protocol rsync option in all plugins
  • feat: add --egress-session-multiplexing option to accountModify
  • feat: add groupSetServers to entirely change a group ACL in one shot
  • feat: accountFreeze: terminate running sessions if any
  • enh: add lock for group ACL change to avoid race conditions on busy bastions
  • enh: selfPlaySession: remove sqliteLog.ttyrecfile dependency
  • enh: autologin: set term to raw noecho when --no-tty is used
  • chg: add Ubuntu 24.04 LTS
  • chg: bump OpenSUSE Leap from 15.5 to 15.6
  • chg: Debian12, Ubuntu20+: enable sntrup KEX by default
  • chg: remove support for EOL CentOS 7
  • fix: stealth_stdout/stderr was ignored for plugins (fix #482)
  • fix: ignore transient errors during global destruction
  • fix: install under FreeBSD 13.2

⏩ Upgrading

v3.16.99-rc3

25 Sep 10:34
Compare
Choose a tag to compare
v3.16.99-rc3 Pre-release
Pre-release

⚡ Security

  • No security fixes since previous release
  • Oldest release with no known security issue is v3.14.15 (2023-11-08)

💡 Highlights

Please read the rc2 changes that are also included in this pre-release.

This release, the rc3, expected to be the last release candidate, fixes a regression introduced in the rc1.

A more complete list of changes can be found below, for an exhaustive (and boring) list, please refer to the commit log.

📌 Changes

  • fix: regression introduced by 932e72e for stealth stdout in ssh

⏩ Upgrading

v3.16.99-rc2

17 Sep 13:07
Compare
Choose a tag to compare
v3.16.99-rc2 Pre-release
Pre-release

⚡ Security

  • No security fixes since previous release
  • Oldest release with no known security issue is v3.14.15 (2023-11-08)

💡 Highlights

Please read the rc1 changes that are also included in this pre-release.

The rc2 add support of rsync (#301). Now, for specific protocols (such as scp, sftp and rsync), instead of having a dedicated option for all the plugins, they share a new --protocol option, which will permit adding more protocols if needed, without requiring adding new named options. The previous options are still supported and will keep working, even if the documentation has been updated to only reference --protocol.

We also add a new per-account option: egress session multiplexing (usage of the ControlPath and ControlMaster ssh client options), for accounts opening a large number of connections to the same hosts, such as is the case with e.g. Ansible usage. You'll find it in the accountModify documentation.

Worth noting is also a new plugin: groupSetServers, to permit setting the ACL (asset list) of a group in one shot, to attain a given wanted list, instead of having to rely in several groupAddServer and groupDelServer calls.

A more complete list of changes can be found below, for an exhaustive (and boring) list, please refer to the commit log.

📌 Changes

  • feat: add rsync support through the --protocol rsync option in all plugins
  • feat: add --egress-session-multiplexing option to accountModify
  • feat: add groupSetServers to entirely change a group ACL in one shot
  • enh: add lock for group ACL change to avoid race conditions on busy bastions
  • enh: selfPlaySession: remove sqliteLog.ttyrecfile dependency
  • chore: FreeBSD: ignore OS version mismatch with packages
  • chore: selfMFASetupPassword: clearer message

⏩ Upgrading

v3.16.99-rc1

04 Jul 11:36
Compare
Choose a tag to compare
v3.16.99-rc1 Pre-release
Pre-release

⚡ Security

  • No security fixes since previous release
  • Oldest release with no known security issue is v3.14.15 (2023-11-08)

💡 Highlights

This is a pre-release, so that the #461 change can be thoroughly tested before being promoted to a release.

This releases updates the supported OS list as follows:

  • drop support for Ubuntu 16.04 and CentOS 7
  • add support for Ubuntu 24.04 LTS and OpenSUSE Leap 15.6

This release adds support of wildcards (also called "shell-style globbing characters"), namely ? and *,
when using the --user option for plugins such as groupAddServer, groupDelServer, groupAddGuestAccess,
groupDelGuestAccess, accountAddPersonalAccess, accountDelPersonalAccess, selfAddPersonalAccess,
selfDelPersonalAccess. This implements #461.

We also enable the [email protected] KEX algorithm by default on shipped versions
of sshd_config and ssh_config, read the specific upgrades instructions linked below if you're interested and this is not a new installation.

A more complete list of changes can be found below, for an exhaustive (and boring) list, please refer to the commit log.

📌 Changes

  • feat: accountFreeze: terminate running sessions if any
  • feat: support wildcards in --user (fix #461)
  • enh: autologin: set term to raw noecho when --no-tty is used
  • fix: stealth_stdout/stderr was ignored for plugins (fix #482)
  • fix: ignore transient errors during global destruction
  • fix: install under FreeBSD 13.2
  • fix: selfGenerateProxyPassword: help message was incorrect
  • chg: add Ubuntu 24.04 LTS
  • chg: bump OpenSUSE Leap from 15.5 to 15.6
  • chg: Debian12, Ubuntu20+: enable sntrup KEX by default
  • chg: remove support for EOL CentOS 7
  • chore: adapt help messages for wildcard --user support
  • chore: install-ttyrec: bump latest known version fallback

⏩ Upgrading

v3.16.01

27 Jun 15:01
Compare
Choose a tag to compare

⚡ Security

  • No security fixes since previous release
  • Oldest release with no known security issue is v3.14.15 (2023-11-08)

💡 Highlights

This release only has minor changes. It has been tagged back in April but the formal GitHub Release was missing!

A more complete list of changes can be found below, for an exhaustive (and boring) list, please refer to the commit log.

📌 Changes

  • enh: info plugin: removed uname dependency, added configuration
  • chg: bastion-sync-helper.sh: use sh instead of bash
  • fix: alive plugin: don't mask signals

⏩ Upgrading

v3.16.00

10 Apr 12:16
Compare
Choose a tag to compare

⚡ Security

  • No security fixes since previous release
  • Oldest release with no known security issue is v3.14.15 (2023-11-08)

💡 Highlights

The main noteworthy change in this release is the support for so-called Secure Keys 🔑 (FIDO2) for ingress connection. If you're upgrading from a previous version, you'll have to enable support in the configuration file, refer to the specific upgrade instructions below. This is enabled on new installations by default.

How to generate and use a Secure Key from your hardware token to secure SSH access is usually detailed in the documentation of your hardware key vendor (For example Yubico).

A more complete list of changes can be found below, for an exhaustive (and boring) list, please refer to the commit log.

📌 Changes

  • feat: support hardware-based Secure Keys (FIDO2) for ingress authentication
  • enh: remove netcat dependency by using perl bultins
  • enh: --wait now checks whether the TCP port is open instead of just pinging the host
  • fix: logic error in etc/pam.d/sshd.rhel breaking MFA handling if enabled

⏩ Upgrading

v3.15.00

26 Mar 16:00
Compare
Choose a tag to compare

⚡ Security

  • No security fixes since previous release
  • Oldest release with no known security issue is v3.14.15 (2023-11-08)

💡 Highlights

This release introduces two notable changes, apart from the usual fixes and enhancements:
A new global configuration option, dnsSupportLevel for systems with non-working DNS (fixes #397).
Support of the @ character when referencing the name of a remote account in a personal or group-based access (fixes #437).

A more complete list of changes can be found below, for an exhaustive (and boring) list, please refer to the commit log.

📌 Changes

  • feat: add dnsSupportLevel for systems with broken DNS (fixes #397)
  • enh: allow @ as a valid remote user char
  • fix: connect.pl: don't look for error messages when sysret==0
  • fix: avoid a warn() when an non-resolvable host is specified with scp or sftp

⏩ Upgrading

v3.14.16

21 Feb 14:38
Compare
Choose a tag to compare

⚡ Security

  • No security fixes since previous release
  • Oldest release with no known security issue is v3.14.15 (2023-11-08)

💡 Highlights

This release introduces a new global configuration option, ttyrecStealthStdoutPattern, to handle corner-cases where recording stdout of some specific commands would take up gigabytes. If you use rsync through the bastion, and noticed that some ttyrec files take up a gigantic amount of space, this might help salvaging your hard-drives!

Another noteworthy change is for users using pre-v3.14.15 scp or sftp helpers: this release introduces a compatibility logic to avoid requiring them to upgrade their helpers when JIT MFA is not required for their use case. Of course, when JIT MFA is required by policy, the connection will still fail and the only way to go through is to use the new wrappers that can support properly asking MFA to the users.

Otherwise, this release is mainly a bugfix / tiny enhancements release.

A more complete list of changes can be found below, for an exhaustive (and boring) list, please refer to the commit log.

📌 Changes

  • feat: add ttyrecStealthStdoutPattern config
  • enh: osh-lingering-sessions-reaper.sh: handle dangling plugins
  • enh: osh-orphaned-homedir.sh: also cleanup /run/faillock
  • enh: plugins: better signal handling to avoid dangling children processes
  • fix: scp/sftp: when using pre-v3.14.15 helpers, the JIT MFA logic now behaves as before, so that these old helpers still work when JIT MFA is not needed
  • fix: accountInfo: return always_active=1 for globally-always-active accounts
  • fix: ping: don't exit with fping when host is unreachable
  • fix: osh-sync-watcher: default to a valid rshcmd (fixes #433)
  • fix: install: generation of the MFA secret under FreeBSD

⏩ Upgrading