goteleport.com
Open in
urlscan Pro
2606:4700::6812:717
Public Scan
Submitted URL: https://em.goteleport.com/ODE5LVdIVC00ODMAAAGOn4zqOqbGSCsABQ58dcuJMZ3ZubKg_6cBFLWLfEPxO9SDUk52Qpjczjys9dbHu-TmezN2OxM=
Effective URL: https://goteleport.com/security/?mkt_tok=ODE5LVdIVC00ODMAAAGOn4zqOupe1oKbvPB9Pl5KxOfep5AKrkPeO7mlno8B6-VF2DfV3AEZAluDFS...
Submission: On October 06 via api from IL — Scanned from DE
Effective URL: https://goteleport.com/security/?mkt_tok=ODE5LVdIVC00ODMAAAGOn4zqOupe1oKbvPB9Pl5KxOfep5AKrkPeO7mlno8B6-VF2DfV3AEZAluDFS...
Submission: On October 06 via api from IL — Scanned from DE
Form analysis
2 forms found in the DOM<form id="mktoForm_1027" class="sc-12c5e681-0 bKDcNo mktoForm mktoHasWidth mktoLayoutLeft" __bizdiag="196351654" __biza="W___" novalidate="novalidate" data-styles-ready="true">
<style type="text/css"></style>
<div class="mktoFormRow">
<div class="mktoFieldDescriptor mktoFormCol">
<div class="mktoOffset"></div>
<div class="mktoFieldWrap mktoRequiredField"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth">
<div class="mktoAsterix">*</div>Email:
</label>
<div class="mktoGutter mktoHasWidth"></div><input id="Email" name="Email" placeholder="Email Address" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email" class="mktoField mktoEmailField mktoHasWidth mktoRequired"
aria-required="true"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="UTM_Campaign__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="UTM_Content__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="UTM_Medium__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="UTM_Source__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="UTM_Term__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="gaid__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="gclid__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="">
<div class="mktoClear"></div>
</div>
<div class="mktoButtonRow"><span class="mktoButtonWrap mktoNative"><button type="submit" class="mktoButton">Subscribe</button></span></div><input type="hidden" name="formid" class="mktoField mktoFieldDescriptor" value="1027"><input type="hidden"
name="munchkinId" class="mktoField mktoFieldDescriptor" value="819-WHT-483">
</form>
<form class="sc-12c5e681-0 bKDcNo mktoForm mktoHasWidth mktoLayoutLeft" __bizdiag="-1238560135" __biza="W___" novalidate="novalidate"
style="font-family: inherit; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;"></form>
Text Content
Teleport Connect 2023 Oct 25 San Francisco, CA Register Platform PLATFORM Why TeleportHow It Works ACCESS CONTROL SSHKubernetesDatabasesInternal WebappsWindowsAWS Console Our Features AssistSingle Sign OnJust In Time Access RequestsRole Based Access ControlAudit and Session RecordingsDevice TrustPasswordless Solutions BY USE CASE Privileged Access ManagementMachine-to-Machine AccessDeveloper-friendly browserPasswordless Infrastructure Access BY INDUSTRY E-commerce & EntertainmentFinancial ServicesSoftware-as-a-service (SaaS) Providers BY CLOUD PROVIDER Infrastructure Access for AWS BY COMPLIANCE STANDARD FedRAMPHIPAASOC 2 Resources TRY TELEPORT Teleport LabsTeleport TeamIntegrations Community Our CustomersGitHubTeleport Connect 2023 Resources BlogEventsWebinarsPodcastsTech PapersLearn SUPPORT Support PortalCommunity SlackGitHub DiscussionsSystem Status Featured Resource Documentation DocumentationTeleport ClientsHow It WorksTeleport LabsTeleport CommunityTeleport Slack ChannelGitHub Pricing Community Getting Started with OSSDownloadsCommunity SlackGitHubGitHub DiscussionsPodcasts Sign In Get StartedContact Sales Teleport Access Platform SECURITY AT TELEPORT Teleport is dedicated to trusted, contemporary security. We're thankful for the high level of trust our customers place in Teleport when they choose to secure their critical infrastructure using our products. SECURITY TEAM TELEPORT MAINTAINS A CROSS-FUNCTIONAL SECURITY TEAM DEDICATED TO: * Teleport code, dependency, and supply chain vulnerability detection and response * Teleport Cloud Security * Corporate IT Security REPORTING A VULNERABILITY If you have any questions, please contact us. We are deeply grateful to researchers and our community who report issues so that we can coordinate a fix and responsible disclosure. Report Vulnerability SECURITY COMMITMENTS We make the following security commitments: * PROACTIVE DETECTION We contract and publish third-party security audits of our products and platform annually. Our previous reports are available on our Trust page. Furthermore, Teleport conducts regular security vulnerability scanning of our code and infrastructure using tools like Dependabot and Trivy. * DISCLOSURE We notify customers of critical vulnerabilities that affect the security of their systems. Prior vulnerability disclosures are found in our Teleport Release Notes. * RESPONSE All security issues are rapidly triaged by our security team. Critical and high severity security findings trigger a formal incident response. * PRIVACY As part of our security stance, we protect our customers’ and partners’ privacy. Find our privacy policy at https://goteleport.com/legal/privacy. * COMPLIANCE We maintain SOC 2 Type II, ISO 27001, and HIPAA Security Rule compliance for our cloud and self-hosted products, which can be provided under NDA. Additionally, we further commit to our Security Addendum, which covers policy, security, confidentiality, access controls, management, incident response, and more to detail how we protect customer data. PUBLIC CERTIFICATES & ENCRYPTION KEYS We use the following certificates and public keys to sign our software. Many of these keys and certificates use our legal business name “Gravitational Inc.” and our former domain “gravitational.com”. Don’t worry – Gravitational is Teleport. RPM & Debian Signing Keys We sign our RPM and Debian repositories with the following PGP key: * ID 6282C411 * Fingerprint 0C5E 8BA5 658E 320D 1B03 1179 C87E D53A 6282 C411 The key is available for download at: * https://deb.releases.teleport.dev/teleport-pubkey.asc * https://rpm.releases.teleport.dev/RPM-GPG-KEY-teleport See the following pages for information on using this key to verify downloaded packages: * https://deb.releases.teleport.dev/ * https://rpm.releases.teleport.dev/ Apple Signing Certificates Our Apple packages and binaries are code signed by "Developer ID QH8AA5B8UP Gravitational Inc." with the following certificate: * SHA256 Fingerprint 78 2F E1 18 5F A1 AD 68 AD 25 0B A9 4D 21 DC BB 0D 8E 47 C6 E4 1D FE FB AB 05 41 33 4C 33 1D 43 * SHA1 Fingerprint 82 B6 25 AD 32 7C 24 1B 37 8A 54 B4 B2 54 BB 08 CE 71 B5 DF Packages published prior to September 14, 2021 are signed with an older certificate for the same Developer ID (QH8AA5B8UP): * SHA256 Fingerprint 78 05 14 69 20 59 21 D1 EE 96 42 01 5A 28 35 FB E1 D4 38 5E 2A 23 5D 62 73 A4 D1 27 8A 33 BA 34 * SHA1 Fingerprint D2 70 EA 0C F2 0E CB 17 28 B2 21 E1 D5 B6 7C FE 50 FF AB 62 Verify the Developer ID and fingerprint match on package downloads with the pkgutil tool: $ pkgutil --check-signature teleport-7.1.2.pkg Package "teleport-7.1.2.pkg": Status: signed by a developer certificate issued by Apple for distribution Signed with a trusted timestamp on: 2021-09-15 00:49:03 +0000 Certificate Chain: 1. Developer ID Installer: Gravitational Inc. (QH8AA5B8UP) Expires: 2026-07-27 18:27:29 +0000 SHA256 Fingerprint: 78 2F E1 18 5F A1 AD 68 AD 25 0B A9 4D 21 DC BB 0D 8E 47 C6 E4 1D FE FB AB 05 41 33 4C 33 1D 43 ------------------------------------------------------------------------ 2. Developer ID Certification Authority Expires: 2027-02-01 22:12:15 +0000 SHA256 Fingerprint: 7A FC 9D 01 A6 2F 03 A2 DE 96 37 93 6D 4A FE 68 09 0D 2D E1 8D 03 F2 9C 88 CF B0 B1 BA 63 58 7F ------------------------------------------------------------------------ 3. Apple Root CA Expires: 2035-02-09 21:40:36 +0000 SHA256 Fingerprint: B0 B1 73 0E CB C7 FF 45 05 14 2C 49 F1 29 5E 6E DA 6B CA ED 7E 2C 68 C5 BE 91 B5 A1 10 01 F0 24 The codesign tool can be used to perform the verification on individual binaries: $ codesign --verify -d --verbose=2 /usr/local/bin/tsh ... Authority=Developer ID Application: Gravitational Inc. (QH8AA5B8UP) Authority=Developer ID Certification Authority Authority=Apple Root CA Timestamp=Jul 30, 2021 at 1:44:06 PM Info.plist=not bound TeamIdentifier=QH8AA5B8UP ... The Teleport package in Homebrew is not maintained or signed by Teleport. We recommend the use of our Teleport packages. Windows Signing Certificates Our Windows binaries are signed with the following certificate: * Issued to Gravitational Inc. * Thumbprint F2FBE7B8228122EB74DE2DC093DB81F8E6896253 Verify the binary using the following PowerShell command: Get-AuthenticodeSignature -FilePath .\tsh.exe Directory: C:\Users\ExampleUser SignerCertificate Status Path ----------------- ------ ---- F2FBE7B8228122EB74DE2DC093DB81F8E6896253 Valid tsh.exe Ensure that the SignerCertificate matches the thumbprint shown above, and that the Status field is Valid. To further inspect the certificate, run the following PowerShell command: (Get-AuthenticodeSignature -FilePath.\tsh.exe).SignerCertificate | Format-List Subject : CN=Gravitational Inc., O=Gravitational Inc., L=Oakland, S=California, C=US Issuer : CN=DigiCert SHA2 Assured ID Code Signing CA, OU=www.digicert.com, O=DigiCert Inc, C=US Thumbprint : F2FBE7B8228122EB74DE2DC093DB81F8E6896253 FriendlyName : NotBefore : 11/8/2020 5:00:00 PM NotAfter : 11/14/2023 4:59:59 PM Extensions : {System.Security.Cryptography.Oid, System.Security.Cryptography.Oid, System.Security.Cryptography.Oid, System.Security.Cryptography.Oid...} Alternatively, Windows binaries may be inspected graphically via the Windows Explorer with the following steps: 1. Right click on the binary in question, for example tsh.exe. 2. Select “Properties”. 3. On the resulting “tsh.exe Properties” dialog, select the “Digital Signatures” tab. 4. Select the “Gravitational Inc.” signer from the list. 5. Select the “Details” button. 6. On the resulting “Digital Signature Details” dialog, ensure that the header states “This digital signature is OK.” 7. Select the “View Certificate” button. 8. On the resulting “Certificate” dialog, select the “Details” tab. 9. Select the “Thumbprint” item from the list, and compare its value to the thumbprint listed above. OCI Container Images All of our distroless OCI container images are signed with cosign. Signatures can be validated against the Teleport OCI image signing key. $ cosign verify --key teleport-oci-key-2023-05.pub public.ecr.aws/gravitational/teleport-distroless-debug:12.3.3 Verification for public.ecr.aws/gravitational/teleport-distroless-debug:12.3.3 -- The following checks were performed on each of these signatures: - The cosign claims were validated - The signatures were verified against the specified public key [{"critical":{"identity":{"docker-reference":"public.ecr.aws/gravitational/teleport-distroless-debug"},"image":{"docker-manifest-digest":"sha256:450fa0f11bbd692ce8236adbc73ed4d32c464cab799bfb32de75e0769f51181a"},"type":"cosign container image signature"},"optional":null}] Note that for cosign versions >= 2.0 you may need to use the new --insecure-ignore-tlog option for some images. These images were signed with an older version of cosign. TRY TELEPORT TODAY In the cloud, self-hosted, or open source Get StartedView developer docs Get the latest product updates and engineering blog posts * Email: Subscribe * PROTOCOLS * Teleport Overview * SSH * Kubernetes * Databases * Applications * Windows * Teleport Features * Teleport Pricing * DOCUMENTATION * Teleport Documentation * Download Teleport * How Teleport works * GitHub repository * LEARN * Why Teleport? * Teleport Learn * Blog * Customers * Resources * Events * What is SSH? * What is a Kubernetes cluster? * COMPANY * About us * Security * Careers * News * Partners * Status * GET IN TOUCH * (855) 818 9008 * General inquiries * Customer support * CONNECT * Teleport Community * Slack * GitHub * Twitter * LinkedIn * YouTube © 2023 Gravitational Inc.; all rights reserved. * Terms of Service * Website Terms of Use * Privacy * Job Applicant Privacy Policy