BitWarden - self hosted password manager using vaultwarden/server image

Docker BitWarden - self hosted password manager using vaultwarden/server image

Currently reading
Docker BitWarden - self hosted password manager using vaultwarden/server image

Last edited:
If you run a caching dns resolver like PiHole or Unbound, you can add a dns override for the vw domain and resolve it to your Diskstation.

I have an OPNsense HA setup with carp ip (one for ipv4, one for ipv6) with Unbound on it. My lan router announces the carp ips as dns server via dhcp to the devices in the network. Speeds up name resolution and allows overriding name resolution for arbitrary domain names.
 
Isn’t the vault cached in the browser extension or browser? Telos if you can give it a shot to rule out a browser issue, can you try chrome browser with chrome extension. Configure the extension settings the same, set to lock not log out…connect thru vpn and do what you did as on Firefox.

I’ve tried again on my end this time going thru vpn and my vault stayed logged in, but locked and all items were there. The data is cached in the browser.
 
@Gerard is of course right, the vault should be cached.

@Telos I assume you can rewrite the returned a-record for a domain lookup here:
F6q3Knw.png


Have you checked if the browser's developer tools (point somewhere into the extension popup and "inspect") network tab provides clues about what's going on? Even though the extension id obfuscates the domain on many calls, you should still see a status code that might indicate what's going on.
 
Have you checked if the browser's developer tools
I don't have access to the laptop at present, but I thought it odd that the issue only occurs with foreign VPNs, not domestic... Which, coincidentally conforms to my CF tunnel restrictions. For this reason, I less suspect the browser. But I'll check. Thanks.
 
Rusty updated BitWarden - self hosted password manager using vaultwarden/server image with a new update entry:

Securing the ADMIN_TOKEN

Previously the ADMIN_TOKEN could only be in a plain text format. You can now hash the ADMIN_TOKEN using Argon2 by generating a PHC string.

This can be generated by using a built-in hash command within Vaultwarden, or using the argon2 CLI tool.

Here are a few examples of how to start with the generation of the PHC string using the Vaultwarden 1.28.0 (or newer) version of the image.

Bash:
# Using...

Read the rest of this update entry...
 
can you try chrome browser with chrome extension
Same response. Open browser, icon initially comes up "blue" then after a few seconds, goes "gray" (logged out). This is region specific (non-domestic) on my OpenVPN app. Seems related to tunnel restrictions, but I don't understand how this is triggering logout (an unintended security "feature").
 
Same response. Open browser, icon initially comes up "blue" then after a few seconds, goes "gray" (logged out). This is region specific (non-domestic) on my OpenVPN app. Seems related to tunnel restrictions, but I don't understand how this is triggering logout (an unintended security "feature").

Ok good (but also bad) to hear same result. Yea this makes no sense.
 
I assume you can rewrite the returned a-record for a domain lookup
This doesn't seem to work since I use CF tunnel here, and there is no local RP to redirect the subdomain traffic to the proper Vaultwarden port. I suppose I need to create an RP entry which would redirect vault.domain.com to NAS_IP:VW_Port.

Is that correct? Or something else?
 
For whatever reason I assumed you use the syno rp and have a letsencrypt certificate there.

If you establish a connection from the CF tunnel to the DSM:VW_Port, and CF handles the TLS certificate,
then indeed you will need to create a rp rule for the same domain on port 443 on the syno + add a LE certificate

Also, It shouldn't be a redirect (as in rewrite the url and forward to the new url), it must be an override of the a-record response.
 
When I launch/connect outgoing VPN on my laptop, and open my browser (Firefox), the Bitwarden extension is logged out,
To bring pseudo-closure to this, I've withdrawn from CF tunnel for this application, recognizing that CF has unencrypted access to all tunnel traffic. Seems like a bad plan for use with Vaultwarden, or any "private" content. Using RP alone, and the VPN usage has no similar effect.

Overall I'm soured on CF tunnels... unless you are running a public web page or the like.
 
To bring pseudo-closure to this, I've withdrawn from CF tunnel for this application, recognizing that CF has unencrypted access to all tunnel traffic. Seems like a bad plan for use with Vaultwarden, or any "private" content. Using RP alone, and the VPN usage has no similar effect.

Overall I'm soured on CF tunnels... unless you are running a public web page or the like.

Wild that CF was the cause of this. Glad you have closure!
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Similar threads

So this means that I can copy to its directory from another DiskStation directory and share (using File...
Replies
3
Views
617
I'll delete everything I can containers/images/etc, and start fresh over the weekend. While I really like...
Replies
48
Views
4,326
From looking in a terminal session on the running FreshRSS container... [email protected]:/# more /etc/hosts...
Replies
58
Views
6,996
I ran across a very complete how-to-install-nextcloud on Docker using the Synology UI (just the UI, not...
Replies
28
Views
6,776
Hello, i just tried to follow these steps above, but all I get is a psql: could not connect to server...
Replies
43
Views
9,082
I discovered if you use fireflyiii/core:latest everything works just fine
Replies
35
Views
14,411

Welcome to SynoForum.com!

SynoForum.com is an unofficial Synology forum for NAS owners and enthusiasts.

Registration is free, easy and fast!

Back
Top