[GH-ISSUE #722] TLS connection problems #467

Closed
opened 2026-02-27 15:50:28 +03:00 by kerem · 43 comments
Owner

Originally created by @mystyq on GitHub (Oct 28, 2018).
Original GitHub issue: https://github.com/quasar/Quasar/issues/722

In release mode, the client does not authorize with the server and will cause the server to stop listening upon connection.

Is this something that is currently still being implemented, or am I possibly not setting it up correctly?

Originally created by @mystyq on GitHub (Oct 28, 2018). Original GitHub issue: https://github.com/quasar/Quasar/issues/722 In release mode, the client does not authorize with the server and will cause the server to stop listening upon connection. Is this something that is currently still being implemented, or am I possibly not setting it up correctly?
kerem 2026-02-27 15:50:28 +03:00
  • closed this issue
  • added the
    bug
    label
Author
Owner

@MaxXor commented on GitHub (Oct 28, 2018):

First compile client & server in release configuration. Then create a client from the included builder in the server. This way it should work I've tested it on my machine.

<!-- gh-comment-id:433724939 --> @MaxXor commented on GitHub (Oct 28, 2018): First compile client & server in release configuration. Then create a client from the included builder in the server. This way it should work I've tested it on my machine.
Author
Owner

@mystyq commented on GitHub (Oct 28, 2018):

This is how I've done it as well. I've also tried running the server in debug mode and client in release (compiled). When I do this I get an AuthorizationException and both the certs are null

<!-- gh-comment-id:433725667 --> @mystyq commented on GitHub (Oct 28, 2018): This is how I've done it as well. I've also tried running the server in debug mode and client in release (compiled). When I do this I get an AuthorizationException and both the certs are null
Author
Owner

@MaxXor commented on GitHub (Oct 28, 2018):

Mixing up client and release mode is not supported. Hm, I'll check it again but I'm sure it was working before. :D

<!-- gh-comment-id:433729320 --> @MaxXor commented on GitHub (Oct 28, 2018): Mixing up client and release mode is not supported. Hm, I'll check it again but I'm sure it was working before. :D
Author
Owner

@MaxXor commented on GitHub (Oct 28, 2018):

Works fine on Windows 10. Do you use other OS?

<!-- gh-comment-id:433731763 --> @MaxXor commented on GitHub (Oct 28, 2018): Works fine on Windows 10. Do you use other OS?
Author
Owner

@mystyq commented on GitHub (Oct 28, 2018):

I'm testing on W7 Virtual machine at the moment. For some reason the server is not stopping from listening now but the client is not connecting. I'm not sure what changed but I'll keep messing with it to see if I can get it working.

<!-- gh-comment-id:433731876 --> @mystyq commented on GitHub (Oct 28, 2018): I'm testing on W7 Virtual machine at the moment. For some reason the server is not stopping from listening now but the client is not connecting. I'm not sure what changed but I'll keep messing with it to see if I can get it working.
Author
Owner

@MaxXor commented on GitHub (Oct 28, 2018):

You can still debug the release builds when enabling PDB-creation. Then just attach the VS debugger to the process and you should see the exceptions.

<!-- gh-comment-id:433732785 --> @MaxXor commented on GitHub (Oct 28, 2018): You can still debug the release builds when [enabling PDB-creation](https://stackoverflow.com/questions/4152432/is-there-any-possibility-to-include-pdb-file-into-release-build-to-see-error-l). Then just attach the VS debugger to the process and you should see the exceptions.
Author
Owner

@mystyq commented on GitHub (Oct 29, 2018):

Thanks for that information.

I was able to get Quasar to work on my host machine. The VM is not connecting. (Both NAT and bridged modes)

<!-- gh-comment-id:434048356 --> @mystyq commented on GitHub (Oct 29, 2018): Thanks for that information. I was able to get Quasar to work on my host machine. The VM is not connecting. (Both NAT and bridged modes)
Author
Owner

@MaxXor commented on GitHub (Oct 29, 2018):

Can you open the TCP connection with netcat? If that doesn't work, it's a firewall/routing problem.

<!-- gh-comment-id:434051140 --> @MaxXor commented on GitHub (Oct 29, 2018): Can you open the TCP connection with netcat? If that doesn't work, it's a firewall/routing problem.
Author
Owner

@mystyq commented on GitHub (Oct 29, 2018):

image

Getting a connection refused. I've turned the firewall off on the VM as well... No idea lol

<!-- gh-comment-id:434080948 --> @mystyq commented on GitHub (Oct 29, 2018): ![image](https://user-images.githubusercontent.com/26229904/47680462-dd586280-db94-11e8-883f-1d3ccdeffe66.png) Getting a connection refused. I've turned the firewall off on the VM as well... No idea lol
Author
Owner

@MaxXor commented on GitHub (Oct 29, 2018):

Then it's not a Quasar issue, this seems to be solved. Could you maybe explain what caused the certificate issues?

<!-- gh-comment-id:434087527 --> @MaxXor commented on GitHub (Oct 29, 2018): Then it's not a Quasar issue, this seems to be solved. Could you maybe explain what caused the certificate issues?
Author
Owner

@mystyq commented on GitHub (Oct 30, 2018):

I will look into it, if I find anything I'll make it known

<!-- gh-comment-id:434450390 --> @mystyq commented on GitHub (Oct 30, 2018): I will look into it, if I find anything I'll make it known
Author
Owner

@mystyq commented on GitHub (Oct 30, 2018):

I haven't found the reason this is happening, however just to make a note - I tried using netcat again and was able to open the connection using the same command as above. The listen server stopped automatically when trying to send some data to the socket.

<!-- gh-comment-id:434492691 --> @mystyq commented on GitHub (Oct 30, 2018): I haven't found the reason this is happening, however just to make a note - I tried using netcat again and was able to open the connection using the same command as above. The listen server stopped automatically when trying to send some data to the socket.
Author
Owner

@MaxXor commented on GitHub (Oct 31, 2018):

Yes, it's not meant to receive some random data. Well, that's fixed now. Can you tell me if the client connection is now working to your VM?

-> ed1bf59155 & e24b024554

<!-- gh-comment-id:434609376 --> @MaxXor commented on GitHub (Oct 31, 2018): Yes, it's not meant to receive some random data. Well, that's fixed now. Can you tell me if the client connection is now working to your VM? -> ed1bf5915539b10de0a1b190099a1daa26503164 & e24b0245549161a64a8c2fd2126b7b3210f9756d
Author
Owner

@mystyq commented on GitHub (Oct 31, 2018):

I can confirm that these changes fixed the problem with the listen server. It is no longer stopping after an unauthorized client tries to communicate. The client is not connecting to the server however. I've tried running the client on my host machine, connecting to a WAN address and running the server on the VMs (as well as loopback/DHCP addresses). I've tried using both VMware Workstation and Virtualbox with no luck. Both operating systems on the VMs are Windows 7.

<!-- gh-comment-id:434856554 --> @mystyq commented on GitHub (Oct 31, 2018): I can confirm that these changes fixed the problem with the listen server. It is no longer stopping after an unauthorized client tries to communicate. The client is not connecting to the server however. I've tried running the client on my host machine, connecting to a WAN address and running the server on the VMs (as well as loopback/DHCP addresses). I've tried using both VMware Workstation and Virtualbox with no luck. Both operating systems on the VMs are Windows 7.
Author
Owner

@MaxXor commented on GitHub (Nov 1, 2018):

Okay, thanks for confirming. Can you confirm that the TCP port is still correctly opened by trying to connect via netcat on the same machine you want to run the client on?

<!-- gh-comment-id:435012837 --> @MaxXor commented on GitHub (Nov 1, 2018): Okay, thanks for confirming. Can you confirm that the TCP port is still correctly opened by trying to connect via `netcat` on the same machine you want to run the client on?
Author
Owner

@mystyq commented on GitHub (Nov 1, 2018):

netcat shows an open connection from host -> VM. VM is bridged to local network (for UPnP).

I downloaded 1.3.0.0 and it connected just fine on the VM.

<!-- gh-comment-id:435176629 --> @mystyq commented on GitHub (Nov 1, 2018): netcat shows an open connection from host -> VM. VM is bridged to local network (for UPnP). I downloaded 1.3.0.0 and it connected just fine on the VM.
Author
Owner

@mystyq commented on GitHub (Nov 1, 2018):

Quasar (up-to-date) is working on a Windows 10 VM.

<!-- gh-comment-id:435215602 --> @mystyq commented on GitHub (Nov 1, 2018): Quasar (up-to-date) is working on a Windows 10 VM.
Author
Owner

@cyclo-techtwister commented on GitHub (Nov 2, 2018):

seems it does not allow for loop back connections..

<!-- gh-comment-id:435231478 --> @cyclo-techtwister commented on GitHub (Nov 2, 2018): seems it does not allow for loop back connections..
Author
Owner

@MaxXor commented on GitHub (Nov 2, 2018):

@cyclo-techtwister That's not the same. loopback is localhost, he's trying to connect to a different host.

<!-- gh-comment-id:435292819 --> @MaxXor commented on GitHub (Nov 2, 2018): @cyclo-techtwister That's not the same. loopback is localhost, he's trying to connect to a different host.
Author
Owner

@cyclo-techtwister commented on GitHub (Nov 2, 2018):

OK, I to can't figure out why when using virtual machine old version works just fine but this newer one will not connect. I have no way of testing otherwise as using smartphone for internet and noway to port forward.. running on Windows 7 Oh, I did notice (newest version) that if GUI/server is running then client wouldn't even attempt to connect,port conflict? However like I mentioned older version runs and connects just fine.

<!-- gh-comment-id:435323505 --> @cyclo-techtwister commented on GitHub (Nov 2, 2018): OK, I to can't figure out why when using virtual machine old version works just fine but this newer one will not connect. I have no way of testing otherwise as using smartphone for internet and noway to port forward.. running on Windows 7 Oh, I did notice (newest version) that if GUI/server is running then client wouldn't even attempt to connect,port conflict? However like I mentioned older version runs and connects just fine.
Author
Owner

@MaxXor commented on GitHub (Nov 2, 2018):

Before we continue here, you know that all old versions before 21st October 2018 are incompatible with the latest one? This means, old clients won't be able to connect to the latest server version. (there is a wiki page on how to update the clients)

<!-- gh-comment-id:435358422 --> @MaxXor commented on GitHub (Nov 2, 2018): Before we continue here, you know that all old versions before 21st October 2018 are incompatible with the latest one? This means, old clients won't be able to connect to the latest server version. (there is a [wiki page](https://github.com/quasar/QuasarRAT/wiki/Updating-a-Client) on how to update the clients)
Author
Owner

@mystyq commented on GitHub (Nov 2, 2018):

https://stackoverflow.com/questions/52237532/sslstream-authenticateasclient-failure-only-on-windows-7-when-specifying-sslprot

A comment from a stack overflow post:

According to https://blogs.msdn.microsoft.com/kaushal/2011/10/02/support-for-ssltls-protocols-on-windows/ SSL2/3 and TLS1.0/1.1/1.2 are supported on Windows 7, but it does not show any information on TLS1.3, so perhaps me setting TLS 1.3 caused this issue?

<!-- gh-comment-id:435490644 --> @mystyq commented on GitHub (Nov 2, 2018): https://stackoverflow.com/questions/52237532/sslstream-authenticateasclient-failure-only-on-windows-7-when-specifying-sslprot A comment from a stack overflow post: > According to https://blogs.msdn.microsoft.com/kaushal/2011/10/02/support-for-ssltls-protocols-on-windows/ SSL2/3 and TLS1.0/1.1/1.2 are supported on Windows 7, but it does not show any information on TLS1.3, so perhaps me setting TLS 1.3 caused this issue?
Author
Owner

@mystyq commented on GitHub (Nov 2, 2018):

OK, I to can't figure out why when using virtual machine old version works just fine but this newer one will not connect. I have no way of testing otherwise as using smartphone for internet and noway to port forward.. running on Windows 7 Oh, I did notice (newest version) that if GUI/server is running then client wouldn't even attempt to connect,port conflict? However like I mentioned older version runs and connects just fine.

I ran procexp on the client. It sends SYNs to the server while it is not listening, however when the server is listening it doesn't even attempt to connect to the server.

<!-- gh-comment-id:435496799 --> @mystyq commented on GitHub (Nov 2, 2018): > > > OK, I to can't figure out why when using virtual machine old version works just fine but this newer one will not connect. I have no way of testing otherwise as using smartphone for internet and noway to port forward.. running on Windows 7 Oh, I did notice (newest version) that if GUI/server is running then client wouldn't even attempt to connect,port conflict? However like I mentioned older version runs and connects just fine. I ran procexp on the client. It sends SYNs to the server while it is not listening, however when the server is listening it doesn't even attempt to connect to the server.
Author
Owner

@cyclo-techtwister commented on GitHub (Nov 2, 2018):

When using old or new versions I use respected servers I just assumed from the start that old clients would not work with newer code upgrades. Maybe it's a Windows 7 glitch as you stated it works with Windows 10 using a VM.

<!-- gh-comment-id:435498338 --> @cyclo-techtwister commented on GitHub (Nov 2, 2018): When using old or new versions I use respected servers I just assumed from the start that old clients would not work with newer code upgrades. Maybe it's a Windows 7 glitch as you stated it works with Windows 10 using a VM.
Author
Owner

@MaxXor commented on GitHub (Nov 2, 2018):

Oh crap, a Windows7-only bug in the .NET Framework... I'll try to check it and find a work-around.

<!-- gh-comment-id:435504882 --> @MaxXor commented on GitHub (Nov 2, 2018): Oh crap, a Windows7-only bug in the .NET Framework... I'll try to check it and find a work-around.
Author
Owner

@MaxXor commented on GitHub (Nov 2, 2018):

@mystyq @cyclo-techtwister Could you try removing the SslProtocols.Tls in these two lines, recompile and check again? I'll try to get my Windows 7 VM up and running asap in the next few days.

github.com/quasar/QuasarRAT@e24b024554/Quasar.Client/Networking/Client.cs (L310)

github.com/quasar/QuasarRAT@e24b024554/Quasar.Server/Networking/Server.cs (L283)

<!-- gh-comment-id:435507103 --> @MaxXor commented on GitHub (Nov 2, 2018): @mystyq @cyclo-techtwister Could you try removing the `SslProtocols.Tls` in these two lines, recompile and check again? I'll try to get my Windows 7 VM up and running asap in the next few days. https://github.com/quasar/QuasarRAT/blob/e24b0245549161a64a8c2fd2126b7b3210f9756d/Quasar.Client/Networking/Client.cs#L310 https://github.com/quasar/QuasarRAT/blob/e24b0245549161a64a8c2fd2126b7b3210f9756d/Quasar.Server/Networking/Server.cs#L283
Author
Owner

@mystyq commented on GitHub (Nov 2, 2018):

@MaxXor No luck with SslProtocols.None flag.

<!-- gh-comment-id:435515416 --> @mystyq commented on GitHub (Nov 2, 2018): @MaxXor No luck with `SslProtocols.None` flag.
Author
Owner

@cyclo-techtwister commented on GitHub (Nov 2, 2018):

@MaxXor Yea same here made those changes and still behaves the same. Client won't attempt to connect if server is listening.

<!-- gh-comment-id:435516791 --> @cyclo-techtwister commented on GitHub (Nov 2, 2018): @MaxXor Yea same here made those changes and still behaves the same. Client won't attempt to connect if server is listening.
Author
Owner

@MaxXor commented on GitHub (Nov 3, 2018):

@mystyq I didn't mean changing it to SslProtocols.None but removing that parameter entirely.

<!-- gh-comment-id:435568719 --> @MaxXor commented on GitHub (Nov 3, 2018): @mystyq I didn't mean changing it to `SslProtocols.None` but removing that parameter entirely.
Author
Owner

@cyclo-techtwister commented on GitHub (Nov 3, 2018):

@MaxXor I did changed from "_stream.AuthenticateAsClient(ip.ToString(), col, SslProtocols.Tls, false);"
changed to "_stream.AuthenticateAsClient(ip.ToString(), col, false);"
still same issue..

<!-- gh-comment-id:435576441 --> @cyclo-techtwister commented on GitHub (Nov 3, 2018): @MaxXor I did changed from "_stream.AuthenticateAsClient(ip.ToString(), col, SslProtocols.Tls, false);" changed to "_stream.AuthenticateAsClient(ip.ToString(), col, false);" still same issue..
Author
Owner

@MaxXor commented on GitHub (Nov 3, 2018):

Thanks both of you @cyclo-techtwister and @mystyq for testing and helping to figure this out.
Now after debugging this on a Windows 7 VM I can fully reproduce it, the problem are the client certificates it seems...

<!-- gh-comment-id:435595290 --> @MaxXor commented on GitHub (Nov 3, 2018): Thanks both of you @cyclo-techtwister and @mystyq for testing and helping to figure this out. Now after debugging this on a Windows 7 VM I can fully reproduce it, the problem are the client certificates it seems...
Author
Owner

@cyclo-techtwister commented on GitHub (Nov 3, 2018):

@MaxXor You're welcome and thank you...

<!-- gh-comment-id:435595947 --> @cyclo-techtwister commented on GitHub (Nov 3, 2018): @MaxXor You're welcome and thank you...
Author
Owner

@mystyq commented on GitHub (Nov 3, 2018):

Here is some information about SslStream I found on the web.

Link: https://www.winsocketdotnetworkprogramming.com/managediostreamreaderwriter2h.html

Excerpt:

The authentication is handled by the Security Support Provider (SSPI) channel provider. The client is given an opportunity to control validation of the server's certificate by specifying a RemoteCertificateValidationCallback delegate when creating an SslStream. The server can also control validation by supplying a CertificateValidationCallback delegate. The method referenced by the delegate includes the remote party's certificate and any errors SSPI encountered while validating the certificate. Note that if the server specifies a delegate, the delegate's method is invoked regardless of whether the server requested client authentication. If the server did not request client authentication, the server's delegate method receives a null certificate and an empty array of certificate errors.

If the server requires client authentication, the client must specify one or more certificates for authentication. If the client has more than one certificate, the client can provide a LocalCertificateSelectionCallback delegate to select the correct certificate for the server. The client's certificates must be located in the current user's "My" certificate store. Client authentication via certificates is not supported for the SSL2 (SSL version 2) protocol.

Solution: (Windows 7)

Import the certificate manually into the "Trusted Root Certification Authorities" certificate store (on the machine hosting the server).

<!-- gh-comment-id:435618116 --> @mystyq commented on GitHub (Nov 3, 2018): Here is some information about SslStream I found on the web. Link: https://www.winsocketdotnetworkprogramming.com/managediostreamreaderwriter2h.html Excerpt: ``` The authentication is handled by the Security Support Provider (SSPI) channel provider. The client is given an opportunity to control validation of the server's certificate by specifying a RemoteCertificateValidationCallback delegate when creating an SslStream. The server can also control validation by supplying a CertificateValidationCallback delegate. The method referenced by the delegate includes the remote party's certificate and any errors SSPI encountered while validating the certificate. Note that if the server specifies a delegate, the delegate's method is invoked regardless of whether the server requested client authentication. If the server did not request client authentication, the server's delegate method receives a null certificate and an empty array of certificate errors. If the server requires client authentication, the client must specify one or more certificates for authentication. If the client has more than one certificate, the client can provide a LocalCertificateSelectionCallback delegate to select the correct certificate for the server. The client's certificates must be located in the current user's "My" certificate store. Client authentication via certificates is not supported for the SSL2 (SSL version 2) protocol. ``` --- # *Solution:* (Windows 7) Import the certificate manually into the "Trusted Root Certification Authorities" certificate store (on the machine hosting the server).
Author
Owner

@cyclo-techtwister commented on GitHub (Nov 3, 2018):

@mystyq Tried importing and still unable to connect using VM or even a loop back. However the client does attempt to connect but never does. Is it working for you?

<!-- gh-comment-id:435625893 --> @cyclo-techtwister commented on GitHub (Nov 3, 2018): @mystyq Tried importing and still unable to connect using VM or even a loop back. However the client does attempt to connect but never does. Is it working for you?
Author
Owner

@mystyq commented on GitHub (Nov 3, 2018):

It's working for me. I used mmc to create a snap-in for certificates, then imported the certificate under Trusted Root Certification Authorities.

<!-- gh-comment-id:435626554 --> @mystyq commented on GitHub (Nov 3, 2018): It's working for me. I used `mmc` to create a snap-in for certificates, then imported the certificate under `Trusted Root Certification Authorities`.
Author
Owner

@cyclo-techtwister commented on GitHub (Nov 3, 2018):

@mystyq how would I do the same? mmc create snap-in?
never mind I see what you did.. Yes it works for myself as well. Thanks for this temp work around.

<!-- gh-comment-id:435628027 --> @cyclo-techtwister commented on GitHub (Nov 3, 2018): @mystyq how would I do the same? mmc create snap-in? never mind I see what you did.. Yes it works for myself as well. Thanks for this temp work around.
Author
Owner

@MaxXor commented on GitHub (Nov 3, 2018):

Thanks for searching @mystyq but thats probably not a solution for me, I would like to leave the certificate storage of the system unmodified and handle it all in memory only.

<!-- gh-comment-id:435628130 --> @MaxXor commented on GitHub (Nov 3, 2018): Thanks for searching @mystyq but thats probably not a solution for me, I would like to leave the certificate storage of the system unmodified and handle it all in memory only.
Author
Owner

@cyclo-techtwister commented on GitHub (Nov 3, 2018):

@MaxXor I used @mystyq work around for now (working) but, thank you for continuing to find a built in solution.

<!-- gh-comment-id:435629341 --> @cyclo-techtwister commented on GitHub (Nov 3, 2018): @MaxXor I used @mystyq work around for now (working) but, thank you for continuing to find a built in solution.
Author
Owner

@mystyq commented on GitHub (Nov 4, 2018):

I wonder if there is something that can be done in the framework to resolve this... It's strange that Windows 10 allows the certificate to be retrieved from outside of the store and authenticated, where Windows 7 seems to require a CA cert stored in the registry.

<!-- gh-comment-id:435694550 --> @mystyq commented on GitHub (Nov 4, 2018): I wonder if there is something that can be done in the framework to resolve this... It's strange that Windows 10 allows the certificate to be retrieved from outside of the store and authenticated, where Windows 7 seems to require a CA cert stored in the registry.
Author
Owner

@cyclo-techtwister commented on GitHub (Nov 4, 2018):

@mystyq Windows 7 only has about a year and a half left for security update support (Microsoft ended mainstream support for Windows 7 on January 13, 2015, but extended support won’t end until January 14, 2020.) at which time once again all will be forced to upgrade. The question is, is it worth the time and effort modifying the code which may add more bugs that don't exist at this time? After all a System Admin running the server can easily import the cert. and the client runs just fine on outside machine. Just a thought.

<!-- gh-comment-id:435696830 --> @cyclo-techtwister commented on GitHub (Nov 4, 2018): @mystyq Windows 7 only has about a year and a half left for security update support (Microsoft ended mainstream support for Windows 7 on January 13, 2015, but extended support won’t end until January 14, 2020.) at which time once again all will be forced to upgrade. The question is, is it worth the time and effort modifying the code which may add more bugs that don't exist at this time? After all a System Admin running the server can easily import the cert. and the client runs just fine on outside machine. Just a thought.
Author
Owner

@MaxXor commented on GitHub (Nov 4, 2018):

The market share for Windows 7 is still ~40% so it's definitely worth the time and effort, it's not even a big problem. I'll just remove the client certificates to resolve this issue. They were just a nice gimmick anyways.

<!-- gh-comment-id:435701974 --> @MaxXor commented on GitHub (Nov 4, 2018): The market share for Windows 7 is still ~40% so it's definitely worth the time and effort, it's not even a big problem. I'll just remove the client certificates to resolve this issue. They were just a nice gimmick anyways.
Author
Owner

@MaxXor commented on GitHub (Nov 4, 2018):

github.com/quasar/QuasarRAT@a7dc36ae18

This works fine for me on Windows 7 and 10. It provides almost the same security, the client and server gets both authenticated during the connection handshake.

<!-- gh-comment-id:435711799 --> @MaxXor commented on GitHub (Nov 4, 2018): https://github.com/quasar/QuasarRAT/commit/a7dc36ae187989abe03868446e8c9c80440ff243 This works fine for me on Windows 7 and 10. It provides almost the same security, the client and server gets both authenticated during the connection handshake.
Author
Owner

@cyclo-techtwister commented on GitHub (Nov 4, 2018):

@MaxXor OK, sounds good.. It gives people another option. I don't mind importing a cert. I can always remove which is quicker then editing the code and leave better security intact.

<!-- gh-comment-id:435716487 --> @cyclo-techtwister commented on GitHub (Nov 4, 2018): @MaxXor OK, sounds good.. It gives people another option. I don't mind importing a cert. I can always remove which is quicker then editing the code and leave better security intact.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/Quasar#467
No description provided.