mirror of
https://github.com/dani-garcia/vaultwarden.git
synced 2026-04-26 01:35:54 +03:00
[GH-ISSUE #376] Document security relevant implemenation aspects #217
Labels
No labels
SSO
Third party
better for forum
bug
bug
documentation
duplicate
enhancement
future Vault
future Vault
future Vault
good first issue
help wanted
low priority
notes
pull-request
question
troubleshooting
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/vaultwarden#217
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @theduke on GitHub (Jan 30, 2019).
Original GitHub issue: https://github.com/dani-garcia/vaultwarden/issues/376
Hey, awesome project!
It would be great to document some more security relevant aspects of the implementation.
Note: I neither know anything about the official implementation nor about the code of this crate, I've just glanced at the table layout.
Some questions:
@dani-garcia commented on GitHub (Jan 30, 2019):
Pretty much everything is encrypted client-side, yes. That includes the users private keys, which get encrypted with a key derived from the master password, and the master password hash (which we hash again to store it, to be safe). The only unencrypted things in the database I can think of are the users emails and unique IDs.
As that part is mostly done client-side, we don't have any documentation, but the bitwarden_ruby project has a nice API doc that you can check here. I don't know how updated it is anymore (attachments got individual encryption keys recently), but the basic crypto is explained there pretty well.
It might be a good idea to deploy the server behind a proxy, that way you can get websocket notifications, and you can configure other features like rate limiting, allowing only certain IPs to connect to the admin panel, etc. You might want to also use Fail2Ban to block brute force login attempts.
@theduke commented on GitHub (Jan 30, 2019):
Thanks for the info, this pretty much alleviates all my potential concerns.
Would probably be good to add a short version of this info to the README.
@pdarcos commented on GitHub (Feb 21, 2019):
I agree with @theduke
Awesome project and we should document the security model as best as possible.
To that end I highly recommend reading the Cure53 audit report https://cdn.bitwarden.net/misc/Bitwarden%20Security%20Assessment%20Report.pdf
Also Kyle's blog post has a good summary of the findings https://blog.bitwarden.com/bitwarden-completes-third-party-security-audit-c1cc81b6d33