mirror of
https://github.com/dani-garcia/vaultwarden.git
synced 2026-04-25 17:25:57 +03:00
[GH-ISSUE #429] Allow TLS1.2 for sending emails with starttls #253
Labels
No labels
SSO
Third party
better for forum
bug
bug
documentation
duplicate
enhancement
future Vault
future Vault
future Vault
good first issue
help wanted
low priority
notes
pull-request
question
troubleshooting
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/vaultwarden#253
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @nicolaspernoud on GitHub (Mar 10, 2019).
Original GitHub issue: https://github.com/dani-garcia/vaultwarden/issues/429
Hi,
Thanks for your amazing work.
I ran into the following issue : my mail server (https://github.com/mailcow/mailcow-dockerized) only allows TLS 1.2 when using ssl encryption with start tls.
It would seem bitwarden_rs doesn't manage to handshake with it.
Log :
Could you do something about it ?
Thanks,
Best regards.
@dani-garcia commented on GitHub (Mar 10, 2019):
As far as I know, we only specify a minimum of TLS 1.1, but not a maximum, so it should work fine with TLS 1.2 as it is. I'm not sure why it wouldn't work.
Anyway, this reminded me I needed to add an option to disable STARTTLS and instead use a normal TLS wrapped connection, so I've added that in
github.com/dani-garcia/bitwarden_rs@e93538cea9. Maybe you can give that a try?@nicolaspernoud commented on GitHub (Mar 10, 2019):
Thanks, I'll give it a try when the docker image will be updated.
In the meantime, for what it's worth, here's the postfix log when the connexion fails :
... and the postfix options regarding tls :
@nicolaspernoud commented on GitHub (Mar 11, 2019):
I tried the new image, whith
-e SMTP_EXPLICIT_TLS=trueand the outcome was the same :The postfix log was the same :
warning: TLS library problem: error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:../ssl/record/rec_layer_s3.c:1399:SSL alert number 48:It would seems that mailcow accept connections with TLS less than 1.2 if a certificate is present, and since there is no certificate, the connection fails.
Maybe an option to force TLS version on bitwarden_rs could do the trick...
@dani-garcia commented on GitHub (Mar 13, 2019):
That's interesting, on second thought, the
tlsv1 alert unknown caerror seems unrelated to the TLS handshake. Is the certificate self signed? Can you check with another client if it's possible to connect?@kennymc-c commented on GitHub (Mar 14, 2019):
The explicit TLS option at least helped me to solve my problem with sending mails from Bitwarden. So far there was always an unexpected error in the client when I wanted to send a master password hint and there was nothing in the log about it.
@nicolaspernoud commented on GitHub (Mar 14, 2019):
It happens that my certificate was self signed (I use mailcow behind another auto let's encrypt reverse proxy so the web certificate was ok but not the one used by postfix). Replacing the certificate with the correct one works fine, with both port 587 + starttls or port 465 and the
SMTP_EXPLICIT_TLS=trueoption.Thanks a lot and kudos for your great work !