mirror of
https://github.com/dani-garcia/vaultwarden.git
synced 2026-04-26 01:35:54 +03:00
[GH-ISSUE #1045] TLS failures using self hosted email server #739
Labels
No labels
SSO
Third party
better for forum
bug
bug
documentation
duplicate
enhancement
future Vault
future Vault
future Vault
good first issue
help wanted
low priority
notes
pull-request
question
troubleshooting
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/vaultwarden#739
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @causalityloop on GitHub (Jul 5, 2020).
Original GitHub issue: https://github.com/dani-garcia/vaultwarden/issues/1045
Subject of the issue
bitwarden cannot use configured email server because the cert received, from the mail server, is not trusted. Adding ability to install respective root/subordinate CA's will allow bitwarden to trust the cert
Your environment
Steps to reproduce
Used the following related smpt settings
Expected behaviour
Emails are delivered
Actual behaviour
Emails are not delivered.
Relevant logs
The bitwarden log contains:
@BlackDex commented on GitHub (Aug 16, 2020):
You can try to add the CA cert your self by using the startup script @jjlin created: https://github.com/dani-garcia/bitwarden_rs/wiki/Starting-a-Container#customizing-container-startup
Or you can make sure the docker host has the CA installed correctly and do a read-only mount the
/etc/ssl/certsfolder within docker by using-v /etc/ssl/certs:/etc/ssl/certs:rothis should include all the ca certs your host allows within the docker container.And you probably need to mount the following also as a read only:
-v /usr/share/ca-certificates/mozilla:/usr/share/ca-certificates/mozilla:ro@BlackDex commented on GitHub (Oct 9, 2020):
@causalityloop, do you have this issue fixed?
I'm thinking of implementing an option to ignore the certificate when needed in cases like this. If have to wait a bit for the email library to release there new (beta) version which should have this included.
@causalityloop commented on GitHub (Oct 10, 2020):
Yes, thank you for reaching out. I will close this. I had a pr against this issue that fixed my specific use case (1046) and @jjlin reached out with his idea (1048). After looking at the code deeper, it looked like I could just place a script in /etc/bitwarden_rs.d/ and it would execute. I use this image in a k8s cluster and this is what I did. I loaded the certs and the startup script as config maps and placed the script in /etc/bitwarden_rs.d/ and I have it import the CA certs on create
@ch4r13 commented on GitHub (Jan 18, 2024):
After almost four years, is there any ability to ignore the certificate ? I'm also in this scenario with SMTP server with self-signed certificate. Thanks @BlackDex
@BlackDex commented on GitHub (Jan 18, 2024):
@TasyDevilsky that is already implemented for about 3 years or so.
See:
github.com/dani-garcia/vaultwarden@890e668071/.env.template (L448-L457)@ch4r13 commented on GitHub (Jan 18, 2024):
Many thanks ! especially for very fast response !
Thank you ❤️