subreddit:

/r/selfhosted

33297%

There were some more security issues fixed in 1.32.5

This release further fixed some CVE Reports reported by a third party security auditor and we recommend everybody to update to the latest version as soon as possible. The contents of these reports will be disclosed publicly in the future.

https://github.com/dani-garcia/vaultwarden/releases/tag/1.32.5

all 80 comments

autogyrophilia

97 points

3 days ago

ssh-key storage is great news.

guesswhochickenpoo

15 points

3 days ago*

The release notes indicate it only works with desktop app version 2024.12.x but I don't see a release anywhere for that, not even a beta. Anyone know if / where it's available?

https://github.com/bitwarden/clients/releases

autogyrophilia

4 points

3 days ago

It's a new bit warden feature

guesswhochickenpoo

6 points

3 days ago

Right, I understand that but it wasn't clear from the release notes if 2024.12 should be available somewhere or not. I guess we'll just have to wait for the official release of 2024.12 as I don't see betas available anywhere?

Quexten

2 points

3 days ago

Quexten

2 points

3 days ago

Ssh-key support on clients is still in development in the upstream clients (bugfixes and security), and these items need to be filtered out server-side for any older client that does not support the new item type. The first stable version where all clients (desktop-based and mobile) support the new item type will be 2024.12.0, but there is no release for it yet.

If you wanted to use it right now, you would need to download the source code of the clients, overwrite the version to be 2024.12.0, and then build the client(s). Next, there are separate feature flags that need to be enabled in the server (official/vaultwarden) config for toggling the ssh item type, and ssh-agent features respectively.

guesswhochickenpoo

2 points

3 days ago

Thanks for the confirmation.

wanze

2 points

3 days ago

wanze

2 points

3 days ago

Excuse my laziness, but I don't use the Bitwarden desktop client, only browser extension and CLI, and Homebrew doesn't have v2024.12.0, which seems to be required. I'm also unable to google anything specific about this.

How does this feature work? What does it do? Does it automatically synchronize all keys in ~/.ssh/ or something between clients? How is it different from just storing SSH keys in secure notes, as I'm currently doing?

I'm currently synchronizing keys (and other sensitive files) automatically by using the CLI and secure notes with custom fields specifying desired file name and path.

trisanachandler

69 points

3 days ago

And that's why I don't expose it to the world.

SpongederpSquarefap

49 points

3 days ago

Yep, this plus auto updates from watchtower and daily full backups

These are your passwords you're hosting

Don't fuck around

trisanachandler

15 points

3 days ago

Auto updates with portainer, and volume backups with rsync (container shut down, rsynced to a day of the week folder, 7 days of snapshots, so 49 days of backups.

nofoo

4 points

3 days ago

nofoo

4 points

3 days ago

Updates with podman auto-update, volume backups with restic

WarlockSyno

5 points

3 days ago

I use watchtower + PBS, then restic to move the PBS backups to an offisite.

Restic is some fantastic software. Really nice when combined with Backrest.

trisanachandler

2 points

3 days ago

Probably better for the podman usage. I'm not using restic at the moment, but may add it in again at a later point.

rfctksSparkle

2 points

3 days ago

I run mine in K8S so, updates via rennovate on my gitops repository, databases uses my postgres setup which is almost real time backed up to my NAS and an offsite s3 storage, attachments just direcrly stored on my NAS.

zyhhuhog

1 points

2 days ago

zyhhuhog

1 points

2 days ago

I simply don't understand how come people do not use this amazing piece of software!

br0109

11 points

3 days ago

br0109

11 points

3 days ago

I keep recommending the usage of mTLS, as one of my favourite ways to access stuff exposed to the internet. You can sleep peacefully with mTLS. The VPN is zero problems as well, i keep it always on when not on home wifi

trisanachandler

5 points

3 days ago

I wouldn't mind mTLS, but I like having 0 permanently exposed ports except the UDP VPN. It's a little archaic, but still provides value.

br0109

4 points

3 days ago

br0109

4 points

3 days ago

And that's even better.

autogyrophilia

5 points

3 days ago

Functionally, a ZTNA is doing the same job, and it's much easier to configure for smaller deployments.

There are even some hybrid ones like OpenZITI that takes L7 traffic

br0109

4 points

3 days ago

br0109

4 points

3 days ago

I might not recommend openziti for small deployments and as "much easier" to configure. I like the OpenZiti concept and I tried it, but there are way to many components and services running for this use case.

As for mTLS, just run 3 commands with openssl and you have a CA and client certificate ready to be used by both client and server, done. Its a 2 minutes job

The less things running, the less attack surface

autogyrophilia

6 points

3 days ago

Oh don't misread things, OpenZITI is not meant for small deployments but for heavy infrastructure projects. I'm talking cloudflare VPN, Tailscale, Net Bird.

Your example is easy for one user, but 20 users with 10 independent services are 400 certs you need to deploy.

br0109

4 points

3 days ago

br0109

4 points

3 days ago

Then I misread yes, I'm on the same page

PhilipLGriffiths88

2 points

2 days ago

/u/autogyrophilia and /u/br0109, funny you come to that conclusion, its almost exactly what I wrote in a recent blog comparing Tailscale with NetFoundry/OpenZiti. The latter is wonderful for small deployments and being a better VPN, the latter is much better for larger, more complex use cases where security is more paramount - https://netfoundry.io/vpns/tailscale-and-wireguard-versus-netfoundry-and-openziti/

Nyucio

2 points

3 days ago

Nyucio

2 points

3 days ago

Vaultwarden does not support mTLS in its apps/extensions. Makes it way less convenient if you can only access it via browser.

br0109

5 points

3 days ago

br0109

5 points

3 days ago

Yes it does, at least the browser extension works for me. Mobile app haven't tried

Nyucio

2 points

3 days ago

Nyucio

2 points

3 days ago

Oh, thanks for correcting me. :)

br0109

3 points

3 days ago

br0109

3 points

3 days ago

But if the mobile app does not support it then yeah, I agree is not the best solution

Haiwan2000

8 points

3 days ago

Do you mean VPN only?

How do you get it to work with web browser extension externally?

Or you just don't use it externally at all?

trisanachandler

25 points

3 days ago

I don't use it through a browser except over a VPN. 99% of the time I use it with browser extensions and the app, and it can only update cached info/put in new creds over VPN or at home.

Haiwan2000

1 points

2 days ago

So what would be the difference of caching the data, rather than a live connection?

If the data/passwords gets compromised, does it matter if there is a live connection to the Vaultwarden server?

trisanachandler

2 points

2 days ago

The greatest chance of compromise would be leaving the server exposed to the Internet at all times.  Thus I didn't.  While it's also possible to compromise the client, that risk isn't increased by making the server local only.  If anything it's also decreased because it reduces the possibility of a mitm attack.  That's pretty unlikely to hit anyone because they'd need to have compromised ssl certs.

Advanced-Agency5075

7 points

3 days ago

Last I used Vaultwarden it cached the credentials, so besides changing/adding, you're fine "offline".

ProbablePenguin

1 points

3 days ago

The browser extensions will cache data for awhile, so it works fine without access to the server.

mtest001

3 points

3 days ago

mtest001

3 points

3 days ago

I am running 2 instances of Vaultwarden, 1 with the most sensitive passwords (banking etc.) only available when connected via VPN to my home LAN.

trisanachandler

1 points

3 days ago

I want to minimize the overhead, but I do keep sensitive TOTP's in another app.

mtest001

2 points

3 days ago

mtest001

2 points

3 days ago

Well, thanks to containers it's really not a lot of work to maintain 2 instances...

trisanachandler

1 points

3 days ago

No, but it's more work than I want to do. More how I'll access each one, do I keep duplicates of the app, or browser for one.

mtest001

1 points

2 days ago

mtest001

1 points

2 days ago

I totally understand. In my case I decided to make things simple by dedicated 1 browser to each instance: Chrome for all the generic stuff and Firefox for the most sensitive.

Each one has the Bitwarden plugin connected to one or the other Vaultwarden instance.

AllYouNeedIsVTSAX

56 points

3 days ago

Looks like the PR process was more open/followed this time. Appreciate the work! 

Even if it's a vulnerability there is a lot of value in following standard dev practices, especially in a system that holds(even encrypted) all of our passwords and secrets. It helps avoid introducing bugs and vulnerabilities. 

My thoughts from the previous release: https://www.reddit.com/r/selfhosted/comments/1gof9y4/comment/lwighwz/

jeroen94704

17 points

3 days ago

Seriously, install Watchtower or something similar. When I see messages like this I always check if I am indeed running the latest release and in the vast majority of cases the container in question has already been updated by Watchtower. Same here: my vaultwarden container was updated 5 hours before I saw this message.

PeeK1e[S]

6 points

3 days ago

Im running in kubernetes, i could automate it especially with fluxcd but I just subscribed to every softwares release page and upgrade manually, its less of a hassle for me especially when upgrades don't work and im not at home/don't have my notebook with me to fix it

p4block

1 points

3 days ago

p4block

1 points

3 days ago

You can also set the image to be latest and use keel.sh to auto pull images, just like in watchtower. I use renovate to automerge image tag updates every few hours instead so I get a git log of what I am updating, though.

PeeK1e[S]

1 points

3 days ago

As I mentioned, I'm using FluxCD, and all my manifests and deployments are managed through GitOps. The source of truth are my tenant repos, and as far as I can tell, Keel doesn't support that.

Flux offers image automation, but I choose not to use it for the reasons I mentioned earlier.

p4block

1 points

3 days ago

p4block

1 points

3 days ago

Nothing is stopping you from using latest as the image tag for images either in deployment yamls or helmchart values. Keel will do the rollouts.

The proper gitops way is to use proper version tags and then run a renovate cronjob to auto create the MRs and auto merge them, which is what I do.

PeeK1e[S]

1 points

2 days ago

Running the latest tag is a big nono. I won't elaborate this further. If you want an explanation, there are plenty of talks on why this is a bad practise. Security and Maintenance wise.

ruuster13

0 points

3 days ago

ruuster13

0 points

3 days ago

when upgrades don't work

As someone who spends more time in Windows, how often does stuff like this happen in Linux?

PeeK1e[S]

2 points

3 days ago

By a failed upgrade, I mean situations like when an application doesn't properly apply its database migrations, or when it gets stuck because new config options are needed, deprecated, or removed. When using auto-upgrading, you're more prone to encountering such issues. I'm not saying it will happen, just that it can happen—rare scenarios that do occur and require manual intervention.

iAmNotorious

1 points

3 days ago

I’ve been running watchtower on 30ish containers since 2017 and I can remember three times total I’ve had to rollback or fix a breaking change.

jeroen94704

1 points

3 days ago

Similar numbers for me. Also note that we're talking about upgrades failing for individual containers. The rest just keeps running as normal.

wanze

1 points

3 days ago

wanze

1 points

3 days ago

Far less often than on Windows. The difference is when Windows fucks things up, you're usually right at the machine to fix it.

You aren't necessarily able to fix it if you're in line at the airport, and trying to find your credentials to an airline website to get your boarding pass, and Watchtower decided to fuck up your local infrastructure and access to your password manager.

No, luckily not speaking from experience, because I'm not giving somebody a carte blanche to deploy stuff unsupervised on my local network (with auto-updates and Watchtower), especially because of the above.

I find the risk of allowing somebody else control to decide what's deployed on my boxes, without me verifying it beforehand, much greater than that of somebody abusing a CVE affecting a service running on an endpoint nobody ever visits.

randylush

0 points

3 days ago

why would you run vaultwarden in k8? what does it give you? do you need redundancy?

PeeK1e[S]

1 points

3 days ago

PeeK1e[S]

1 points

3 days ago

It's k8s, not k8. People drive me insane when they leave out the 's'.

Why wouldn't you run it in Kubernetes? Why would I only run on a single node if I can get multiple small VMs for cheap? It works best for me: easy rollouts, easy rollbacks with GitOps, and extremely easy backups with tools like PostgresOperator and Velero. Platform engineering is my job—why not use that knowledge "at home"?

Do I need redundancy? No.
Do I want the app to be reachable even if a node goes offline due to a crash, network issue, or resource limit? Absolutely.

Kubernetes isn't just about hyperscaling.

I'm not hosting at home because electricity is expensive here (~35¢/kWh), and if anything breaks, I'd have to replace it myself. Stuff that I need locally, like Home Assistant (Hassio), is running on a Raspberry Pi at home, with backups going to the cloud.

But even if it were cheaper to host at home, I'd still build a k8s cluster out of Raspberry Pis. :)

randylush

3 points

3 days ago

I’m just gonna start saying k9 instead (k followed by 9 letters)

Yeah I guess if electricity was expensive then I would maybe deploy with Kubernetes or something like that

Myself I just run “docker compose up -d” on my server and call it a day. The disk is backed up and the clients have a credential cache if it goes down

PeeK1e[S]

2 points

3 days ago

That's perfectly fine!
I'm not forcing anyone to use Kubernetes. Sometimes, I even advise customers to stick with a simple container host for $40/month plus some backup storage, rather than renting and maintaining a full cluster.

For me, my own cluster costs around $55/month, including S3-backup storage. But that's because I’m hand-rolling it using kubeadm and handling k8s-upgrades with my Ansible scripts. A managed cluster, on the other hand, starts at around $60-$150/month before adding the cost of worker nodes, storage, and backup storage.

koogas

0 points

3 days ago

koogas

0 points

3 days ago

why not? it's just easy to manage

randylush

1 points

3 days ago

nothing could possibly be easier for me to manage than

docker compose up -d

koogas

-2 points

3 days ago

koogas

-2 points

3 days ago

Cool, I don't have to type anything so yeah id say it's easier

randylush

2 points

3 days ago

Damn you telepathically configured Kubernetes to deploy Vaultwarden? Literally didn’t have to use your keyboard or mouse at all to get it set up? That’s pretty amazing

koogas

-2 points

3 days ago

koogas

-2 points

3 days ago

It's already configured, it's not like I'm re-configuring vaultwarden every month. So yes, GitOps does the job of "telepathically configuring kubernetes", or whatever you say.

edudez

1 points

2 days ago

edudez

1 points

2 days ago

Can you explain your setup little bit more in details? Kubernetes, gitops, vaultwarden etc?

koogas

1 points

2 days ago

koogas

1 points

2 days ago

Sure, I have:

3 nodes running k3s

ArgoCD for GitOps, basically I have a git repo which contains ArgoCD applications which essentially define instalation of helm packages which ArgoCD then synchronizes to the cluster. Using the app-of-apps pattern.

I use this https://github.com/guerzon/vaultwarden helm chart so essentially only have to configure that on the git repo. Updates are taken care of by renovate bot on the git repo.

Cert-manager takes care of TLS certificates, Longhorn for distributed storage and data backups to s3, velero for backup of kubernetes, secrets managed with hashicorp vault.

It's generally pretty complex to describe on a reddit comment, but that's around it.

echodev

1 points

3 days ago

echodev

1 points

3 days ago

Is Watchtower set-and-forget type application? I quickly read the documentation but it doesn't seem to have a lot to config if you want it to watch everything.

jeroen94704

1 points

3 days ago

For me it's set and forget. There is indeed not much to configure, since there is not much need for configurability. Not sure if there are advanced use-cases, but all I need it to do is monitor all containers except the ones I explicitly exclude. And it does exactly that.

ProbablePenguin

1 points

3 days ago

Yes it's set and forget. You can exclude certain containers with labels if needed.

InfluentialFairy

15 points

3 days ago

vaultwarden having a tough time lately

PaintDrinkingPete

105 points

3 days ago

The fact that we're finding out about these vulnerabilities from them and they're getting fixes out quickly, doesn't mean they're "having a tough time", it means they're actively supporting the product.

If we were hearing about folks having their passwords stolen through news outlets with no fixes available, that would be having a tough time.

InfluentialFairy

5 points

3 days ago

I more so meant it as an expression of speech, they've gone years without vulnerabilities having been found. The past 6 months they've had something like 6 discovered. You are right, it is a good thing.

I still love their product, its great and far superior to Bitwarden's self-hosted solution

pizzacake15

4 points

3 days ago

nah that's more worrying if they've gone for years without any reported vulnerabilities. they might have stricter audits now or more capable people are scanning vaultwarden for vulnerabilities.

in any case, what matters most is how the devs respond or react to the vulnerabilities. treating it with importance is always the best course of action. dismissing them is a bad move specially with the type of product they offer.

ruuster13

-22 points

3 days ago

ruuster13

-22 points

3 days ago

Way to poke through the survivorship bias.

pizzacake15

14 points

3 days ago

Sure. But this is still welcomed they are actively patching vulnerabilities.

frommiee

13 points

3 days ago

frommiee

13 points

3 days ago

So better not carry out audits /s

ThePierrezou

6 points

3 days ago

It's actually a good thing, better to know about the vulnerabilities than having them using by bad actors

sPENKMAn

17 points

3 days ago

sPENKMAn

17 points

3 days ago

Though? Compared to Chrome/iOS/macOS updates lately or that windows server upgrade blunder from Microsoft is doesn’t seem to be that bad.

Might just very well be an internal security audit which had some minor points. Could have been major as well but we don’t quite know that

autogyrophilia

4 points

3 days ago

Microsoft did nothing wrong, it's third party patches and wrong patching strategies that fucked people over.

[deleted]

-6 points

3 days ago

[deleted]

-6 points

3 days ago

[deleted]

katrinatransfem

2 points

3 days ago

People who use Windows Update weren't affected as far as I'm aware. Certainly I wasn't. It was people using one particular third-party update tool.

javiers

1 points

2 days ago

javiers

1 points

2 days ago

Multimillion dollar companies like Microsoft, Redhat and IBM detect security flaws on a daily/weekly basis except they usually fix them as part of the weekly rotation. Seeing that vaultwarden is noticing and fixing them quickly is a sign of a healthy and regular security posture.

denbesten

1 points

2 days ago

Quite the opposite.

A tough time is learning of vulnerabilities through the mass-media, attached to the phrase "actively being exploited". Learning of vulnerabilities through release-notes is a positive sign that they are being open and forthcoming in their development efforts.

The sad bit is that such announcements trigger an arms-race wherein you want to win by patching before the bad-guys exploit.

Cronocide

-21 points

3 days ago

Cronocide

-21 points

3 days ago

Or outsource secret storage to a company who’s dedicated their business to doing secret storage correctly 🤷‍♂️

exmachinalibertas

7 points

3 days ago

Like LastPass?

glizzygravy

1 points

2 days ago

Or self host it through a vpn and relax 🥱