aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDaniel GarcĂ­a <[email protected]>2018-09-03 13:47:05 +0200
committerGitHub <[email protected]>2018-09-03 13:47:05 +0200
commitb1ac37609f35698a4c53fb2ce588ea4896f5e020 (patch)
tree7c24bbed437bebaa7e270011b0e6cce2663d5a0b
parentf94e62602120ccf0f1828a1957afcdfe92d70004 (diff)
parent53e8f78af600faf8eb813a3364ac7c48353dc8fc (diff)
downloadvaultwarden-b1ac37609f35698a4c53fb2ce588ea4896f5e020.tar.gz
vaultwarden-b1ac37609f35698a4c53fb2ce588ea4896f5e020.zip
Merge pull request #169 from mprasil/http_warning
Add info on running over HTTP (documentation for #153)
-rw-r--r--README.md7
1 files changed, 7 insertions, 0 deletions
diff --git a/README.md b/README.md
index 37918219..358941a9 100644
--- a/README.md
+++ b/README.md
@@ -48,6 +48,7 @@ _*Note, that this project is not associated with the [Bitwarden](https://bitward
- [Changing user email](#changing-user-email)
- [Creating organization](#creating-organization)
- [Inviting users into organization](#inviting-users-into-organization)
+ - [Running on unencrypted connection](#running-on-unencrypted-connection)
- [Get in touch](#get-in-touch)
## Features
@@ -366,6 +367,12 @@ We use upstream Vault interface directly without any (significant) changes, this
The users must already be registered on your server to invite them, because we can't send the invitation via email. The invited users won't get the invitation email, instead they will appear in the interface as if they already accepted the invitation. Organization admin then just needs to confirm them to be proper Organization members and to give them access to the shared secrets.
+### Running on unencrypted connection
+
+It is strongly recommended to run bitwarden_rs service over HTTPS. However the server itself while [supporting it](#enabling-https) does not strictly require such setup. This makes it a bit easier to spin up the service in cases where you can generally trust the connection (internal and secure network, access over VPN,..) or when you want to put the service behind HTTP proxy, that will do the encryption on the proxy end.
+
+Running over HTTP is still reasonably secure provided you use really strong master password and that you avoid using web Vault over connection that is vulnerable to MITM attacks where attacker could inject javascript into your interface. However some forms of 2FA might not work in this setup and [Vault doesn't work in this configuration in Chrome](https://github.com/bitwarden/web/issues/254).
+
## Get in touch
To ask an question, [raising an issue](https://github.com/dani-garcia/bitwarden_rs/issues/new) is fine, also please report any bugs spotted here.