aboutsummaryrefslogtreecommitdiff
path: root/README.md
diff options
context:
space:
mode:
authorMiroslav Prasil <[email protected]>2018-09-03 10:53:52 +0100
committerMiroslav Prasil <[email protected]>2018-09-03 10:53:52 +0100
commit1bced97e0495023b2140396ec1370b3f93066c4d (patch)
tree031c7aaf67d073c78951c71f29342d989c71a625 /README.md
parentf94e62602120ccf0f1828a1957afcdfe92d70004 (diff)
downloadvaultwarden-1bced97e0495023b2140396ec1370b3f93066c4d.tar.gz
vaultwarden-1bced97e0495023b2140396ec1370b3f93066c4d.zip
Add info on running over HTTP (documentation for #153)
Diffstat (limited to 'README.md')
-rw-r--r--README.md7
1 files changed, 7 insertions, 0 deletions
diff --git a/README.md b/README.md
index 37918219..1447c807 100644
--- a/README.md
+++ b/README.md
@@ -48,6 +48,7 @@ _*Note, that this project is not associated with the [Bitwarden](https://bitward
- [Changing user email](#changing-user-email)
- [Creating organization](#creating-organization)
- [Inviting users into organization](#inviting-users-into-organization)
+ - [Running on unencrypted connection](#running-on-unencrypted-connection)
- [Get in touch](#get-in-touch)
## Features
@@ -366,6 +367,12 @@ We use upstream Vault interface directly without any (significant) changes, this
The users must already be registered on your server to invite them, because we can't send the invitation via email. The invited users won't get the invitation email, instead they will appear in the interface as if they already accepted the invitation. Organization admin then just needs to confirm them to be proper Organization members and to give them access to the shared secrets.
+### Running on unencrypted connection
+
+It is strongly recommended to run bitwarden_rs service over HTTPS. However the server itself while supporting it does not strictly require such setup. This makes it a bit easier to spin up the service in cases where you can generally trust the connection (internal and secure network, access over VPN,..) or when you want to put the service behind HTTP proxy, that will do the encryption on the proxy end.
+
+Running over HTTP is still reasonably secure provided you use really strong master password and that you avoid using web Vault over connection that is vulnerable to MITM attacks where attacker could inject javascript into your interface. However some forms of 2FA might not work in this setup and [Vault doesn't work in this configuration in Chrome](https://github.com/bitwarden/web/issues/254).
+
## Get in touch
To ask an question, [raising an issue](https://github.com/dani-garcia/bitwarden_rs/issues/new) is fine, also please report any bugs spotted here.