quic-go
vaultwarden
quic-go | vaultwarden | |
---|---|---|
2 | 489 | |
7,799 | 33,546 | |
- | - | |
10.0 | 8.8 | |
over 1 year ago | 5 days ago | |
Go | Rust | |
MIT License | GNU Affero General Public License v3.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
quic-go
-
Selfhosted Vaultwarden - Problem beim aufsetzen
2023/05/04 11:38:37 failed to sufficiently increase receive buffer size (was: 208 kiB, wanted: 2048 kiB, got: 416 kiB). See https://github.com/lucas-clemente/quic-go/wiki/UDP-Receive-Buffer-Size for details.
-
Cannot access Services run through Traefik - keep getting 521 Cloudflare error
2023-02-12T15:29:22Z INF Starting tunnel tunnelID=f0cc67d9-973b-44bd-ae58-d7c9e3b112f0 2023-02-12T15:29:22Z INF Version 2023.2.1 2023-02-12T15:29:22Z INF GOOS: linux, GOVersion: go1.19.5, GoArch: amd64 2023-02-12T15:29:22Z INF Settings: map[no-autoupdate:true token:*****] 2023-02-12T15:29:23Z INF Generated Connector ID: 0550ea9c-1c9e-4e48-9d85-defcdc33a31c 2023-02-12T15:29:23Z INF Will be fetching remotely managed configuration from Cloudflare API. Defaulting to protocol: quic 2023-02-12T15:29:23Z INF Initial protocol quic 2023-02-12T15:29:23Z INF ICMP proxy will use 172.17.0.2 as source for IPv4 2023-02-12T15:29:23Z INF ICMP proxy will use :: as source for IPv6 2023-02-12T15:29:23Z INF Starting metrics server on 127.0.0.1:45807/metrics 2023/02/12 15:29:23 failed to sufficiently increase receive buffer size (was: 208 kiB, wanted: 2048 kiB, got: 416 kiB). See https://github.com/lucas-clemente/quic-go/wiki/UDP-Receive-Buffer-Size for details. 2023-02-12T15:29:23Z INF Connection c81366ed-3bb8-479a-a832-243451980ad3 registered with protocol: quic connIndex=0 ip=198.41.192.227 location=MSP 2023-02-12T15:29:24Z INF Connection 8f2804c5-2dd7-4b2f-8400-e103c2165a80 registered with protocol: quic connIndex=1 ip=198.41.200.43 location=ORD 2023-02-12T15:29:24Z INF Updated to new configuration config="{\"ingress\":[{\"hostname\":\"portainer.mydomain.com\",\"originRequest\":{},\"service\":\"http://my-public-ip:9000\"},{\"hostname\":\"homeassistant.mydomain.com\",\"originRequest\":{},\"service\":\"http://my-public-ip:8123\"},{\"hostname\":\"frigate.mydomain.com\",\"originRequest\":{},\"service\":\"http://my-public-ip:5000\"},{\"hostname\":\"mosquitto.mydomain.com\",\"originRequest\":{},\"service\":\"http://my-public-ip:1883\"},{\"hostname\":\"ra.mydomain.com\",\"originRequest\":{},\"service\":\"http://my-public-ip:8124\"},{\"service\":\"http_status:404\"}],\"warp-routing\":{\"enabled\":false}}" version=28 2023-02-12T15:29:25Z INF Connection f5847632-f534-4cae-a4df-02e11447406e registered with protocol: quic connIndex=2 ip=198.41.192.107 location=MSP 2023-02-12T15:29:25Z INF Connection 664d6d41-b0ac-499d-894d-42e38e5bd475 registered with protocol: quic connIndex=3 ip=198.41.200.193 location=ORD 2023-02-12T15:30:16Z ERR error="Unable to reach the origin service. The service may be down or it may not be responding to traffic from cloudflared: dial tcp my-public-ip:5000: connect: connection refused" cfRay=79865d4d2bdd62bd-ORD ingressRule=2 originService=http://my-public-ip:5000 2023-02-12T15:30:16Z ERR Request failed error="Unable to reach the origin service. The service may be down or it may not be responding to traffic from cloudflared: dial tcp my-public-ip:5000: connect: connection refused" connIndex=1 dest=http://frigate.mydomain.com/api/stats ip=198.41.200.43 type=http 2023-02-12T15:31:37Z ERR error="Unable to reach the origin service. The service may be down or it may not be responding to traffic from cloudflared: dial tcp my-public-ip:5000: connect: connection refused" cfRay=79865f497bb98101-ORD ingressRule=2 originService=http://my-public-ip:5000 2023-02-12T15:31:37Z ERR Request failed error="Unable to reach the origin service. The service may be down or it may not be responding to traffic from cloudflared: dial tcp my-public-ip:5000: connect: connection refused" connIndex=1 dest=http://frigate.mydomain.com/api/stats ip=198.41.200.43 type=http
vaultwarden
-
Bitwarden
To people who want to self-host this, look at Vaultwarden which is a fully compatible alternate server with even more features:
https://github.com/dani-garcia/vaultwarden
Been running it for a year with 0 issues.
- Vaultwarden issue on sysnology
-
What program(s) do you use to remember passwords, including crypto?
For passwords and 2FA I use Bitwarden in combination with a self-hosted Vaultwarden service (for imcreased security and use of pro features for free).
- Comment gérez-vous vos mots de passe ?
-
List of your reverse proxied services
Vaultwarden as Password-Safe
-
Open Source: An Antidote to Closed Source Vulnerability
I have a lot of software that I host myself on my home server, partly to save money but also because I want to control my own data. For example, I host VaultWarden which is the open source server for BitWarden. This gives me all the premium features for free with the added bonus of keeping my passwords out of the cloud.
- Vaultwarden 1.30.0 released with passkey support
- Vaultwarden: Unofficial Bitwarden Compatible Server
-
Bitwarden: Free, open-source password manager
Self hosting is incredibly easy with vaultwarden (https://github.com/dani-garcia/vaultwarden)
-
Your privacy is optional
I have now switched to using the BitWarden app with the self-hosted VaultWarden server. I have set it up, so my passwords are only accessible when connected to my home network either physically or with a VPN (I am using tailscale for this).
What are some alternatives?
quic - QUIC protocol for Erlang & Elixir
Bitwarden - The core infrastructure backend (API, database, Docker, etc).
Passbolt - Passbolt Community Edition (CE) API. The JSON API for the open source password manager for teams!
Nginx Proxy Manager - Docker container for managing Nginx proxy hosts with a simple, powerful interface
keepassxc - KeePassXC is a cross-platform community-driven port of the Windows application “Keepass Password Safe”.
authelia - The Single Sign-On Multi-Factor portal for web apps
Nextcloud - ☁️ Nextcloud server, a safe home for all your data
sso-wall-of-shame - A list of vendors that treat single sign-on as a luxury feature, not a core security requirement.
web - The website vault (vault.bitwarden.com).
KeeWeb - Free cross-platform password manager compatible with KeePass
bitwarden - Bitwarden client applications (web, browser extension, desktop, and cli) [Moved to: https://github.com/bitwarden/clients]
totp-generator - Generates TOTP tokens in the browser