mirror of
https://github.com/dani-garcia/vaultwarden.git
synced 2026-02-05 00:29:40 +03:00
WebAuthn FIDO2 connection problem with Chrome web plugin #1423
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @Nyxtorm on GitHub (Dec 12, 2022).
Subject of the issue
WebAuthn FIDO2 connection problem with Chrome web plugin
Deployment environment
Your environment (Generated via diagnostics page)
Other relevant details:
Steps to reproduce
Expected behaviour
There should be a notification to validate the WebAuthn FIDO2 key
Actual behaviour
An error when selecting dual authentication via WebAuthn FIDO 2 :
I am no longer an official Btwarden premium user and cannot validate that the problem only occurs with Vaultwarden.
The problem is apparently only present with the browser client, I have no problem authenticating via WebAuthn FIDO 2 via the Windows client, Android client or directly via the web vault.
@tessus commented on GitHub (Dec 12, 2022):
Bitwarden deactivated passwordless login in 2022.11.1. However, they activated it again in 2022.11.2. Thus it should work again when there's a new vw web-vault release.Ah, ok, it is strange that it works via the web-vault. I think that passwordless login might mean something other than FIDO2. In this case it is a Chrome plugin issue. Let's see what happens when they update it. The browser plugins are the only clients that haven't been updated to 2022.11.x yet.
What does the vw log say? Are there any error messages?
P.S.: It's way past my bed time, thus I'm heading to bed. Please don't think that I am ignoring your reply.
@BlackDex commented on GitHub (Dec 12, 2022):
WebAuthn/FIDO2 is a totally different feature then Passwordless login.
I would check your reverse proxy settings that it isn't blocking iframe's or any other security headers which could interfere with these features. Vaultwarden already has all the needed security headers activated and configured where they need to be implemented. For all the popup screens it needs to be disabled, but if the reverse proxy adds some of there own globally, that could mess everything up.
@Nyxtorm commented on GitHub (Dec 12, 2022):
@tessus,
Here is vw log during authentication, no more:
Haha no problem of course.
@BlackDex,
I don't remember changing my Nginx configuration for a long time, and I didn't have this problem before. I couldn't say exactly how long I've had it though, but for several weeks now for sure. I have no output in my nginx error logs.
Also, WebAuthn/FIDO2 authentication works fine from Android, Windows client or the web-vault.
Thank you both for your help 👍 and sorry for my English.
@Nyxtorm commented on GitHub (Dec 12, 2022):
Looking a little bit more, I notice that it's this security option that I add on Nginx that blocks the display:
But I don't understand why it only affects WebAuthn/FIDO2 (Duo Security works for example, it seems to me that it is also an iframe?) I wish I didn't need to remove this security option on my Nginx configuration.
@BlackDex commented on GitHub (Dec 12, 2022):
That specific header should not be added for all the
connectorscreens, like webauthn, duo, sso etc...We do not send that header, and others for those pages. See
b7c9a346c1/src/util.rs (L44)