Vaultwarden on OpenBSD

Leaving KeePassXC behind and getting a Hetzner CAX cloud server in one move.

IPv6

IPv6 address for vio0? (or 'autoconf' or 'none') [none] autoconf

This you? Let’s fix /etc/hostname.vio0:

inet autoconf
inet6 $addr

Add IPv6 gateway (/etc/mygate):

fe80::1%vio0

Add the missing Hetzner recursive name servers (/etc/resolv.conf):

nameserver 185.12.64.1 # resolvd: vio0
nameserver 185.12.64.2 # resolvd: vio0
nameserver 2a01:4ff:ff00::add:1
nameserver 2a01:4ff:ff00::add:2
lookup file bind

HTTPD

I’m not using a subdomain for this. Add /etc/httpd.conf and run rcctl -d start httpd as root.

server "example.com" {
  listen on * port 80
  root "/htdocs/example.com"
  location "/.well-known/acme-challenge/*" {
    root "/acme"
    request strip 2
  }
}

Enabling HTTPS

From the relayd.conf manpage:

keypair name

The relay will attempt to look up a private key in /etc/ssl/private/name:port.key and a public certificate in /etc/ssl/name:port.crt, where port is the specified port that the relay listens on. If these files are not present, the relay will continue to look in /etc/ssl/private/name.key and /etc/ssl/name.crt. This option can be specified multiple times for TLS Server Name Indication. If not specified, a keypair will be loaded using the specified IP address of the relay as name. See ssl(8) for details about TLS server certificates.

An optional OCSP staple file will be used during TLS handshakes with this server if it is found as a non-empty file in /etc/ssl/name:port.ocsp or /etc/ssl/name.ocsp. The file should contain a DER-format OCSP response retrieved from an OCSP server for the certificate in use, and can be created using ocspcheck(8).

Configure /etc/acme-client.conf:

authority letsencrypt {
  api url "https://acme-v02.api.letsencrypt.org/directory"
  account key "/etc/ssl/private/letsencrypt.key"
}

domain example.com {
  alternative names { www.example.com }
  domain key "/etc/ssl/private/example.com.key"
  domain certificate "/etc/ssl/example.com.crt.leaf"
  domain full chain certificate "/etc/ssl/example.com.crt"
  sign with letsencrypt
}

Now run acme-client -v example.com and crontab -e.

0       0       *       *       *       acme-client example.com && rcctl restart relayd

relayd

$ cat /etc/relayd.conf
table <vaultwarden-default-host> { 127.0.0.1 }
table <vaultwarden-websocket-host> { 127.0.0.1 }

http protocol vaultwarden-https {
  match request header append "X-Real-IP" value "$REMOTE_ADDR"
  match request header append "Host" value "$HOST"
  match request header append "X-Forwarded-For" value "$REMOTE_ADDR"
  match request header append "X-Forwarded-By" value "$SERVER_ADDR:$SERVER_PORT"
  match request path "/*" forward to <vaultwarden-default-host>
  match request path "/notifications/hub" forward to \
    <vaultwarden-websocket-host>
  match request path "/notifications/hub/negotiate" forward to \
    <vaultwarden-default-host>

  tcp { nodelay, sack, backlog 128 }

  tls keypair example.com
  tls { no tlsv1.0, ciphers HIGH }

  http websockets
}

relay vaultwarden-https-relay {
  listen on egress port 443 tls
  protocol vaultwarden-https
  forward to <vaultwarden-default-host> port 8000
}

Vaultwarden

As root:

# pkg_add vaultwarden vaultwarden-web
# vi /var/vaultwarden/.env

Example config:

DATA_FOLDER=data
ENABLE_WEBSOCKET=true
DOMAIN=https://example.com
LOG_FILE=data/vaultwarden.log
LOG_LEVEL=error

Disable signups after yourself.

Going live!

As root: rcctl -d start relayd vaultwarden. You can now import data to your vault.

Further reading


OpenBSD IPv6-only Networking & Firewall
Enable HTTPS with acme-client(1) and Let’s Encrypt on OpenBSD
Self hosted - Problem connecting server - Android #272
OpenBSD, Let’s Encrypt, and Full Certificate Chains
Run Your Own LastPass on Hardened OpenBSD
OpenBSD 7.5 - relayd -> vaultwarden - websockets not working
Import Data to your Vault