mirror of
https://github.com/bitwarden/android.git
synced 2026-03-21 13:52:07 -05:00
On-premise Hosting and different port than 443 #122
Closed
opened 2025-11-07 08:27:44 -06:00 by GiteaMirror
·
24 comments
No Branch/Tag Specified
main
sdlc/sdk-update
llm/skill-refinements
release/2026.3-rc49
PM-24380/flight-recorder-redact-hostname
sdk-folder-repo-interface
PM-25654-preview-attachment
android-collections
cx/android-architect-agent
PM-30130-remove-archive-feature-flag
llm/add-resolving-sdk-updates-skill
QA-1523/sanity-test-saucelabs
release/2026.3-rc48
PM-26577-app-links-support
PM-26896-autofill-fix
release/2026.2-rc47
PM-32714/fallback-to-web-vault-host
pr-6572
PM-28834/setting-app-layout-horizonos
release/2026.2-rc46
release/2026.1-rc45
PM-30644/added-logs-for-debug
PM-30644/quicktile-nav-not-showing-migration
minor-gradle-updates
release/2026.1-rc42
release/2026.1-rc44
release/2026.1-rc43
PM-28834/set-landscape-on-horizonos-devices
context-rules
devclarity/update-code-review-command
PM-20026/force-ltr-passwords-and-codes
release/2025.12-rc41
cmcg/testCoverage
PM-29014/talkback-support-for-passwords
release/2025.12-rc40
BRE-1305/publish_test
accept-user-certs
autofill-permissions
release/2025.11-rc39
PM-22479/check-all-certificates-validate-asset-links
release/2025.10-rc38
agalles/android-latest
optimize-test-workflows
tier2-test-sharding
retro-agent
PM-27001/skip-account-selection-only-one-exists-cxp
release/2025.10-rc37
agalles/test-1118
release/2025.10-rc36
PM-20593-token-refresh
QA-1126b/adding-native-sanity-test
release/2025.9-rc35
pm-25933/sdk-update-password
release/2025.9-rc34
release/2025.8-rc33
agalles/20250821-release
debug-release-issues
pm-24249-allow-automated-prs-for-sdk-updates
release/2025.8-rc32
release/WORKFLOW-TEST-2025.8-rc28
agalles/20250807release
release/2025.07-rc25
release/hotfix-v2025.7.0-bwa
pm-23311/export-vault-policy-bypass
release/2025.07-rc24
authenticator-pm-sync-flags-issue
ps/implement-sdk-repository-example
release/hotfix-v2025.6.0-bwpm
release/2025.06-rc21
agalles/automate-android-fastlane-patch
release/2025.05-rc20
release/2025.04-rc19
languages/basque
release/2025.03-rc19
update-readme
qrcode/feature
innovation/archive/pm-19153-archive-items
qrcode/2-ui-fields
qrcode/1-page
hold-on-biometric-prompt-alternative
release-notes-process
release/2025.02-rc16
bwa-monorepo
PM-8223/new-device-verification-ux-improvements
pm-18451/exempt-from-policies
test-bwa
cs-workaround-linked-0-copy
release/2025.01-rc15
release/2025.01-rc14
release/2024.12-rc13
pm-16670/sync-leave-notice
821
PM-16695/backport-lean-more-new-device-verification
km/15084-testing
release/hotfix-v2024.11.7
release/2024.11-rc1
pm-11304/collection-add-item-button
PM-14241/disabling-logs-app-crash
poc/offline-editing
new-version-calc
pm-11649/expired-link-services
pm-6702/add-feature-flag
pm-6702/email-verification-feature
pm-9933/marketing-copy-update
pm-6702/registration-flows
update-templates
pm-6701/email-verification-selfhost-registration
v2026.3.0-bwpm
v2026.3.0-bwa
v2026.2.1-bwpm
v2026.2.1-bwa
v2026.2.0-bwpm
v2026.2.0-bwa
v2026.1.1-bwa
v2026.1.1-bwpm
temp-test
v2026.1.0-bwpm
v2026.1.0-bwa
v2025.12.1-bwa
v2025.12.1-bwpm
v2025.12.0-bwa
v2025.12.0-bwpm
v2025.11.1-bwpm
v2025.11.1-bwa
v2025.11.0-bwpm
v2025.11.0-bwa
v2025.10.1-bwa
v2025.10.1-bwpm
v2025.10.0-bwa
v2025.10.0-bwpm
v2025.9.1-bwa
v2025.9.1-bwpm
v2025.9.0-bwa
v2025.9.0-bwpm
v2025.8.1-bwa
v2025.8.1-bwpm
v2025.8.0-bwa
v2025.8.0-bwpm
v2025.7.2-bwa
v2025.7.2-bwpm
v2025.7.1-bwa
v2025.7.1-bwpm
v2025.7.0-bwa
v2025.7.0-bwpm
v2025.6.1-bwpm
v2025.6.0-bwa
v2025.6.0-bwpm
v2025.1.0-bwa
v2025.5.0-bwa
v2025.5.0-bwpm
v2025.5.999
2025.4.0
v2025.4.0
untagged-4731eaadac73f3dfbbb8
v2025.3.0
v2025.2.0
untagged-815a165c5d70ffe75bc7
v2025.1.2
v2025.1.1
v2025.1.0
v2024.12.0
untagged-5a76b6392a4c8998c63a
v2024.11.7
v2024.11.6
v2024.11.5
v2024.11.4
v2024.11.3
v2024.11.2
v2024.11.1
v2024.11.0
v2024.10.2
v2024.10.1
v2024.10.0
v2024.9.0
v2024.8.1
v2024.8.0
v2024.7.3
v2024.7.2
v2024.7.1
v2024.7.0
v2024.6.1
v2024.6.0
v2024.5.1
v2024.4.1
v2024.4.2
v2024.4.0
v2024.3.3
v2024.3.1
v2024.3.0
v2024.2.1
v2024.2.0
v2024.1.1
v2024.1.0
v2023.12.0
v2023.10.0
v2023.9.2
maui-single-project-android
v2023.9.1
v2023.9.0
v2023.8.0
v2023.7.0
v2023.5.0
v2023.4.0
v2023.3.2
v2023.3.1
v2023.3.0
v2023.2.0
v2023.1.0
v2022.11.0
v2022.10.0
v2022.9.1
v2022.9.0
v2022.8.0
v2022.6.2
v2022.6.1
v2022.6.0
v2022.05.0
v2.18.0
v2.17.0
v2.16.4
v2.16.3
v2.16.2
v2.16.1
v2.15.0
v2.14.2
v2.14.1
v2.14.0
v2.13.0
v2.12.0
v2.11.3
v2.11.2
v2.11.1
v2.11.0
v2.10.0
v2.9.1
v2.9.0
v2.8.2
v2.8.1
v2.8.0
v2.7.2
v2.7.0
v2.6.1
v2.6.0
v2.5.6
v.2.5.5
v2.5.5
v2.5.4
v2.5.3
v2.5.2
v2.5.1
v2.5.0
v2.4.3
v2.4.2
v2.4.1
v2.4.0
v2.3.1
v2.3.0
v2.2.8
v2.2.7
v2.2.6
v2.2.2
v2.2.1
v2.2.0
v2.1.2
v2.1.0
v2.0.6
v2.0.5
v2.0.4
v2.0.3
v2.0.2
v2.0.1
v2.0.0
v1.22.1
v1.22.0
v1.21.0
v1.20.0
v1.19.0
v1.18.1
v1.18.0
v1.17.0
v1.16.0
v1.15.2
v1.15.1
v1.15.0
v1.14.4
v1.14.1
v1.14.0
v1.13.0
v1.12.2
v1.12.1
v1.12.0
v1.11.1
v1.11.0
v1.10.0
v1.9.0
v1.8.1
v1.8.0
v1.7.0
v1.6.5
v1.6.1
v1.6.0
v1.5.1
v1.5.0
v1.4.4
v1.4.3
v1.4.0
v1.3.0
v1.2.1
v1.2.0
v1.1.0
v1.0.0
v0.0.6
v0.0.5
v0.0.4
v0.0.3
v0.0.2
v0.0.1
No Label
Milestone
No items
No Milestone
Projects
Clear projects
No project
No Assignees
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/android#122
Reference in New Issue
Block a user
Blocking a user prevents them from interacting with repositories, such as opening or commenting on pull requests or issues. Learn more about blocking a user.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @tolazi on GitHub (Nov 20, 2017).
I have a Problem with my On-premise Hosting. Browser login and browser extensions work perfectly. Only the login with the Android App (version 1.12.1 and 1.12.2) does not work. I use Let´s Encrypt Certificate and another Port then 443 and the Syntax looks like e.g.:
Server URL
https:\my.ownbitwarden.com:54921
I always get the Error “There is a problem connecting to the server”.
@kspearrin commented on GitHub (Nov 20, 2017):
Are you able to monitor the network traffic (proxy maybe?) and see what the requests going out are looking like? Do they include your port properly?
@Shadow00Caster commented on GitHub (Nov 20, 2017):
I'm having this same issue and as well use a custom port. I ran a packet capture and do indeed see it going to the correct resolved IP and port as specified in my custom server URL.
15:01:40.149754 IP y.y.y.y.48745 > x.x.x.x.8091: tcp 0
15:01:40.150169 IP x.x.x.x.8091 > y.y.y.y.48745: tcp 0
15:01:40.152246 IP y.y.y.y.48745 > x.x.x.x.8091: tcp 0
15:01:40.152384 IP y.y.y.y.48745 > x.x.x.x.8091: tcp 182
15:01:40.152535 IP x.x.x.x.8091 > y.y.y.y.48745: tcp 0
15:01:40.153628 IP x.x.x.x.8091 > y.y.y.y.48745: tcp 1448
@kspearrin commented on GitHub (Nov 22, 2017):
@Shadow00Caster The issue doesn't appear to be the port. I am using your server URL and I get a SSL handshake exception:
Are you using a self-signed cert?
@Shadow00Caster commented on GitHub (Nov 22, 2017):
@kspearrin No it's an LE cert
Because of port issues, I was not able to do the auto LE as part of the installation, so I just did a manual dns option with certbot and then moved the 3 files and renamed appropriately to the bwdata/ssl folder from the certbot/live folder.
@tolazi commented on GitHub (Nov 23, 2017):
@kspearrin Sorry I was not able to monitor the network traffic. But meanwhile I think I have not an issue with the port, I think I have the same issue as Shadow00Caster with the cert.
I use Let´s Encrypt Certificate without the bitwarden docker-setup and it is not possible to connect with the App (Internet and direct LAN). I moved also the files (private.key, certificate.crt) in the directory (/bwdata/ssl/self/xxx.com/). With the browser and the browser extensions looks like the certificate is ok.
@kspearrin commented on GitHub (Nov 25, 2017):
Is it possible to test your installations on port 80/443 to see if that makes any difference?
@Shadow00Caster commented on GitHub (Nov 25, 2017):
@kspearrin Wouldn't I have to do the install script again to change nginx to 80/443 since it's listening internally on 8090/8091.
@kspearrin commented on GitHub (Nov 25, 2017):
Yes. I would just do a whole new installation folder. Is it possible to shut down the existing service on 80/443 in order to test this there, as a temporary test of course?
@kspearrin commented on GitHub (Nov 25, 2017):
Or rather, just try shutting down 80/443 first and trying your existing installation. The only reason I suggest this is I noticed that your 80/443 on the same domain has a self-signed cert and I'm wondering if it is causing some issue.
@Shadow00Caster commented on GitHub (Nov 25, 2017):
@kspearrin port 80 is not open externally and 443 which is running Home Assistant is also using a LE cert, it's not self signed. I tested the Android app again with 443 NAT disabled on my firewall, same issue.
@kspearrin commented on GitHub (Nov 25, 2017):
@Shadow00Caster when i enter your the domain you emailed us in my browser I get certificate warnings.
@Shadow00Caster commented on GitHub (Nov 25, 2017):
@kspearrin When you hit HTTP or when you hit HTTPS on the domain without the port? If you hit it without the port, that makes sense. The cert for HTTPS:443 is a different domain, so the cert does not match the domain I sent you.
ie.
https://sub.domain.com:8091 == BItWarden with matching cert from LE
https://sub1.domain.com:443 == HA with matching cert from LE
@kspearrin commented on GitHub (Nov 26, 2017):
I go to https://sub.domain.com (443) and get HSTS warnings.
@Shadow00Caster commented on GitHub (Nov 26, 2017):
Yes that makes sense because the service listening on port 443 is not bitwarden and not the domain I provided you via e-mail. The service listening on port 443 and serving a certificate is for a different domain (if you view the cert you can see that it's not the cert for the domain I sent you).
@kspearrin commented on GitHub (Nov 27, 2017):
Can you try the following to see if it changes anything? Edit
./bwdata/nginx/default.confand comment out the following line (add a#at beginning):Then restart and see if anything is different.
@tolazi commented on GitHub (Nov 27, 2017):
I changed the port to 443 (Forwarding Service Port 443 -> Internal Port 192.168.2.25:443). The same problem wit the App: “There is a problem connecting to the server”.
@kspearrin commented on GitHub (Nov 27, 2017):
@tolazi So it is not a port issue for you then?
@tolazi commented on GitHub (Nov 27, 2017):
@kspearrin Meanwhile i think the problem is with the Certificate and the App.
@Shadow00Caster commented on GitHub (Nov 27, 2017):
@kspearrin I commented out the line as suggested, same error message from mobile app. Side note, I can access the web vault from Chrome on my mobile device without issue, so it would appear the LE chain is trusted on Android at least.
@tolazi commented on GitHub (Nov 30, 2017):
@kspearrin Now i have found a solution for my issue.
I made a port Forwarding (Service Port 443 -> Internal Port 192.168.2.25:443 and Service Port 80 -> Internal Port 192.168.2.25:80). Then i start the Installer with default Ports and Let´s Encrypt. After finished the Setup i renamed the "bwdata" directory, an changed the port Forwarding (Service Port 443 -> Internal Port 192.168.2.25:54921) and start the Installer again with Port 54921 and without Let´s Encrypt. After this i copied the "letsencrypt" directory from the first setup in the new "bwdata" directory and changed Certificate-path in the nginx default.conf.
I know, this is a little bit confuse, but the Server is running with Let´s Encrypt Certificate an all seems ok. Browser login, browser extensions and the App work perfect.
@kspearrin commented on GitHub (Nov 30, 2017):
I've spent some time on this today and I cannot reproduce it. I installed a brand new installation on different ports, using Let's encrypt SSL certs. I was able to connect to it just fine with the Android app. I'm not really sure what else to try.
@tolazi commented on GitHub (Dec 1, 2017):
I am confused myself, but now all works fine. Thank you for your fast support.
@Brudertac commented on GitHub (Dec 29, 2017):
@kspearrin
Sorry to say but i think this is not resolved. I have exactly the same Problem here.
Latest bitwarden self hostet in Docker. Ports are changed away from default.
Access via webbrowser on Android Phone works fine but not in the App.
Update:
Found the Solution. I use another HTTPS Port for bitwarden. So i entered the HTTPS://URL:PORT in the Android App. This bringes the Error.
Then i setup an Reverse Proxy for my bitwarden URL so i can remove the PORT in the APP and now it works.
@kspearrin commented on GitHub (Mar 9, 2018):
This is usually always due to an improper trust chain on the SSL cert. We have updated our docs to reflect the proper steps on chaining the CS cert to resolve this problem on android.