You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
There were a couple of threads in our forum with scary titles like "[I have been Hacked](https://community.home-assistant.io/t/i-have-been-hacked/53723)", "[HA security and hacking](https://community.home-assistant.io/t/ha-security-and-hacking/54322)" or "[I got hacked](https://community.home-assistant.io/t/i-got-hacked/54083)". Of course, do those long discussions contain some rumors, speculations and assumptions.
15
+
There were a couple of threads in our forum with scary titles like "[I have been Hacked](https://community.home-assistant.io/t/i-have-been-hacked/53723)", "[HA security and hacking](https://community.home-assistant.io/t/ha-security-and-hacking/54322)" or "[I got hacked](https://community.home-assistant.io/t/i-got-hacked/54083)". Of course, these long discussions contain some rumors, speculations and assumptions.
16
16
17
-
Just to be clear: We, the Home Assistant Developer, take security, privacy and integrity very serious.
17
+
Just to be clear: We, the Home Assistant Developers, take security, privacy and integrity very serious.
18
18
19
-
As a large amount of users are running [Hass.io](/hassio/), I'm going to use a Raspberry Pi 3 B and Hass.io 0.70.0 to show how Home Assistant looks from the network side. This is not a full blown investigation, just a quick overview to give you some closure.
19
+
As a large number of users are running [Hass.io](/hassio/), I'm going to use a Raspberry Pi 3 B and Hass.io 0.70.0 to show how Home Assistant looks from the network side. This is not a full blown investigation, just a quick overview to give you some closure.
20
20
21
-
The IP address of the Home Assistant machine is 192.168.0.215. The system which is the source of the scans is a machine running Fedora 27 and Nmap 7.60 is used to preform the port scans. Both systems are in the same network. Internet access is provided by a Opnsense firewall which is connected to the cable modem of my ISP.
21
+
The IP address of the Home Assistant machine is 192.168.0.215. The system which is the source of the scans is a machine running Fedora 27 and Nmap 7.60 is used to preform the port scans. Both systems are in the same network. Internet access is provided by a OPNsense firewall which is connected to the cable modem of my ISP.
22
22
23
23
There is an `api_password` set but otherwise Hass.io is running with a default configuration that is created on the first launch.
24
24
25
-
The default port of Home Assistant is 8123. This is the port where the [`frontend`](/components/frontend/) and the [`API`](/components/api/)is served. Both are depending on the [`http`](/components/http/) component which contains the capability to adjust the settings like `server_host` or `server_port`.
25
+
The default port of Home Assistant is 8123. This is the port where the [`frontend`](/components/frontend/) and the [`API`](/components/api/)are served. Both are depending on the [`http`](/components/http/) component which contains the capability to adjust the settings like `server_host` or `server_port`.
26
26
27
27
In the next section we are going to test Hass.io with the three most popular add-ons.
28
28
@@ -67,11 +67,11 @@ OS and Service detection performed. Please report any incorrect results at https
67
67
Nmap done: 1 IP address (1 host up) scanned in 726.23 seconds
68
68
```
69
69
70
-
That port 22 and 8123 are open was expected. On port 22222 is an additional SSH server running. This port is for [debugging](https://developers.home-assistant.io/docs/en/hassio_debugging.html) and supports only a login with a key. This means that you would need to remove the SD card from your Raspberry Pi, create an `authorized_keys` with your SSH public key in it and put the SD Card back in your Pi to get access.
70
+
That port 22 and 8123 are open was expected. On port 22222 is an additional SSH server running. This port is for [debugging](https://developers.home-assistant.io/docs/en/hassio_debugging.html) and only supports login with a key. This means that you would need to remove the SD card from your Raspberry Pi, create an `authorized_keys` file with your SSH public key in it and put the SD Card back in your Pi to get access.
While setting up the [Mosquitto MQTT broker add-on](/addons/mosquitto/) no settings very modified. The add-on will run with the default settings.
74
+
While setting up the [Mosquitto MQTT broker add-on](/addons/mosquitto/) no settings were modified. The add-on will run with the default settings.
75
75
76
76
```bash
77
77
$ sudo nmap -A -n --reason -Pn -T5 -p1-65535 192.168.0.215
@@ -112,7 +112,7 @@ OS and Service detection performed. Please report any incorrect results at https
112
112
Nmap done: 1 IP address (1 host up) scanned in 223.76 seconds
113
113
```
114
114
115
-
Instead of port 22 is now port 1883 open. To secure MQTT to consider to use certificates and to specify users with password under `logins:` at least.
115
+
Instead of port 22 now port 1883 is open. To secure MQTT consider using certificates and specifying users with password under `logins:` at least.
116
116
117
117
## {% linkable_title Hass.io 0.70.0 with Samba Add-on %}
118
118
@@ -217,21 +217,21 @@ But without username and password you can't get access to the configuration file
217
217
218
218
## {% linkable_title Allowing remote access %}
219
219
220
-
Home Assistant is NOT able to change the configuration of your router or firewall. This means that you need to setup port-forwarding and adjusting firewall rules if you want to allow access from the internet. By default your frontend, Mosquitto, SSH and your Samba shares are only accessible from your local network.
220
+
Home Assistant is NOT able to change the configuration of your router or firewall. This means that you need to setup port-forwarding and adjust firewall rules if you want to allow access from the internet. By default your frontend, Mosquitto, SSH and your Samba shares are only accessible from your local network.
221
221
222
222
Beside the recommendation in the [Securing checklist](/docs/configuration/securing/) for remote access also check those points:
223
223
224
-
- Don't use forward the ports used by the Samba add-on.
225
-
- Use `ip_ban_enabled` and `login_attempts_threshold`. A brute force attack on the frontend or SSH is a treat.
224
+
- Don't forward the ports used by the Samba add-on.
225
+
- Use `ip_ban_enabled` and `login_attempts_threshold`. A brute force attack on the frontend or SSH is a threat.
226
226
- Disable `trusted_networks`.
227
227
- Limit the access to the Home Assistant frontend. Don't allow access to the [Configurator add-on](/addons/configurator/) for the internet.
228
228
- Check the [UPnP](https://en.wikipedia.org/wiki/Universal_Plug_and_Play) settings of your router/firewall and disable it when not needed.
229
-
- Review your router/firewall logs on a regular base.
229
+
- Review your router/firewall logs on a regular basis.
230
230
- If possible, use the VPN feature of your router or firewall to get access to your home network and Home Assistant.
231
231
232
232
## {% linkable_title Summary %}
233
233
234
-
As you can see in the results of the scans only the ports which are needed by a running services are open. If you stop an add-on then the port is no longer accessible and the porosity of your Hass.io machine will decrease.
234
+
As you can see in the results of the scans, only the ports which are needed by a running services are open. If you stop an add-on then the port is no longer accessible and the porosity of your Hass.io machine will decrease.
235
235
236
236
We don't have an unique server banner but in combination with the HTML title `Home Assistant`, is it simple to identify Home Assistant instances.
0 commit comments