This component offers presence detection by looking at connected devices to a Huawei router.
-Currently, this was only tested with the Huawei HG8247H (used by Vodafone Portugal).
+Currently, this was only tested with the Huawei HG8247H and HG8247Q Smart Router (used by Vodafone Portugal).
To use a Huawei router in your installation, add the following to your configuration.yaml file:
# Example configuration.yaml entrydevice_tracker:
diff --git a/docs/ecosystem/tor/index.html b/docs/ecosystem/tor/index.html
index 082832e133..b62e902c02 100644
--- a/docs/ecosystem/tor/index.html
+++ b/docs/ecosystem/tor/index.html
@@ -75,17 +75,14 @@
-
This is an example about how you can configure Tor to provide secure remote access to your Home Assistant instance as an Onion site, through Tor’s Hidden Service feature. With this enabled, you do not need to open your firewall ports or setup HTTPS to enable secure remote access.
+
This article guides your through the configuration of Tor to provide a secure access to your Home Assistant instance as an Onion site, through Tor’s Hidden Service feature, from remote. With this enabled, you do not need to open your firewall ports or setup HTTPS to enable secure remote access.
This is useful if you want to have:
-
Access your Home Assistant instance remotely without opening a firewall port or setting up a VPN
-
Don’t want to or know how to get an SSL/TLS certificate and HTTPS configuration setup
-
Want to block attackers from even being able to access/scan your port and server at all
-
Want to block anyone from knowing your home IP address and seeing your traffic to your Home Assistant
+
Access your Home Assistant instance remotely without opening a firewall port or setting up a VPN.
+
Don’t want to or know how to get an SSL/TLS certificate and HTTPS configuration setup.
+
Want to block attackers from even being able to access/scan your port and server at all.
+
Want to block anyone from knowing your home IP address and seeing your traffic to your Home Assistant.
-
Background and Contact
-
This configuration is part of an effort to apply strong cryptography technologies (like Onion Routing and End-to-End Encryption) to technology we increasingly depend on in our day to day lives. Just like when WhatsApp enabled end-to-end encryption messaging for everyone, every home automation and IoT platform should do the same, because A) the technology is all there, freely licensed and open-source and B) up to this point, all the commercial manufacturers have been doing a horrific job with security.
-
You can learn more about how Tor can be used to secure home automation and IoT platforms through this short set of slides on the Internet of Onion Things
Hidden Services and Onion Sites
Tor allows clients and relays to offer hidden services. That is, you can offer a web server, SSH server, etc., without revealing your IP address to its users. In fact, because you don’t use any public address, you can run a hidden service from behind your firewall. Learn more about Hidden Services on the Tor Project website.
The “stealth” entry above ensures traffic to and from your Home Assistant instance over Tor, is hidden even from other nodes on the Tor network. The haremote1 value is a generic client name entry that you can modify as you please.
Then, restart Tor:
-
$ sudo /etc/init.d/tor restart
+
$ sudo systemctl restart tor
Then read the new generated authentication cookie from the Tor-generated hostname file:
If you always access your Home Assistant instance via Tor, you can easily run this on an isolated “IoT” network segment at your install site, keeping your internal home network traffic separate from any potentially compromised devices (like cheap “smart” lightbulbs with backdoors!).
You could also use Tor as a means to connect your Home Assistant instance to a remote device, sensor or other service that you do not want to or connect provide a direct, open IP connection to. Again, Tor provides authenticated and confidential routing (aka “privacy and encryption”) by default, without having to setup TLS/SSL or VPN. It is just important to secure IoT nodes within your network, as it is to secure remote access!
As mentioned, with Orbot on Android, you can enable a “full device” VPN mode, that allows any app you have to tunnel through Tor, even if it is not Tor or proxy aware. This means you should be able to enter your “dot onion” Onion site address into any app you want to access to your Home Assistant instance, and it should work.