

If you are using SSH, always use public/private authentication. If you’re running HA, the host should only allow connections via 443 for the app to run, and probably SSH. It’s still possible, but the type of attack needed would require the attacker to be very consciously targeting your network specifically.Įven with the above, I would still segregate the HA host onto a DMZ network or separate subnet and heavily regulate the traffic from the LAN. That way, you can be reasonably confident that the vast majority of intruduers aren’t going to be allowed to connect. However, if you absolutely need external access (for custom Alexa skills, for example) make sure to only allow specific IP address. If you want to connect remotely, use a VPN. Depending on your smart devices, I would also recommend using a VPN on the “Main” wifi this means you not only need the wifi password, but also your VPN credentials to connect to the HA network and interact with smart devices, plus, your data traffic is encrypted and protected from sniffers (however, it can be quite tricky to make WIFI smart devices work with this setup, so it’s an added bonus, but probably not suitable for your average user).įor the HA host, I only allow connections via localhost by default, and always with SSL. For your typical household, you may well be comfortable giving visitors and friends access to your WIFI to access the internet, but you probably don’t want them unlocking your front door, or allow their already compromised device to affect your main network. One “Guest” network, which is heavily regulated, with clients unable to “see” other client devices, and one “Main” network, where clients are able to interact with other devices. In the few Home Automation installations I’ve done for others, the cost of the security work has trumped the installation, and I refuse to do installations without making sure the security setup is top notch.Įach network is different, but broadly, this is what I aim for:

When you have devices that control your locks, stove, gas fire, alarms etc, people don’t seem to click that it’s really important to prioritise security. I work in IT security, and one of my biggest issues with Home Automation, is that I see a lot of really insecure setups from people who, whilst very smart, don’t know much about digital security. Turn off remote access and just enjoy HASS on local network only.Leave config as is, just frequently change my password.Go back using Let’s Encrypt and put up with not using emulated_hue.
#Home assistant sophos password#
look at finding a way to block incoming IP addresses so they can’t even get to the password splash screen?.But before I do, just looking into what the best approach is until there are fixes… So I’m revisiting encryption and trying to get it to work this time. I looked up the IP and it’s definitely someone trying to break in. 3 months passed and my Let’s Encrypt expired and I got my first invalid password warning. Yes, I know it’s not safe, but since Home Assistant logs unsuccessful password attempts I thought that would be sufficient to warn me if someone was trying.

So I just disabled it so had no encryption but remote access still enabled. A bit of background, I successfully got Let’s Encrypt working for remote access a few months ago but came across issues using it with emulated_hue and my Amazon Echo.
