Block HA from sending out passwords to third party

No they wil know your IP address has passwords attached. Not necessarily weak ones

Hi guys, I’m finally back from the land of limited internet and knocked this addon up last night.

It’s very much an at your own risk solution but it’s working for me. Hopefully the devs will give us the opt out option, or at the very least not intentionally break the addon.

4 Likes

Thanks for showing this method. I think this will work to solve another problem of mine, namely that self-signed certs must be re-added every supervisor upgrade. This style of add-on can resolve that as well…

It boggles my mind that the world has come to this: adding a complete virtual OS to do something as simple as slightly modify a file or two…

To anyone interested, the password check can now be disabled with the command below in the CLI using the latest versions of either the core-ssh add-on or the community ssh add-on:

Terminal & SSH (core) version 9.1.0
SSH & Web Terminal (community) version 8.0.4

ha resolution check options --enabled=false addon_pwned

5 Likes

It works as advertised. Thank you sir.

This command no longer works. I can run other ha based commands just fine though.

~ $ ha resolution check options --enabled=false addon_pwned
ERRO[0000] Unexpected server response
Unexpected server response

Is this command documented anywhere else, specifically how it’s changed since mid-March?

You are right. It doesn’t work anymore.
Cannot verify if only command doesn’t work or the feature itself has been removed (if Superviser stick with enabed=false addon_pwned)

1 Like

Raised github issue:

2 Likes