Thanks for the reply. I’m using version 2.0.0 of the Tor add-on without stealth enabled. It worked great until Home Assistant version 0.9.6. It connects, but nothing but the background appears.
Mine works. Open a new issue on Github if yours doesn’t…
Hallo HA fans;
Same here with HassIO, 96.3 and 2.0.0.
First I used orbot and orfox and now single tor browser. Connection is much quicker and smoother but only a white HA background with empty blue top banner are shown. The HA-tor add-on log confirms connection!
It appears that the torrc file has been seen and taken bby Tor Browser from Otbot nnow uninstalled, is that a correct assumption?
Thanks in advance
Martin J
Release v2.1.0
Changes
- Fixes client definitions for stealth mode (#13)
- Fixes client names when in stealth mode
- Sets missing HiddenServicesVersion
- Fixes incorrect torrc configuration
- Maintaince -> Maintenance
- Upgrades add-on base image to v4.1.1
- Upgrades tor to 0.3.5.8-r0
- fixed client_names (#14)
Questions? Join our Discord server! https://discord.me/hassioaddons
Enjoying my add-ons? Consider supporting my work: https://patreon.com/frenck
Hi, whenever I run the tor addon, I get
The following components and platforms could not be set up:
homekit
zeroconf
default-config
ios
Please check your config.
with the following error in the logs OSError: [Errno 105] No buffer space available
.
I guess it’s not directly linked to the tor addon (I run 20 containers + 7 networks including Swarm overlays) an I must have hit a limit somewhere. The tor addon seems to be the straw that broke the camel’s back
Has someone encountered the same problem ? Any clue ?
Oups, found a fix in here: Zeroconf error
I don’t know if these are the most optimal values, but it works
Release v2.2.0
This is a general maintenance release.
Changes
- Update add-on installation instructions
- Updates maintenance/license year to 2020
- Funding adjustments
- Fixes some spelling and grammar
- Upgrades add-on base image to v6.0.1
- Upgrades tor to 0.4.1.7-r0
- Fix hostname detection
Questions? Join our Discord server! https://discord.me/hassioaddons
Enjoying my add-ons? Consider supporting my work:
https://github.com/sponsors/frenck or https://patreon.com/frenck
Thanks for maintaining the add-on!
Any hope of fixing stealth
mode?
Stealth mode works for me.
mine works just fine unless I set stealth
: true
probably if I’m the only lucky one that doesn’t count…
Just setting stealth mode is not enough, you have to configure you clients and make sure to use the v2, not the v3 versions.
But what’s the point of configuring my clients if the add-on fails to start when I change stealth
to true
?
Or I’m missing something else?
Release v2.3.0
This is a general maintenance release.
Changes
- Update add-on documentation to use new YAML configuration format
- Re-branding
- Update add-on config with new password & list features
- Upgrades add-on base image to v7.0.2
- Update community forum links
- Replace some Hass.io occurances
Questions? Join our Discord server! https://discord.me/hassioaddons
Enjoying my add-ons? Consider supporting my work:
https://github.com/sponsors/frenck or https://patreon.com/frenck
Hi, since the TOR developers announced support for V2 will end soon, will the add-on support v3 (with authentication)?
Hi, I’ve just tried setting this up. I get no errors and a valid .onion address. I’ve got the browser and it prompts with user and password. When I enter valid credentials it appears to login and then comes up with the HA logo and “retry” underneath.
I noticed I had a notification of a failed login from a 172.x.x.x address so I added trusted networks into my config.yaml. This changes it so I can select a user, but still gets the same results.
Any ideas?
Hello,
I have installed Tor add-on with this configuration:
log_level: info
socks: false
hidden_services: true
stealth: true
client_names:
- haremote1
- haremote2
ports:
- 8123
My logs are:
s6-init] making user provided files available at /var/run/s6/etc...exited 0.
[s6-init] ensuring user provided files have correct perms...exited 0.
[fix-attrs.d] applying ownership & permissions fixes...
[fix-attrs.d] 10-tor: applying...
[fix-attrs.d] 10-tor: exited 0.
[fix-attrs.d] done.
[cont-init.d] executing container initialization scripts...
[cont-init.d] 00-banner.sh: executing...
-----------------------------------------------------------
Add-on: Tor
Protect your privacy and access Home Assistant via Tor.
-----------------------------------------------------------
Add-on version: 2.4.1
You are running the latest version of this add-on.
System: HassOS 4.17 (aarch64 / raspberrypi4-64)
Home Assistant Core: 0.118.3
Home Assistant Supervisor: 2020.12.2
-----------------------------------------------------------
Please, share the above information when looking for help
or support in, e.g., GitHub, forums or the Discord chat.
-----------------------------------------------------------
[cont-init.d] 00-banner.sh: exited 0.
[cont-init.d] 01-log-level.sh: executing...
Log level is set to INFO
[cont-init.d] 01-log-level.sh: exited 0.
[cont-init.d] 10-requirements.sh: executing...
[cont-init.d] 10-requirements.sh: exited 0.
[cont-init.d] 20-dirs.sh: executing...
[cont-init.d] 20-dirs.sh: exited 0.
[cont-init.d] 50-tor-log.sh: executing...
[cont-init.d] 50-tor-log.sh: exited 0.
[cont-init.d] 51-tor-socks.sh: executing...
[cont-init.d] 51-tor-socks.sh: exited 0.
[cont-init.d] 52-tor-services.sh: executing...
[cont-init.d] 52-tor-services.sh: exited 0.
[cont-init.d] 90-hostname.sh: executing...
[05:53:01] INFO: Starting Tor temporarly...
The add-on doesn’t give me the authentication cookie. Could it be because I have AdGuard and Wireguard installed?
Can someone tell me why the addon stops at the last line of my last post (starting tor temporarily…) ?
I have trusted networks on. Could be because of this?
I am stuck
Hi!
I’m having an issue when entering more than one client in the config when enabling stealth mode.
My config looks like this:
socks: false
hidden_services: true
stealth: true
client_names:
- test1
- test2
ports:
- '1111'
- '1111:443'
The log outputs the following:
[s6-init] making user provided files available at /var/run/s6/etc...exited 0.
[s6-init] ensuring user provided files have correct perms...exited 0.
[fix-attrs.d] applying ownership & permissions fixes...
[fix-attrs.d] 10-tor: applying...
[fix-attrs.d] 10-tor: exited 1.
[fix-attrs.d] done.
[cont-init.d] executing container initialization scripts...
[cont-init.d] 00-banner.sh: executing...
-----------------------------------------------------------
Add-on: Tor
Protect your privacy and access Home Assistant via Tor.
-----------------------------------------------------------
Add-on version: 3.0.3
You are running the latest version of this add-on.
System: xxx
Home Assistant Core: 2021.3.4
Home Assistant Supervisor: 2021.03.6
-----------------------------------------------------------
Please, share the above information when looking for help
or support in, e.g., GitHub, forums or the Discord chat.
-----------------------------------------------------------
[cont-init.d] 00-banner.sh: exited 0.
[cont-init.d] 01-log-level.sh: executing...
[cont-init.d] 01-log-level.sh: exited 0.
[cont-init.d] 10-requirements.sh: executing...
[cont-init.d] 10-requirements.sh: exited 0.
[cont-init.d] 20-dirs.sh: executing...
[cont-init.d] 20-dirs.sh: exited 0.
[cont-init.d] 50-tor-log.sh: executing...
[cont-init.d] 50-tor-log.sh: exited 0.
[cont-init.d] 51-tor-socks.sh: executing...
[cont-init.d] 51-tor-socks.sh: exited 0.
[cont-init.d] 52-tor-services.sh: executing...
[cont-init.d] 52-tor-services.sh: exited 0.
[cont-init.d] 90-hostname.sh: executing...
[03:03:06] INFO: Starting Tor temporarly...
[03:03:13] INFO: ---------------------------------------------------------
[03:03:13] INFO: Your Home Assistant instance is available on Tor!
[03:03:13] INFO: Addresses & Auth cookies:
[03:03:13] INFO: xxxx.onion xxxx # client: test2
[03:03:13] INFO: ---------------------------------------------------------
[cont-init.d] 90-hostname.sh: exited 0.
[cont-init.d] done.
[services.d] starting services
[services.d] done.
[03:03:13] INFO: Starting Tor...
Mar 25 03:03:13.949 [notice] Tor 0.4.4.8 running on Linux with Libevent 2.1.12-stable, OpenSSL 1.1.1j, Zlib 1.2.11, Liblzma 5.2.5, and Libzstd 1.4.5.
Mar 25 03:03:13.949 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
Mar 25 03:03:13.950 [notice] Read configuration file "/etc/tor/torrc".
Mar 25 03:03:13.957 [warn] Option 'HiddenServiceAuthorizeClient' used more than once; all but the last value will be ignored.
Mar 25 03:03:13.962 [warn] DEPRECATED: Onion service version 2 are deprecated. Please use version 3 which is the default now. Currently, version 2 is planned to be obsolete in the Tor version 0.4.6 stable series.
******Mar 25 03:03:13.000 [warn] Option 'HiddenServiceAuthorizeClient' used more than once; all but the last value will be ignored.******
Mar 25 03:03:14.000 [notice] Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Mar 25 03:03:15.000 [notice] Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Mar 25 03:03:15.000 [warn] You are running Tor as root. You don't need to, and you probably shouldn't.
Mar 25 03:03:16.000 [notice] Bootstrapped 0% (starting): Starting
Mar 25 03:03:18.000 [notice] Starting with guard context "default"
Mar 25 03:03:19.000 [notice] Bootstrapped 5% (conn): Connecting to a relay
Mar 25 03:03:19.000 [notice] Bootstrapped 10% (conn_done): Connected to a relay
Mar 25 03:03:20.000 [notice] Bootstrapped 14% (handshake): Handshaking with a relay
Mar 25 03:03:20.000 [notice] Bootstrapped 15% (handshake_done): Handshake with a relay done
Mar 25 03:03:20.000 [notice] Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits
Mar 25 03:03:20.000 [notice] Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits
Mar 25 03:03:20.000 [notice] Bootstrapped 95% (circuit_create): Establishing a Tor circuit
Mar 25 03:03:20.000 [notice] Bootstrapped 100% (done): Done
On the 14th last row marked with ***** it says that it will only read the last entry and ignore all other entries explicitly. How do one do this now?
Thanks for the addon!
EDIT: found out by testing
client_names:
- 'test1,test2'
Hi,
Trying to set up tor but getting the following:
Jun 30 22:16:15.000 [notice] Bootstrapped 100% (done): Done
Jun 30 22:16:51.000 [warn] http status 400 (“Nonauthoritative directory does not accept posted server descriptors”) response from dirserver ‘46.38.253.161:443’. Malformed rendezvous descriptor?
Im using below configuration:
hidden_services: true
stealth: false
client_names: []
ports:
- '8123:80'
log_level: info
Please assist!
Thanks!
Good morning all,
Just configured for a remote install, and it works flawlessly.
When connecting via Onion Browser though, it warns me that V2 of the protocol is deprecated and we should use V3… not sure if it was already discussed and planned?
Otherwise I’m open to solutions to upgrade DYI.