Home Assistant Community Add-on: Tor

Hi, whenever I run the tor addon, I get

The following components and platforms could not be set up:

homekit
zeroconf
default-config
ios
Please check your config.

with the following error in the logs OSError: [Errno 105] No buffer space available.

I guess it’s not directly linked to the tor addon (I run 20 containers + 7 networks including Swarm overlays) an I must have hit a limit somewhere. The tor addon seems to be the straw that broke the camel’s back :slight_smile:

Has someone encountered the same problem ? Any clue ?

Oups, found a fix in here: Zeroconf error

I don’t know if these are the most optimal values, but it works :smiley:

:tada: Release v2.2.0

Full Changelog

This is a general maintenance release.

:hammer: Changes

  • :books: Update add-on installation instructions
  • :fireworks: Updates maintenance/license year to 2020
  • :pencil2: Funding adjustments
  • :pencil2: Fixes some spelling and grammar
  • :arrow_up: Upgrades add-on base image to v6.0.1
  • :arrow_up: Upgrades tor to 0.4.1.7-r0
  • :ambulance: Fix hostname detection

Questions? Join our Discord server! https://discord.me/hassioaddons
Enjoying my add-ons? Consider supporting my work:
https://github.com/sponsors/frenck or https://patreon.com/frenck

Thanks for maintaining the add-on!
Any hope of fixing stealth mode?

Stealth mode works for me.

mine works just fine unless I set stealth: true
probably if I’m the only lucky one that doesn’t count…

Just setting stealth mode is not enough, you have to configure you clients and make sure to use the v2, not the v3 versions.

But what’s the point of configuring my clients if the add-on fails to start when I change stealth to true?
Or I’m missing something else?

:tada: Release v2.3.0

Full Changelog

This is a general maintenance release.

:hammer: Changes

  • :books: Update add-on documentation to use new YAML configuration format
  • :hammer: Re-branding
  • :hammer: Update add-on config with new password & list features
  • :arrow_up: Upgrades add-on base image to v7.0.2
  • :hammer: Update community forum links
  • :pencil2: Replace some Hass.io occurances

Questions? Join our Discord server! https://discord.me/hassioaddons
Enjoying my add-ons? Consider supporting my work:
https://github.com/sponsors/frenck or https://patreon.com/frenck

Hi, since the TOR developers announced support for V2 will end soon, will the add-on support v3 (with authentication)?

Hi, I’ve just tried setting this up. I get no errors and a valid .onion address. I’ve got the browser and it prompts with user and password. When I enter valid credentials it appears to login and then comes up with the HA logo and “retry” underneath.

I noticed I had a notification of a failed login from a 172.x.x.x address so I added trusted networks into my config.yaml. This changes it so I can select a user, but still gets the same results.

Any ideas?

Hello,

I have installed Tor add-on with this configuration:

log_level: info
socks: false
hidden_services: true
stealth: true
client_names:
  - haremote1
  - haremote2
ports:
  - 8123
My logs are:

s6-init] making user provided files available at /var/run/s6/etc...exited 0.
[s6-init] ensuring user provided files have correct perms...exited 0.
[fix-attrs.d] applying ownership & permissions fixes...
[fix-attrs.d] 10-tor: applying... 
[fix-attrs.d] 10-tor: exited 0.
[fix-attrs.d] done.
[cont-init.d] executing container initialization scripts...
[cont-init.d] 00-banner.sh: executing... 
-----------------------------------------------------------
 Add-on: Tor
 Protect your privacy and access Home Assistant via Tor.
-----------------------------------------------------------
 Add-on version: 2.4.1
 You are running the latest version of this add-on.
 System: HassOS 4.17  (aarch64 / raspberrypi4-64)
 Home Assistant Core: 0.118.3
 Home Assistant Supervisor: 2020.12.2
-----------------------------------------------------------
 Please, share the above information when looking for help
 or support in, e.g., GitHub, forums or the Discord chat.
-----------------------------------------------------------
[cont-init.d] 00-banner.sh: exited 0.
[cont-init.d] 01-log-level.sh: executing... 
Log level is set to INFO
[cont-init.d] 01-log-level.sh: exited 0.
[cont-init.d] 10-requirements.sh: executing... 
[cont-init.d] 10-requirements.sh: exited 0.
[cont-init.d] 20-dirs.sh: executing... 
[cont-init.d] 20-dirs.sh: exited 0.
[cont-init.d] 50-tor-log.sh: executing... 
[cont-init.d] 50-tor-log.sh: exited 0.
[cont-init.d] 51-tor-socks.sh: executing... 
[cont-init.d] 51-tor-socks.sh: exited 0.
[cont-init.d] 52-tor-services.sh: executing... 
[cont-init.d] 52-tor-services.sh: exited 0.
[cont-init.d] 90-hostname.sh: executing... 
[05:53:01] INFO: Starting Tor temporarly...

The add-on doesn’t give me the authentication cookie. Could it be because I have AdGuard and Wireguard installed?

Can someone tell me why the addon stops at the last line of my last post (starting tor temporarily…) ?
I have trusted networks on. Could be because of this?
I am stuck

Hi!

I’m having an issue when entering more than one client in the config when enabling stealth mode.

My config looks like this:

socks: false
hidden_services: true
stealth: true
client_names:
  - test1
  - test2
ports:
  - '1111'
  - '1111:443'

The log outputs the following:

[s6-init] making user provided files available at /var/run/s6/etc...exited 0.
[s6-init] ensuring user provided files have correct perms...exited 0.
[fix-attrs.d] applying ownership & permissions fixes...
[fix-attrs.d] 10-tor: applying... 
[fix-attrs.d] 10-tor: exited 1.
[fix-attrs.d] done.
[cont-init.d] executing container initialization scripts...
[cont-init.d] 00-banner.sh: executing... 
-----------------------------------------------------------
 Add-on: Tor
 Protect your privacy and access Home Assistant via Tor.
-----------------------------------------------------------
 Add-on version: 3.0.3
 You are running the latest version of this add-on.
 System: xxx
 Home Assistant Core: 2021.3.4
 Home Assistant Supervisor: 2021.03.6
-----------------------------------------------------------
 Please, share the above information when looking for help
 or support in, e.g., GitHub, forums or the Discord chat.
-----------------------------------------------------------
[cont-init.d] 00-banner.sh: exited 0.
[cont-init.d] 01-log-level.sh: executing... 
[cont-init.d] 01-log-level.sh: exited 0.
[cont-init.d] 10-requirements.sh: executing... 
[cont-init.d] 10-requirements.sh: exited 0.
[cont-init.d] 20-dirs.sh: executing... 
[cont-init.d] 20-dirs.sh: exited 0.
[cont-init.d] 50-tor-log.sh: executing... 
[cont-init.d] 50-tor-log.sh: exited 0.
[cont-init.d] 51-tor-socks.sh: executing... 
[cont-init.d] 51-tor-socks.sh: exited 0.
[cont-init.d] 52-tor-services.sh: executing... 
[cont-init.d] 52-tor-services.sh: exited 0.
[cont-init.d] 90-hostname.sh: executing... 
[03:03:06] INFO: Starting Tor temporarly...
[03:03:13] INFO: ---------------------------------------------------------
[03:03:13] INFO: Your Home Assistant instance is available on Tor!
[03:03:13] INFO: Addresses & Auth cookies:
[03:03:13] INFO: xxxx.onion xxxx # client: test2
[03:03:13] INFO: ---------------------------------------------------------
[cont-init.d] 90-hostname.sh: exited 0.
[cont-init.d] done.
[services.d] starting services
[services.d] done.
[03:03:13] INFO: Starting Tor...
Mar 25 03:03:13.949 [notice] Tor 0.4.4.8 running on Linux with Libevent 2.1.12-stable, OpenSSL 1.1.1j, Zlib 1.2.11, Liblzma 5.2.5, and Libzstd 1.4.5.
Mar 25 03:03:13.949 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
Mar 25 03:03:13.950 [notice] Read configuration file "/etc/tor/torrc".
Mar 25 03:03:13.957 [warn] Option 'HiddenServiceAuthorizeClient' used more than once; all but the last value will be ignored.
Mar 25 03:03:13.962 [warn] DEPRECATED: Onion service version 2 are deprecated. Please use version 3 which is the default now. Currently, version 2 is planned to be obsolete in the Tor version 0.4.6 stable series.
******Mar 25 03:03:13.000 [warn] Option 'HiddenServiceAuthorizeClient' used more than once; all but the last value will be ignored.******
Mar 25 03:03:14.000 [notice] Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Mar 25 03:03:15.000 [notice] Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Mar 25 03:03:15.000 [warn] You are running Tor as root. You don't need to, and you probably shouldn't.
Mar 25 03:03:16.000 [notice] Bootstrapped 0% (starting): Starting
Mar 25 03:03:18.000 [notice] Starting with guard context "default"
Mar 25 03:03:19.000 [notice] Bootstrapped 5% (conn): Connecting to a relay
Mar 25 03:03:19.000 [notice] Bootstrapped 10% (conn_done): Connected to a relay
Mar 25 03:03:20.000 [notice] Bootstrapped 14% (handshake): Handshaking with a relay
Mar 25 03:03:20.000 [notice] Bootstrapped 15% (handshake_done): Handshake with a relay done
Mar 25 03:03:20.000 [notice] Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits
Mar 25 03:03:20.000 [notice] Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits
Mar 25 03:03:20.000 [notice] Bootstrapped 95% (circuit_create): Establishing a Tor circuit
Mar 25 03:03:20.000 [notice] Bootstrapped 100% (done): Done

On the 14th last row marked with ***** it says that it will only read the last entry and ignore all other entries explicitly. How do one do this now?

Thanks for the addon!

EDIT: found out by testing :slight_smile:

client_names:
  - 'test1,test2'

Hi,

Trying to set up tor but getting the following:

Jun 30 22:16:15.000 [notice] Bootstrapped 100% (done): Done
Jun 30 22:16:51.000 [warn] http status 400 (“Nonauthoritative directory does not accept posted server descriptors”) response from dirserver ‘46.38.253.161:443’. Malformed rendezvous descriptor?

Im using below configuration:

hidden_services: true
stealth: false
client_names: []
ports:
  -  '8123:80'
log_level: info

Please assist!
Thanks!

Good morning all,

Just configured for a remote install, and it works flawlessly.

When connecting via Onion Browser though, it warns me that V2 of the protocol is deprecated and we should use V3… not sure if it was already discussed and planned?

Otherwise I’m open to solutions to upgrade DYI.

Hello,

I think that Tor is not working anymore, support for V2 addresses has been stopped!
A few minutes ago my Tor browser is auto updated and I’m trying to reach my remote home assistant which has V2 address and it is not working anymore.

Nov 15 19:13:15.874 [warn] DEPRECATED: Onion service version 2 are deprecated. Please use version 3 which is the default now. Currently, version 2 is planned to be obsolete in the Tor version 0.4.6 stable series.

thx for any info!

…same for me. Updated to the latest Tor browser automatically and the onion access is now failing.
Is there any plans to move the Tor addon to onion Lvl 3?

Many thanks

Me too…

Server is responding err 400

[warn] http status 400 ("Nonauthoritative directory does not accept posted server descriptors") response from dirserver '51.15.51.15:443'. Malformed rendezvous descriptor?

And client issues this:

Details: 0xF6 — The provided .onion address is invalid. This error is returned due to one of the following reasons: the address checksum doesn't match, the ed25519 public key is invalid, or the encoding is invalid.

Some more info:

It works if your client has the old stack (aka version 10.5)

I was able to use it from a Tor Browser version 11.0.1 when a 10.5 tor browser has been previusly inititaded and connected to tor network.

So, it seems some little tickle in the tor server running inside the tor add-on.