Hello, there is mixed explanation about this. In notifications, the explanation is “The add-on … uses secrets which are detected as not secure”. However, the link in notification points to page that says “it means that you are using secrets in your configuration which have been leaked and are publicly known”. That is different. First explanation can mean that I use plaintext passwords in config files, which is on purpose and I do not intend to change it. Second explanation is that these passwords leaked to internet, which I do not believe, because I use HASSIO, which is pretty closed system, and login with password.
What is correct? Does it really mean that passwords leaked? I really do not want to go through all my mqtt sensors and reconfigure accesses.
It seems to me that the check is only if exactly same password already exists in list of leaked passwords, without any relation to my installation. In that case, I do not care.
I received that warning for my nodered add-on but wasn’t even aware that this add-on used secrets. Where in that add-on would I find the secrets to change ?
The message gives the impression that the secrets from one’s configuration have been leaked. My first thought was “I’ve been breached and my secrets.yaml file has been accessed and its contents are now publicly known?”
After that initial erroneous conclusion, I realized it simply used awkward language to say I was using a password that was known to exist in a database of stolen/hacked/pwned/known passwords. In other words, my password was not particularly unique therefore insecure; I should change the password to something better.
As far as I know, the Supervisor only tests the password. After I had changed the password for the Samba Add-on, the warning message was not repeated.
I understand you need both username and password to login but, in the interests of improving security, the developers only had the means of testing the password (and so they did). Personally, I would prefer to disable this feature and I have (by blocking access to api.pwnedpasswords.com).
If I can interpret the responses, it sounds like this ‘new feature’ wasn’t fully thought out and I can expect to have the error go away magically with another upgrade in the future.
Looks like I will just have to put up with it for now … not a big deal.
I’m getting same notification in a custom addon that have 2 passwords, one is the mosquitto one (that does not get the Insecure password notification) and another one.
I’ve installed pwnedpasswords from here https://pypi.org/project/pwnedpasswords/ in a test container and both of my passwords give as result 0, so they are not found in their databases.
Exactly. I agree to change password for root SSH, because username is known there. However, for other cases where username is used I will not change the password and I would like to get rid off the notification. How can I disable it?
What I did (and I mentioned it in a previous post in this thread) is block access to api.pwnedpasswords.com. That prevents it from performing the test. The failure is recorded in Supervisor’s log but that’s acceptable to me.
An alternative is to create an automation that immediately deletes the persistent notification produced by the password test. There are examples posted elsewhere.