-
Notifications
You must be signed in to change notification settings - Fork 125
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support skipping TLS verification #808
Comments
Second this issue, I want to close the 5000 unauthenticated port but I do not want to manage certificate |
Third. I'm blown away that it took this long to get HA to communicate securely with Frigate and this seems to be the final blocker for it to work. I would suggest that a common setup would be HA, Frigate running on two different devices but on the same internal network, in which case a valid SSL cert is unlikely. Exposing it to the internet just for a valid cert seems bonkers. |
It's an Open Source version of Occam's razor: It's just that no-one has implemented this yet, not that there is an intentional design decision. PRs are very welcome! |
There is no need to expose it. You can use the DNS method to get a valid cert with let's encrypt. If security is truly a priority on your internal network, then you shouldn't be disabling TLS verification anyway. |
Certainly this would not be the ideal setup, but I would posit that it improves security of the average setup. I have to imagine that for the average user with Frigate running on a separate host from Hass, learning how to create and maintain a valid certificate would be a significant enough hassle as to cause them to continue leaving port 5000 open for any bad actor that may come across their network. Even without TLS verification the average user gets the benefit of not having to leave port 5000 open, and not having their credentials sent over plain text. Yes this doesn't protect against a MITM attack, but I think increasing the security against crimes of opportunity are more important on a local network anyway. |
I have an self-hosted acme server for my CA and imported it in Home Assistant with this plugin: https://github.com/Athozs/hass-additional-ca But i'm still getting an error . I have also added the cert to the host and i'm not able to make it work. Any ideas on getting a self-hosted cert to be valid in this integration ? If not, the option to skip TLS verification is a must. |
I am using a docker image provided by Linuxserver.io. It allows me to run processes before the main process does. Here is what I have put into
|
Is your feature request related to a problem? Please describe.
With the new authentication feature, it is necessary to disable TLS on port 8971 in Frigate due to SSL verification inevitably failing.
Describe the solution you'd like
For security purposes, it would be ideal to allow the integration to be able to communicate over https regardless of whether or not the certificate is trusted.
Describe alternatives you've considered
A reverse proxy can be used to create a valid certificate for access over port 8971, however this requires external setup outside of Frigate that is potentially cumbersome.
Additional context
Nothing else, thanks for getting authentication support implemented!
The text was updated successfully, but these errors were encountered: