13

I'm running my own HA locally, in my house, but I would like to be able to access it also when I'm not home. So I've put it on my Zerotier One VPN, which works fine. Except for two things:

  1. HA no longer knows when I'm home - it thinks I'm always home;

  2. Other people in my household would also like to have remote access, but it's unrealistic to have them install and use the VPN.

So - can I just open it up, and rely on long, complex passeords? Or is that a complete no-go?

top 33 comments
sorted by: hot top controversial new old
[-] tofu@lemmy.nocturnal.garden 9 points 1 week ago

It's generally fine to open it up, if your somewhat know what you're doing. I wouldn't do it without some protection measures like fail2ban and making sure HA is always up to date.

Nabu Casa, the manufacturer of HA, has a paid option where they take care of publicly accessing your local HA instance. I think that's a good solution as well. It includes backups on their servers.

[-] ropatrick@lemmy.world 4 points 1 week ago

Nabu Casa is the way. Built by Home Assistant for Home Assistant, and utterly seamless and reliable (in my experience).

Most importantly it supports the developers who have created this amazing piece if software! Do it! 👍🏼🙏🏼

[-] warmaster@lemmy.world -1 points 1 week ago

Absolutely, cost-wise is almost the same as any other alternative, plus you support the devs. No brainier choice. I'm 100% in.

[-] 4lan@lemmy.world 3 points 1 week ago* (last edited 1 week ago)

not cheaper than free, tailscale is free

[-] dislabled@lemmy.ml 7 points 1 week ago

I don't really see why you shouldn't... I have mine behind a reverse proxy, which puts SSL on the public endpoint. The biggest "issue" today, is the isp rotating my ipv4 address to often.

[-] batshit@lemmy.world 2 points 1 week ago

Can you not buy a static IP address from them? It's inexpensive

[-] dislabled@lemmy.ml 1 points 1 week ago

My ISP only have static ipv4 available for businesses. The price increase is quite a lot. I have been experimenting with ipv6, though I will loose connection when I am at someone else's WiFi with no ipv6.. It's there as a fallback for now.

[-] batshit@lemmy.world 1 points 1 week ago

That kind of blows, I'm blessed with an ISP who doesn't discriminate against power users and I get it gor relatively cheap (~$15 per month)

[-] floquant@lemmy.dbzer0.com 1 points 1 week ago

DDNS might help you with that

[-] dislabled@lemmy.ml 1 points 1 week ago

Yeah, I just made a quick script that queries my public IP every 5 minutes, then changes the a-records via the registrar's API, if it detects a change.

[-] shortwavesurfer@lemmy.zip 5 points 1 week ago

I have mine available as a tor hidden service.

[-] hendrik@palaver.p3x.de 5 points 1 week ago

Mine is open to the internet, via a nginx reverse proxy. I made it ban people who try to brute-force my password. It's been fine like that for years now:

http:  
  trusted_proxies:  
    - w.x.y.z  
  use_x_forwarded_for: true  
  ip_ban_enabled: true  
  login_attempts_threshold: 10  
[-] spitfire@lemmy.world 1 points 1 week ago

Thanks, TIL about the built in ip ban

[-] CameronDev@programming.dev 3 points 1 week ago

Mine is on the internet. The real risk is a zero day auth bypass, password cracking won't really work when the HA interface sends notifications on authentication failures.

[-] vk6flab@lemmy.radio 2 points 1 week ago

Tailscale is possibly a solution for you.

[-] thr0w4w4y2@sh.itjust.works 1 points 1 week ago

If you have to open it up, then you can at least allow-list IP addresses through your firewall so it’s not everyone who gets full access.

[-] tofu@lemmy.nocturnal.garden 1 points 1 week ago

How's that supposed to work if the other people want to access it "from the Internet", most likely meaning their mobile phones when not at home? Find out all IP subnets for the carrier?

[-] undefinedTruth@lemmy.zip 1 points 1 week ago

If you don't want to use a VPN like Tailscale (or ZeroTier) then this is exactly what the Home Assistant Cloud is for. And it even has an 1-month trial.

[-] Decq@lemmy.world 1 points 1 week ago

I've got it accessible from the internet through a reverse proxy.. My default https drops all connections, so you need to access the right subdomain, which are not advertised on dns or certificates (I use a wildcard). Probably not perfect though but it helps a bit. I also have geo-blocking enabled on my pfSense router, so basically everything outside my country gets blocked by the firewall anyway.

It will always be a risk vs benefit consideration.

[-] Archer@lemmy.world 1 points 1 week ago

What I personally do is have it accessible over WireGuard. Open TCP ports to the Internet is a bad idea. This does mean you have to launch WireGuard every time, but it’s way more secure

[-] syaochan@feddit.it 0 points 1 week ago

If I understood correctly, you may find https://wgtunnel.com/ useful. No need to launch wireguard manually anymore.

[-] Archer@lemmy.world 1 points 1 week ago

Wish they had it for iOS

[-] spaghettiwestern@sh.itjust.works 1 points 1 week ago* (last edited 1 week ago)

So - can I just open it up, and rely on long, complex passeords? Or is that a complete no-go?

Install Fail2Ban on a free cloud VM and watch it for a couple of days. Seeing the never-ending intrusion attempts from around the world was a real eye-opener. There is no way I'd expose HA (or anything else except Wireguard) to the Internet. (Open WG ports appear closed unless they receive the correct key.)

In your situation I'd just pay for Home Assistant Cloud. It's not expensive and will do exactly what you want to do.

For a zero cost solution I use Tasker to automatically enable a Wireguard tunnel whenever we're not on home wifi. It allows direct access to everything on our local lan, and as a bonus prevents our wireless carrier from monitoring our Internet activities. A combination of the OpenWRT Ubus integration and a BLE integration (using inexpensive Shelly switch modules) detect when we're home with 100% accuracy.

[-] spitfire@lemmy.world 1 points 1 week ago

I’m using cloudflared to give it a bit more protection over a plain reverse proxy

[-] JustEnoughDucks@slrpnk.net 1 points 1 week ago

If you are hosting other things with it, then a reverse proxy like Caddy or Traefik + crowdsec is pretty much as good as you are going to get and you can add region blocking on your router (if that feature is available) or if you use cloudflare as a proxy.

If you want to go really crazy, you can put authelia/Authentik in front of it, depending on what else you host.

[-] QueenMidna@lemmy.ca 1 points 1 week ago

Why not a presence sensor of and kind? Check your router's WiFi client list for your phone MAC or something

[-] czardestructo@lemmy.world 1 points 1 week ago

I have it available via a reverse proxy with vouch proxy enabled for 2FA.

[-] TarantulaFudge@startrek.website 1 points 1 week ago

I've got mine accessible with SSL proxy. I would say make sure you use an alternative port to help reduce exposure during scans.

[-] CompactFlax@discuss.tchncs.de 1 points 1 week ago* (last edited 1 week ago)

Mine is on the internet behind nginx. I block connections not originating in countries that are reasonable for my family. I don’t like geoip blocking but it straight up eliminated almost all the IDS alerts. I needed to migrate to DNS based validation for certbot.

If I or my family leave the geo region, I’m “away” anyways until I return to the area and my device gets a new IP. Or I can allow the country temporarily.

With the price of oil and therefore plane tickets what it is, I won’t be leaving my geo region.

[-] SwingingTheLamp@piefed.zip 0 points 1 week ago

I work in IT at a major university, and watch the logs. My Home Assistant instance is open to the Internet behind an nginx reverse proxy with SSL. (The official add-on makes it easy.) Brute-forcing passwords on HTTPS is not really a thing anymore. I get a connection attempt or two per month at home. At work, they go for known vulnerabilities in web apps; WordPress, mostly.

[-] eleijeep@piefed.social 1 points 1 week ago

Brute-forcing passwords on HTTPS is not really a thing anymore.

Why is that?

[-] SkunkWorkz@lemmy.world -1 points 1 week ago

I just use a Cloudflare tunnel using the Cloudflared plugin and a custom domain name. So no need to open ports. I use long passwords for the users. Not sure how unsafe it is but in HA you get a notification when a failed login happened.

[-] doodlebob@lemmy.world 1 points 1 week ago

That + mtls certs from cloudflare. Anyone/thing that doesn't have the cert gets blocked.

this post was submitted on 30 Mar 2026
13 points (100.0% liked)

homeassistant

19118 readers
52 users here now

Home Assistant is open source home automation that puts local control and privacy first.
Powered by a worldwide community of tinkerers and DIY enthusiasts.

Home Assistant can be self-installed on ProxMox, Raspberry Pi, or even purchased pre-installed: Home Assistant: Installation

Discussion of Home-Assistant adjacent topics is absolutely fine, within reason.
If you're not sure, DM @GreatAlbatross@feddit.uk

founded 2 years ago
MODERATORS