⬆️ Updating add-on Tor to 2736d0e

This commit is contained in:
Community Hass.io Add-ons Bot 2025-02-20 10:05:06 +00:00
parent d26468b748
commit a842510a2c
6 changed files with 96 additions and 6 deletions

View file

@ -1104,10 +1104,10 @@ SOFTWARE.
[thelounge-armhf-shield]: https://img.shields.io/badge/armhf-no-red.svg
[thelounge-armv7-shield]: https://img.shields.io/badge/armv7-yes-green.svg
[thelounge-i386-shield]: https://img.shields.io/badge/i386-no-red.svg
[addon-tor]: https://github.com/hassio-addons/addon-tor/tree/ee43c77
[addon-doc-tor]: https://github.com/hassio-addons/addon-tor/blob/ee43c77/README.md
[addon-tor]: https://github.com/hassio-addons/addon-tor/tree/2736d0e
[addon-doc-tor]: https://github.com/hassio-addons/addon-tor/blob/2736d0e/README.md
[tor-issue]: https://github.com/hassio-addons/addon-tor/issues
[tor-version-shield]: https://img.shields.io/badge/version-ee43c77-blue.svg
[tor-version-shield]: https://img.shields.io/badge/version-2736d0e-blue.svg
[tor-aarch64-shield]: https://img.shields.io/badge/aarch64-yes-green.svg
[tor-amd64-shield]: https://img.shields.io/badge/amd64-yes-green.svg
[tor-armhf-shield]: https://img.shields.io/badge/armhf-no-red.svg

View file

@ -1,4 +1,9 @@
# Changelog since v5.0.1
- Support webtunnel, obfs and snowflake bridges (#170)
Co-authored-by: Franck Nijhof <frenck@frenck.nl>
Co-authored-by: Renat Gabdulhakov <akrigator@gmail.com>
Co-authored-by: akrigator <akrigator@users.noreply.github.com>
- ⬆️ Update ghcr.io/hassio-addons/base Docker tag to v17.2.1 (#260)
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>

View file

@ -44,6 +44,7 @@ Example add-on configuration:
```yaml
log_level: info
socks: true
http_tunnel: false
hidden_services: true
stealth: true
client_names:
@ -51,6 +52,7 @@ client_names:
- haremote2
ports:
- 8123
bridges: []
```
**Note**: _This is just an example, don't copy and past it! Create your own!_
@ -85,6 +87,12 @@ applications on your network to use the Tor network.
so exposing it in this way could leak your information to anybody watching your
network, and allow anybody to use your computer as an open proxy._
### Option: `http_tunnel`
Setting this option to `true` opens port `9080` to listen for connections from
HTTP-speaking applications. Enabling this feature allows you to use other
applications on your network to access the Tor network via the HTTP proxy.
### Option: `hidden_services`
The `hidden_services` options allows you to enable
@ -150,6 +158,62 @@ The accepted syntaxs of this configuration is:
If you do not define a published port, the local port will be used.
If you do not define a hostname or IP adress `homeassistant` will be used.
### Option: `bridges`
> Ensure the option value is clear to avoid unintended use of transport plugins and bridges.
Bridges are Tor relays that help you circumvent censorship.
Access to bridges is provided by supported transport plugins:
#### OBFS
Because bridge addresses are not public, you will need to request them yourself. You have a few options:
- Visit [Tor][tor-bridges-obfs4] project and follow the instructions, or
- Email `bridges@torproject.org` from a Gmail, or Riseup email address
- Send a message to @GetBridgesBot on Telegram. Tap on 'Start' or write /start or /bridges in the chat.
For example:
```yaml
bridges:
- >-
obfs4 123.45.67.89:443 EFC6A00EE6272355C023862378AC77F935F091E4
cert=KkdWiWlfetJG9SFrzX8g1teBbgxtsc0zPiN5VLxqNNH+iudVW48CoH/XVXPQntbivXIqZA
iat-mode=0
```
#### Webtunnel
Visit [Tor][tor-bridges-webtunnel] project and follow the instructions
For example:
```yaml
bridges:
- >-
webtunnel 192.0.2.3:1
DEADBEEFDEADBEEFDEADBEEFDEADBEEFDEADBEEF
url=https://akbwadp9lc5fyyz0cj4d76z643pxgbfh6oyc-167-71-71-157.sslip.io/5m9yq0j4ghkz0fz7qmuw58cvbjon0ebnrsp0
ver=0.0.1
```
#### Snowflake
What is [snowflake][what-is-snowflake], example:
```yaml
bridges:
- >-
snowflake 192.0.2.3:80 2B280B23E1107BB62ABFC40DDCC8824814F80A72
fingerprint=2B280B23E1107BB62ABFC40DDCC8824814F80A72
url=https://snowflake-broker.torproject.net/
ampcache=https://cdn.ampproject.org/
front=www.google.com
ice=stun:stun.l.google.com:19302,stun:stun.antisip.com:3478,stun:stun.bluesip.net:3478,stun:stun.dus.net:3478,stun:stun.epygi.com:3478,stun:stun.sonetel.com:3478,stun:stun.uls.co.za:3478,stun:stun.voipgate.com:3478,stun:stun.voys.nl:3478
utls-imitate=hellorandomizedalpn
```
## Tor client access setup
Using this add-on, you can access your Home Assistant instance over Tor from
@ -261,3 +325,6 @@ SOFTWARE.
[releases]: https://github.com/hassio-addons/addon-tor/releases
[semver]: http://semver.org/spec/v2.0.0.htm
[tor-hidden-service]: https://www.torproject.org/docs/hidden-services.html.en
[tor-bridges-obfs4]: https://bridges.torproject.org/bridges/?transport=obfs4
[tor-bridges-webtunnel]: https://bridges.torproject.org/bridges/?transport=webtunnel
[what-is-snowflake]: https://support.torproject.org/censorship/what-is-snowflake/

View file

@ -61,6 +61,6 @@ If you are more interested in stable releases of our add-ons:
[patreon-shield]: https://frenck.dev/wp-content/uploads/2019/12/patreon.png
[patreon]: https://www.patreon.com/frenck
[project-stage-shield]: https://img.shields.io/badge/project%20stage-production%20ready-brightgreen.svg
[release-shield]: https://img.shields.io/badge/version-ee43c77-blue.svg
[release]: https://github.com/hassio-addons/addon-tor/tree/ee43c77
[release-shield]: https://img.shields.io/badge/version-2736d0e-blue.svg
[release]: https://github.com/hassio-addons/addon-tor/tree/2736d0e
[tor-hidden-service]: https://www.torproject.org/docs/hidden-services.html.en

View file

@ -1,5 +1,5 @@
name: Tor
version: ee43c77
version: 2736d0e
slug: tor
description: Protect your privacy and access Home Assistant via Tor
url: https://github.com/hassio-addons/addon-tor
@ -12,25 +12,32 @@ arch:
init: false
ports:
9050/tcp: 9050
9080/tcp: 9080
ports_description:
9050/tcp: Tor SOCKS proxy port
9080/tcp: Tor HTTP proxy port
map:
- ssl:rw
options:
socks: false
http_tunnel: false
hidden_services: true
stealth: false
client_names: []
ports:
- '8123'
- 8123:80
bridges: []
schema:
log_level: list(trace|debug|info|notice|warning|error|fatal)?
socks: bool
http_tunnel: bool
hidden_services: bool
stealth: bool
client_names:
- match(^[A-Za-z0-9+-_]{1,16}$)
ports:
- match(^(.*:)?(?:[0-9]{1,4}|[1-5][0-9]{4}|6[0-4][0-9]{3}|65[0-4][0-9]{2}|655[0-2][0-9]|6553[0-5])?$)
bridges:
- str
image: ghcr.io/hassio-addons/tor/{arch}

View file

@ -30,5 +30,16 @@ configuration:
description: >-
Configures hosts and ports to publish via a Tor Hidden Service. Check
the add-on documentation for the exact format to enter here.
bridges:
name: Bridges
description: >-
Configures bridges to establish a connection with the Tor network. Check the
add-on documentation for the exact format to enter here.
http_tunnel:
name: HTTP proxy
description: >-
Open this port to listen for proxy connections using the HTTP protocol
instead of SOCKS.
network:
9050/tcp: Tor SOCKS proxy port
9080/tcp: Tor HTTP proxy port