The problem When HA sits behind a proxy or traffic is rewritten with NAT in some complex network topologies, the 'real' IP of the client/endpoint is not exposed to Home Assistant, but instead logge...
@dis
What is the CVE number for this issue ?
It's not mandatory to upgrade to the last version. Usually I'm doing the upgrade when the first patch of a new version is released (a.b.1 version)
@dis I agree it should be changed to allow more control or have safer defaults, but it's not exactly an "incident" when it only affects people who:
- read the release notes where this was discussed front and center
- decided to upgrade to 12.x willingly after reading the aforementioned
- have their instance facing the public internet
- haven't configured their proxy in a way that allows HA to distinguish traffic sources
@BHSPitMonkey
You forgot anyone who "doesn't trust the entire private allocation space".
From the blog:
The problem When HA sits behind a proxy or traffic is rewritten with NAT in some complex network topologies, the 'real' IP of the client/endpoint is not exposed to Home Assistant, but instead logge...
@BHSPitMonkey There are people on the forums who had the "trusted" login screen displayed to the world. To my mind this is a security event if they realised they had an issue before anyone else saw it, and a security incident if a 3rd party saw it. The release notes say that this will happen for people connecting from your own network, but didn't say how that was detected.
I think they've made the right choice in disabling it.