2014-05-13 17:32:19 +02:00
# Using YunoHost as a Tor Hidden Service
2014-05-13 10:59:34 +02:00
See https://www.torproject.org/docs/tor-hidden-service.html.en
## Installing Tor
```bash
2015-04-26 19:55:22 +02:00
sudo apt-get install tor
2014-05-13 10:59:34 +02:00
```
## Configuring our hidden service
2014-05-13 17:25:11 +02:00
Edit /etc/tor/torrc, and add these lines:
2014-05-13 10:59:34 +02:00
2014-05-13 11:07:24 +02:00
```bash
2014-05-13 10:59:34 +02:00
HiddenServiceDir /var/lib/tor/hidden_service/
HiddenServicePort 80 127.0.0.1:80
HiddenServicePort 443 127.0.0.1:443
```
## Restart Tor
```bash
service tor restart
```
## Get your Tor Hidden Service hostname
```bash
2015-04-26 19:55:22 +02:00
cat /var/lib/tor/hidden_service/hostname
2014-05-13 10:59:34 +02:00
```
Your domain looks like *random123456789.onion*
## Add the .onion domain to Yunohost
```bash
yunohost domain add random123456789.onion
```
2014-05-13 11:07:24 +02:00
2014-05-13 11:22:11 +02:00
## Avoid SSO redirection (optional)
2014-05-13 17:25:11 +02:00
If you want to avoid being redirected to the SSO portal at login, you can deactivate SSOwat for this specific tor domain, by editing the file `/etc/nginx/conf.d/random123456789.onion.conf` and commenting the following line (two times):
2014-05-13 11:22:11 +02:00
```bash
#access_by_lua_file /usr/share/ssowat/access.lua;
```
2016-01-07 16:34:28 +01:00
## Restart nginx
```bash
service nginx restart
```