--- title: Using YunoHost as a Tor Hidden Service template: docs taxonomy: category: docs routes: default: '/torhiddenservice' --- ! This tuto is not finished ! Some data could leak with this setup like the main domain of your YunoHost, so it's not a "Hidden Service". See ###  Installing Tor ```bash apt install tor ``` ###  Configuring our hidden service Edit `/etc/tor/torrc`, and add these lines: ```text HiddenServiceDir /var/lib/tor/hidden_service/ HiddenServicePort 80 127.0.0.1:80 HiddenServicePort 443 127.0.0.1:443 ``` ###  Restart Tor ```bash service tor restart ``` ### Get your Tor Hidden Service hostname ```bash cat /var/lib/tor/hidden_service/hostname ``` Your domain looks like *random123456789.onion* ### Add the .onion domain to YunoHost ```bash yunohost domain add random123456789.onion ``` ### Avoid SSO redirection (optional) If you want to avoid being redirected to the SSO portal at login, you can deactivate SSOwat for this specific tor domain, by editing the file `/etc/nginx/conf.d/random123456789.onion.conf` and commenting the following line (two times): ```text #access_by_lua_file /usr/share/ssowat/access.lua; ``` ### Restart NGINX ```bash service nginx restart ```