---
title: Using YunoHost as a Tor Hidden Service
template: docs
taxonomy:
category: docs
routes:
default: '/torhiddenservice'
---
This tuto is not finished ! Some data could leak with this setup like the main domain of your yunohost, so it's not a "Hidden Service".
See https://www.torproject.org/docs/tor-hidden-service.html.en
### Installing Tor
```bash
apt install tor
```
### Configuring our hidden service
Edit `/etc/tor/torrc`, and add these lines:
```bash
HiddenServiceDir /var/lib/tor/hidden_service/
HiddenServicePort 80 127.0.0.1:80
HiddenServicePort 443 127.0.0.1:443
```
### Restart Tor
```bash
service tor restart
```
### Get your Tor Hidden Service hostname
```bash
cat /var/lib/tor/hidden_service/hostname
```
Your domain looks like *random123456789.onion*
### Add the .onion domain to YunoHost
```bash
yunohost domain add random123456789.onion
```
### Avoid SSO redirection (optional)
If you want to avoid being redirected to the SSO portal at login, you can deactivate SSOwat for this specific tor domain, by editing the file `/etc/nginx/conf.d/random123456789.onion.conf` and commenting the following line (two times):
```bash
#access_by_lua_file /usr/share/ssowat/access.lua;
```
### Restart NGINX
```bash
service nginx restart
```