This application provides basic tools around .onion services. All services handling private RSA keys run entirely in your browser.
Running your own hidden service can be dangerous. Be sure to read these pages first if you are not just experimenting with hidden services:
Note: You can download your keys in a bundle that covers step 1 to 3
hostnamewith the content
private_keywith the private key as content
HiddenServiceDir pathto your tor configuration where
pathis the full path to the directory you created
HiddenServicePort FakePort IP:RealPortdirectly after the previous line to the configuration.
Notes on step 5:
Tor will only forward ports for which a
HiddenServicePort directive is given.
FakePortis the port the client is using. For a website, use 80
IPis the local IP address your hidden service is listening. If it runs on the same machine as your tor client. Use
RealPortis the real port your application is listening on. For simple scenarios, this is likely the same as
HiddenServicePort 80 127.0.0.1:8080will make a web server running on local port 8080 accessible through tor under the normal HTTP port (80)
Notes on step 7:
The simplest way to reload the configuration is to restart the tor client. If you know how, you can send the signal
SIGHUP to the tor client to reload the configuration without having to restart it.
Test Result: No test performed
This test will only work with hidden web services. Other services (ssh, irc, ...) and public websites can't be tested.
Before starting the test, please work through the checklist:
IP:RealPort(see step 5 in "Name Generator" tab) from the machine that runs said application.