This application provides basic tools around .onion services. All services handling private RSA keys run entirely in your browser.
Running your own hidden service can be dangerous. Be sure to read these pages first if you are not just experimenting with hidden services:
These are all external links. We do not monitor the content for accuracy, changes and availability How to install manually:Note: You can download your keys in a bundle that covers step 1 to 3
hostname with the content .onionprivate_key with the private key as contentHiddenServiceDir path to your tor configuration where path is the full path to the directory you createdHiddenServicePort FakePort IP:RealPort directly after the previous line to the configuration.
Notes on step 5:
Tor will only forward ports for which a HiddenServicePort directive is given.
FakePort is the port the client is using. For a website, use 80IP is the local IP address your hidden service is listening. If it runs on the same machine as your tor client. Use 127.0.0.1RealPort is the real port your application is listening on. For simple scenarios, this is likely the same as FakePortHiddenServicePort 80 127.0.0.1:8080 will make a web server running on local port 8080 accessible through tor under the normal HTTP port (80)
Notes on step 7:
The simplest way to reload the configuration is to restart the tor client.
If you know how, you can send the signal SIGHUP to the tor client to reload the configuration without having to restart it.
Test Result: No test performed
This test will only work with hidden web services. Other services (ssh, irc, ...) and public websites can't be tested.
Before starting the test, please work through the checklist:
IP:RealPort (see step 5 in "Name Generator" tab) from the machine that runs said application.