Hidden Services


Remark: Support for hidden services is new in Vidalia. You should expect it to have bugs, some of which possibly corrupting your hidden service configuration. So, don't rely on it, or rather, don't blame us if something goes wrong. If you find bugs or have comments on this new feature, please let us know! We need your feedback.

What is a hidden service?

Hidden services allow you to provide any kind of TCP-based service, e.g. an HTTP service, to others without revealing your IP address. The protocol to provide a hidden service is built on top of the same circuits that Tor uses for anonymous browsing and roughly has similar anonymity properties.

For more information on hidden service you may want to read section 5 of Tor's design paper (doc/design-paper/tor-design.pdf) or the Rendezvous Specification (doc/spec/rend-spec.txt).

How do I provide a hidden service?

Providing a hidden service consists of at least two steps:

  1. Install a web server locally (or a server for whatever service you want to provide, e.g. IRC) to listen for local requests.
  2. Configure your hidden service, so that Tor relays requests coming from Tor users to your local server.
There is a fine tutorial on the Tor website (https://www.torproject.org/docs/tor-hidden-service.html) that describes these steps in more detail.

What data do I need to provide?

The services table contains five columns containing data about configured hidden services:

What are the five buttons used for?

How can I configure advanced hidden service settings?

Tor allows configuration of more specific settings for hidden services, e.g. forcing to use (or avoiding) certain nodes as introduction points, or providing multiple virtual ports for the same service.

However, we decided to simplify things in Vidalia and provide only the most common settings. If you want to configure advanced settings, you need to do so in Tor's torrc file. Vidalia will not remove those settings even when you are editing your hidden services. If you specify more than one virtual port, only the first will be displayed and be editable.

How does Vidalia help me to access other hidden services?

Not at all. There is no need to do so. If you want to access another hidden service, type the service's onion address in your browser (or appropriate client application if it's not a web service), and Tor does the rest for you. There is no need to specifically configure Tor for that.