

The three first lines define how Tor will transfer incoming requests to Traefik Proxy. For more in-depth configuration guides, make sure to take a look at the official Tor documentation.īut to our example, this torrc file should contain the following: HiddenServiceDir /var/lib/tor/traefik/

This Docker image contains the Tor binary and a torrc configuration file.Ĭheck out man tor for more information on possible configurations of this file and take a look at this article for hosting best practices. Create a Dockerfile containing this: FROM alpine:3.15 To get things started, let's create a Docker container and have Tor run as a service. Doing so removes the pain of setting up other key components in classic hosting, like setting up DNS, routers NAT, and so on. Here, Tor will serve as a VPN that allows you to build a tunnel from the Tor Network to the application. The entire stack that I'm about to deploy will be architectured like in the following diagram: For the sake of this article, I assume that you have already installed and configured: Tor can work in many ways with Traefik Proxy. The source code for this blog post can be found here. I will show you a way to configure Tor to expose a web application to the Tor Network via Traefik Proxy, and without touching any network configuration. There is no official integration between Traefik Proxy and Tor. In this article, I am using the Tor Network purely for the purpose of exploring different use cases of Traefik Proxy. Think of Tor as a knife - it is a powerful tool that can cause harm if used improperly.ĭisclaimer: Traefik Labs does not condone any illicit acts performed using the Tor Network. That said, it can and has been used for illicit activities, so caution is always advised. Those of you who are already familiar with Tor, naturally have some reservations about its legal status. This software is free and open to maximize transparency and decentralization. The Tor Network was originally a project created by an MIT graduate to be used as a one-of-a-kind decentralized network that does not rely on big centralized entities to operate. Today, I want to show you how to deliver your application to your targeted audience in a matter of seconds using the Tor Network and Traefik Proxy. Your ISP router, hosting a web application is often a hassle. From buying a domain name to setting up the DNS and handing an exposed port on
