Onionpipe is a lightweight, open-source tool designed to forward ports between your local machine and Tor “.onion” hidden services—both hosting and accessing—without relying on public IPv4/IPv6 endpoints. Think of it as a socat(1)
equivalent, but specifically for Tor-enabled tunneling.(GitHub)
Why Choose Onionpipe?
- Decentralized and self-hosted: No need for third-party services like Tailscale or ZeroTier—keep control of your infrastructure.(GitHub)
- Persistent and temporary tunnels: Easily create one-time or nicknamed persistent onion endpoints for accessing or publishing services.(GitHub)
- Bidirectional routing: Forward local services to onion addresses, or import onion services locally—ideal for secure, private access across restrictive networks.(GitHub)
Core Features and Usage
-
Setup examples:
- Export
localhost:8000
to an onion service:
onionpipe 8000
- Map
localhost:8000
to a known onion port 80:
onionpipe 8000~80@my-app
- Export
(GitHub)
- Client authentication support: Use public/private key pairs to restrict access—only authorized clients can connect.(GitHub)
- Platform-friendly: Works on Linux (and probably macOS). Docker/Podman support makes integration into container workflows simple.(GitHub, pkg.go.dev)
Summary
If you want a secure, Tor-based tunnel with full control and privacy, Onionpipe is a powerful, easy-to-use tool that offers flexible port forwarding via onion services—perfect for devs, privacy geeks, and anyone needing resilient access across restrictive networks.
Top comments (0)