DEV Community

ByteKnight
ByteKnight

Posted on

Onionpipe — "Onion Addresses for Anything"

Onionpipe is a lightweight, open-source tool designed to forward ports between your local machine and Tor “.onion” hidden services—both hosting and accessing—without relying on public IPv4/IPv6 endpoints. Think of it as a socat(1) equivalent, but specifically for Tor-enabled tunneling.(GitHub)

Why Choose Onionpipe?

  • Decentralized and self-hosted: No need for third-party services like Tailscale or ZeroTier—keep control of your infrastructure.(GitHub)
  • Persistent and temporary tunnels: Easily create one-time or nicknamed persistent onion endpoints for accessing or publishing services.(GitHub)
  • Bidirectional routing: Forward local services to onion addresses, or import onion services locally—ideal for secure, private access across restrictive networks.(GitHub)

Core Features and Usage

  • Setup examples:

    • Export localhost:8000 to an onion service:
    onionpipe 8000
    
    • Map localhost:8000 to a known onion port 80:
    onionpipe 8000~80@my-app
    

(GitHub)

  • Client authentication support: Use public/private key pairs to restrict access—only authorized clients can connect.(GitHub)
  • Platform-friendly: Works on Linux (and probably macOS). Docker/Podman support makes integration into container workflows simple.(GitHub, pkg.go.dev)

Summary

If you want a secure, Tor-based tunnel with full control and privacy, Onionpipe is a powerful, easy-to-use tool that offers flexible port forwarding via onion services—perfect for devs, privacy geeks, and anyone needing resilient access across restrictive networks.


Top comments (0)