Scroll to navigation

WEBTUNNEL-CLIENT(1) User Commands WEBTUNNEL-CLIENT(1)

NAME

webtunnel-client - pluggable transport for Tor that mimic encrypted web traffic, client side component

DESCRIPTION

WebTunnel is a censorship-resistant pluggable transport designed to mimic encrypted web traffic (HTTPS) inspired by HTTPT. It works by wrapping the payload connection into a WebSocket-like HTTPS connection, appearing to network observers as an ordinary HTTPS (WebSocket) connection.

This is the client side component of WebTunnel, it allows you to connect to the Tor network via censorship-resistant bridges behind websites.

OBTAINING A WEBTUNNEL

To obtain a webtunnel, open the following link from an uncensored connection:

https://bridges.torproject.org/options

Under 'Do you need a pluggable transport?', select webtunnel and click 'Get Bridges', you should get a few webtunnel bridgelines of the following format:

webtunnel <placeholder-ip-address>:443 <fingerprint> url=https://<secret-domain-name>/<secret-location> ver=0.0.2

Alternatively a trusted friend might be able to help you obtain a webtunnel bridge.

USAGE

With one or more webtunnel bridge, edit your torrc configuration located at /etc/torrc and add the following lines to enable webtunnel:

ClientTransportPlugin webtunnel exec /usr/bin/webtunnel-client
UseBridges 1
# You can have multiple webtunnel bridges configured here...
Bridge webtunnel <placeholder-ip-address>:443 <fingerprint> url=https://<secret-domain-name>/<secret-location> ver=0.0.2
You should now be able to connect to Tor via webtunnel.

SEE ALSO

tor(1) nyx(1)

AUTHOR

This man page was written by Yifei Zhan <yifei@zhan.science> with help the webtunnel documentations.
Webtunnel is part of the Tor Project.

AUG 2025 webtunnel-client 0.0.2