en
Tor Bridge on Raspberry Pi: Complete Guide for 2026
A Raspberry Pi is an affordable, low-power platform for running a permanent Tor bridge from home. A home bridge with a residential IP address is more resistant to blocking than datacenter bridges. This guide covers setup from hardware selection through production deployment.
Need this done for your project?
We implement, you ship. Async, documented, done in days.
Hardware Selection and Requirements
Recommended hardware: Raspberry Pi 4 (1GB or 2GB RAM sufficient, 4GB overkill), Raspberry Pi 3B+ (adequate but slower), or Orange Pi (alternative ARM SBC). Raspberry Pi 5 is more powerful but the extra cost provides limited benefit for a bridge (bridge operation is not CPU-intensive). Required accessories: microSD card (16GB minimum, Class 10 or better for longevity, Samsung Endurance Pro recommended for 24/7 write workloads), USB-C power supply (official Raspberry Pi supply recommended for stability), ethernet cable (preferred over WiFi for bridge stability - WiFi introduces packet loss and disconnects), and optional case. Power consumption: Raspberry Pi 4 uses approximately 3-7 watts during bridge operation. Annual electricity cost is roughly $3-8 USD at US average electricity rates - negligible.
Operating System and Initial Setup
Use Raspberry Pi OS Lite (no desktop) for a bridge - the desktop is unnecessary overhead. Flash the image to microSD using Raspberry Pi Imager (enables SSH, sets hostname and credentials during imaging). Initial configuration: boot, SSH in via local network, run updates (apt update && apt upgrade), set timezone (timedatectl set-timezone UTC recommended for server operation), configure automatic security updates (unattended-upgrades), and set a strong password. Static IP configuration: assign a static local IP via your router's DHCP reservation or configure a static IP in the Pi's network configuration. A consistent local IP is required for port forwarding.
Installing Tor and obfs4proxy
Installation: add the Tor Project's apt repository (for the latest stable Tor), install tor and obfs4proxy packages. torrc configuration for obfs4 bridge: set BridgeRelay 1, ORPort 443 (or another port, 443 is less likely to be filtered), ServerTransportPlugin obfs4 exec /usr/bin/obfs4proxy, ServerTransportListenAddr obfs4 0.0.0.0:PORT (choose a port to expose), ExtORPort auto, ContactInfo (optional), and Nickname (optional, visible in Tor metrics). If supporting WebTunnel: install the WebTunnel server binary alongside Tor, configure the web server reverse proxy (Nginx/Caddy), and add WebTunnel to ServerTransportPlugin. After configuration, start Tor (systemctl start tor) and check logs (/var/log/tor/notices.log) for the bridge fingerprint and transport address.
Router and NAT Configuration
A home router's NAT (Network Address Translation) blocks incoming connections by default. Bridge configuration requires port forwarding. Setup: log into your router admin interface, find the port forwarding or virtual server section, create a rule forwarding external port (chosen obfs4 port) to the Pi's local IP on the same port, and optionally forward port 443 for ORPort (requires your router's admin interface not to use port 443 for its own HTTPS). Dynamic IP management: most home internet connections have a dynamic public IP that changes periodically. Options: use a DDNS (Dynamic DNS) service (No-IP, DuckDNS - free options) to maintain a consistent hostname, update the bridge registration automatically when IP changes, or accept that the bridge fingerprint will remain consistent while the IP changes (Tor's bridge database associates the fingerprint with the current IP). Email from Tor when IP changes: configure bridge_distribution_monitor to detect IP changes and update bridge registration.
Monitoring and Long-Term Operations
Monitoring the Pi bridge: nyx (the Tor relay monitor, installable via pip) provides a real-time console view of bridge status, bandwidth, and circuit counts. Prometheus + Node Exporter can export Pi system metrics. Check bridge usage via Tor Metrics (bridges.torproject.org/data) after a week of operation - you will see usage graphs if clients are connecting. Maintenance tasks: keep OS updated (apt upgrade), keep Tor updated (Tor Project apt repo provides new versions), check disk space periodically (logs and Tor data), and monitor uptime. SD card longevity: SD cards have limited write cycles. Redirect Tor and OS logs to RAM (tmpfs) or to an external USB drive to extend SD life. Alternatively use a dedicated USB SSD as the boot drive (more durable than SD for continuous operation). Power protection: a UPS (uninterruptible power supply) prevents SD card corruption from unexpected power loss, which is the most common cause of Pi bridge failure.
Related Services
Why Anubiz Host
100% async — no calls, no meetings
Delivered in days, not weeks
Full documentation included
Production-grade from day one
Security-first approach
Post-delivery support included
Ready to get started?
Skip the research. Tell us what you need, and we'll scope it, implement it, and hand it back — fully documented and production-ready.