TorFone has been developped for Windows. However it appears that it works pretty well with Wine on Linux.
This guide is targetting Fedora 29, but most of the instructions will be the same with other Linux distributions and even on Windows, it will be mostly the same steps.
You must start by installing required dependencies:
sudo dnf install wget wine tor unzip
Now you must download the TorFone software, you must specifically use v1.1b (As I was not able to make BackChannel working on v1.2):
mkdir ~/torfone_stuff
cd ~/torfone_stuff
wget http://torfone.org/download/torfone_V11br.zip
unzip torfone_V11br.zip
unzip torfone.zip
As we will not run Tor as a daemon, we can keep SELinux enabled contrary as previously said/written.
We will need a specific Tor daemon configuration, create the file torrc.txt
in ~/torfone_stuff
, you don't need to modify anything :
# ~/torfone_stuff/torrc.txt
SocksPort 11109
## we don't use the control port currently, so leave this alone
# ControlPort 11119
## INCOMING connections for the hidden service arrive at 11009
## and will be forwarded to TorChat at 127.0.0.1:11009
HiddenServiceDir hidden_service
HiddenServicePort 11009 127.0.0.1:11009
HiddenServicePort 17447 127.0.0.1:17447 # This hidden service will be used by TorFone
## where should tor store it's cache files
DataDirectory tor_data
## some tuning
AvoidDiskWrites 1
LongLivedPorts 11009
FetchDirInfoEarly 1
CircuitBuildTimeout 30
NumEntryGuards 6
## You can uncomment the lines below to log Tor's activity to the
## console or to a log file. Use this only during debugging!
## Turning off SaveLogging will leave sensitive information on your disk,
## the built in default is save logging turned on (set to 1).
## so don't remove the # from that line unless you need it
## and remember to put it in again, after you are done.
#Log info File tor.log
#Log info stdout
#SafeLogging 0
You can now launch Tor in a terminal:
cd ~/torfone_stuff
tor -f ./torrc.txt
Tor might take some time to boot, waiting for these lines seem to be a good indicator:
Nov 13 15:19:30.000 [notice] Tor has successfully opened a circuit. Looks like client functionality is working.
Nov 13 15:19:30.000 [notice] Bootstrapped 100%: Done
Tor will automatically create a folder in ~/torfone_stuff
named hidden_service
containing information about your hidden service.
You can find your hidden service address with:
cd ~/torfone_stuff
cat ./hidden_service/hostname
Mine is 54qhjqgvflts2qiw.onion
. Write it somewhere, you will need to enter it later in TorFone AND
that's the address you must share with people you want to communicate with.
Now we must launch TorFone:
cd ~/torfone_stuff/torfone/
wine PGPfone.exe
Now you must be patient. The first time you will launch the application, you might be asked by Wine if you want to install .NET, Gecko and many other things. Always answer yes.
If everything went well, you must see that:
Now go to "Edit", "Preferences" and:
- Fill
OwnAdr
with your own onion address without the.onion
at the end - Check
Allow BackCh
- Set
Time, Sec
to5
It should look like this:
This configuration allows us to use 2 Tor tunnels instead of 1. Data is sent on both tunnels, giving us some protections if latency increases in one tunnel, as the other tunnel will still be able to deliver the data.
Now, press "Ok" and we are back to the main interface.
You must check the Listen
box
This listen box is needed to be able to receive call. If you start a call, you must check it too to be able to use 2 tunnels instead of one as presented earlier.
Now you're ready to make a call (Pfeww) :
- If you are the caller, put your recipient onion address (without the
.onion
part) and pressConnect
- If you are the callee, just wait for the buttons switching from "Connect" and "Test" to "Answer" and "Mute" and click on "Answer"
Good luck
Yes this capture has been made with TORFone v1.2b and not 1.1b, but as said earlier, even if I was able to call someone else, the BackCh feature didn't work. So you should really stay with v1.1b