Skip to content

Make your Linux/macOS/BSD/illumos machine visible in Network view of Windows Explorer

License

Notifications You must be signed in to change notification settings

gershnik/wsdd-native

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

wsdd-native

Linux macOS FreeBSD OpenBSD NetBSD Language Standard License

A Unix daemon that makes your Linux/macOS/BSD/illumos machine visible in Network view of Windows Explorer on newer versions of Windows.

It implements WS-Discovery protocol that Windows now uses to discover machines on local network. It is a native daemon, written in C++.

Features

  • Fully supports macOS, Linux, FreeBSD, OpenBSD, NetBSD and illumos
  • Can be configured via a configuration file, not just command line.
  • Discovers Samba/macOS SMB configuration on its own. (This can be overridden, if desired)
  • Can present the Unix host as something other than "Computer" in Windows Explorer.
  • Integrates well with systemd and launchd. Of course it can also run as a classical Unix daemon for other init systems.
  • Friendly to various log rotation methods like newsyslogd and logrotate. Supports standard reload semantics via SIGHUP.
  • Written with security in mind first and foremost.
  • Will never run any network code as root. Designated user account to run under is created automatically, if needed.

There are a couple of similar projects available: wsdd written in Python and wsdd2 written in C. Neither of them, however, fully provides the features above.

The biggest drawback of wsdd-native compared to these projects is that it requires modern (as of 2022) C++ compiler to build and set of modern libc, libstdc++/libc++ etc. to run. This usually limits it to recent versions of operating systems it supports. (It is possible to build it on older ones with newer toolchains but doing so is non-trivial). Of course, as time passes this limitation will become less and less significant.

Binary packages

macOS

On macOS there are 3 ways to install wsddn: via a standalone installer package, Homebrew or Macports. Using a standalone installer is simpler but you will have to manually install any future updates as well. Homebrew/Macports are a bit more complicated to set up but it provides updatability similar to Linux/BSD package managers.

For all 3 methods the supported platforms are:

  • macOS Catalina (10.15) and above
  • Both Intel and Apple Silicon

Standalone installer

Setup and usage (click to expand)

To install via standalone .pkg installer:

If you prefer command line, you can also install via:

sudo installer -pkg /path/to/wsddn-macos-1.15.pkg -target /

To fully uninstall wsddn run /usr/local/bin/wsddn-uninstall

Daemon will start automatically on install.

To start/stop/reload the daemon use:

sudo launchctl kickstart system/io.github.gershnik.wsddn
sudo launchctl kill TERM system/io.github.gershnik.wsddn
sudo launchctl kill HUP system/io.github.gershnik.wsddn

Configuration file will be at /etc/wsddn.conf. Comments inside indicate available options and their meaning. You can also use man wsddn to learn about configuration or see online version here

Daemon and related logs can be viewed in system log by searching for subsystem or process names containing string wsddn. For example:

log show --last 15m --debug --info \
  --predicate 'subsystem CONTAINS "wsddn" OR process CONTAINS "wsddn"'

Homebrew

Setup and usage (click to expand)

Homebrew package ('cask') can be installed via a custom tap.

To set it up

brew tap gershnik/repo

Then

brew install wsddn

This installs exactly the same thing as standalone installer would so all the usage instructions under Standalone installer apply as well.

Macports

Setup and usage (click to expand)

Macports package can be installed via a custom repository.

To set the repo up:

sudo bash <<'___'
set -e
pemurl=https://gershnik.com/macports-repo/macports.pem
porturl=https://www.gershnik.com/macports-repo/ports.tar.bz2
archurl=https://www.gershnik.com/macports-repo/archives
prefix=$(dirname $(dirname $(which port)))
pemfile="$prefix/share/macports/gershnik.pem"
pubkeysfile="$prefix/etc/macports/pubkeys.conf"
sourcesfile="$prefix/etc/macports/sources.conf"
archfile="$prefix/etc/macports/archive_sites.conf"
curl -s $pemurl > "$pemfile"
grep -qxF "$pemfile" "$pubkeysfile" || echo $pemfile >> "$pubkeysfile"
grep -qxF "$porturl" "$sourcesfile" || echo $porturl >> "$sourcesfile"
if [ "$prefix" == "/opt/local" ]; then
    grep -qx "url\\s+$archurl\\s*" "$archfile" || (
        echo "" >> "$archfile"
        echo "name    gershnik.com" >> "$archfile"
        echo "urls    $archurl" >> "$archfile"
    )
fi
sudo port sync
___

Then you can install wsddn as usual via

sudo port install wsddn

Daemon will start automatically on install.

To start/stop/reload the daemon use:

sudo launchctl kickstart system/org.macports.wsddn
sudo launchctl kill TERM system/org.macports.wsddn
sudo launchctl kill HUP system/org.macports.wsddn

Configuration file will be at /opt/local/etc/wsddn.conf. Comments inside indicate available options and their meaning. You can also use man wsddn to learn about configuration or see online version here

Daemon and related logs can be viewed in system log by searching for subsystem or process names containing string wsddn. For example:

log show --last 15m --debug --info \
  --predicate 'subsystem CONTAINS "wsddn" OR process CONTAINS "wsddn"'

Ubuntu/Debian/Mint/Raspberry Pi

Pre-built packages are available in a custom apt repository for systems newer than Ubuntu 20.04 (focal) or Debian 11 (bullseye). Any Debian system based upon those or newer should work.

Architectures supported: amd64 (aka x86_64), arm64 (aka aarch64) and armhf

Setup and usage (click to expand)

To set up the apt repository:

  • Import the repository public key

    wget -qO- https://www.gershnik.com/apt-repo/conf/pgp-key.public \
      | gpg --dearmor \
      | sudo tee /usr/share/keyrings/gershnik.gpg >/dev/null
  • Add new repo

    echo "deb" \
    "[arch=$(dpkg --print-architecture) signed-by=/usr/share/keyrings/gershnik.gpg]" \
    "https://www.gershnik.com/apt-repo/" \
    "base" \
    "main" \
      | sudo tee /etc/apt/sources.list.d/wsddn.list >/dev/null

Once the repository is set up you can install wsddn as usual via:

sudo apt update
sudo apt install wsddn

If you have UFW firewall running, do

sudo ufw allow wsddn

Daemon will be enabled and started automatically on first install but keep its existing state on updates.

On systemd based distributions to start/stop/reload it use

sudo systemctl start wsddn
sudo systemctl stop wsddn
sudo systemctl reload wsddn

Configuration file will be at /etc/wsddn.conf. Comments inside indicate available options and their meaning. You can also use man wsddn to learn about configuration or see online version here

Daemon log can be viewed via journalctl as usual

journalctl -u wsddn

On non-systemd based distributions (and Docker) you can use:

sudo /etc/init.d/wsddn start
sudo /etc/init.d/wsddn stop
sudo /etc/init.d/wsddn reload

and the log is available at /var/log/wsddn.log

RedHat/CentOS/Fedora

Pre-built packages are available on Fedora Copr repository. Visit that link to see currently supported distributions and architectures.

Setup and usage (click to expand)

To set the repo up you need to install copr plugin if you haven't already done so:

sudo dnf install dnf-plugins-core
#or with yum
#sudo yum install yum-plugin-copr

Then

sudo dnf copr enable gershnik/wsddn
#or with yum
#sudo yum copr enable gershnik/wsddn

Once the repository is set up you can install wsddn as usual via

sudo dnf install wsddn
#or with yum
#sudo yum install wsddn

On first install firewall ports 5357/tcp and 3702/udp will be opened.

Enable and start the daemon:

sudo systemctl enable wsddn
sudo systemctl start wsddn

To start/stop/reload it use

sudo systemctl start wsddn
sudo systemctl stop wsddn
sudo systemctl reload wsddn

Configuration file will be at /etc/wsddn.conf. Comments inside indicate available options and their meaning. You can also use man wsddn to learn about configuration or see online version here

Daemon log can be viewed via journalctl as usual

journalctl -u wsddn

OpenSUSE

Pre-built OpenSUSE packages for Tumbleweed are available via Fedora Copr.

Architectures supported: x86_64 andaarch64

Setup and usage (click to expand)

To set up the repository:

  1. Import the repository PGP key
wget -qO wsddn.gpg  https://download.copr.fedorainfracloud.org/results/gershnik/wsddn/pubkey.gpg \
  && sudo rpm --import wsddn.gpg \
  && rm wsddn.gpg
  1. Add the repository configuration to zypper
sudo zypper addrepo -f https://download.copr.fedorainfracloud.org/results/gershnik/wsddn/opensuse-tumbleweed-$(arch) wsddn
  1. Refresh zypper
sudo zypper refresh

You will receive a warning saying something like Warning: File 'repomd.xml' from repository 'wsddn' is unsigned .... This is expected as Fedora Copr doesn't sign the repository itself, only actual RPMs. Answer y to allow.

Once the repository is set up you can install wsddn as usual via:

sudo zypper in wsddn

On first install firewall ports 5357/tcp and 3702/udp will be opened.

Enable and start the daemon:

sudo systemctl enable wsddn
sudo systemctl start wsddn

To start/stop/reload it use

sudo systemctl start wsddn
sudo systemctl stop wsddn
sudo systemctl reload wsddn

Configuration file will be at /etc/wsddn.conf. Comments inside indicate available options and their meaning. You can also use man wsddn to learn about configuration or see online version here

Daemon log can be viewed via journalctl as usual

journalctl -u wsddn

Arch Linux

Source package is available on AUR at https://aur.archlinux.org/packages/wsdd-native

Pre-built packages are available in a custom pacman repository.

Architectures supported: x86_64 andaarch64

Setup and usage (click to expand)

To set up the repository:

  1. Import the repository PGP key
sudo pacman-key --recv-keys 'CF567A58C5DB9C6908C6E87E6EBB54370005A361' \
  && sudo pacman-key --lsign-key 'CF567A58C5DB9C6908C6E87E6EBB54370005A361'
  1. Add the repository configuration to /etc/pacman.conf
[gershnik]
Server = https://www.gershnik.com/arch-repo/$arch
  1. Refresh the package databases
sudo pacman -Sy

Once the repository is set up you can install wsdd-native as usual via:

sudo pacman -S wsdd-native

If you have UFW firewall running, do

sudo ufw allow wsddn

As per Arch Linux convention the installation does not automatically enable or start services.

Enable and start the daemon:

sudo systemctl enable wsddn
sudo systemctl start wsddn

To start/stop/reload it use

sudo systemctl start wsddn
sudo systemctl stop wsddn
sudo systemctl reload wsddn

Configuration file will be at /etc/wsddn.conf. Comments inside indicate available options and their meaning. You can also use man wsddn to learn about configuration or see online version here

Daemon log can be viewed via journalctl as usual

journalctl -u wsddn

Alpine

Pre-built packages are available in a custom apk repository for Alpine 3.18 or above.

Architectures supported: x86_64 andaarch64

Setup and usage (click to expand)

To set up the repository:

  1. Import the repository key
wget -qO-  https://www.gershnik.com/alpine-repo/gershnik@hotmail.com-6643812b.rsa.pub \
  | sudo tee /etc/apk/keys/gershnik@hotmail.com-6643812b.rsa.pub >/dev/null
  1. Add new repo
sudo mkdir -p /etc/apk/repositories.d && \
echo "https://www.gershnik.com/alpine-repo/main" \
  | sudo tee /etc/apk/repositories.d/www.gershnik.com.list >/dev/null
  1. Update apk
sudo apk update
  1. Install the package.
sudo apk add wsdd-native

If your Alpine system has OpenRC running (e.g. not a Docker container), OpenRC configuration will be automatically installed too. Otherwise, if desired, you can manually add it via sudo apk add wsdd-native-openrc. Similarly documentation is available via sudo apk add wsdd-native-doc.

Under OpenRC:

Enable and start the service:

sudo rc-update add wsddn
sudo rc-service wsddn start

To start/stop/reload it use

sudo rc-service wsddn start
sudo rc-service wsddn stop
sudo rc-service wsddn reload

Configuration file will be at /etc/wsddn.conf. Comments inside indicate available options and their meaning. If you installed documentation you can also use man wsddn to learn about configuration or see online version here

Log file is located at /var/log/wsddn.log. Log file rotation is configured via logrotate. To modify rotation settings edit /etc/logrotate.d/wsddn

FreeBSD

Pre-built packages are available for FreeBSD 13 and 14 in a custom binary package repository. Both amd64 (aka x86_64) and arm64 (aka aarch64) architectures are supported.

Setup and usage (click to expand)

To set the repo up:

  • Create the custom repo config folder if it does not already exist
    sudo mkdir -p /usr/local/etc/pkg/repos
  • Download the repository public key
    wget -qO- https://www.gershnik.com/bsd-repo/rsa-key.pub \
     | sudo tee /usr/local/etc/pkg/repos/www_gershnik_com.pub > /dev/null
  • Create a file named /usr/local/etc/pkg/repos/www_gershnik_com.conf
  • Put the following content in it:
    www_gershnik_com: {
        url: "https://www.gershnik.com/bsd-repo/${ABI}",
        signature_type: "pubkey",
        pubkey: "/usr/local/etc/pkg/repos/www_gershnik_com.pub",
        enabled: yes
    }
    

Once the repository is set up you can install wsddn as usual via

sudo pkg update
sudo pkg install wsddn

As is standard on FreeBSD daemon will not be enabled or started after installation. To enable it, edit /etc/rc.conf and add the following line there:

wsddn_enable="YES"

To start/stop/reload the daemon use:

sudo service wsddn start
sudo service wsddn stop
sudo service wsddn reload

Configuration file will be at /usr/local/etc/wsddn.conf. Comments inside indicate available options and their meaning. You can also use man wsddn to learn about configuration or see online version here

Log file is located at /var/log/wsddn.log. Log file rotation is configured via newsylogd. To modify rotation settings edit /usr/local/etc/newsyslog.conf.d/wsddn.conf

Building from sources

Prerequisites

  • Git
  • C++20 capable compiler. Minimal compilers known to work are GCC 10.2, Clang 13 and Xcode 13.
  • CMake 3.25 or greater. If your distribution CMake is older than that you can download a newer version from https://cmake.org/download/
  • patch tool. Most operating system distributions have it available by default by some minimalistic ones might not.
  • Optional: On Linux if you wish to enable systemd integration make sure you have libsystemd library and headers installed on your system. On APT systems use:
    sudo apt install libsystemd-dev
    On DNF systems use
    sudo dnf install systemd-devel

Building and installing

git clone https://github.com/gershnik/wsdd-native.git
cd wsdd-native
cmake -S . -B out -DCMAKE_BUILD_TYPE=RelWithDebInfo -DFETCHCONTENT_QUIET=OFF ..
cmake --build  out
sudo cmake --install out --strip

The wsddn executable will be installed into /usr/local/bin and manpage added to section 8 of the manual.

The following flags can be passed to CMake configure step:

-DWSDDN_PREFER_SYSTEM=ON|OFF

This controls whether to prefer system version of 3rd party libraries or fetch, build and use static ones. Currently only libxml2 is affected.

On Linux:

-DWSDDN_WITH_SYSTEMD="yes"|"no"|"auto".

This controls whether to enable systemd integration. Auto performs auto-detection (this is the default).

Setting up daemon

The config directory of this repo contains sample configuration files for different init systems (systemd, FreeBSD rc.d and macOS launchd). You can adapt those as appropriate to your system.

Command line flags and configuration file entries are documented in man wsddn and online here

Usage

Firewall Setup

Note: The following instructions are copied verbatim from wsdd one since the requirements are identical

Traffic for the following ports, directions and addresses must be allowed.

  • incoming and outgoing traffic to udp/3702 with multicast destination:
    • 239.255.255.250 for IPv4
    • ff02::c for IPv6
  • outgoing unicast traffic from udp/3702
  • incoming to tcp/5357

You should further restrict the traffic to the (link-)local subnet, e.g. by using the fe80::/10 address space for IPv6. Please note that IGMP traffic must be enabled in order to get IPv4 multicast traffic working.

Security

There are two main security concerns with a daemon that delivers data about local machine over the network

  1. A bug inside daemon code may allow remote attacker to penetrate the machine running it.
  2. The information legitimately provided by the daemon will disclose something to an attacker that would otherwise remain unknown, enabling him to mount further attacks.

Currently the implementation ignores the second concern. The things wsdd-native discloses are the existence of the local host, its name, presence of Samba on it and domain/workgroup membership. All of these are generally disclosed by Samba itself via SMB broadcasts so, assuming the firewall is configured as described above, there is no net gain for an attacker. WS-Discovery protocol contains provisions for encrypting its HTTP traffic and potentially authenticating clients accessing your host via their client certificates. This limits exposure somewhat but at a significant configuration and maintenance cost. If there is interest in any of it it is possible to easily add this functionality in a future version.

The first concern is by far the most significant one. All software contains bugs and despite developer's best efforts there is always a risk that a bad actor can discover some kind of input that allows him to hijack the server process. To address this possibility wsdd-native takes the following measures (apart from general secure coding practices):

  • The process performing network communications never runs as root. If launched as root it will create an unprivileged account (_wsddn:_wsddn on macOS and wsddn:wsddn on other platforms) and run network process under it.
  • Similarly when started as root the daemon will lock the network process in a chroot jail (/var/empty on macOS and /var/run/wsddn on other platforms).

These measures are automatic and cannot be bypassed. Taken together they should limit the fallout of any vulnerability though, of course, nothing ever can be claimed to be 100% secure.

Note that when running on systemd systems it is recommended to use its DynamicUser facility instead of running as root and relying on the measures above. The Debian/Ubuntu/Arch installer does so.

Custom metadata

By default wsdd-native exposes the host it is running on as a computer in "Computer" section of Windows Explorer Network view. Clicking on a computer will attempt to access its shares via SMB protocol.

Instead of this wsdd-native allows you to expose the host as a different kind of device among those supported by Windows Explorer, for example a media player, home security, printer etc. To do so you need to author a custom metadata XML and specify it via --metadata command line switch or metadata field in wsddn.conf.

More details on this can be found on this page.

Acknowledgements

wsdd-native is directly influenced by wsdd. While no source code from it was directly re-used in this project, many design and implementation ideas were; as well as command line design and some documentation content.

See Acknowledgements.md for information about open source libraries used in this project.

Reporting Bugs

Please use the GitHub issue tracker to report any bugs or suggestions. For vulnerability disclosures or other security concerns see Security Policy