Web-based interactive terminal emulator that allows users to easily record, share, and replay console sessions.
Go to file
Zhi Wang 67ba39a8f9 WIP
2022-01-18 13:11:39 -05:00
assets WIP 2022-01-18 13:11:39 -05:00
cmd/replay Wip 2022-01-18 06:44:38 -05:00
extra WIP 2022-01-18 08:59:32 -05:00
records WIP 2022-01-14 13:35:53 -05:00
term_conn WIP 2022-01-16 16:46:01 -05:00
tls support self-signed cert 2022-01-07 09:00:44 -05:00
.gitignore WIP 2022-01-17 15:20:18 -05:00
go.mod add a shell command to replay 2022-01-14 17:04:50 -05:00
go.sum add a shell command to replay 2022-01-14 17:04:50 -05:00
LICENSE Create LICENSE 2022-01-07 19:55:38 -05:00
main.go WIP 2022-01-18 13:06:25 -05:00
README.md WIP 2022-01-18 08:59:32 -05:00

WiTTY: Web-based interactive TTY

This program allows you to use terminal in the browser. Simply run the program and give it the command to execute when users connect via the browser. The main design goal of this tool is to help teaching courses that use Unix-like CLI environment. WiTTY has the following features that distinguish itself from other similar tools:

  1. It allows others to view onging interactive sessions. This is useful for providing live remote support and/or help (only use this after user authentication is implemented).

    A challenge of this use case is that our home networks are almost always behind NAT, making it diffcult to run WiTTY as a publicly accessible server. Security is also a concern. It is generally safer to use WiTTY in a trusted environment.

  2. WiTTY allows users to easily record, replay, and share console sessions with just a few clicks. This make it a breeze to answer course-related questions, espeically with the source code. Instead of wall of text to describe their questions, students can just send a recorded session.

    This repository contains a recorded session in the assets/extra directory (M1NXZvHdvA8vSCKp_61e5d60f.rec) that shows me upgrading pihole. Just put the file under the records directory, run the server, you should find the recording in the Recorded Session tab.

  3. More features are planned, including user authentication. Suggestions are welcome.

You can use WiTTY to run any command line programs, such as bash, htop, vi, ssh. This following screenshot shows that three interactive session running zsh on macOS Monterey.

The following screenshot shows three recorded sessions. You can replay/download/delete them.

Here is a recorded session, where we domonstrate how to use the command line replay utility (in cmd/replay) to replay another recorded session that sshes into a Raspberry Pi running pi-hole. You can pause and seek the replay.

The inception is strong with this one!

To use the program, you need to provide a TLS cert. You can request a free Lets Encrypt cert or use a self-signed cert. The program currently does not support user authentication. Therefore, do not run it in untrusted networks or leave it running. A probably safe use of the program is to run ssh. Please ensure that you do not automatically login to the ssh server (e.g., via key authentication).

AGAIN, Do NOT run this in an untrusted network. You will expose your shell to anyone that can access your network and Do NOT leave the server running.

This program is written in the go programming language, using the Gin web framework, gorilla/websocket, pty, and the wonderful xterm.js! The workflow is simple, the client will initiate a terminal window (xterm.js) and create a websocket with the server, which relays the data between pty and xterm. You can customize the look and feel of the HTML pages by editing files under the assets directory.

Most icons were provided by fontawesome under this license.

Installation

  1. Install the go compiler. Make sure your have go 1.17 or higher.

  2. Download the release and unzip it, or clone the repo

    git clone https://github.com/syssecfsu/witty.git

  3. Go to the tls directory and create a self-signed cert

    # Generate a private key for a curve

    openssl ecparam -name prime256v1 -genkey -noout -out private-key.pem

    # Create a self-signed certificate

    openssl req -new -x509 -key private-key.pem -out cert.pem -days 360

  4. Return to the root directory of the source code and build the program

    go build .

  5. Start the server and give it the command to run. The server listens on 8080, for example:

    ./witty htop or

    ./witty ssh <ssh_server_ip> -l <user_name>

  6. Connect to the server, for example

    https://<witty_server_ip>:8080

The program has been tested on Linux, WSL2, Raspberry Pi 3B (Debian), and MacOSX using Google Chrome, Firefox, and Safari.