Settings

Theme

Show HN: X11 desktop widget that shows location of your network peers on a map

github.com

205 points by h2337 5 months ago · 89 comments

Reader

itomato 5 months ago

This seems like it belonged on freshmeat ca. Y2K.

  • ducktective 5 months ago

    For this application, current best practice is using Electron stack, or better, cloning VSCode and relying on GeoLeoMaximusDYP v3.2 LLM for geo-location.

  • MarcelOlsz 5 months ago

    What's that? Webarchive/google don't return much of anything.

    • vidarh 5 months ago

      Way to make us feel old :)

      Others have mentioned it was a directory, but it sent me off on a nostalgia trip, so here is an "obituary" of sorts, that is itself getting rather old:

      https://jeffcovey.net/2014/06/19/freshmeat-net-1997-2014/

      And here's the HN discussion from back then:

      https://news.ycombinator.com/item?id=7925135

      (including a couple of my own comments, which aren't all that intersting)

      And the wikipedia entry:

      https://en.wikipedia.org/wiki/Freecode

      None of these really convey the cultural importance of Freshmeat to the opensource community at the time, though. For a while, Slashdot + Freshmeat were among the two first sites almost everyone I knew and worked with would open in the morning.

    • 28304283409234 5 months ago

      http://freshmeat.net was a directory of open source software back in the 90's and noughts. It was one of the main ways to discover software.

      But what is X11? Is that like Wayland? ;-)

      • pak9rabid 5 months ago

        Yep, my "package repo", if you will, for pretty much everything I installed on Slackware back in the day.

    • asveikau 5 months ago

      The thing that the responses are not capturing is that the stuff on freshmeat was often kind of frivolous desktop widgets or themes. People were excited about Linux desktops and lots of people were authoring small stuff to customize it.

      Network monitoring/visualization widgets that sit on your WindowMaker dock or similar was a common theme.

      So that is sort of the reference being made here

    • teddyh 5 months ago

      A modern equivalent is <https://freshcode.club/>

      • vidarh 5 months ago

        I was about to mention Aminet[1] too as a joke of sorts (it's Amiga focused, but still updated, though it stores the actual archives more than focus on the "news"), but scanned the front page on freshcode first and one of first things that stood out was an Amiga program[2]... If anything makes Freshcode a successor to Freshmeat, the only thing missing is an Enlightenment theme being posted too.

        [1] https://aminet.net/

        [2] https://freshcode.club/projects/apccomm

    • itomato 5 months ago

      Like product hunt but OSS.

      Imagine if GitHub release authors publicized releases in a timeline view.

      v.0.1 of this or v3.0 of that had the same exposure.

      One site. Daily fix.

  • djabatt 5 months ago

    must have at least once

hamburglar 5 months ago

This is some old school style bare bones C. popen with a big old pipe chain is pretty quick n dirty. I’d have gone digging around in proc for the active connections. Cool stuff though. I like that it’s so straightforward to read.

  • quotemstr 5 months ago

    > This is some old school style bare bones C.

    Which has now become some kind of meta-ironic fashion statement. It's 2025's going to the coffee shop with a typewriter.

    • enriquto 5 months ago

      it's more like taking notes with pen and pencil, while other patrons of the coffee shop use an electron-based note-taking "app" on their macbooks that uploads each keypress to the cloud, helpfully adding a half-second lag

lloeki 5 months ago

LittleSnitch has such a map feature

https://help.obdev.at/littlesnitch6/lsm-map

Main difference would be that LS being actively handling connections the list is always accurate whereas this appears to poll current connections using `ss` so it may miss some if they happen to be entirely between two refresh beats.

  • flux3125 5 months ago

    Another main difference is that LittleSnitch costs 59€ per license and is only for MacOS

rootbear 5 months ago

Forgive my ignorance, but I'm not sure what this is showing me. I'm running it on my home linux system, which is connected to the Internet via Verizon FIOS. The map shows three red dots, none of which are near me.

  • h2337OP 5 months ago

    Those 3 dots are your peers, the other end of the TCP connection :)

    So you basically have some apps running in the background (or foreground) that are making those connections.

    • afroturf 5 months ago

      I'm colorblind and had to change the dots color. Might be a nice config option.

    • positron26 5 months ago

      Maybe they were expecting first hops like from traceroute. Maybe traceroute is an interesting way to continue developing.

    • rootbear 5 months ago

      Okay, got it, thanks. I suppose it could also be the FIOS router itself making those connections, or any of the other systems on my local network.

      • h2337OP 5 months ago

        No, for normal network configurations they wouldn't show. It's most likely your system connmap is running on making those connections.

      • jdwithit 5 months ago

        It's only showing connections directly initiated by your computer. Not anything "upstream" of you like the FIOS router. It would also show any connections TO your computer, but being behind NAT on a normal home network, that would likely be nothing unless you've intentionally punched holes.

      • esseph 5 months ago

        You might be surprised how much traffic every device makes.

GranPC 5 months ago

Pretty cool! Reminds me of the game Uplink.

raldi 5 months ago

What's a network peer?

  • jdwithit 5 months ago

    Yeah from an extremely quick read of the code, I agree with atworkc. It's showing any IP address you have an established network connection to.

      void refreshConnections() {
        ssOutput =
            popen("ss -atun4 | grep ESTAB | awk '{print $6}' | cut -f1 -d\":\"", "r");
    
        if (ssOutput == NULL) {
          printf("Failed to run ss command\n");
          exit(1);
        }
      }
    
    edit: ssOutput is a global variable which is read elsewhere.
  • atworkc 5 months ago

    Servers / Computers your device is currently communicating with, e.g. github servers when you load the link (well probably a cdn edge one)

freeone3000 5 months ago

make sure interNIC is your first hop! LogDeleter is not optional <3

heikkilevanto 5 months ago

Nice. My only gripe is that the map is not very easy to read, especially on the smaller sizes. There are too many coast lines and borders, so it can be hard to locate countries, especially in the Mediterranean. Would it be possible to draw land masses in solid (white?), and leave borders in dark (background color?). Other than that, works fine on Debian Linux and KDE. The map shows up on all desktops, which I like (but others might not)

Another idea. Would it be possible to make the dots fade out, a little like in https://www.lightningmaps.org, so I could see some of the older traffic points as well?

  • h2337OP 5 months ago

    Thanks for feedback! Will make it much more configurable as soon as I have time.

kleiba 5 months ago

One step closer to those futuristic screen interfaces you see in Hollywood blockbusters!

generalizations 5 months ago

Of course this was made by an i3wm user. Nicely done!

wslh 5 months ago

No basically secure:

char mapFilename[256]; strcat(strcpy(mapFilename, getenv("HOME")), RESOURCES); strcat(mapFilename, mapName);

  • josephcsible 5 months ago

    While that's indeed a bug, for it to be a security vulnerability, wouldn't there also have to be a security boundary involved? Specifically, mapName is always either "w1000b.png" or "w1000.png", so the only way to trigger the buffer overflow would be through the HOME environment variable. But if an attacker can run commands as you with arbitrary environment variables, aren't you already pwned? What would anyone gain by running your program and exploiting it to do something, rather than just doing the thing directly? https://devblogs.microsoft.com/oldnewthing/20060508-22/?p=31...

    • im3w1l 5 months ago

      While exploitation is unlikely I think such things are still best avoided because multiple such things can sometimes be chained together.

    • sedatk 5 months ago

      > But if an attacker can run commands as you with arbitrary environment variables, aren't you already pwned?

      Not unless they have another path for privilege escalation.

  • h2337OP 5 months ago

    What's insecure? Can you explain what's the vulnerability here and how and by whom can it be exploited?

    • floating-io 5 months ago

      Assuming that code is actually present in your app, env vars can hold more than 255 characters. Easy buffer overflow to trigger. Use length-bounded copies and concats...

      That's just off the top of my head; I've not written in C in a while.

      • h2337OP 5 months ago

        Why would you want to trigger a buffer overflow in user application if you can already control HOME envvar?

        • floating-io 5 months ago

          Yeah, that is not a helpful attitude to take when it comes to this sort of thing. If nothing else, a super-long home path can crash your app and leave your user scratching their head. In other words, this is a bug (as is the fact that paths are not necessarily limited to 255 characters in the first place; see the PATH_MAX constant, I think it is?).

          As to what could be accomplished with an overflow? I don't know; I'm not in security, and I don't sit around thinking of possible uses for various bugs when it comes to compromising systems.

          Perhaps the most important thing to realize, though, is that you're distributing software publicly. Your security situation may not be the same as your user's security situation. Assumptions should not be made.

          Something to keep in mind.

          • h2337OP 5 months ago

            Thanks for the discussion. Fix is already committed.

            • db48x 5 months ago

              As long as you’re fixing that bug, you should do it right. If the return value from snprintf if more than 256 but less than a few GB then you should malloc a buffer big enough to hold the string and then call snprintf again with the new buffer. Only if that or malloc fails would you print an error. (It’s really a shame that the C standard library requires so many extra steps to do things correctly; this ought to be way easier.)

              • floating-io 5 months ago

                Not sure offhand how portable it is, but asprintf() handles automatic buffer allocation, thus not requiring any extra steps afaik.

                It does exit on MacOS and Linux, at the very least.

                • db48x 5 months ago

                  Those are so unportable that I’d completely forgotten about them :)

                  But my man pages say that they exist on BSD in addition to GNU, so that’s pretty good these days. I say go for it.

            • floating-io 5 months ago

              No problem. =)

    • DonHopkins 5 months ago

      Using strcat to a fixed size buffer is like using a gun to kill flies in a crowded flophouse while on crystal meth.

    • sedatk 5 months ago

      Basically, any path longer than 256 characters for `mapFilename` would cause a buffer overrun.

      An unprivileged app could run your app (say, with more privileges), with a very long `HOME` environment path, causing a buffer overflow, and potentially exploit it to use your app's privileges to do more stuff than it was supposed to.

      Basically, you should never use strcpy and strcat and but use the secure alternatives like strcpy_s and strcat_s, even when you know the source buffer would never exceed the destination size.

      • h2337OP 5 months ago

        > (say, with more privileges)

        Isn't it a moot point if unprivileged app can already run anything with more privileges? In normal operation, connmap requires no special privileges.

        • sedatk 5 months ago

          Sure, but since there's no enforced standard for how privileges are configured on a system, there's always the possibility that your app to be the only escape ticket.

          You can dismiss that possibility of course. But, as a general habit, it's best to use secure alternatives instead of mulling over probabilities every other line.

          As a positive side-effect, the change would make your app not crash on systems with long HOME env paths.:)

        • jfyi 5 months ago

          I see you already addressed it but here let me give a scenario.

          Say the program was installed and set so the user didn't have privs to modify the executable (so an attacker couldn't just change it to do what they want).

          A buffer overflow could allow an attacker to gain control flow of the program and feed bogus data to the user allowing them to scrub their presence from the map.

          Also, awesome project!

  • h2337OP 5 months ago

    Thanks for noticing! Fix pushed.

Aldipower 5 months ago

Works also great with WindowMaker. I've added it to ~/GNUstep/Library/WindowMaker/autostart

  • wing-_-nuts 5 months ago

    Using windowmaker in 2025 is certainly an ...interesting choice, though I admit the app probably looks like it fits right in with that aesthetic

superkuh 5 months ago

connmap wouldn't run on my retrocomputer with ancient Xorg 1.7.6 so I vibe coded a janky perl gtk2 version and it works.

http://superkuh.com/connmap-perl-gtk2.pl.txt + http://tuvixdiedforoursins.org/w1000-old.png (baked black background map)

It looks pretty similar: http://tuvixdiedforoursins.org/connmap-perl-gtk2-screenshot.... vs http://tuvixdiedforoursins.org/connmap-original-screenshot.j...

anthk 5 months ago

OpenBSD devs did the same with either XPlanet or Xearth, can't rememeber. Now they use a GeoJson format.

Then you can import it under geo/viking port:

     doas pkg_add viking
Open Viking and just load the geo.json file from

        /usr/local/share/markers/OpenBSD.geojson
DyslexicAtheist 5 months ago

very cool. works like a charm also on Sway

in ~/.config/sway/config:

   for_window [class="connmap"] fullscreen enable
cat ~/.config/connmap/connmaprc

   location_x 20
   location_y 500
   map_width 1920
   black false
   update_interval 1
bonus: connect it to a right-click event either on the vpn or the network module in waybar

     "custom/wg":{
         "format": "wg {icon} {text}",
         "exec": "~/.config/waybar/modules/wg",
         "return-type": "json",
         "interval": 5,
         "format-icons": ["",""],
        "on-click-right": "~/bin/connmap"
     },
ben0x539 5 months ago

That's a really neat idea, damn.

lxgr 5 months ago

Neat! This runs fully offline (i.e. without calls to a GeoIP database), right?

globalnode 5 months ago

This doesnt pick up short lived connections or sneaky udp connections right?

mhd 5 months ago

Someone should make a windowmaker dockapp out of this.

Tom1380 5 months ago

I thought of doing something similar, it looks pretty cool. What about showing lines going through the various traceroute hops?

  • h2337OP 5 months ago

    Might add that soon as configurable option, thanks for suggestion!

rxwxx 5 months ago

In the fonction IpRangeVector_resize() in ip.c, you have a bug, that's not how realloc are supposed to be used.

heikkilevanto 5 months ago

Impressive that the thing is less than 500 lines of pretty readable C

waerhert 5 months ago

Very cool! I made something similar 12 years ago. https://github.com/waerhert/ikna/blob/master/screenshot.png

bit1993 5 months ago

Dam! Great tool. Very clean. Thank you.

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection