-
Notifications
You must be signed in to change notification settings - Fork 14.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unable to shadow a Windows 10 console user session #5656
Comments
There is already the freerdp shadow server. |
From my understanding you ask for client shadowing with FreeRDP, but this requires some windows RPC calls that we don't have right now (to shadow windows 10 or even earlier versions). |
@hardening correct, the links are for client side shadowing. |
[MS-TSTS] is a starting point, but be aware it references quite a bunch of others. |
I'd say this issue is a duplicate of #3889 |
No rdp client with /shadow |
useful from that thread:
googling a bit, found a mention of rpcshadow2 here, maybe this helps:
Current workaround to shadow windows from linux is running a windows 10 VM with VNC and then using |
For Windows, the currently logged in user is called the "console" session. In recent versions of Windows, Microsoft changed the behavior when connecting via RDP to the console user session. For RDC 6.1 and above, the console user is no longer session 0, and /console parameter is no longer used with mstsc.exe for connecting to the console user session.
I would like to make a feature request for FreeRDP to support "shadowing" an existing user session on Windows, particularly the console user.
On recent Windows computers, one can use "query session" to find the session ID of the console user, and then specify the session ID in mstsc using the "shadow" parameter (e.g. session ID 1):
mstsc.exe /v:host /shadow:1 /control /noConsentPrompt /prompt
To do the same in FreeRDP clients, it must implement Windows RDP shadow support. With a shadow connection, mstsc.exe doesn't use the standard RDP port 3389, but negotiates a high TCP port (not sure if this is strictly required).
More info on how it works on Windows is HERE and HERE.
The text was updated successfully, but these errors were encountered: