mirror of
https://github.com/rustdesk/doc.rustdesk.com.git
synced 2025-01-13 17:58:18 +01:00
commit
f78ef834d2
@ -10,14 +10,15 @@ Der RustDesk-Client wird auf Geräten verwendet, um sich mit unserem RustDesk-Se
|
||||
### Unterstützte Plattformen
|
||||
- Microsoft Windows
|
||||
- macOS
|
||||
- Debian-Ableger (Ubuntu, Mint usw.)
|
||||
- Redhat-Ableger (Centos, Rocky usw.)
|
||||
- Debian-Ableger (Ubuntu ≥ 16, Linux Mint usw.)
|
||||
- Red Hat-Ableger (CentOS, Fedora ≥ 18, Rocky usw.)
|
||||
- Arch Linux/Manjaro
|
||||
- openSUSE
|
||||
- NixOS
|
||||
- AppImage / Flatpak
|
||||
- Android
|
||||
- iOS (keine Unterstützung bei der Kontrolle)
|
||||
- Web (1.1.9 Beta)
|
||||
- Web
|
||||
|
||||
### Installation
|
||||
|
||||
@ -39,32 +40,56 @@ Aktivieren Sie die angeforderten Berechtigungen und folgen Sie den Aufforderunge
|
||||
|
||||
#### Linux
|
||||
|
||||
Bitte beachten Sie die unten stehenden Anweisungen zur Installation für die verschiedenen Linux-Varianten, alle Installationsprogramme befinden sich auf GitHub.
|
||||
Bitte beachten Sie die unten stehenden Anweisungen zur Installation für die verschiedenen Linux-Varianten. Installationsprogramme sind auf GitHub oder im Repository der jeweiligen Distribution verfügbar.
|
||||
|
||||
#### Debian-Ableger (≥ 16)
|
||||
##### Debian-Ableger
|
||||
|
||||
```sh
|
||||
# Bitte ignorieren Sie den falschen Bericht zur Festplattennutzung
|
||||
sudo apt install -fy ./rustdesk-<version>.deb
|
||||
```
|
||||
|
||||
#### CentOS/Fedora (≥ 18)
|
||||
##### Red Hat-Ableger
|
||||
|
||||
```sh
|
||||
sudo yum localinstall ./rustdesk-<version>.rpm
|
||||
```
|
||||
|
||||
#### Arch Linux/Manjaro
|
||||
##### Arch Linux/Manjaro
|
||||
|
||||
```sh
|
||||
sudo pacman -U ./rustdesk-<version>.pkg.tar.zst
|
||||
```
|
||||
|
||||
#### openSUSE (≥ Leap 15.0)
|
||||
##### openSUSE (≥ Leap 15.0)
|
||||
|
||||
```sh
|
||||
sudo zypper install --allow-unsigned-rpm ./rustdesk-<version>-suse.rpm
|
||||
```
|
||||
|
||||
##### Nix / NixOS (≥ 22.05)
|
||||
|
||||
Geben Sie temporär eine Shell ein, in der `rustdesk` bereit zur Ausführung ist:
|
||||
|
||||
```sh
|
||||
nix shell nixpkgs#rustdesk
|
||||
```
|
||||
|
||||
Installation im aktuellen Benutzerprofil:
|
||||
|
||||
```sh
|
||||
nix profile install nixpkgs#rustdesk
|
||||
```
|
||||
|
||||
Um systemweit in NixOS zu installieren, führen Sie `nixos-rebuild switch --flake /etc/nixos` aus, nachdem Sie `configuration.nix` bearbeitet haben:
|
||||
|
||||
```
|
||||
environment.systemPackages = with pkgs; [
|
||||
...
|
||||
rustdesk
|
||||
];
|
||||
```
|
||||
|
||||
#### Android
|
||||
Installieren Sie die APK von unserem GitHub. Weitere Informationen finden Sie auf der [Android-Seite](https://rustdesk.com/docs/de/client/android/).
|
||||
|
||||
@ -112,4 +137,3 @@ Wenn Sie einen Client manuell einrichten, können Sie die Datei `RustDesk2.toml`
|
||||
Zusätzliche erweiterte Parameter finden Sie [hier](https://github.com/rustdesk/rustdesk/blob/bdc5cded221af9697eb29aa30babce75e987fcc9/src/core_main.rs#L242).
|
||||
|
||||
{{% children depth="1" showhidden="true" %}}
|
||||
|
||||
|
@ -10,14 +10,15 @@ The RustDesk Client is used on devices to connect via our RustDesk Server either
|
||||
### Supported Platforms
|
||||
- Microsoft Windows
|
||||
- macOS
|
||||
- Debian Derivatives (Ubuntu, Mint, etc.)
|
||||
- Redhat Derivatives (Centos, Rocky, etc.)
|
||||
- Debian Derivatives (Ubuntu ≥ 16, Linux Mint, etc.)
|
||||
- Red Hat Derivatives (CentOS, Fedora ≥ 18, Rocky Linux, etc.)
|
||||
- Arch Linux/Manjaro
|
||||
- openSUSE
|
||||
- NixOS
|
||||
- AppImage / Flatpak
|
||||
- Android
|
||||
- iOS (not support being controlled)
|
||||
- Web (1.1.9 Beta)
|
||||
- Web
|
||||
|
||||
### Installation
|
||||
|
||||
@ -41,14 +42,14 @@ Enable permissions requested and follow prompts on the left hand side of RustDes
|
||||
|
||||
Please see below instructions to install for the various "flavours" of Linux (installers are on GitHub or available from a distro's repository).
|
||||
|
||||
##### Debian Derivatives (>= 16)
|
||||
##### Debian Derivatives
|
||||
|
||||
```sh
|
||||
# please ignore the wrong disk usage report
|
||||
sudo apt install -fy ./rustdesk-<version>.deb
|
||||
```
|
||||
|
||||
##### CentOS/Fedora (>= 18)
|
||||
##### Red Hat Derivatives
|
||||
|
||||
```sh
|
||||
sudo yum localinstall ./rustdesk-<version>.rpm
|
||||
@ -60,13 +61,13 @@ sudo yum localinstall ./rustdesk-<version>.rpm
|
||||
sudo pacman -U ./rustdesk-<version>.pkg.tar.zst
|
||||
```
|
||||
|
||||
##### openSUSE (>= Leap 15.0)
|
||||
##### openSUSE (≥ Leap 15.0)
|
||||
|
||||
```sh
|
||||
sudo zypper install --allow-unsigned-rpm ./rustdesk-<version>-suse.rpm
|
||||
```
|
||||
|
||||
##### Nix / NixOS (>= 22.05)
|
||||
##### Nix / NixOS (≥ 22.05)
|
||||
|
||||
Temporary enter a shell with `rustdesk` ready to run:
|
||||
|
||||
@ -121,7 +122,7 @@ You can manually setup a client. To do this:
|
||||
1. Click on Settings.
|
||||
2. Click on Network.
|
||||
3. Click Unlock Network Settings.
|
||||
4. Enter your ID, Relay, API (if using pro) servers and your key.
|
||||
4. Enter your ID, Relay, API (if using pro server) and your key.
|
||||
|
||||
![](/docs/en/client/images/network-settings.png)
|
||||
|
||||
@ -136,4 +137,3 @@ If you manually setup a client, you can retrieve the `RustDesk2.toml` (in the us
|
||||
Additional Advanced parameters can be found [here](https://github.com/rustdesk/rustdesk/blob/bdc5cded221af9697eb29aa30babce75e987fcc9/src/core_main.rs#L242).
|
||||
|
||||
{{% children depth="1" showhidden="true" %}}
|
||||
|
||||
|
@ -24,7 +24,7 @@ In `Mouse mode`,you can also trigger the remote device's `Right Mouse` with a `T
|
||||
|
||||
### File Transfer (Android)
|
||||
|
||||
> Requires RustDesk >= 1.1.9
|
||||
> Requires RustDesk ≥ 1.1.9
|
||||
|
||||
In the device list on the home page, select the device.
|
||||
|
||||
|
@ -53,7 +53,7 @@ The default type of the RustDesk service is `init_t`, which is determined by [th
|
||||
|
||||
**Caution**: Modifying the default type means that the policies of other services may also change. Please use this method with caution!
|
||||
|
||||
Edit the rule file rustdesk.te:
|
||||
Edit the rule file `rustdesk.te`:
|
||||
|
||||
```text
|
||||
module rustdesk 1.0;
|
||||
@ -91,17 +91,17 @@ allow init_t pulseaudio_home_t:file { read write open lock };
|
||||
allow init_t session_dbusd_tmp_t:sock_file write;
|
||||
allow init_t unconfined_dbusd_t:unix_stream_socket connectto;
|
||||
|
||||
#!!!! This avc can be allowed using the boolean 'nis_enabled'
|
||||
#!!!! This AVC can be allowed using the boolean 'nis_enabled'
|
||||
allow init_t ephemeral_port_t:tcp_socket name_connect;
|
||||
|
||||
#!!!! This avc can be allowed using the boolean 'domain_can_mmap_files'
|
||||
#!!!! This AVC can be allowed using the boolean 'domain_can_mmap_files'
|
||||
allow init_t sudo_exec_t:file map;
|
||||
|
||||
|
||||
#============= init_t wayland ==============
|
||||
#============= init_t Wayland ==============
|
||||
allow init_t event_device_t:chr_file { open read write };
|
||||
|
||||
#!!!! This avc can be allowed using the boolean 'domain_can_mmap_files'
|
||||
#!!!! This AVC can be allowed using the boolean 'domain_can_mmap_files'
|
||||
allow init_t user_tmp_t:file map;
|
||||
|
||||
```
|
||||
@ -541,7 +541,7 @@ gen_require(`
|
||||
|
||||
###############################################################################
|
||||
#
|
||||
# Part 1. The following rules are mainly from the open source `init.te`
|
||||
# Part 1. The following rules are mainly from the open source `init.te`.
|
||||
# https://github.com/fedora-selinux/selinux-policy/blob/rawhide/policy/modules/system/init.te
|
||||
#
|
||||
# Note: Part 1 will probably be mostly the same as Part 3. But it's acceptable for now.
|
||||
@ -559,7 +559,7 @@ typeattribute rustdesk_t init_script_domain_type;
|
||||
|
||||
########################################
|
||||
|
||||
# Use capabilities. old rule:
|
||||
# Use capabilities, old rule:
|
||||
allow rustdesk_t self:capability ~{ audit_control audit_write sys_module };
|
||||
allow rustdesk_t self:capability2 ~{ mac_admin mac_override };
|
||||
allow rustdesk_t self:cap_userns all_cap_userns_perms;
|
||||
@ -623,7 +623,7 @@ allow rustdesk_t machineid_t:file mounton;
|
||||
allow rustdesk_t initctl_t:fifo_file manage_fifo_file_perms;
|
||||
dev_filetrans(rustdesk_t, initctl_t, fifo_file)
|
||||
|
||||
# Modify utmp.
|
||||
# Modify utmp
|
||||
allow rustdesk_t initrc_var_run_t:file { rw_file_perms setattr };
|
||||
|
||||
kernel_read_system_state(rustdesk_t)
|
||||
@ -641,7 +641,7 @@ kernel_read_all_proc(rustdesk_t)
|
||||
kernel_list_all_proc(rustdesk_t)
|
||||
kernel_mounton_all_proc(rustdesk_t)
|
||||
|
||||
# There is bug in kernel in 4.16 where lot of domains requesting module_request, for now dontauditing
|
||||
# There is bug in kernel 4.16 where lot of domains requesting module_request, for now dontauditing
|
||||
kernel_dontaudit_request_load_module(rustdesk_t)
|
||||
|
||||
corecmd_exec_chroot(rustdesk_t)
|
||||
@ -693,11 +693,11 @@ files_manage_all_locks(rustdesk_t)
|
||||
files_manage_etc_runtime_files(rustdesk_t)
|
||||
files_manage_etc_symlinks(rustdesk_t)
|
||||
files_etc_filetrans_etc_runtime(rustdesk_t, file)
|
||||
# Run /etc/X11/prefdm:
|
||||
# Run /etc/X11/prefdm
|
||||
files_exec_etc_files(rustdesk_t)
|
||||
files_read_usr_files(rustdesk_t)
|
||||
files_write_root_dirs(rustdesk_t)
|
||||
# file descriptors inherited from the rootfs:
|
||||
# file descriptors inherited from the rootfs
|
||||
files_dontaudit_rw_root_files(rustdesk_t)
|
||||
files_dontaudit_rw_root_chr_files(rustdesk_t)
|
||||
files_dontaudit_mounton_modules_object(rustdesk_t)
|
||||
@ -760,7 +760,7 @@ term_watch_reads_unallocated_ttys(rustdesk_t)
|
||||
term_watch_user_ttys(rustdesk_t)
|
||||
term_watch_reads_user_ttys(rustdesk_t)
|
||||
|
||||
# Run init scripts.
|
||||
# Run init scripts
|
||||
init_domtrans_script(rustdesk_t)
|
||||
init_exec_notrans_direct_init_entry(rustdesk_t)
|
||||
|
||||
@ -1050,7 +1050,7 @@ allow rustdesk_t pulseaudio_home_t:file { read open write lock };
|
||||
allow rustdesk_t user_fonts_cache_t:dir { add_name remove_name } ;
|
||||
allow rustdesk_t user_fonts_cache_t:file { create open read write lock unlink };
|
||||
|
||||
#!!!! This avc can be allowed using the boolean 'nis_enabled'
|
||||
#!!!! This AVC can be allowed using the boolean 'nis_enabled'
|
||||
allow rustdesk_t unreserved_port_t:tcp_socket name_connect;
|
||||
allow rustdesk_t xserver_port_t:tcp_socket name_connect;
|
||||
allow rustdesk_t xserver_t:unix_stream_socket connectto;
|
||||
@ -1797,9 +1797,9 @@ system_u:system_r:rustdesk_t:s0 110565 ? 00:00:00 rustdesk
|
||||
You can use the `sepolicy generate` command:
|
||||
|
||||
```sh
|
||||
$ # install deps
|
||||
$ # install dependencies
|
||||
$ sudo dnf install -y rpm rpm-build binutils
|
||||
$ # generate
|
||||
$ # generate policy
|
||||
$ sepolicy generate --init /usr/lib/rustdesk/rustdesk
|
||||
$ tree
|
||||
.
|
||||
@ -1813,14 +1813,12 @@ $
|
||||
$
|
||||
$ # generate rpm package rustdesk_selinux-1.0-1.fc38.src.rpm
|
||||
$ sudo ./rustdesk.sh
|
||||
$ # install
|
||||
$ # install package
|
||||
$ sudo dnf install -y rustdesk_selinux-1.0-1.fc38.src.rpm
|
||||
$ # restart the service
|
||||
$ sudo systemctl restart rustdesk
|
||||
```
|
||||
|
||||
### Troubleshooting
|
||||
|
||||
#### Iteratively Add Policies
|
||||
|
||||
```sh
|
||||
@ -1836,4 +1834,3 @@ $ make clean && make && sudo make install-policy
|
||||
- [SELinux/Tutorials](https://wiki.gentoo.org/wiki/SELinux/Tutorials)
|
||||
- [SELinux Policy module installation](https://fedoraproject.org/wiki/SELinux/IndependentPolicy#SELinux_Policy_module_installation)
|
||||
- [How to create SELinux custom policy rpm package](https://lukas-vrabec.com/index.php/2015/07/07/how-to-create-selinux-custom-policy-rpm-package/)
|
||||
|
||||
|
@ -5,14 +5,14 @@ weight: 4
|
||||
|
||||
### Installation
|
||||
|
||||
#### Ubuntu (>= 16)
|
||||
#### Ubuntu (≥ 16)
|
||||
|
||||
```sh
|
||||
# please ignore the wrong disk usage report
|
||||
sudo apt install -fy ./rustdesk-<version>.deb
|
||||
```
|
||||
|
||||
#### CentOS/Fedora (>= 18)
|
||||
#### CentOS/Fedora (≥ 18)
|
||||
|
||||
```sh
|
||||
sudo yum localinstall ./rustdesk-<version>.rpm
|
||||
@ -24,7 +24,7 @@ sudo yum localinstall ./rustdesk-<version>.rpm
|
||||
sudo pacman -U ./rustdesk-<version>.pkg.tar.zst
|
||||
```
|
||||
|
||||
#### openSUSE (>= Leap 15.0)
|
||||
#### openSUSE (≥ Leap 15.0)
|
||||
|
||||
```sh
|
||||
sudo zypper install --allow-unsigned-rpm ./rustdesk-<version>-suse.rpm
|
||||
|
@ -19,7 +19,7 @@ You only need to do this if you want to change the default server and public key
|
||||
The server URL and key you are using is hidden from other users on GitHub however they can download your client and connect to your server. If you require a fully private repo you can import the RustDesk Client repo using https://github.com/new/import. **If you use a private repo you have limited amounts of builds you can create per month, if you need more you will need to have a paid GitHub account.**
|
||||
{{% /notice %}}
|
||||
|
||||
On your fork you just created go to "Settings -> Secrets and variables -> Actions".
|
||||
On your fork you just created go to "Settings → Secrets and variables → Actions".
|
||||
|
||||
Click "New repository secret", for the name put RENDEZVOUS_SERVER, for the secret put your servers name/ip address.
|
||||
|
||||
@ -31,7 +31,7 @@ Click "Add secret".
|
||||
|
||||
### Enable workflows
|
||||
|
||||
On your fork you just created go to "Settings -> Actions -> General".
|
||||
On your fork you just created go to "Settings → Actions → General".
|
||||
|
||||
On the right, select "Allow all actions and reusable workflows".
|
||||
|
||||
@ -43,7 +43,7 @@ Finally you can click "Run workflow" to build the RustDesk Clients for all of th
|
||||
|
||||
### Enable upload permissions for workflows
|
||||
|
||||
On your fork you just created go to "Settings -> Actions -> General".
|
||||
On your fork you just created go to "Settings → Actions → General".
|
||||
|
||||
Scroll down and under Workflow permissions enable "Read and write permissions".
|
||||
|
||||
|
@ -42,7 +42,7 @@ Click on above `Advanced Settings`.
|
||||
{{% notice note %}}
|
||||
Synology's OS is Debian based, so host net (--net=host) works fine, we do not need to map ports with `-p` option.
|
||||
|
||||
`192.168.16.98` is an internal IP used here for demonstration only, please set it to a public IP when you deploy (or you can use your DDNS address if you have configured one in "Control Panel -> Connectivity -> DDNS") and don't forget to open ports on your router and your Synology firewall if this is enabled ("Control Panel -> Connectivity -> Firewall")!
|
||||
`192.168.16.98` is an internal IP used here for demonstration only, please set it to a public IP when you deploy (or you can use your DDNS address if you have configured one in "Control Panel → Connectivity → DDNS") and don't forget to open ports on your router and your Synology firewall if this is enabled ("Control Panel → Connectivity → Firewall")!
|
||||
|
||||
{{% /notice %}}
|
||||
|
||||
@ -70,4 +70,3 @@ Please repeat above `hbbs` steps, but name the container `hbbr` and command (for
|
||||
### Retrieve your Key
|
||||
|
||||
Browse to the folder setup before using File Station, download `id_ed25519.pub` and open with a text editor to via your key.
|
||||
|
||||
|
@ -81,10 +81,9 @@ Gmail in this example
|
||||
### Assign Device Users and Groups to Devices
|
||||
The User is the RustDesk User logged in on the device or assigned to the device by clicking `Edit` next to the device, click in the `User` box and drop-down to select your user, this will auto assign the group based on the group the user as been assigned to.
|
||||
|
||||
This can also be done via the API at command line on deployment or later by calling the RustDesk executable followed by `--assign --token <generatedtoken> --user_name <username>`. You need to go to "Settings -> Tokens -> Create" and create a token with Device permissions first to do this. An example of this on windows would be `"C:\Program Files\RustDesk\rustdesk.exe" --assign --token <generatedtoken> --user_name <newuser>`.
|
||||
This can also be done via the API at command line on deployment or later by calling the RustDesk executable followed by `--assign --token <generatedtoken> --user_name <username>`. You need to go to "Settings → Tokens → Create" and create a token with Device permissions first to do this. An example of this on windows would be `"C:\Program Files\RustDesk\rustdesk.exe" --assign --token <generatedtoken> --user_name <newuser>`.
|
||||
|
||||
### Searching for a device
|
||||
1. Go to Devices.
|
||||
2. In the Device Name Search Field type in the name and click `Query` or hit <kbd>Enter</kbd>.
|
||||
3. To use a wildcard add `%` at the start, end or both of the search term.
|
||||
|
||||
|
@ -7,7 +7,7 @@ weight: 6
|
||||
|
||||
Install Docker with this [guide](https://docs.docker.com/engine/install) to ensure its the most up to date!
|
||||
|
||||
Run the following commands (s6 image may need ./data:/data instead of ./data:/root):
|
||||
Run the following commands (s6 image may need `./data:/data` instead of `./data:/root`):
|
||||
|
||||
```sh
|
||||
sudo docker image pull rustdesk/rustdesk-server-pro
|
||||
|
@ -48,4 +48,4 @@ Note: No http / https before the addresses – they are automatically handled. A
|
||||
|
||||
If you have an error 500.52 add the mentioned variables: [IIS acting as reverse proxy: Where the problems start](https://techcommunity.microsoft.com/t5/iis-support-blog/iis-acting-as-reverse-proxy-where-the-problems-start/ba-p/846259).
|
||||
|
||||
You maybe need to change your SSL Settings to "Require SSL -> Ignore".
|
||||
You maybe need to change your SSL Settings to "Require SSL → Ignore".
|
||||
|
Loading…
Reference in New Issue
Block a user