1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
|
#+TITLE: Reverse engineering a thermal printer's WiFi setup commands
#+DATE: 2021-10-12T15:57:12-04:00
#+DRAFT: false
#+SHOWTOC: true
#+DESCRIPTION: Setting up an Xprinter thermal receipt printer WiFi from Linux
#+TAGS[]: linux hardware
#+KEYWORDS[]: linux hardware
#+SLUG:
#+SUMMARY:
* Introduction
#+ATTR_HTML: :title Thermal printer AliExpress page
#+ATTR_HTML: :alt Thermal printer AliExpress page
[[file:xprinter_aliexpress_page.png]]
I recently purchased a thermal receipt printer off of [[https://web.archive.org/web/20211012195845/https://www.aliexpress.com/item/32842111016.html?spm=a2g0s.9042311.0.0.207d4c4d6xNWgO][AliExpress]] for a
project. It features both WiFi and USB connectivity which I thought
was really cool for the price.
To my dismay, I realized after purchasing that the drivers and
configuration application only run on Windows.
This wasn't a huge deal, as thermal printers generally use the
somewhat kinda standardized command set called [[https://github.com/escpos/escpos][ESC/POS]]. Unfortunately
while many of the formatting commands are shared between printers, the
commands to setup the WiFi connection don't seem to be documented
anywhere, and I suspect are device-specific.
Since booting into Windows every time I want to manage the printer's
network settings isn't ideal, I decided to reverse engineer the
WiFi configuration commands.
Initially I tried to run the configuration tool in wine, but it
couldn't communicate with the printer over USB, which wasn't too
surprising.
* Running in Windows
I booted my spare laptop into windows and launched the config tool
there.
I then setup the WiFi through =Advanced -> Set Net=
#+ATTR_HTML: :title Xprinter config tool running in wine
#+ATTR_HTML: :alt Xprinter config tool running in wine
[[file:xprinter_setup_tool.png]]
#+ATTR_HTML: :title Xprinter advanced settings
#+ATTR_HTML: :alt Xprinter advanced settings
[[file:xprinter_advanced.png]]
#+ATTR_HTML: :title Xprinter net settings
#+ATTR_HTML: :alt Xprinter net settings
[[file:xprinter_set_net.png]]
At this point I noticed that the application supported configuring the
printer over the network, meaning I might be able to change the
settings under wine again, as network sockets should work normally.
* Wireshark on Linux
After rebooting into Linux and testing my assumption, it turned out to
be half true, I was able to run the configuration tool over the
network without issue and print from it, but I couldn't configure the
WiFi.
While I could have stopped there I decided to go one step further and
reverse the command sequence that configures the WiFi settings so I
could re-configure the printer's WiFi over USB if it ever got messed
up.
To do that, I sniffed the traffic going from the Xprinter application
and the printer's socket using Wireshark, assuming the commands it
sends over the network are the same ones it sends over USB.
[[file:xprinter_wireshark.png]]
In the examples below I've encoded the data being sent to hex to make
it easier to understand the contents of the packets.
Based on the traffic, I was able to come up with the following.
** Setting IP address
The following sets
- IP =192.168.0.7=
The IP hex:
#+begin_src ruby
[192, 168, 0, 7].map { _1.to_s(16).rjust(2, '0') }
#+end_src
#+RESULTS:
| c0 | a8 | 00 | 07 |
Packet contents from wireshark:
=0000 1f 1b 1f 22 c0 a8 00 07=
| Description | Characters |
|----------------+---------------|
| Unit separator | =1f= |
| Escape | =1b= |
| Unit separator | =1f= |
| Command code | =22= |
| IP | =c0 a8 00 07= |
** Setting subnet Mask
The following sets
- Subnet mask =255.255.255.0=
Subnet mask to hex:
#+begin_src ruby
[255, 255, 255, 0].map { _1.to_s(16).rjust(2, '0') }
#+end_src
#+RESULTS:
| ff | ff | ff | 00 |
Packet contents from wireshark:
=0000 1f 1b 1f b0 ff ff ff 00=
| Description | Character |
|----------------+---------------|
| Unit separator | =1f= |
| Escape | =1b= |
| Unit separator | =1f= |
| Command code | =b0= |
| Subnet mask | =ff ff ff 00= |
** Setting gateway
The following sets
- Gateway =192.168.0.1=
Subnet mask to hex:
#+begin_src ruby
[192, 168, 0, 1].map { _1.to_s(16).rjust(2, '0') }
#+end_src
#+RESULTS:
| c0 | a8 | 00 | 01 |
Packet contents from wireshark:
=0000 1f 1b 1f b1 c0 a8 00 01=
| Description | Character |
|----------------+---------------|
| Unit separator | =1f= |
| Escape | =1b= |
| Unit separator | =1f= |
| Command code | =b1= |
| Net Mask | =c0 a8 00 01= |
** Setting IP, subnet mask, and gateway
The following sets
- IP =192.168.0.1=
- Subnet mask =255.255.255.0=
- Gateway =192.168.0.1=
Packet contents from wireshark:
=0000 1f 1b 1f b2 c0 a8 00 07 ff ff ff 00 c0 a8 00 01=
| Purpose | Character |
|----------------+---------------|
| Unit separator | =1f= |
| Escape | =1b= |
| Unit separator | =1f= |
| Command code | =b2= |
| IP | =c0 a8 00 07= |
| Subnet mask | =ff ff ff 00= |
| Gateway | =c0 a8 00 01= |
** Setting WiFi network
The following sets
- SSID =SSID_HERE=
- Key =PASSWORD_HERE=
- Key Type =WPA2_AES_PSK=
SSID to hex:
#+begin_src ruby
"SSID_HERE".bytes.map { _1.to_s(16) }
#+end_src
#+RESULTS:
| 53 | 53 | 49 | 44 | 5f | 48 | 45 | 52 | 45 |
Key to hex:
#+begin_src ruby
"PASSWORD_HERE".bytes.map { _1.to_s(16) }
#+end_src
#+RESULTS:
| 50 | 41 | 53 | 53 | 57 | 4f | 52 | 44 | 5f | 48 | 45 | 52 | 45 |
Packet contents from wireshark (including string representation):
#+begin_src
0000 1f 1b 1f b3 06 53 53 49 44 5f 48 45 52 45 00 50 .....SSID_HERE.P
0010 41 53 53 57 4f 52 44 5f 48 45 52 45 00 ASSWORD_HERE.
#+end_src
| Purpose | Character |
|-----------------+-----------------|
| Unit separator | =1f= |
| Escape | =1b= |
| Unit separator | =1f= |
| Command code | =b3= |
| Key type | =06= |
| SSID | =SSID_HERE= |
| NUL-termination | =00= |
| Key | =PASSWORD_HERE= |
| NUL-termination | =00= |
If the WiFi key type is anything like the menu, the other key types
are as follows
| Key Type | Value |
|----------------------+-------|
| =NULL= | =00= |
| =WEP64= | =01= |
| =WEP128= | =02= |
| =WPA_AES_PSK= | =03= |
| =WPA_TKIP_PSK= | =04= |
| =WPA_TKIP_AES_PSK= | =05= |
| =WPA2_AES_PSK= | =06= |
| =WPA2_TKIP= | =07= |
| =WPA2_TKIP_AES_PSK= | =08= |
| =WPA_WPA2_MixedMode= | =09= |
** Setting all network options
The following sets
- IP =192.168.0.7=
- Subnet mask =255.255.255.0=
- Gateway =192.168.0.1=
- SSID =SSID_HERE=
- Key =PASSWORD_HERE=
- Key Type =WPA2_AES_PSK=
Packet contents from wireshark (including string representation):
#+begin_src
0000 1f 1b 1f b4 c0 a8 00 07 ff ff ff 00 c0 a8 00 01 ................
0010 06 53 53 49 44 5f 48 45 52 45 00 50 41 53 53 57 .SSID_HERE.PASSW
0020 4f 52 44 5f 48 45 52 45 00 ORD_HERE.
#+end_src
| Description | Character |
|-----------------+-----------------|
| Unit Separator | =1f= |
| Escape | =1b= |
| Unit Separator | =1f= |
| Command Code | =b4= |
| IP | =c0 a8 00 07= |
| NetMask | =ff ff ff 00= |
| Gateway | =c0 a8 00 01= |
| Key Type | =06= |
| SSID | =SSID_HERE= |
| NUL-termination | =00= |
| Key | =PASSWORD_HERE= |
| NUL-termination | =00= |
* Post-packet analysis
At this point, after writing an application that could send
identical packets given the correct input, I realized that for some
reason, my printer was not responding to the commands issued from
either the config utility or my program.
I tried to look deeper for better documentation, but was only able
to come across [[file:80XX_Programmer_Manual.pdf][this PDF]] from their [[https://xprinter.com.ua/terms--conditions.html][Russian language website]], which
unfortunately still didn't contain the WiFi setup instructions.
I was also able to find [[https://github.com/daotuyen9244/XprinterPOS][this]] GitHub repo that seems to contain some
commands for Xprinter systems, but not the ones I need.
The data sheets on the Xprinter website claims they have the Linux
test utility, which should contain the necessary tools to configure
wifi on the printers, but it seems they only support Android and
Windows.
* Wine USB attempt 2
I tried again to get the printer software to work under wine. It
turns out wine only looks at =/dev/lp*= devices by default and
doesn't add =/dev/usb/lp*=. This time I searched the wine wiki for
ways to get the Linux =/dev/usb/lp0= device to show up as =LPT1=
under wine. After some digging it appears you can tell wine which
devices to map to =COM= / =LPT= ports with registry values.
It's described in section [[https://wiki.winehq.org/Wine_User's_Guide#Serial_and_Parallel_Ports][4.3.1]] on the [[https://wiki.winehq.org/Wine_User's_Guide][Wine User's Guide]].
I followed the guide and created the following registry key.
#+ATTR_HTML: :title Adding the registry key in wine
#+ATTR_HTML: :alt wine regedit
[[file:xprinter_wine_regedit.png]]
I then restarted the wine server using the following command.
#+begin_src shell
wineserver -k
#+end_src
I've exported the registry entry [[file:xprinter_lp0.reg][here]] in case anyone wants to do the
same.
At that point the Xprinter setup tool was able to recognize the
printer as =LPT1=.
I then setup wireshark to be able to sniff USB traffic using the
their guide [[https://wiki.wireshark.org/CaptureSetup/USB][here]].
From there I was able to figure out which USB hub it was running
through and its device ID, and filter it out using a wireshark
filter.
#+ATTR_HTML: :title wireshark USB sniffing
#+ATTR_HTML: :alt wireshark USB sniffing
[[file:xprinter_usb_wireshark.png]]
After sniffing the USB traffic sent by the xprinter configuration
app, it looks identical to what was being sent over the TCP
connection, meaning what I built should have worked.
* The solution
So apparently I made some assumptions when starting this project
that turned out to not be true.
It seems only the command to set all options at once consistently
works, even when using the Xprinter setup tool from within Windows.
The printer will also not allow you to reconfigure it's WiFi unless
connected over USB.
After I narrowed down the number of commands I was testing to only
=xb4= and only trying over USB, it worked fine.
I suppose I should have checked that all the commands worked
properly from the beginning, but I did learn a lot along the way
so it wasn't a total loss.
After figuring out the issue, I wrote a small command line tool to
configure the printer. You can check it out [[https://github.com/dantecatalfamo/xprinter-wifi][here]].
#+ATTR_HTML: :title Xprinter WiFi config tool screenshot
#+ATTR_HTML: :alt Xprinter WiFi config tool screenshot
[[file:xprinter_wifi_screenshot.png]]
|