You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

Xvnc.man 14KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404
  1. .TH Xvnc 1 "" "TigerVNC" "Virtual Network Computing"
  2. .SH NAME
  3. Xvnc \- the X VNC server
  4. .SH SYNOPSIS
  5. .B Xvnc
  6. .RI [ options ]
  7. .RI : display#
  8. .SH DESCRIPTION
  9. .B Xvnc
  10. is the X VNC (Virtual Network Computing) server. It is based on a standard X
  11. server, but it has a "virtual" screen rather than a physical one. X
  12. applications display themselves on it as if it were a normal X display, but
  13. they can only be accessed via a VNC viewer - see \fBvncviewer\fP(1).
  14. So Xvnc is really two servers in one. To the applications it is an X server,
  15. and to the remote VNC users it is a VNC server. By convention we have arranged
  16. that the VNC server display number will be the same as the X server display
  17. number, which means you can use eg. snoopy:2 to refer to display 2 on machine
  18. "snoopy" in both the X world and the VNC world.
  19. The best way of starting \fBXvnc\fP is via \fBvncsession\fP. This sets up the
  20. environment appropriately and starts a desktop environment. See the manual
  21. page for \fBvncsession\fP(8) for more information.
  22. .SH OPTIONS
  23. .B Xvnc
  24. takes lots of options - running \fBXvnc -help\fP gives a list. Many of these
  25. are standard X server options, which are described in the \fBXserver\fP(1)
  26. manual page. In addition to options which can only be set via the
  27. command-line, there are also "parameters" which can be set both via the
  28. command-line and through the \fBvncconfig\fP(1) program.
  29. .TP
  30. .B \-geometry \fIwidth\fPx\fIheight\fP
  31. Specify the size of the desktop to be created. Default is 1024x768.
  32. .
  33. .TP
  34. .B \-depth \fIdepth\fP
  35. Specify the pixel depth in bits of the desktop to be created. Default is 24,
  36. other possible values are 16 and 32. Anything else is likely to cause strange
  37. behaviour by applications and may prevent the server from starting at all.
  38. .
  39. .TP
  40. .B \-pixelformat \fIformat\fP
  41. Specify pixel format for server to use (BGRnnn or RGBnnn). The default for
  42. depth 16 is RGB565 and for depth 24 and 32 is RGB888.
  43. .
  44. .TP
  45. .B \-interface \fIIP address\fP
  46. Listen on interface. By default Xvnc listens on all available interfaces.
  47. .
  48. .TP
  49. .B \-inetd
  50. This significantly changes Xvnc's behaviour so that it can be launched from
  51. inetd. See the section below on usage with inetd.
  52. .
  53. .TP
  54. .B \-help
  55. List all the options and parameters
  56. .SH PARAMETERS
  57. VNC parameters can be set both via the command-line and through the
  58. \fBvncconfig\fP(1) program, and with a VNC-enabled Xorg server via Options
  59. entries in the xorg.conf file.
  60. Parameters can be turned on with -\fIparam\fP or off with
  61. -\fIparam\fP=0. Parameters which take a value can be specified as
  62. -\fIparam\fP \fIvalue\fP. Other valid forms are \fIparam\fP\fB=\fP\fIvalue\fP
  63. -\fIparam\fP=\fIvalue\fP --\fIparam\fP=\fIvalue\fP. Parameter names are
  64. case-insensitive.
  65. .TP
  66. .B \-desktop \fIdesktop-name\fP
  67. Each desktop has a name which may be displayed by the viewer. It defaults to
  68. "<user>@<hostname>".
  69. .
  70. .TP
  71. .B \-rfbport \fIport\fP
  72. Specifies the TCP port on which Xvnc listens for connections from viewers (the
  73. protocol used in VNC is called RFB - "remote framebuffer"). The default is
  74. 5900 plus the display number. Specify \fB-1\fP to disable listening on a TCP
  75. port.
  76. .
  77. .TP
  78. .B \-UseIPv4
  79. Use IPv4 for incoming and outgoing connections. Default is on.
  80. .
  81. .TP
  82. .B \-UseIPv6
  83. Use IPv6 for incoming and outgoing connections. Default is on.
  84. .
  85. .TP
  86. .B \-rfbunixpath \fIpath\fP
  87. Specifies the path of a Unix domain socket on which Xvnc listens for
  88. connections from viewers.
  89. .
  90. .TP
  91. .B \-rfbunixmode \fImode\fP
  92. Specifies the mode of the Unix domain socket. The default is 0600.
  93. .
  94. .TP
  95. .B \-rfbauth \fIpasswd-file\fP, \-PasswordFile \fIpasswd-file\fP
  96. Password file for VNC authentication. There is no default, you should
  97. specify the password file explicitly. Password file should be created with
  98. the \fBvncpasswd\fP(1) utility. The file is accessed each time a connection
  99. comes in, so it can be changed on the fly.
  100. .
  101. .TP
  102. .B \-AcceptCutText
  103. Accept clipboard updates from clients. Default is on.
  104. .
  105. .TP
  106. .B \-MaxCutText \fIbytes\fP
  107. The maximum size of a clipboard update that will be accepted from a client.
  108. Default is \fB262144\fP.
  109. .
  110. .TP
  111. .B \-SendCutText
  112. Send clipboard changes to clients. Default is on.
  113. .
  114. .TP
  115. .B \-SendPrimary
  116. Send the primary selection and cut buffer to the server as well as the
  117. clipboard selection. Default is on.
  118. .
  119. .TP
  120. .B \-AcceptPointerEvents
  121. Accept pointer press and release events from clients. Default is on.
  122. .
  123. .TP
  124. .B \-AcceptKeyEvents
  125. Accept key press and release events from clients. Default is on.
  126. .
  127. .TP
  128. .B \-AcceptSetDesktopSize
  129. Accept requests to resize the size of the desktop. Default is on.
  130. .
  131. .TP
  132. .B \-DisconnectClients
  133. Disconnect existing clients if an incoming connection is non-shared. Default is
  134. on. If \fBDisconnectClients\fP is false, then a new non-shared connection will
  135. be refused while there is a client active. When combined with
  136. \fBNeverShared\fP this means only one client is allowed at a time.
  137. .
  138. .TP
  139. .B \-NeverShared
  140. Never treat incoming connections as shared, regardless of the client-specified
  141. setting. Default is off.
  142. .
  143. .TP
  144. .B \-AlwaysShared
  145. Always treat incoming connections as shared, regardless of the client-specified
  146. setting. Default is off.
  147. .
  148. .TP
  149. .B \-Protocol3.3
  150. Always use protocol version 3.3 for backwards compatibility with badly-behaved
  151. clients. Default is off.
  152. .
  153. .TP
  154. .B \-FrameRate \fIfps\fP
  155. The maximum number of updates per second sent to each client. If the screen
  156. updates any faster then those changes will be aggregated and sent in a single
  157. update to the client. Note that this only controls the maximum rate and a
  158. client may get a lower rate when resources are limited. Default is \fB60\fP.
  159. .
  160. .TP
  161. .B \-CompareFB \fImode\fP
  162. Perform pixel comparison on framebuffer to reduce unnecessary updates. Can
  163. be either \fB0\fP (off), \fB1\fP (always) or \fB2\fP (auto). Default is
  164. \fB2\fP.
  165. .
  166. .TP
  167. .B \-ZlibLevel \fIlevel\fP
  168. Zlib compression level for ZRLE encoding (it does not affect Tight encoding).
  169. Acceptable values are between 0 and 9. Default is to use the standard
  170. compression level provided by the \fBzlib\fP(3) compression library.
  171. .
  172. .TP
  173. .B \-ImprovedHextile
  174. Use improved compression algorithm for Hextile encoding which achieves better
  175. compression ratios by the cost of using slightly more CPU time. Default is
  176. on.
  177. .
  178. .TP
  179. .B \-SecurityTypes \fIsec-types\fP
  180. Specify which security scheme to use for incoming connections. Valid values
  181. are a comma separated list of \fBNone\fP, \fBVncAuth\fP, \fBPlain\fP,
  182. \fBTLSNone\fP, \fBTLSVnc\fP, \fBTLSPlain\fP, \fBX509None\fP, \fBX509Vnc\fP,
  183. \fBX509Plain\fP, \fBRA2\fP, \fBRA2ne\fP, \fBRA2_256\fP and \fBRA2ne_256\fP.
  184. Default is \fBVncAuth,RA2_256,RA2,RA2ne_256,RA2ne,TLSVnc\fP.
  185. .
  186. .TP
  187. .B \-Password \fIpassword\fP
  188. Obfuscated binary encoding of the password which clients must supply to
  189. access the server. Using this parameter is insecure, use \fBPasswordFile\fP
  190. parameter instead.
  191. .
  192. .TP
  193. .B \-PlainUsers \fIuser-list\fP
  194. A comma separated list of user names that are allowed to authenticate via
  195. any of the "Plain" security types (Plain, TLSPlain, etc.). Specify \fB*\fP
  196. to allow any user to authenticate using this security type. Default is to
  197. deny all users.
  198. .
  199. .TP
  200. .B \-pam_service \fIname\fP, \-PAMService \fIname\fP
  201. PAM service name to use when authentication users using any of the "Plain"
  202. security types. Default is \fBvnc\fP.
  203. .
  204. .TP
  205. .B \-X509Cert \fIpath\fP
  206. Path to a X509 certificate in PEM format to be used for all X509 based
  207. security types (X509None, X509Vnc, etc.).
  208. .
  209. .TP
  210. .B \-X509Key \fIpath\fP
  211. Private key counter part to the certificate given in \fBX509Cert\fP. Must
  212. also be in PEM format.
  213. .
  214. .TP
  215. .B \-GnuTLSPriority \fIpriority\fP
  216. GnuTLS priority string that controls the TLS session’s handshake algorithms.
  217. See the GnuTLS manual for possible values. For GnuTLS < 3.6.3 the default
  218. value will be \fBNORMAL\fP to use upstream default. For newer versions
  219. of GnuTLS system-wide crypto policy will be used.
  220. .
  221. .TP
  222. .B \-RSAKey \fIpath\fP
  223. Path to the RSA key for the RSA-AES security types (\fBRA2\fP, \fBRA2ne\fP,
  224. \fBRA2_256\fP and \fBRA2ne_256\fP) in PEM format.
  225. .
  226. .TP
  227. .B \-RequireUsername
  228. Require username for the RSA-AES security types. Default is off.
  229. .
  230. .TP
  231. .B \-UseBlacklist
  232. Temporarily reject connections from a host if it repeatedly fails to
  233. authenticate. Default is on.
  234. .
  235. .TP
  236. .B \-BlacklistThreshold \fIcount\fP
  237. The number of unauthenticated connection attempts allowed from any individual
  238. host before that host is black-listed. Default is 5.
  239. .
  240. .TP
  241. .B \-BlacklistTimeout \fIseconds\fP
  242. The initial timeout applied when a host is first black-listed. The host
  243. cannot re-attempt a connection until the timeout expires. Default is 10.
  244. .
  245. .TP
  246. .B \-IdleTimeout \fIseconds\fP
  247. The number of seconds after which an idle VNC connection will be dropped.
  248. Default is 0, which means that idle connections will never be dropped.
  249. .
  250. .TP
  251. .B \-MaxDisconnectionTime \fIseconds\fP
  252. Terminate when no client has been connected for \fIN\fP seconds. Default is
  253. 0.
  254. .
  255. .TP
  256. .B \-MaxConnectionTime \fIseconds\fP
  257. Terminate when a client has been connected for \fIN\fP seconds. Default is
  258. 0.
  259. .
  260. .TP
  261. .B \-MaxIdleTime \fIseconds\fP
  262. Terminate after \fIN\fP seconds of user inactivity. Default is 0.
  263. .
  264. .TP
  265. .B \-QueryConnect
  266. Prompts the user of the desktop to explicitly accept or reject incoming
  267. connections. Default is off.
  268. The \fBvncconfig\fP(1) program must be running on the desktop in order for
  269. QueryConnect to be supported.
  270. .
  271. .TP
  272. .B \-QueryConnectTimeout \fIseconds\fP
  273. Number of seconds to show the Accept Connection dialog before rejecting the
  274. connection. Default is \fB10\fP.
  275. .
  276. .TP
  277. .B \-localhost
  278. Only allow connections from the same machine. Useful if you use SSH and want to
  279. stop non-SSH connections from any other hosts.
  280. .
  281. .TP
  282. .B \-Log \fIlogname\fP:\fIdest\fP:\fIlevel\fP
  283. Configures the debug log settings. \fIdest\fP can currently be \fBstderr\fP,
  284. \fBstdout\fP or \fBsyslog\fP, and \fIlevel\fP is between 0 and 100, 100 meaning
  285. most verbose output. \fIlogname\fP is usually \fB*\fP meaning all, but you can
  286. target a specific source file if you know the name of its "LogWriter". Default
  287. is \fB*:stderr:30\fP.
  288. .
  289. .TP
  290. .B \-RemapKeys \fImapping
  291. Sets up a keyboard mapping.
  292. .I mapping
  293. is a comma-separated string of character mappings, each of the form
  294. .IR char -> char ,
  295. or
  296. .IR char <> char ,
  297. where
  298. .I char
  299. is a hexadecimal keysym. For example, to exchange the " and @ symbols you would specify the following:
  300. .RS 10
  301. RemapKeys=0x22<>0x40
  302. .RE
  303. .
  304. .TP
  305. .B \-AvoidShiftNumLock
  306. Key affected by NumLock often require a fake Shift to be inserted in order
  307. for the correct symbol to be generated. Turning on this option avoids these
  308. extra fake Shift events but may result in a slightly different symbol
  309. (e.g. a Return instead of a keypad Enter).
  310. .
  311. .TP
  312. .B \-RawKeyboard
  313. Send keyboard events straight through and avoid mapping them to the current
  314. keyboard layout. This effectively makes the keyboard behave according to the
  315. layout configured on the server instead of the layout configured on the
  316. client. Default is off.
  317. .
  318. .TP
  319. .B \-AllowOverride
  320. Comma separated list of parameters that can be modified using VNC extension.
  321. Parameters can be modified for example using \fBvncconfig\fP(1) program from
  322. inside a running session.
  323. Allowing override of parameters such as \fBPAMService\fP or \fBPasswordFile\fP
  324. can negatively impact security if Xvnc runs under different user than the
  325. programs allowed to override the parameters.
  326. When \fBNoClipboard\fP parameter is set, allowing override of \fBSendCutText\fP
  327. and \fBAcceptCutText\fP has no effect.
  328. Default is \fBdesktop,AcceptPointerEvents,SendCutText,AcceptCutText,SendPrimary,SetPrimary\fP.
  329. .SH USAGE WITH INETD
  330. By configuring the \fBinetd\fP(1) service appropriately, Xvnc can be launched
  331. on demand when a connection comes in, rather than having to be started
  332. manually. When given the \fB-inetd\fP option, instead of listening for TCP
  333. connections on a given port it uses its standard input and standard output.
  334. There are two modes controlled by the wait/nowait entry in the inetd.conf file.
  335. In the nowait mode, Xvnc uses its standard input and output directly as the
  336. connection to a viewer. It never has a listening socket, so cannot accept
  337. further connections from viewers (it can however connect out to listening
  338. viewers by use of the vncconfig program). Further viewer connections to the
  339. same TCP port result in inetd spawning off a new Xvnc to deal with each
  340. connection. When the connection to the viewer dies, the Xvnc and any
  341. associated X clients die. This behaviour is most useful when combined with the
  342. XDMCP options -query and -once. An typical example in inetd.conf might be (all
  343. on one line):
  344. 5950 stream tcp nowait nobody /usr/local/bin/Xvnc Xvnc -inetd -query
  345. localhost -once securitytypes=none
  346. In this example a viewer connection to :50 will result in a new Xvnc for that
  347. connection which should display the standard XDM login screen on that machine.
  348. Because the user needs to login via XDM, it is usually OK to accept connections
  349. without a VNC password in this case.
  350. In the wait mode, when the first connection comes in, inetd gives the listening
  351. socket to Xvnc. This means that for a given TCP port, there is only ever one
  352. Xvnc at a time. Further viewer connections to the same port are accepted by
  353. the same Xvnc in the normal way. Even when the original connection is broken,
  354. the Xvnc will continue to run. If this is used with the XDMCP options -query
  355. and -once, the Xvnc and associated X clients will die when the user logs out of
  356. the X session in the normal way. It is important to use a VNC password in this
  357. case. A typical entry in inetd.conf might be:
  358. 5951 stream tcp wait james /usr/local/bin/Xvnc Xvnc -inetd -query localhost -once passwordFile=/home/james/.vnc/passwd
  359. In fact typically, you would have one entry for each user who uses VNC
  360. regularly, each of whom has their own dedicated TCP port which they use. In
  361. this example, when user "james" connects to :51, he enters his VNC password,
  362. then gets the XDM login screen where he logs in in the normal way. However,
  363. unlike the previous example, if he disconnects, the session remains persistent,
  364. and when he reconnects he will get the same session back again. When he logs
  365. out of the X session, the Xvnc will die, but of course a new one will be
  366. created automatically the next time he connects.
  367. .SH SEE ALSO
  368. .BR vncconfig (1),
  369. .BR vncpasswd (1),
  370. .BR vncviewer (1),
  371. .BR vncsession (8),
  372. .BR Xserver (1),
  373. .BR inetd (1)
  374. .br
  375. https://www.tigervnc.org
  376. .SH AUTHOR
  377. Tristan Richardson, RealVNC Ltd. and others.
  378. VNC was originally developed by the RealVNC team while at Olivetti
  379. Research Ltd / AT&T Laboratories Cambridge. TightVNC additions were
  380. implemented by Constantin Kaplinsky. Many other people have since
  381. participated in development, testing and support. This manual is part
  382. of the TigerVNC software suite.