You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

Xvnc.man 14KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400
  1. .TH Xvnc 1 "" "TigerVNC" "Virtual Network Computing"
  2. .SH NAME
  3. Xvnc \- the X VNC server
  4. .SH SYNOPSIS
  5. .B Xvnc
  6. .RI [ options ]
  7. .RI : display#
  8. .SH DESCRIPTION
  9. .B Xvnc
  10. is the X VNC (Virtual Network Computing) server. It is based on a standard X
  11. server, but it has a "virtual" screen rather than a physical one. X
  12. applications display themselves on it as if it were a normal X display, but
  13. they can only be accessed via a VNC viewer - see \fBvncviewer\fP(1).
  14. So Xvnc is really two servers in one. To the applications it is an X server,
  15. and to the remote VNC users it is a VNC server. By convention we have arranged
  16. that the VNC server display number will be the same as the X server display
  17. number, which means you can use eg. snoopy:2 to refer to display 2 on machine
  18. "snoopy" in both the X world and the VNC world.
  19. The best way of starting \fBXvnc\fP is via the \fBvncserver\fP script. This
  20. sets up the environment appropriately and runs some X applications to get you
  21. going. See the manual page for \fBvncserver\fP(1) for more information.
  22. .SH OPTIONS
  23. .B Xvnc
  24. takes lots of options - running \fBXvnc -help\fP gives a list. Many of these
  25. are standard X server options, which are described in the \fBXserver\fP(1)
  26. manual page. In addition to options which can only be set via the
  27. command-line, there are also "parameters" which can be set both via the
  28. command-line and through the \fBvncconfig\fP(1) program.
  29. .TP
  30. .B \-geometry \fIwidth\fPx\fIheight\fP
  31. Specify the size of the desktop to be created. Default is 1024x768.
  32. .
  33. .TP
  34. .B \-depth \fIdepth\fP
  35. Specify the pixel depth in bits of the desktop to be created. Default is 24,
  36. other possible values are 8, 15, and 16 - anything else is likely to cause
  37. strange behaviour by applications.
  38. .
  39. .TP
  40. .B \-pixelformat \fIformat\fP
  41. Specify pixel format for server to use (BGRnnn or RGBnnn). The default for
  42. depth 8 is BGR233 (meaning the most significant two bits represent blue, the
  43. next three green, and the least significant three represent red), the default
  44. for depth 16 is RGB565 and for depth 24 is RGB888.
  45. .
  46. .TP
  47. .B \-interface \fIIP address\fP
  48. Listen on interface. By default Xvnc listens on all available interfaces.
  49. .
  50. .TP
  51. .B \-inetd
  52. This significantly changes Xvnc's behaviour so that it can be launched from
  53. inetd. See the section below on usage with inetd.
  54. .
  55. .TP
  56. .B \-help
  57. List all the options and parameters
  58. .SH PARAMETERS
  59. VNC parameters can be set both via the command-line and through the
  60. \fBvncconfig\fP(1) program, and with a VNC-enabled Xorg server via Options
  61. entries in the xorg.conf file.
  62. Parameters can be turned on with -\fIparam\fP or off with
  63. -\fIparam\fP=0. Parameters which take a value can be specified as
  64. -\fIparam\fP \fIvalue\fP. Other valid forms are \fIparam\fP\fB=\fP\fIvalue\fP
  65. -\fIparam\fP=\fIvalue\fP --\fIparam\fP=\fIvalue\fP. Parameter names are
  66. case-insensitive.
  67. .TP
  68. .B \-desktop \fIdesktop-name\fP
  69. Each desktop has a name which may be displayed by the viewer. It defaults to
  70. "x11".
  71. .
  72. .TP
  73. .B \-rfbport \fIport\fP
  74. Specifies the TCP port on which Xvnc listens for connections from viewers (the
  75. protocol used in VNC is called RFB - "remote framebuffer"). The default is
  76. 5900 plus the display number.
  77. .
  78. .TP
  79. .B \-UseIPv4
  80. Use IPv4 for incoming and outgoing connections. Default is on.
  81. .
  82. .TP
  83. .B \-UseIPv6
  84. Use IPv6 for incoming and outgoing connections. Default is on.
  85. .
  86. .TP
  87. .B \-rfbunixpath \fIpath\fP
  88. Specifies the path of a Unix domain socket on which Xvnc listens for
  89. connections from viewers, instead of listening on a TCP port.
  90. .
  91. .TP
  92. .B \-rfbunixmode \fImode\fP
  93. Specifies the mode of the Unix domain socket. The default is 0600.
  94. .
  95. .TP
  96. .B \-rfbwait \fItime\fP, \-ClientWaitTimeMillis \fItime\fP
  97. Time in milliseconds to wait for a viewer which is blocking the server. This is
  98. necessary because the server is single-threaded and sometimes blocks until the
  99. viewer has finished sending or receiving a message - note that this does not
  100. mean an update will be aborted after this time. Default is 20000 (20 seconds).
  101. .
  102. .TP
  103. .B \-rfbauth \fIpasswd-file\fP, \-PasswordFile \fIpasswd-file\fP
  104. Password file for VNC authentication. There is no default, you should
  105. specify the password file explicitly. Password file should be created with
  106. the \fBvncpasswd\fP(1) utility. The file is accessed each time a connection
  107. comes in, so it can be changed on the fly.
  108. .
  109. .TP
  110. .B \-AcceptCutText
  111. Accept clipboard updates from clients. Default is on.
  112. .
  113. .TP
  114. .B \-MaxCutText \fIbytes\fP
  115. The maximum size of a clipboard update that will be accepted from a client.
  116. Default is \fB262144\fP.
  117. .
  118. .TP
  119. .B \-SendCutText
  120. Send clipboard changes to clients. Default is on.
  121. .
  122. .TP
  123. .B \-SendPrimary
  124. Send the primary selection and cut buffer to the server as well as the
  125. clipboard selection. Default is on.
  126. .
  127. .TP
  128. .B \-AcceptPointerEvents
  129. Accept pointer press and release events from clients. Default is on.
  130. .
  131. .TP
  132. .B \-AcceptKeyEvents
  133. Accept key press and release events from clients. Default is on.
  134. .
  135. .TP
  136. .B \-AcceptSetDesktopSize
  137. Accept requests to resize the size of the desktop. Default is on.
  138. .
  139. .TP
  140. .B \-DisconnectClients
  141. Disconnect existing clients if an incoming connection is non-shared. Default is
  142. on. If \fBDisconnectClients\fP is false, then a new non-shared connection will
  143. be refused while there is a client active. When combined with
  144. \fBNeverShared\fP this means only one client is allowed at a time.
  145. .
  146. .TP
  147. .B \-NeverShared
  148. Never treat incoming connections as shared, regardless of the client-specified
  149. setting. Default is off.
  150. .
  151. .TP
  152. .B \-AlwaysShared
  153. Always treat incoming connections as shared, regardless of the client-specified
  154. setting. Default is off.
  155. .
  156. .TP
  157. .B \-Protocol3.3
  158. Always use protocol version 3.3 for backwards compatibility with badly-behaved
  159. clients. Default is off.
  160. .
  161. .TP
  162. .B \-FrameRate \fIfps\fP
  163. The maximum number of updates per second sent to each client. If the screen
  164. updates any faster then those changes will be aggregated and sent in a single
  165. update to the client. Note that this only controls the maximum rate and a
  166. client may get a lower rate when resources are limited. Default is \fB60\fP.
  167. .
  168. .TP
  169. .B \-CompareFB \fImode\fP
  170. Perform pixel comparison on framebuffer to reduce unnecessary updates. Can
  171. be either \fB0\fP (off), \fB1\fP (always) or \fB2\fP (auto). Default is
  172. \fB2\fP.
  173. .
  174. .TP
  175. .B \-ZlibLevel \fIlevel\fP
  176. Zlib compression level for ZRLE encoding (it does not affect Tight encoding).
  177. Acceptable values are between 0 and 9. Default is to use the standard
  178. compression level provided by the \fBzlib\fP(3) compression library.
  179. .
  180. .TP
  181. .B \-ImprovedHextile
  182. Use improved compression algorithm for Hextile encoding which achieves better
  183. compression ratios by the cost of using slightly more CPU time. Default is
  184. on.
  185. .
  186. .TP
  187. .B \-SecurityTypes \fIsec-types\fP
  188. Specify which security scheme to use for incoming connections. Valid values
  189. are a comma separated list of \fBNone\fP, \fBVncAuth\fP, \fBPlain\fP,
  190. \fBTLSNone\fP, \fBTLSVnc\fP, \fBTLSPlain\fP, \fBX509None\fP, \fBX509Vnc\fP
  191. and \fBX509Plain\fP. Default is \fBVncAuth,TLSVnc\fP.
  192. .
  193. .TP
  194. .B \-Password \fIpassword\fP
  195. Obfuscated binary encoding of the password which clients must supply to
  196. access the server. Using this parameter is insecure, use \fBPasswordFile\fP
  197. parameter instead.
  198. .
  199. .TP
  200. .B \-PlainUsers \fIuser-list\fP
  201. A comma separated list of user names that are allowed to authenticate via
  202. any of the "Plain" security types (Plain, TLSPlain, etc.). Specify \fB*\fP
  203. to allow any user to authenticate using this security type. Default is to
  204. deny all users.
  205. .
  206. .TP
  207. .B \-pam_service \fIname\fP, \-PAMService \fIname\fP
  208. PAM service name to use when authentication users using any of the "Plain"
  209. security types. Default is \fBvnc\fP.
  210. .
  211. .TP
  212. .B \-X509Cert \fIpath\fP
  213. Path to a X509 certificate in PEM format to be used for all X509 based
  214. security types (X509None, X509Vnc, etc.).
  215. .
  216. .TP
  217. .B \-X509Key \fIpath\fP
  218. Private key counter part to the certificate given in \fBX509Cert\fP. Must
  219. also be in PEM format.
  220. .
  221. .TP
  222. .B \-GnuTLSPriority \fIpriority\fP
  223. GnuTLS priority string that controls the TLS session’s handshake algorithms.
  224. See the GnuTLS manual for possible values. Default is \fBNORMAL\fP.
  225. .
  226. .TP
  227. .B \-UseBlacklist
  228. Temporarily reject connections from a host if it repeatedly fails to
  229. authenticate. Default is on.
  230. .
  231. .TP
  232. .B \-BlacklistThreshold \fIcount\fP
  233. The number of unauthenticated connection attempts allowed from any individual
  234. host before that host is black-listed. Default is 5.
  235. .
  236. .TP
  237. .B \-BlacklistTimeout \fIseconds\fP
  238. The initial timeout applied when a host is first black-listed. The host
  239. cannot re-attempt a connection until the timeout expires. Default is 10.
  240. .
  241. .TP
  242. .B \-IdleTimeout \fIseconds\fP
  243. The number of seconds after which an idle VNC connection will be dropped.
  244. Default is 0, which means that idle connections will never be dropped.
  245. .
  246. .TP
  247. .B \-MaxDisconnectionTime \fIseconds\fP
  248. Terminate when no client has been connected for \fIN\fP seconds. Default is
  249. 0.
  250. .
  251. .TP
  252. .B \-MaxConnectionTime \fIseconds\fP
  253. Terminate when a client has been connected for \fIN\fP seconds. Default is
  254. 0.
  255. .
  256. .TP
  257. .B \-MaxIdleTime \fIseconds\fP
  258. Terminate after \fIN\fP seconds of user inactivity. Default is 0.
  259. .
  260. .TP
  261. .B \-QueryConnect
  262. Prompts the user of the desktop to explicitly accept or reject incoming
  263. connections. Default is off.
  264. The \fBvncconfig\fP(1) program must be running on the desktop in order for
  265. QueryConnect to be supported.
  266. .
  267. .TP
  268. .B \-QueryConnectTimeout \fIseconds\fP
  269. Number of seconds to show the Accept Connection dialog before rejecting the
  270. connection. Default is \fB10\fP.
  271. .
  272. .TP
  273. .B \-localhost
  274. Only allow connections from the same machine. Useful if you use SSH and want to
  275. stop non-SSH connections from any other hosts.
  276. .
  277. .TP
  278. .B \-Log \fIlogname\fP:\fIdest\fP:\fIlevel\fP
  279. Configures the debug log settings. \fIdest\fP can currently be \fBstderr\fP,
  280. \fBstdout\fP or \fBsyslog\fP, and \fIlevel\fP is between 0 and 100, 100 meaning
  281. most verbose output. \fIlogname\fP is usually \fB*\fP meaning all, but you can
  282. target a specific source file if you know the name of its "LogWriter". Default
  283. is \fB*:stderr:30\fP.
  284. .
  285. .TP
  286. .B \-RemapKeys \fImapping
  287. Sets up a keyboard mapping.
  288. .I mapping
  289. is a comma-separated string of character mappings, each of the form
  290. .IR char -> char ,
  291. or
  292. .IR char <> char ,
  293. where
  294. .I char
  295. is a hexadecimal keysym. For example, to exchange the " and @ symbols you would specify the following:
  296. .RS 10
  297. RemapKeys=0x22<>0x40
  298. .RE
  299. .
  300. .TP
  301. .B \-AvoidShiftNumLock
  302. Key affected by NumLock often require a fake Shift to be inserted in order
  303. for the correct symbol to be generated. Turning on this option avoids these
  304. extra fake Shift events but may result in a slightly different symbol
  305. (e.g. a Return instead of a keypad Enter).
  306. .
  307. .TP
  308. .B \-RawKeyboard
  309. Send keyboard events straight through and avoid mapping them to the current
  310. keyboard layout. This effectively makes the keyboard behave according to the
  311. layout configured on the server instead of the layout configured on the
  312. client. Default is off.
  313. .
  314. .TP
  315. .B \-AllowOverride
  316. Comma separated list of parameters that can be modified using VNC extension.
  317. Parameters can be modified for example using \fBvncconfig\fP(1) program from
  318. inside a running session.
  319. Allowing override of parameters such as \fBPAMService\fP or \fBPasswordFile\fP
  320. can negatively impact security if Xvnc runs under different user than the
  321. programs allowed to override the parameters.
  322. When \fBNoClipboard\fP parameter is set, allowing override of \fBSendCutText\fP
  323. and \fBAcceptCutText\fP has no effect.
  324. Default is \fBdesktop,AcceptPointerEvents,SendCutText,AcceptCutText,SendPrimary,SetPrimary\fP.
  325. .SH USAGE WITH INETD
  326. By configuring the \fBinetd\fP(1) service appropriately, Xvnc can be launched
  327. on demand when a connection comes in, rather than having to be started
  328. manually. When given the \fB-inetd\fP option, instead of listening for TCP
  329. connections on a given port it uses its standard input and standard output.
  330. There are two modes controlled by the wait/nowait entry in the inetd.conf file.
  331. In the nowait mode, Xvnc uses its standard input and output directly as the
  332. connection to a viewer. It never has a listening socket, so cannot accept
  333. further connections from viewers (it can however connect out to listening
  334. viewers by use of the vncconfig program). Further viewer connections to the
  335. same TCP port result in inetd spawning off a new Xvnc to deal with each
  336. connection. When the connection to the viewer dies, the Xvnc and any
  337. associated X clients die. This behaviour is most useful when combined with the
  338. XDMCP options -query and -once. An typical example in inetd.conf might be (all
  339. on one line):
  340. 5950 stream tcp nowait nobody /usr/local/bin/Xvnc Xvnc -inetd -query
  341. localhost -once securitytypes=none
  342. In this example a viewer connection to :50 will result in a new Xvnc for that
  343. connection which should display the standard XDM login screen on that machine.
  344. Because the user needs to login via XDM, it is usually OK to accept connections
  345. without a VNC password in this case.
  346. In the wait mode, when the first connection comes in, inetd gives the listening
  347. socket to Xvnc. This means that for a given TCP port, there is only ever one
  348. Xvnc at a time. Further viewer connections to the same port are accepted by
  349. the same Xvnc in the normal way. Even when the original connection is broken,
  350. the Xvnc will continue to run. If this is used with the XDMCP options -query
  351. and -once, the Xvnc and associated X clients will die when the user logs out of
  352. the X session in the normal way. It is important to use a VNC password in this
  353. case. A typical entry in inetd.conf might be:
  354. 5951 stream tcp wait james /usr/local/bin/Xvnc Xvnc -inetd -query localhost -once passwordFile=/home/james/.vnc/passwd
  355. In fact typically, you would have one entry for each user who uses VNC
  356. regularly, each of whom has their own dedicated TCP port which they use. In
  357. this example, when user "james" connects to :51, he enters his VNC password,
  358. then gets the XDM login screen where he logs in in the normal way. However,
  359. unlike the previous example, if he disconnects, the session remains persistent,
  360. and when he reconnects he will get the same session back again. When he logs
  361. out of the X session, the Xvnc will die, but of course a new one will be
  362. created automatically the next time he connects.
  363. .SH SEE ALSO
  364. .BR vncconfig (1),
  365. .BR vncpasswd (1),
  366. .BR vncserver (1),
  367. .BR vncviewer (1),
  368. .BR Xserver (1),
  369. .BR inetd (1)
  370. .br
  371. https://www.tigervnc.org
  372. .SH AUTHOR
  373. Tristan Richardson, RealVNC Ltd. and others.
  374. VNC was originally developed by the RealVNC team while at Olivetti
  375. Research Ltd / AT&T Laboratories Cambridge. TightVNC additions were
  376. implemented by Constantin Kaplinsky. Many other people have since
  377. participated in development, testing and support. This manual is part
  378. of the TigerVNC software suite.