summaryrefslogtreecommitdiffstats
path: root/vncpasswd/vncpasswd.man
diff options
context:
space:
mode:
Diffstat (limited to 'vncpasswd/vncpasswd.man')
-rw-r--r--vncpasswd/vncpasswd.man42
1 files changed, 42 insertions, 0 deletions
diff --git a/vncpasswd/vncpasswd.man b/vncpasswd/vncpasswd.man
new file mode 100644
index 00000000..ab5e7616
--- /dev/null
+++ b/vncpasswd/vncpasswd.man
@@ -0,0 +1,42 @@
+.TH vncpasswd 1 "29 July 2003" "RealVNC Ltd" "Virtual Network Computing"
+.SH NAME
+vncpasswd \- change a VNC password
+.SH SYNOPSIS
+.B vncpasswd
+.RI [ passwd-file ]
+.SH DESCRIPTION
+.B vncpasswd
+allows you to set the password used to access VNC desktops. It stores an
+obfuscated version of the password in the given file (default
+$HOME/.vnc/passwd). The \fBvncserver\fP script runs \fBvncpasswd\fP the first
+time you start a VNC desktop, and invokes \fBXvnc\fP with the appropriate
+\fB\-rfbauth\fP option. \fBvncviewer\fP can also be given a password file to
+use via the \fB\-passwd\fP option.
+
+The password must be at least six characters long, and only the first eight
+characters are significant. Note that the stored password is \fBnot\fP
+encrypted securely - anyone who has access to this file can trivially find out
+the plaintext password, so \fBvncpasswd\fP always sets appropriate permissions
+(read and write only by the owner). However, when accessing a VNC desktop a
+challenge-response mechanism is used over the wire making it hard for anyone to
+crack the password simply by snooping on the network.
+
+.SH FILES
+.TP
+$HOME/.vnc/passwd
+Default location of the VNC password file.
+
+.SH SEE ALSO
+.BR vncviewer (1),
+.BR vncserver (1),
+.BR Xvnc (1)
+.BR vncconfig (1),
+.br
+http://www.realvnc.com
+
+.SH AUTHOR
+Tristan Richardson, RealVNC Ltd.
+
+VNC was originally developed by the RealVNC team while at Olivetti Research Ltd
+/ AT&T Laboratories Cambridge. It is now being maintained by RealVNC Ltd. See
+http://www.realvnc.com for details.