![]() The hostĬannot re-attempt a connection until the timeout expires. Seconds The initial timeout applied when a host is first black-listed. Individual host before that host is black-listed. BlacklistThresholdĬount The number of unauthenticated connection attempts allowed from any UseBlacklist Temporarily reject connections from a host if it repeatedly fails toĪuthenticate. See the GnuTLS manual for possible values. Priority GnuTLS priority string that controls the TLS session’s handshakeĪlgorithms. Path Private key counter part to the certificate given in X509Cert. Security types (X509None, X509Vnc, etc.). Path Path to a X509 certificate in PEM format to be used for all X509 based Name, -PAMService name PAM service name to use when authentication users using any of the Specify * to allow any user to authenticate using this security User-list A comma separated list of user names that are allowed to authenticate viaĪny of the "Plain" security types (Plain, TLSPlain, etc.). Password Obfuscated binary encoding of the password which clients must supply toĪccess the server. The file is accessed each time aĬonnection comes in, so it can be changed on the fly. Passwd-file, -PasswordFile passwd-file Password file for VNC authentication. Values are a comma separated list of None, VncAuth, Sec-types Specify which security scheme to use for incoming connections. Default is to accept connections from any IP address. Prefix is optional and is specified as a number of bits Rules that include only an action sign (+, - or ?) will match any IPĪddress. Theįirst rule matching the IP address determines the action to be performed. Specified address group), - address/ prefix (rejectĬonnections) or ? address/ prefix (query the local user). The following: + address/ prefix (accept connections from the The file should include one rule per line, and the rule format is one of Default isįilename This parameter allows to specify a file name with IP access control rules. * meaning all, but you can target a specific source file if you Stderr, stdout or syslog, and level is betweenĠ and 100, 100 meaning most verbose output. Logname: dest: level Configures the debug log settings. Mode Specifies the mode of the Unix domain socket. Path Specifies the path of a Unix domain socket on which x0vncserver listensįor connections from viewers. UseIPv6 Use IPv6 for incoming and outgoing connections. UseIPv4 Use IPv4 for incoming and outgoing connections. Listening on TCP port can beĭisabled with -fbport =-1. Viewers (the protocol used in VNC is called RFB - "remoteįramebuffer"). Port Specifies the TCP port on which x0vncserver listens for connections from If not specified, it defaults to the value of the PARAMETERS -desktopĭesktop-name Each desktop has a name which may be displayed by the viewer. Parameter names are case-insensitive, their order in the command The leading dash canīe omitted, or it can be doubled if desired (like in GNU-style long SomeParameter= value Assign the specified value to the parameter. SomeParameter=0 Disable the parameter, turn the feature off. Parameters that simply enable or disable some feature. Line (here we use ` SomeParameter' as an example parameter name): - SomeParameter Enable the parameter, turn the feature on. There are several forms of specifying parameters in the command Optional, but normally you would have to use the PasswordFile List of all valid parameters with short descriptions. X0vncserver interprets the command line as a list of Otherwise x0vncserver will fall back to polling the screen for XDamage will be used if the existing X server supports it. Shares an existing X server (typically, that one connected to the physical Xvnc(1), it does not create a virtual display. Remotely accessible via VNC, TigerVNC or compatible viewers. X0vncserver is a TigerVNC Server which makes any X display X0vncserver - TigerVNC Server for X displays SYNOPSIS
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |