NAME
vncs, vncv – remote frame buffer server and viewer for Virtual
Network Computing (VNC) |
SYNOPSIS
vncs [ –v ] [ –c cert ] [ –d :display ] [ –g widthxheight ] [ –p pixfmt
] [ –x net ] [ cmd [ args ] ] vncs –k :display [ –x net ]
vncv [ –acstv ] [ –e encodings ] [ –l charset ] [ –k keypattern ]
host[:n] |
DESCRIPTION
VNC is a lightweight protocol for accessing graphical applications
remotely. The protocol allows one or more clients to connect to
a server. While connected, clients display the frame buffer presented
by the server and can send mouse events, keyboard events, and
exchange snarf buffers. The server persists across
viewer sessions, so that the virtual application can be accessed
from various locations as its owner moves around. VNC displays have names of the form host:n, where host is the machine's network name and n is a small integer identifier; display n is served on TCP port 5900+n. Vncs starts a new virtual frame buffer in memory, simulating a Plan 9 terminal running cmd args, by default an interactive shell. As viewers connect, each is authenticated using a (rather breakable) challenge–response protocol using the user's Inferno/POP password.
The options are:
–v print verbose output to standard error. –x net announce on an alternate network interface. –A turn off authentication. The command vncs –k :n kills the VNC server running on display n. Vncv provides access to remote display host:n. It resizes its window to be the smaller of the remote frame buffer size and the local screen when not using the autoscaling option.
The options are:
–t start TLS on the connection. –v print verbose output to standard error. |
SOURCE
/sys/src/cmd/vnc |
SEE ALSO
http://www.uk.research.att.com/vnc |
BUGS
If the remote frame buffer is larger than the local screen, and
autoscaling is disabled, only the upper left corner can be accessed.
Autoscaling is only implemented for raw encoding. Vncs and vncv encryption is not secure. It's advisable to tunnel through ssh or some other secure protocol.
Vncv does no verification of the TLS certificate presented by
the server. |