vnc 4.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222
  1. .TH VNC 1
  2. .SH NAME
  3. vncs, vncv \- remote frame buffer server and viewer for Virtual Network Computing (VNC)
  4. .SH SYNOPSIS
  5. .B vncs
  6. [
  7. .B -v
  8. ]
  9. [
  10. .B -c
  11. .I cert
  12. ]
  13. [
  14. .B -d
  15. .BI : display
  16. ]
  17. [
  18. .B -g
  19. .IB width x height
  20. ]
  21. [
  22. .B -p
  23. .I pixfmt
  24. ]
  25. [
  26. .B -x
  27. .I net
  28. ]
  29. [
  30. .I cmd
  31. [
  32. .I args
  33. ...
  34. ]
  35. ]
  36. .PP
  37. .B vncs
  38. .B -k
  39. .BI : display
  40. [
  41. .B -x
  42. .I net
  43. ]
  44. .PP
  45. .B vncv
  46. [
  47. .B -cstv
  48. ]
  49. [
  50. .B -e
  51. .I encodings
  52. ]
  53. .IR host [\fL: n ]
  54. .SH DESCRIPTION
  55. VNC is a lightweight protocol
  56. for accessing graphical applications
  57. remotely. The protocol allows one or more
  58. clients to connect to a server.
  59. While connected, clients display the frame buffer
  60. presented by the server and can send mouse events,
  61. keyboard events, and exchange snarf buffers.
  62. The server persists across viewer sessions, so that
  63. the virtual application can be accessed from various locations
  64. as its owner moves around.
  65. .PP
  66. VNC displays have names of the form
  67. .IB host : n \fR,
  68. where
  69. .I host
  70. is the machine's network name and
  71. .I n
  72. is a small integer identifier; display
  73. .I n
  74. is served on TCP port
  75. .RI 5900+ n .
  76. .PP
  77. .I Vncs
  78. starts a new virtual frame buffer in memory, simulating
  79. a Plan 9 terminal running
  80. .I cmd
  81. .IR args ,
  82. by default an interactive shell.
  83. As viewers connect, each is authenticated using a
  84. (rather breakable) challenge-response protocol using
  85. the user's Inferno/POP password.
  86. .PP
  87. The options are:
  88. .TP
  89. .B -c \fIcert
  90. start TLS on each viewer connection using the certificate
  91. in the file
  92. .IR cert .
  93. The corresponding private key must be loaded into
  94. the server's
  95. .IR factotum (4).
  96. When serving TLS connections, the base port is
  97. 35729 rather than 5900.
  98. .TP
  99. .B -d :\fIn
  100. run on display
  101. .I n ;
  102. without this option, the server searches
  103. for an unused display.
  104. .TP
  105. .B -g \fIwidth\fBx\fIheight\fR
  106. set the virtual frame buffer to be
  107. .IB width x height
  108. (default
  109. 1024x768)
  110. pixels.
  111. .TP
  112. .B -p \fIpixfmt
  113. set the virtual frame buffer's internal pixel format to
  114. .I pixfmt
  115. (default
  116. .BR r5g6b5 ).
  117. .TP
  118. .B -v
  119. print verbose output to standard error.
  120. .TP
  121. .B -x \fInet
  122. announce on an alternate network interface.
  123. Because of the weak authentication protocol and
  124. default lack of encryption, this option must
  125. be accompanied by
  126. .BR -c .
  127. .PD
  128. .PP
  129. The command
  130. .B vncs
  131. .B -k
  132. .BI : n
  133. kills the VNC server running on display
  134. .IR n .
  135. .PP
  136. .I Vncv
  137. provides access to remote display
  138. .IB host : n \fR.
  139. It resizes its window to be the smaller of the
  140. remote frame buffer size and the local screen.
  141. .PP
  142. The options are:
  143. .TP
  144. .B -c
  145. when connecting to 8-bit displays, request
  146. .B r4g4b4
  147. pixels rather than
  148. .B r3g3b2
  149. pixels.
  150. This takes up more bandwidth but usually gives
  151. significantly better matching to the Plan 9 color map.
  152. .TP
  153. .B -e \fIencodings
  154. set the ordered list of allowed frame buffer update encodings.
  155. The default (and full) set is
  156. .B copyrect
  157. .B corre
  158. .B hextile
  159. .B rre
  160. .BR raw .
  161. The encodings should be given as a single space-separated argument
  162. (quoted when using the shell).
  163. .TP
  164. .B -s
  165. share the display with extant viewers;
  166. by default extant viewers are closed
  167. when a new viewer connects.
  168. .TP
  169. .B -t
  170. start TLS on the connection.
  171. .TP
  172. .B -v
  173. print verbose output to standard error.
  174. .PD
  175. .PP
  176. The VNC protocol represents keyboard input as
  177. key up/down events.
  178. Plan 9 does not expose the state of the
  179. Ctl and Shift keys except as it can be inferred
  180. from receipt of control or shifted characters.
  181. It does not expose the state of the Alt key at all,
  182. since the Alt key is used to compose Unicode characters
  183. (see
  184. .IR keyboard (6)).
  185. .I Vncv
  186. correctly handles the sending of control and shifted
  187. characters.
  188. To support systems that use key sequences like Alt-X
  189. (or worse, Alt-mouse-click), typing the Plan 9 compose
  190. sequences
  191. .B Alt
  192. .B Z
  193. .B A
  194. (for Alt),
  195. .B Alt
  196. .B Z
  197. .B C
  198. (for Ctrl),
  199. and
  200. .B Alt
  201. .B Z
  202. .B S
  203. (for Shift)
  204. will send a ``key down'' message for
  205. the given key.
  206. A corresponding ``key up'' message
  207. will be sent after the next key is pressed,
  208. or when the sequence is retyped,
  209. whichever happens first.
  210. .SH SOURCE
  211. .B /sys/src/cmd/vnc
  212. .SH "SEE ALSO
  213. .IR drawterm (8)
  214. .br
  215. .B http://www.uk.research.att.com/vnc
  216. .SH BUGS
  217. If the remote frame buffer is larger than the local screen,
  218. only the upper left corner can be accessed.
  219. .PP
  220. .I Vncv
  221. does no verification of the TLS certificate presented
  222. by the server.