9srv Manual Collection/plan9/vnc(1) | 9srv Manual Collection/plan9/vnc(1) |
---|
vncs -k :display [ -x net ]
vncv [ -cstv ] [ -e encodings ] [ -k keypattern ] host[:n]
VNC displays have names of the form host:n, where host is the machine's network name and n is a small integer identifier; display n is served on TCP port 5900+n.
Vncs starts a new virtual frame buffer in memory, simulating a Plan 9 terminal running cmd args, by default an interactive shell. As viewers connect, each is authenticated using a (rather breakable) challenge-response protocol using the user's Inferno/POP password.
The options are:
The command vncs -k :n kills the VNC server running on display n.
Vncv provides access to remote display host:n. It resizes its window to be the smaller of the remote frame buffer size and the local screen.
The options are:
The VNC protocol represents keyboard input as key up/down events. Plan 9 does not expose the state of the Ctl and Shift keys except as it can be inferred from receipt of control or shifted characters. It does not expose the state of the Alt key at all, since the Alt key is used to compose Unicode characters (see keyboard(6)). Vncv correctly handles the sending of control and shifted characters. To support systems that use key sequences like Alt-X (or worse, Alt-mouse-click), typing the Plan 9 compose sequences Alt Z A (for Alt), Alt Z C (for Ctrl), and Alt Z S (for Shift) will send a ``key down'' message for the given key. A corresponding ``key up'' message will be sent after the next key is pressed, or when the sequence is retyped, whichever happens first.
Vncv does no verification of the TLS certificate presented by the server.
Vncv supports only version 3.3 of the RFB protocol.
9srv Manual Collection/plan9/vnc(1) | Rev: Thu Nov 18 19:32:47 GMT 2010 |