ae10d2f2ae
The content of this branch was automatically imported from Fedora ELN with the following as its source: https://src.fedoraproject.org/rpms/tigervnc#7daeac56f7fd9c15c053b868a5890c9d8ff20d09
39 lines
1.4 KiB
Desktop File
39 lines
1.4 KiB
Desktop File
# The vncserver service unit file
|
|
#
|
|
# Quick HowTo:
|
|
# 1. Copy this file to /etc/systemd/system/xvnc@.service
|
|
# 2. Copy xvnc.socket to /etc/systemd/system/xvnc.socket
|
|
# 3. Run `systemctl daemon-reload`
|
|
# 4. Run `systemctl enable xvnc.socket`
|
|
#
|
|
# DO NOT RUN THIS SERVICE if your local area network is
|
|
# untrusted! For a secure way of using VNC, you should
|
|
# limit connections to the local host and then tunnel from
|
|
# the machine you want to view VNC on (host A) to the machine
|
|
# whose VNC output you want to view (host B)
|
|
#
|
|
# [user@hostA ~]$ ssh -v -C -L 590N:localhost:590M hostB
|
|
#
|
|
# this will open a connection on port 590N of your hostA to hostB's port 590M
|
|
# (in fact, it ssh-connects to hostB and then connects to localhost (on hostB).
|
|
# See the ssh man page for details on port forwarding)
|
|
#
|
|
# You can then point a VNC client on hostA at vncdisplay N of localhost and with
|
|
# the help of ssh, you end up seeing what hostB makes available on port 590M
|
|
#
|
|
# Use "-nolisten tcp" to prevent X connections to your VNC server via TCP.
|
|
#
|
|
# Use "-localhost" to prevent remote VNC clients connecting except when
|
|
# doing so through a secure tunnel. See the "-via" option in the
|
|
# `man vncviewer' manual page.
|
|
|
|
|
|
[Unit]
|
|
Description=XVNC Per-Connection Daemon
|
|
|
|
[Service]
|
|
ExecStart=-/usr/bin/Xvnc -inetd -query localhost -geometry 1024x768 -depth 24 -once -SecurityTypes=None
|
|
User=nobody
|
|
StandardInput=socket
|
|
StandardError=syslog
|