shithub: plan9front

Download patch

ref: b6381141861419f8cf2a11e3c2ff605755a5becc
parent: c9b48aec544db0ce8a2a1a75b557c44669804e82
author: Igor Böhm <igor@9lab.org>
date: Sat Sep 25 16:40:47 EDT 2021

vncv: enable connecting to Darwin hosts

Tested on MacOS Catalina and Big Sur releases.

Update man page to highlight weak encryption of vnc, recommending to
tunnel via ssh (thanks unobe).


--- a/sys/man/1/vnc	Thu Sep 30 10:20:03 2021
+++ b/sys/man/1/vnc	Sat Sep 25 16:40:47 2021
@@ -201,9 +201,12 @@
 If the remote frame buffer is larger than the local screen,
 only the upper left corner can be accessed.
 .PP
+.I Vncs
+and
+.I vncv
+encryption is not secure.  It's advisable to tunnel through
+ssh or some other secure protocol.
+.PP
 .I Vncv
 does no verification of the TLS certificate presented
 by the server.
-.PP
-.I Vncv
-supports only version 3.3 of the RFB protocol.
--- a/sys/src/cmd/vnc/auth.c	Thu Sep 30 10:20:03 2021
+++ b/sys/src/cmd/vnc/auth.c	Sat Sep 25 16:40:47 2021
@@ -33,6 +33,8 @@
 		v->vers = 37;
 	else if(strncmp(msg, "RFB 003.008\n", VerLen) == 0)
 		v->vers = 38;
+	else if(strncmp(msg, "RFB 003.889\n", VerLen) == 0)
+		v->vers = 38;  /* Darwin */
 	else /* RFC6143: Any other should be treated as 3.3. */
 		v->vers = 33;