Difference between revisions of "TightVNC"
(Added URL and improved introductory sentence) |
(Add section for version 2.5.x) |
||
Line 8: | Line 8: | ||
Downloads can be done from [http://www.tightvnc.com/ here]. | Downloads can be done from [http://www.tightvnc.com/ here]. | ||
+ | |||
+ | =Version 2.5.x= | ||
+ | TightVNC version 2.5 includes a new viewer, native 64-bit versions of all components, and an MSI installer. | ||
+ | |||
+ | ==Preconfiguration Steps== | ||
+ | * Download TightVNC and place it in your WPKG software folder. | ||
+ | * On a test computer, install TightVNC and configure it with your password settings, etc. | ||
+ | * Use regedit to export HKEY_LOCAL_MACHINE\SOFTWARE\TightVNC\Server and save it as settings.reg in your WPKG software folder. '''WARNING: as others can read this file it is possible that they could decrypt the VNC passwords!''' | ||
+ | |||
+ | |||
+ | ==WPKG Package== | ||
+ | <source lang="xml"> | ||
+ | <package id="tightvnc" name="TightVNC Server" revision="251.0" priority="30" reboot="false"> | ||
+ | <check type="uninstall" condition="exists" path="TightVNC" /> | ||
+ | <!-- removing versions 2.0 and earlier if installed. --> | ||
+ | <install cmd='"%ProgramFiles%\TightVNC\uninstall.exe" /S' architecture='x86' ><exit code="any" /></install> | ||
+ | <install cmd='"%ProgramFiles(x86)%\TightVNC\uninstall.exe" /S' architecture='x64' ><exit code="any" /></install> | ||
+ | <install cmd='ping 127.0.0.1 -n 10>NUL' /> | ||
+ | <install cmd='msiexec /qn /i "%SOFTWARE%\vnc\tightvnc-2.5.1-setup-32bit.msi"' architecture='x86' /> | ||
+ | <install cmd='msiexec /qn /i "%SOFTWARE%\vnc\tightvnc-2.5.1-setup-64bit.msi"' architecture='x64' /> | ||
+ | <install cmd='"%ProgramFiles%\TightVNC\tvnserver" -install -silent'> | ||
+ | <exit code="1" /> | ||
+ | <exit code="0" /> | ||
+ | </install> | ||
+ | <install cmd='"%ProgramFiles%\TightVNC\tvnserver" -stop -silent' > | ||
+ | <exit code="1" /> | ||
+ | <exit code="0" /> | ||
+ | </install> | ||
+ | <install cmd='regedit /s "%SOFTWARE%\vnc\settings.reg"' architecture='x86' /> | ||
+ | <install cmd='regedit /s "%SOFTWARE%\vnc\tightvncx64.reg"' architecture='x64' /> | ||
+ | <install cmd='"%ProgramFiles%\TightVNC\tvnserver" -start -silent' /> | ||
+ | <upgrade cmd='"%ProgramFiles%\TightVNC\uninstall.exe" /S' architecture='x86' ><exit code="any" /></upgrade> | ||
+ | <upgrade cmd='"%ProgramFiles(x86)%\TightVNC\uninstall.exe" /S' architecture='x64' ><exit code="any" /></upgrade> | ||
+ | <upgrade cmd='ping 127.0.0.1 -n 10>NUL' /> | ||
+ | <upgrade cmd='msiexec /qn /i "%SOFTWARE%\vnc\tightvnc-2.5.1-setup-32bit.msi"' architecture='x86' /> | ||
+ | <upgrade cmd='msiexec /qn /i "%SOFTWARE%\vnc\tightvnc-2.5.1-setup-64bit.msi"' architecture='x64' /> | ||
+ | <upgrade cmd='"%ProgramFiles%\TightVNC\tvnserver" -install -silent'> | ||
+ | <exit code="1" /> | ||
+ | <exit code="0" /> | ||
+ | </upgrade> | ||
+ | <upgrade cmd='"%ProgramFiles%\TightVNC\tvnserver" -stop -silent' > | ||
+ | <exit code="1" /> | ||
+ | <exit code="0" /> | ||
+ | </upgrade> | ||
+ | <upgrade cmd='regedit /s "%SOFTWARE%\vnc\settings.reg"' architecture='x86' /> | ||
+ | <upgrade cmd='regedit /s "%SOFTWARE%\vnc\tightvncx64.reg"' architecture='x64' /> | ||
+ | <upgrade cmd='"%ProgramFiles%\TightVNC\tvnserver" -start -silent' /> | ||
+ | <remove cmd='msiexec /qn /x "%SOFTWARE%\vnc\tightvnc-2.5.1-setup-32bit.msi"' architecture='x86' /> | ||
+ | <remove cmd='msiexec /qn /x "%SOFTWARE%\vnc\tightvnc-2.5.1-setup-64bit.msi"' architecture='x64' /> | ||
+ | |||
+ | </package> | ||
+ | </source> | ||
=Version 2.0.x= | =Version 2.0.x= | ||
Line 15: | Line 67: | ||
* Download TightVNC and place it in your WPKG software folder. | * Download TightVNC and place it in your WPKG software folder. | ||
* On a test computer, install TightVNC and configure it with your password settings, etc. | * On a test computer, install TightVNC and configure it with your password settings, etc. | ||
− | * Use regedit to export HKEY_LOCAL_MACHINE\SOFTWARE\TightVNC\Server and save it as settings.reg in your WPKG software folder. '''WARNING: as others can read this file it is possible that they could decrypt the VNC passwords!''' | + | * Use regedit to export HKEY_LOCAL_MACHINE\SOFTWARE\TightVNC\Server (or HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\TightVNC\Server if running 32-bit TightVNC on 64-bit Windows) and save it as settings.reg in your WPKG software folder. '''WARNING: as others can read this file it is possible that they could decrypt the VNC passwords!''' |
==WPKG Package== | ==WPKG Package== |
Revision as of 21:01, 10 May 2012
TightVNC is a VNC client and server, available from http://www.tightvnc.com.
Running a VNC (virtual network computing) server software on Windows allows you to connect to the Windows graphical environment using VNC client software on a remote computer. There are various VNC client and server softwares, such as TightVNC and UltraVNC. There are VNC clients for probably every operating system, so you don't need to be running Windows to connect to and use Windows. VNC uses the RFB protocol, a defined standard method for remote access, so generally speaking any VNC client will connect to any VNC server, however occasionally some VNC implementations have added non-standard features that other clients may not support, examples of this are UltraVNC's remote login and file transfer features.
VNC clients connect into the session currently running on Windows, so the remote user and the person who might be sat at the computer see the same thing; the client doesn't get a separate login prompt, if someone is already logged into the computer then you see that, otherwise you get to login.
For remote administration or remote staff working, for security reasons you are strongly advised not to enable remote access to desktop computers directly over the Internet, instead you should have a firewall in place (for example pfSense), running a VPN server, which clients are required to securely VPN into before they have unfettered access to connect to VNC on desktop computers running Windows (or other operating systems).
Downloads can be done from here.
Contents
Version 2.5.x
TightVNC version 2.5 includes a new viewer, native 64-bit versions of all components, and an MSI installer.
Preconfiguration Steps
- Download TightVNC and place it in your WPKG software folder.
- On a test computer, install TightVNC and configure it with your password settings, etc.
- Use regedit to export HKEY_LOCAL_MACHINE\SOFTWARE\TightVNC\Server and save it as settings.reg in your WPKG software folder. WARNING: as others can read this file it is possible that they could decrypt the VNC passwords!
WPKG Package
<package id="tightvnc" name="TightVNC Server" revision="251.0" priority="30" reboot="false">
<check type="uninstall" condition="exists" path="TightVNC" />
<!-- removing versions 2.0 and earlier if installed. -->
<install cmd='"%ProgramFiles%\TightVNC\uninstall.exe" /S' architecture='x86' ><exit code="any" /></install>
<install cmd='"%ProgramFiles(x86)%\TightVNC\uninstall.exe" /S' architecture='x64' ><exit code="any" /></install>
<install cmd='ping 127.0.0.1 -n 10>NUL' />
<install cmd='msiexec /qn /i "%SOFTWARE%\vnc\tightvnc-2.5.1-setup-32bit.msi"' architecture='x86' />
<install cmd='msiexec /qn /i "%SOFTWARE%\vnc\tightvnc-2.5.1-setup-64bit.msi"' architecture='x64' />
<install cmd='"%ProgramFiles%\TightVNC\tvnserver" -install -silent'>
<exit code="1" />
<exit code="0" />
</install>
<install cmd='"%ProgramFiles%\TightVNC\tvnserver" -stop -silent' >
<exit code="1" />
<exit code="0" />
</install>
<install cmd='regedit /s "%SOFTWARE%\vnc\settings.reg"' architecture='x86' />
<install cmd='regedit /s "%SOFTWARE%\vnc\tightvncx64.reg"' architecture='x64' />
<install cmd='"%ProgramFiles%\TightVNC\tvnserver" -start -silent' />
<upgrade cmd='"%ProgramFiles%\TightVNC\uninstall.exe" /S' architecture='x86' ><exit code="any" /></upgrade>
<upgrade cmd='"%ProgramFiles(x86)%\TightVNC\uninstall.exe" /S' architecture='x64' ><exit code="any" /></upgrade>
<upgrade cmd='ping 127.0.0.1 -n 10>NUL' />
<upgrade cmd='msiexec /qn /i "%SOFTWARE%\vnc\tightvnc-2.5.1-setup-32bit.msi"' architecture='x86' />
<upgrade cmd='msiexec /qn /i "%SOFTWARE%\vnc\tightvnc-2.5.1-setup-64bit.msi"' architecture='x64' />
<upgrade cmd='"%ProgramFiles%\TightVNC\tvnserver" -install -silent'>
<exit code="1" />
<exit code="0" />
</upgrade>
<upgrade cmd='"%ProgramFiles%\TightVNC\tvnserver" -stop -silent' >
<exit code="1" />
<exit code="0" />
</upgrade>
<upgrade cmd='regedit /s "%SOFTWARE%\vnc\settings.reg"' architecture='x86' />
<upgrade cmd='regedit /s "%SOFTWARE%\vnc\tightvncx64.reg"' architecture='x64' />
<upgrade cmd='"%ProgramFiles%\TightVNC\tvnserver" -start -silent' />
<remove cmd='msiexec /qn /x "%SOFTWARE%\vnc\tightvnc-2.5.1-setup-32bit.msi"' architecture='x86' />
<remove cmd='msiexec /qn /x "%SOFTWARE%\vnc\tightvnc-2.5.1-setup-64bit.msi"' architecture='x64' />
</package>
Version 2.0.x
TightVNC version 2 is a complete rewrite over version 1; it doesn't need the Mirage driver; the registry settings are in a different location; the command-line switches are different.
Preconfiguration Steps
- Download TightVNC and place it in your WPKG software folder.
- On a test computer, install TightVNC and configure it with your password settings, etc.
- Use regedit to export HKEY_LOCAL_MACHINE\SOFTWARE\TightVNC\Server (or HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\TightVNC\Server if running 32-bit TightVNC on 64-bit Windows) and save it as settings.reg in your WPKG software folder. WARNING: as others can read this file it is possible that they could decrypt the VNC passwords!
WPKG Package
<package
id="tightvnc"
name="TightVNC Server"
revision="2"
priority="30"
reboot="false">
<check type="uninstall" condition="exists" path="TightVNC 2.0.4" />
<!-- Install TightVNC -->
<install cmd='"%SOFTWARE%\tightvnc\tightvnc-2.0.4-setup.exe" /S' />
<!-- Install the TightVNC Server as a service -->
<install cmd='"%PROGRAMFILES%\TightVNC\tvnserver" -install -silent' >
<exit code="1" />
<exit code="0" />
</install>
<!-- Stop the TightVNC Server whilst we import settings -->
<install cmd='"%PROGRAMFILES%\TightVNC\tvnserver" -stop -silent' >
<exit code="1" />
<exit code="0" />
</install>
<!-- Import settings -->
<install cmd='regedit /s "%SOFTWARE%\tightvnc\tightvnc-settings.reg"' />
<!-- Restart the TightVNC Server -->
<install cmd='"%PROGRAMFILES%\TightVNC\tvnserver" -start -silent' />
<upgrade cmd='"%SOFTWARE%\tightvnc\tightvnc-2.0.4-setup.exe" /S' />
<upgrade cmd='"%PROGRAMFILES%\TightVNC\tvnserver" -reinstall -silent' />
<upgrade cmd='"%PROGRAMFILES%\TightVNC\tvnserver" -stop -silent' >
<exit code="1" />
<exit code="0" />
</upgrade>
<upgrade cmd='regedit /s "%SOFTWARE%\tightvnc\tightvnc-settings.reg"' />
<upgrade cmd='"%PROGRAMFILES%\TightVNC\tvnserver" -start -silent' />
<remove cmd='"%PROGRAMFILES%\TightVNC\uninstall.exe" /S' />
</package>
Version 1.3.x
See also silent installation for DFMirage hook display driver.
WPKG Package
<package id="tightvnc" name="TightVNC server" revision="130" priority="50" reboot="false">
<check type="uninstall" condition="exists" path="TightVNC 1.3.10" />
<install cmd="%SOFTWARE%\tightvnc\tightvnc-1.3.10-setup.exe /sp- /verysilent" />
<install cmd="%ProgramFiles%\TightVNC\WinVNC.exe -reinstall" />
<install cmd="%ProgramFiles%\TightVNC\WinVNC.exe -servicehelper" />
<install cmd='cmd /c netsh firewall add allowedprogram program = %ProgramFiles%\TightVNC\WinVNC.exe name = "Launch TightVNC Server"' />
<upgrade cmd='%SOFTWARE%\tightvnc\tightvnc-1.3.10-setup.exe /sp- /verysilent' ><exit code="0" reboot="true" /></upgrade>
<upgrade cmd="%ProgramFiles%\TightVNC\WinVNC.exe -reinstall" />
<upgrade cmd="%ProgramFiles%\TightVNC\WinVNC.exe -servicehelper" />
<upgrade cmd='cmd /c netsh firewall add allowedprogram program = %ProgramFiles%\TightVNC\WinVNC.exe name = "Launch TightVNC Server"' />
<remove cmd='"%ProgramFiles%\TightVNC\WinVNC.exe" -remove' />
<remove cmd='"%ProgramFiles%\TightVNC\unins000.exe" /silent' />
</package>
<package id="tightvnc-settings" name="TightVNC server settings" revision="3" priority="5" reboot="false" execute="once">
<depends package-id="tightvnc"/>
<install cmd='cmd /c "%SOFTWARE%\tightvnc\tightvnc.bat"' />
<upgrade cmd='cmd /c "%SOFTWARE%\tightvnc\tightvnc.bat"' />
<remove cmd='echo "nothing"' />
</package>
tightvnc.bat
tightvnc.bat is a simple batch script to setup TightVNC server and restart it:
:: start, restart or apply settings to tightvnc
::
net stop "VNC Server"
regedit /s %SOFTWARE%\tightvnc\tightvnc.reg
net start "VNC Server"
:: For some unknown reason the servicehelper does not restart.
::
%ProgramFiles%\TightVNC\WinVNC.exe -servicehelper
:: we ignore errors...
::
exit 0
tightvnc.reg
tightvnc.reg contains the VNC server setup, most notably the access password:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\ORL]
[HKEY_LOCAL_MACHINE\SOFTWARE\ORL\WinVNC3]
"MSLogonRequired"=dword:00000001
"NewMSLogon"=dword:00000001
"ACL"=hex:02,00,08,00,00,00,00,00
"ConnectPriority"=dword:00000002
"LoopbackOnly"=dword:00000000
"EnableHTTPDaemon"=dword:00000001
"EnableURLParams"=dword:00000000
"AllowLoopback"=dword:00000000
"AuthRequired"=dword:00000001
"DebugMode"=dword:00000000
"DebugLevel"=dword:00000002
[HKEY_LOCAL_MACHINE\SOFTWARE\ORL\WinVNC3\Default]
"SocketConnect"=dword:00000001
"AutoPortSelect"=dword:00000001
"InputsEnabled"=dword:00000001
"LocalInputsDisabled"=dword:00000000
"IdleTimeout"=dword:00000000
"LocalInputsPriorityTime"=dword:00000003
"QuerySetting"=dword:00000002
"QueryTimeout"=dword:0000001e
"QueryAccept"=dword:00000000
"QueryAllowNoPass"=dword:00000000
"LockSetting"=dword:00000000
"RemoveWallpaper"=dword:00000001
"BlankScreen"=dword:00000000
"EnableFileTransfers"=dword:00000001
"PollUnderCursor"=dword:00000000
"PollForeground"=dword:00000001
"PollFullScreen"=dword:00000000
"OnlyPollConsole"=dword:00000001
"OnlyPollOnEvent"=dword:00000000
"PollingCycle"=dword:0000012c
"DontSetHooks"=dword:00000000
"DontUseDriver"=dword:00000000
"DriverDirectAccess"=dword:00000001
"LocalInputsPriority"=dword:00000000
"Password"=hex:e6,ee,26,ee,00,e2,e6,5b
"PasswordViewOnly"=hex:38,9a,aa,ee,ef,63,ef,e5
NOTE that passwords are encrypted, but this is not considered secure as someone can easily have access to the registry patch and decrypt the password.