Contenu | Rechercher | Menus

Annonce

Si vous avez des soucis pour rester connecté, déconnectez-vous puis reconnectez-vous depuis ce lien en cochant la case
Me connecter automatiquement lors de mes prochaines visites.

À propos de l'équipe du forum.

#1 Le 08/01/2019, à 17:56

xunil2003

Connexion à VNC impossible à distance depuis internet ?

Connexion ssh sur le poste serveur à distance

valerie@serveur-MS-7522:~$ ssh laurent@78.xxx.xxx.24
The authenticity of host '78.xxx.xxx.24 (78.xxx.xxx.24)' can't be established.
ECDSA key fingerprint is 83:1f:8d:82:6b:4f:70:56:58:18:69:ac:e3:e4:8e:d6.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '78.xxx.xxx.24' (ECDSA) to the list of known hosts.
laurent@78.xxx.xxx.24's password: 
Welcome to Ubuntu 14.04.5 LTS (GNU/Linux 4.4.0-141-generic x86_64)

 * Documentation:  https://help.ubuntu.com/

0 packages can be updated.
0 updates are security updates.

New release '16.04.5 LTS' available.
Run 'do-release-upgrade' to upgrade to it.

Your Hardware Enablement Stack (HWE) is supported until April 2019.
Last login: Fri Jan  4 19:50:53 2019 from tou83-1-78-xxx-xx-16.fbx.proxad.net
laurent@laurent-MS-7522:~$
laurent@laurent-MS-7522:~$ x11vnc -storepasswd
Enter VNC password: 
Verify password:    
Write password to /home/laurent/.vnc/passwd?  [y]/n y
Password written to: /home/laurent/.vnc/passwd
laurent@laurent-MS-7522:~$
laurent@laurent-MS-7522:~$ x11vnc -display :0
###############################################################
#@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#
#@                                                           @#
#@  **  WARNING  **  WARNING  **  WARNING  **  WARNING  **   @#
#@                                                           @#
#@        YOU ARE RUNNING X11VNC WITHOUT A PASSWORD!!        @#
#@                                                           @#
#@  This means anyone with network access to this computer   @#
#@  may be able to view and control your desktop.            @#
#@                                                           @#
#@ >>> If you did not mean to do this Press CTRL-C now!! <<< @#
#@                                                           @#
#@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#
#@                                                           @#
#@  You can create an x11vnc password file by running:       @#
#@                                                           @#
#@       x11vnc -storepasswd password /path/to/passfile      @#
#@  or   x11vnc -storepasswd /path/to/passfile               @#
#@  or   x11vnc -storepasswd                                 @#
#@                                                           @#
#@  (the last one will use ~/.vnc/passwd)                    @#
#@                                                           @#
#@  and then starting x11vnc via:                            @#
#@                                                           @#
#@      x11vnc -rfbauth /path/to/passfile                    @#
#@                                                           @#
#@  an existing ~/.vnc/passwd file from another VNC          @#
#@  application will work fine too.                          @#
#@                                                           @#
#@  You can also use the -passwdfile or -passwd options.     @#
#@  (note -passwd is unsafe if local users are not trusted)  @#
#@                                                           @#
#@  Make sure any -rfbauth and -passwdfile password files    @#
#@  cannot be read by untrusted users.                       @#
#@                                                           @#
#@  Use x11vnc -usepw to automatically use your              @#
#@  ~/.vnc/passwd or ~/.vnc/passwdfile password files.       @#
#@  (and prompt you to create ~/.vnc/passwd if neither       @#
#@  file exists.)  Under -usepw, x11vnc will exit if it      @#
#@  cannot find a password to use.                           @#
#@                                                           @#
#@                                                           @#
#@  Even with a password, the subsequent VNC traffic is      @#
#@  sent in the clear.  Consider tunnelling via ssh(1):      @#
#@                                                           @#
#@    http://www.karlrunge.com/x11vnc/#tunnelling            @#
#@                                                           @#
#@  Or using the x11vnc SSL options: -ssl and -stunnel       @#
#@                                                           @#
#@  Please Read the documention for more info about          @#
#@  passwords, security, and encryption.                     @#
#@                                                           @#
#@    http://www.karlrunge.com/x11vnc/faq.html#faq-passwd    @#
#@                                                           @#
#@  To disable this warning use the -nopw option, or put     @#
#@  'nopw' on a line in your ~/.x11vncrc file.               @#
#@                                                           @#
#@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#
###############################################################
08/01/2019 16:32:39 x11vnc version: 0.9.13 lastmod: 2011-08-10  pid: 6512
08/01/2019 16:32:39 Using X display :0
08/01/2019 16:32:39 rootwin: 0x296 reswin: 0xa400001 dpy: 0x1f63a10
08/01/2019 16:32:39 
08/01/2019 16:32:39 ------------------ USEFUL INFORMATION ------------------
08/01/2019 16:32:39 X DAMAGE available on display, using it for polling hints.
08/01/2019 16:32:39   To disable this behavior use: '-noxdamage'
08/01/2019 16:32:39 
08/01/2019 16:32:39   Most compositing window managers like 'compiz' or 'beryl'
08/01/2019 16:32:39   cause X DAMAGE to fail, and so you may not see any screen
08/01/2019 16:32:39   updates via VNC.  Either disable 'compiz' (recommended) or
08/01/2019 16:32:39   supply the x11vnc '-noxdamage' command line option.
08/01/2019 16:32:39 
08/01/2019 16:32:39 Wireframing: -wireframe mode is in effect for window moves.
08/01/2019 16:32:39   If this yields undesired behavior (poor response, painting
08/01/2019 16:32:39   errors, etc) it may be disabled:
08/01/2019 16:32:39    - use '-nowf' to disable wireframing completely.
08/01/2019 16:32:39    - use '-nowcr' to disable the Copy Rectangle after the
08/01/2019 16:32:39      moved window is released in the new position.
08/01/2019 16:32:39   Also see the -help entry for tuning parameters.
08/01/2019 16:32:39   You can press 3 Alt_L's (Left "Alt" key) in a row to 
08/01/2019 16:32:39   repaint the screen, also see the -fixscreen option for
08/01/2019 16:32:39   periodic repaints.
08/01/2019 16:32:39 
08/01/2019 16:32:39 XFIXES available on display, resetting cursor mode
08/01/2019 16:32:39   to: '-cursor most'.
08/01/2019 16:32:39   to disable this behavior use: '-cursor arrow'
08/01/2019 16:32:39   or '-noxfixes'.
08/01/2019 16:32:39 using XFIXES for cursor drawing.
08/01/2019 16:32:39 GrabServer control via XTEST.
08/01/2019 16:32:39 
08/01/2019 16:32:39 Scroll Detection: -scrollcopyrect mode is in effect to
08/01/2019 16:32:39   use RECORD extension to try to detect scrolling windows
08/01/2019 16:32:39   (induced by either user keystroke or mouse input).
08/01/2019 16:32:39   If this yields undesired behavior (poor response, painting
08/01/2019 16:32:39   errors, etc) it may be disabled via: '-noscr'
08/01/2019 16:32:39   Also see the -help entry for tuning parameters.
08/01/2019 16:32:39   You can press 3 Alt_L's (Left "Alt" key) in a row to 
08/01/2019 16:32:39   repaint the screen, also see the -fixscreen option for
08/01/2019 16:32:39   periodic repaints.
08/01/2019 16:32:39 
08/01/2019 16:32:39 XKEYBOARD:
08/01/2019 16:32:39 Switching to -xkb mode to recover these keysyms:
08/01/2019 16:32:39    xkb  noxkb   Keysym  ("X" means present)
08/01/2019 16:32:39    ---  -----   -----------------------------
08/01/2019 16:32:39     X           0x40  at
08/01/2019 16:32:39     X           0x23  numbersign
08/01/2019 16:32:39     X           0x5b  bracketleft
08/01/2019 16:32:39     X           0x5d  bracketright
08/01/2019 16:32:39     X           0x7b  braceleft
08/01/2019 16:32:39     X           0x7d  braceright
08/01/2019 16:32:39     X           0x7c  bar
08/01/2019 16:32:39     X           0x5c  backslash
08/01/2019 16:32:39 
08/01/2019 16:32:39   If this makes the key mapping worse you can
08/01/2019 16:32:39   disable it with the "-noxkb" option.
08/01/2019 16:32:39 
08/01/2019 16:32:39 
08/01/2019 16:32:39 X FBPM extension not supported.
08/01/2019 16:32:39 X display is capable of DPMS.
08/01/2019 16:32:39 --------------------------------------------------------
08/01/2019 16:32:39 
08/01/2019 16:32:39 Default visual ID: 0x21
08/01/2019 16:32:39 Read initial data from X display into framebuffer.
08/01/2019 16:32:39 initialize_screen: fb_depth/fb_bpp/fb_Bpl 24/32/13440
08/01/2019 16:32:39 
08/01/2019 16:32:39 X display :0 is 32bpp depth=24 true color
08/01/2019 16:32:39 
08/01/2019 16:32:39 Autoprobing TCP port 
08/01/2019 16:32:39 Autoprobing selected TCP port 5900
08/01/2019 16:32:39 Autoprobing TCP6 port 
08/01/2019 16:32:39 Autoprobing selected TCP6 port 5900
08/01/2019 16:32:39 listen6: bind: Address already in use
08/01/2019 16:32:39 Not listening on IPv6 interface.
08/01/2019 16:32:39 
08/01/2019 16:32:39 Xinerama is present and active (e.g. multi-head).
08/01/2019 16:32:39 Xinerama: number of sub-screens: 2
08/01/2019 16:32:39 Xinerama: enabling -xwarppointer mode to try to correct
08/01/2019 16:32:39 Xinerama: mouse pointer motion. XTEST+XINERAMA bug.
08/01/2019 16:32:39 Xinerama: Use -noxwarppointer to force XTEST.
08/01/2019 16:32:39 Xinerama: sub-screen[0]  1920x1080+0+0
08/01/2019 16:32:39 Xinerama: sub-screen[1]  1440x900+1920+0
08/01/2019 16:32:39 blackout rect: 1440x180+1920+900: x=1920-3360 y=900-1080
08/01/2019 16:32:39 
08/01/2019 16:32:39 fb read rate: 1233 MB/sec
08/01/2019 16:32:39 fast read: reset -wait  ms to: 10
08/01/2019 16:32:39 fast read: reset -defer ms to: 10
08/01/2019 16:32:39 The X server says there are 10 mouse buttons.
08/01/2019 16:32:39 screen setup finished.
08/01/2019 16:32:39 
08/01/2019 16:32:39 WARNING: You are running x11vnc WITHOUT a password.  See
08/01/2019 16:32:39 WARNING: the warning message printed above for more info.
08/01/2019 16:32:39 

The VNC desktop is:      laurent-MS-7522:0
PORT=5900

******************************************************************************
Have you tried the x11vnc '-ncache' VNC client-side pixel caching feature yet?

The scheme stores pixel data offscreen on the VNC viewer side for faster
retrieval.  It should work with any VNC viewer.  Try it by running:

    x11vnc -ncache 10 ...

One can also add -ncache_cr for smooth 'copyrect' window motion.
More info: http://www.karlrunge.com/x11vnc/faq.html#faq-client-caching

Puis je laisse la console active de la connexion ssh au serveur depuis la poste client.et j'ouvre un nouvelle onglet dans la console et tape

valerie@serveur-MS-7522:~$ vncviewer 78.xxx.xxx.24
vncviewer: ConnectToTcpAddr: connect: Connection timed out
Unable to connect to VNC server
valerie@serveur-MS-7522:~$ 

Ca ne fonctionne pas, comment faire ?
Parcontre en réseau local ça fonctionne.

Merci.

Dernière modification par xunil2003 (Le 08/01/2019, à 17:58)


- AMD R9 5950x 64 Go Ram / Intel Pentium I7 960 - 12 Go Ram - 6 T0 - Kubuntu 12.04 x64 / Kubuntu 14.04 x64 / Kubuntu 16.04 x64 / Kubuntu 18.04 x64 /  Kubuntu 20.04 x64 / Mint
- DreamPlug Multi Boot / Marvel 1.22 Ghz / Architecture ARM / 512 Mo Ram / Carte-sd 16 Go class 10 / 5 Watts / Debian Squeeze 2.6.39.4
- Raspberry PI 1 / Raspberry PI 2 / Raspberry PI 3 / Raspberry PI 4 : 4Gb
JE SUIS CHARLIE

Hors ligne

#2 Le 13/01/2019, à 00:41

Junkaria

Re : Connexion à VNC impossible à distance depuis internet ?

Salut,
Ton poste manque de précision et d'explication.
Je que je peux te dire comme ça, c'est qu'il te faut un transfert de port (NAT) sur ta passerelle réseau pour accéder au réseau local depuis l'extérieur.


Ubuntu 08.04-11.04 | Linux Mint | ArchLinux

Hors ligne