On Wed, Oct 15, 2014 at 02:19:39PM +0200, Gerd Hoffmann wrote:
> Hi,
>
> This patch series adds support for multiple vnc server instances to
> qemu. This comes handy in multiseat configurations as you can have
> one vnc server for each set then.
>
> Some cleanups along the way (use QemuOpts). Also added support for
> limiting the number of parallel vnc connections.
>
> To be done: monitor support. I think the best way to handle this is to
> introduce a new command to query vnc server state, which returns a list
> of vnc servers but otherwise works like "query-vnc". Alternative
> approach would be to add a optional 'id=' parameter to query-vnc, but
> then you'll need a new list-vnc command.
>
> Opinions on this?
>
> set_password and expire_password commands should be easy, they can be
> extended with an optional 'id=' parameter.
In any serious deployment password auth won't be something that's used
due to its horrific insecurity. For TLS/SASL authentication protocols
we currently have a single acces control list defined
qemu_acl_init("vnc.x509dname") (validates x509 certificate)
qemu_acl_init("vnc.username") (validates SASL user name)
I think we are going to need to make one ACL list per seat. eg
qemu_acl_init("vnc.x509dname") (validates x509 certificate on seat 0)
qemu_acl_init("vnc.username") (validates SASL user name on seat 0)
qemu_acl_init("vnc.x509dname.1") (validates x509 certificate on seat 1)
qemu_acl_init("vnc.username.1") (validates SASL user name on seat 1)
qemu_acl_init("vnc.x509dname.2") (validates x509 certificate on seat 2)
qemu_acl_init("vnc.username.2") (validates SASL user name on seat 2)
Note, not changing the first ACL names for compat reasons.
Regards,
Daniel
--
|: http://berrange.com -o- http://www.flickr.com/photos/dberrange/ :|
|: http://libvirt.org -o- http://virt-manager.org :|
|: http://autobuild.org -o- http://search.cpan.org/~danberr/ :|
|: http://entangle-photo.org -o- http://live.gnome.org/gtk-vnc :|