@@ -10,7 +10,6 @@ The salts used are generated using Python's [os.urandom()](https://docs.python.o
10
10
Caveats:
11
11
* it is also possible to run in ` AES-128 ` or ` AES-192 ` mode but this is not recommended
12
12
* the HTML5 client currently does not support GCM mode: https://github.com/Xpra-org/xpra-html5/issues/94
13
- * older servers and clients only support ` CBC ` mode
14
13
15
14
For step-by-step instructions on setting up AES, expand:
16
15
<details >
@@ -31,31 +30,24 @@ xpra attach "tcp://localhost:10000/?encryption=AES&keyfile=./key.txt"
31
30
```
32
31
33
32
## Modes
34
- Starting with version 4.3, the client can specify the exact AES encryption mode to use: ` encryption=AES-GCM ` .
33
+ AES encryption supports 3 different [ modes of operation] ( https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation ) : ` CBC ` , ` GCM ` ,` CFB ` and ` CTR ` .
34
+
35
+ The client can specify the exact mode using: ` encryption=AES-GCM ` .
35
36
36
- ## Older syntax
37
- Prior to version 4.1, the encryption is configured globally, for all TCP sockets, using the following syntax:
38
- ```
39
- xpra start --start=xterm \
40
- --bind-tcp=0.0.0.0:10000 \
41
- --tcp-encryption=AES --tcp-encryption-keyfile=key.txt
42
- ```
43
- ```
44
- xpra attach tcp://$HOST:10000 --tcp-encryption=AES --tcp-encryption-keyfile=./key.txt
45
- ```
46
37
</details >
47
38
48
39
<details >
49
40
<summary >Specifying the key data</summary >
50
41
51
42
## keydata
52
- With newer versions, instead of using the ` keyfile ` option , it is also possible to inline the ` keydata ` value in the bind and attach strings:
43
+ Instead of storing the encryption key in a file , it is also possible to inline the ` keydata ` value in the bind and attach strings:
53
44
* ` keydata=0x... ` for hexadecimal encoded keys
54
45
* ` keydata=base64:... ` for base64 encoded keys
55
46
* ` keydata=... ` for plain text keys
56
47
57
48
One major disadvantage is that the key data may be leaked in the process list.\
58
49
However, it may be easier in some cases to generate commands that do not require extra files to run.
50
+ This can also be used with ` .xpra ` session files, and those do not leak the data.
59
51
</details >
60
52
61
53
<details >
0 commit comments