.TH "xrdp.ini" "5" "@PACKAGE_VERSION@" "xrdp team" ""
.SH "NAME"
\fB xrdp.ini\fR \- Configuration file for \fB xrdp\fR (8)
.SH "DESCRIPTION"
This is the man page for \fB xrdp.ini\fR , \fB xrdp\fR (8) configuration file.
It is composed by a number of sections, each one composed by a section name, enclosed by square brackets, followed by a list of \fI <parameter>\fR =\fI <value>\fR lines.
\fB xrdp.ini\fR supports the following sections:
.TP
\fB [Globals]\fP \- sets some global configuration settings for \fB xrdp\fR (8).
.TP
\fB [Logging]\fP \- logging subsystem parameters
.TP
\fB [Channels]\fP \- channel subsystem parameters
.LP
All options and values (except for file names and paths) are case insensitive, and are described in detail below.
.SH "GLOBALS"
The options to be specified in the \fB [Globals]\fR section are the following:
.TP
\fB address\fP =\fI ip address\fP
Specify xrdp listening address. If not specified, defaults to 0.0.0.0 (all interfaces).
.TP
\fB autorun\fP =\fI session_name\fP
Section name for automatic login. If set and the client supplies valid
username and password, the user will be logged in automatically using the
connection specified by \fI session_name\fP .
If \fI session_name\fP is empty, the \fB LOGIN DOMAIN\fR from the client
with be used to select the section. If no domain name is supplied, the
first suitable section will be used for automatic login.
.TP
\fB bitmap_cache\fR =\fI [true|false]\fR
If set to \fB 1\fR , \fB true\fR or \fB yes\fR this option enables bitmap caching in \fB xrdp\fR (8).
.TP
\fB bitmap_compression\fR =\fI [true|false]\fR
If set to \fB 1\fR , \fB true\fR or \fB yes\fR this option enables bitmap compression in \fB xrdp\fR (8).
.TP
\fB bulk_compression\fP =\fI [true|false]\fP
If set to \fB 1\fR , \fB true\fR or \fB yes\fR this option enables compression of bulk data in \fB xrdp\fR (8).
.TP
\fB certificate\fP =\fI /path/to/certificate\fP
.TP
\fB key_file\fP =\fI /path/to/private_key\fP
Set location of TLS certificate and private key. They must be written in PEM format.
If not specified, defaults to \fB @sysconfdir@/xrdp/cert.pem\fP , \fB @sysconfdir@/xrdp/key.pem\fP .
This parameter is effective only if \fB security_layer\fP is set to \fB tls\fP or \fB negotiate\fP .
.TP
\fB channel_code\fP =\fI [true|false]\fP
If set to \fB 0\fR , \fB false\fR or \fB no\fR this option disables all channels \fB xrdp\fR (8).
See section \fB CHANNELS\fP below for more fine grained options.
.TP
\fB crypt_level\fP =\fI [low|medium|high|fips]\fP
. \" <http://blogs.msdn.com/b/openspecification/archive/2011/12/08/encryption-negotiation-in-rdp-connection.aspx>
Regulate encryption level of Standard RDP Security.
This parameter is effective only if \fB security_layer\fP is set to \fB rdp\fP or \fB negotiate\fP .
Encryption in Standard RDP Security is controlled by two settings: \fI Encryption Level\fP
and \fI Encryption Method\fP . The only supported \fI Encryption Method\fP are \fB 40BIT_ENCRYPTION\fP
and \fB 128BIT_ENCRYPTION\fP . \fB 56BIT_ENCRYPTION\fP is not supported.
This option controls the \fI Encryption Level\fP :
.RS 8
.TP
.B low
All data sent from the client to the server is protected by encryption based on
the maximum key strength supported by the client.
.I This is the only level that the traffic sent by the server to client is not encrypted.
.TP
.B medium
All data sent between the client and the server is protected by encryption based on
the maximum key strength supported by the client (client compatible).
.TP
.B high
All data sent between the client and the server is protected by encryption based on
the server's maximum key strength (sever compatible).
.TP
.B fips
All data sent between the client and server is protected using Federal Information
Processing Standard 140-1 validated encryption methods.
.I This level is required for Windows clients (mstsc.exe) if the client's group policy
.I enforces FIPS-compliance mode.
.RE
.TP
\fB fork\fP =\fI [true|false]\fP
If set to \fB 1\fR , \fB true\fR or \fB yes\fR for each incoming connection \fB xrdp\fR (8) forks a sub-process instead of using threads.
.TP
\fB hidelogwindow\fP =\fI [true|false]\fP
If set to \fB 1\fP , \fB true\fP or \fB yes\fP , \fB xrdp\fP will not show a window for log messages.
If not specified, defaults to \fB false\fP .
.TP
\fB max_bpp\fP =\fI [8|15|16|24|32]\fP
Limit the color depth by specifying the maximum number of bits per pixel.
If not specified or set to \fB 0\fP , unlimited.
.TP
\fB pamerrortxt\fP =\fI error_text\fP
Specify text passed to PAM when authentication failed. The maximum length is \fB 256\fP .
.TP
\fB port\fP =\fI port\fP
Specify TCP port to listen on for incoming connections.
The default for RDP is \fB 3389\fP .
.TP
\fB require_credentials\fP =\fI [true|false]\fP
If set to \fB 1\fP , \fB true\fP or \fB yes\fP , \fB xrdp\fP requires clients to include username and
password initial connection phase. In other words, xrdp doesn't allow clients to show login
screen if set to true. If not specified, defaults to \fB false\fP .
.TP
\fB security_layer\fP =\fI [tls|rdp|negotiate]\fP
Regulate security methods. If not specified, defaults to \fB negotiate\fP .
.RS 8
.TP
.B tls
Enhanced RDP Security is used. All security operations (encryption, decryption, data integrity
verification, and server authentication) are implemented by TLS.
.TP
.B rdp
Standard RDP Security, which is not safe from man-in-the-middle attack, is used. The encryption level
of Standard RDP Security is controlled by \fB crypt_level\fP .
.TP
.B negotiate
Negotiate these security methods with clients.
.RE
.TP
\fB ssl_protocols\fP =\fI [SSLv3] [TLSv1] [TLSv1.1] [TLSv1.2]\fP
Enables the specified SSL/TLS protocols. Each value should be separated by comma.
SSLv2 is always disabled. At least one protocol should be given to accept TLS connections.
This parameter is effective only if \fB security_layer\fP is set to \fB tls\fP or \fB negotiate\fP .
.TP
\fB tcp_keepalive\fP =\fI [true|false]\fP
Regulate if the listening socket uses socket option \fB SO_KEEPALIVE\fP .
If set to \fB 1\fP , \fB true\fP or \fB yes\fP and the network connection disappears
without closing messages, the connection will be closed.
.TP
\fB tcp_nodelay\fP =\fI [true|false]\fP
Regulate if the listening socket uses socket option \fB TCP_NODELAY\fP .
If set to \fB 1\fP , \fB true\fP or \fB yes\fP , no buffering will be performed in the TCP stack.
.TP
\fB tcp_send_buffer_bytes\fP =\fI buffer_size\fP
.TP
\fB tcp_recv_buffer_bytes\fP =\fI buffer_size\fP
Specify send/recv buffer sizes in bytes. The default value depends on operating system.
.TP
\fB tls_ciphers\fP =\fI cipher_suite\fP
Specifies TLS cipher suite. The format of this parameter is equivalent
to which \fB openssl\fP (1) ciphers subcommand accepts.
(ex. $ openssl ciphers 'HIGH:!ADH:!SHA1')
This parameter is effective only if \fB security_layer\fP is set to \fB tls\fP or \fB negotiate\fP .
.TP
\fB use_fastpath\fP =\fI [input|output|both|none]\fP
If not specified, defaults to \fB none\fP .
.TP
\fB black\fP =\fI 000000\fP
.TP
\fB grey\fP =\fI c0c0c0\fP
.TP
\fB dark_grey\fP =\fI 808080\fP
.TP
\fB blue\fP =\fI 0000ff\fP
.TP
\fB dark_blue\fP =\fI 00007f\fP
.TP
\fB white\fP =\fI ffffff\fP
.TP
\fB red\fP =\fI ff0000\fP
.TP
\fB green\fP =\fI 00ff00\fP
.TP
\fB background\fP =\fI 000000\fP
These options override the colors used internally by \fB xrdp\fP (8) to draw the login and log windows.
Colors are defined using a hexadecimal (hex) notation for the combination of Red, Green, and Blue color values (RGB).
The lowest value that can be given to one of the light sources is 0 (hex 00).
The highest value is 255 (hex FF).
.SH "LOGGING"
The following parameters can be used in the \fB [Logging]\fR section:
.TP
\fB LogFile\fR =\fI @localstatedir@/log/sesman.log\fR
This options contains the path to logfile. It can be either absolute or relative.\fR
.TP
\fB LogLevel\fR =\fI level\fR
This option can have one of the following values:
\fB CORE\fR or \fB 0\fR \- Log only core messages. these messages are _always_ logged, regardless the logging level selected.
\fB ERROR\fR or \fB 1\fR \- Log only error messages
\fB WARNING\fR , \fB WARN\fR or \fB 2\fR \- Logs warnings and error messages
\fB INFO\fR or \fB 3\fR \- Logs errors, warnings and informational messages
\fB DEBUG\fR or \fB 4\fR \- Log everything. If \fB sesman\fR is compiled in debug mode, this options will output many more low\- level message, useful for developers
.TP
\fB EnableSyslog\fR =\fI [true|false]\fR
If set to \fB 1\fR , \fB true\fR or \fB yes\fR this option enables logging to syslog. Otherwise syslog is disabled.
.TP
\fB SyslogLevel\fR =\fI level\fR
This option sets the logging level for syslog. It can have the same values of \fB LogLevel\fR . If \fB SyslogLevel\fR is greater than \fB LogLevel\fR , its value is lowered to that of \fB LogLevel\fR .
.SH "CHANNELS"
The Remote Desktop Protocol supports several channels, which are used to transfer additional data like sound, clipboard data and others.
Channel names not listed here will be blocked by \fB xrdp\fP .
Not all channels are supported in all cases, so setting a value to \fI true\fP is a prerequisite, but does not force its use.
.br
Channels can also be enabled or disabled on a per connection basis by prefixing each setting with \fB channel.\fP in the channel section.
.TP
\fB rdpdr\fP =\fI [true|false]\fP
If set to \fB 1\fR , \fB true\fR or \fB yes\fR using the RDP channel for device redirection is allowed.
.TP
\fB rdpsnd\fP =\fI [true|false]\fP
If set to \fB 1\fR , \fB true\fR or \fB yes\fR using the RDP channel for sound is allowed.
.TP
\fB drdynvc\fP =\fI [true|false]\fP
If set to \fB 1\fR , \fB true\fR or \fB yes\fR using the RDP channel to initiate additional dynamic virtual channels is allowed.
.TP
\fB cliprdr\fP =\fI [true|false]\fP
If set to \fB 1\fR , \fB true\fR or \fB yes\fR using the RDP channel for clipboard redirection is allowed.
.TP
\fB rail\fP =\fI [true|false]\fP
If set to \fB 1\fR , \fB true\fR or \fB yes\fR using the RDP channel for remote applications integrated locally (RAIL) is allowed.
.TP
\fB xrdpvr\fP =\fI [true|false]\fP
If set to \fB 1\fR , \fB true\fR or \fB yes\fR using the RDP channel for XRDP Video streaming is allowed.
.SH "CONNECTIONS"
A connection section is made of a section name, enclosed in square brackets, and the following entries:
.TP
\fB name\fR =\fI <session name>\fR
The name displayed in \fB xrdp\fR (8) login window's combo box.
.TP
\fB lib\fR =\fI ../vnc/libvnc.so\fR
Sets the library to be used with this connection.
.TP
\fB username\fR =\fI <username>\fR |\fI {base64}<base64-encoded-username>\fR |\fI ask\fR
Specifies the username used for authenticating in the connection.
If set to \fI ask\fR , user name should be provided in the login window.
If the username includes comment out symbols such as '#', or ';', the username can be
provided in base64 form prefixing "{base64}".
.TP
\fB password\fR =\fI <password>\fR |\fI {base64}<base64-encoded-password>\fR |\fI ask\fR
Specifies the password used for authenticating in the connection.
If set to \fI ask\fR , password should be provided in the login window.
This parameter can be provided in base64 form as well as username. See also examples below.
.TP
\fB ip\fR =\fI 127.0.0.1\fR
Specifies the ip address of the host to connect to.
.TP
\fB port\fR =\fI <number>\fR |\fI \- 1\fR
Specifies the port number to connect to. If set to \fI \- 1\fR , the default port for the specified library is used.
.TP
\fB xserverbpp\fR =\fI <number>\fR
Specifies color depth of the backend X server. The default is the color
depth of the client. Only Xvnc and X11rdp use that setting. Xorg runs at
\fI 24\fR bpp.
.TP
\fB code\fR =\fI <number>\fR |\fI 0\fR
Specifies the session type. The default, \fI 0\fR , is Xvnc, \fI 10\fR is
X11rdp, and \fI 20\fR is Xorg with xorgxrdp modules.
.SH "EXAMPLES"
This is an example \fB xrdp.ini\fR :
.nf
[Globals]
bitmap_cache=true
bitmap_compression=true
[Xorg]
name=Xorg
lib=libxup.so
username=ask
password=ask
ip=127.0.0.1
port=-1
code=20
[vnc-any]
name=vnc-any
lib=libvnc.so
ip=ask
port=ask5900
username=na
password={base64}cGFzc3dvcmQhCg==
.fi
.SH "FILES"
@sysconfdir@/xrdp/xrdp.ini
.SH "SEE ALSO"
.BR xrdp (8),
.BR sesman (8),
.BR sesrun (8),
.BR sesman.ini (5)
for more info on \fB xrdp\fR see http://www.xrdp.org/