Снес tigervnc и установил заново (удалил x11vnc и конфиги) с запуском демонов от пользователя все заработало.
Завтра ради эксперимента поставлю чистый арч если vcn не пойдет значит опять битая прога
Хоть тема и старая, но проблема осталась, скорее всего дело уже в самих прогах которые на ладан дышат и работают коряво
По исксам все бьет уже даже и не знаю в чем причина, скорее всего опять какую нибудь хрень обновление выдумали, или такое тоже бывало сама прога не рабочая в арче это сплошь и рядом
indeviral
да вроде всё норм, а пробовали?
$ x11vnc -display :0 -noxdamage
Все также буду копаться в x11 может там чего
indeviral
и ошибок никаких?
###############################################################
#@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#
#@ @#
#@ ** WARNING ** WARNING ** WARNING ** WARNING ** @#
#@ @#
#@ YOU ARE RUNNING X11VNC WITHOUT A PASSWORD!! @#
#@ @#
#@ This means anyone with network access to this computer @#
#@ may be able to view and control your desktop. @#
#@ @#
#@ >>> If you did not mean to do this Press CTRL-C now!! <<< @#
#@ @#
#@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#
#@ @#
#@ You can create an x11vnc password file by running: @#
#@ @#
#@ x11vnc -storepasswd password /path/to/passfile @#
#@ or x11vnc -storepasswd /path/to/passfile @#
#@ or x11vnc -storepasswd @#
#@ @#
#@ (the last one will use ~/.vnc/passwd) @#
#@ @#
#@ and then starting x11vnc via: @#
#@ @#
#@ x11vnc -rfbauth /path/to/passfile @#
#@ @#
#@ an existing ~/.vnc/passwd file from another VNC @#
#@ application will work fine too. @#
#@ @#
#@ You can also use the -passwdfile or -passwd options. @#
#@ (note -passwd is unsafe if local users are not trusted) @#
#@ @#
#@ Make sure any -rfbauth and -passwdfile password files @#
#@ cannot be read by untrusted users. @#
#@ @#
#@ Use x11vnc -usepw to automatically use your @#
#@ ~/.vnc/passwd or ~/.vnc/passwdfile password files. @#
#@ (and prompt you to create ~/.vnc/passwd if neither @#
#@ file exists.) Under -usepw, x11vnc will exit if it @#
#@ cannot find a password to use. @#
#@ @#
#@ @#
#@ Even with a password, the subsequent VNC traffic is @#
#@ sent in the clear. Consider tunnelling via ssh(1): @#
#@ @#
#@ http://www.karlrunge.com/x11vnc/#tunnelling @#
#@ @#
#@ Or using the x11vnc SSL options: -ssl and -stunnel @#
#@ @#
#@ Please Read the documention for more info about @#
#@ passwords, security, and encryption. @#
#@ @#
#@ http://www.karlrunge.com/x11vnc/faq.html#faq-passwd @#
#@ @#
#@ To disable this warning use the -nopw option, or put @#
#@ 'nopw' on a line in your ~/.x11vncrc file. @#
#@ @#
#@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#
###############################################################
31/03/2018 23:17:04 x11vnc version: 0.9.15 lastmod: 2018-02-04 pid: 10043
31/03/2018 23:17:04 Using X display :0
31/03/2018 23:17:04 rootwin: 0x6cd reswin: 0x2c00004 dpy: 0xd6b1b7b0
31/03/2018 23:17:04
31/03/2018 23:17:04 ------------------ USEFUL INFORMATION ------------------
31/03/2018 23:17:04 X DAMAGE available on display, using it for polling hints.
31/03/2018 23:17:04 To disable this behavior use: '-noxdamage'
31/03/2018 23:17:04
31/03/2018 23:17:04 Most compositing window managers like 'compiz' or 'beryl'
31/03/2018 23:17:04 cause X DAMAGE to fail, and so you may not see any screen
31/03/2018 23:17:04 updates via VNC. Either disable 'compiz' (recommended) or
31/03/2018 23:17:04 supply the x11vnc '-noxdamage' command line option.
31/03/2018 23:17:04 X COMPOSITE available on display, using it for window polling.
31/03/2018 23:17:04 To disable this behavior use: '-noxcomposite'
31/03/2018 23:17:04
31/03/2018 23:17:04 Wireframing: -wireframe mode is in effect for window moves.
31/03/2018 23:17:04 If this yields undesired behavior (poor response, painting
31/03/2018 23:17:04 errors, etc) it may be disabled:
31/03/2018 23:17:04 - use '-nowf' to disable wireframing completely.
31/03/2018 23:17:04 - use '-nowcr' to disable the Copy Rectangle after the
31/03/2018 23:17:04 moved window is released in the new position.
31/03/2018 23:17:04 Also see the -help entry for tuning parameters.
31/03/2018 23:17:04 You can press 3 Alt_L's (Left "Alt" key) in a row to
31/03/2018 23:17:04 repaint the screen, also see the -fixscreen option for
31/03/2018 23:17:04 periodic repaints.
31/03/2018 23:17:04
31/03/2018 23:17:04 XFIXES available on display, resetting cursor mode
31/03/2018 23:17:04 to: '-cursor most'.
31/03/2018 23:17:04 to disable this behavior use: '-cursor arrow'
31/03/2018 23:17:04 or '-noxfixes'.
31/03/2018 23:17:04 using XFIXES for cursor drawing.
31/03/2018 23:17:04 GrabServer control via XTEST.
31/03/2018 23:17:04
31/03/2018 23:17:04 Scroll Detection: -scrollcopyrect mode is in effect to
31/03/2018 23:17:04 use RECORD extension to try to detect scrolling windows
31/03/2018 23:17:04 (induced by either user keystroke or mouse input).
31/03/2018 23:17:04 If this yields undesired behavior (poor response, painting
31/03/2018 23:17:04 errors, etc) it may be disabled via: '-noscr'
31/03/2018 23:17:04 Also see the -help entry for tuning parameters.
31/03/2018 23:17:04 You can press 3 Alt_L's (Left "Alt" key) in a row to
31/03/2018 23:17:04 repaint the screen, also see the -fixscreen option for
31/03/2018 23:17:04 periodic repaints.
31/03/2018 23:17:04
31/03/2018 23:17:04 XKEYBOARD: number of keysyms per keycode 10 is greater
31/03/2018 23:17:04 than 4 and 99 keysyms are mapped above 4.
31/03/2018 23:17:04 Automatically switching to -xkb mode.
31/03/2018 23:17:04 If this makes the key mapping worse you can
31/03/2018 23:17:04 disable it with the "-noxkb" option.
31/03/2018 23:17:04 Also, remember "-remap DEAD" for accenting characters.
31/03/2018 23:17:04
31/03/2018 23:17:04 X FBPM extension not supported.
31/03/2018 23:17:04 X display is capable of DPMS.
31/03/2018 23:17:04 --------------------------------------------------------
31/03/2018 23:17:04
31/03/2018 23:17:04 Default visual ID: 0x21
31/03/2018 23:17:04 Read initial data from X display into framebuffer.
31/03/2018 23:17:04 initialize_screen: fb_depth/fb_bpp/fb_Bpl 24/32/7680
31/03/2018 23:17:04
31/03/2018 23:17:04 X display :0 is 32bpp depth=24 true color
31/03/2018 23:17:04
31/03/2018 23:17:04 Autoprobing TCP port
31/03/2018 23:17:04 Autoprobing selected TCP port 5903
31/03/2018 23:17:04 Autoprobing TCP6 port
31/03/2018 23:17:04 rfbListenOnTCP6Port: error in bind IPv6 socket: Address already in use
31/03/2018 23:17:04 rfbListenOnTCP6Port: error in bind IPv6 socket: Address already in use
31/03/2018 23:17:04 rfbListenOnTCP6Port: error in bind IPv6 socket: Address already in use
31/03/2018 23:17:04 Autoprobing selected TCP6 port 5903
31/03/2018 23:17:04 listen6: bind: Address already in use
31/03/2018 23:17:04 Not listening on IPv6 interface.
31/03/2018 23:17:04 fb read rate: 157 MB/sec
31/03/2018 23:17:04 fast read: reset -wait ms to: 10
31/03/2018 23:17:04 fast read: reset -defer ms to: 10
31/03/2018 23:17:04 The X server says there are 10 mouse buttons.
31/03/2018 23:17:04 screen setup finished.
31/03/2018 23:17:04
31/03/2018 23:17:04 WARNING: You are running x11vnc WITHOUT a password. See
31/03/2018 23:17:04 WARNING: the warning message printed above for more info.
31/03/2018 23:17:04

The VNC desktop is: MINER1:3
PORT=5903

******************************************************************************
Have you tried the x11vnc '-ncache' VNC client-side pixel caching feature yet?

The scheme stores pixel data offscreen on the VNC viewer side for faster
retrieval. It should work with any VNC viewer. Try it by running:

x11vnc -ncache 10 ...

One can also add -ncache_cr for smooth 'copyrect' window motion.
More info: http://www.karlrunge.com/x11vnc/faq.html#faq-client-caching
indeviral
закомментируйте все ваши настройки.
Результат тот же причем, захожу с разных машин, черный экран
indeviral
$ x11vnc -display :0

Такой же черный экран unencriptdet connection
Во общем напала на меня блажь сделать майнер из под арча, с задачей справился все работает управление через ssh, но вот хочу еще vnc, а он не хороший такой черный экран выдает. Ставил tigervnc x11vnc везде черный экран, teamviewer работает прекрасно так что если не получиться vnc запустить не очень расстроюсь

Сам конфиг

### Supported server options to pass to vncserver upon invocation can be listed
## in this file. See the following manpages for more: vncserver(1) Xvnc(1).
## Several common ones are shown below. Uncomment and modify to your liking.
##
securitytypes=tlsvnc
desktop=sandbox
geometry=1200x700
dpi=96
localhost
alwaysshared
vasek
veles16, кстати, мельком пробежался по BBS, напал на одну опцию - client max protocol = NT1 - в детали не вдавался - может в будущем и пригодится, смотри в конце этого топика
Спасибо каждые полгода чего то меняют, мучайся потом