| # If you want to use VNC remotely without TLS, then you *must* | 
 | # pick a mechanism which provides session encryption as well | 
 | # as authentication. | 
 | # | 
 | # If you are only using TLS, then you can turn on any mechanisms | 
 | # you like for authentication, because TLS provides the encryption | 
 | # | 
 | # If you are only using UNIX sockets then encryption is not | 
 | # required at all. | 
 | # | 
 | # NB, previously DIGEST-MD5 was set as the default mechanism for | 
 | # QEMU VNC. Per RFC 6331 this is vulnerable to many serious security | 
 | # flaws as should no longer be used. Thus GSSAPI is now the default. | 
 | # | 
 | # To use GSSAPI requires that a QEMU service principal is | 
 | # added to the Kerberos server for each host running QEMU. | 
 | # This principal needs to be exported to the keytab file listed below | 
 | mech_list: gssapi | 
 |  | 
 | # If using TLS with VNC, or a UNIX socket only, it is possible to | 
 | # enable plugins which don't provide session encryption. The | 
 | # 'scram-sha-256' plugin allows plain username/password authentication | 
 | # to be performed | 
 | # | 
 | #mech_list: scram-sha-256 | 
 |  | 
 | # You can also list many mechanisms at once, and the VNC server will | 
 | # negotiate which to use by considering the list enabled on the VNC | 
 | # client. | 
 | #mech_list: scram-sha-256 gssapi | 
 |  | 
 | # This file needs to be populated with the service principal that | 
 | # was created on the Kerberos v5 server. If switching to a non-gssapi | 
 | # mechanism this can be commented out. | 
 | keytab: /etc/qemu/krb5.tab | 
 |  | 
 | # If using scram-sha-256 for username/passwds, then this is the file | 
 | # containing the passwds. Use 'saslpasswd2 -a qemu [username]' | 
 | # to add entries, and 'sasldblistusers2 -f [sasldb_path]' to browse it. | 
 | # Note that this file stores passwords in clear text. | 
 | #sasldb_path: /etc/qemu/passwd.db |