It seems that the Tight server offers two auth types: 1 (NONE) and 16 (TIGHT).
Then the client chooses 16 (the highest one).
But within the _negotiate_tight_auth() function something fails.
util.js:218 Msg: Starting VNC handshake
websock.js:350 --- WS received data in hex: 0x52 0x46 0x42 0x20 0x30 0x30 0x33 0x2e 0x30 0x30 0x38 0xa
util.js:218 Msg: Sent ProtocolVersion: 003.008
websock.js:350 --- WS received data in hex: 0x2
websock.js:166 --- Websock:rQwait() returns true | [num:2, goback:1]
websock.js:350 --- WS received data in hex: 0x1
websock.js:166 --- Websock:rQwait() returns true | [num:2, goback:1]
websock.js:350 --- WS received data in hex: 0x10
websock.js:170 --- Websock:rQwait() returns false | [num:2, goback:1]
util.js:218 Msg: Authenticating using scheme: 16
websock.js:166 --- Websock:rQwait() returns true | [num:4, goback:undefined]
websock.js:350 --- WS received data in hex: 0x0 0x0 0x0 0x0
websock.js:170 --- Websock:rQwait() returns false | [num:4, goback:undefined]
websock.js:166 --- Websock:rQwait() returns true | [num:4, goback:undefined]
websock.js:350 --- WS received data in hex: 0x0 0x0 0x0 0x0
websock.js:170 --- Websock:rQwait() returns false | [num:4, goback:undefined]
websock.js:170 --- Websock:rQwait() returns false | [num:0, goback:4]
util.js:220 Msg: No supported sub-auth types!
I know that this works if 1 (NONE) is chosen, however I don't know how to enforce noVNC to select 1 instead of 16.