this post was submitted on 07 Feb 2026
25 points (100.0% liked)

Selfhosted

56183 readers
952 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

  7. No low-effort posts. This is subjective and will largely be determined by the community member reports.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

I've been using Termius for a few years for an SSH client. Have have a lot of self-hosted servers both in my home lab and on VPSs. I'm looking to cut some costs since it's $120/year and really the main thing I use it for is syncing my SSH accounts and credentials between a laptop, a desktop, and my Android phone. So I'm looking for a new method to sync these things.

I'd prefer a single application, but I'd settle for a good, secure way to sync the credentials and recommendations for applications on Fedora and Android.

Edit: I'm OK with a one time payment application, but prefer open source or a solution I can self-host the sync server. And I don't want a subscription.

top 26 comments
sorted by: hot top controversial new old
[–] B0rax@feddit.org 2 points 7 hours ago

Why not sync the keys with something like syncthing? Then you can use whatever client you want (even just the terminal)

[–] farcaller@fstab.sh 21 points 1 day ago (2 children)

Not an answer, but I’m curious: what's wrong with just having several ssh keys, one per device?

[–] tal@lemmy.today 26 points 1 day ago

In fact, that's generally what you want to do, since if one device gets lost or compromised, you just revoke access to the key for that device.

[–] irotsoma@piefed.blahaj.zone 1 points 1 day ago (5 children)

The primary issue is I don't always access devices from only those 3 systems. If I'm traveling or I wipe my device or get a new one, I would have to add the new key to many servers as authorized keys, and I'd need to have password access enabled in order to add the keys in the first place. Also, I want a key backed up in case of disaster since all of my devices are in my home most of the time. A few people use these systems, but only I maintain them.

[–] needanke@feddit.org 6 points 1 day ago

For that scenario you could also consider using certificate based login. Just store your root certificate in a safe place (like a Keepass) an then sign new keys for your new devices when you get one.

https://docs.ssh.com/manuals/server-admin/44/User_Authentication_with_Certificates.html

[–] needanke@feddit.org 2 points 1 day ago

and I'd need to have password access enabled in order to add the keys

Besides the other points, you could just add the public keys directly in the .ssh/authorized_keys(2) file of the server as long as you still have access from another device. That way you don't have to enable passwords.

[–] farcaller@fstab.sh 1 points 1 day ago

Let's untangle those problems. I have a similar setup so I just want to share some ideas to show that you don’t need to copy keys.

If I'm traveling or I wipe my device or get a new one, I would have to add the new key to many servers as authorized keys

If you oftentimes access ssh from untrusted systems you’re kind of in a bad spot to begin with. The best thing you can have is a yubikey on a keychain. Everything else means you leak secret material (a password or a key) to a machine you don’t inherently trust.

Also, I want a key backed up in case of disaster since all of my devices are in my home most of the time

Again, something that you can easily solve with a hardware key [in a safe]. But realistically, in case of a disaster a local shell password login should be good enough?

I'd recommend you to think about what attacks are you trying to prevent by using a shared private key. I’m not saying it's a bad concept, inherently having it in your password manager (like 1Password that even has ssh-agent support) is pretty common. The problem with just the keys is that it's non-trivial to expire them if needed. You might be indeed better off with some web based authentication that you can access from any place which would ask you secret questions/send you a text message or do whatever 2FA you deem sufficient and mint you a short-lived certificate for ssh.

[–] suicidaleggroll@lemmy.world 3 points 1 day ago

You can back up ~/.ssh though, and restore it on any system.

[–] cyrl@lemmy.world 1 points 1 day ago

You can store an ssh key in Bitwarden or Keepass(XC) easily enough - Bitearden can certainly be configured as the actual source of your ssh keys with only a tiny bit of config effort

[–] 30p87@feddit.org 1 points 1 day ago

openssh client in foot and termux

[–] Marthirial@lemmy.world 5 points 1 day ago

Bitwarden can generate and store keys and also works as an SSH agent.

Warp terminal has rules you can sync online. I use them to connect to 30+ remote servers each with its own key that never leaves Bitwarden.

[–] gagootron@feddit.org 2 points 1 day ago

i store my ssh key on my yubikey using the gpg interface. On linux it's natively supported, on windows you need cleopatra and on android you can you OpenKeychain together with TermBot.

This won't sync the hosts you have, but at least you always will have your private key with you.

[–] mgrimace@lemmy.ca 4 points 1 day ago

I switched from Termius to Termix: https://github.com/Termix-SSH/Termix. Same idea, I wanted open-source, free (they state 'forever-free'), and self-hostable. I used the Proxmox helper-script to install the 'server' as an LXC on my homelab, and then there are 'clients' for Linux, Windows, Mac, iOS, Android, etc. I just copied my SSH credentials, hosts, and snippets over from Termius and haven't found a need to go back. I'm a relatively novice user and found xpipe a bit complex for my use, but it's another solid option too.

[–] Decronym@lemmy.decronym.xyz 1 points 1 day ago* (last edited 7 hours ago)

Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I've seen in this thread:

Fewer Letters More Letters
LXC Linux Containers
SFTP Secure File Transfer Protocol for encrypted file transfer, over SSH
SSH Secure Shell for remote terminal access

3 acronyms in this thread; the most compressed thread commented on today has 15 acronyms.

[Thread #74 for this comm, first seen 8th Feb 2026, 07:40] [FAQ] [Full list] [Contact] [Source code]

[–] BlackEco@lemmy.blackeco.com 3 points 1 day ago

A password manager? I know Bitwarden and 1Password can store SSH keys and their desktop clients have an SSH agent. No idea about using your keys on Android though.

[–] fireshell@kbin.earth 1 points 1 day ago

sshch - SSH connection and aliases manager with curses and command line interface.

[–] Voroxpete@sh.itjust.works 2 points 1 day ago

Xpipe is fantastic. I have to manage a LOT of SSH connections between work and homelab (well over 200 now) and Xpipe has been a god send.

[–] irmadlad@lemmy.world 1 points 1 day ago

I wished they'd create a MobaXterm for Linux.

[–] mhzawadi@lemmy.horwood.cloud 1 points 1 day ago

What about small step sash ca?

I've been using it to secure all my stuff for over a year, no more copying keys about

[–] diminou@lemmy.zip -2 points 1 day ago (2 children)

Juicessh? One time payment, unfortunately not open source but can deal with a lot of services, you can use ssh key and I don't know what else you'd need but you can take a look (and test it for free since the payment is only to unlock features you might not need)

[–] jsnfwlr@lemmy.ml 1 points 6 hours ago

JuiceSSH dev disabled the paid features

[–] morethanevil@lemmy.fedifriends.social 7 points 1 day ago (1 children)

Last update in 2021, delisted in Playstore, multiple security fixes are missing... Don't even think about it

I paid for it a long time ago, but will not use it anymore

[–] clb92@feddit.dk 5 points 1 day ago (1 children)

Not the guy you replied to, but I'm a JuiceSSH user too, and I didn't know this. That sucks.

[–] morethanevil@lemmy.fedifriends.social 3 points 1 day ago (1 children)

Yes it really sucks. I got aware of this as there was a security patch for openssh server and I waited for an update for JuiceSSH, but it never came.

[–] diminou@lemmy.zip 1 points 1 day ago (1 children)

Oh I never knew either!

Not that you mention it it is true that I have not seen it update in a long time. Since I'm only using it from time to time and locally (mainly) I've never bothered to check.

What are you using instead?

I use Termius, they have a paid version too as subscription service. This includes sync across devices etc. I don't need those pro features. I use SFTP and SSH and this works fine without paying. Never seen ads