Go to file
Sheng c9eb7d05c7 MANIFEST.in 2018-04-27 01:40:47 +08:00
preview Moved preview 2018-04-22 22:25:20 +08:00
tests Use absolute path for importing modules 2018-04-26 22:38:16 +08:00
webssh Updated _version.py 2018-04-27 01:21:20 +08:00
.coveragerc Prepare to write unit tests 2018-04-22 20:11:36 +08:00
.gitignore Prepare to write unit tests 2018-04-22 20:11:36 +08:00
.travis.yml Updated .travis.yml 2018-04-27 00:08:58 +08:00
LICENSE Initialize 2017-11-08 22:33:05 +08:00
MANIFEST.in MANIFEST.in 2018-04-27 01:40:47 +08:00
README.md Added README.rst 2018-04-27 01:11:16 +08:00
README.rst Added README.rst 2018-04-27 01:11:16 +08:00
requirements.txt Prepare to write unit tests 2018-04-22 20:11:36 +08:00
setup.cfg Updated setup.py setup.cfg 2018-04-27 00:44:52 +08:00
setup.py Added README.rst 2018-04-27 01:11:16 +08:00

README.md

WebSSH

Build Status codecov license

A simple web application to be used as an ssh client to connect to your ssh servers. It is written in Python, base on tornado and paramiko.

Preview

Login Terminal

Features

  • SSH password authentication supported, including empty password.
  • SSH public-key authentication supported, including DSA RSA ECDSA Ed25519 keys.
  • Encrypted keys supported.
  • Fullscreen terminal supported.
  • Terminal window resizable.
  • Compatible with Python 2.7-3.6.

Instructions

pip install webssh
wssh

Options

# configure listen address and port
wssh --address='0.0.0.0' --port=8000

# configure missing host key policy
wssh --policy=reject

# configure logging level
wssh --logging=debug

# log to file
wssh --log-file-prefix=main.log

# more options
wssh --help

Nginx config example for running this app behind an nginx server

location / {
    proxy_pass http://127.0.0.1:8888;
    proxy_http_version 1.1;
    proxy_read_timeout 300;
    proxy_set_header Upgrade $http_upgrade;
    proxy_set_header Connection "upgrade";
    proxy_set_header Host $http_host;
    proxy_set_header X-Real-IP $remote_addr;
    proxy_set_header X-Real-PORT $remote_port;
}

Tips

  • Try to use Nginx as a front web server (see config example above) and enable SSL, this will prevent your ssh credentials from being uncovered. Also afterwards the communication between your browser and the web server will be encrypted as they use secured websockets.
  • Try to use reject policy as the missing host key policy along with your verified known_hosts, this will prevent man-in-the-middle attacks. The idea is that it checks the system host keys file("~/.ssh/known_hosts") and the application host keys file("./known_hosts") in order, if the ssh server's hostname is not found or the key is not matched, the connection will be aborted.