Bitwarden can generate and store keys and also works as an SSH agent.
Warp terminal has rules you can sync online. I use them to connect to 30+ remote servers each with its own key that never leaves Bitwarden.
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
Rules:
Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.
No spam posting.
Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.
Don't duplicate the full text of your blog or github here. Just post the link for folks to click.
Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).
No trolling.
No low-effort posts. This is subjective and will largely be determined by the community member reports.
Resources:
Any issues on the community? Report it using the report flag.
Questions? DM the mods!
Bitwarden can generate and store keys and also works as an SSH agent.
Warp terminal has rules you can sync online. I use them to connect to 30+ remote servers each with its own key that never leaves Bitwarden.
I wished they'd create a MobaXterm for Linux.
Not an answer, but I’m curious: what's wrong with just having several ssh keys, one per device?
The primary issue is I don't always access devices from only those 3 systems. If I'm traveling or I wipe my device or get a new one, I would have to add the new key to many servers as authorized keys, and I'd need to have password access enabled in order to add the keys in the first place. Also, I want a key backed up in case of disaster since all of my devices are in my home most of the time. A few people use these systems, but only I maintain them.
You can back up ~/.ssh though, and restore it on any system.
In fact, that's generally what you want to do, since if one device gets lost or compromised, you just revoke access to the key for that device.
I switched from Termius to Termix: https://github.com/Termix-SSH/Termix. Same idea, I wanted open-source, free (they state 'forever-free'), and self-hostable. I used the Proxmox helper-script to install the 'server' as an LXC on my homelab, and then there are 'clients' for Linux, Windows, Mac, iOS, Android, etc. I just copied my SSH credentials, hosts, and snippets over from Termius and haven't found a need to go back. I'm a relatively novice user and found xpipe a bit complex for my use, but it's another solid option too.
I would like to add a second for termix, it's a pretty acceptable replacement and self hosting is a +.
Xpipe is fantastic. I have to manage a LOT of SSH connections between work and homelab (well over 200 now) and Xpipe has been a god send.
A password manager? I know Bitwarden and 1Password can store SSH keys and their desktop clients have an SSH agent. No idea about using your keys on Android though.
What about small step sash ca?
I've been using it to secure all my stuff for over a year, no more copying keys about
Juicessh? One time payment, unfortunately not open source but can deal with a lot of services, you can use ssh key and I don't know what else you'd need but you can take a look (and test it for free since the payment is only to unlock features you might not need)
Last update in 2021, delisted in Playstore, multiple security fixes are missing... Don't even think about it
I paid for it a long time ago, but will not use it anymore
Not the guy you replied to, but I'm a JuiceSSH user too, and I didn't know this. That sucks.
Yes it really sucks. I got aware of this as there was a security patch for openssh server and I waited for an update for JuiceSSH, but it never came.