Operational guide — what to do, step by step, to get the most out of SSHBorg.
Tap the + button on the hosts screen to add a new server.
ubuntu, root, deploy).On the first connection SSHBorg shows you the server's fingerprint and asks you to accept it. This is a security check: it ensures you are connecting to the right machine and not to an impostor. You should verify the fingerprint matches the one shown by your server admin or obtained via a trusted channel before accepting.
Once accepted, the fingerprint is stored locally. If it changes on a future connection, SSHBorg will warn you — this could indicate a server rebuild, a key rotation, or a man-in-the-middle attack.
ssh-keygen -lf /etc/ssh/ssh_host_ed25519_key.pub
Key-based authentication is more secure than passwords and does not require you to remember or type anything after setup.
Go to Settings → SSH Keys → Generate new key. SSHBorg supports:
Give the key a meaningful name (e.g. my-vps or work-server) so you can identify it later.
After generating a key, tap it to see the public key. Copy it and paste it into the server's ~/.ssh/authorized_keys file for the user you want to log in as.
mkdir -p ~/.ssh
chmod 700 ~/.ssh
echo "ssh-ed25519 AAAA...yourcopiedkey..." >> ~/.ssh/authorized_keys
chmod 600 ~/.ssh/authorized_keys
PubkeyAuthentication yes in /etc/ssh/sshd_config. This is the default on most distributions, but some hardened images disable it.
SSHBorg offers an optional additional passphrase for your keys (Settings → SSH Keys → tap a key → Enable encryption). When enabled, the key is encrypted with a passphrase that SSHBorg does not store — you will be asked to enter it each time the key is used.
This is strongly recommended if you store sensitive server credentials on your phone, or if you have biometric lock disabled.
SSHBorg shows a suggestion bar above the keyboard while you type in the terminal. Suggestions are drawn from the shell history of the user you connected as.
When a terminal session opens, SSHBorg reads the shell history file from the remote server. It tries the following locations in order:
~/.bash_history — default for Bash shells~/.zsh_history — default for Zsh (also checked as $HISTFILE if set)~/.local/share/fish/fish_history — for Fish shell usersThe first file that exists and is readable is used. As you type, commands are filtered in real time and shown as chips in the suggestion bar. Tap a chip to insert the command.
No suggestions appear
~/.bashrc:
HISTFILE=~/.bash_history
HISTSIZE=10000
HISTFILESIZE=20000
~/.zshrc:
HISTFILE=~/.zsh_history
HISTSIZE=10000
SAVEHIST=10000
setopt APPEND_HISTORY SHARE_HISTORY
Suggestions are from the wrong user
sudo su - root (or switch to another user with su), the suggestion bar still shows the history of the original login user, not of root. This is because SSHBorg reads the history file before the shell starts, using the credentials you connected with.
root (if your server allows it).
SSH agent forwarding lets the keys stored in SSHBorg be used to authenticate further connections made from inside the remote server — for example, to git clone a private repo, or to hop to a second machine.
When adding or editing a host, enable the Agent forwarding toggle. SSHBorg will act as an SSH agent for that session.
The server must allow agent forwarding. Check /etc/ssh/sshd_config:
AllowAgentForwarding yes
This is the default on most systems. After changing it, restart the SSH daemon:
sudo systemctl restart sshd
If you also connect to this server from a laptop or desktop, you can configure forwarding persistently in your local ~/.ssh/config:
Host myserver
HostName 203.0.113.42
User ubuntu
ForwardAgent yes
SSH is a live TCP connection between your phone and the server. If the connection is interrupted — even for a second — the session and everything running inside it is lost.
Mobile networks are particularly prone to connection drops for several reasons:
A terminal multiplexer runs a persistent session on the server, completely independent of your SSH connection. If the connection drops, the session and everything running inside it keeps going. When you reconnect, you re-attach and find everything exactly as you left it.
This is the single most useful habit for anyone managing servers from a phone.
tmux is available on most modern Linux distributions and is the recommended choice.
# Start a new named session
tmux new -s work
# Detach from the session (leave it running)
Ctrl+B, then D
# List running sessions
tmux ls
# Re-attach to a session
tmux attach -t work
# Re-attach to the most recent session
tmux attach
screen is older but available on virtually every Unix system, including minimal server images where tmux may not be installed.
# Start a new named session
screen -S work
# Detach from the session
Ctrl+A, then D
# List running sessions
screen -ls
# Re-attach to a session
screen -r work
tmux attach || tmux new -s maintmux attach || tmux new -s main to your ~/.bashrc or ~/.zshrc on the server so that a multiplexer session starts automatically every time you log in via SSHBorg.
A jump host (also called a bastion host) is an intermediate server you must pass through to reach a target server that is not directly accessible from the internet. SSHBorg supports single and multi-hop jump chains natively.
If you need to jump through more than one intermediate server (e.g. internet → bastion → dmz → target), create an entry for each hop and chain them:
The equivalent setup in a desktop ~/.ssh/config looks like this:
Host bastion
HostName bastion.example.com
User admin
ForwardAgent yes
Host target
HostName 10.0.1.50
User ubuntu
ProxyJump bastion
ForwardAgent yes
With this config, ssh target on your laptop transparently jumps through the bastion.
SSHBorg lets you keep several SSH terminal sessions and SFTP file manager sessions open at the same time, even to different servers.
tmux or screen on the server side if you want them to survive even if the SSH connection drops.
Enable biometric lock in Settings → Security → Biometric lock. When active, SSHBorg requires fingerprint or face unlock before showing any host, credential, or session data.
You can set an inactivity timeout — after that many minutes in the background the app locks automatically.
By default SSHBorg blocks screenshots and screen recording to prevent sensitive terminal content from leaking via the recent-apps screen or screen capture tools.
If you need to take a screenshot (e.g. to share a terminal output), you can temporarily disable screenshot protection in Settings → Security → Allow screenshots.
All credentials (passwords, private keys, passphrases) are stored encrypted using the Android Keystore — a hardware-backed secure enclave available on Android 10+. They are never written to external storage or transmitted anywhere.