Skip to content

SSH

ezTerm uses russh — a pure-Rust SSH client — for all SSH sessions. Connections run inside async tokio tasks; no OpenSSH or PuTTY dependency.

MethodWhat it does
PasswordStored encrypted in the vault. Re-used across reconnects.
Private keyStored encrypted in the vault. Key file on disk is read once at save time.
SSH agentTalks to a running ssh-agent (Windows: openssh-agent service, or Pageant).

Pick one per session; ezTerm doesn’t try multiple methods automatically.

On first connect to a host, ezTerm shows the server’s fingerprint and asks for confirmation. On subsequent connects, the stored fingerprint is compared — a mismatch is a hard failure (no “ignore” prompt). To re-trust a server (legitimate key rotation), delete the entry from the known-hosts manager.

Known-hosts entries live in ezTerm’s own SQLite database — not ~/.ssh/known_hosts. This keeps ezTerm’s trust state independent of the OpenSSH CLI.

Each session has independent connect timeout (initial handshake) and keepalive interval (TCP-level liveness ping while connected). Defaults are reasonable for most networks; bump keepalive shorter for flaky connections that drop idle.

Optional — enable in the session edit dialog. Useful on slow links; mostly invisible on LAN.