Examples: # Host a terminal session running $SHELL, attaching client's IO to the host's: upterm host
# Accept client connections automatically without prompts: upterm host --accept
# Host a terminal session allowing only specified public key(s) to connect: upterm host --authorized-keys PATH_TO_AUTHORIZED_KEY_FILE
# Host a session executing a custom command: upterm host -- docker run --rm -ti ubuntu bash
# Host a 'tmux new -t pair-programming' session, forcing clients to join with 'tmux attach -t pair-programming': upterm host --force-command 'tmux attach -t pair-programming' -- tmux new -t pair-programming
# Use a different Uptermd server, hosting a session via WebSocket: upterm host --server wss://YOUR_UPTERMD_SERVER -- YOUR_COMMAND
Flags: --accept Automatically accept client connections without prompts. --authorized-keys string Specify a authorize_keys file listing authorized public keys for connection. --codeberg-user strings Authorize specified Codeberg users by allowing their public keys to connect. -f, --force-command string Enforce a specified command for clients to join, and link the command's input/output to the client's terminal. --github-user strings Authorize specified GitHub users by allowing their public keys to connect. Configure GitHub CLI environment variables as needed; see https://cli.github.com/manual/gh_help_environment for details. --gitlab-user strings Authorize specified GitLab users by allowing their public keys to connect. -h, --help help for host --hide-client-ip Hide client IP addresses from output (auto-enabled in CI environments). --known-hosts string Specify a file containing known keys for remote hosts (required). (default "/root/.ssh/known_hosts") --no-sftp Disable file transfer via SFTP/SCP. By default, clients can transfer files with the same access as the terminal session. -i, --private-key strings Specify private key files for public key authentication with the upterm server (required). -r, --read-only Host a read-only session, preventing client interaction. Also restricts SFTP to download-only. --server string Specify the upterm server address (required). Supported protocols: ssh, ws, wss. (default "ssh://uptermd.upterm.dev:22") --skip-host-key-check Automatically accept unknown server host keys and add them to known_hosts (similar to SSH's StrictHostKeyChecking=accept-new). This bypasses host key verification for new connections. --srht-user strings Authorize specified SourceHut users by allowing their public keys to connect.
Global Flags: --debug enable debug level logging (log file: /root/.upterm/upterm.log).
[root@localhost ~]# ssh ALnJ5czDHuqp2S2Lxg0w@uptermd.upterm.dev The authenticity of host 'uptermd.upterm.dev (37.16.25.99)' can't be established. ED25519 key fingerprint is SHA256:9ajV8JqMe6jJE/s3TYjb/9xw7T0pfJ2+gADiBIJWDPE. Are you sure you want to continue connecting (yes/no/[fingerprint])? yes Warning: Permanently added 'uptermd.upterm.dev,37.16.25.99' (ED25519) to the list of known hosts. ALnJ5czDHuqp2S2Lxg0w@uptermd.upterm.dev: Permission denied (publickey). [root@localhost ~]# ssh ALnJ5czDHuqp2S2Lxg0w@uptermd.upterm.dev ALnJ5czDHuqp2S2Lxg0w@uptermd.upterm.dev: Permission denied (publickey). [root@localhost ~]# ssh ALnJ5czDHuqp2S2Lxg0w@uptermd.upterm.dev -p 22 ALnJ5czDHuqp2S2Lxg0w@uptermd.upterm.dev: Permission denied (publickey). [root@localhost ~]#
debug1: identity file /home/ubuntu/.ssh/id_ed25519_sk-cert type -1 debug1: identity file /home/ubuntu/.ssh/id_xmss type -1 debug1: identity file /home/ubuntu/.ssh/id_xmss-cert type -1 debug1: identity file /home/ubuntu/.ssh/id_dsa type -1 debug1: identity file /home/ubuntu/.ssh/id_dsa-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_8.9p1 Ubuntu-3ubuntu0.14 debug1: Remote protocol version 2.0, remote software version uptermd-0.22.0 debug1: compat_banner: no match: uptermd-0.22.0 debug1: Authenticating to uptermd.upterm.dev:22 as 'fHkbYLuA3Xh4EWQNxusQ' debug1: load_hostkeys: fopen /home/ubuntu/.ssh/known_hosts2: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: curve25519-sha256 debug1: kex: host key algorithm: ssh-ed25519-cert-v01@openssh.com debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host certificate: ssh-ed25519-cert-v01@openssh.com SHA256:9ajV8JqMe6jJE/s3TYjb/9xw7T0pfJ2+gADiBIJWDPE, serial 0 ID "uptermd" CA ssh-ed25519 SHA256:9ajV8JqMe6jJE/s3TYjb/9xw7T0pfJ2+gADiBIJWDPE valid forever debug1: load_hostkeys: fopen /home/ubuntu/.ssh/known_hosts2: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: No matching CA found. Retry with plain key debug1: Host 'uptermd.upterm.dev' is known and matches the ED25519 host key. debug1: Found key in /home/ubuntu/.ssh/known_hosts:9 debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: ssh_packet_read_poll2: resetting read seqnr 3 debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: ssh_fetch_identitylist: agent contains no identities debug1: Will attempt key: /home/ubuntu/.ssh/id_rsa debug1: Will attempt key: /home/ubuntu/.ssh/id_ecdsa debug1: Will attempt key: /home/ubuntu/.ssh/id_ecdsa_sk debug1: Will attempt key: /home/ubuntu/.ssh/id_ed25519 debug1: Will attempt key: /home/ubuntu/.ssh/id_ed25519_sk debug1: Will attempt key: /home/ubuntu/.ssh/id_xmss debug1: Will attempt key: /home/ubuntu/.ssh/id_dsa debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs= debug1: kex_input_ext_info: ping@openssh.com (unrecognised) debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: Trying private key: /home/ubuntu/.ssh/id_rsa debug1: Trying private key: /home/ubuntu/.ssh/id_ecdsa debug1: Trying private key: /home/ubuntu/.ssh/id_ecdsa_sk debug1: Trying private key: /home/ubuntu/.ssh/id_ed25519 debug1: Trying private key: /home/ubuntu/.ssh/id_ed25519_sk debug1: Trying private key: /home/ubuntu/.ssh/id_xmss debug1: Trying private key: /home/ubuntu/.ssh/id_dsa debug1: No more authentication methods to try. fHkbYLuA3Xh4EWQNxusQ@uptermd.upterm.dev: Permission denied (publickey).
curl -fsSL https://pkg.cloudflare.com/cloudflare-main.gpg | sudo tee /usr/share/keyrings/cloudflare-main.gpg >/dev/null
# Add this repo to your apt repositories,把 repo 加入 echo 'deb [signed-by=/usr/share/keyrings/cloudflare-main.gpg] https://pkg.cloudflare.com/cloudflared any main' | sudo tee /etc/apt/sources.list.d/cloudflared.list
buntu@soulin-virtual-machine:~/Desktop$ cloudflared tunnel --url ssh://localhost:22 2026-04-09T04:09:54Z INF Thank you for trying Cloudflare Tunnel. Doing so, without a Cloudflare account, is a quick way to experiment and try it out. However, be aware that these account-less Tunnels have no uptime guarantee, are subject to the Cloudflare Online Services Terms of Use (https://www.cloudflare.com/website-terms/), and Cloudflare reserves the right to investigate your use of Tunnels for violations of such terms. If you intend to use Tunnels in production you should use a pre-created named tunnel by following: https://developers.cloudflare.com/cloudflare-one/connections/connect-apps 2026-04-09T04:09:54Z INF Requesting new quick Tunnel on trycloudflare.com... 2026-04-09T04:09:56Z INF +--------------------------------------------------------------------------------------------+ 2026-04-09T04:09:56Z INF | Your quick Tunnel has been created! Visit it at (it may take some time to be reachable): | 2026-04-09T04:09:56Z INF | https://weighted-valuation-products-revelation.trycloudflare.com | 2026-04-09T04:09:56Z INF +--------------------------------------------------------------------------------------------+ 2026-04-09T04:09:56Z INF Cannot determine default configuration path. No file [config.yml config.yaml] in [~/.cloudflared ~/.cloudflare-warp ~/cloudflare-warp /etc/cloudflared /usr/local/etc/cloudflared] 2026-04-09T04:09:56Z INF Version 2026.3.0 (Checksum 4a9e50e6d6d798e90fcd01933151a90bf7edd99a0a55c28ad18f2e16263a5c30) 2026-04-09T04:09:56Z INF GOOS: linux, GOVersion: go1.24.13, GoArch: amd64 2026-04-09T04:09:56Z INF Settings: map[ha-connections:1 protocol:quic url:ssh://localhost:22] 2026-04-09T04:09:56Z INF cloudflared will not automatically update if installed by a package manager. 2026-04-09T04:09:57Z INF Generated Connector ID: 95f09b3a-f792-4f45-b614-035b9e4630e4 2026-04-09T04:09:57Z INF Initial protocol quic 2026-04-09T04:09:57Z INF ICMP proxy will use 192.168.1.168 as source for IPv4 2026-04-09T04:09:57Z INF ICMP proxy will use fe80::20c:29ff:fe60:834c in zone ens36 as source for IPv6 2026-04-09T04:09:57Z INF ICMP proxy will use 192.168.1.168 as source for IPv4 2026-04-09T04:09:57Z INF ICMP proxy will use fe80::20c:29ff:fe60:834c in zone ens36 as source for IPv6 2026-04-09T04:09:57Z INF Starting metrics server on 127.0.0.1:20241/metrics 2026-04-09T04:09:57Z INF Tunnel connection curve preferences: [X25519MLKEM768 CurveP256] connIndex=0 event=0 ip=198.41.192.167 2026/04/09 12:09:57 failed to sufficiently increase receive buffer size (was: 208 kiB, wanted: 7168 kiB, got: 416 kiB). See https://github.com/quic-go/quic-go/wiki/UDP-Buffer-Sizes for details. 2026-04-09T04:09:58Z INF Registered tunnel connection connIndex=0 connection=123b0ed8-863d-4c98-be73-1b770706b4a2 event=0 ip=198.41.192.167 location=khh01 protocol=quic
curl -fsSL https://pkg.cloudflare.com/cloudflare-public-v2.gpg | sudo tee /usr/share/keyrings/cloudflare-public-v2.gpg >/dev/null
# Add this repo to your apt repositories
echo 'deb [signed-by=/usr/share/keyrings/cloudflare-public-v2.gpg] https://pkg.cloudflare.com/cloudflared any main' | sudo tee /etc/apt/sources.list.d/cloudflared.list
sudo cloudflared service install eyJhIjoiM2YwNWMxNWNlNGUwOTM4MjI2NzU4MjZmMGE3NmJhMDciLCJ0IjoiYjMxN2FhNGQtZmIxNy00OWM4LWE5YjEtNDExNDFjMzAwNmVkIiwicyI6IlpqRmhNall4TTJFdFpXSTVOUzAwT0RkaExXRmtaV1V0TXpBMllUSTVaVFkyTkRNNCJ9
cloudflared tunnel run lenovogb300 2026-04-09T08:03:15Z ERR Cannot determine default origin certificate path. No file cert.pem in [~/.cloudflared ~/.cloudflare-warp ~/cloudflare-warp /etc/cloudflared /usr/local/etc/cloudflared]. You need to specify the origin certificate path by specifying the origincert option in the configuration file, or set TUNNEL_ORIGIN_CERT environment variable originCertPath= error parsing tunnel ID: Error locating origin cert: client didn't specify origincert path
ssh P7NnzZ3X6k4xbGnQH7NKvKRsZ@sfo2.tmate.io
回覆刪除ssh XwSBbag9pSDbcdV52WHNea5Bz@sfo2.tmate.io
回覆刪除2e6smubFq225kuEhQus5qjzeu@lon1.tmate.io
回覆刪除LeWxL5nLcPRbyhjV3VzfnPKZ9@lon1.tmate.io
回覆刪除redhat 1 ssh J5DjHmuYTfQ46q6XXG68Za98q@sfo2.tmate.io
回覆刪除redhat 2ssh mQewrKuCsH6PZKs6aGSyBfaMX@sfo2.tmate.io
回覆刪除redhat 3 eKevAnPNkqKdxtRVXWxXmheBB@sfo2.tmate.io
回覆刪除33 JWxbvJw9AFkKFSGg9stHzuShr@sfo2.tmate.io
回覆刪除22 ssh session: ssh m4D2R2C3M6XS7UfjV8ARaeDMa@sfo2.tmate.io
回覆刪除11 ssh session: ssh 4Uvgj4az4s8A7678956UVVUV5@sfo2.tmate.io
回覆刪除Kp5pmxAzAWChXEU8Q8cfSEmBV@sfo2.tmate.io
回覆刪除https://upterm.dev
回覆刪除# 下載最新版本(以 amd64 為例,檢查 GitHub Releases 確認最新版本)
回覆刪除wget https://github.com/owenthereal/upterm/releases/latest/download/upterm_linux_amd64.tar.gz
# 解壓
tar -xzf upterm_linux_amd64.tar.gz
# 移動到系統路徑(需 sudo)
sudo mv upterm /usr/local/bin/
# 給予執行權限(如果需要)
chmod +x /usr/local/bin/upterm
# 驗證安裝
upterm version
sudo ./upterm host
回覆刪除Error: ssh://uptermd.upterm.dev:22: Permission denied (publickey).
Usage:
upterm host [flags]
Examples:
# Host a terminal session running $SHELL, attaching client's IO to the host's:
upterm host
# Accept client connections automatically without prompts:
upterm host --accept
# Host a terminal session allowing only specified public key(s) to connect:
upterm host --authorized-keys PATH_TO_AUTHORIZED_KEY_FILE
# Host a session executing a custom command:
upterm host -- docker run --rm -ti ubuntu bash
# Host a 'tmux new -t pair-programming' session, forcing clients to join with 'tmux attach -t pair-programming':
upterm host --force-command 'tmux attach -t pair-programming' -- tmux new -t pair-programming
# Use a different Uptermd server, hosting a session via WebSocket:
upterm host --server wss://YOUR_UPTERMD_SERVER -- YOUR_COMMAND
Flags:
--accept Automatically accept client connections without prompts.
--authorized-keys string Specify a authorize_keys file listing authorized public keys for connection.
--codeberg-user strings Authorize specified Codeberg users by allowing their public keys to connect.
-f, --force-command string Enforce a specified command for clients to join, and link the command's input/output to the client's terminal.
--github-user strings Authorize specified GitHub users by allowing their public keys to connect. Configure GitHub CLI environment variables as needed; see https://cli.github.com/manual/gh_help_environment for details.
--gitlab-user strings Authorize specified GitLab users by allowing their public keys to connect.
-h, --help help for host
--hide-client-ip Hide client IP addresses from output (auto-enabled in CI environments).
--known-hosts string Specify a file containing known keys for remote hosts (required). (default "/root/.ssh/known_hosts")
--no-sftp Disable file transfer via SFTP/SCP. By default, clients can transfer files with the same access as the terminal session.
-i, --private-key strings Specify private key files for public key authentication with the upterm server (required).
-r, --read-only Host a read-only session, preventing client interaction. Also restricts SFTP to download-only.
--server string Specify the upterm server address (required). Supported protocols: ssh, ws, wss. (default "ssh://uptermd.upterm.dev:22")
--skip-host-key-check Automatically accept unknown server host keys and add them to known_hosts (similar to SSH's StrictHostKeyChecking=accept-new). This bypasses host key verification for new connections.
--srht-user strings Authorize specified SourceHut users by allowing their public keys to connect.
Global Flags:
--debug enable debug level logging (log file: /root/.upterm/upterm.log).
2026/04/05 21:28:53 ERROR Error executing command error="ssh://uptermd.upterm.dev:22: Permission denied (publickey)."
upterm host -i ~/.ssh/id_ed25519_upterm --accept
回覆刪除ssh ALnJ5czDHuqp2S2Lxg0w@uptermd.upterm.dev
回覆刪除wget https://github.com/owenthereal/upterm/releases/latest/download/upterm_linux_amd64.tar.gz
回覆刪除tar -xzf upterm_linux_amd64.tar.gz
sudo mv upterm /usr/local/bin/
chmod +x /usr/local/bin/upterm
[root@localhost ~]# ssh ALnJ5czDHuqp2S2Lxg0w@uptermd.upterm.dev
回覆刪除The authenticity of host 'uptermd.upterm.dev (37.16.25.99)' can't be established.
ED25519 key fingerprint is SHA256:9ajV8JqMe6jJE/s3TYjb/9xw7T0pfJ2+gADiBIJWDPE.
Are you sure you want to continue connecting (yes/no/[fingerprint])? yes
Warning: Permanently added 'uptermd.upterm.dev,37.16.25.99' (ED25519) to the list of known hosts.
ALnJ5czDHuqp2S2Lxg0w@uptermd.upterm.dev: Permission denied (publickey).
[root@localhost ~]# ssh ALnJ5czDHuqp2S2Lxg0w@uptermd.upterm.dev
ALnJ5czDHuqp2S2Lxg0w@uptermd.upterm.dev: Permission denied (publickey).
[root@localhost ~]# ssh ALnJ5czDHuqp2S2Lxg0w@uptermd.upterm.dev -p 22
ALnJ5czDHuqp2S2Lxg0w@uptermd.upterm.dev: Permission denied (publickey).
[root@localhost ~]#
ubuntu@soulin-virtual-machine:/usr/local/bin$ upterm host -i ~/.ssh/id_ed25519 --accept
回覆刪除Session: ALnJ5czDHuqp2S2Lxg0w
Command: /bin/bash
Host: ssh://uptermd.upterm.dev:22
➤ SSH:
ssh ALnJ5czDHuqp2S2Lxg0w@uptermd.upterm.dev
➤ SFTP:
sftp ALnJ5czDHuqp2S2Lxg0w@uptermd.upterm.dev
➤ SCP:
scp ALnJ5czDHuqp2S2Lxg0w@uptermd.upterm.dev:
scp ALnJ5czDHuqp2S2Lxg0w@uptermd.upterm.dev:
upterm host -i ~/.ssh/id_ed25519 --accept --skip-host-key-check
回覆刪除ssh fHkbYLuA3Xh4EWQNxusQ@uptermd.upterm.dev
回覆刪除
回覆刪除debug1: identity file /home/ubuntu/.ssh/id_ed25519_sk-cert type -1
debug1: identity file /home/ubuntu/.ssh/id_xmss type -1
debug1: identity file /home/ubuntu/.ssh/id_xmss-cert type -1
debug1: identity file /home/ubuntu/.ssh/id_dsa type -1
debug1: identity file /home/ubuntu/.ssh/id_dsa-cert type -1
debug1: Local version string SSH-2.0-OpenSSH_8.9p1 Ubuntu-3ubuntu0.14
debug1: Remote protocol version 2.0, remote software version uptermd-0.22.0
debug1: compat_banner: no match: uptermd-0.22.0
debug1: Authenticating to uptermd.upterm.dev:22 as 'fHkbYLuA3Xh4EWQNxusQ'
debug1: load_hostkeys: fopen /home/ubuntu/.ssh/known_hosts2: No such file or directory
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: algorithm: curve25519-sha256
debug1: kex: host key algorithm: ssh-ed25519-cert-v01@openssh.com
debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none
debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
debug1: SSH2_MSG_KEX_ECDH_REPLY received
debug1: Server host certificate: ssh-ed25519-cert-v01@openssh.com SHA256:9ajV8JqMe6jJE/s3TYjb/9xw7T0pfJ2+gADiBIJWDPE, serial 0 ID "uptermd" CA ssh-ed25519 SHA256:9ajV8JqMe6jJE/s3TYjb/9xw7T0pfJ2+gADiBIJWDPE valid forever
debug1: load_hostkeys: fopen /home/ubuntu/.ssh/known_hosts2: No such file or directory
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
debug1: No matching CA found. Retry with plain key
debug1: Host 'uptermd.upterm.dev' is known and matches the ED25519 host key.
debug1: Found key in /home/ubuntu/.ssh/known_hosts:9
debug1: ssh_packet_send2_wrapped: resetting send seqnr 3
debug1: rekey out after 134217728 blocks
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug1: ssh_packet_read_poll2: resetting read seqnr 3
debug1: SSH2_MSG_NEWKEYS received
debug1: rekey in after 134217728 blocks
debug1: get_agent_identities: bound agent to hostkey
debug1: get_agent_identities: ssh_fetch_identitylist: agent contains no identities
debug1: Will attempt key: /home/ubuntu/.ssh/id_rsa
debug1: Will attempt key: /home/ubuntu/.ssh/id_ecdsa
debug1: Will attempt key: /home/ubuntu/.ssh/id_ecdsa_sk
debug1: Will attempt key: /home/ubuntu/.ssh/id_ed25519
debug1: Will attempt key: /home/ubuntu/.ssh/id_ed25519_sk
debug1: Will attempt key: /home/ubuntu/.ssh/id_xmss
debug1: Will attempt key: /home/ubuntu/.ssh/id_dsa
debug1: SSH2_MSG_EXT_INFO received
debug1: kex_input_ext_info: server-sig-algs=
debug1: kex_input_ext_info: ping@openssh.com (unrecognised)
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug1: Authentications that can continue: publickey
debug1: Next authentication method: publickey
debug1: Trying private key: /home/ubuntu/.ssh/id_rsa
debug1: Trying private key: /home/ubuntu/.ssh/id_ecdsa
debug1: Trying private key: /home/ubuntu/.ssh/id_ecdsa_sk
debug1: Trying private key: /home/ubuntu/.ssh/id_ed25519
debug1: Trying private key: /home/ubuntu/.ssh/id_ed25519_sk
debug1: Trying private key: /home/ubuntu/.ssh/id_xmss
debug1: Trying private key: /home/ubuntu/.ssh/id_dsa
debug1: No more authentication methods to try.
fHkbYLuA3Xh4EWQNxusQ@uptermd.upterm.dev: Permission denied (publickey).
先停止舊的 upterm 行程(避免衝突):Bashpkill -f upterm
回覆刪除生成一個專用的私鑰(如果還沒有):Bashssh-keygen -t ed25519 -f ~/.ssh/id_ed25519_upterm -C "upterm@$$ (whoami)@ $$(hostname)" -N ""
用明確指定私鑰的方式啟動 upterm(最可靠):Bashupterm host \
-i ~/.ssh/id_ed25519_upterm \
--accept
ssh guMqa0ogNXHARRcojXqg@uptermd.upterm.dev
回覆刪除chmod 700 ~/.ssh
回覆刪除chmod 600 ~/.ssh/id_ed25519_upterm*
ssh-keygen -t rsa -b 4096 -f ~/.ssh/id_rsa_upterm -N ""
回覆刪除upterm host -i ~/.ssh/id_rsa_upterm --accept
ssh wbaje69bOPpH9Pk5FVOm@uptermd.upterm.dev
回覆刪除ssh -i ~/.ssh/id_ed25519 ALnJ5czDHuqp2S2Lxg0w@uptermd.upterm.dev
回覆刪除upterm host --github-user username
回覆刪除upterm host --github-user leesoulin
回覆刪除ssh Qeol1BRRrmmzpSuxzUE8@uptermd.upterm.dev
回覆刪除upterm host --force-command 'tmux attach -t pair-programming' -- tmux new -t pair-programming
回覆刪除ssh Uw1AKIVZGMKsbPyVSmTp@uptermd.upterm.dev
回覆刪除wget https://github.com/owenthereal/upterm/releases/download/v0.19.0/upterm_linux_amd64.tar.gz
回覆刪除tar -xzf upterm_linux_amd64.tar.gz
sudo mv upterm /usr/local/bin/
chmod +x /usr/local/bin/upterm
ssh-keygen -t ed25519 -C "upterm"
upterm host -i ~/.ssh/id_ed25519 --accept
ssh-keygen -t ed25519 -f ~/.ssh/id_ed25519 -C "upterm@$$ (whoami)@ $$(hostname)" -N ""
回覆刪除chmod 700 ~/.ssh
chmod 600 ~/.ssh/id_ed25519
upterm host -i ~/.ssh/id_ed25519 --accept
ssh-keygen -t ed25519 -C "your_email@example.com"
回覆刪除eval "$(ssh-agent -s)"
ssh-add ~/.ssh/id_ed25519
chmod 700 ~/.ssh
chmod 600 ~/.ssh/id_ed25519
│ ➤ SSH Command: │ ssh 2P7rEJ1WiPLz3pCji0dn@uptermd.upterm.dev │
回覆刪除ssh K8bSM6v5nBPp5GmsWihr@uptermd.upterm.dev
回覆刪除ssh DBHqcA5Fu2Oqs3xycSXg@uptermd.upterm.dev
回覆刪除ssh XFK278sxw2u7Vfk3leQL@uptermd.upterm.dev
回覆刪除ssh AFz4w6qVH51bUD9LtHtX@uptermd.upterm.dev
回覆刪除upterm host \ -i ~/.ssh/id_ed25519_upterm \ --accept \ --force-command 'tmux attach -t upterm-session' \ -- tmux new-session -d -s upterm-session
回覆刪除ssh 6Id2BINTEzZuAlOgilmv@uptermd.upterm.dev
回覆刪除upterm host \ -i ~/.ssh/id_ed25519 \ --accept \ --force-command 'tmux attach -t upterm-session' \ -- tmux new-session -d -s upterm-session
回覆刪除ssh EuQWfU46Km4zVFcwUQxR@uptermd.upterm.dev
回覆刪除tmux new -s upterm_host
回覆刪除upterm host \
--accept \
--force-command 'tmux attach -t debug || tmux new -s debug' \
-- tmux new -s debug
upterm host \ -i ~/.ssh/id_ed25519 \ --accept \ --force-command 'tmux attach -t upterm-session'
回覆刪除ssh wV2ZnhPWurvkdvAwIopS@uptermd.upterm.dev
回覆刪除ssh tEfuA7kwMGyYmrv00MFo@uptermd.upterm.dev
回覆刪除123
回覆刪除wget https://github.com/owenthereal/upterm/releases/download/v0.19.0/upterm_linux_amd64.tar.gz
回覆刪除tar -xzf upterm_linux_amd64.tar.gz
sudo mv upterm /usr/local/bin/
chmod +x /usr/local/bin/upterm
ssh-keygen -t ed25519 -C "your_email@example.com"
ssh-add ~/.ssh/id_ed25519
chmod 700 ~/.ssh
chmod 600 ~/.ssh/id_ed25519
sudo apt install tmux
tmux
upterm host -i ~/.ssh/id_ed25519 --accept
ssh b2HFvUfaNaQdpNgvBCGMFSWZa@sfo2.tmate.io
回覆刪除ssh rfeQ31PnAp4mzTxfeDqI@uptermd.upterm.dev
root@localhost ~]# ssh rfeQ31PnAp4mzTxfeDqI@uptermd.upterm.dev
回覆刪除ssh: Could not resolve hostname uptermd.upterm.dev: Name or service not known
[root@localhost ~]# ssh rfeQ31PnAp4mzTxfeDqI@37.16.25.99
回覆刪除rfeQ31PnAp4mzTxfeDqI@37.16.25.99: Permission denied (publickey).
[root@localhost ~]#
ssh -i ~/.ssh/id_ed25519 rfeQ31PnAp4mzTxfeDqI@37.16.25.99
回覆刪除ssh-keygen -t ed25519 -C "your_email@example.com"
回覆刪除ssh-add ~/.ssh/id_ed25519
chmod 700 ~/.ssh
chmod 600 ~/.ssh/id_ed25519
ssh-keygen -t ed25519 -C "email@lenovo.com"
回覆刪除ssh-add ~/.ssh/id_ed25519
chmod 700 ~/.ssh
chmod 600 ~/.ssh/id_ed25519
sudo apt install tmux
tmux
upterm host -i ~/.ssh/id_ed25519 --accept
ssh jDwIEW5ToUWT9vkpqdaV@uptermd.upterm.dev
回覆刪除wget https://github.com/owenthereal/upterm/releases/download/v0.19.0/upterm_linux_amd64.tar.gz
回覆刪除tar -xzf upterm_linux_amd64.tar.gz
sudo mv upterm /usr/local/bin/
chmod +x /usr/local/bin/upterm
ssh-keygen -t ed25519 -C "email@lenovo.com"
ssh-add ~/.ssh/id_ed25519
chmod 700 ~/.ssh
chmod 600 ~/.ssh/id_ed25519
sudo apt install tmux
tmux
upterm host -i ~/.ssh/id_ed25519 --accept
eval "$(ssh-agent -s)"
回覆刪除ssh-keygen -t ed25519 -C "email@lenovo.com"
回覆刪除ssh-add ~/.ssh/id_ed25519
eval "$(ssh-agent -s)"
chmod 700 ~/.ssh
chmod 600 ~/.ssh/id_ed25519
ssh "Session ID"@uptermd.upterm.dev
ssh-keygen -t ed25519 -C "email@lenovo.com"
回覆刪除eval "$(ssh-agent -s)"
ssh-add ~/.ssh/id_ed25519
chmod 700 ~/.ssh
chmod 600 ~/.ssh/id_ed25519
ssh "Session ID"@uptermd.upterm.dev
ssh-keygen -t ed25519 -C "email@lenovo.com"
回覆刪除eval "$(ssh-agent -s)"
ssh-add ~/.ssh/id_ed25519
chmod 700 ~/.ssh
chmod 600 ~/.ssh/id_ed25519
sudo apt install tmux
tmux
upterm host -i ~/.ssh/id_ed25519 --accept
https://sshx.io/
回覆刪除https://cloud.tencent.com/developer/article/2356255
回覆刪除➜ Link: https://sshx.io/s/kZh5MAe2UM#nS9zduiPIaYK92
回覆刪除redhat3
刪除curl -sSf https://sshx.io/get | sh
回覆刪除https://sshx.io/s/Yc2XWuhtY0#B7FyVhP3NOOiBy
回覆刪除redhat2
回覆刪除https://sshx.io/s/haghii7sv8#QSW2YX27FZWxZZ
redhat1
回覆刪除https://sshx.io/s/N10A5jVioI#ICgd7jVsw9Dx3E
https://sshx.io/s/zqtjXZH5in#lyzPXUrd5UqY89
回覆刪除https://sshx.io/s/JehTz4At5C#iWqLVXgVenUSFv
回覆刪除11111111111111111111111111111
回覆刪除sshx
https://sshx.io/s/PoMwmLAlJP#7DcyyTdqJnTCNd
2
回覆刪除QqE8D8AUMxTDbtLKwQrX6tm34@sfo2.tmate.io
https://sshx.io/s/OEG9llDKhO#pyjXvy3K2NZyNM
https://sshx.io/s/WmLvZRcMG1#kbEcwReQq7wC3p
回覆刪除cf1
回覆刪除https://sshx.io/s/HtAxEQLGl5#F21tscQ4S91vaL
2
回覆刪除https://sshx.io/s/hu2emFwPZ7#kMN3zOkGwKC4rE
curl -sSf https://sshx.io/get | sh
回覆刪除tmux new -s work
sshx
https://sshx.io/s/i8IcCzewSG#MEQCSZIp0NbS0p
回覆刪除redhat 22222
回覆刪除ssh wcwtQnPrGNUUhpz7mNWPhtY69@lon1.tmate.io
https://sshx.io/s/iYaPNQEyqj#MePjDSxvDtxmS1
redhat 11111
回覆刪除https://sshx.io/s/fVf4dLhlxG#OOR2Hz4rgivGCs
redhat 3333
回覆刪除dL5HYSrw7QGvhrPDyze3K3p2n@sfo2.tmate.io
https://sshx.io/s/WLSusA5b3Y#EuIG7OFChB0nvE
service
回覆刪除https://sshx.io/s/2zBCGPEyTQ#B4XKosTriW5Kyd
1 prprf9GCzbbFQPEssBEPAtt6L@nyc1.tmate.io
回覆刪除2 Vy8P7pkszFwLrafSn6MU4XELZ@nyc1.tmate.io
回覆刪除https://tmate.io/t/equ5nzk6kwt6bvXfMCQuYc6qk
回覆刪除ssh-rsa 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 aturate@aturate-thinkpadp1gen4i.remote.csb
回覆刪除ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDmcUZbHRxctAbZhv45cd6j6TNSl1QfVF0+gWpaC5+id dalongi@dalongi-thinkpadt14sgen2i.rmtusma.csb
回覆刪除mkdir -p ~/.ssh
回覆刪除chmod 700 ~/.ssh
# 3. 把客人提供的公鑰加入 authorized_keys(推薦用 echo >> 追加方式)
echo 'ssh-rsa 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 aturate@aturate-thinkpadp1gen4i.remote.csb' >> ~/.ssh/authorized_keys
# 4. 設定正確權限(非常重要!)
chmod 600 ~/.ssh/authorized_keys
# 5. 確保擁有者正確
chown -R $USER:$USER ~/.ssh
cat ~/.ssh/authorized_keys
ls -l ~/.ssh/
curl -s https://tty-share.com/latest/install.sh | sh
回覆刪除tty-share
https://sshx.io/s/f80KlF1wwK#uq77Z993T0Bu5H
回覆刪除# 1. 下載最新 amd64 版本
回覆刪除sudo curl -L https://github.com/elisescu/tty-share/releases/latest/download/tty-share_linux_amd64 \
-o /usr/local/bin/tty-share
# 2. 給予執行權限
sudo chmod +x /usr/local/bin/tty-share
# 3. 驗證安裝
tty-share --version
tty-share
https://on.tty-share.com/s/GwhYC5liW83KOOSQL9gwIf-zwEsJUSleULCHx
回覆刪除6t2U7ze4ezsm5BOEWV6uco7G6x4wVg/
https://on.tty-share.com/s/5fqaLLCA3eh0ObrtGic8c4oxIUBf9apvRoXCc
回覆刪除qd8mqVa2sRFBDJQBIYRl5wfPqObCL4/
sudo curl -L https://github.com/elisescu/tty-share/releases/latest/download/tty-share_linux-amd64 -o /usr/local/bin/tty-share
回覆刪除sudo chmod +x /usr/local/bin/tty-share
tty-share --public
https://on.tty-share.com/s/xWFwZ1zIasS3UMI3m7Z2kJGrL_jekBgCXdPzaizS2jpMUtV9eFv8_fXdI3TK6AckzZI/
回覆刪除https://on.tty-share.com/s/Q-jm0FtO1Mrnmix9zmgqhfCkCOWWUlqOEPblH3pYUeN73k0tMb8azLScBJbI4nA08IY/
回覆刪除sshx -o ServerAliveInterval=30 -o ServerAliveCountMax=6
回覆刪除sudo vim ~/.ssh/config
回覆刪除Host sshx.io *.sshx.io
ServerAliveInterval 30
ServerAliveCountMax 6
TCPKeepAlive yes
ConnectTimeout 60
curl -sSf https://sshx.io/get | sh
回覆刪除sudo apt install tmux
tmux attach -t work || tmux new -s work
sudo vim /etc/ssh/sshd_config
ClientAliveInterval 30
ClientAliveCountMax 3
systemctl restart sshd
sshx
https://sshx.io/s/XkOWLayrFP#im08AwjQDL6FWi
回覆刪除curl -sSf https://sshx.io/get | sh
回覆刪除sudo apt install tmux
tmux attach -t work || tmux new -s work
sudo vim ~/.ssh/config
Host sshx.io *.sshx.io
ServerAliveInterval 30
ServerAliveCountMax 6
TCPKeepAlive yes
ConnectTimeout 60
sudo systemctl restart ssh
sshx
curl -sSf https://sshx.io/get | sh
回覆刪除sudo apt install tmux
tmux attach -t work || tmux new -s work
sudo vim ~/.ssh/config
Host sshx.io *.sshx.io
ServerAliveInterval 60
ServerAliveCountMax 1440
TCPKeepAlive yes
ConnectTimeout 120
ServerAliveCountMax 0
sudo systemctl restart ssh
sshx
sudo apt update
回覆刪除sudo apt install cloudflared -y
cloudflared tunnel --url ssh://localhost:22
wget https://github.com/cloudflare/cloudflared/releases/latest/download/cloudflared-linux-amd64.deb -O cloudflared.deb
回覆刪除sudo dpkg -i cloudflared.deb
cloudflared tunnel --url http://localhost:80
# Add cloudflare gpg key,先把 cloudflare的gpg key 安裝
回覆刪除sudo mkdir -p --mode=0755 /usr/share/keyrings
curl -fsSL https://pkg.cloudflare.com/cloudflare-main.gpg | sudo tee /usr/share/keyrings/cloudflare-main.gpg >/dev/null
# Add this repo to your apt repositories,把 repo 加入
echo 'deb [signed-by=/usr/share/keyrings/cloudflare-main.gpg] https://pkg.cloudflare.com/cloudflared any main' | sudo tee /etc/apt/sources.list.d/cloudflared.list
# install cloudflared,直接安裝
sudo apt-get update && sudo apt-get install cloudflared
cloudflared tunnel --url ssh://localhost:22
回覆刪除buntu@soulin-virtual-machine:~/Desktop$ cloudflared tunnel --url ssh://localhost:22
回覆刪除2026-04-09T04:09:54Z INF Thank you for trying Cloudflare Tunnel. Doing so, without a Cloudflare account, is a quick way to experiment and try it out. However, be aware that these account-less Tunnels have no uptime guarantee, are subject to the Cloudflare Online Services Terms of Use (https://www.cloudflare.com/website-terms/), and Cloudflare reserves the right to investigate your use of Tunnels for violations of such terms. If you intend to use Tunnels in production you should use a pre-created named tunnel by following: https://developers.cloudflare.com/cloudflare-one/connections/connect-apps
2026-04-09T04:09:54Z INF Requesting new quick Tunnel on trycloudflare.com...
2026-04-09T04:09:56Z INF +--------------------------------------------------------------------------------------------+
2026-04-09T04:09:56Z INF | Your quick Tunnel has been created! Visit it at (it may take some time to be reachable): |
2026-04-09T04:09:56Z INF | https://weighted-valuation-products-revelation.trycloudflare.com |
2026-04-09T04:09:56Z INF +--------------------------------------------------------------------------------------------+
2026-04-09T04:09:56Z INF Cannot determine default configuration path. No file [config.yml config.yaml] in [~/.cloudflared ~/.cloudflare-warp ~/cloudflare-warp /etc/cloudflared /usr/local/etc/cloudflared]
2026-04-09T04:09:56Z INF Version 2026.3.0 (Checksum 4a9e50e6d6d798e90fcd01933151a90bf7edd99a0a55c28ad18f2e16263a5c30)
2026-04-09T04:09:56Z INF GOOS: linux, GOVersion: go1.24.13, GoArch: amd64
2026-04-09T04:09:56Z INF Settings: map[ha-connections:1 protocol:quic url:ssh://localhost:22]
2026-04-09T04:09:56Z INF cloudflared will not automatically update if installed by a package manager.
2026-04-09T04:09:57Z INF Generated Connector ID: 95f09b3a-f792-4f45-b614-035b9e4630e4
2026-04-09T04:09:57Z INF Initial protocol quic
2026-04-09T04:09:57Z INF ICMP proxy will use 192.168.1.168 as source for IPv4
2026-04-09T04:09:57Z INF ICMP proxy will use fe80::20c:29ff:fe60:834c in zone ens36 as source for IPv6
2026-04-09T04:09:57Z INF ICMP proxy will use 192.168.1.168 as source for IPv4
2026-04-09T04:09:57Z INF ICMP proxy will use fe80::20c:29ff:fe60:834c in zone ens36 as source for IPv6
2026-04-09T04:09:57Z INF Starting metrics server on 127.0.0.1:20241/metrics
2026-04-09T04:09:57Z INF Tunnel connection curve preferences: [X25519MLKEM768 CurveP256] connIndex=0 event=0 ip=198.41.192.167
2026/04/09 12:09:57 failed to sufficiently increase receive buffer size (was: 208 kiB, wanted: 7168 kiB, got: 416 kiB). See https://github.com/quic-go/quic-go/wiki/UDP-Buffer-Sizes for details.
2026-04-09T04:09:58Z INF Registered tunnel connection connIndex=0 connection=123b0ed8-863d-4c98-be73-1b770706b4a2 event=0 ip=198.41.192.167 location=khh01 protocol=quic
cloudflared access ssh --hostname weighted-valuation-products-revelation.trycloudflare.com
回覆刪除ssh -o ProxyCommand="cloudflared access ssh --hostname weighted-valuation-products-revelation.trycloudflare.com" ubuntu@localhost
回覆刪除sut15
回覆刪除ssh -o ProxyCommand="cloudflared access ssh --hostname cartridges-never-terry-ridge.trycloudflare.com" ubuntu@localhost
sut 16
ProxyCommand="cloudflared access ssh --hostname legislative-troubleshooting-that-currencies.trycloudflare.com" ubuntu@localhost
sudo ./nvqual --bypass_menu --tests 18 36 --loops 36
回覆刪除T2Mk4a3XFzDNC7tVj7hy8gRLj@sfo2.tmate.io
回覆刪除2
回覆刪除8Ru9xHrv6sK7tGEDKgwNY69Te@sfo2.tmate.io
edzgcH9j6AK9B3QAfvKJpTkQp@sfo2.tmate.io
回覆刪除tmux attach -t work || tmux new -s work
回覆刪除cloudflared tunnel --url ssh://localhost:22
15
回覆刪除feedback-kidney-witch-ties.trycloudflare.com
16
proceeds-enquiries-parts-worldcat.trycloudflare.com
sut15
回覆刪除ssh -o ProxyCommand="cloudflared access ssh --hostname feedback-kidney-witch-ties.trycloudflare.com" nvidia@localhost
sut 16
ssh -o ProxyCommand="cloudflared access ssh --hostname proceeds-enquiries-parts-worldcat.trycloudflare.com" nvidia@localhost
client_loop: send disconnect: Broken pipe
回覆刪除x86
回覆刪除wget https://github.com/cloudflare/cloudflared/releases/latest/download/cloudflared-linux-amd64.deb -O cloudflared.deb
sudo dpkg -i cloudflared.deb
# Add cloudflare gpg key
sudo mkdir -p --mode=0755 /usr/share/keyrings
curl -fsSL https://pkg.cloudflare.com/cloudflare-public-v2.gpg | sudo tee /usr/share/keyrings/cloudflare-public-v2.gpg >/dev/null
# Add this repo to your apt repositories
echo 'deb [signed-by=/usr/share/keyrings/cloudflare-public-v2.gpg] https://pkg.cloudflare.com/cloudflared any main' | sudo tee /etc/apt/sources.list.d/cloudflared.list
# install cloudflared
sudo apt-get update && sudo apt-get install cloudflared
sudo cloudflared service install eyJhIjoiM2YwNWMxNWNlNGUwOTM4MjI2NzU4MjZmMGE3NmJhMDciLCJ0IjoiYjMxN2FhNGQtZmIxNy00OWM4LWE5YjEtNDExNDFjMzAwNmVkIiwicyI6IlpqRmhNall4TTJFdFpXSTVOUzAwT0RkaExXRmtaV1V0TXpBMllUSTVaVFkyTkRNNCJ9
cloudflared tunnel run lenovogb300
回覆刪除2026-04-09T08:03:15Z ERR Cannot determine default origin certificate path. No file cert.pem in [~/.cloudflared ~/.cloudflare-warp ~/cloudflare-warp /etc/cloudflared /usr/local/etc/cloudflared]. You need to specify the origin certificate path by specifying the origincert option in the configuration file, or set TUNNEL_ORIGIN_CERT environment variable originCertPath=
error parsing tunnel ID: Error locating origin cert: client didn't specify origincert path
ssh -o ProxyCommand="cloudflared access ssh --hostname b317aa4d-fb17-49c8-a9b1-41141c3006ed.cfargotunnel.com" ubuntu@localhost
回覆刪除ssh -o ProxyCommand="cloudflared access ssh --hostname d8d7b4de-1792-4d45-8ae6-88fb7c492d05.cfargotunnel.com" ubuntu@localhost
回覆刪除2164c8d2-f71a-4d0d-8297-5069dd09096a
回覆刪除ssh -o ProxyCommand="cloudflared access ssh --hostname 2164c8d2-f71a-4d0d-8297-5069dd09096a.cfargotunnel.com" ubuntu@localhost
回覆刪除dial tcp [fd10:aec2:5dae::]:443: connect: network is unreachable
kex_exchange_identification: Connection closed by remote host
Connection closed by UNKNOWN port 65535
sudo vim ~/.cloudflared/config.yml
回覆刪除tunnel: b317aa4d-fb17-49c8-a9b1-41141c3006ed
ingress:
- hostname: ubuntu.abc123test.com
service: http://localhost
- service: http_status:404
curl -s https://install.zerotier.com | sudo bash
回覆刪除sudo systemctl start zerotier-one.service sudo systemctl enable zerotier-one.service
sudo zerotier-cli join 08752e18b19fdf03
sudo add-apt-repository --remove ppa:tmate.io/archive
回覆刪除2
回覆刪除tCRV8GaBTAv7c5m8Kp246ey4v@lon1.tmate.io
11 cUujcdSqg5BzdhGpREkvG4QqP@lon1.tmate.io
回覆刪除22
回覆刪除ABJw5xCX6BMGWmC85qABTQgdH@lon1.tmate.io
sudo ./nvqual --bypass_menu --tests 18 36 --loops 36
回覆刪除1
回覆刪除TBzbGpMd9DzEdUunJpKAuMyWv@sfo2.tmate.io
3
回覆刪除KJPJTMc68EHF7z9pSEwZdrwpR@sfo2.tmate.io
2PhuvSkRwqNm4wJHp9qQB7Qjv@lon1.tmate.io
回覆刪除rhsm.redhat.com:443/subscription:
回覆刪除uv run hf download moonshotai/Kimi-K2.5 --local-dir /mnt/data/Kimi-K2.5
回覆刪除