<?xml version="1.0" encoding="utf-8"?><!DOCTYPE article  PUBLIC '-//OASIS//DTD DocBook XML V4.4//EN'  'http://www.docbook.org/xml/4.4/docbookx.dtd'><article><articleinfo><title>Mosh</title><revhistory><revision><revnumber>3</revnumber><date>2022-12-22 12:19:02</date><authorinitials>independence</authorinitials><revremark>new ssh addr</revremark></revision><revision><revnumber>2</revnumber><date>2013-05-13 18:34:53</date><authorinitials>localhost</authorinitials></revision><revision><revnumber>1</revnumber><date>2012-08-19 17:17:37</date><authorinitials>independence</authorinitials><revremark>New page, mosh - mobile shell</revremark></revision></revhistory></articleinfo><section><title>Mosh - Mobile Shell</title><para>Mosh is a replacement for SSH that supports roaming from different IPs and high-latency links while always staying connected and keeping responsive. </para><para>It can be used if you're on a high-latency mobile communication network, or if you want to keep your SSH session alive while you roam your laptop between different wireless networks or resume the laptop from sleep. </para><para>Read more about mosh at <ulink url="http://mosh.mit.edu/"/> </para><section><title>Security concerns</title><para>From mosh FAQ: </para><itemizedlist><listitem override="none"><para>Mosh is actively used and has been read over by security-minded crypto nerds who think its design is reasonable, but any novel datagram protocol is going to have to prove itself, and SSP is no exception. We use the reference implementations of AES-128 and OCB, and we welcome your eyes on the code. We think the radical simplicity of the design is an advantage, but of course others have thought that and have been wrong. We don't doubt it will (properly!) take time for the security community to get comfortable with mosh. </para></listitem></itemizedlist></section><section><title>Mosh on Blinkenshell</title><para>If you understand the security conserns and still want to try mosh, here's how: </para><para>Mosh doesn't need superuser privileges, but it does need an open UDP port. This means that you will have to get a <ulink url="http://ipv6.blinkenshell.org/wiki/Mosh/wiki/Info/Supporter#">Supporter account</ulink> to be able to use mosh. </para><para>If you have a Supporter account, ask <ulink url="http://ipv6.blinkenshell.org/wiki/Mosh/wiki/independence#">independence</ulink> to open up a port for you in the firewall, and when you get your assigned port then use this command to connect: </para><screen><![CDATA[mosh --ssh="ssh -p 2222" -p <assigned-portnumber> <username>@supporter.blinkenshell.org]]></screen></section></section></article>