Mosh Shell - A SSH Based Client for Connecting Remote Unix/Linux Systems
Jul 16, 2025 am 09:08 AMMosh, short for Mobile Shell, is a terminal application designed to connect to a server remotely over the internet. It can function similarly to SSH but comes with enhanced capabilities compared to the traditional Secure Shell.
Developed initially by Keith Winstein for Unix-like systems, Mosh is distributed under the GNU GPL v3 license and offers more flexibility in certain scenarios than SSH.
Key Features of Mosh
- Enables roaming support during remote sessions.
- Compatible with major UNIX-based platforms including Linux, FreeBSD, Solaris, Mac OS X, and Android.
- Works well under unstable or fluctuating network conditions.
- Offers smart local echo functionality.
- Supports line editing of typed commands locally.
- Optimized for performance on Wi-Fi, mobile networks, and long-distance connections.
- Maintains connection even when IP addresses change, thanks to its use of UDP instead of TCP (used by SSH). UDP allows continued connectivity where TCP might drop the session upon reconnection or IP change.
- Keeps sessions active across extended idle periods.
- Eliminates network delay by showing keystrokes and deletions instantly.
- Uses familiar SSH-style login syntax.
- Equipped with mechanisms to manage packet loss effectively.
Installing Mosh on Linux Systems
For Debian, Ubuntu, and Linux Mint users, installing Mosh is straightforward using the apt package manager:
<code># apt-get update # apt-get install mosh</code>
On RHEL, CentOS, and Fedora distributions, you need to enable the EPEL repository before installing via yum:
<code># yum update # yum install mosh</code>
For Fedora 22 , use the dnf package manager:
<code># dnf install mosh</code>
Other Linux distributions can use their respective package managers as follows:
<code># pacman -S mosh [On Arch/Manjaro Linux] $ sudo zypper in mosh [On OpenSuse] # emerge net-misc/mosh [On Gentoo]</code>
Using Mosh: Basic Commands
1. To establish a connection to a remote Linux system using Mosh:
<code>$ mosh [email?protected]</code>
Note: In this example, a connection error occurred because the required port was blocked on the remote CentOS 7 system. A temporary workaround used was:
<code># systemctl stop firewalld [on Remote Server]</code>
However, it's better practice to adjust firewall settings to allow specific ports rather than disabling the firewall entirely.
2. If your SSH service runs on a non-standard port such as 70, specify it using the ‘-p’ option along with the ssh command:
<code>$ mosh [email?protected] --ssh="ssh -p 70"</code>
3. To check the current version of Mosh installed:
<code>$ mosh --version</code>
4. To terminate a Mosh session, simply type:
<code>$ exit</code>
5. View all available Mosh options using:
<code>$ mosh --help</code>
Drawbacks of Using Mosh
- Requires allowing UDP traffic, which isn’t needed for SSH.
- Utilizes dynamic UDP ports between 60000-61000, with one port assigned per connection.
- Default port usage may pose security issues in enterprise environments.
- IPv6 connections are supported, but seamless roaming on IPv6 is not.
- Does not support scrollback functionality.
- No built-in support for X11 forwarding.
- Lacks support for ssh-agent forwarding.
Final Thoughts
Despite some limitations—particularly around security and configuration requirements—Mosh is a powerful tool that enhances remote access experiences, especially for those frequently switching networks or dealing with intermittent connectivity. It's readily available in most Linux repositories, making it easy to test. For any Linux user who regularly uses SSH, trying out Mosh could be beneficial—it’s definitely worth exploring.
The above is the detailed content of Mosh Shell - A SSH Based Client for Connecting Remote Unix/Linux Systems. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

LXD is described as the next-generation container and virtual machine manager that offers an immersive for Linux systems running inside containers or as virtual machines. It provides images for an inordinate number of Linux distributions with support

Clear Linux OS is the ideal operating system for people – ahem system admins – who want to have a minimal, secure, and reliable Linux distribution. It is optimized for the Intel architecture, which means that running Clear Linux OS on AMD sys

The key steps for creating a self-signed SSL certificate are as follows: 1. Generate the private key, use the command opensslgenrsa-outselfsigned.key2048 to generate a 2048-bit RSA private key file, optional parameter -aes256 to achieve password protection; 2. Create a certificate request (CSR), run opensslreq-new-keyselfsigned.key-outselfsigned.csr and fill in the relevant information, especially the "CommonName" field; 3. Generate the certificate by self-signed, and use opensslx509-req-days365-inselfsigned.csr-signk

Firefox browser is the default browser for most modern Linux distributions such as Ubuntu, Mint, and Fedora. Initially, its performance might be impressive, however, with the passage of time, you might notice that your browser is not as fast and resp

Decompress the .zip file on Windows, you can right-click to select "Extract All", while the .tar.gz file needs to use tools such as 7-Zip or WinRAR; on macOS and Linux, the .zip file can be double-clicked or unzip commanded, and the .tar.gz file can be decompressed by tar command or double-clicked directly. The specific steps are: 1. Windows processing.zip file: right-click → "Extract All"; 2. Windows processing.tar.gz file: Install third-party tools → right-click to decompress; 3. macOS/Linux processing.zip file: double-click or run unzipfilename.zip; 4. macOS/Linux processing.tar

When encountering DNS problems, first check the /etc/resolv.conf file to see if the correct nameserver is configured; secondly, you can manually add public DNS such as 8.8.8.8 for testing; then use nslookup and dig commands to verify whether DNS resolution is normal. If these tools are not installed, you can first install the dnsutils or bind-utils package; then check the systemd-resolved service status and configuration file /etc/systemd/resolved.conf, and set DNS and FallbackDNS as needed and restart the service; finally check the network interface status and firewall rules, confirm that port 53 is not

As a system administrator, you may find yourself (today or in the future) working in an environment where Windows and Linux coexist. It is no secret that some big companies prefer (or have to) run some of their production services in Windows boxes an

If you find that the server is running slowly or the memory usage is too high, you should check the cause before operating. First, you need to check the system resource usage, use top, htop, free-h, iostat, ss-antp and other commands to check CPU, memory, disk I/O and network connections; secondly, analyze specific process problems, and track the behavior of high-occupancy processes through tools such as ps, jstack, strace; then check logs and monitoring data, view OOM records, exception requests, slow queries and other clues; finally, targeted processing is carried out based on common reasons such as memory leaks, connection pool exhaustion, cache failure storms, and timing task conflicts, optimize code logic, set up a timeout retry mechanism, add current limit fuses, and regularly pressure measurement and evaluation resources.
