Connectivity
Jump hosts, network vendor devices, legacy SSH, and per-host algorithm control.
Screenshots will be added here
Jump host & bastion support
Reach hosts behind firewalls by routing through a saved jump host. The entire chain — jump authentication, fingerprint verification, and tunnelled connection — is handled automatically.
- • Assign any saved host as the jump host for another — no extra configuration needed
- • The jump hop authenticates independently with its own credentials and key
- • Separate fingerprint verification for the bastion and the target host
- • Cycle detection prevents misconfigured jump chains from looping
Network vendor device support
ProSSH Mac recognises the CLI prompts of eight network operating systems and adapts its shell integration accordingly. No Unix shell — no problem.
- • Per-vendor regex prompt patterns detect when commands complete on network gear
- • Custom prompt regex for unsupported or proprietary devices
- • Shell integration is silently skipped — no broken escape sequences on network CLIs
SSH prompt injection & shell integration
When connecting to Unix hosts (zsh, bash, fish, or POSIX sh), ProSSH Mac silently injects a compact OSC 133 shell integration script into the remote session. The injection is invisible: it is history-suppressed and followed by a clear.
- • Instruments the remote shell with prompt boundary markers (A/B/C/D) and preexec hooks
- • Captures per-command exit codes on remote hosts, not just local ones
- • Powers the AI copilot’s semantic command history search on remote SSH sessions
- • Supports zsh, bash, fish, and POSIX sh — per-host shell type selection
Legacy SSH & algorithm control
Some servers and network devices require older cryptographic algorithms. ProSSH Mac handles this automatically and gives you full control when needed.
- • Tries modern algorithms first; auto-detects if legacy algorithms are required
- • Surfaces a clear warning when a session is using legacy cryptography
- • Per-host legacy mode toggle to skip probing on known older devices
- • Per-host overrides for KEX, ciphers, host key algorithms, and MACs
- • Pinned host key algorithms per host for strict environment control
- • SSH agent forwarding toggle per host