summaryrefslogtreecommitdiffstats
path: root/man/ttyd.1
blob: c4e76ee4f9579cbb30210b5e08f9ec3e42b4e594 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
.TH ttyd 1 "September 2016" ttyd "User Manual"

.SH NAME
.PP
ttyd \- Share your terminal over the web


.SH SYNOPSIS
.PP
\fBttyd\fP [options] <command> [<arguments...>]


.SH Description
.PP
ttyd is a command\-line tool for sharing terminal over the web that runs in *nix and windows systems, with the following features:

.RS
.IP \(bu 2
Built on top of Libwebsockets with libuv for speed
.IP \(bu 2
Fully\-featured terminal based on Xterm.js with CJK (Chinese, Japanese, Korean) and IME support
.IP \(bu 2
Graphical ZMODEM integration with lrzsz support
.IP \(bu 2
SSL support based on OpenSSL
.IP \(bu 2
Run any custom command with options
.IP \(bu 2
Basic authentication support and many other custom options
.IP \(bu 2
Cross platform: macOS, Linux, FreeBSD/OpenBSD, OpenWrt/LEDE, Windows

.RE


.SH OPTIONS
.PP
\-p, \-\-port <port>
      Port to listen (default: 7681, use \fB\fC0\fR for random port)

.PP
\-i, \-\-interface <interface>
      Network interface to bind (eg: eth0), or UNIX domain socket path (eg: /var/run/ttyd.sock)

.PP
\-c, \-\-credential USER[:PASSWORD]
      Credential for Basic Authentication (format: username:password)

.PP
\-H, \-\-auth\-header <name>
      HTTP Header name for auth proxy, this will configure ttyd to let a HTTP reverse proxy handle authentication

.PP
\-u, \-\-uid <uid>
      User id to run with

.PP
\-g, \-\-gid <gid>
      Group id to run with

.PP
\-s, \-\-signal <signal string>
      Signal to send to the command when exit it (default: 1, SIGHUP)

.PP
\-w, \-\-cwd <path>
      Working directory to be set for the child program

.PP
\-a, \-\-url\-arg
      Allow client to send command line arguments in URL (eg: 
\[la]http://localhost:7681?arg=foo&arg=bar\[ra])

.PP
\-R, \-\-readonly
      Do not allow clients to write to the TTY

.PP
\-t, \-\-client\-option <key=value>
      Send option to client (format: key=value), repeat to add more options

.PP
\-T, \-\-terminal\-type
      Terminal type to report, default: xterm\-256color

.PP
\-O, \-\-check\-origin
      Do not allow websocket connection from different origin

.PP
\-m, \-\-max\-clients
      Maximum clients to support (default: 0, no limit)

.PP
\-o, \-\-once
      Accept only one client and exit on disconnection

.PP
\-B, \-\-browser
      Open terminal with the default system browser

.PP
\-I, \-\-index <index file>
      Custom index.html path

.PP
\-b, \-\-base\-path
      Expected base path for requests coming from a reverse proxy (eg: /mounted/here, max length: 128)

.PP
\-P, \-\-ping\-interval
      Websocket ping interval(sec) (default: 300)

.PP
\-6, \-\-ipv6
      Enable IPv6 support

.PP
\-S, \-\-ssl
      Enable SSL

.PP
\-C, \-\-ssl\-cert <cert path>
      SSL certificate file path

.PP
\-K, \-\-ssl\-key <key path>
      SSL key file path

.PP
\-A, \-\-ssl\-ca <ca path>
      SSL CA file path for client certificate verification

.PP
\-d, \-\-debug <level>
      Set log level (default: 7)

.PP
\-v, \-\-version
      Print the version and exit

.PP
\-h, \-\-help
      Print this text and exit


.SH Examples
.PP
ttyd starts web server at port 7681 by default, you can use the \-p option to change it, the command will be started with arguments as options. For example, run:

.PP
.RS

.nf
ttyd \-p 8080 bash \-x

.fi
.RE

.PP
Then open 
\[la]http://localhost:8080\[ra] with a browser, you will get a bash shell with debug mode enabled. More examples:

.RS
.IP \(bu 2
If you want to login with your system accounts on the web browser, run \fB\fCttyd login\fR\&.
.IP \(bu 2
You can even run a none shell command like vim, try: \fB\fCttyd vim\fR, the web browser will show you a vim editor.
.IP \(bu 2
Sharing single process with multiple clients: \fB\fCttyd tmux new \-A \-s ttyd vim\fR, run \fB\fCtmux new \-A \-s ttyd\fR to connect to the tmux session from terminal.

.RE


.SH SSL how\-to
.PP
Generate SSL CA and self signed server/client certificates:

.PP
.RS

.nf
# CA certificate (FQDN must be different from server/client)
openssl genrsa \-out ca.key 2048
openssl req \-new \-x509 \-days 365 \-key ca.key \-subj "/C=CN/ST=GD/L=SZ/O=Acme, Inc./CN=Acme Root CA" \-out ca.crt

# server certificate (for multiple domains, change subjectAltName to: DNS:example.com,DNS:www.example.com)
openssl req \-newkey rsa:2048 \-nodes \-keyout server.key \-subj "/C=CN/ST=GD/L=SZ/O=Acme, Inc./CN=localhost" \-out server.csr
openssl x509 \-sha256 \-req \-extfile <(printf "subjectAltName=DNS:localhost") \-days 365 \-in server.csr \-CA ca.crt \-CAkey ca.key \-CAcreateserial \-out server.crt

# client certificate (the p12/pem format may be useful for some clients)
openssl req \-newkey rsa:2048 \-nodes \-keyout client.key \-subj "/C=CN/ST=GD/L=SZ/O=Acme, Inc./CN=client" \-out client.csr
openssl x509 \-req \-days 365 \-in client.csr \-CA ca.crt \-CAkey ca.key \-CAcreateserial \-out client.crt
openssl pkcs12 \-export \-clcerts \-in client.crt \-inkey client.key \-out client.p12
openssl pkcs12 \-in client.p12 \-out client.pem \-clcerts

.fi
.RE

.PP
Then start ttyd:

.PP
.RS

.nf
ttyd \-\-ssl \-\-ssl\-cert server.crt \-\-ssl\-key server.key \-\-ssl\-ca ca.crt bash

.fi
.RE

.PP
You may want to test the client certificate verification with \fIcurl\fP(1):

.PP
.RS

.nf
curl \-\-insecure \-\-cert client.p12[:password] \-v https://localhost:7681

.fi
.RE

.PP
If you don't want to enable client certificate verification, remove the \fB\fC\-\-ssl\-ca\fR option.


.SH Docker and ttyd
.PP
Docker containers are jailed environments which are more secure, this is useful for protecting the host system, you may use ttyd with docker like this:

.RS
.IP \(bu 2
Sharing single docker container with multiple clients: docker run \-it \-\-rm \-p 7681:7681 tsl0922/ttyd.
.IP \(bu 2
Creating new docker container for each client: ttyd docker run \-it \-\-rm ubuntu.

.RE


.SH Nginx reverse proxy
.PP
Sample config to proxy ttyd under the \fB\fC/ttyd\fR path:

.PP
.RS

.nf
location \~ ^/ttyd(.*)$ {
    proxy\_http\_version 1.1;
    proxy\_set\_header Host $host;
    proxy\_set\_header X\-Forwarded\-Proto $scheme;
    proxy\_set\_header X\-Forwarded\-For $proxy\_add\_x\_forwarded\_for;
    proxy\_set\_header Upgrade $http\_upgrade;
    proxy\_set\_header Connection "upgrade";
    proxy\_pass http://127.0.0.1:7681/$1;
}

.fi
.RE


.SH AUTHOR
.PP
Shuanglei Tao <tsl0922@gmail.com> Visit 
\[la]https://github.com/tsl0922/ttyd\[ra] to get more information and report bugs.