Panelica provides secure remote access with SSH management, web-based terminal, SSH key management, and chroot jail isolation.
Browser-based SSH terminal using web-based terminal:
- No client software needed — Access the terminal directly from your browser
- Full terminal emulation — Colors, cursor movement, tab completion, command history
- Copy/paste support — Standard clipboard operations
- Resizable — Terminal adjusts to browser window size
- real-time connection — Low-latency, real-time terminal interaction
- Session management — Track active terminal sessions
Control SSH access per user:
- Enable/Disable SSH — Toggle SSH access per user account
- Two access modes:
- SFTP-only (sshjailed) — File transfer only, no shell access
- Full shell (sshfull) — Bash access within a chroot jail
- Password authentication — Standard password-based login
- Key authentication — SSH key-based login (recommended)
- Upload public keys — Add authorized_keys entries from the panel
- Multiple keys — Support for multiple SSH keys per user
- Key removal — Remove individual keys
- Key fingerprint — View key fingerprints for identification
SSH users are isolated in a secure chroot environment:
- Isolated filesystem — Users can only see their own home directory
- Minimal binaries — Only essential commands available (bash, ls, cat, cp, mv, etc.)
- Bind mounts — System libraries mounted read-only inside the jail
- No cross-user access — Users cannot see other users processes or files
- PHP access — PHP CLI available inside the jail via allowed-cmds wrapper
SSH sessions are automatically placed under the users cgroup slice:
- CPU and RAM limits apply to all SSH commands
- Process count limits prevent fork bombs
- I/O throttling for disk-intensive operations
- SSH cgroup watcher assigns sessions automatically on login
- Fail2ban — Automatic IP blocking after failed login attempts
- Rate limiting — Connection rate limits per IP
- Audit logging — All SSH sessions logged with timestamp, IP, and duration
- Session tracking — View and kill active SSH sessions from the panel
- SSH access is controlled by plan permissions
- ROOT can enable/disable SSH for any user
- Users can manage their own SSH keys
- Shell access type (SFTP-only vs full shell) is configurable per user
If you encounter any issues with this feature, please open a report in the Bug Reports forum.
---
For issues with this feature, please report in the Bug Reports forum.
Last edited: