2024/05/05 SSHFS-Mountlet v0.4.0 You may use SSHFS-Mountlet to mount SSHFS connections. It provides a menu bar icon listing predefined SSHFS connections for quick access. SSHFS-Mountlet relies on SSH public key authentication for security and ease of use. An established SSHFS connection to a server makes the remote file system available to your local host; usage and appearance are likewise local folders. You may manage your remote files and folders from your server easily in Finder. Requirements: macOS 12 or higher (do not use out of date versions of macOS, please), sshfs, MacFUSE and a ssh key authentication based SFTP connection ready to use. Notes: SSHFS is not actively developed at the moment. The current maintainer makes regular releases only when high-impact issues arise. MacFUSE changed its license and is closed source now. In consequence Homebrew and maybe others do not ship neither MacFUSE nor SSHFS any longer. It seems to me there is no recent version of SSHFS available for macOS. Please consider the impact of this situation for you. Password authentication works as well with SSHFS-Mountlet if your ssh-askpass supports it, but is discouraged due to being less secure. Installing Prerequisites: You need to have a working installation of sshfs, which itself requires FUSE. Read the notes in the previous paragraph. The lastest version of MacFUSE is available from: https://osxfuse.github.io/ Only download and install MacFUSE from there. Download and install macSSHFS from: https://github.com/tormodwill/macSSHFS/releases Please consult the README under https://github.com/tormodwill/macSSHFS for more information. If you find an up to date package for SSHFS, please report back. Optionally install ssh-askpass-mac from: https://github.com/lukas-zronek/ssh-askpass-mac/releases/latest This gives you a GUI to enter your passphrase. See under https://github.com/lukas-zronek/ssh-askpass-mac for a description and installation. Installation of SSHFS-Mountlet: Drag SSHFS-Mountlet to your Application Folder, right-click and chose Open, allow execution when asked. Setup: Configure a connection entry in SSHFS-Mountlet through the menu bar icon. If there are DNSSEC secured SSHFP records published in the DNS of your server to connect to and your local resolver validates DNSSEC, you're ready to go. Otherwise uncheck "DNS verification" in the "Connection Entry" dialog and decide how you would like to handle unknown host keys using the "Connections" dialog: never: Do not scan target nor alter known_hosts file. Scan (DNSSEC): Scan host, if DNS name is secured with DNSSEC (alters known_hosts). Scan (insecure): Scan host (alters known_hosts). Scanning either way is insecure. If you leave unknown finger print handling to "never", arrange to store the needed finger prints in your ~/.ssh/known_hosts by other means (not through SSHFS-Mountlet). Be aware that your sshfs binary may not be compiled to handle DNSSEC in which case do as if DNSSEC is not in place. DNS verification (SSHFP records secured by DNSSEC) is the most secure way of knowing to who SSHFS-Mountlet really connects! Download: https://ente.limmat.ch/ftp/pub/software/applications/SSHFS-Mountlet/ Source: Included in the distribution dmg file. Bugs: Oh, no ... If you encounter a bug, you can report it to me. No promise what so ever. Feedback: Please use the web form under https://ente.limmat.ch/feedback/. Enjoy, Adrian. (c) 2020-2024 by Adrian Zaugg under GNU GPL v3 (https://www.gnu.org/licenses/gpl-3.0.html#license-text) All Artwork (c) under Creative Commons BY-NC-SA (https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode) Credits: created with Platypus 5.4.1 by Sveinbjorn Thordarson (https://sveinbjorn.org/platypus/) dialogs using Pashua 0.11 by Carsten Blüm (https://www.bluem.net/en/projects/pashua/)