MCP Server SSH Server
Machine-To-Machine
README
MCP Server SSH Server
A secure SSH server for accessing and interacting with MCP (Model Context Protocol) tools installed remotely. This server allows clients to connect to multiple MCP tool providers through a unified secure interface.
Features
- Secure Remote Access: Access MCP tools remotely over SSH
- Key-Based Authentication: Support for key-based authentication
- Key Management API: Optional HTTP API for managing SSH keys
- Server Aggregation: Proxy and merge multiple MCP servers into a unified interface
- MCP Support: Compatible with MCP capabilities including:
- Prompts
- Resources
- Tools
- Logging
- Dynamic Configuration: Configure available MCP servers through a simple JSON configuration
Authentication Flow
%%{init: {'theme':'default', 'themeVariables': { 'primaryColor': '#5D8AA8', 'primaryTextColor': '#fff', 'primaryBorderColor': '#1F456E', 'lineColor': '#5D8AA8', 'secondaryColor': '#006400', 'tertiaryColor': '#fff' }}}%%
sequenceDiagram
participant Host as MCP Host<br>(Claude/Cursor)
participant Client as MCP SSH Client
participant KeySrv as Key Server<br>(HTTP API)
participant SSHSrv as MCP SSH Server
participant MCP as MCP Servers
Note over Client,SSHSrv: Initial Key Exchange & Authentication
Client->>Client: Generate SSH key pair<br>if does not exist
Client->>KeySrv: GET /server_pub_key
KeySrv->>Client: Return server's public key
Client->>Client: Store server key in<br>temporary known_hosts
Client->>KeySrv: POST /register<br>{client_pub_key: "ssh-ed25519 AAAA..."}
KeySrv->>SSHSrv: Store client public key<br>in authorized keys
KeySrv->>Client: {status: "success"}
Note over Client,SSHSrv: Secure SSH Connection
Client->>SSHSrv: SSH handshake with<br>client key authentication
SSHSrv->>SSHSrv: Verify client key<br>against authorized keys
SSHSrv->>Client: Authentication successful
Note over Client,SSHSrv: MCP Communication
Host->>Client: JSONRPC request
Client->>SSHSrv: Forward request<br>over SSH tunnel
SSHSrv->>MCP: Route request to<br>appropriate MCP server
MCP->>SSHSrv: Process and return results
SSHSrv->>Client: Send response over SSH
Client->>Host: Return JSONRPC response
Note over Client,SSHSrv: Session Management
alt Session Termination
Host->>Client: Close connection
Client->>SSHSrv: Terminate SSH session
SSHSrv->>SSHSrv: Clean up resources
end
Installation
In a uv
managed python project, add to dependencies by:
uv add m2m-mcp-server-ssh-server
# For key server functionality, include the optional dependency:
uv add m2m-mcp-server-ssh-server[key-server]
Alternatively, for projects using pip
for dependencies:
pip install m2m-mcp-server-ssh-server
# Or with key server functionality
pip install m2m-mcp-server-ssh-server[key-server]
To install directly from the source:
git clone https://github.com/Machine-To-Machine/m2m-mcp-server-ssh-server.git
cd m2m-mcp-server-ssh-server
pip install -e .
To run the server inside your project:
uv run m2m-mcp-server-ssh-server
Common Use Cases
1. Local Development Environment
Quickly set up a local server with your preferred MCP tools:
- Create a configuration file (
servers_config.json
):
{
"mcpServers": {
"HackerNews": {
"command": "uvx",
"args": ["mcp-hn"]
},
"major-league-baseball": {
"command": "uvx",
"args": ["mcp_mlb_statsapi"]
}
}
}
- Start the server with the key management API for easier client connection:
uv run m2m-mcp-server-ssh-server --run-key-server
- Connect using the client:
uv run m2m-mcp-server-ssh-client --host localhost --port 8022 --use-key-server
2. Remote Hosting (Quick Setup)
To make your MCP tools available remotely:
- Install on your server:
uv add m2m-mcp-server-ssh-server[key-server]
-
Create your configuration file with desired MCP tools
-
Start the server binding to all interfaces:
uv run m2m-mcp-server-ssh-server --host 0.0.0.0 --run-key-server --key-server-host 0.0.0.0
- Connect from client machines:
uv run m2m-mcp-server-ssh-client --host your-server.example.com --port 8022 --use-key-server
For more detailed deployment instructions, see Cloud Deployment Guide.
Usage
Command Line Options
--host
: SSH server host address to bind to (default: 127.0.0.1)--port
: SSH server port to listen on (default: 8022)--authorized-clients
: Path to authorized keys file (default: ~/.ssh/authorized_keys)--server-key
: Path to server private key file (default: ~/.ssh/m2m_mcp_server_ssh_server)--passphrase
: Passphrase for the private key (optional)--servers-config
: Path to server configurations JSON (default: servers_config.json)--log-level
: Set logging level (default: INFO)--run-key-server
: Run the HTTP key management server--key-server-port
: Port for the HTTP key management server (default: 8000)--key-server-host
: Host for the HTTP key management server (default: 127.0.0.1)--version
: Show version information and exit
Security Note: When binding to all interfaces (0.0.0.0), your server will be accessible from any machine that can reach your system. Make sure to use strong authentication and consider additional security measures like firewalls.
Key Management Server
You can optionally run a key management HTTP server alongside the SSH server to simplify client key registration:
uv run m2m-mcp-server-ssh-server --run-key-server
This starts:
- SSH server on port 8022
- Key management HTTP server on port 8000 (localhost only by default)
Key Management API
The key management server provides the following endpoints:
-
POST /register
- Register a client's public key- Request body:
{"client_pub_key": "ssh-rsa AAAA..."}
- Response:
{"status": "success"}
or error message
- Request body:
-
GET /server_pub_key
- Get the server's public key- Response:
{"server_pub_key": "ssh-ed25519 AAAA..."}
- Response:
-
GET /health
- Check server health status- Response:
{"status": "healthy"}
- Response:
Example client key registration:
curl -X POST -H "Content-Type: application/json" \
-d '{"client_pub_key": "ssh-rsa AAAA..."}' \
http://localhost:8000/register
Security Considerations
- Default binding is to localhost (127.0.0.1) for improved security
- Keys are automatically generated with secure permissions if not provided
- Default key location is
~/.ssh/m2m_mcp_server_ssh_server
- Private keys use 0o600 permissions (readable only by owner)
- Public keys use 0o644 permissions (readable by all, writable by owner)
- Key server uses rate limiting for API endpoints
- Input validation protects against malicious inputs
Dependencies
- anyio (>=4.5.0)
- asyncssh (>=2.20.0)
- mcp (>=1.1.3)
- pydantic (>=2.0.0)
- aiohttp (>=3.11.16) - Optional, for key server functionality
Development
Setup Development Environment
git clone https://github.com/Machine-To-Machine/m2m-mcp-server-ssh-server.git
cd m2m-mcp-server-ssh-server
uv venv
source .venv/bin/activate # On Windows: .venv\Scripts\activate
uv pip install -e ".[dev]"
Code Quality
# Run linting
uv run ruff check .
# Run formatting check
uv run ruff format --check .
# Run security checks
uv run bandit -r src/
Contributing
We welcome contributions to help expand and improve m2m-mcp-server-ssh-server
. Whether you want to add new features, enhance existing functionality, or improve documentation, your input is valuable.
Pull requests are welcome! Feel free to contribute new ideas, bug fixes, or enhancements.
Contribution Guidelines
- Fork the repository
- Create a feature branch:
git checkout -b feature-name
- Commit your changes:
git commit -am 'Add some feature'
- Push to the branch:
git push origin feature-name
- Submit a pull request
License
MIT License - See LICENSE file for details.
Authors
- Machine To Machine
Recommended Servers
playwright-mcp
A Model Context Protocol server that enables LLMs to interact with web pages through structured accessibility snapshots without requiring vision models or screenshots.
Magic Component Platform (MCP)
An AI-powered tool that generates modern UI components from natural language descriptions, integrating with popular IDEs to streamline UI development workflow.
MCP Package Docs Server
Facilitates LLMs to efficiently access and fetch structured documentation for packages in Go, Python, and NPM, enhancing software development with multi-language support and performance optimization.
Claude Code MCP
An implementation of Claude Code as a Model Context Protocol server that enables using Claude's software engineering capabilities (code generation, editing, reviewing, and file operations) through the standardized MCP interface.
@kazuph/mcp-taskmanager
Model Context Protocol server for Task Management. This allows Claude Desktop (or any MCP client) to manage and execute tasks in a queue-based system.
Linear MCP Server
Enables interaction with Linear's API for managing issues, teams, and projects programmatically through the Model Context Protocol.
mermaid-mcp-server
A Model Context Protocol (MCP) server that converts Mermaid diagrams to PNG images.
Jira-Context-MCP
MCP server to provide Jira Tickets information to AI coding agents like Cursor

Linear MCP Server
A Model Context Protocol server that integrates with Linear's issue tracking system, allowing LLMs to create, update, search, and comment on Linear issues through natural language interactions.

Sequential Thinking MCP Server
This server facilitates structured problem-solving by breaking down complex issues into sequential steps, supporting revisions, and enabling multiple solution paths through full MCP integration.