- Explore MCP Servers
- m2m-mcp-server-ssh-server
M2m Mcp Server Ssh Server
What is M2m Mcp Server Ssh Server
m2m-mcp-server-ssh-server is a secure SSH server designed for remote access to MCP (Model Context Protocol) tools. It enables clients to connect to various MCP tool providers through a unified and secure interface.
Use cases
Use cases include remote management of MCP tools, integration of multiple MCP servers into a single interface, and secure access to resources and logs for monitoring and troubleshooting.
How to use
To use m2m-mcp-server-ssh-server, set up the server with the necessary configurations, generate SSH keys for authentication, and connect using an SSH client. Optionally, utilize the Key Management API for managing SSH keys.
Key features
Key features include secure remote access over SSH, key-based authentication, a key management API, server aggregation for multiple MCP servers, compatibility with MCP capabilities, and dynamic configuration through JSON.
Where to use
m2m-mcp-server-ssh-server can be utilized in environments where secure remote access to various MCP tools is required, such as software development, cloud services, and remote system management.
Clients Supporting MCP
The following are the main client software that supports the Model Context Protocol. Click the link to visit the official website for more information.
Overview
What is M2m Mcp Server Ssh Server
m2m-mcp-server-ssh-server is a secure SSH server designed for remote access to MCP (Model Context Protocol) tools. It enables clients to connect to various MCP tool providers through a unified and secure interface.
Use cases
Use cases include remote management of MCP tools, integration of multiple MCP servers into a single interface, and secure access to resources and logs for monitoring and troubleshooting.
How to use
To use m2m-mcp-server-ssh-server, set up the server with the necessary configurations, generate SSH keys for authentication, and connect using an SSH client. Optionally, utilize the Key Management API for managing SSH keys.
Key features
Key features include secure remote access over SSH, key-based authentication, a key management API, server aggregation for multiple MCP servers, compatibility with MCP capabilities, and dynamic configuration through JSON.
Where to use
m2m-mcp-server-ssh-server can be utilized in environments where secure remote access to various MCP tools is required, such as software development, cloud services, and remote system management.
Clients Supporting MCP
The following are the main client software that supports the Model Context Protocol. Click the link to visit the official website for more information.
Content
MCP Server SSH Server
A secure SSH server for accessing and interacting with MCP (Model Context Protocol) tools installed remotely. This server allows clients to connect to multiple MCP tool providers through a unified secure interface.
Features
- Secure Remote Access: Access MCP tools remotely over SSH
- Key-Based Authentication: Support for key-based authentication
- Key Management API: Optional HTTP API for managing SSH keys
- Server Aggregation: Proxy and merge multiple MCP servers into a unified interface
- MCP Support: Compatible with MCP capabilities including:
- Prompts
- Resources
- Tools
- Logging
- Dynamic Configuration: Configure available MCP servers through a simple JSON configuration
Authentication Flow
%%{init: {'theme':'default', 'themeVariables': { 'primaryColor': '#5D8AA8', 'primaryTextColor': '#fff', 'primaryBorderColor': '#1F456E', 'lineColor': '#5D8AA8', 'secondaryColor': '#006400', 'tertiaryColor': '#fff' }}}%% sequenceDiagram participant Host as MCP Host<br>(Claude/Cursor) participant Client as MCP SSH Client participant KeySrv as Key Server<br>(HTTP API) participant SSHSrv as MCP SSH Server participant MCP as MCP Servers Note over Client,SSHSrv: Initial Key Exchange & Authentication Client->>Client: Generate SSH key pair<br>if does not exist Client->>KeySrv: GET /server_pub_key KeySrv->>Client: Return server's public key Client->>Client: Store server key in<br>temporary known_hosts Client->>KeySrv: POST /register<br>{client_pub_key: "ssh-ed25519 AAAA..."} KeySrv->>SSHSrv: Store client public key<br>in authorized keys KeySrv->>Client: {status: "success"} Note over Client,SSHSrv: Secure SSH Connection Client->>SSHSrv: SSH handshake with<br>client key authentication SSHSrv->>SSHSrv: Verify client key<br>against authorized keys SSHSrv->>Client: Authentication successful Note over Client,SSHSrv: MCP Communication Host->>Client: JSONRPC request Client->>SSHSrv: Forward request<br>over SSH tunnel SSHSrv->>MCP: Route request to<br>appropriate MCP server MCP->>SSHSrv: Process and return results SSHSrv->>Client: Send response over SSH Client->>Host: Return JSONRPC response Note over Client,SSHSrv: Session Management alt Session Termination Host->>Client: Close connection Client->>SSHSrv: Terminate SSH session SSHSrv->>SSHSrv: Clean up resources end
Installation
In a uv managed python project, add to dependencies by:
uv add m2m-mcp-server-ssh-server
# For key server functionality, include the optional dependency:
uv add m2m-mcp-server-ssh-server[key-server]
Alternatively, for projects using pip for dependencies:
pip install m2m-mcp-server-ssh-server
# Or with key server functionality
pip install m2m-mcp-server-ssh-server[key-server]
To install directly from the source:
git clone https://github.com/Machine-To-Machine/m2m-mcp-server-ssh-server.git
cd m2m-mcp-server-ssh-server
pip install -e .
To run the server inside your project:
uv run m2m-mcp-server-ssh-server
Common Use Cases
1. Local Development Environment
Quickly set up a local server with your preferred MCP tools:
- Create a configuration file (
servers_config.json):
{
"mcpServers": {
"HackerNews": {
"command": "uvx",
"args": [
"mcp-hn"
]
},
"major-league-baseball": {
"command": "uvx",
"args": [
"mcp_mlb_statsapi"
]
}
}
}
- Start the server with the key management API for easier client connection:
uv run m2m-mcp-server-ssh-server --run-key-server
- Connect using the client:
uv run m2m-mcp-server-ssh-client --host localhost --port 8022 --use-key-server
2. Remote Hosting (Quick Setup)
To make your MCP tools available remotely:
- Install on your server:
uv add m2m-mcp-server-ssh-server[key-server]
-
Create your configuration file with desired MCP tools
-
Start the server binding to all interfaces:
uv run m2m-mcp-server-ssh-server --host 0.0.0.0 --run-key-server --key-server-host 0.0.0.0
- Connect from client machines:
uv run m2m-mcp-server-ssh-client --host your-server.example.com --port 8022 --use-key-server
For more detailed deployment instructions, see Cloud Deployment Guide.
Usage
Command Line Options
--host: SSH server host address to bind to (default: 127.0.0.1)--port: SSH server port to listen on (default: 8022)--authorized-clients: Path to authorized keys file (default: ~/.ssh/authorized_keys)--server-key: Path to server private key file (default: ~/.ssh/m2m_mcp_server_ssh_server)--passphrase: Passphrase for the private key (optional)--servers-config: Path to server configurations JSON (default: servers_config.json)--log-level: Set logging level (default: INFO)--run-key-server: Run the HTTP key management server--key-server-port: Port for the HTTP key management server (default: 8000)--key-server-host: Host for the HTTP key management server (default: 127.0.0.1)--version: Show version information and exit
Security Note: When binding to all interfaces (0.0.0.0), your server will be accessible from any machine that can reach your system. Make sure to use strong authentication and consider additional security measures like firewalls.
Key Management Server
You can optionally run a key management HTTP server alongside the SSH server to simplify client key registration:
uv run m2m-mcp-server-ssh-server --run-key-server
This starts:
- SSH server on port 8022
- Key management HTTP server on port 8000 (localhost only by default)
Key Management API
The key management server provides the following endpoints:
-
POST /register- Register a client’s public key- Request body:
{"client_pub_key": "ssh-rsa AAAA..."} - Response:
{"status": "success"}or error message
- Request body:
-
GET /server_pub_key- Get the server’s public key- Response:
{"server_pub_key": "ssh-ed25519 AAAA..."}
- Response:
-
GET /health- Check server health status- Response:
{"status": "healthy"}
- Response:
Example client key registration:
curl -X POST -H "Content-Type: application/json" \
-d '{"client_pub_key": "ssh-rsa AAAA..."}' \
http://localhost:8000/register
Security Considerations
- Default binding is to localhost (127.0.0.1) for improved security
- Keys are automatically generated with secure permissions if not provided
- Default key location is
~/.ssh/m2m_mcp_server_ssh_server - Private keys use 0o600 permissions (readable only by owner)
- Public keys use 0o644 permissions (readable by all, writable by owner)
- Key server uses rate limiting for API endpoints
- Input validation protects against malicious inputs
Dependencies
- anyio (>=4.5.0)
- asyncssh (>=2.20.0)
- mcp (>=1.1.3)
- pydantic (>=2.0.0)
- aiohttp (>=3.11.16) - Optional, for key server functionality
Development
Setup Development Environment
git clone https://github.com/Machine-To-Machine/m2m-mcp-server-ssh-server.git
cd m2m-mcp-server-ssh-server
uv venv
source .venv/bin/activate # On Windows: .venv\Scripts\activate
uv pip install -e ".[dev]"
Code Quality
# Run linting
uv run ruff check .
# Run formatting check
uv run ruff format --check .
# Run security checks
uv run bandit -r src/
Contributing
We welcome contributions to help expand and improve m2m-mcp-server-ssh-server. Whether you want to add new features, enhance existing functionality, or improve documentation, your input is valuable.
Pull requests are welcome! Feel free to contribute new ideas, bug fixes, or enhancements.
Contribution Guidelines
- Fork the repository
- Create a feature branch:
git checkout -b feature-name - Commit your changes:
git commit -am 'Add some feature' - Push to the branch:
git push origin feature-name - Submit a pull request
License
MIT License - See LICENSE file for details.
Authors
- Machine To Machine
Dev Tools Supporting MCP
The following are the main code editors that support the Model Context Protocol. Click the link to visit the official website for more information.










