Provides access to MLB Stats API tools for retrieving and analyzing baseball statistics
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@Remote MCP SSH Gatewayconnect to the demo server and list available tools"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
MCP Server SSH Client
A Model Context Protocol Server (Remote SSH client) that connects to remote MCP servers over SSH. This client enables accessing and utilizing MCP tools hosted on remote servers, providing a secure channel for MCP communication.
Features
Connect to any MCP server over SSH
Proxy all MCP protocol commands through a secure SSH channel
Support for key-based authentication
Support for MCP capabilities including tools, prompts, and resources
Related MCP server: SSH MCP Server
Installation
In a uv managed python project, add to dependencies by:
uv add m2m-mcp-server-ssh-clientAlternatively, for projects using pip for dependencies:
pip install m2m-mcp-server-ssh-clientTo install directly from the source:
git clone https://github.com/Machine-To-Machine/m2m-mcp-server-ssh-client.git
cd m2m-mcp-server-ssh-client
pip install -e .To run the server inside your project:
uv run m2m-mcp-server-ssh-clientCommon Use Cases
1. Quick Start with Demo Server
We maintain a public demo server with various MCP tools already configured and ready to use. (This server will be available until we release our open, decentralized registry.)
This demo server has multiple MCP servers including HackerNews, MLB Stats API, and Formula 1 API tools for you to experiment with.
Claude
To connect Claude to this server, simply add the following to Claude Desktop settings.
"mcpServers": {
"remote-mcp-tools": {
"command": "uvx",
"args": [
"m2m-mcp-server-ssh-client",
"--host", "mcp-beta.machinetomachine.ai",
"--port", "8022",
"--use-key-server"
]
}
}Command-line
# Connect to the M2M public demo server with automatic key exchange
uv run m2m-mcp-server-ssh-client --host mcp-beta.machinetomachine.ai --use-key-server2. Local Development Testing
For setting up your own SSH server, refer to m2m-mcp-server-ssh-server.
For local testing with your own MCP tools:
# Connect to a local MCP SSH server
uv run m2m-mcp-server-ssh-clientThe above command will try to connect to a local SSH server listening on port 8022.
When testing locally, you can simplify key exchange by using the key server:
# Use the key server for automatic key management (if server has --run-key-server enabled)
uv run m2m-mcp-server-ssh-client --use-key-serverThe above command will try to use the key server running on port 8000.
3. Remote Server Connection
Connect to your own hosted MCP server:
# Using existing SSH keys
uv run m2m-mcp-server-ssh-client --host your-server.example.com --client-key ~/.ssh/your_key --known-hosts ~/.ssh/known_hostsYou can simplify key exchange by running the key server on your remote server and configuring it in client.
Usage with AI Platforms
Claude Desktop Integration
Add this to Claude Desktop settings:
"mcpServers": {
"remote-mcp-tools": {
"command": "uvx",
"args": [
"m2m-mcp-server-ssh-client",
"--host", "mcp-beta.machinetomachine.ai",
"--port", "8022",
"--use-key-server"
]
}
}MCP Inspector
For debugging or exploring available tools:
npx @modelcontextprotocol/inspector -- uvx m2m-mcp-server-ssh-client --host mcp-beta.machinetomachine.ai --port 8022 --use-key-serverUsage
Command Line Options
--host: Remote SSH server host (default: "localhost")--port: Remote SSH server port (default: 8022)--username: SSH username (default: "mcp")--client-key: Client private key file (default: "~/.ssh/m2m_mcp_server_ssh_client")--known-hosts: Path to known hosts file (default: "~/.ssh/known_hosts")--passphrase: Passphrase for the private key (default: None)--disable-host-key-checking: Skip server signature verification (default: False)--log-level: Set logging level (default: INFO)
Detailed Examples
Basic Connection to a Remote Server
Connect to a remote MCP server (SSH server) running on port 8022:
uvx m2m-mcp-server-ssh-client --host mcp.example.comUsing a Custom SSH Key
Specify a particular SSH key for authentication:
uvx m2m-mcp-server-ssh-client --host mcp.example.com --client-key ~/.ssh/mcp_custom_keyIf your key is passphrase-protected:
uvx m2m-mcp-server-ssh-client --host mcp.example.com --client-key ~/.ssh/mcp_custom_key --passphrase "your-passphrase"Debug Mode for Troubleshooting
Enable detailed logging for troubleshooting connection issues:
uvx m2m-mcp-server-ssh-client --host mcp.example.com --log-level DEBUGKey Server Integration
The MCP SSH Client can use a key server for dynamic key exchange and verification:
uvx m2m-mcp-server-ssh-client --host mcp.example.com --use-key-serverWhen using a key server:
The client fetches the server's public key from
http://host:key-server-port/server_pub_keyThe client registers its public key with the server at
http://host:key-server-port/registerA temporary
known_hostsfile is created for the SSH connection
This feature is mutually exclusive with --known-hosts and --disable-host-key-checking.
Disabling Host Key Checking
⚠️ Security Warning: Using
--disable-host-key-checkingmakes your connection vulnerable to man-in-the-middle attacks. Only use this option in trusted networks or for development/testing purposes.
uvx m2m-mcp-server-ssh-client --host localhost --disable-host-key-checkingConfigure for Claude Desktop
Add to your Claude settings:
"mcpServers": {
"remote-servers": {
"command": "uvx",
"args": [
"m2m-mcp-server-ssh-client",
"--host", "example.com",
"--port", "8022",
"--username", "mcp"
]
}
}For a more secure configuration with a specific key:
"mcpServers": {
"remote-servers": {
"command": "uvx",
"args": [
"m2m-mcp-server-ssh-client",
"--host", "mcp-server.example.com",
"--port", "8022",
"--username", "claude-mcp",
"--client-key", "~/.ssh/claude_mcp_key",
"--known-hosts", "~/.ssh/mcp_remote_server"
]
}
}How It Works
The MCP Server SSH Client establishes an SSH connection to a remote server running the MCP Server SSH Server for MCP tools, i.e., m2m-mcp-server-ssh-server. It then:
Creates a local proxy server that mirrors the capabilities of the remote MCP server
Forwards all MCP requests to the remote server through the SSH connection
Returns responses from the remote server to the local client
This allows you to use tools running on remote machines as if they were installed locally.
Authentication Flow
%%{init: {'theme':'default', 'themeVariables': { 'primaryColor': '#5D8AA8', 'primaryTextColor': '#fff', 'primaryBorderColor': '#1F456E', 'lineColor': '#5D8AA8', 'secondaryColor': '#006400', 'tertiaryColor': '#fff' }}}%%
sequenceDiagram
participant Host as MCP Host<br>(Claude/Cursor)
participant Client as MCP SSH Client
participant KeySrv as Key Server<br>(HTTP API)
participant SSHSrv as MCP SSH Server
participant MCP as MCP Servers
Note over Client,SSHSrv: Initial Key Exchange & Authentication
Client->>Client: Generate SSH key pair<br>if does not exist
Client->>KeySrv: GET /server_pub_key
KeySrv->>Client: Return server's public key
Client->>Client: Store server key in<br>temporary known_hosts
Client->>KeySrv: POST /register<br>{client_pub_key: "ssh-ed25519 AAAA..."}
KeySrv->>SSHSrv: Store client public key<br>in authorized keys
KeySrv->>Client: {status: "success"}
Note over Client,SSHSrv: Secure SSH Connection
Client->>SSHSrv: SSH handshake with<br>client key authentication
SSHSrv->>SSHSrv: Verify client key<br>against authorized keys
SSHSrv->>Client: Authentication successful
Note over Client,SSHSrv: MCP Communication
Host->>Client: JSONRPC request
Client->>SSHSrv: Forward request<br>over SSH tunnel
SSHSrv->>MCP: Route request to<br>appropriate MCP server
MCP->>SSHSrv: Process and return results
SSHSrv->>Client: Send response over SSH
Client->>Host: Return JSONRPC response
Note over Client,SSHSrv: Session Management
alt Session Termination
Host->>Client: Close connection
Client->>SSHSrv: Terminate SSH session
SSHSrv->>SSHSrv: Clean up resources
endSecurity Considerations
Always use host key verification in production environments
Use passphrase-protected SSH keys for stronger security
Consider using dedicated SSH keys for MCP connections
Set appropriate permissions (600) for your SSH key files
Use a dedicated, limited-privilege user on the remote server
Troubleshooting Common Issues
Connection Refused
Error running MCP SSH client: [Errno 111] Connection refusedSolution: Verify the host and port are correct and that the SSH service is running.
Authentication Failure
Error running MCP SSH client: Authentication failedSolution: Check the key file path. Ensure the remote server has your public key installed.
Host Key Verification Failed
Error running MCP SSH client: Host key verification failedSolution: Either add the host key to your known_hosts file or use --disable-host-key-checking (for testing only).
Dependencies
anyio (>=4.5.0)
asyncssh (>=2.20.0)
mcp (>=1.1.3)
pydantic (>=2.0.0)
Development
Setup Development Environment
git clone https://github.com/Machine-To-Machine/m2m-mcp-server-ssh-client.git
cd m2m-mcp-server-ssh-client
uv venv
source .venv/bin/activate # On Windows: .venv\Scripts\activate
uv pip install -e ".[dev]"Code Quality
# Run linting
uv run ruff check .
# Run formatting check
uv run ruff format --check .
# Run security checks
uv run bandit -r src/Debugging
You can use the MCP inspector to debug the client:
npx @modelcontextprotocol/inspector uvx m2m-mcp-server-ssh-client --host example.comFor advanced debugging, use the following workflow:
Start the client with
--log-level DEBUGCheck the SSH connection parameters and handshake process
If using custom keys, verify correct paths and permissions
Use
ssh -vdirectly to test basic connectivity first
Contributing
We welcome contributions to help expand and improve m2m-mcp-server-ssh-client. Whether you want to add new features, enhance existing functionality, or improve documentation, your input is valuable.
Pull requests are welcome! Feel free to contribute new ideas, bug fixes, or enhancements.
Contribution Guidelines
Fork the repository
Create a feature branch:
git checkout -b feature-nameCommit your changes:
git commit -am 'Add some feature'Push to the branch:
git push origin feature-nameSubmit a pull request
License
MIT License - See LICENSE file for details.
Authors
Machine To Machine