{"id":"linuxserver-openssh-server","name":"openssh-server","af_score":22.8,"security_score":71.8,"reliability_score":45.0,"what_it_does":"OpenSSH Server (sshd) provides secure remote access to machines using the SSH protocol (e.g., interactive shell, command execution, and SFTP). It handles authentication, encryption, key exchange, and session management for inbound SSH connections.","best_when":"When you can properly harden sshd (key-based auth, restricted users, secure ciphers/KEX, MFA where applicable) and manage network exposure and logging.","avoid_when":"Avoid running sshd directly on the public internet without appropriate firewalling/rate limiting, strong authentication, and vigilant monitoring; avoid if you require application-layer API semantics rather than SSH access.","last_evaluated":"2026-03-30T13:42:21.320019+00:00","has_mcp":false,"has_api":false,"auth_methods":["Public key authentication (authorized_keys)","Password authentication (if enabled)","Keyboard-interactive (if configured)","Host-based authentication (if configured)","GSSAPI/Kerberos (if configured)","Certificate-based SSH (if configured)"],"has_free_tier":false,"known_gotchas":["No standardized API contracts (agents would need to use SSH protocol tooling directly).","Behavior depends heavily on sshd_config, enabled auth methods, and client capabilities.","Hardening changes (disable password, enforce key algorithms) can break agent access if not aligned."],"error_quality":0.0}