{"id":"muchlearning-sshuttle-server","name":"sshuttle-server","homepage":"https://hub.docker.com/r/muchlearning/sshuttle-server","repo_url":"https://hub.docker.com/r/muchlearning/sshuttle-server","category":"infrastructure","subcategories":[],"tags":["ssh","tunneling","proxy","networking","self-hosted","relay-server","infrastructure"],"what_it_does":"sshuttle-server is a server-side component intended to support “sshuttle” style SSH tunneling/forwarding via a relay server (i.e., enabling SSH connectivity through a controlled server). It appears to be a self-hosted tool rather than a cloud SaaS/API service.","use_cases":["Expose or tunnel internal services over SSH via a central server","Provide jump-host style connectivity for teams or automation","Bridge connectivity across restricted networks using SSH forwarding"],"not_for":["Public Internet-facing systems without proper hardening/authorization","Use as a generic proxy where you cannot control allowed destinations and keys","Environments requiring a fully managed, audited service with vendor guarantees"],"best_when":"You can self-host the server and you control SSH keys, network policy, and logging, and you want SSH-style connectivity brokering.","avoid_when":"You cannot enforce strong access control and auditing, or you need a simple HTTP API instead of SSH-based tunneling.","alternatives":["ssh -J / bastion host patterns","Self-hosted jump hosts / SSH bastion + port-forwarding","Tailscale/Headscale + SSH","Teleport (SSH access proxy)","OpenSSH with ProxyJump and restricted accounts"],"af_score":22.8,"security_score":46.5,"reliability_score":30.0,"package_type":"mcp_server","discovery_source":["docker_mcp"],"priority":"low","status":"evaluated","version_evaluated":null,"last_evaluated":"2026-04-04T19:47:07.704650+00:00","interface":{"has_rest_api":false,"has_graphql":false,"has_grpc":false,"has_mcp_server":false,"mcp_server_url":null,"has_sdk":false,"sdk_languages":[],"openapi_spec_url":null,"webhooks":false},"auth":{"methods":["SSH authentication (implied by SSH-based server)"],"oauth":false,"scopes":false,"notes":"No explicit auth mechanisms, API tokens, or scopes were provided in the prompt. Expect SSH key/user-based access; exact requirements depend on the project configuration."},"pricing":{"model":null,"free_tier_exists":false,"free_tier_limits":null,"paid_tiers":[],"requires_credit_card":false,"estimated_workload_costs":null,"notes":"Self-hosted; pricing depends on infrastructure costs only."},"requirements":{"requires_signup":false,"requires_credit_card":false,"domain_verification":false,"data_residency":[],"compliance":[],"min_contract":null},"agent_readiness":{"af_score":22.8,"security_score":46.5,"reliability_score":30.0,"mcp_server_quality":0.0,"documentation_accuracy":30.0,"error_message_quality":0.0,"error_message_notes":null,"auth_complexity":60.0,"rate_limit_clarity":0.0,"tls_enforcement":50.0,"auth_strength":55.0,"scope_granularity":35.0,"dependency_hygiene":45.0,"secret_handling":45.0,"security_notes":"Security posture depends heavily on SSH hardening and server configuration (authorized keys, allowed forwarding destinations, network firewalling, and logging). No concrete evidence about TLS usage, dependency CVEs, or secret handling was provided, so scores are conservative defaults.","uptime_documented":0.0,"version_stability":45.0,"breaking_changes_history":40.0,"error_recovery":35.0,"idempotency_support":"false","idempotency_notes":null,"pagination_style":"none","retry_guidance_documented":false,"known_agent_gotchas":["SSH tunneling/forwarding is stateful; agent retries may create duplicate forwards or leave stale connections if not managed.","Without a programmatic API (REST/MCP), agents generally must operate via CLI/SSH, which is less deterministic.","If access control is misconfigured, agents can inadvertently connect to unintended internal endpoints."]}}