Why not just limit the access through SSH public key?
It sounds like that would accomplish what you're trying
to do.

-Anne

[EMAIL PROTECTED] grabbed a keyboard and typed...
> Hi!
> 
> I want to make ssh-access possible only from a restricted
> number of hosts - those that are named in /etc/hosts.allow.
> Users who want to login have a DynDNS host-name that shall
> be listed in hosts.allow to make it possible for users with
> a dial-up internet connection, too.
> 
> BUT:
> The problem is that I can only login to the ssh-machine
> when I enter the IP-address to the hosts.allow file.
> Specifying the hosts DNS-name does not work!
> 
> AND:
> I'd prefer to specify the rules for loggin into the machine
> in the sshd_config-file, not in hosts.allow/deny.
> But the AllowHosts/DenyHosts-options that could be used in 
> /etc/sshd_config earlier seem to be not any
> longer available at the SSH-version I'm using. 
> It's: openssh-3.4p1-80 on a SuSE 8.1
> 
> Has anybody ideas in this 2 problems?
> 
> thx in advance,
> Klaus
> 
> 
> 
> -- 
> Klaus Siegesleitner - [EMAIL PROTECTED] 
> SysAdmin at CAME (Center of Applied Molecular Engineering) 
> University of Salzburg, Jakob-Haringerstrasse 5, A-5020 Salzburg
> 
> 
> -- 
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

-- 
              .-"".__."``".   Anne Carasik, System Administrator
 .-.--. _...' (/)   (/)   ``'   gator at cacr dot caltech dot edu 
(O/ O) \-'      ` -="""=.    ',  Center for Advanced Computing Research    
~`~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Attachment: pgpp9eUBMFMTt.pgp
Description: PGP signature

Reply via email to