Why not just limit the access through SSH public key? It sounds like that would accomplish what you're trying to do.
-Anne
[EMAIL PROTECTED] grabbed a keyboard and typed...
> Hi!
>
> I want to make ssh-access possible only from a restricted
> number of hosts - those that are named in /etc/hosts.allow.
> Users who want to login have a DynDNS host-name that shall
> be listed in hosts.allow to make it possible for users with
> a dial-up internet connection, too.
>
> BUT:
> The problem is that I can only login to the ssh-machine
> when I enter the IP-address to the hosts.allow file.
> Specifying the hosts DNS-name does not work!
>
> AND:
> I'd prefer to specify the rules for loggin into the machine
> in the sshd_config-file, not in hosts.allow/deny.
> But the AllowHosts/DenyHosts-options that could be used in
> /etc/sshd_config earlier seem to be not any
> longer available at the SSH-version I'm using.
> It's: openssh-3.4p1-80 on a SuSE 8.1
>
> Has anybody ideas in this 2 problems?
>
> thx in advance,
> Klaus
>
>
>
> --
> Klaus Siegesleitner - [EMAIL PROTECTED]
> SysAdmin at CAME (Center of Applied Molecular Engineering)
> University of Salzburg, Jakob-Haringerstrasse 5, A-5020 Salzburg
>
>
> --
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
--
.-"".__."``". Anne Carasik, System Administrator
.-.--. _...' (/) (/) ``' gator at cacr dot caltech dot edu
(O/ O) \-' ` -="""=. ', Center for Advanced Computing Research
~`~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
pgpp9eUBMFMTt.pgp
Description: PGP signature

