Why not just limit the access through SSH public key? It sounds like that would accomplish what you're trying to do. -Anne klaus@came.sbg.ac.at grabbed a keyboard and typed... > Hi! > > I want to make ssh-access possible only from a restricted > number of hosts - those that are named in /etc/hosts.allow. > Users who want to login have a DynDNS host-name that shall > be listed in hosts.allow to make it possible for users with > a dial-up internet connection, too. > > BUT: > The problem is that I can only login to the ssh-machine > when I enter the IP-address to the hosts.allow file. > Specifying the hosts DNS-name does not work! > > AND: > I'd prefer to specify the rules for loggin into the machine > in the sshd_config-file, not in hosts.allow/deny. > But the AllowHosts/DenyHosts-options that could be used in > /etc/sshd_config earlier seem to be not any > longer available at the SSH-version I'm using. > It's: openssh-3.4p1-80 on a SuSE 8.1 > > Has anybody ideas in this 2 problems? > > thx in advance, > Klaus > > > > -- > Klaus Siegesleitner - klaus@came.sbg.ac.at > SysAdmin at CAME (Center of Applied Molecular Engineering) > University of Salzburg, Jakob-Haringerstrasse 5, A-5020 Salzburg > > > -- > To UNSUBSCRIBE, email to debian-security-request@lists.debian.org > with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org -- .-"".__."``". Anne Carasik, System Administrator .-.--. _...' (/) (/) ``' gator at cacr dot caltech dot edu (O/ O) \-' ` -="""=. ', Center for Advanced Computing Research ~`~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Attachment:
pgpQ1qtbDgJG4.pgp
Description: PGP signature