Why not just limit the access through SSH public key?
It sounds like that would accomplish what you're trying
to do.
-Anne
klaus@came.sbg.ac.at grabbed a keyboard and typed...
> Hi!
>
> I want to make ssh-access possible only from a restricted
> number of hosts - those that are named in /etc/hosts.allow.
> Users who want to login have a DynDNS host-name that shall
> be listed in hosts.allow to make it possible for users with
> a dial-up internet connection, too.
>
> BUT:
> The problem is that I can only login to the ssh-machine
> when I enter the IP-address to the hosts.allow file.
> Specifying the hosts DNS-name does not work!
>
> AND:
> I'd prefer to specify the rules for loggin into the machine
> in the sshd_config-file, not in hosts.allow/deny.
> But the AllowHosts/DenyHosts-options that could be used in
> /etc/sshd_config earlier seem to be not any
> longer available at the SSH-version I'm using.
> It's: openssh-3.4p1-80 on a SuSE 8.1
>
> Has anybody ideas in this 2 problems?
>
> thx in advance,
> Klaus
>
>
>
> --
> Klaus Siegesleitner - klaus@came.sbg.ac.at
> SysAdmin at CAME (Center of Applied Molecular Engineering)
> University of Salzburg, Jakob-Haringerstrasse 5, A-5020 Salzburg
>
>
> --
> To UNSUBSCRIBE, email to debian-security-request@lists.debian.org
> with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
--
.-"".__."``". Anne Carasik, System Administrator
.-.--. _...' (/) (/) ``' gator at cacr dot caltech dot edu
(O/ O) \-' ` -="""=. ', Center for Advanced Computing Research
~`~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Attachment:
pgpQ1qtbDgJG4.pgp
Description: PGP signature