will trillich said: > it's ip-based, isn't it?
in my experience it is key based. though I think with ssh2 you have a more extensive set of options available to you to restrict access further, perhaps to the IP level. but if you just have the keys themselves in ~/.ssh/authorized_keys it should be allowed in, doesn't matter what the IP is. Though I still use SSH v1 RSA keys for my stuff, haven't gotten around to migrating to SSH v2 yet. nate -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]