will trillich said:

> it's ip-based, isn't it?

in my experience it is key based. though I think with ssh2 you have
a more extensive set of options available to you to restrict access
further, perhaps to the IP level.

but if you just have the keys themselves in ~/.ssh/authorized_keys it
should be allowed in, doesn't matter what the IP is. Though I still
use SSH v1 RSA keys for my stuff, haven't gotten around to migrating
to SSH v2 yet.

nate




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to