Check the man page for sshd and look for the section:
AUTHORIZED_KEYS FILE FORMAT
The $HOME/.ssh/authorized_keys file lists the RSA keys that are permitted
for RSA authentication in SSH protocols 1.3 and 1.5 Similarly, the
$HOME/.ssh/authorized_keys2 file lists the DSA and RSA keys that are per�
mitted for public key authentication (PubkeyAuthentication) in SSH proto�
col 2.0.
[snip snip]
The options (if present) consist of comma-separated option specifica�
tions. No spaces are permitted, except within double quotes. The fol�
lowing option specifications are supported:
from="pattern-list"
Specifies that in addition to RSA authentication, the canonical
name of the remote host must be present in the comma-separated
list of patterns (`*' and `?' serve as wildcards). The list may
also contain patterns negated by prefixing them with `!'; if the
canonical host name matches a negated pattern, the key is not ac�
cepted. The purpose of this option is to optionally increase se�
curity: RSA authentication by itself does not trust the network
or name servers or anything (but the key); however, if somebody
somehow steals the key, the key permits an intruder to log in
from anywhere in the world. This additional option makes using a
stolen key more difficult (name servers and/or routers would have
to be compromised in addition to just the key).
HOpe that helps.
j
--- Sergey Dudar <[EMAIL PROTECTED]> wrote:
>
>
> jhart wrote:
>
> > -----BEGIN PGP SIGNED MESSAGE-----
> > Hash: SHA1
> >
> > Check your sshd_config file. There should be an "allow hosts" area
> > towards the bottom of the file. Put your ip address there and
> > restart the daemon.
>
> How must it look like ?
> I didn't find in man sshd such variable
>
> >
> >
__________________________________________________
Do You Yahoo!?
Get email at your own domain with Yahoo! Mail.
http://personal.mail.yahoo.com/