I'm trying to make my system a little more secure but still allow it to be accessed remotely from the internet using ssh and I'm looking for some guidance. The systems in question are a Fedora 9 and a Fedora Core 6 system. The first thing I did was on my workstation (that I ssh from) is create a public/private key pair and installed the public key in ~/.ssh/authorized_keys2, and disabled the password authentication in the /etc/ssh/sshd_config and everything so far works great. My issue I came up with is one of the systems sits on my home network behind a firewall, it would be nice if I can only require the public key for systems not on my local network, eg only the systems on the internet must be known. I guess telnet is an option since it is blocked at the firewall. Next question/problem is, if I create an account for somebody to use when connecting to the system, I must put their public key in their home directory, can it be done the reverse? In other words can I provide them a key for the system and if they don't have that key they can not connect to the system. Thanks, Jeff -- fedora-list mailing list fedora-list@xxxxxxxxxx To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list