Hi suse-security, at the moment i use ssh to administrate a suse linux 9.3 server from the local network. the sshd is not accessible from any externel interface. (the server acts as gateway to the internet) but now exists a need of getting access to a service of one client machine from the internet, which i want to be secured via ssh-tunnel. the problem now is that i want different options for ssh listening on the local interface and the external one. for example the login from the external if should only be possible for a special group with key-athentication and should not listen on port 22 while the login from the internal network should be less secured and can accessible via a normal password-auth. whats the best way to do this? should i start 2 sshd and create a 2nd (rc)sshd in init.d with different options? -- Mit freundlichen Grüssen V. Bargsten mailto:beer@freakmail.de