cirkit
Alternatively if you prefer not to use pp key access, limit ssh access from a single or multiple specified IP(s).
That way only "allowed" sites can gain ssh access to the sme server
See this thread for command details, and more.
http://forums.contribs.org/index.php/topic,34333.msg147942.html#msg147942ie
For controlling ssh access
This will allow ssh access ONLY from the designated IP's & block all other sources.
/sbin/e-smith/db configuration setprop sshd TCPPort 22
/sbin/e-smith/db configuration setprop sshd AllowHosts xxx.xxx.xxx.xxx
/sbin/e-smith/signal-event remoteaccess-update
or
/sbin/e-smith/db configuration setprop sshd TCPPort 22
/sbin/e-smith/db configuration setprop sshd AllowHosts x.x.x.1,y.y.y.2
/sbin/e-smith/signal-event remoteaccess-update
To enter multiple AllowHosts IP's, comma separate the IP addresses and/or netmasks (e.g. 16.17.18.19,203.14.64.0/24), as in the above example
ssh will then only be allowed from those IP addresses. The firewall code will drop ssh connections from any other hosts.