From owner-freebsd-hackers Thu Oct 23 01:00:23 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.7/8.8.7) id BAA07773 for hackers-outgoing; Thu, 23 Oct 1997 01:00:23 -0700 (PDT) (envelope-from owner-freebsd-hackers) Received: from alpo.whistle.com (alpo.whistle.com [207.76.204.38]) by hub.freebsd.org (8.8.7/8.8.7) with ESMTP id BAA07751; Thu, 23 Oct 1997 01:00:17 -0700 (PDT) (envelope-from julian@whistle.com) Received: (from daemon@localhost) by alpo.whistle.com (8.8.5/8.8.5) id AAA07182; Thu, 23 Oct 1997 00:54:56 -0700 (PDT) Received: from current1.whistle.com(207.76.205.22) via SMTP by alpo.whistle.com, id smtpd007180; Thu Oct 23 07:54:55 1997 Date: Thu, 23 Oct 1997 00:53:22 -0700 (PDT) From: Julian Elischer To: Charles Mott cc: freebsd-hackers@FreeBSD.ORG, freebsd-isp@FreeBSD.ORG Subject: Re: Password files and virtual IP addresses In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-hackers@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk We have a whole virtual machine using chroot, and a few other tricks such as a hacked inetd. It was described recently on either hackers or questions (I forget which) by Doug Ambrisko. (I think it was questions) julian On Wed, 22 Oct 1997, Charles Mott wrote: > Suppose that one wanted to create different virtual > IP addresses with ifconfig alias, and when people telnet > or ftp or access pop3/imap2 at a virtual address, a > password file specific to that virtual address would be > used. This would allow username re-use. > > Has this sort of thing been considered before? If not, > what sort of things would have to be hacked? If password > access routines could somehow be informed what virtual > address they were being accessed from, then it would > be possible to have multiple password files. > > Of course, there are always unintended security > implications to doing these things... > > Charles Mott > >