From owner-freebsd-isp Wed Oct 22 10:45:01 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.7/8.8.7) id KAA14416 for isp-outgoing; Wed, 22 Oct 1997 10:45:01 -0700 (PDT) (envelope-from owner-freebsd-isp) Received: from srv.net (snake.srv.net [199.104.81.3]) by hub.freebsd.org (8.8.7/8.8.7) with ESMTP id KAA14364; Wed, 22 Oct 1997 10:44:09 -0700 (PDT) (envelope-from cmott@srv.net) Received: from darkstar.home (dialin1.anlw.anl.gov [141.221.254.101]) by srv.net (8.8.5/8.8.5) with SMTP id LAA21235; Wed, 22 Oct 1997 11:43:53 -0600 (MDT) Date: Wed, 22 Oct 1997 10:43:21 -0700 (MST) From: Charles Mott X-Sender: cmott@darkstar.home To: freebsd-hackers@freebsd.org, freebsd-isp@freebsd.org Subject: Password files and virtual IP addresses Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-isp@freebsd.org X-Loop: FreeBSD.org Precedence: bulk Suppose that one wanted to create different virtual IP addresses with ifconfig alias, and when people telnet or ftp or access pop3/imap2 at a virtual address, a password file specific to that virtual address would be used. This would allow username re-use. Has this sort of thing been considered before? If not, what sort of things would have to be hacked? If password access routines could somehow be informed what virtual address they were being accessed from, then it would be possible to have multiple password files. Of course, there are always unintended security implications to doing these things... Charles Mott