From owner-freebsd-isp@FreeBSD.ORG Fri Apr 21 13:06:14 2006 Return-Path: X-Original-To: freebsd-isp@freebsd.org Delivered-To: freebsd-isp@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id BB00916A40E for ; Fri, 21 Apr 2006 13:06:14 +0000 (UTC) (envelope-from mark@gaiahost.coop) Received: from biodiesel.gaiahost.coop (biodiesel.gaiahost.coop [64.95.78.120]) by mx1.FreeBSD.org (Postfix) with ESMTP id 0150143D58 for ; Fri, 21 Apr 2006 13:06:11 +0000 (GMT) (envelope-from mark@gaiahost.coop) Received: from gaiahost.coop (host-64-65-195-19.spr.choiceone.net [::ffff:64.65.195.19]) (AUTH: LOGIN mark@hubcapconsulting.com) by biodiesel.gaiahost.coop with esmtp; Fri, 21 Apr 2006 09:06:07 -0400 id 005CC06D.4448D8C1.00001B8A Received: by gaiahost.coop (sSMTP sendmail emulation); Fri, 21 Apr 2006 09:06:09 -0400 Date: Fri, 21 Apr 2006 09:06:09 -0400 From: Mark Bucciarelli To: freebsd-isp@freebsd.org Message-ID: <20060421130609.GC3564@rabbit> Mail-Followup-To: freebsd-isp@freebsd.org Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Content-Disposition: inline User-Agent: Mutt/1.4.2.1i Subject: Secure Shell for Virtual Hosts X-BeenThere: freebsd-isp@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Internet Services Providers List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 21 Apr 2006 13:06:14 -0000 Some bulk providers allow their virtual host customers to ssh into their accounts. I've been puzzling over how this can be done in a secure way, but so far have only come up with rbash. Any of the guru's here care to share the ssh magic that makes this happen? Thanks, m