From owner-freebsd-isp@FreeBSD.ORG Fri Apr 21 13:19:32 2006 Return-Path: X-Original-To: freebsd-isp@freebsd.org Delivered-To: freebsd-isp@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 7C24E16A400 for ; Fri, 21 Apr 2006 13:19:32 +0000 (UTC) (envelope-from lists@complx.LF.net) Received: from complx.LF.net (complx.LF.net [212.9.190.63]) by mx1.FreeBSD.org (Postfix) with ESMTP id F3AAA43D58 for ; Fri, 21 Apr 2006 13:19:31 +0000 (GMT) (envelope-from lists@complx.LF.net) Received: from lists by complx.LF.net with local (Exim 4.43) id 1FWvXm-000B2N-R3 for freebsd-isp@freebsd.org; Fri, 21 Apr 2006 15:19:30 +0200 Date: Fri, 21 Apr 2006 15:19:30 +0200 From: Kurt Jaeger To: freebsd-isp@freebsd.org Message-ID: <20060421131930.GM1342@complx.LF.net> References: <20060421130609.GC3564@rabbit> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20060421130609.GC3564@rabbit> Subject: Re: Secure Shell for Virtual Hosts X-BeenThere: freebsd-isp@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Internet Services Providers List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 21 Apr 2006 13:19:32 -0000 Hi! On Fri, Apr 21, 2006 at 09:06:09AM -0400, Mark Bucciarelli wrote: > Some bulk providers allow their virtual host customers to ssh into their > accounts. > > I've been puzzling over how this can be done in a secure way, but so far > have only come up with rbash. > > Any of the guru's here care to share the ssh magic that makes this > happen? I assume they do jail() their user [we do] -- MfG/Best regards, Kurt Jaeger 14 years to go ! LF.net GmbH fon +49 711 90074-23 pi@LF.net Ruppmannstr. 27 fax +49 711 90074-33 D-70565 Stuttgart mob +49 171 3101372