From owner-freebsd-isp@FreeBSD.ORG Fri Apr 21 13:24:47 2006 Return-Path: X-Original-To: freebsd-isp@freebsd.org Delivered-To: freebsd-isp@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 0AA3D16A400 for ; Fri, 21 Apr 2006 13:24:47 +0000 (UTC) (envelope-from develop@altersign.com) Received: from 80-254-8-178.express.net.ua (80-254-8-178.express.net.ua [80.254.8.178]) by mx1.FreeBSD.org (Postfix) with ESMTP id 399EB43D46 for ; Fri, 21 Apr 2006 13:24:43 +0000 (GMT) (envelope-from develop@altersign.com) From: Yaroslav Polyakov Organization: AlterEgo Design To: freebsd-isp@freebsd.org Date: Fri, 21 Apr 2006 16:25:15 +0300 User-Agent: KMail/1.7 References: <20060421130609.GC3564@rabbit> In-Reply-To: <20060421130609.GC3564@rabbit> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Content-Disposition: inline Message-Id: <200604211625.15681.develop@altersign.com> X-Mailman-Approved-At: Fri, 21 Apr 2006 13:34:13 +0000 Subject: Re: Secure Shell for Virtual Hosts X-BeenThere: freebsd-isp@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Internet Services Providers List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 21 Apr 2006 13:24:47 -0000 On Friday 21 April 2006 16:06, Mark Bucciarelli wrote: They run ssh in chroot(jail) enviroment possibly. > Some bulk providers allow their virtual host customers to ssh into their > accounts. > > I've been puzzling over how this can be done in a secure way, but so far > have only come up with rbash. > > Any of the guru's here care to share the ssh magic that makes this > happen? > > Thanks, > > m > _______________________________________________ > freebsd-isp@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-isp > To unsubscribe, send any mail to "freebsd-isp-unsubscribe@freebsd.org" -- WBR, Yaroslav AlterEgo Design Studio http://www.altersign.com/