Quoting Steffen Kaiser <skdovecot@smail.inf.fh-bonn-rhein-sieg.de>:
On Thu, 24 May 2007, Johannes Berg wrote:
You need to start distinguishing between "SSH the protocol" and "SSH the shell implementation", afaict the protocol should allow any use like this without ever granting access to a shell, like sftp-server etc.
SSH can authentificate Virtual Users against Dovecot? Get the Virtual Home directory etc.pp.
How do you restict Virtual Users with the same systen uid against overwriting other Virtual User's files in S/Ftp?
I learned the last time this came up that people who can't understand why overloading IMAP with other protocols is bad also can't understand how ssh authentication works or what the difference is between a protocol and an application.
The fact is, 99% of the people who want to add additional protocols to the IMAP protocol just don't care about any alternatives. They want to overload the IMAP protocol and they won't consider any other options.
Trying to explain to them that ssh authentication can handle virtual users is just going to result in being flamed as ignorant. I say this from experience on this list.
-- Eric Rostetter The Department of Physics The University of Texas at Austin
Go Longhorns!