> But ssh itself allows you to do proxying. See ProxyCommand in > ssh_config's manpage. I think that's exactly the point David Lang is making. For the security-paranoid, maybe the approach gitosis should take is to develop an ssh subserver (like sftp). The possibilities for restricted access and configuration are greatly expanded by such an approach. One could configure "sgit" to chroot into some account-specific subdirectory. The sshd configuration can be tweaked to allow sgit access but not terminal or exec request (or port forwarding) access, perhaps dependent on group membership. -- To unsubscribe from this list: send the line "unsubscribe git" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html