Hi there! You know the problem when you want the ssh from within a jail after you jexec'ed into it? I mean this: Code: @host# jexec <jid> <shell> @jail# ssh user@host Host key verification failed. or this: Code: @host# jexec <jid> <shell> @jail# ssh user@host Permission denied, please try again. Permission denied, please try again. Permission denied (publickey,password). Or also when using screen: Code: @host# jexec <jid> <shell> @jail# screen Cannot access '/dev/pts/11': No such file or directory As you might know, that's because you don't have a TTY when you jexec into a jail. Possible solutions for this are: * using PKI auth (but this only solves the problem for SSH and not for other commands that need a TTY) * running sshd in the jail and logging into the jail via SSH (but what if you want to keep your jail very secure and don't want to run sshd?) I have now found a much better solution, that I haven't seen mentioned anywhere yet, so I thought I might want to share it with you guys: /usr/ports/sysutils/tmux It's a terminal multiplexer like screen, but unlike screen it works even when you jexec'ed into a jail! And because its a terminal multiplexer, you get a TTY! Now you can do this: Code: @host# jexec <jid> <shell> @jail# tmux @jail# ssh user@host user@host's password: I don't know what tmux's secret sauce is, but its awesome!