I have a crude hack I don't want to have to support which grabs a pty, attaches ssh to the master side, and a pppd to the slave side. It ssh'es to another system and logs in as a user which has pppd as its shell. Assuming both pppd's are configured correctly, the "right thing" happens. - Bill