Shannon McMackin wrote: > On Tue, 17 Feb 2009 12:38:43 -0600, Andy Herkey wrote: > > >> Shannon McMackin wrote: >> >>> On Wed, 11 Feb 2009 22:06:35 -0600, Andy Herkey wrote: >>> >>> >>> >>>> Shannon McMackin wrote: >>>> >>>> >>>>> 1st, Andy, I apologize for not getting back to you on FC10. I've had >>>>> to switch back to Ubuntu. >>>>> >>>>> We had it working on Intrepid. I don't know for the life of me what >>>>> changed. I'm using the libs from try3 that you sent me and here's >>>>> the output in the attached file. >>>>> >>>>> >>>>> >>>> Shannon, >>>> I don't see anything obvious in the output except your provider did >>>> not respond to the request for an IP/DNS addresses properly. Line 12 >>>> should have looked like this from your provider: >>>> rcvd [IPCP ConfNak id=0x1 <addr 10.67.241.190> <ms-dns1 >>>> 172.16.145.103> <ms-dns2 172.16.145.103>] instead it looks like this: >>>> rcvd [IPCP ConfNak id=0x1 <ms-dns1 0.0.0.0> <ms-dns2 0.0.0.0>] >>>> So pppd kept sending requests for a local IP address and DNS servers >>>> until it gave up. >>>> >>>> 1 Connect: ppp0 <--> /dev/pts/1 >>>> 2 sent [LCP ConfReq id=0x1 <asyncmap 0x0>] 3 rcvd [LCP ConfReq id=0x0 >>>> <asyncmap 0x0> <auth pap>] 4 sent [LCP ConfAck id=0x0 <asyncmap 0x0> >>>> <auth pap>] 5 rcvd [LCP ConfAck id=0x1 <asyncmap 0x0>] 6 sent [PAP >>>> AuthReq id=0x1 user="Mariner-T61" password=<hidden>] 7 rcvd [PAP >>>> AuthAck id=0x1] >>>> 8 PAP authentication succeeded >>>> 9 sent [IPCP ConfReq id=0x1 <addr 0.0.0.0> <ms-dns1 0.0.0.0> <ms-dns2 >>>> 0.0.0.0>] 10 rcvd [IPCP ConfReq id=0x1 <addr 169.254.1.1>] 11 sent >>>> [IPCP ConfAck id=0x1 <addr 169.254.1.1>] 12 rcvd [IPCP ConfNak id=0x1 >>>> <ms-dns1 0.0.0.0> <ms-dns2 0.0.0.0>] 13 sent [IPCP ConfReq id=0x2 >>>> <addr 0.0.0.0> <ms-dns1 0.0.0.0> <ms-dns2 0.0.0.0>] 14 rcvd [IPCP >>>> ConfNak id=0x2 <ms-dns1 0.0.0.0> <ms-dns2 0.0.0.0>] 15 sent [IPCP >>>> ConfReq id=0x3 <addr 0.0.0.0> <ms-dns1 0.0.0.0> <ms-dns2 0.0.0.0>] 16 >>>> rcvd [IPCP ConfNak id=0x3 <ms-dns1 0.0.0.0> <ms-dns2 0.0.0.0>] 17 sent >>>> [IPCP ConfReq id=0x4 <addr 0.0.0.0> <ms-dns1 0.0.0.0> <ms-dns2 >>>> 0.0.0.0>] 18 rcvd [IPCP ConfNak id=0x4 <ms-dns1 0.0.0.0> <ms-dns2 >>>> 0.0.0.0>] 19 sent [IPCP ConfReq id=0x5 <addr 0.0.0.0> <ms-dns1 >>>> 0.0.0.0> <ms-dns2 0.0.0.0>] 20 rcvd [IPCP ConfNak id=0x5 <ms-dns1 >>>> 0.0.0.0> <ms-dns2 0.0.0.0>] 21 sent [IPCP ConfReq id=0x6 <addr >>>> 0.0.0.0>] 22 rcvd [IPCP ConfNak id=0x6] 23 sent [IPCP ConfReq id=0x7 >>>> <addr 0.0.0.0>] 24 rcvd [IPCP ConfNak id=0x7] >>>> >>>> >>>> From what I see it looks good on your side. Are you still using the >>>> default barry-att_cingular scripts? >>>> Try running "sudo pppd dump debug call barry-att_cingular" so we can >>>> see what options pppd thinks are set. >>>> >>>> - Andy >>>> >>>> >>>> >>>> >>>> > ------------------------------------------------------------------------------ > >>> >>> >>>> Create and Deploy Rich Internet Apps outside the browser with >>>> Adobe(R)AIR(TM) software. With Adobe AIR, Ajax developers can use >>>> existing skills and code to build responsive, highly engaging >>>> applications that combine the power of local resources and data with >>>> the reach of the web. Download the Adobe AIR SDK and Ajax docs to >>>> start building applications today-http://p.sf.net/sfu/adobe-com >>>> >>>> >>>> >>> Andy, >>> >>> Here's the output of the debug: >>> >>> pppd options in effect: >>> debug debug # (from /etc/ppp/peers/barry-att_cingular) >>> > nodetach # > >>> (from /etc/ppp/peers/barry-att_cingular) dump # (from >>> > command line) > >>> noauth # (from /etc/ppp/peers/barry-att_cingular) user >>> > # (from > >>> /etc/ppp/peers/barry-att_cingular) password ?????? # (from >>> /etc/ppp/peers/barry-att_cingular) >>> # (from /etc/ppp/options) >>> connect /usr/sbin/chat -f /etc/chatscripts/barry- >>> > att_cingular.chat # > >>> (from /etc/ppp/peers/barry-att_cingular) pty /usr/sbin/pppob -P >>> 3ewfdsxz # (from /etc/ppp/peers/barry- att_cingular) >>> nocrtscts # (from /etc/ppp/peers/barry-att_cingular) >>> # (from /etc/ppp/options) >>> noaccomp # (from /etc/ppp/peers/barry-att_cingular) >>> > asyncmap 0 # > >>> (from /etc/ppp/options) nomagic # (from >>> /etc/ppp/peers/barry-att_cingular) mtu 1492 # (from >>> /etc/ppp/peers/barry-att_cingular) nopcomp # (from >>> /etc/ppp/peers/barry-att_cingular) passive # (from >>> /etc/ppp/peers/barry-att_cingular) lcp-echo-failure 999 # >>> > (from > >>> /etc/ppp/peers/barry-att_cingular) lcp-echo-interval 0 # >>> > (from > >>> /etc/ppp/peers/barry-att_cingular) hide-password # (from >>> /etc/ppp/options) novj # (from /etc/ppp/peers/barry- >>> > att_cingular) > >>> ipcp-accept-local # (from /etc/ppp/peers/barry-att_cingular) >>> ipcp-accept-remote # (from /etc/ppp/peers/barry-att_cingular) >>> noipdefault # (from /etc/ppp/peers/barry-att_cingular) ipcp- >>> > restart 7 > >>> # (from /etc/ppp/peers/barry-att_cingular) defaultroute # >>> > (from > >>> /etc/ppp/peers/barry-att_cingular) proxyarp # (from /etc/ppp/ >>> > options) > >>> usepeerdns # (from /etc/ppp/peers/barry-att_cingular) >>> > nobsdcomp # > >>> (from /etc/ppp/peers/barry-att_cingular) nodeflate # (from >>> /etc/ppp/peers/barry-att_cingular) noipx # (from /etc/ppp/ >>> > options) > >>> The remainder of the process is the same. No IP address provided by >>> AT&T. >>> >>> >>> >> Shannon, >> Pleasea send me these two files from you system: /etc/ppp/options >> /etc/ppp/pap-secrets >> >> Thanks, >> - Andy >> >> >> >> > ------------------------------------------------------------------------------ > >> Open Source Business Conference (OSBC), March 24-25, 2009, San >> Francisco, CA -OSBC tackles the biggest issue in open source: Open >> Sourcing the Enterprise -Strategies to boost innovation and cut costs >> with open source participation -Receive a $600 discount off the >> registration fee with the source code: SFAD http://p.sf.net/sfu/XcvMzF8H >> > > Here's the file content. I'm using Pan now for news and I don't see any > good option to attach a file: > > # /etc/ppp/options > # > # Originally created by Jim Knoble <[email protected]> > # Modified for Debian by alvar Bray <[email protected]> > # Modified for PPP Server setup by Christoph Lameter <[email protected]> > # > # To quickly see what options are active in this file, use this command: > # egrep -v '#|^ *$' /etc/ppp/options > > # Specify which DNS Servers the incoming Win95 or WinNT Connection should > use > # Two Servers can be remotely configured > # ms-dns 192.168.1.1 > # ms-dns 192.168.1.2 > > # Specify which WINS Servers the incoming connection Win95 or WinNT > should use > # ms-wins 192.168.1.50 > # ms-wins 192.168.1.51 > > # Run the executable or shell command specified after pppd has > # terminated the link. This script could, for example, issue commands > # to the modem to cause it to hang up if hardware modem control signals > # were not available. > #disconnect "chat -- \d+++\d\c OK ath0 OK" > > # async character map -- 32-bit hex; each bit is a character > # that needs to be escaped for pppd to receive it. 0x00000001 > # represents '\x01', and 0x80000000 represents '\x1f'. > asyncmap 0 > > # Require the peer to authenticate itself before allowing network > # packets to be sent or received. > # Please do not disable this setting. It is expected to be standard in > # future releases of pppd. Use the call option (see manpage) to disable > # authentication for specific peers. > #auth > noauth > # ... Unfortunately, fixing this properly in the peers file > # (/etc/ppp/peers/ppp0, typically) is apparently incompatible with the > # paradigm used by gnome-system-tools and system-tools-backend for > # managing the peers files. So in Ubuntu Feisty we change the default. > > # Use hardware flow control (i.e. RTS/CTS) to control the flow of data > # on the serial port. > crtscts > > # Use software flow control (i.e. XON/XOFF) to control the flow of data > # on the serial port. > #xonxoff > > # Specifies that certain characters should be escaped on transmission > # (regardless of whether the peer requests them to be escaped with its > # async control character map). The characters to be escaped are > # specified as a list of hex numbers separated by commas. Note that > # almost any character can be specified for the escape option, unlike > # the asyncmap option which only allows control characters to be > # specified. The characters which may not be escaped are those with hex > # values 0x20 - 0x3f or 0x5e. > #escape 11,13,ff > > # Don't use the modem control lines. > #local > > # Specifies that pppd should use a UUCP-style lock on the serial device > # to ensure exclusive access to the device. > lock > > # Don't show the passwords when logging the contents of PAP packets. > # This is the default. > hide-password > > # When logging the contents of PAP packets, this option causes pppd to > # show the password string in the log message. > #show-password > > # Use the modem control lines. On Ultrix, this option implies hardware > # flow control, as for the crtscts option. (This option is not fully > # implemented.) > modem > > # Set the MRU [Maximum Receive Unit] value to <n> for negotiation. pppd > # will ask the peer to send packets of no more than <n> bytes. The > # minimum MRU value is 128. The default MRU value is 1500. A value of > # 296 is recommended for slow links (40 bytes for TCP/IP header + 256 > # bytes of data). > #mru 542 > > # Set the interface netmask to <n>, a 32 bit netmask in "decimal dot" > # notation (e.g. 255.255.255.0). > #netmask 255.255.255.0 > > # Disables the default behaviour when no local IP address is specified, > # which is to determine (if possible) the local IP address from the > # hostname. With this option, the peer will have to supply the local IP > # address during IPCP negotiation (unless it specified explicitly on the > # command line or in an options file). > #noipdefault > > # Enables the "passive" option in the LCP. With this option, pppd will > # attempt to initiate a connection; if no reply is received from the > # peer, pppd will then just wait passively for a valid LCP packet from > # the peer (instead of exiting, as it does without this option). > #passive > > # With this option, pppd will not transmit LCP packets to initiate a > # connection until a valid LCP packet is received from the peer (as for > # the "passive" option with old versions of pppd). > #silent > > # Don't request or allow negotiation of any options for LCP and IPCP > # (use default values). > #-all > > # Disable Address/Control compression negotiation (use default, i.e. > # address/control field disabled). > #-ac > > # Disable asyncmap negotiation (use the default asyncmap, i.e. escape > # all control characters). > #-am > > # Don't fork to become a background process (otherwise pppd will do so > # if a serial device is specified). > #-detach > > # Disable IP address negotiation (with this option, the remote IP > # address must be specified with an option on the command line or in > # an options file). > #-ip > > # Disable IPCP negotiation and IP communication. This option should > # only be required if the peer is buggy and gets confused by requests > # from pppd for IPCP negotiation. > #noip > > # Disable magic number negotiation. With this option, pppd cannot > # detect a looped-back line. > #-mn > > # Disable MRU [Maximum Receive Unit] negotiation (use default, i.e. > # 1500). > #-mru > > # Disable protocol field compression negotiation (use default, i.e. > # protocol field compression disabled). > #-pc > > # Require the peer to authenticate itself using PAP. > #+pap > > # Don't agree to authenticate using PAP. > #-pap > > # Require the peer to authenticate itself using CHAP [Cryptographic > # Handshake Authentication Protocol] authentication. > #+chap > > # Don't agree to authenticate using CHAP. > #-chap > > # Disable negotiation of Van Jacobson style IP header compression (use > # default, i.e. no compression). > #-vj > > # Increase debugging level (same as -d). If this option is given, pppd > # will log the contents of all control packets sent or received in a > # readable form. The packets are logged through syslog with facility > # daemon and level debug. This information can be directed to a file by > # setting up /etc/syslog.conf appropriately (see syslog.conf(5)). (If > # pppd is compiled with extra debugging enabled, it will log messages > # using facility local2 instead of daemon). > #debug > > # Append the domain name <d> to the local host name for authentication > # purposes. For example, if gethostname() returns the name porsche, > # but the fully qualified domain name is porsche.Quotron.COM, you would > # use the domain option to set the domain name to Quotron.COM. > #domain <d> > > # Enable debugging code in the kernel-level PPP driver. The argument n > # is a number which is the sum of the following values: 1 to enable > # general debug messages, 2 to request that the contents of received > # packets be printed, and 4 to request that the contents of transmitted > # packets be printed. > #kdebug n > > # Set the MTU [Maximum Transmit Unit] value to <n>. Unless the peer > # requests a smaller value via MRU negotiation, pppd will request that > # the kernel networking code send data packets of no more than n bytes > # through the PPP network interface. > #mtu <n> > > # Set the name of the local system for authentication purposes to <n>. > # This is a privileged option. With this option, pppd will use lines in > the > # secrets files which have <n> as the second field when looking for a > # secret to use in authenticating the peer. In addition, unless overridden > # with the user option, <n> will be used as the name to send to the peer > # when authenticating the local system to the peer. (Note that pppd does > # not append the domain name to <n>.) > #name <n> > > # Enforce the use of the hostname as the name of the local system for > # authentication purposes (overrides the name option). > #usehostname > > # Set the assumed name of the remote system for authentication purposes > # to <n>. > #remotename <n> > > # Add an entry to this system's ARP [Address Resolution Protocol] > # table with the IP address of the peer and the Ethernet address of this > # system. > proxyarp > > # Use the system password database for authenticating the peer using > # PAP. Note: mgetty already provides this option. If this is specified > # then dialin from users using a script under Linux to fire up ppp wont > work. > # login > > # If this option is given, pppd will send an LCP echo-request frame to the > # peer every n seconds. Normally the peer should respond to the echo- > request > # by sending an echo-reply. This option can be used with the > # lcp-echo-failure option to detect that the peer is no longer connected. > lcp-echo-interval 30 > > # If this option is given, pppd will presume the peer to be dead if n > # LCP echo-requests are sent without receiving a valid LCP echo-reply. > # If this happens, pppd will terminate the connection. Use of this > # option requires a non-zero value for the lcp-echo-interval parameter. > # This option can be used to enable pppd to terminate after the physical > # connection has been broken (e.g., the modem has hung up) in > # situations where no hardware modem control lines are available. > lcp-echo-failure 4 > > # Set the LCP restart interval (retransmission timeout) to <n> seconds > # (default 3). > #lcp-restart <n> > > # Set the maximum number of LCP terminate-request transmissions to <n> > # (default 3). > #lcp-max-terminate <n> > > # Set the maximum number of LCP configure-request transmissions to <n> > # (default 10). > #lcp-max-configure <n> > > # Set the maximum number of LCP configure-NAKs returned before starting > # to send configure-Rejects instead to <n> (default 10). > #lcp-max-failure <n> > > # Set the IPCP restart interval (retransmission timeout) to <n> > # seconds (default 3). > #ipcp-restart <n> > > # Set the maximum number of IPCP terminate-request transmissions to <n> > # (default 3). > #ipcp-max-terminate <n> > > # Set the maximum number of IPCP configure-request transmissions to <n> > # (default 10). > #ipcp-max-configure <n> > > # Set the maximum number of IPCP configure-NAKs returned before starting > # to send configure-Rejects instead to <n> (default 10). > #ipcp-max-failure <n> > > # Set the PAP restart interval (retransmission timeout) to <n> seconds > # (default 3). > #pap-restart <n> > > # Set the maximum number of PAP authenticate-request transmissions to > # <n> (default 10). > #pap-max-authreq <n> > > # Set the maximum time that pppd will wait for the peer to authenticate > # itself with PAP to <n> seconds (0 means no limit). > #pap-timeout <n> > > # Set the CHAP restart interval (retransmission timeout for > # challenges) to <n> seconds (default 3). > #chap-restart <n> > > # Set the maximum number of CHAP challenge transmissions to <n> > # (default 10). > #chap-max-challenge > > # If this option is given, pppd will rechallenge the peer every <n> > # seconds. > #chap-interval <n> > > # With this option, pppd will accept the peer's idea of our local IP > # address, even if the local IP address was specified in an option. > #ipcp-accept-local > > # With this option, pppd will accept the peer's idea of its (remote) IP > # address, even if the remote IP address was specified in an option. > #ipcp-accept-remote > > # Disable the IPXCP and IPX protocols. > # To let pppd pass IPX packets comment this out --- you'll probably also > # want to install ipxripd, and have the Internal IPX Network option > enabled > # in your kernel. /usr/doc/HOWTO/IPX-HOWTO.gz contains more info. > noipx > > # Exit once a connection has been made and terminated. This is the > default, > # unless the `persist' or `demand' option has been specified. > #nopersist > > # Do not exit after a connection is terminated; instead try to reopen > # the connection. > #persist > > # Terminate after n consecutive failed connection attempts. > # A value of 0 means no limit. The default value is 10. > #maxfail <n> > > # Initiate the link only on demand, i.e. when data traffic is present. > # With this option, the remote IP address must be specified by the user on > # the command line or in an options file. Pppd will initially configure > # the interface and enable it for IP traffic without connecting to the > peer. > # When traffic is available, pppd will connect to the peer and perform > # negotiation, authentication, etc. When this is completed, pppd will > # commence passing data packets (i.e., IP packets) across the link. > #demand > > # Specifies that pppd should disconnect if the link is idle for <n> > seconds. > # The link is idle when no data packets (i.e. IP packets) are being sent > or > # received. Note: it is not advisable to use this option with the persist > # option without the demand option. If the active-filter option is given, > # data packets which are rejected by the specified activity filter also > # count as the link being idle. > #idle <n> > > # Specifies how many seconds to wait before re-initiating the link after > # it terminates. This option only has any effect if the persist or demand > # option is used. The holdoff period is not applied if the link was > # terminated because it was idle. > #holdoff <n> > > # Wait for up n milliseconds after the connect script finishes for a valid > # PPP packet from the peer. At the end of this time, or when a valid PPP > # packet is received from the peer, pppd will commence negotiation by > # sending its first LCP packet. The default value is 1000 (1 second). > # This wait period only applies if the connect or pty option is used. > #connect-delay <n> > > # Packet filtering: for more information, see pppd(8) > # Any packets matching the filter expression will be interpreted as link > # activity, and will cause a "demand" connection to be activated, and > reset > # the idle connection timer. (idle option) > # The filter expression is akin to that of tcpdump(1) > #active-filter <filter-expression> > > # ---<End of File>--- > > # /etc/ppp/pap-secrets > # > # This is a pap-secrets file to be used with the AUTO_PPP function of > # mgetty. mgetty-0.99 is preconfigured to startup pppd with the login > option > # which will cause pppd to consult /etc/passwd (and /etc/shadow in turn) > # after a user has passed this file. Don't be disturbed therefore by the > fact > # that this file defines logins with any password for users. /etc/passwd > # (again, /etc/shadow, too) will catch passwd mismatches. > # > # This file should block ALL users that should not be able to do AUTO_PPP. > # AUTO_PPP bypasses the usual login program so it's necessary to list all > # system userids with regular passwords here. > # > # ATTENTION: The definitions here can allow users to login without a > # password if you don't use the login option of pppd! The mgetty Debian > # package already provides this option; make sure you don't change that. > > # INBOUND connections > > # Every regular user can use PPP and has to use passwords from /etc/passwd > * hostname "" * > > # UserIDs that cannot use PPP at all. Check your /etc/passwd and add any > # other accounts that should not be able to use pppd! > guest hostname "*" - > master hostname "*" - > root hostname "*" - > support hostname "*" - > stats hostname "*" - > > # OUTBOUND connections > > # Here you should add your userid password to connect to your providers > via > # PAP. The * means that the password is to be used for ANY host you > connect > # to. Thus you do not have to worry about the foreign machine name. Just > # replace password with your password. > # If you have different providers with different passwords then you better > # remove the following line. > > # * password > > Shannon, These are the active options in your file. asyncmap 0 noauth crtscts lock hide-password modem proxyarp lcp-echo-interval 30 lcp-echo-failure 4 noipx
Try making a backup of your options file and create a new one with these entries: sudo su - cd /etc/ppp mv options options.org vi options add these: lock noauth noipdefault usepeerdns Save the file and change permissions to 644 chmod 644 options Try connecting again and post the output. - Andy ------------------------------------------------------------------------------ Open Source Business Conference (OSBC), March 24-25, 2009, San Francisco, CA -OSBC tackles the biggest issue in open source: Open Sourcing the Enterprise -Strategies to boost innovation and cut costs with open source participation -Receive a $600 discount off the registration fee with the source code: SFAD http://p.sf.net/sfu/XcvMzF8H _______________________________________________ Barry-devel mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/barry-devel
