I am running Debian, using ttyS1 as my modem...anything else you need?? >There are few things that can cause this problem. Do you think you could >post the relevant bits of your masqdialer config and some details of which >port you use and what distro etc - I can then compare it to a few of my >working setups and see how you go... > >dave
mserver.conf # c-mserver config file # Charles P. Wright # [EMAIL PROTECTED] # # Modified for Debian by Brian Bassett <[EMAIL PROTECTED]> # Originally Sat, 24 Oct 1998 11:46:54 -0700 # Last Updated Sat, 6 Nov 1999 17:23:30 -0800 # Which interface does the server listen on. Default is 0.0.0.0:224, which # means the server listens on ALL interfaces on prt 224. listen_on = "0.0.0.0:224,0.0.0.0:222" # Do we fork into the background and close stdin, stdout, and sterr? demon = true # How many clients can we have waiting on the incoming queue before they get # locked out slimit = 10 # Should we disconnect if we are not currently serving any clients? zeroclientdisconnect = false # If there is more than one client is one of them allowed to hangup the # connection? multiclientkill = true # The location of the file containing the LICENSE that is returned by the # LICENSE command. You should have recieved a copy of the GPL with this # program. license = /usr/share/common-licenses/GPL # The location of the file containing the version history that is returned by # the HISTORY command. history = /usr/share/doc/masqdialer/HISTORY # What version of getstat should we use? pppdlock, netdev, lockonly and # exitcode are your choices if you are using PPP then you should really use # pppdlock. If you have a weird method of connecting use netdev. If you want # to check if a file simply exists then use lockonly. Exitcode will execute a # program and if it returns the value in goodcode then the link will count as # being up. stattype = pppdlock # stattype = netdev # Other stattype options: # stattype = exitcode # stattype = lockonly # What should pppdlock look for in /proc/net/dev pppkey = "ppp" # What is the name of your interface that exists when and only when you are # connected? This can be used for the stat check and it is used for the # netload feature. You can set this on a device by device basis. netdev = ppp0 # What file should we look for netdevices in? devfile = "/proc/net/dev" # What command should we use to check the link status? If the link is good # it should return 0, otherwise it should return a non-zero value. This is used # as the format string to snprintf, the %s will be replaced with the checkhost # which is defined below. linkcheck = "/bin/ping -c 1 %s" # What host should we make sure is active when performing a linkcheck? I # suggest using an IP number instead of a hostname to expedite the operation, # this gets performed a lot and the longer it takes for it to happen the more # frustrated a user will get. checkhost = "209.81.8.242" # www.debian.org # What code do we want our linkcheck command to return. This is most likely # zero. goodcode = 0 # What is the lockfile for your modem, dial out as normal and then look in # /var/lock lockfile = "/var/lock/LCK..ttyS1" # Where do pppd and chat spit out their messages? logfile = "/var/log/ppp.log" # What machines are allowed to administer the server. I recommend you make # this a machine that only you have access to. The firewall (localhost) is # usually a good choice. You can disable this by setting it to 0.0.0.0 (I am # assuming no host will have that IP address). admin_ipallow = "127.0.0.1" # What users are allowed to administer the server. I would choose your account # but not root. Having the root password being transmitted over the network # can be a *really* bad thing. If you are using it on only loopback it isn't # as bad. admin_userallow = "*******,********" # I have placed my usernames here, however I have removed them for security # What machines are allowed to lock and unlock connections? lock_ipallow="127.0.0.1,192.168.0.*" # What users are allowed to lock and unlock connections? lock_userallow="*" # Accept KILL requests when locked and kill connection when the last KILL lock # is released? lock_pendingkill = false # How fast is your modem, this is a hack so that it will return a value # for the connection speed if it cannot be obtained from the chat script. cspeed = 115200 # The default kill action, this must be a script that will kill your connection # regardless of which one is active, the default is internal and you probably # shouldn't change it kill = "internal" # The signal to use when killing PPPD for an internal shutdown method, you # need to preface it with a - since this is the second argument to the kill # command killsig = "-TERM" # How long will we try to look at the PPPD logfile before giving up? logtimeout = 120 # How long after doing something to the connection should we wait to try a # stat method? statwait = 2 # What should we do to parse the logfile to give interactive output? # Valid options are pppd, ipppd, pap, or none. parselog = pppd # Should we check for the speed, or just use the cspeed variable? speedsearch = true # What indicates a modem speed. This was originally hardcoded, most people # should not have a need to change it, but if your modem returns something # different, you may need to. validspeed = "ARQ,V34,V90,LAPM,V42,V90,V120,64000,57333,56000,54666,54667,54000,53333,52000,50666,50667,50000,49333,48000,46666,46667,4 6000,45333,44000,42666,42667,42000,41333,40000,38000,37333,36000,34000,33333,32000,31200,28800,26400,24000,12600,19200,16800,14400,1200 0,9600,7200,4800,2400,1200,300,110" # What should we look for in the logfile to decide what a (I)PPPD string is? # If you have a normal modem this is most probably "pppd[", however if you use # IPPPD this may be "pppd[" or "ipppd[". pppdstr = "pppd[" # What should we look for in the logfile to decide what a chat string is? # I don't know why you would want to change this, but put it in for # completeness since you can select the pppd string. chatstr = "chat[" # What is an identifying feature of your modems connect string. Most say # CONNECT, but I have been told CARRIER crops up as well. connectstr = "CONNECT" # What file contains the username/password combinations. It is in the format of # /etc/passwd. You might want to choose something else as your file since # transmitting unix passwords over the network in the clear is a bad thing. # You can use the provided authgen utility to setup an authorization file. authfile = "/etc/passwd" # Should we use shadow passwords? This requires that you run the daemon as # root and that you use the account names in /etc/passwd. This is probably # not as good as a separate authorization file because the passwords are being # sent over the network, but it is convenient. If you use this option the # authfile will be ignored and the server will use the functions in shadow.h! shadow = false # Should we use PAM (Pluggable Authentication Modules) to authenticate? This # If you use this option the authfile will be ignored and the server will use # the PAM system. This requires that you run the daemon as root and provide a # valid PAM configuration file for mserver. An example PAM file is distrbuted # with mserver, and is normally placed in /etc/pam.d/mserver. This option is # ignored if you compiled mserver without PAM support. This option will take # precedence over shadow, and any other authorization configuration! pamauth = true # Should we allow only valid users to perform the who command? This in theory # could provide information to nasty people, but your blocking this port to the # outside world anyway (or you should be). whoauth = false # What script should we run just after a client connects? # The argument is the client hostname # clientup = "" # What script should we run just after a client disconnects? # The argument is the client hostname # clientdown = "" # What script should we run just after a user authenticates? # The argument is the client hostname and username # authup = "" # What script should we run just after a client unauthenticates? # The argument is the client hostname and username # authdown = "" # What script should we run after the link has been brought up? # This can be specified on a per connection basis. # The argument is the connection's name # linkup = "" # What users are allowed to do what? userallow = "*" userallow_connect = "*" userallow_disconnect = "*" # What are the names of our connections? The order that they are listed # is the order that LIST will use, the first one is the default connection # for some clients. cname = "tpg" # Actually Define our connections # What is the command you use to bring up the connection, this can be a script # or you can call pppd directly. default_script = "pon tpg" # What IP addresses are allowed to manipulate this connection. You are allowed # up to 10 different masks separated by colons. You must either use the real # numbers or a '*' to match any in each quad. You must specify all of the quads# that is '*' wouldn't work but '*.*.*.*' would. default_ipallow = "127.0.0.1,192.168.0.*" # What users are allowed to dial out this connection? "*" or "" will allow any # user to dial out, otherwise provide a comma separated list of users. default_userallow = "*" # This is a string that is displayed when CINFO is called, it isn't actually # used for any dialing, but just for cosmetics. The clients may eventually # depend on this so I suggest setting it. default_info = "Default Provider" # The internal kill method is much more reliable unless you have something wierd# you should really use it! # default_kill = "" # The per connection netdev, this is only needed for netdev stat method # it defaults to the value of netdev. default_netdev = "ppp0" # The per connection checkhost, this is only needed for the exitcode stat method # it defaults to the value of checkhost. # default_checkhost = "" # Which method of parsing the logfile should we use for this connection? # default_parselog = "" -- SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/ More Info: http://lists.slug.org.au/listinfo/slug
