I am running Debian, using ttyS1 as my modem...anything else you need??

>There are few things that can cause this problem. Do you think you could
>post the relevant bits of your masqdialer config and some details of which
>port you use and what distro etc - I can then compare it to a few of my
>working setups and see how you go...
>
>dave



mserver.conf
# c-mserver config file
# Charles P. Wright
# [EMAIL PROTECTED]
#
# Modified for Debian by Brian Bassett <[EMAIL PROTECTED]>
# Originally Sat, 24 Oct 1998 11:46:54 -0700
# Last Updated Sat,  6 Nov 1999 17:23:30 -0800

# Which interface does the server listen on. Default is 0.0.0.0:224, which
# means the server listens on ALL interfaces on prt 224.
listen_on = "0.0.0.0:224,0.0.0.0:222"

# Do we fork into the background and close stdin, stdout, and sterr?
demon = true

# How many clients can we have waiting on the incoming queue before they get
# locked out
slimit = 10

# Should we disconnect if we are not currently serving any clients?
zeroclientdisconnect = false

# If there is more than one client is one of them allowed to hangup the
# connection?
multiclientkill = true

# The location of the file containing the LICENSE that is returned by the
# LICENSE command.  You should have recieved a copy of the GPL with this
# program.
license = /usr/share/common-licenses/GPL

# The location of the file containing the version history that is returned by
# the HISTORY command.
history = /usr/share/doc/masqdialer/HISTORY

# What version of getstat should we use?  pppdlock, netdev, lockonly and
# exitcode are your choices if you are using PPP then you should really use
# pppdlock.  If you have a weird method of connecting use netdev.  If you want
# to check if a file simply exists then use lockonly. Exitcode will execute a
# program and if it returns the value in goodcode then the link will count as
# being up.
stattype = pppdlock

# stattype = netdev
# Other stattype options:
# stattype = exitcode
# stattype = lockonly

# What should pppdlock look for in /proc/net/dev
pppkey = "ppp"

# What is the name of your interface that exists when and only when you are
# connected?  This can be used for the stat check and it is used for the
# netload feature.  You can set this on a device by device basis.
netdev = ppp0

# What file should we look for netdevices in?
devfile = "/proc/net/dev"

# What command should we use to check the link status?  If the link is good
# it should return 0, otherwise it should return a non-zero value.  This is 
used
# as the format string to snprintf, the %s will be replaced with the checkhost
# which is defined below.
linkcheck = "/bin/ping -c 1 %s"

# What host should we make sure is active when performing a linkcheck?  I
# suggest using an IP number instead of a hostname to expedite the operation,
# this gets performed a lot and the longer it takes for it to happen the more
# frustrated a user will get.
checkhost = "209.81.8.242"   # www.debian.org

# What code do we want our linkcheck command to return.  This is most likely
# zero.
goodcode = 0

# What is the lockfile for your modem, dial out as normal and then look in
# /var/lock
lockfile = "/var/lock/LCK..ttyS1"

# Where do pppd and chat spit out their messages?
logfile = "/var/log/ppp.log"

# What machines are allowed to administer the server.  I recommend you make
# this a machine that only you have access to.  The firewall (localhost) is
# usually a good choice.  You can disable this by setting it to 0.0.0.0 (I am
# assuming no host will have that IP address).
admin_ipallow = "127.0.0.1"

# What users are allowed to administer the server.  I would choose your account
# but not root.  Having the root password being transmitted over the network
# can be a *really* bad thing.  If you are using it on only loopback it isn't
# as bad.
admin_userallow = "*******,********"    # I have placed my usernames here, 
however I have removed them for security

# What machines are allowed to lock and unlock connections?
lock_ipallow="127.0.0.1,192.168.0.*"

# What users are allowed to lock and unlock connections?
lock_userallow="*"

# Accept KILL requests when locked and kill connection when the last KILL lock
# is released?
lock_pendingkill = false

# How fast is your modem, this is a hack so that it will return a value
# for the connection speed if it cannot be obtained from the chat script.
cspeed = 115200

# The default kill action, this must be a script that will kill your connection
# regardless of which one is active, the default is internal and you probably
# shouldn't change it
kill = "internal"

# The signal to use when killing PPPD for an internal shutdown method, you
# need to preface it with a - since this is the second argument to the kill
# command
killsig = "-TERM"

# How long will we try to look at the PPPD logfile before giving up?
logtimeout = 120

# How long after doing something to  the connection should we wait to try a
# stat method?
statwait = 2

# What should we do to parse the logfile to give interactive output?
# Valid options are pppd, ipppd, pap, or none.
parselog = pppd

# Should we check for the speed, or just use the cspeed variable?
speedsearch = true

# What indicates a modem speed.  This was originally hardcoded, most people
# should not have a need to change it, but if your modem returns something
# different, you may need to.
validspeed = 
"ARQ,V34,V90,LAPM,V42,V90,V120,64000,57333,56000,54666,54667,54000,53333,52000,50666,50667,50000,49333,48000,46666,46667,4
6000,45333,44000,42666,42667,42000,41333,40000,38000,37333,36000,34000,33333,32000,31200,28800,26400,24000,12600,19200,16800,14400,1200
0,9600,7200,4800,2400,1200,300,110"

# What should we look for in the logfile to decide what a (I)PPPD string is?
# If you have a normal modem this is most probably "pppd[", however if you use
# IPPPD this may be "pppd[" or "ipppd[".
pppdstr = "pppd["

# What should we look for in the logfile to decide what a chat string is?
# I don't know why you would want to change this, but put it in for
# completeness since you can select the pppd string.
chatstr = "chat["

# What is an identifying feature of your modems connect string.  Most say
# CONNECT, but I have been told CARRIER crops up as well.
connectstr = "CONNECT"

# What file contains the username/password combinations.  It is in the 
format of
# /etc/passwd.  You might want to choose something else as your file since
# transmitting unix passwords over the network in the clear is a bad thing.
# You can use the provided authgen utility to setup an authorization file.
authfile = "/etc/passwd"

# Should we use shadow passwords?  This requires that you run the daemon as
# root and that you use the account names in /etc/passwd.  This is probably
# not as good as a separate authorization file because the passwords are being
# sent over the network, but it is convenient.  If you use this option the
# authfile will be ignored and the server will use the functions in shadow.h!
shadow = false

# Should we use PAM (Pluggable Authentication Modules) to authenticate? This
# If you use this option the authfile will be ignored and the server will use
# the PAM system.  This requires that you run the daemon as root and provide a
# valid PAM configuration file for mserver.  An example PAM file is distrbuted
# with mserver, and is normally placed in /etc/pam.d/mserver.  This option is
# ignored if you compiled mserver without PAM support.  This option will take
# precedence over shadow, and any other authorization configuration!
pamauth = true

# Should we allow only valid users to perform the who command?  This in theory
# could provide information to nasty people, but your blocking this port to the
# outside world anyway (or you should be).
whoauth = false

# What script should we run just after a client connects?
# The argument is the client hostname
# clientup = ""

# What script should we run just after a client disconnects?
# The argument is the client hostname
# clientdown = ""

# What script should we run just after a user authenticates?
# The argument is the client hostname and username
# authup = ""

# What script should we run just after a client unauthenticates?
# The argument is the client hostname and username
# authdown = ""

# What script should we run after the link has been brought up?
# This can be specified on a per connection basis.
# The argument is the connection's name
# linkup = ""

# What users are allowed to do what?
userallow = "*"
userallow_connect = "*"
userallow_disconnect = "*"

# What are the names of our connections?  The order that they are listed
# is the order that LIST will use, the first one is the default connection
# for some clients.
cname = "tpg"

# Actually Define our connections

# What is the command you use to bring up the connection, this can be a script
# or you can call pppd directly.
default_script = "pon tpg"

# What IP addresses are allowed to manipulate this connection.  You are allowed
# up to 10 different masks separated by colons.  You must either use the real
# numbers or a '*' to match any in each quad.  You must specify all of the 
quads# that is '*' wouldn't work but '*.*.*.*' would.
default_ipallow = "127.0.0.1,192.168.0.*"

# What users are allowed to dial out this connection? "*" or "" will allow any
# user to dial out, otherwise provide a comma separated list of users.
default_userallow = "*"

# This is a string that is displayed when CINFO is called, it isn't actually
# used for any dialing, but just for cosmetics.  The clients may eventually
# depend on this so I suggest setting it.
default_info = "Default Provider"

# The internal kill method is much more reliable unless you have something 
wierd# you should really use it!
# default_kill = ""

# The per connection netdev, this is only needed for netdev stat method
# it defaults to the value of netdev.
default_netdev = "ppp0"

# The per connection checkhost, this is only needed for the exitcode stat 
method
# it defaults to the value of checkhost.
# default_checkhost = ""

# Which method of parsing the logfile should we use for this connection?
# default_parselog = ""



-- 
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://lists.slug.org.au/listinfo/slug

Reply via email to