URL
https://opencores.org/ocsvn/or1k_old/or1k_old/trunk
Subversion Repositories or1k_old
[/] [or1k_old/] [trunk/] [rtems-20020807/] [c/] [src/] [libnetworking/] [pppd/] [pppd.8] - Rev 1782
Compare with Previous | Blame | View Log
.\" manual page [] for pppd 2.3.\" pppd.8,v 1.2 2002/01/31 21:40:47 joel Exp.\" SH section heading.\" SS subsection heading.\" LP paragraph.\" IP indented paragraph.\" TP hanging label.TH PPPD 8.SH NAMEpppd \- Point to Point Protocol daemon.SH SYNOPSIS.B pppd[.I tty_name] [.I speed] [.I options].SH DESCRIPTION.LPThe Point-to-Point Protocol (PPP) provides a method for transmittingdatagrams over serial point-to-point links. PPPis composed of three parts: a method for encapsulating datagrams overserial links, an extensible Link Control Protocol (LCP), anda family of Network Control Protocols (NCP) for establishingand configuring different network-layer protocols..LPThe encapsulation scheme is provided by driver code in the kernel.Pppd provides the basic LCP, authentication support, and an NCP forestablishing and configuring the Internet Protocol (IP) (called the IPControl Protocol, IPCP)..SH FREQUENTLY USED OPTIONS.TP.I <tty_name>Communicate over the named device. The string "/dev/" is prepended ifnecessary. If no device name is given, or if the name of the terminalconnected to the standard input is given, pppd will use that terminal,and will not fork to put itself in the background. A value for thisoption from a privileged source cannot be overridden by anon-privileged user..TP.I <speed>Set the baud rate to <speed> (a decimal number). On systems such as4.4BSD and NetBSD, any speed can be specified. Other systems(e.g. SunOS) allow only a limited set of speeds..TP.B asyncmap \fI<map>Set the async character map to <map>. This map describes whichcontrol characters cannot be successfully received over the serialline. Pppd will ask the peer to send these characters as a 2-byteescape sequence. The argument is a 32 bit hex number with each bitrepresenting a character to escape. Bit 0 (00000001) represents thecharacter 0x00; bit 31 (80000000) represents the character 0x1f or ^_.If multiple \fIasyncmap\fR options are given, the values are ORedtogether. If no \fIasyncmap\fR option is given, no async charactermap will be negotiated for the receive direction; the peer should thenescape \fIall\fR control characters. To escape transmittedcharacters, use the \fIescape\fR option..TP.B authRequire the peer to authenticate itself before allowing networkpackets to be sent or received. This option is the default if thesystem has a default route. If neither this option nor the\fInoauth\fR option is specified, pppd will only allow the peer to useIP addresses to which the system does not already have a route..TP.B call \fInameRead options from the file /etc/ppp/peers/\fIname\fR. This file maycontain privileged options, such as \fInoauth\fR, even if pppdis not being run by root. The \fIname\fR string may not begin with /or include .. as a pathname component. The format of the options fileis described below..TP.B connect \fIscriptUse the executable or shell command specified by \fIscript\fR to setup the serial line. This script would typically use the chat(8)program to dial the modem and start the remote ppp session. A valuefor this option from a privileged source cannot be overridden by anon-privileged user..TP.B crtsctsUse hardware flow control (i.e. RTS/CTS) to control the flow ofdata on the serial port. If neither the \fIcrtscts\fR, the\fInocrtscts\fR, the \fIcdtrcts\fR nor the \fInocdtrcts\fR optionis given, the hardware flow control setting for the serial port isleft unchanged.Some serial ports (such as Macintosh serial ports) lack a trueRTS output. Such serial ports use this mode to implementunidirectional flow control. The serial port willsuspend transmission when requested by the modem (via CTS)but will be unable to request the modem stop sending to thecomputer. This mode retains the ability to use DTR asa modem control line..TP.B defaultrouteAdd a default route to the system routing tables, using the peer asthe gateway, when IPCP negotiation is successfully completed.This entry is removed when the PPP connection is broken. This optionis privileged if the \fInodefaultroute\fR option has been specified..TP.B disconnect \fIscriptRun the executable or shell command specified by \fIscript\fR afterpppd has terminated the link. This script could, for example, issuecommands to the modem to cause it to hang up if hardware modem controlsignals were not available. The disconnect script is not run if themodem has already hung up. A value for this option from a privilegedsource cannot be overridden by a non-privileged user..TP.B escape \fIxx,yy,...Specifies that certain characters should be escaped on transmission(regardless of whether the peer requests them to be escaped with itsasync control character map). The characters to be escaped arespecified as a list of hex numbers separated by commas. Note thatalmost any character can be specified for the \fIescape\fR option,unlike the \fIasyncmap\fR option which only allows control charactersto be specified. The characters which may not be escaped are thosewith hex values 0x20 - 0x3f or 0x5e..TP.B file \fInameRead options from file \fIname\fR (the format is described below).The file must be readable by the user who has invoked pppd..TP.B init \fIscriptRun the executable or shell command specified by \fIscript\fR toinitialize the serial line. This script would typically use thechat(8) program to configure the modem to enable auto answer. A valuefor this option from a privileged source cannot be overridden by anon-privileged user..TP.B lockSpecifies that pppd should create a UUCP-style lock file for theserial device to ensure exclusive access to the device..TP.B mru \fInSet the MRU [Maximum Receive Unit] value to \fIn\fR. Pppdwill ask the peer to send packets of no more than \fIn\fR bytes. Theminimum MRU value is 128. The default MRU value is 1500. A value of296 is recommended for slow links (40 bytes for TCP/IP header + 256bytes of data). (Note that for IPv6 MRU must be at least 1280).TP.B mtu \fInSet the MTU [Maximum Transmit Unit] value to \fIn\fR. Unless thepeer requests a smaller value via MRU negotiation, pppd willrequest that the kernel networking code send data packets of no morethan \fIn\fR bytes through the PPP network interface. (Note that forIPv6 MTU must be at least 1280).TP.B passiveEnables the "passive" option in the LCP. With this option, pppd willattempt to initiate a connection; if no reply is received from thepeer, pppd will then just wait passively for a valid LCP packet fromthe peer, instead of exiting, as it would without this option..SH OPTIONS.TP.I <local_IP_address>\fB:\fI<remote_IP_address>Set the local and/or remote interface IP addresses. Either one may beomitted. The IP addresses can be specified with a host name or indecimal dot notation (e.g. 150.234.56.78). The default localaddress is the (first) IP address of the system (unless the\fInoipdefault\fRoption is given). The remote address will be obtained from the peerif not specified in any option. Thus, in simple cases, this option isnot required. If a local and/or remote IP address is specified withthis option, pppdwill not accept a different value from the peer in the IPCPnegotiation, unless the \fIipcp-accept-local\fR and/or\fIipcp-accept-remote\fR options are given, respectively..TP.B ipv6 \fI<local_interface_identifier>\fR,\fI<remote_interface_identifier>Set the local and/or remote 64-bit interface identifier. Either one may beomitted. The identifier must be specified in standard ascii notation ofIPv6 addresses (e.g. ::dead:beef). If the\fIipv6cp-use-ipaddr\fRoption is given, the local identifier is the local IPv4 address (see above).On systems which supports a unique persistent id, such as EUI-48 derivedfrom the Ethernet MAC address, \fIipv6cp-use-persistent\fR option can beused to replace the \fIipv6 <local>,<remote>\fR option. Otherwise theidentifier is randomized..TP.B active-filter \fIfilter-expressionSpecifies a packet filter to be applied to data packets to determinewhich packets are to be regarded as link activity, and therefore resetthe idle timer, or cause the link to be brought up in demand-diallingmode. This option is useful in conjunction with the\fBidle\fR option if there are packets being sent or receivedregularly over the link (for example, routing information packets)which would otherwise prevent the link from ever appearing to be idle.The \fIfilter-expression\fR syntax is as described for tcpdump(1),except that qualifiers which are inappropriate for a PPP link, such as\fBether\fR and \fBarp\fR, are not permitted. Generally the filterexpression should be enclosed in single-quotes to prevent whitespacein the expression from being interpreted by the shell. This optionis currently only available under NetBSD, and then onlyif both the kernel and pppd were compiled with PPP_FILTER defined..TP.B allow-ip \fIaddress(es)Allow peers to use the given IP address or subnet withoutauthenticating themselves. The parameter is parsed as for eachelement of the list of allowed IP addresses in the secrets files (seethe AUTHENTICATION section below)..TP.B bsdcomp \fInr,ntRequest that the peer compress packets that it sends, using theBSD-Compress scheme, with a maximum code size of \fInr\fR bits, andagree to compress packets sent to the peer with a maximum code size of\fInt\fR bits. If \fInt\fR is not specified, it defaults to the valuegiven for \fInr\fR. Values in the range 9 to 15 may be used for\fInr\fR and \fInt\fR; larger values give better compression butconsume more kernel memory for compression dictionaries.Alternatively, a value of 0 for \fInr\fR or \fInt\fR disablescompression in the corresponding direction. Use \fInobsdcomp\fR or\fIbsdcomp 0\fR to disable BSD-Compress compression entirely..TP.B cdtrctsUse a non-standard hardware flow control (i.e. DTR/CTS) to controlthe flow of data on the serial port. If neither the \fIcrtscts\fR,the \fInocrtscts\fR, the \fIcdtrcts\fR nor the \fInocdtrcts\fRoption is given, the hardware flow control setting for the serialport is left unchanged.Some serial ports (such as Macintosh serial ports) lack a trueRTS output. Such serial ports use this mode to implement truebi-directional flow control. The sacrifice is that this flowcontrol mode does not permit using DTR as a modem control line..TP.B chap-interval \fInIf this option is given, pppd will rechallenge the peer every \fIn\fRseconds..TP.B chap-max-challenge \fInSet the maximum number of CHAP challenge transmissions to \fIn\fR(default 10)..TP.B chap-restart \fInSet the CHAP restart interval (retransmission timeout for challenges)to \fIn\fR seconds (default 3)..TP.B connect-delay \fInWait for up \fIn\fR milliseconds after the connect script finishes fora valid PPP packet from the peer. At the end of this time, or when avalid PPP packet is received from the peer, pppd will commencenegotiation by sending its first LCP packet. The default value is1000 (1 second). This wait period only applies if the \fBconnect\fRor \fBpty\fR option is used..TP.B debugEnables connection debugging facilities.If this option is given, pppd will log the contents of allcontrol packets sent or received in a readable form. The packets arelogged through syslog with facility \fIdaemon\fR and level\fIdebug\fR. This information can be directed to a file by setting up/etc/syslog.conf appropriately (see syslog.conf(5))..TP.B default-asyncmapDisable asyncmap negotiation, forcing all control characters to beescaped for both the transmit and the receive direction..TP.B default-mruDisable MRU [Maximum Receive Unit] negotiation. With this option,pppd will use the default MRU value of 1500 bytes for both thetransmit and receive direction..TP.B deflate \fInr,ntRequest that the peer compress packets that it sends, using theDeflate scheme, with a maximum window size of \fI2**nr\fR bytes, andagree to compress packets sent to the peer with a maximum window sizeof \fI2**nt\fR bytes. If \fInt\fR is not specified, it defaults tothe value given for \fInr\fR. Values in the range 8 to 15 may be usedfor \fInr\fR and \fInt\fR; larger values give better compression butconsume more kernel memory for compression dictionaries.Alternatively, a value of 0 for \fInr\fR or \fInt\fR disablescompression in the corresponding direction. Use \fInodeflate\fR or\fIdeflate 0\fR to disable Deflate compression entirely. (Note: pppdrequests Deflate compression in preference to BSD-Compress if the peercan do either.).TP.B demandInitiate the link only on demand, i.e. when data traffic is present.With this option, the remote IP address must be specified by the useron the command line or in an options file. Pppd will initiallyconfigure the interface and enable it for IP traffic withoutconnecting to the peer. When traffic is available, pppd willconnect to the peer and perform negotiation, authentication, etc.When this is completed, pppd will commence passing data packets(i.e., IP packets) across the link.The \fIdemand\fR option implies the \fIpersist\fR option. If thisbehaviour is not desired, use the \fInopersist\fR option after the\fIdemand\fR option. The \fIidle\fR and \fIholdoff\fRoptions are also useful in conjuction with the \fIdemand\fR option..TP.B domain \fIdAppend the domain name \fId\fR to the local host name for authenticationpurposes. For example, if gethostname() returns the name porsche, butthe fully qualified domain name is porsche.Quotron.COM, you couldspecify \fIdomain Quotron.COM\fR. Pppd would then use the name\fIporsche.Quotron.COM\fR for looking up secrets in the secrets file,and as the default name to send to the peer when authenticating itselfto the peer. This option is privileged..TP.B hide-passwordWhen logging the contents of PAP packets, this option causes pppd toexclude the password string from the log. This is the default..TP.B holdoff \fInSpecifies how many seconds to wait before re-initiating the link afterit terminates. This option only has any effect if the \fIpersist\fRor \fIdemand\fR option is used. The holdoff period is not applied ifthe link was terminated because it was idle..TP.B idle \fInSpecifies that pppd should disconnect if the link is idle for \fIn\fRseconds. The link is idle when no data packets (i.e. IP packets) arebeing sent or received. Note: it is not advisable to use this optionwith the \fIpersist\fR option without the \fIdemand\fR option.If the \fBactive-filter\fRoption is given, data packets which are rejected by the specifiedactivity filter also count as the link being idle..TP.B ipcp-accept-localWith this option, pppd will accept the peer's idea of our local IPaddress, even if the local IP address was specified in an option..TP.B ipcp-accept-remoteWith this option, pppd will accept the peer's idea of its (remote) IPaddress, even if the remote IP address was specified in an option..TP.B ipcp-max-configure \fInSet the maximum number of IPCP configure-request transmissions to\fIn\fR (default 10)..TP.B ipcp-max-failure \fInSet the maximum number of IPCP configure-NAKs returned before startingto send configure-Rejects instead to \fIn\fR (default 10)..TP.B ipcp-max-terminate \fInSet the maximum number of IPCP terminate-request transmissions to\fIn\fR (default 3)..TP.B ipcp-restart \fInSet the IPCP restart interval (retransmission timeout) to \fIn\fRseconds (default 3)..TP.B ipparam \fIstringProvides an extra parameter to the ip-up and ip-down scripts. If thisoption is given, the \fIstring\fR supplied is given as the 6thparameter to those scripts..TP.B ipv6cp-max-configure \fInSet the maximum number of IPv6CP configure-request transmissions to\fIn\fR (default 10)..TP.B ipv6cp-max-failure \fInSet the maximum number of IPv6CP configure-NAKs returned before startingto send configure-Rejects instead to \fIn\fR (default 10)..TP.B ipv6cp-max-terminate \fInSet the maximum number of IPv6CP terminate-request transmissions to\fIn\fR (default 3)..TP.B ipv6cp-restart \fInSet the IPv6CP restart interval (retransmission timeout) to \fIn\fRseconds (default 3)..TP.B ipxEnable the IPXCP and IPX protocols. This option is presently onlysupported under Linux, and only if your kernel has been configured toinclude IPX support..TP.B ipx-network \fInSet the IPX network number in the IPXCP configure request frame to\fIn\fR, a hexadecimal number (without a leading 0x). There is novalid default. If this option is not specified, the network number isobtained from the peer. If the peer does not have the network number,the IPX protocol will not be started..TP.B ipx-node \fIn\fB:\fImSet the IPX node numbers. The two node numbers are separated from eachother with a colon character. The first number \fIn\fR is the localnode number. The second number \fIm\fR is the peer's node number. Eachnode number is a hexadecimal number, at most 10 digits long. The nodenumbers on the ipx-network must be unique. There is no validdefault. If this option is not specified then the node numbers areobtained from the peer..TP.B ipx-router-name \fI<string>Set the name of the router. This is a string and is sent to the peeras information data..TP.B ipx-routing \fInSet the routing protocol to be received by this option. More than oneinstance of \fIipx-routing\fR may be specified. The '\fInone\fR'option (0) may be specified as the only instance of ipx-routing. Thevalues may be \fI0\fR for \fINONE\fR, \fI2\fR for \fIRIP/SAP\fR, and\fI4\fR for \fINLSP\fR..TP.B ipxcp-accept-localAccept the peer's NAK for the node number specified in the ipx-nodeoption. If a node number was specified, and non-zero, the default isto insist that the value be used. If you include this option then youwill permit the peer to override the entry of the node number..TP.B ipxcp-accept-networkAccept the peer's NAK for the network number specified in theipx-network option. If a network number was specified, and non-zero, thedefault is to insist that the value be used. If you include thisoption then you will permit the peer to override the entry of the nodenumber..TP.B ipxcp-accept-remoteUse the peer's network number specified in the configure requestframe. If a node number was specified for the peer and this option wasnot specified, the peer will be forced to use the value which you havespecified..TP.B ipxcp-max-configure \fInSet the maximum number of IPXCP configure request frames which thesystem will send to \fIn\fR. The default is 10..TP.B ipxcp-max-failure \fInSet the maximum number of IPXCP NAK frames which the local system willsend before it rejects the options. The default value is 3..TP.B ipxcp-max-terminate \fInSet the maximum nuber of IPXCP terminate request frames before thelocal system considers that the peer is not listening to them. Thedefault value is 3..TP.B kdebug \fInEnable debugging code in the kernel-level PPP driver. The argument\fIn\fR is a number which is the sum of the following values: 1 toenable general debug messages, 2 to request that the contents ofreceived packets be printed, and 4 to request that the contents oftransmitted packets be printed. On most systems, messages printed bythe kernel are logged by syslog(1) to a file as directed in the/etc/syslog.conf configuration file..TP.B ktuneEnables pppd to alter kernel settings as appropriate. Under Linux,pppd will enable IP forwarding (i.e. set /proc/sys/net/ipv4/ip_forwardto 1) if the \fIproxyarp\fR option is used, and will enable thedynamic IP address option (i.e. set /proc/sys/net/ipv4/ip_dynaddr to1) in demand mode if the local address changes..TP.B lcp-echo-failure \fInIf this option is given, pppd will presume the peer to be deadif \fIn\fR LCP echo-requests are sent without receiving a valid LCPecho-reply. If this happens, pppd will terminate theconnection. Use of this option requires a non-zero value for the\fIlcp-echo-interval\fR parameter. This option can be used to enablepppd to terminate after the physical connection has been broken(e.g., the modem has hung up) in situations where no hardware modemcontrol lines are available..TP.B lcp-echo-interval \fInIf this option is given, pppd will send an LCP echo-request frame tothe peer every \fIn\fR seconds. Normally the peer should respond tothe echo-request by sending an echo-reply. This option can be usedwith the \fIlcp-echo-failure\fR option to detect that the peer is nolonger connected..TP.B lcp-max-configure \fInSet the maximum number of LCP configure-request transmissions to\fIn\fR (default 10)..TP.B lcp-max-failure \fInSet the maximum number of LCP configure-NAKs returned before startingto send configure-Rejects instead to \fIn\fR (default 10)..TP.B lcp-max-terminate \fInSet the maximum number of LCP terminate-request transmissions to\fIn\fR (default 3)..TP.B lcp-restart \fInSet the LCP restart interval (retransmission timeout) to \fIn\fRseconds (default 3)..TP.B linkname \fIname\fRSets the logical name of the link to \fIname\fR. Pppd will create afile named \fBppp-\fIname\fB.pid\fR in /var/run (or /etc/ppp on somesystems) containing its process ID. This can be useful in determiningwhich instance of pppd is responsible for the link to a given peersystem. This is a privileged option..TP.B localDon't use the modem control lines. With this option, pppd will ignorethe state of the CD (Carrier Detect) signal from the modem and willnot change the state of the DTR (Data Terminal Ready) signal..TP.B logfd \fInSend log messages to file descriptor \fIn\fR. Pppd will send logmessages to at most one file or file descriptor (as well as sendingthe log messages to syslog), so this option and the \fBlogfile\fRoption are mutually exclusive. The default is for pppd to send logmessages to stdout (file descriptor 1), unless the serial port isalready open on stdout..TP.B logfile \fIfilenameAppend log messages to the file \fIfilename\fR (as well as sending thelog messages to syslog). The file is opened with the privileges ofthe user who invoked pppd, in append mode..TP.B loginUse the system password database for authenticating the peer usingPAP, and record the user in the system wtmp file. Note that the peermust have an entry in the /etc/ppp/pap-secrets file as well as thesystem password database to be allowed access..TP.B maxconnect \fInTerminate the connection when it has been available for networktraffic for \fIn\fR seconds (i.e. \fIn\fR seconds after the firstnetwork control protocol comes up)..TP.B maxfail \fInTerminate after \fIn\fR consecutive failed connection attempts. Avalue of 0 means no limit. The default value is 10..TP.B modemUse the modem control lines. This option is the default. With thisoption, pppd will wait for the CD (Carrier Detect) signal from themodem to be asserted when opening the serial device (unless a connectscript is specified), and it will drop the DTR (Data Terminal Ready)signal briefly when the connection is terminated and before executingthe connect script. On Ultrix, this option implies hardware flowcontrol, as for the \fIcrtscts\fR option..TP.B ms-dns \fI<addr>If pppd is acting as a server for Microsoft Windows clients, thisoption allows pppd to supply one or two DNS (Domain Name Server)addresses to the clients. The first instance of this option specifiesthe primary DNS address; the second instance (if given) specifies thesecondary DNS address. (This option was present in some olderversions of pppd under the name \fBdns-addr\fR.).TP.B ms-wins \fI<addr>If pppd is acting as a server for Microsoft Windows or "Samba"clients, this option allows pppd to supply one or two WINS (WindowsInternet Name Services) server addresses to the clients. The firstinstance of this option specifies the primary WINS address; the secondinstance (if given) specifies the secondary WINS address..TP.B name \fInameSet the name of the local system for authentication purposes to\fIname\fR. This is a privileged option. With this option, pppd willuse lines in the secrets files which have \fIname\fR as the secondfield when looking for a secret to use in authenticating the peer. Inaddition, unless overridden with the \fIuser\fR option, \fIname\fRwill be used as the name to send to the peer when authenticating thelocal system to the peer. (Note that pppd does not append the domainname to \fIname\fR.).TP.B netmask \fInSet the interface netmask to \fIn\fR, a 32 bit netmask in "decimal dot"notation (e.g. 255.255.255.0). If this option is given, the valuespecified is ORed with the default netmask. The default netmask ischosen based on the negotiated remote IP address; it is theappropriate network mask for the class of the remote IP address, ORedwith the netmasks for any non point-to-point network interfaces in thesystem which are on the same network. (Note: on some platforms, pppdwill always use 255.255.255.255 for the netmask, if that is the onlyappropriate value for a point-to-point interface.).TP.B noaccompDisable Address/Control compression in both directions (send andreceive)..TP.B noauthDo not require the peer to authenticate itself. This option isprivileged..TP.B nobsdcompDisables BSD-Compress compression; \fBpppd\fR will not request oragree to compress packets using the BSD-Compress scheme..TP.B noccpDisable CCP (Compression Control Protocol) negotiation. This optionshould only be required if the peer is buggy and gets confused byrequests from pppd for CCP negotiation..TP.B nocrtsctsDisable hardware flow control (i.e. RTS/CTS) on the serial port.If neither the \fIcrtscts\fR nor the \fInocrtscts\fR nor the\fIcdtrcts\fR nor the \fInodtrcts\fR option is given, the hardwareflow control setting for the serial port is left unchanged..TP.B nodtrctsThis option is a synonym for \fInocrtscts\fR. Either of these options willdisable both forms of hardware flow control..TP.B nodefaultrouteDisable the \fIdefaultroute\fR option. The system administrator whowishes to prevent users from creating default routes with pppdcan do so by placing this option in the /etc/ppp/options file..TP.B nodeflateDisables Deflate compression; pppd will not request or agree tocompress packets using the Deflate scheme..TP.B nodetachDon't detach from the controlling terminal. Without this option, if aserial device other than the terminal on the standard input isspecified, pppd will fork to become a background process..TP.B noipDisable IPCP negotiation and IP communication. This option shouldonly be required if the peer is buggy and gets confused by requestsfrom pppd for IPCP negotiation..TP.B noipv6Disable IPv6CP negotiation and IPv6 communication. This option shouldonly be required if the peer is buggy and gets confused by requestsfrom pppd for IPv6CP negotiation..TP.B noipdefaultDisables the default behaviour when no local IP address is specified,which is to determine (if possible) the local IP address from thehostname. With this option, the peer will have to supply the local IPaddress during IPCP negotiation (unless it specified explicitly on thecommand line or in an options file)..TP.B noipxDisable the IPXCP and IPX protocols. This option should only berequired if the peer is buggy and gets confused by requests from pppdfor IPXCP negotiation..TP.B noktuneOpposite of the \fIktune\fR option; disables pppd from changing systemsettings..TP.B nologDo not send log messages to a file or file descriptor. This optioncancels the \fBlogfd\fR and \fBlogfile\fR options..B nomagicDisable magic number negotiation. With this option, pppd cannotdetect a looped-back line. This option should only be needed if thepeer is buggy..TP.B nopcompDisable protocol field compression negotiation in both the receive andthe transmit direction..TP.B nopersistExit once a connection has been made and terminated. This is thedefault unless the \fIpersist\fR or \fIdemand\fR option has beenspecified..TP.B nopredictor1Do not accept or agree to Predictor-1 compression..TP.B noproxyarpDisable the \fIproxyarp\fR option. The system administrator whowishes to prevent users from creating proxy ARP entries with pppd cando so by placing this option in the /etc/ppp/options file..TP.B nottyNormally, pppd requires a terminal device. With this option, pppdwill allocate itself a pseudo-tty master/slave pair and use the slaveas its terminal device. Pppd will create a child process to act as a`character shunt' to transfer characters between the pseudo-tty masterand its standard input and output. Thus pppd will transmit characterson its standard output and receive characters on its standard inputeven if they are not terminal devices. This option increases thelatency and CPU overhead of transferring data over the ppp interfaceas all of the characters sent and received must flow through thecharacter shunt process. An explicit device name may not be given ifthis option is used..TP.B novjDisable Van Jacobson style TCP/IP header compression in both thetransmit and the receive direction..TP.B novjccompDisable the connection-ID compression option in Van Jacobson styleTCP/IP header compression. With this option, pppd will not omit theconnection-ID byte from Van Jacobson compressed TCP/IP headers, norask the peer to do so..TP.B papcryptIndicates that all secrets in the /etc/ppp/pap-secrets file which areused for checking the identity of the peer are encrypted, and thuspppd should not accept a password which, before encryption, isidentical to the secret from the /etc/ppp/pap-secrets file..TP.B pap-max-authreq \fInSet the maximum number of PAP authenticate-request transmissions to\fIn\fR (default 10)..TP.B pap-restart \fInSet the PAP restart interval (retransmission timeout) to \fIn\fRseconds (default 3)..TP.B pap-timeout \fInSet the maximum time that pppd will wait for the peer to authenticateitself with PAP to \fIn\fR seconds (0 means no limit)..TP.B pass-filter \fIfilter-expressionSpecifies a packet filter to applied to data packets being sent orreceived to determine which packets should be allowed to pass.Packets which are rejected by the filter are silently discarded. Thisoption can be used to prevent specific network daemons (such asrouted) using up link bandwidth, or to provide a basic firewallcapability.The \fIfilter-expression\fR syntax is as described for tcpdump(1),except that qualifiers which are inappropriate for a PPP link, such as\fBether\fR and \fBarp\fR, are not permitted. Generally the filterexpression should be enclosed in single-quotes to prevent whitespacein the expression from being interpreted by the shell. Note that itis possible to apply different constraints to incoming and outgoingpackets using the \fBinbound\fR and \fBoutbound\fR qualifiers. Thisoption is currently only available under NetBSD, and then only if boththe kernel and pppd were compiled with PPP_FILTER defined..TP.B persistDo not exit after a connection is terminated; instead try to reopenthe connection..TP.B plugin \fIfilenameLoad the shared library object file \fIfilename\fR as a plugin. Thisis a privileged option..TP.B predictor1Request that the peer compress frames that it sends using Predictor-1compression, and agree to compress transmitted frames with Predictor-1if requested. This option has no effect unless the kernel driversupports Predictor-1 compression..TP.B privgroup \fIgroup-nameAllows members of group \fIgroup-name\fR to use privileged options.This is a privileged option. Use of this option requires care asthere is no guarantee that members of \fIgroup-name\fR cannot use pppdto become root themselves. Consider it equivalent to putting themembers of \fIgroup-name\fR in the kmem or disk group..TP.B proxyarpAdd an entry to this system's ARP [Address Resolution Protocol] tablewith the IP address of the peer and the Ethernet address of thissystem. This will have the effect of making the peer appear to othersystems to be on the local ethernet..TP.B pty \fIscriptSpecifies that the command \fIscript\fR is to be used to communicaterather than a specific terminal device. Pppd will allocate itself apseudo-tty master/slave pair and use the slave as its terminaldevice. The \fIscript\fR will be run in a child process with thepseudo-tty master as its standard input and output. An explicitdevice name may not be given if this option is used. (Note: if the\fIrecord\fR option is used in conjuction with the \fIpty\fR option,the child process will have pipes on its standard input and output.).TP.B receive-allWith this option, pppd will accept all control characters from thepeer, including those marked in the receive asyncmap. Without thisoption, pppd will discard those characters as specified in RFC1662.This option should only be needed if the peer is buggy..TP.B record \fIfilenameSpecifies that pppd should record all characters sent and received toa file named \fIfilename\fR. This file is opened in append mode,using the user's user-ID and permissions. This option is implementedusing a pseudo-tty and a process to transfer characters between thepseudo-tty and the real serial device, so it will increase the latencyand CPU overhead of transferring data over the ppp interface. Thecharacters are stored in a tagged format with timestamps, which can bedisplayed in readable form using the pppdump(8) program..TP.B remotename \fInameSet the assumed name of the remote system for authentication purposesto \fIname\fR..TP.B refuse-chapWith this option, pppd will not agree to authenticate itself to thepeer using CHAP..TP.B refuse-papWith this option, pppd will not agree to authenticate itself to thepeer using PAP..TP.B require-chapRequire the peer to authenticate itself using CHAP [ChallengeHandshake Authentication Protocol] authentication..TP.B require-papRequire the peer to authenticate itself using PAP [PasswordAuthentication Protocol] authentication..TP.B show-passwordWhen logging the contents of PAP packets, this option causes pppd toshow the password string in the log message..TP.B silentWith this option, pppd will not transmit LCP packets to initiate aconnection until a valid LCP packet is received from the peer (as forthe `passive' option with ancient versions of pppd)..TP.B syncUse synchronous HDLC serial encoding instead of asynchronous.The device used by pppd with this option must have sync support.Currently supports Microgate SyncLink adaptersunder Linux and FreeBSD 2.2.8 and later..TP.B updetachWith this option, pppd will detach from its controlling terminal onceit has successfully established the ppp connection (to the point wherethe first network control protocol, usually the IP control protocol,has come up)..TP.B usehostnameEnforce the use of the hostname (with domain name appended, if given)as the name of the local system for authentication purposes (overridesthe \fIname\fR option). This option is not normally needed since the\fIname\fR option is privileged..TP.B usepeerdnsAsk the peer for up to 2 DNS server addresses. The addresses suppliedby the peer (if any) are passed to the /etc/ppp/ip-up script in theenvironment variables DNS1 and DNS2. In addition, pppd will create an/etc/ppp/resolv.conf file containing one or two nameserver lines withthe address(es) supplied by the peer..TP.B user \fInameSets the name used for authenticating the local system to the peer to\fIname\fR..TP.B vj-max-slots \fInSets the number of connection slots to be used by the Van JacobsonTCP/IP header compression and decompression code to \fIn\fR, whichmust be between 2 and 16 (inclusive)..TP.B welcome \fIscriptRun the executable or shell command specified by \fIscript\fR beforeinitiating PPP negotiation, after the connect script (if any) hascompleted. A value for this option from a privileged source cannot beoverridden by a non-privileged user..TP.B xonxoffUse software flow control (i.e. XON/XOFF) to control the flow of data onthe serial port..SH OPTIONS FILESOptions can be taken from files as well as the command line. Pppdreads options from the files /etc/ppp/options, ~/.ppprc and/etc/ppp/options.\fIttyname\fR (in that order) before processing theoptions on the command line. (In fact, the command-line options arescanned to find the terminal name before the options.\fIttyname\fRfile is read.) In forming the name of the options.\fIttyname\fR file,the initial /dev/ is removed from the terminal name, and any remaining/ characters are replaced with dots..PPAn options file is parsed into a series of words, delimited bywhitespace. Whitespace can be included in a word by enclosing theword in double-quotes ("). A backslash (\\) quotes the following character.A hash (#) starts a comment, which continues until the end of theline. There is no restriction on using the \fIfile\fR or \fIcall\fRoptions within an options file..SH SECURITY.I pppdprovides system administrators with sufficient access control that PPPaccess to a server machine can be provided to legitimate users withoutfear of compromising the security of the server or the network it'son. This control is provided through restrictions on which IPaddresses the peer may use, based on its authenticated identity (ifany), and through restrictions on which options a non-privileged usermay use. Several of pppd's options are privileged, in particularthose which permit potentially insecure configurations; these optionsare only accepted in files which are under the control of the systemadministrator, or if pppd is being run by root..PPThe default behaviour of pppd is to allow an unauthenticated peer touse a given IP address only if the system does not already have aroute to that IP address. For example, a system with apermanent connection to the wider internet will normally have adefault route, and thus all peers will have to authenticate themselvesin order to set up a connection. On such a system, the \fIauth\fRoption is the default. On the other hand, a system where thePPP link is the only connection to the internet will not normally havea default route, so the peer will be able to use almost any IP addresswithout authenticating itself..PPAs indicated above, some security-sensitive options are privileged,which means that they may not be used by an ordinary non-privilegeduser running a setuid-root pppd, either on the command line, in theuser's ~/.ppprc file, or in an options file read using the \fIfile\fRoption. Privileged options may be used in /etc/ppp/options file or inan options file read using the \fIcall\fR option. If pppd is beingrun by the root user, privileged options can be used withoutrestriction..PPWhen opening the device, pppd uses either the invoking user's user IDor the root UID (that is, 0), depending on whether the device name wasspecified by the user or the system administrator. If the device namecomes from a privileged source, that is, /etc/ppp/options or anoptions file read using the \fIcall\fR option, pppd uses full rootprivileges when opening the device. Thus, by creating an appropriatefile under /etc/ppp/peers, the system administrator can allow users toestablish a ppp connection via a device which they would not normallyhave permission to access. Otherwise pppd uses the invoking user'sreal UID when opening the device..SH AUTHENTICATIONAuthentication is the process whereby one peer convinces the other ofits identity. This involves the first peer sending its name to theother, together with some kind of secret information which could onlycome from the genuine authorized user of that name. In such anexchange, we will call the first peer the "client" and the other the"server". The client has a name by which it identifies itself to theserver, and the server also has a name by which it identifies itselfto the client. Generally the genuine client shares some secret (orpassword) with the server, and authenticates itself by proving that itknows that secret. Very often, the names used for authenticationcorrespond to the internet hostnames of the peers, but this is notessential..LPAt present, pppd supports two authentication protocols: the PasswordAuthentication Protocol (PAP) and the Challenge HandshakeAuthentication Protocol (CHAP). PAP involves the client sending itsname and a cleartext password to the server to authenticate itself.In contrast, the server initiates the CHAP authentication exchange bysending a challenge to the client (the challenge packet includes theserver's name). The client must respond with a response whichincludes its name plus a hash value derived from the shared secret andthe challenge, in order to prove that it knows the secret..LPThe PPP protocol, being symmetrical, allows both peers to require theother to authenticate itself. In that case, two separate andindependent authentication exchanges will occur. The two exchangescould use different authentication protocols, and in principle,different names could be used in the two exchanges..LPThe default behaviour of pppd is to agree to authenticate ifrequested, and to not require authentication from the peer. However,pppd will not agree to authenticate itself with a particular protocolif it has no secrets which could be used to do so..LPPppd stores secrets for use in authentication in secretsfiles (/etc/ppp/pap-secrets for PAP, /etc/ppp/chap-secrets for CHAP).Both secrets files have the same format. The secrets files cancontain secrets for pppd to use in authenticating itself to othersystems, as well as secrets for pppd to use when authenticating othersystems to itself..LPEach line in a secrets file contains one secret. A given secret isspecific to a particular combination of client and server - it canonly be used by that client to authenticate itself to that server.Thus each line in a secrets file has at least 3 fields: the name ofthe client, the name of the server, and the secret. These fields maybe followed by a list of the IP addresses that the specified clientmay use when connecting to the specified server..LPA secrets file is parsed into words as for a options file, so theclient name, server name and secrets fields must each be one word,with any embedded spaces or other special characters quoted orescaped. Note that case is significant in the client and server namesand in the secret..LPIf the secret starts with an `@', what follows is assumed to be thename of a file from which to read the secret. A "*" as the client orserver name matches any name. When selecting a secret, pppd takes thebest match, i.e. the match with the fewest wildcards..LPAny following words on the same line are taken to be a list ofacceptable IP addresses for that client. If there are only 3 words onthe line, or if the first word is "-", then all IP addresses aredisallowed. To allow any address, use "*". A word starting with "!"indicates that the specified address is \fInot\fR acceptable. Anaddress may be followed by "/" and a number \fIn\fR, to indicate awhole subnet, i.e. all addresses which have the same value in the mostsignificant \fIn\fR bits. In this form, the address may be followedby a plus sign ("+") to indicate that one address from the subnet isauthorized, based on the ppp network interface unit number in use.In this case, the host part of the address will be set to the unitnumber plus one..LPThus a secrets file contains both secrets for use in authenticatingother hosts, plus secrets which we use for authenticating ourselves toothers. When pppd is authenticating the peer (checking the peer'sidentity), it chooses a secret with the peer's name in the firstfield and the name of the local system in the second field. Thename of the local system defaults to the hostname, with the domainname appended if the \fIdomain\fR option is used. This default can beoverridden with the \fIname\fR option, except when the\fIusehostname\fR option is used..LPWhen pppd is choosing a secret to use in authenticating itself to thepeer, it first determines what name it is going to use to identifyitself to the peer. This name can be specified by the user with the\fIuser\fR option. If this option is not used, the name defaults tothe name of the local system, determined as described in the previousparagraph. Then pppd looks for a secret with this name in the firstfield and the peer's name in the second field. Pppd will know thename of the peer if CHAP authentication is being used, because thepeer will have sent it in the challenge packet. However, if PAP is beingused, pppd will have to determine the peer's name from the optionsspecified by the user. The user can specify the peer's name directlywith the \fIremotename\fR option. Otherwise, if the remote IP addresswas specified by a name (rather than in numeric form), that name willbe used as the peer's name. Failing that, pppd will use the nullstring as the peer's name..LPWhen authenticating the peer with PAP, the supplied password is firstcompared with the secret from the secrets file. If the passworddoesn't match the secret, the password is encrypted using crypt() andchecked against the secret again. Thus secrets for authenticating thepeer can be stored in encrypted form if desired. If the\fIpapcrypt\fR option is given, the first (unencrypted) comparison isomitted, for better security..LPFurthermore, if the \fIlogin\fR option was specified, the username andpassword are also checked against the system password database. Thus,the system administrator can set up the pap-secrets file to allow PPPaccess only to certain users, and to restrict the set of IP addressesthat each user can use. Typically, when using the \fIlogin\fR option,the secret in /etc/ppp/pap-secrets would be "", which will match anypassword supplied by the peer. This avoids the need to have the samesecret in two places..LPAuthentication must be satisfactorily completed before IPCP (or anyother Network Control Protocol) can be started. If the peer isrequired to authenticate itself, and fails to do so, pppd willterminated the link (by closing LCP). If IPCP negotiates anunacceptable IP address for the remote host, IPCP will be closed. IPpackets can only be sent or received when IPCP is open..LPIn some cases it is desirable to allow some hosts which can'tauthenticate themselves to connect and use one of a restricted set ofIP addresses, even when the local host generally requiresauthentication. If the peer refuses to authenticate itself whenrequested, pppd takes that as equivalent to authenticating with PAPusing the empty string for the username and password. Thus, by addinga line to the pap-secrets file which specifies the empty string forthe client and password, it is possible to allow restricted access tohosts which refuse to authenticate themselves..SH ROUTING.LPWhen IPCP negotiation is completed successfully, pppd will inform thekernel of the local and remote IP addresses for the ppp interface.This is sufficient to create a host route to the remote end of thelink, which will enable the peers to exchange IP packets.Communication with other machines generally requires furthermodification to routing tables and/or ARP (Address ResolutionProtocol) tables. In most cases the \fIdefaultroute\fR and/or\fIproxyarp\fR options are sufficient for this, but in some casesfurther intervention is required. The /etc/ppp/ip-up script can beused for this..LPSometimes it is desirable to add a default route through the remotehost, as in the case of a machine whose only connection to theInternet is through the ppp interface. The \fIdefaultroute\fR optioncauses pppd to create such a default route when IPCP comes up, anddelete it when the link is terminated..LPIn some cases it is desirable to use proxy ARP, for example on aserver machine connected to a LAN, in order to allow other hosts tocommunicate with the remote host. The \fIproxyarp\fR option causespppd to look for a network interface on the same subnet as the remotehost (an interface supporting broadcast and ARP, which is up and not apoint-to-point or loopback interface). If found, pppd creates apermanent, published ARP entry with the IP address of the remote hostand the hardware address of the network interface found..LPWhen the \fIdemand\fR option is used, the interface IP addresses havealready been set at the point when IPCP comes up. If pppd has notbeen able to negotiate the same addresses that it used to configurethe interface (for example when the peer is an ISP that uses dynamicIP address assignment), pppd has to change the interface IP addressesto the negotiated addresses. This may disrupt existing connections,and the use of demand dialling with peers that do dynamic IP addressassignment is not recommended..SH EXAMPLES.LPThe following examples assume that the /etc/ppp/options file containsthe \fIauth\fR option (as in the default /etc/ppp/options file in theppp distribution)..LPProbably the most common use of pppd is to dial out to an ISP. Thiscan be done with a command such as.IPpppd call isp.LPwhere the /etc/ppp/peers/isp file is set up by the systemadministrator to contain something like this:.IPttyS0 19200 crtscts.brconnect '/usr/sbin/chat -v -f /etc/ppp/chat-isp'.brnoauth.LPIn this example, we are using chat to dial the ISP's modem and gothrough any logon sequence required. The /etc/ppp/chat-isp filecontains the script used by chat; it could for example containsomething like this:.IPABORT "NO CARRIER".brABORT "NO DIALTONE".brABORT "ERROR".brABORT "NO ANSWER".brABORT "BUSY".brABORT "Username/Password Incorrect".br"" "at".brOK "at&d0&c1".brOK "atdt2468135".br"name:" "^Umyuserid".br"word:" "\\qmypassword".br"ispts" "\\q^Uppp".br"~-^Uppp-~".LPSee the chat(8) man page for details of chat scripts..LPPppd can also be used to provide a dial-in ppp service for users. Ifthe users already have login accounts, the simplest way to set up theppp service is to let the users log in to their accounts and run pppd(installed setuid-root) with a command such as.IPpppd proxyarp.LPTo allow a user to use the PPP facilities, you need to allocate an IPaddress for that user's machine and create an entry in/etc/ppp/pap-secrets or /etc/ppp/chap-secrets (depending on whichauthentication method the PPP implementation on the user's machinesupports), so that the user'smachine can authenticate itself. For example, if Joe has a machinecalled "joespc" which is to be allowed to dial in to the machinecalled "server" and use the IP address joespc.my.net, you would add anentry like this to /etc/ppp/pap-secrets or /etc/ppp/chap-secrets:.IPjoespc server "joe's secret" joespc.my.net.LPAlternatively, you can create a username called (for example) "ppp",whose login shell is pppd and whose home directory is /etc/ppp.Options to be used when pppd is run this way can be put in/etc/ppp/.ppprc..LPIf your serial connection is any more complicated than a piece ofwire, you may need to arrange for some control characters to beescaped. In particular, it is often useful to escape XON (^Q) andXOFF (^S), using \fIasyncmap a0000\fR. If the path includes a telnet,you probably should escape ^] as well (\fIasyncmap 200a0000\fR). Ifthe path includes an rlogin, you will need to use the \fIescape ff\fRoption on the end which is running the rlogin client, since manyrlogin implementations are not transparent; they will remove thesequence [0xff, 0xff, 0x73, 0x73, followed by any 8 bytes] from thestream..SH DIAGNOSTICS.LPMessages are sent to the syslog daemon using facility LOG_DAEMON.(This can be overriden by recompiling pppd with the macroLOG_PPP defined as the desired facility.) In order to see the errorand debug messages, you will need to edit your /etc/syslog.conf fileto direct the messages to the desired output device or file..LPThe \fIdebug\fR option causes the contents of all control packets sentor received to be logged, that is, all LCP, PAP, CHAP or IPCP packets.This can be useful if the PPP negotiation does not succeed or ifauthentication fails.If debugging is enabled at compile time, the \fIdebug\fR option alsocauses other debugging messages to be logged..LPDebugging can also be enabled or disabled by sending a SIGUSR1 signalto the pppd process. This signal acts as a toggle..SH EXIT STATUSThe exit status of pppd is set to indicate whether any error wasdetected, or the reason for the link being terminated. The valuesused are:.TP.B 0Pppd has detached, or otherwise the connection was successfullyestablished and terminated at the peer's request..TP.B 1An immediately fatal error of some kind occurred, such as an essentialsystem call failing, or running out of virtual memory..TP.B 2An error was detected in processing the options given, such as twomutually exclusive options being used..TP.B 3Pppd is not setuid-root and the invoking user is not root..TP.B 4The kernel does not support PPP, for example, the PPP kernel driver isnot included or cannot be loaded..TP.B 5Pppd terminated because it was sent a SIGINT, SIGTERM or SIGHUPsignal..TP.B 6The serial port could not be locked..TP.B 7The serial port could not be opened..TP.B 8The connect script failed (returned a non-zero exit status)..TP.B 9The command specified as the argument to the \fIpty\fR option couldnot be run..TP.B 10The PPP negotiation failed, that is, it didn't reach the point whereat least one network protocol (e.g. IP) was running..TP.B 11The peer system failed (or refused) to authenticate itself..TP.B 12The link was established successfully and terminated because it wasidle..TP.B 13The link was established successfully and terminated because theconnect time limit was reached..TP.B 14Callback was negotiated and an incoming call should arrive shortly..TP.B 15The link was terminated because the peer is not responding to echorequests..TP.B 16The link was terminated by the modem hanging up..TP.B 17The PPP negotiation failed because serial loopback was detected..TP.B 18The init script failed (returned a non-zero exit status)..TP.B 19We failed to authenticate ourselves to the peer..SH SCRIPTSPppd invokes scripts at various stages in its processing which can beused to perform site-specific ancillary processing. These scripts areusually shell scripts, but could be executable code files instead.Pppd does not wait for the scripts to finish. The scripts areexecuted as root (with the real and effective user-id set to 0), sothat they can do things such as update routing tables or runprivileged daemons. Be careful that the contents of these scripts donot compromise your system's security. Pppd runs the scripts withstandard input, output and error redirected to /dev/null, and with anenvironment that is empty except for some environment variables thatgive information about the link. The environment variables that pppdsets are:.TP.B DEVICEThe name of the serial tty device being used..TP.B IFNAMEThe name of the network interface being used..TP.B IPLOCALThe IP address for the local end of the link. This is only set whenIPCP has come up..TP.B IPREMOTEThe IP address for the remote end of the link. This is only set whenIPCP has come up..TP.B PEERNAMEThe authenticated name of the peer. This is only set if the peerauthenticates itself..TP.B SPEEDThe baud rate of the tty device..TP.B ORIG_UIDThe real user-id of the user who invoked pppd..TP.B PPPLOGNAMEThe username of the real user-id that invoked pppd. This is always set..PFor the ip-down and auth-down scripts, pppd also sets the followingvariables giving statistics for the connection:.TP.B CONNECT_TIMEThe number of seconds from when the PPP negotiation started until theconnection was terminated..TP.B BYTES_SENTThe number of bytes sent (at the level of the serial port) during theconnection..TP.B BYTES_RCVDThe number of bytes received (at the level of the serial port) duringthe connection..TP.B LINKNAMEThe logical name of the link, set with the \fIlinkname\fR option..PPppd invokes the following scripts, if they exist. It is not an errorif they don't exist..TP.B /etc/ppp/auth-upA program or script which is executed after the remote systemsuccessfully authenticates itself. It is executed with the parameters.IP\fIinterface-name peer-name user-name tty-device speed\fR.IPNote that this script is not executed if the peer doesn't authenticateitself, for example when the \fInoauth\fR option is used..TP.B /etc/ppp/auth-downA program or script which is executed when the link goes down, if/etc/ppp/auth-up was previously executed. It is executed in the samemanner with the same parameters as /etc/ppp/auth-up..TP.B /etc/ppp/ip-upA program or script which is executed when the link is available forsending and receiving IP packets (that is, IPCP has come up). It isexecuted with the parameters.IP\fIinterface-name tty-device speed local-IP-addressremote-IP-address ipparam\fR.TP.B /etc/ppp/ip-downA program or script which is executed when the link is no longeravailable for sending and receiving IP packets. This script can beused for undoing the effects of the /etc/ppp/ip-up script. It isinvoked in the same manner and with the same parameters as the ip-upscript..TP.B /etc/ppp/ipv6-upLike /etc/ppp/ip-up, except that it is executed when the link is availablefor sending and receiving IPv6 packets. It is executed with the parameters.IP\fIinterface-name tty-device speed local-link-local-addressremote-link-local-address ipparam\fR.TP.B /etc/ppp/ipv6-downSimilar to /etc/ppp/ip-down, but it is executed when IPv6 packets can nolonger be transmitted on the link. It is executed with the same parametersas the ipv6-up script..TP.B /etc/ppp/ipx-upA program or script which is executed when the link is available forsending and receiving IPX packets (that is, IPXCP has come up). It isexecuted with the parameters.IP\fIinterface-name tty-device speed network-number local-IPX-node-addressremote-IPX-node-address local-IPX-routing-protocol remote-IPX-routing-protocollocal-IPX-router-name remote-IPX-router-name ipparam pppd-pid\fR.IPThe local-IPX-routing-protocol and remote-IPX-routing-protocol fieldmay be one of the following:.IPNONE to indicate that there is no routing protocol.brRIP to indicate that RIP/SAP should be used.brNLSP to indicate that Novell NLSP should be used.brRIP NLSP to indicate that both RIP/SAP and NLSP should be used.TP.B /etc/ppp/ipx-downA program or script which is executed when the link is no longeravailable for sending and receiving IPX packets. This script can beused for undoing the effects of the /etc/ppp/ipx-up script. It isinvoked in the same manner and with the same parameters as the ipx-upscript..SH FILES.TP.B /var/run/ppp\fIn\fB.pid \fR(BSD or Linux), \fB/etc/ppp/ppp\fIn\fB.pid \fR(others)Process-ID for pppd process on ppp interface unit \fIn\fR..TP.B /var/run/ppp-\fIname\fB.pid \fR(BSD or Linux), \fB/etc/ppp/ppp-\fIname\fB.pid \fR(others)Process-ID for pppd process for logical link \fIname\fR (see the\fIlinkname\fR option)..TP.B /etc/ppp/pap-secretsUsernames, passwords and IP addresses for PAP authentication. Thisfile should be owned by root and not readable or writable by any otheruser. Pppd will log a warning if this is not the case..TP.B /etc/ppp/chap-secretsNames, secrets and IP addresses for CHAP authentication. As for/etc/ppp/pap-secrets, this file should be owned by root and notreadable or writable by any other user. Pppd will log a warning ifthis is not the case..TP.B /etc/ppp/optionsSystem default options for pppd, read before user default options orcommand-line options..TP.B ~/.ppprcUser default options, read before /etc/ppp/options.\fIttyname\fR..TP.B /etc/ppp/options.\fIttynameSystem default options for the serial port being used, read after~/.ppprc. In forming the \fIttyname\fR part of thisfilename, an initial /dev/ is stripped from the port name (ifpresent), and any slashes in the remaining part are converted todots..TP.B /etc/ppp/peersA directory containing options files which may contain privilegedoptions, even if pppd was invoked by a user other than root. Thesystem administrator can create options files in this directory topermit non-privileged users to dial out without requiring the peer toauthenticate, but only to certain trusted peers..SH SEE ALSO.TP.B RFC1144Jacobson, V.\fICompressing TCP/IP headers for low-speed serial links.\fRFebruary 1990..TP.B RFC1321Rivest, R..I The MD5 Message-Digest Algorithm.April 1992..TP.B RFC1332McGregor, G..I PPP Internet Protocol Control Protocol (IPCP).May 1992..TP.B RFC1334Lloyd, B.; Simpson, W.A..I PPP authentication protocols.October 1992..TP.B RFC1661Simpson, W.A..I The Point\-to\-Point Protocol (PPP).July 1994..TP.B RFC1662Simpson, W.A..I PPP in HDLC-like Framing.July 1994..TP.B RFC2472Haskin, D..I IP Version 6 over PPPDecember 1998..SH NOTESThe following signals have the specified effect when sent to pppd..TP.B SIGINT, SIGTERMThese signals cause pppd to terminate the link (by closing LCP),restore the serial device settings, and exit..TP.B SIGHUPThis signal causes pppd to terminate the link, restore the serialdevice settings, and close the serial device. If the \fIpersist\fR or\fIdemand\fR option has been specified, pppd will try to reopen theserial device and start another connection (after the holdoff period).Otherwise pppd will exit. If this signal is received during theholdoff period, it causes pppd to end the holdoff period immediately..TP.B SIGUSR1This signal toggles the state of the \fIdebug\fR option..TP.B SIGUSR2This signal causes pppd to renegotiate compression. This can beuseful to re-enable compression after it has been disabled as a resultof a fatal decompression error. (Fatal decompression errors generallyindicate a bug in one or other implementation.).SH AUTHORSPaul Mackerras (Paul.Mackerras@cs.anu.edu.au), based on earlier work byDrew Perkins,Brad Clements,Karl Fox,Greg Christy,andBrad Parker.
