Commit Graph

36 Commits

Author SHA1 Message Date
brian
7f1d30def4 Fix a bug (dereferencing zero) introduced by the last mods.
Submitted by:	David Nugent <davidn@labs.usn.blaze.net.au>
1997-05-13 20:34:01 +00:00
brian
3804775c03 Ouch. This was dying to cause problems !
Luckily the side-effects were what was
intended.
1997-05-10 03:44:50 +00:00
brian
fe847bc135 Make the explanation of the -detach option clearer.
PR:		1674
Submitted by:	Slaven Rezic <eserte@cabulja.herceg.de>
1997-05-07 23:54:56 +00:00
danny
0f60b61dda Suggested by: David Nugent
Use /etc/ppp/ppp.deny instead of /etc/ppp/ppp.disabled
1997-04-16 02:07:10 +00:00
danny
bef64f7791 Reviewed by: Brian Somers <brian@freebsd.org>
pppd now creates /var/run/ttyXn.if file containing the interface name;
check that a 'login' user is not listed in /etc/ppp/ppp.disabled;
check that a 'login' user's shell is listed in /etc/ppp/ppp.shells;
make sure that passwordless 'login' logins are recorded in wtmp and
utmp.
1997-04-15 07:00:35 +00:00
brian
5b8c55b34e Allow forcing of local_ip:remote_ip in pap-secrets
and chap-secrets files.  This allows specific users
to have pre-allocated IP numbers while others get
assigned dynamically.

Submitted by: David Nugent <davidn@unique.usn.blaze.net.au>
1997-04-13 01:07:00 +00:00
peter
b782f4df30 Revert $FreeBSD$ to $Id$ 1997-02-22 16:15:28 +00:00
brian
ca71d718ab Connections are timed and the call duration is logged
via syslog.
Submitted by:	 Lars Fredriksen <fredriks@mcs.com>
Obtained from:	 Lars Fredriksen <fredriks@mcs.com>
1997-02-09 18:34:25 +00:00
jkh
808a36ef65 Make the long-awaited change from $Id$ to $FreeBSD$
This will make a number of things easier in the future, as well as (finally!)
avoiding the Id-smashing problem which has plagued developers for so long.

Boy, I'm glad we're not using sup anymore.  This update would have been
insane otherwise.
1997-01-14 07:20:47 +00:00
wollman
5972643f58 Update to match changes in <net/if.h>. 1997-01-03 20:19:50 +00:00
msmith
052fd9ee5f Cosmetic fix for pppd; login() updates both utmp and wtmp, so don't
call logwtmp() again ourselves.  This avoids 'last' showing duplicate
logins.

Submitted by:	Daniel O'Callaghan <danny@hilink.com.au>
1996-12-31 01:17:07 +00:00
pst
3edb536d3f Manage UTMP entry if we're doing username/password PAP logins 1996-11-13 01:33:10 +00:00
scrappy
5371bc9b5c Fixes:
>Description:
        pppd failes to set control terminal if -detach option is given.

Submitted by: enami@ba2.so-net.or.jp
1996-10-22 21:41:43 +00:00
pst
52622b0ef0 Fix potential buffer overrun 1996-10-01 03:41:28 +00:00
bde
e50d1f7293 Removed bogus unused `-I..' and unnecessary override of BINDIR. Didn't
clean up.
1996-09-04 22:43:20 +00:00
peter
42c8685e61 Add RTF_STATIC to flags when creating a default route. Hopefully this
will stop routed from removing it if it is also running.
1996-08-13 09:16:49 +00:00
pst
db1a2c98a7 Previously, if the dial script had any problems, pppd would simply
bomb out.  Unfortunately, FreeBSD's sio driver and certain internal
modems don't get along very well, which can cause the serial port to
wedge until it is closed and reopened.

Add new variable, connect-max-attempts, default = 1 (to mimic previous
behavior).  If > 1, will try up to "n" times to dial remote site before
aborting.
1996-08-11 17:29:37 +00:00
mpp
72ea5e6d10 Update the pppd(8) man page to exmplain the CHAP acronym
to the same way that the RFC does.

Obtained from: NetBSD-bugs mailing list
1996-07-03 23:23:03 +00:00
mpp
1fb004d85e Xref chat(8) and ppp(8).
Pointed-out-by: Someone in the mailing lists
1996-05-02 19:21:40 +00:00
joerg
7e6170e383 Work around the problem that our -current pppd can no longer talk
with our iijppp as a client.

Simply shut down the CCP layer if no matching protocol could be found.

Reviewed by:	peter
1996-03-08 01:21:53 +00:00
phk
8bc36c3dbc Use libmd.
Add support for negotiating (more like "informing peer") about DNS.
Various cleanup of warnings.
1996-03-01 19:29:44 +00:00
peter
5fb117a504 ppp-2.2 doesn't have a RELNOTES file anymore, so the old one here was
rather out of date.. it even suggested that it was ppp-2.1.1 still :-)

I've selected some bits from the README files and pre-pended it so that
at least reading it tells you _something_ about the recent history.
1995-11-10 21:39:32 +00:00
peter
484ade7718 Recover lost support for netmask 255.255.255.255 that was lost in the merge.
Submitted by: Michael Butler <imb@scgt.oz.au>
1995-11-04 10:44:22 +00:00
peter
ad9443ce52 AARGH!! by default, pppd would no longer allow users to use "proxyarp"
or "defaultroute"...  That's forgivable I guess, but the silly thing
didn't have any way to _enable_ the options either! :-(

This now enables them by default.

Obtained from: ppp-2.3a0
1995-11-03 19:06:45 +00:00
peter
1ac4feebcc Whoops.. ppp-comp.h -> ppp_comp.h... 1995-10-31 21:29:25 +00:00
peter
9fba2426b5 Bring pppd from ppp-2.2 onto the mainline..
(more work needs to be done here, I'm trying to beat the supscan)
1995-10-31 21:21:51 +00:00
peter
98d7c48511 Initial revision 1995-10-31 21:10:14 +00:00
joerg
afd96ea47e Finally applied the fix from PR # 701 for the broken prxyarp option of
pppd(8).

Reviewed by:	several people on -hackers, and me
Submitted by:	Stephen McKay <syssgm@devetir.qld.gov.au>
1995-10-03 10:50:42 +00:00
pst
9c89e962d4 Recode mask logic to use inet_ntoa() so host routes are valid. 1995-09-06 16:33:40 +00:00
mpp
684146e8ce Check for expired passwords before allowing access to the system. 1995-08-28 21:30:59 +00:00
rgrimes
4f960dd75f Remove trailing whitespace. 1995-05-30 03:57:47 +00:00
dg
2adc1c7fb5 Add missing arg to fprintf() error message.
Submitted by:	Mike Grupenhoff
1995-05-24 01:56:52 +00:00
ache
d120fd1cdd Close sec. hole: can exec pgm with more groups than calling user have
Include unistd.h and fix few argument old-way things
1995-04-29 13:55:34 +00:00
dfr
c816f711b3 Change to use the correct lock file directory. 1994-10-22 14:40:48 +00:00
wollman
b2b9eaab73 Most of the ``modified'' files really aren't. This is my (simple)
port of pppd.
1994-09-25 02:32:18 +00:00
wollman
860a10b12f Initial revision 1994-09-25 02:11:26 +00:00