From: Moe Trin on
On 17 Mar 2010, in the Usenet newsgroup comp.os.linux.networking, in article
<80chmbFkefU2(a)mid.individual.net>, G�nther Schwarz wrote:

>Moe Trin wrote:

>> 2.4.5 was released back in November. You should be aware that the
>> Debian version is significantly altered from what the authors (Paul
>> Mackerras of samba.org and James Carlson of Sun) supply.

>Thanks for the hint. Though this looks promising Debian stays with
>version 2.4.4 even with unstable. It might be too much work to tweak the
>source code until it fits to the distribution.

Yeah, when the Debian 'diff' file is ~12700 lines and the ppp source is
only 91000 lines, I can't be bothered wasting my time trying to figure
what/why it's so different.

Old guy
From: Eric Pozharski on
with <slrnhq0fnl.ah7.ibuprofin(a)compton.phx.az.us> Moe Trin wrote:
> On Tue, 16 Mar 2010, in the Usenet newsgroup comp.os.linux.networking, in
> article <slrnhpve9b.hkh.whynot(a)orphan.zombinet>, Eric Pozharski wrote:
>
>>Moe Trin wrote:
>
>>> Which version of pppd are you using?
>
>>2.4.4. I've inspected http://packages.qa.debian.org/p/ppp.html and
>>found out there's 2.4.5 in neither unstable (probably upcoming freeze
>>issue) nor experimental. Although (what's the problem?)
>
> What's new in ppp-2.4.5.
> ************************
>
> * Under Linux, pppd can now operate in a mode where it doesn't request
> the peer's IP address, as some peers refuse to supply an IP address.
> Since Linux supports device routes as well as gateway routes, it's
> possible to have no remote IP address assigned to the ppp interface
> and still route traffic over it.
>
> * Pppd now works better with 3G modems that do strange things such as
> sending IPCP Configure-Naks with the same values over and over again.
>
> You may want to check with the Debian mailing lists, as I know that
> Debian has made substantial changes to the ANU source.

I believe that without looking in debianization diff this point is
meaningles. But wait,.. OH SHI-- maintainer is dead on the water for 2
years (one NMU 3 month ago). Quick, quick, backporting today.

>>Kernel IP routing table
>>Destination Gateway Genmask Flags Metric Ref Use Iface
>>10.112.112.112 0.0.0.0 255.255.255.255 UH 0 0 0 ppp0
>>192.168.0.0 0.0.0.0 255.255.255.240 U 0 0 0 eth0
>>0.0.0.0 0.0.0.0 0.0.0.0 U 0 0 0 ppp0
>
> That's pppd running in demand mode with the link not up. From the file
> Changes-2.3 in the ppp tarball:
>
> * Pppd no longer requires a remote address to be specified for demand
> dialling. If none is specified, it will use a default value of
> 10.112.112.112+unit_number. (It will not propose this default to
> the peer.)

No. That output was taken with link up and running. Two days later
(with link idle terminated, and 'pppd' still running ondemand)

Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
10.112.112.112 0.0.0.0 255.255.255.255 UH 0 0 0 ppp0
192.168.0.0 0.0.0.0 255.255.255.240 U 0 0 0 eth0
0.0.0.0 0.0.0.0 0.0.0.0 U 0 0 0 ppp0

No difference.

>>> 'noauth' tells pppd not to ask the peer to authenticate to you. It
>>> doesn't stop the peer from asking you to authenticate to it.
>
>>Yup. 'pppd' wants tokens (and doesn't start without them; peer is
>>supposed to authenticate). Reverted.
>
> That's not what the log shows. You are not asking the peer to
> authenticate to you
>
> ]Mar 14 15:38:28 agentsmith pppd[16321]: sent [LCP ConfReq id=0x1
> ] <asyncmap 0x0> <magic 0xdff64f92> <pcomp> <accomp>]

Indeed it does not. With 'noauth' commented, and remains of
authentication (options ported from the previous ISP with what I had to
authenticate) setup ('name', 'user', 'remotename' set to void 'unknown'
(not that clever decision afterwards)).

Mar 14 15:37:09 agentsmith pppd[16306]: The remote system (unknown) is required to authenticate itself
Mar 14 15:37:09 agentsmith pppd[16306]: but I couldn't find any suitable secret (password) for it to use to do so.

With 'noauth' commented, 'user' and 'name' commented too; 'remotename'
probably not (I'm not sure)

Mar 14 15:37:48 agentsmith pppd[16313]: The remote system is required to authenticate itself
Mar 14 15:37:48 agentsmith pppd[16313]: but I couldn't find any suitable secret (password) for it to use to do so.

Let's put it clear -- 'noauth' is required when peers isn't going to
authenticate. And it won't.

> Notice there is no 'auth' option here. Instead, the peer wants you
> to authenticate to it
>
> ]Mar 14 15:38:28 agentsmith pppd[16321]: rcvd [LCP ConfReq id=0x57
> ]<asyncmap 0x0> <auth chap MD5> <magic 0x1304fd4d> <pcomp> <accomp>]
>
> notice it asking^^^here^^^. The 'noauth' does nothing for you,
> and is only needed when there is a pre-existing default route using
> another interface. Pppd then assumes you are acting as an ISP.

'noauth' is essential when peer isn't going to authenticate.


*CUT*

--
Torvalds' goal for Linux is very simple: World Domination
Stallman's goal for GNU is even simpler: Freedom
From: Eric Pozharski on
with <80a6t7F7krU1(a)mid.individual.net> Günther Schwarz wrote:
*SKIP*
> Well, the ISP could block all DNS traffic. 3G networks are very specific
> about the services they allow for. They might change their policies
> without prior notice.

That's scary. Just a matter of speciluation. Probably they wouldn't
block on traffic content. They would do that rather on destination
port, don't they? Is there any DNS proxy on port, say, 80?


--
Torvalds' goal for Linux is very simple: World Domination
Stallman's goal for GNU is even simpler: Freedom
From: Günther Schwarz on
Eric Pozharski wrote:

> with <80a6t7F7krU1(a)mid.individual.net> Günther Schwarz wrote: *SKIP*
>> Well, the ISP could block all DNS traffic. 3G networks are very
>> specific about the services they allow for. They might change their
>> policies without prior notice.
>
> That's scary. Just a matter of speciluation. Probably they wouldn't
> block on traffic content. They would do that rather on destination
> port, don't they? Is there any DNS proxy on port, say, 80?

As their business is mobile phone calls and not VOIP and as their network
capacity is too limited for file sharing traffic they will most
definitely not rely on port numbers alone. I'm not aware of a publicly
accessible proxy that listens on port 80. But a ssh tunnel to a host
outside the provider's network might do the trick.
Also note that I'm not saying that DNS is not allowed. It was just a
guess on something that might be worth testing in case a server is not
reachable.

Günther
From: Moe Trin on
On Thu, 18 Mar 2010, in the Usenet newsgroup comp.os.linux.networking, in
article <slrnhq4ffc.4dm.whynot(a)orphan.zombinet>, Eric Pozharski wrote:

>Let's put it clear -- 'noauth' is required when peers isn't going to
>authenticate. And it won't.

Make sure you are not setting the 'auth' option in /etc/ppp/options. To
see what is being used from where, start pppd with the 'dump' option

dryrun With the dryrun option, pppd will print out all the option
values which have been set and then exit, after parsing the
command line and options files and checking the option val-
ues, but before initiating the link. The option values are
logged at level info, and also printed to standard output
unless the device on standard output is the device that
pppd would be using to communicate with the peer.

dump With the dump option, pppd will print out all the option
values which have been set. This option is like the dryrun
option except that pppd proceeds as normal rather than
exiting.

Some time back in the late 1990s, the Debian maintainer added 'auth'
as a required setting in /etc/ppp/options. The only time I've needed
the 'noauth' option is when I've been using dialin as a backup to the
existing broadband link (which had some reliability problems).

Old guy