spppcontrol.8 (141846) | spppcontrol.8 (141851) |
---|---|
1.\" Copyright (C) 1997, 2001 by Joerg Wunsch, Dresden 2.\" All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. --- 8 unchanged lines hidden (view full) --- 17.\" INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES 18.\" (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR 19.\" SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 20.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 21.\" STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING 22.\" IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 23.\" POSSIBILITY OF SUCH DAMAGE. 24.\" | 1.\" Copyright (C) 1997, 2001 by Joerg Wunsch, Dresden 2.\" All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. --- 8 unchanged lines hidden (view full) --- 17.\" INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES 18.\" (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR 19.\" SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 20.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 21.\" STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING 22.\" IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 23.\" POSSIBILITY OF SUCH DAMAGE. 24.\" |
25.\" $FreeBSD: head/sbin/spppcontrol/spppcontrol.8 141846 2005-02-13 22:25:33Z ru $ | 25.\" $FreeBSD: head/sbin/spppcontrol/spppcontrol.8 141851 2005-02-13 23:45:54Z ru $ |
26.\" 27.Dd December 30, 2001 28.Os 29.Dt SPPPCONTROL 8 30.Sh NAME 31.Nm spppcontrol 32.Nd display or set parameters for an sppp interface 33.Sh SYNOPSIS --- 94 unchanged lines hidden (view full) --- 128Same as above, but only for his end of the link. 129.It Va myauthname Ns Li = Ns Ar name 130Set my system name for the authentication protocol. 131.It Va hisauthname Ns Li = Ns Ar name 132Set his system name for the authentication protocol. 133For CHAP, this 134will only be used as a hint, causing a warning message if remote did 135supply a different name. | 26.\" 27.Dd December 30, 2001 28.Os 29.Dt SPPPCONTROL 8 30.Sh NAME 31.Nm spppcontrol 32.Nd display or set parameters for an sppp interface 33.Sh SYNOPSIS --- 94 unchanged lines hidden (view full) --- 128Same as above, but only for his end of the link. 129.It Va myauthname Ns Li = Ns Ar name 130Set my system name for the authentication protocol. 131.It Va hisauthname Ns Li = Ns Ar name 132Set his system name for the authentication protocol. 133For CHAP, this 134will only be used as a hint, causing a warning message if remote did 135supply a different name. |
136For PAP, it's the name remote must use to | 136For PAP, it is the name remote must use to |
137authenticate himself (in connection with his secret). 138.It Va myauthsecret Ns Li = Ns Ar secret 139Set my secret (key, password) for use in the authentication phase. 140For CHAP, this will be used to compute the response hash value, based 141on remote's challenge. 142For PAP, it will be transmitted as plain text 143together with the system name. 144Do not forget to quote the secrets from 145the shell if they contain shell metacharacters (or white space). 146.It Va myauthkey Ns Li = Ns Ar secret 147Same as above. 148.It Va hisauthsecret Ns Li = Ns Ar secret 149Same as above, to be used if we are an authenticator and the remote peer 150needs to authenticate. 151.It Va hisauthkey Ns Li = Ns Va secret 152Same as above. 153.It Va callin | 137authenticate himself (in connection with his secret). 138.It Va myauthsecret Ns Li = Ns Ar secret 139Set my secret (key, password) for use in the authentication phase. 140For CHAP, this will be used to compute the response hash value, based 141on remote's challenge. 142For PAP, it will be transmitted as plain text 143together with the system name. 144Do not forget to quote the secrets from 145the shell if they contain shell metacharacters (or white space). 146.It Va myauthkey Ns Li = Ns Ar secret 147Same as above. 148.It Va hisauthsecret Ns Li = Ns Ar secret 149Same as above, to be used if we are an authenticator and the remote peer 150needs to authenticate. 151.It Va hisauthkey Ns Li = Ns Va secret 152Same as above. 153.It Va callin |
154Require remote to authenticate himself only when he's calling in, but | 154Require remote to authenticate himself only when he is calling in, but |
155not when we are caller. 156This is required for some peers that do not 157implement the authentication protocols symmetrically (like Ascend 158routers, for example). 159.It Va always 160The opposite of 161.Va callin . 162Require remote to always authenticate, regardless of which side is --- 113 unchanged lines hidden --- | 155not when we are caller. 156This is required for some peers that do not 157implement the authentication protocols symmetrically (like Ascend 158routers, for example). 159.It Va always 160The opposite of 161.Va callin . 162Require remote to always authenticate, regardless of which side is --- 113 unchanged lines hidden --- |