Deleted Added
full compact
spppcontrol.8 (141846) spppcontrol.8 (141851)
1.\" Copyright (C) 1997, 2001 by Joerg Wunsch, Dresden
2.\" All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 8 unchanged lines hidden (view full) ---

17.\" INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
18.\" (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
19.\" SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
20.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
21.\" STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
22.\" IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
23.\" POSSIBILITY OF SUCH DAMAGE.
24.\"
1.\" Copyright (C) 1997, 2001 by Joerg Wunsch, Dresden
2.\" All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 8 unchanged lines hidden (view full) ---

17.\" INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
18.\" (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
19.\" SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
20.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
21.\" STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
22.\" IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
23.\" POSSIBILITY OF SUCH DAMAGE.
24.\"
25.\" $FreeBSD: head/sbin/spppcontrol/spppcontrol.8 141846 2005-02-13 22:25:33Z ru $
25.\" $FreeBSD: head/sbin/spppcontrol/spppcontrol.8 141851 2005-02-13 23:45:54Z ru $
26.\"
27.Dd December 30, 2001
28.Os
29.Dt SPPPCONTROL 8
30.Sh NAME
31.Nm spppcontrol
32.Nd display or set parameters for an sppp interface
33.Sh SYNOPSIS

--- 94 unchanged lines hidden (view full) ---

128Same as above, but only for his end of the link.
129.It Va myauthname Ns Li = Ns Ar name
130Set my system name for the authentication protocol.
131.It Va hisauthname Ns Li = Ns Ar name
132Set his system name for the authentication protocol.
133For CHAP, this
134will only be used as a hint, causing a warning message if remote did
135supply a different name.
26.\"
27.Dd December 30, 2001
28.Os
29.Dt SPPPCONTROL 8
30.Sh NAME
31.Nm spppcontrol
32.Nd display or set parameters for an sppp interface
33.Sh SYNOPSIS

--- 94 unchanged lines hidden (view full) ---

128Same as above, but only for his end of the link.
129.It Va myauthname Ns Li = Ns Ar name
130Set my system name for the authentication protocol.
131.It Va hisauthname Ns Li = Ns Ar name
132Set his system name for the authentication protocol.
133For CHAP, this
134will only be used as a hint, causing a warning message if remote did
135supply a different name.
136For PAP, it's the name remote must use to
136For PAP, it is the name remote must use to
137authenticate himself (in connection with his secret).
138.It Va myauthsecret Ns Li = Ns Ar secret
139Set my secret (key, password) for use in the authentication phase.
140For CHAP, this will be used to compute the response hash value, based
141on remote's challenge.
142For PAP, it will be transmitted as plain text
143together with the system name.
144Do not forget to quote the secrets from
145the shell if they contain shell metacharacters (or white space).
146.It Va myauthkey Ns Li = Ns Ar secret
147Same as above.
148.It Va hisauthsecret Ns Li = Ns Ar secret
149Same as above, to be used if we are an authenticator and the remote peer
150needs to authenticate.
151.It Va hisauthkey Ns Li = Ns Va secret
152Same as above.
153.It Va callin
137authenticate himself (in connection with his secret).
138.It Va myauthsecret Ns Li = Ns Ar secret
139Set my secret (key, password) for use in the authentication phase.
140For CHAP, this will be used to compute the response hash value, based
141on remote's challenge.
142For PAP, it will be transmitted as plain text
143together with the system name.
144Do not forget to quote the secrets from
145the shell if they contain shell metacharacters (or white space).
146.It Va myauthkey Ns Li = Ns Ar secret
147Same as above.
148.It Va hisauthsecret Ns Li = Ns Ar secret
149Same as above, to be used if we are an authenticator and the remote peer
150needs to authenticate.
151.It Va hisauthkey Ns Li = Ns Va secret
152Same as above.
153.It Va callin
154Require remote to authenticate himself only when he's calling in, but
154Require remote to authenticate himself only when he is calling in, but
155not when we are caller.
156This is required for some peers that do not
157implement the authentication protocols symmetrically (like Ascend
158routers, for example).
159.It Va always
160The opposite of
161.Va callin .
162Require remote to always authenticate, regardless of which side is

--- 113 unchanged lines hidden ---
155not when we are caller.
156This is required for some peers that do not
157implement the authentication protocols symmetrically (like Ascend
158routers, for example).
159.It Va always
160The opposite of
161.Va callin .
162Require remote to always authenticate, regardless of which side is

--- 113 unchanged lines hidden ---