Solved

Win95 negotiation with pppd Server

Posted on 1997-01-19
1
256 Views
Last Modified: 2010-03-17
I'm trying to 'configure' my pppd on a Linux box so that I can easily dial into it (say using W95 etc) _without_ having to worry about dial-up networking scripts or terminal windows etc etc. ie. just automagically logon...

At the moment, I have a working setup - so long as I use the 'bring up terminal window' option or use a script to enter the name/passwd details.  If I don't use either of these, during the verification of the name/passwd, the dialing up Win95 box and pppd won't happily negotiate automatically.

I'm getting error messages in (Win95) ppplog.txt such as:

LCP : Received and accepted ACCM of a0000.
LCP : Naking possibly loopback magic number.
LCP : Loopback! Peer nak'd with our nak of peer's magic number!
LCP : Peer requests use of magic number 5e9b4e.
LCP : Received and accepted ACCM of a0000.

... etc.  This goes on for about 10 seconds or so then gives up.  At this stage, there isn't anything significant being logged on the Linux end since it's at the early negot. stage.

I've just about tried all the logical? pppd options that I can think of. I'm currently using:

-detach modem mru 296 crtscts proxyarp

but have also added/tried many others for negotiation etc.

So!  Can anyone suggest what I'm missing or may need to perform the negotiation correctly?  I don't want to get into CHAP/PAP etc since there are too many usernames to setup chap-secrets etc on the Linux box - surely there must be something else which is going wrong?
0
Comment
Question by:timc
1 Comment
 
LVL 1

Accepted Solution

by:
mstonge earned 50 total points
Comment Utility
Windows 95 uses PAP by default.  What you need is to set up tour modems so that they answer and then go directly go into ppp mode awaiting PAP autentication.  Aparently, Win95 also support CHAP but they call it MS-CHAP so I would stay away from it, it's bound to give you sleepless nights.  With PAP, you do not use encrypted password but in most case this level of security is adequate.

Marc
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now