2 .\" Copyright (c) 1997, 2001 Joerg Wunsch
4 .\" All rights reserved.
6 .\" Redistribution and use in source and binary forms, with or without
7 .\" modification, are permitted provided that the following conditions
9 .\" 1. Redistributions of source code must retain the above copyright
10 .\" notice, this list of conditions and the following disclaimer.
11 .\" 2. Redistributions in binary form must reproduce the above copyright
12 .\" notice, this list of conditions and the following disclaimer in the
13 .\" documentation and/or other materials provided with the distribution.
15 .\" THIS SOFTWARE IS PROVIDED BY THE DEVELOPERS ``AS IS'' AND ANY EXPRESS OR
16 .\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
17 .\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
18 .\" IN NO EVENT SHALL THE DEVELOPERS BE LIABLE FOR ANY DIRECT, INDIRECT,
19 .\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
20 .\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
21 .\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
22 .\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
23 .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
24 .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
33 .Nd point to point protocol network layer for synchronous lines
39 network layer implements the state machine and the Link Control
41 .Em point to point protocol (PPP)
42 as described in RFC 1661.
43 Note that this layer does not provide
44 network interfaces of its own, it is rather intended to be layered on
45 top of drivers providing a synchronous point-to-point connection that
46 wish to run a PPP stack over it.
47 The corresponding network interfaces
48 have to be provided by these hardware drivers.
52 layer provides three basic modes of operation.
54 with no special flags to be set, is to create the PPP connection
57 event to the LCP layer) as soon as the interface is taken up with the
60 Taking the interface down again will terminate the LCP layer
61 and thus all other layers on top.
62 The link will also terminate itself as
63 soon as no Network Control Protocol (NCP) is open anymore, indicating
64 that the lower layers are no longer needed.
66 Setting the link-level flag
70 will cause the respective network interface to go into
73 This means, the administrative
75 event to the LCP layer will be delayed until after the lower layers
80 This can be used by lower layers to support
81 a dialin connection where the physical layer is not available
82 immediately at startup, but only after some external event arrives.
85 event from the lower layer will not take the interface completely down
88 Finally, setting the flag
90 will cause the interface to operate in
93 This is also only useful if the lower layer supports the notion
96 respective interface, it will delay the administrative
98 event to the LCP layer until either an outbound network packet
99 arrives, or until the lower layer signals an
101 event, indicating an inbound connection.
102 As with passive mode, receipt
105 event (loss of carrier) will not automatically take the interface down,
106 thus it remains available for further connections.
112 interface flag that can be set with
114 If this flag is set, the various control protocol packets being
115 exchanged as well as the option negotiation between both ends of the
116 link will be logged at level
118 This can be helpful to examine configuration problems during the first
119 attempts to set up a new configuration.
120 Without this flag being set,
121 only the major phase transitions will be logged at level
124 It is possible to leave the local interface IP address open for
125 negotiation by setting it to 0.0.0.0.
126 This requires that the remote
127 peer can correctly supply a value for it based on the identity of the
128 caller, or on the remote address supplied by this side.
130 way the IPCP option negotiation works, this address is being supplied
131 late during the negotiation, which might cause the remote peer to make
134 In a similar spirit the remote address can be set to the magical
137 which means that we do not care what address the remote
138 side will use, as long as it is not 0.0.0.0.
139 This is useful if your ISP has several dial-in
142 .Nm route Cm add Ar something_or_other 0.0.0. Ns Em *
143 and it will do exactly what you would want it to.
145 The PAP and CHAP authentication protocols as described in RFC 1334,
146 and RFC 1994 resp., are also implemented.
147 Their parameters are being
152 VJ header compression is implemented, and enabled by default.
158 .It <ifname><ifnum>: <proto> illegal <event> in state <statename>
159 An event happened that should not happen for the current state
160 the respective control protocol is in.
161 See RFC 1661 for a description
162 of the state automaton.
163 .It <ifname><ifnum>: loopback
164 The state automaton detected a line loopback (that is, it was talking
166 The interface will be temporarily disabled.
167 .It <ifname><ifnum>: up
168 The LCP layer is running again, after a line loopback had previously
170 .It <ifname><ifnum>: down
171 The keepalive facility detected the line being unresponsive.
172 Keepalive must be explicitly requested by the lower layers in order to
182 .%A W. Simpson, Editor
183 .%T "The Point-to-Point Protocol (PPP)"
188 .%T "The PPP Internet Protocol Control Protocol (IPCP)"
194 .%T "PPP Authentication Protocols"
199 .%T "PPP Challenge Handshake Authentication Protocol (CHAP)"
204 The original implementation of
206 was written in 1994 at Cronyx Ltd., Moscow by
207 .An Serge Vakulenko Aq vak@cronyx.ru .
209 .Aq joerg_wunsch@uriah.heep.sax.de
210 rewrote a large part in 1997 in order
211 to fully implement the state machine as described in RFC 1661, so it
212 could also be used for dialup lines.
213 He also wrote this man page.
214 Serge later on wrote a basic implementation for PAP and CHAP, which
215 served as the base for the current implementation, done again by
224 network protocol is supported.
225 More NCPs should be implemented, as well as other control protocols
226 for authentication and link quality reporting.
228 Negotiation loop avoidance is not fully implemented.
230 does not converge, this can cause an endless loop.
232 The various parameters that should be adjustable per RFC 1661 are
233 currently hard-coded into the kernel, and should be made accessible
238 mode has not been tested extensively.
240 Link-level compression protocols should be supported.