亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? pppd.8

?? 經典的ppp程序
?? 8
?? 第 1 頁 / 共 5 頁
字號:
.TP.B vj-max-slots \fInSets the number of connection slots to be used by the Van JacobsonTCP/IP header compression and decompression code to \fIn\fR, whichmust be between 2 and 16 (inclusive)..TP.B welcome \fIscriptRun the executable or shell command specified by \fIscript\fR beforeinitiating PPP negotiation, after the connect script (if any) hascompleted.  A value for this option from a privileged source cannot beoverridden by a non-privileged user..TP.B xonxoffUse software flow control (i.e. XON/XOFF) to control the flow of data onthe serial port..SH OPTIONS FILESOptions can be taken from files as well as the command line.  Pppdreads options from the files /etc/ppp/options, ~/.ppprc and/etc/ppp/options.\fIttyname\fR (in that order) before processing theoptions on the command line.  (In fact, the command-line options arescanned to find the terminal name before the options.\fIttyname\fRfile is read.)  In forming the name of the options.\fIttyname\fR file,the initial /dev/ is removed from the terminal name, and any remaining/ characters are replaced with dots..PPAn options file is parsed into a series of words, delimited bywhitespace.  Whitespace can be included in a word by enclosing theword in double-quotes (").  A backslash (\\) quotes the following character.A hash (#) starts a comment, which continues until the end of theline.  There is no restriction on using the \fIfile\fR or \fIcall\fRoptions within an options file..SH SECURITY.I pppdprovides system administrators with sufficient access control that PPPaccess to a server machine can be provided to legitimate users withoutfear of compromising the security of the server or the network it'son.  This control is provided through restrictions on which IPaddresses the peer may use, based on its authenticated identity (ifany), and through restrictions on which options a non-privileged usermay use.  Several of pppd's options are privileged, in particularthose which permit potentially insecure configurations; these optionsare only accepted in files which are under the control of the systemadministrator, or if pppd is being run by root..PPThe default behaviour of pppd is to allow an unauthenticated peer touse a given IP address only if the system does not already have aroute to that IP address.  For example, a system with apermanent connection to the wider internet will normally have adefault route, and thus all peers will have to authenticate themselvesin order to set up a connection.  On such a system, the \fIauth\fRoption is the default.  On the other hand, a system where thePPP link is the only connection to the internet will not normally havea default route, so the peer will be able to use almost any IP addresswithout authenticating itself..PPAs indicated above, some security-sensitive options are privileged,which means that they may not be used by an ordinary non-privilegeduser running a setuid-root pppd, either on the command line, in theuser's ~/.ppprc file, or in an options file read using the \fIfile\fRoption.  Privileged options may be used in /etc/ppp/options file or inan options file read using the \fIcall\fR option.  If pppd is beingrun by the root user, privileged options can be used withoutrestriction..PPWhen opening the device, pppd uses either the invoking user's user IDor the root UID (that is, 0), depending on whether the device name wasspecified by the user or the system administrator.  If the device namecomes from a privileged source, that is, /etc/ppp/options or anoptions file read using the \fIcall\fR option, pppd uses full rootprivileges when opening the device.  Thus, by creating an appropriatefile under /etc/ppp/peers, the system administrator can allow users toestablish a ppp connection via a device which they would not normallyhave permission to access.  Otherwise pppd uses the invoking user'sreal UID when opening the device..SH AUTHENTICATIONAuthentication is the process whereby one peer convinces the other ofits identity.  This involves the first peer sending its name to theother, together with some kind of secret information which could onlycome from the genuine authorized user of that name.  In such anexchange, we will call the first peer the "client" and the other the"server".  The client has a name by which it identifies itself to theserver, and the server also has a name by which it identifies itselfto the client.  Generally the genuine client shares some secret (orpassword) with the server, and authenticates itself by proving that itknows that secret.  Very often, the names used for authenticationcorrespond to the internet hostnames of the peers, but this is notessential..LPAt present, pppd supports two authentication protocols: the PasswordAuthentication Protocol (PAP) and the Challenge HandshakeAuthentication Protocol (CHAP).  PAP involves the client sending itsname and a cleartext password to the server to authenticate itself.In contrast, the server initiates the CHAP authentication exchange bysending a challenge to the client (the challenge packet includes theserver's name).  The client must respond with a response whichincludes its name plus a hash value derived from the shared secret andthe challenge, in order to prove that it knows the secret..LPThe PPP protocol, being symmetrical, allows both peers to require theother to authenticate itself.  In that case, two separate andindependent authentication exchanges will occur.  The two exchangescould use different authentication protocols, and in principle,different names could be used in the two exchanges..LPThe default behaviour of pppd is to agree to authenticate ifrequested, and to not require authentication from the peer.  However,pppd will not agree to authenticate itself with a particular protocolif it has no secrets which could be used to do so..LPPppd stores secrets for use in authentication in secretsfiles (/etc/ppp/pap-secrets for PAP, /etc/ppp/chap-secrets for CHAP).Both secrets files have the same format.  The secrets files cancontain secrets for pppd to use in authenticating itself to othersystems, as well as secrets for pppd to use when authenticating othersystems to itself..LPEach line in a secrets file contains one secret.  A given secret isspecific to a particular combination of client and server - it canonly be used by that client to authenticate itself to that server.Thus each line in a secrets file has at least 3 fields: the name ofthe client, the name of the server, and the secret.  These fields maybe followed by a list of the IP addresses that the specified clientmay use when connecting to the specified server..LPA secrets file is parsed into words as for a options file, so theclient name, server name and secrets fields must each be one word,with any embedded spaces or other special characters quoted orescaped.  Note that case is significant in the client and server namesand in the secret..LPIf the secret starts with an `@', what follows is assumed to be thename of a file from which to read the secret.  A "*" as the client orserver name matches any name.  When selecting a secret, pppd takes thebest match, i.e.  the match with the fewest wildcards..LPAny following words on the same line are taken to be a list ofacceptable IP addresses for that client.  If there are only 3 words onthe line, or if the first word is "-", then all IP addresses aredisallowed.  To allow any address, use "*".  A word starting with "!"indicates that the specified address is \fInot\fR acceptable.  Anaddress may be followed by "/" and a number \fIn\fR, to indicate awhole subnet, i.e. all addresses which have the same value in the mostsignificant \fIn\fR bits.  In this form, the address may be followedby a plus sign ("+") to indicate that one address from the subnet isauthorized, based on the ppp network interface unit number in use.In this case, the host part of the address will be set to the unitnumber plus one..LPThus a secrets file contains both secrets for use in authenticatingother hosts, plus secrets which we use for authenticating ourselves toothers.  When pppd is authenticating the peer (checking the peer'sidentity), it chooses a secret with the peer's name in the firstfield and the name of the local system in the second field.  Thename of the local system defaults to the hostname, with the domainname appended if the \fIdomain\fR option is used.  This default can beoverridden with the \fIname\fR option, except when the\fIusehostname\fR option is used..LPWhen pppd is choosing a secret to use in authenticating itself to thepeer, it first determines what name it is going to use to identifyitself to the peer.  This name can be specified by the user with the\fIuser\fR option.  If this option is not used, the name defaults tothe name of the local system, determined as described in the previousparagraph.  Then pppd looks for a secret with this name in the firstfield and the peer's name in the second field.  Pppd will know thename of the peer if CHAP authentication is being used, because thepeer will have sent it in the challenge packet.  However, if PAP is beingused, pppd will have to determine the peer's name from the optionsspecified by the user.  The user can specify the peer's name directlywith the \fIremotename\fR option.  Otherwise, if the remote IP addresswas specified by a name (rather than in numeric form), that name willbe used as the peer's name.  Failing that, pppd will use the nullstring as the peer's name..LPWhen authenticating the peer with PAP, the supplied password is firstcompared with the secret from the secrets file.  If the passworddoesn't match the secret, the password is encrypted using crypt() andchecked against the secret again.  Thus secrets for authenticating thepeer can be stored in encrypted form if desired.  If the\fIpapcrypt\fR option is given, the first (unencrypted) comparison isomitted, for better security..LPFurthermore, if the \fIlogin\fR option was specified, the username andpassword are also checked against the system password database.  Thus,the system administrator can set up the pap-secrets file to allow PPPaccess only to certain users, and to restrict the set of IP addressesthat each user can use.  Typically, when using the \fIlogin\fR option,the secret in /etc/ppp/pap-secrets would be "", which will match anypassword supplied by the peer.  This avoids the need to have the samesecret in two places..LPAuthentication must be satisfactorily completed before IPCP (or anyother Network Control Protocol) can be started.  If the peer isrequired to authenticate itself, and fails to do so, pppd willterminated the link (by closing LCP).  If IPCP negotiates anunacceptable IP address for the remote host, IPCP will be closed.  IPpackets can only be sent or received when IPCP is open..LPIn some cases it is desirable to allow some hosts which can'tauthenticate themselves to connect and use one of a restricted set ofIP addresses, even when the local host generally requiresauthentication.  If the peer refuses to authenticate itself whenrequested, pppd takes that as equivalent to authenticating with PAPusing the empty string for the username and password.  Thus, by addinga line to the pap-secrets file which specifies the empty string forthe client and password, it is possible to allow restricted access tohosts which refuse to authenticate themselves..SH ROUTING.LPWhen IPCP negotiation is completed successfully, pppd will inform thekernel of the local and remote IP addresses for the ppp interface.This is sufficient to create a host route to the remote end of thelink, which will enable the peers to exchange IP packets.Communication with other machines generally requires furthermodification to routing tables and/or ARP (Address ResolutionProtocol) tables.  In most cases the \fIdefaultroute\fR and/or\fIproxyarp\fR options are sufficient for this, but in some casesfurther intervention is required.  The /etc/ppp/ip-up script can beused for this..LPSometimes it is desirable to add a default route through the remotehost, as in the case of a machine whose only connection to theInternet is through the ppp interface.  The \fIdefaultroute\fR optioncauses pppd to create such a default route when IPCP comes up, anddelete it when the link is terminated..LPIn some cases it is desirable to use proxy ARP, for example on aserver machine connected to a LAN, in order to allow other hosts tocommunicate with the remote host.  The \fIproxyarp\fR option causespppd to look for a network interface on the same subnet as the remotehost (an interface supporting broadcast and ARP, which is up and not apoint-to-point or loopback interface).  If found, pppd creates apermanent, published ARP entry with the IP address of the remote hostand the hardware address of the network interface found..LPWhen the \fIdemand\fR option is used, the interface IP addresses havealready been set at the point when IPCP comes up.  If pppd has notbeen able to negotiate the same addresses that it used to configurethe interface (for example when the peer is an ISP that uses dynamicIP address assignment), pppd has to change the interface IP addressesto the negotiated addresses.  This may disrupt existing connections,and the use of demand dialling with peers that do dynamic IP addressassignment is not recommended..SH MULTILINKMultilink PPP provides the capability to combine two or more PPP linksbetween a pair of machines into a single `bundle', which appears as asingle virtual PPP link which has the combined bandwidth of theindividual links.  Currently, multilink PPP is only supported underLinux..LPPppd detects that the link it is controlling is connected to the samepeer as another link using the peer's endpoint discriminator and theauthenticated identity of the peer (if it authenticates itself).  Theendpoint discriminator is a block of data which is hopefully uniquefor each peer.  Several types of data can be used, includinglocally-assigned strings of bytes, IP addresses, MAC addresses,randomly strings of bytes, or E-164 phone numbers.  The endpointdiscriminator sent to the peer by pppd can be set using the endpointoption..LPIn circumstances the peer may send no endpoint discriminator or anon-unique value.  The optional bundle option adds an extra stringwhich is added to the peer's endpoint discriminator and authenticatedidentity when matching up links to be joined together in a bundle.The bundle option can also be used to allow the establishment ofmultiple bundles between the local system and the peer.  Pppd uses aTDB database in /var/run/pppd.tdb to match up links..LPAssuming that multilink is enabled and the peer is willing tonegotiate multilink, then when pppd is invoked to bring up the firstlink to the peer, it will detect that no other link is connected tothe peer and create a new bundle, that is, another ppp networkinterface unit.  When another pppd is invoked to bring up another linkto the peer, it will detect the existing bundle and join its link toit.  Currently, if the first pppd terminates (for example, because ofa hangup or a received signal) the bundle is destroyed..SH EXAMPLES.LPThe following examples assume that the /etc/ppp/options file containsthe \fIauth\fR option (as in the default /etc/ppp/options file in theppp distribution)..LPProbably the most common use of pppd is to dial out to an ISP.  Thiscan be done with a command such as.IPpppd call isp.LPwhere the /etc/ppp/peers/isp file is set up by the systemadministrator to contain something like this:.IPttyS0 19200 crtscts.brconnect '/usr/sbin/chat -v -f /etc/ppp/chat-isp'.brnoauth.LPIn this example, we are using chat to dial the ISP's modem and gothrough any logon sequence required.  The /etc/ppp/chat-isp filecontains the script used by chat; it could for example containsomething like this:

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲人成网站精品片在线观看| 国产精品蜜臀av| 在线观看一区二区视频| av一区二区三区| 91日韩一区二区三区| 色婷婷综合久久久久中文一区二区| 不卡高清视频专区| 色狠狠色噜噜噜综合网| 裸体一区二区三区| 91免费观看视频在线| 国产嫩草影院久久久久| 国产一区二区三区在线观看免费| 精品一区在线看| 国产一区二区中文字幕| 国产成人av电影免费在线观看| 国产一区二区精品在线观看| 国产91丝袜在线播放九色| 国产裸体歌舞团一区二区| 国产成人福利片| 色综合久久久久综合99| 欧美日韩国产一级| 精品日产卡一卡二卡麻豆| 日本一区二区三区在线观看| 一区二区三区欧美在线观看| 青青青伊人色综合久久| 国产成人精品午夜视频免费| 91性感美女视频| 欧美一区二区福利在线| 国产精品久久久久久久久晋中 | 午夜视黄欧洲亚洲| 美女任你摸久久| jlzzjlzz国产精品久久| 欧美一区二区三区免费在线看 | 国产一区二区三区国产| 日本丶国产丶欧美色综合| 欧美浪妇xxxx高跟鞋交| 欧美激情一区二区三区全黄 | 国产欧美日韩久久| 亚洲一区二区三区视频在线播放 | 日韩欧美国产高清| 亚洲视频一二区| 韩国三级在线一区| 在线视频综合导航| 久久亚洲综合色一区二区三区| 亚洲日本韩国一区| 国产精品一级二级三级| 欧美视频在线播放| 国产精品嫩草影院av蜜臀| 免费不卡在线观看| 91精品福利视频| 久久综合久色欧美综合狠狠| 亚洲成人免费影院| 99久久精品一区二区| 欧美精品一区二区久久久| 性做久久久久久免费观看 | 亚洲香肠在线观看| 本田岬高潮一区二区三区| 日韩女优电影在线观看| 性欧美疯狂xxxxbbbb| 色婷婷国产精品久久包臀 | 精品视频一区二区三区免费| 国产精品免费视频观看| 黑人巨大精品欧美一区| 欧美高清hd18日本| 亚洲成人资源网| 91麻豆国产香蕉久久精品| 中文字幕av一区 二区| 国产一区二区三区在线观看免费视频| 91精品国产综合久久小美女| 亚洲成人1区2区| 欧美三级韩国三级日本一级| 亚洲精品一卡二卡| 欧美在线视频不卡| 一区二区三区色| 欧美色图在线观看| 亚洲不卡一区二区三区| 欧美性欧美巨大黑白大战| 亚洲激情欧美激情| 欧美亚洲国产一区二区三区va | 成人app网站| 国产欧美日本一区二区三区| 国产精一区二区三区| 欧美极品xxx| 91免费版pro下载短视频| 亚洲另类春色校园小说| 色av成人天堂桃色av| 亚洲高清免费在线| 欧美一区二区三区性视频| 久久99久久99小草精品免视看| 日韩一区二区电影| 国产一本一道久久香蕉| 国产精品第四页| 在线精品视频免费观看| 日韩黄色片在线观看| 亚洲精品在线网站| av电影天堂一区二区在线| 亚洲国产精品久久不卡毛片| 欧美日韩久久一区二区| 免费一级片91| 国产精品第四页| 欧美日韩日本视频| 极品美女销魂一区二区三区免费| 国产农村妇女毛片精品久久麻豆 | 狠狠狠色丁香婷婷综合激情 | 在线视频综合导航| 久久66热偷产精品| 亚洲精品成人精品456| 欧美日韩国产在线播放网站| 国产乱码精品一品二品| 亚洲精品视频在线看| 欧美电视剧在线看免费| 成人一区二区三区视频在线观看| 亚洲123区在线观看| 久久久久久毛片| 欧美男女性生活在线直播观看| 国产精品中文字幕一区二区三区| 亚洲成人tv网| 中文字幕av资源一区| 欧美挠脚心视频网站| 91视频免费看| 国产高清久久久| 日韩精品一级二级 | 在线看不卡av| 国产乱码精品一区二区三区av| 亚洲成人资源网| 亚洲欧洲性图库| 国产性色一区二区| 91精品在线免费| 色久优优欧美色久优优| 国产69精品久久99不卡| 奇米一区二区三区| 亚洲精品五月天| 国产精品久久久久久亚洲毛片| 日韩一区二区三区免费观看| 91色视频在线| 成人激情小说乱人伦| 国产精品18久久久久久vr| 日韩va欧美va亚洲va久久| 亚洲一级片在线观看| 国产精品高潮呻吟| 久久麻豆一区二区| 制服丝袜中文字幕一区| 欧美日韩精品综合在线| 91搞黄在线观看| 91久久线看在观草草青青| 成人午夜视频福利| 国产不卡在线一区| 国产精品一区二区x88av| 精品一区免费av| 国产自产视频一区二区三区| 麻豆久久久久久| 美女一区二区视频| 久久精品国产第一区二区三区| 全国精品久久少妇| 老司机精品视频在线| 美脚の诱脚舐め脚责91| 久久99国产精品麻豆| 国产在线乱码一区二区三区| 精品在线一区二区三区| 国产99久久久国产精品免费看| 国产在线播放一区| 福利一区二区在线| 成人av电影免费观看| 91色视频在线| 欧美久久久影院| 精品精品国产高清a毛片牛牛| 欧美成人高清电影在线| 国产日韩欧美高清在线| 自拍偷在线精品自拍偷无码专区| 亚洲综合色视频| 免费观看久久久4p| 国产黑丝在线一区二区三区| av在线综合网| 欧美精品九九99久久| 精品国精品自拍自在线| 国产精品美女视频| 亚洲精品久久久蜜桃| 蜜桃视频一区二区三区在线观看| 国产毛片精品国产一区二区三区| 不卡视频一二三| 欧美一区二区三区四区五区| 国产视频911| 亚洲国产综合人成综合网站| 蜜臀av一区二区三区| www.欧美色图| 欧美一区二区啪啪| 国产亲近乱来精品视频| 亚洲国产精品欧美一二99| 国产在线看一区| 欧洲视频一区二区| 国产亚洲一区二区在线观看| 玉足女爽爽91| 国产乱码精品一区二区三| 精品婷婷伊人一区三区三| 欧美激情一区二区三区在线| 丝袜美腿高跟呻吟高潮一区| 成人午夜视频福利| 欧美www视频| 亚洲在线视频免费观看| 国产一区二区免费看|