LinuxSir.cn,穿越时空的Linuxsir!

 找回密码
 注册
搜索
热搜: shell linux mysql
楼主: hdboy

关于linux上vdsl宽带的问题,请各位看看!

[复制链接]
 楼主| 发表于 2002-10-1 16:12:45 | 显示全部楼层

OK!

十一放假,没什么事儿,在线等!
 楼主| 发表于 2002-10-1 16:13:20 | 显示全部楼层

太谢谢哥儿几个了!

感动啊!
555555555555~!!!!
发表于 2002-10-1 16:20:23 | 显示全部楼层
Installation Instructions and Release Notes


Requires a Linux kernel of 2.4.2-2 or greater. The AEGIS Client has been tested with RedHat 6.2 (after installing pcap from tcpdump.org), RedHat 7.1, and Mandrake 8.0.

This program must be installed and run with root permissions. Save the .rpm file to the directory of your choice. From the directory type:

rpm -ivv mdc-ssd-01.1.2-1.i386.rpm

Type "man mdc-ssd" to view the secure supplicant daemon man page, and "man mdc-ssc" for the client's man page. Additional documentation is in /usr/doc/mdc-ssc and /usr/doc/mdc-ssc/startup. Using the AEGIS Client for Linux requires creation of option and secrets files to communicate with your authenticator.


需要以root身份登入安装该软件
更多的文档在这个目录下 /usr/doc/mdc-ssc and /usr/doc/mdc-ssc/startup
 楼主| 发表于 2002-10-1 16:42:09 | 显示全部楼层

软件已经装上了!

稳当目录里就有些版权和简单的readme,没有怎么设置用户名和密码只类的说明,也没有怎么连接认证的说明啊!?
发表于 2002-10-1 19:26:34 | 显示全部楼层
readme中有说明!
This is the README for mdc-ssd, a binary package which implements
the 802.1x protocol for port-access authentication.  This permits
authentication to LANs using wireless or conventional ethernet access.

Release.
********

For release information please see the RELEASES document.

Introduction.
*************

The 802.1x protocol provides authentication to access IEEE Std 802 LAN
infrastructure.  802.1x is a draft standard and is based on the PPP-EAP
(Point-to-Point Extensible Authentication Protocol).  802.1x allows
a user to access a LAN port and obtain authentication from an
authentication server.

802.1x is in part a repackaging of EAP.  EAP packets are wrapped
in EAPOL (EAP over LAN) packets.  The extra fields of the EAPOL packets
can give added functionality suitable for wireless connection, such
as encryption key fields.  The entire EAP packet may therefore be
encrypted.

EAP was proposed to support a variety of protocols.  In practice,
only a subset is typically implemented.  Similarly, in this implementation
of 802.1x only CHAP-MD5 and TLS are supported.  TLS is in fact the
latest version of SSL, version 3.1.  The mdc-ssd daemon has not been
tested against earlier versions of SSL.

802.1x defines two negotiating entities.  The user's agent, which
is attempting to authenticate to the network, is called the supplicant.
The network's agent, which controls access of the supplicant, is
called the authenticator.  The authenticator is typically a switch.
The authenticator, in spite of it's name, need not perform authentication.
That responsibility is generally handled remotely, by an authentication
server.  This software acts as a supplicant, to allow the computer
upon which it is running access to the authenticator's network.

This software is binary and includes two executables:

1) mdc-ssd - the supplicant daemon.

2) mdc-ssc - a client program that can query  state information
             from the supplicant, and/or cause it to send start
                         or logoff packets.
Wireless Support
****************
The MDC supplicant has been tested in a wireless environment using
the following wireless NICs:
1)   Cisco 340
2)   Orinoco Gold with the wavelan2_cs_6.17BETA driver

Libraries.
*************

No libraries are required for this binary version.  However, if you
are using TLS authentication, you may wish to download OpenSSL.  This
will give you tools for making, converting and testing certificates.
The mdc-ssd daemon uses the OpenSSL library for TLS.  You can obtain
OpenSSL from:
  http://www.openssl.org/ (or ftp://ftp.openssl.org/source/)


Installation/Configuration.
***************************

mdc-ssd contains proprietary code from other Meetinghouse Data
Communications products, and is therefore only being released
in binary .rpm format.  Sorry.  This program is freely available
from the www.mtghouse.com website, but may not be otherwise
distributed.

Download the .rpm to any directory.  From that directory type:
      rpm -ivv <rpmfilename>

That's it!  The mdc-ssd daemon and mdc-ssc client are in /usr/sbin.
Docs are under /usr/doc/mdc-ssd, configuration files and
sample certificate files are in /etc/mdc-ssd (the certificates will
not work for you!).

Running
******

Type:

     mdc-ssd

by default, the daemon will detatch from the console.


Documentation
*************

Type "man mdc-ssd" to view the daemon's man page, and "man mdc-ssc"
to view the man page for the client.

The subdirectory startup contains readme and installation scripts.
Currently the only tested installation is Redhat Linux (version
6.2 or greater).

The directory /usr/doc/mdc-ssd/startup contains a README and
sample installation script.  Additional installation instructions
are in the mdc-ssd man page.


这时一个命令行软件,只有在终端工作
先打入  mdc-ssd 试试

我没有这个设备,所以无法实验,你先试后再把情况说一下.

还有北南兄,这应该是免费软件.
 楼主| 发表于 2002-10-1 20:49:54 | 显示全部楼层

我下午试过了!

在命令行打mdc-ssd,然后一堆乱七八糟的东西,等明天我把输出结果帖上来。
还有,不管怎么样,也应该有配置文件呀,也要用户名和密码呀,要不怎么认证啊!?把我弄的直糊涂,今天弄了一天也没弄好,最怕弄到最后这个软件根本不能用在我这种情况下!
哎~!希望可以早日解决这个烦人的问题。
谢谢哥儿几个这么热心帮忙啊。
linuxsir一定会成为中国人气最旺的论坛!
明天接着弄,现在去陪MM了!
哈哈~!
 楼主| 发表于 2002-10-2 09:54:44 | 显示全部楼层

我在终端下敲入mdc-ssd,输出结果如下:

mdc-ssd options in effect:
nodetach                # (from /etc/mdc-ssd/options)
logfd 1                # (from /etc/mdc-ssd/options)
dump                # (from /etc/mdc-ssd/options)
TLSdebug                # (from /etc/mdc-ssd/options)
TLSstate                # (from /etc/mdc-ssd/options)
TLSbugs                # (from /etc/mdc-ssd/options)
mdc-ssd: mdc-ssd TLS: cert file: /etc/mdc-ssd/eth0/mycert.pem
mdc-ssd: mdc-ssd TLS: key file:
mdc-ssd: 802.1X: txStart(port=1) (transmit an EAP start packet)
mdc-ssd: 802.1X: supp state -> SSM_CONNECTING for port 1
mdc-ssd: 802.1X: EAP request-ID received.
mdc-ssd: mdc-ssd: txRspId(Transmit our identity (test) to authenticator)
mdc-ssd: 802.1X: supp state -> SSM_ACQUIRED for port 1
mdc-ssd: 802.1X: Received a authentication request packet with authentication type: 4.
mdc-ssd: txRspAuth no secret found, using default secret.
mdc-ssd: 802.1X: txRspAuth(Transmitting a reply to authenticator for authentication type=4
mdc-ssd: 802.1X: supp state -> SSM_AUTHENTICATING for port 1
mdc-ssd: 802.1X: EAP failure received.
mdc-ssd: 802.1X: supp state -> SSM_HELD for port 1
mdc-ssd: 802.1X: txStart(port=1) (transmit an EAP start packet)
mdc-ssd: 802.1X: supp state -> SSM_CONNECTING for port 1
mdc-ssd: 802.1X: EAP request-ID received.
mdc-ssd: mdc-ssd: txRspId(Transmit our identity (test) to authenticator)
mdc-ssd: 802.1X: supp state -> SSM_ACQUIRED for port 1
mdc-ssd: 802.1X: Received a authentication request packet with authentication type: 4.
mdc-ssd: txRspAuth no secret found, using default secret.
mdc-ssd: 802.1X: txRspAuth(Transmitting a reply to authenticator for authentication type=4
mdc-ssd: 802.1X: supp state -> SSM_AUTHENTICATING for port 1
mdc-ssd: 802.1X: EAP failure received.
mdc-ssd: 802.1X: supp state -> SSM_HELD for port 1
mdc-ssd: 802.1X: txLogoff(port=1) (transmit an EAP logoff packet)
eth0: no IPv4 address assigned
就这样反复,敲mdc-ssc时会出现一个二级提示符“>”,输入什么回车以后都没反应了!
痛苦!
发表于 2002-10-2 10:13:22 | 显示全部楼层
先说一下,
readme 中有这句 This software acts as a supplicant
应该就是你要的软件了(99.9999999%):p
 楼主| 发表于 2002-10-2 10:18:59 | 显示全部楼层

那太好了。

快帮我看看怎么弄!争取今天能上去!
 楼主| 发表于 2002-10-2 12:01:04 | 显示全部楼层
好象mdc-ssd就是个服务器程序
[root@localhost eth0]# /usr/sbin/mdc-ssd
mdc-ssd options in effect:
nodetach                # (from /etc/mdc-ssd/options)
logfd 1         # (from /etc/mdc-ssd/options)
dump            # (from /etc/mdc-ssd/options)
TLSdebug                # (from /etc/mdc-ssd/options)
TLSstate                # (from /etc/mdc-ssd/options)
TLSbugs         # (from /etc/mdc-ssd/options)
mdc-ssd: mdc-ssd TLS: cert file: /etc/mdc-ssd/eth0/mycert.pem
mdc-ssd: mdc-ssd TLS: key file:
mdc-ssd: 802.1X: txStart(port=1) (transmit an EAP start packet)
mdc-ssd: 802.1X: supp state -> SSM_CONNECTING for port 1
mdc-ssd: 802.1X: EAP request-ID received.
mdc-ssd: mdc-ssd: txRspId(Transmit our identity (test) to authenticator)
mdc-ssd: 802.1X: supp state -> SSM_ACQUIRED for port 1
mdc-ssd: 802.1X: Received a authentication request packet with authentication type: 4.
mdc-ssd: txRspAuth no secret found, using default secret.
mdc-ssd: 802.1X: txRspAuth(Transmitting a reply to authenticator for authentication type=4
mdc-ssd: 802.1X: supp state -> SSM_AUTHENTICATING for port 1
mdc-ssd: 802.1X: EAP failure received.
mdc-ssd: 802.1X: supp state -> SSM_HELD for port 1
mdc-ssd: 802.1X: txStart(port=1) (transmit an EAP start packet)
mdc-ssd: 802.1X: supp state -> SSM_CONNECTING for port 1
mdc-ssd: 802.1X: EAP request-ID received.
mdc-ssd: mdc-ssd: txRspId(Transmit our identity (test) to authenticator)
mdc-ssd: 802.1X: supp state -> SSM_ACQUIRED for port 1
mdc-ssd: 802.1X: Received a authentication request packet with authentication type: 4.
mdc-ssd: txRspAuth no secret found, using default secret.
mdc-ssd: 802.1X: txRspAuth(Transmitting a reply to authenticator for authentication type=4
mdc-ssd: 802.1X: supp state -> SSM_AUTHENTICATING for port 1
mdc-ssd: 802.1X: EAP failure received.
mdc-ssd: 802.1X: supp state -> SSM_HELD for port 1
mdc-ssd: 802.1X: txStart(port=1) (transmit an EAP start packet)
mdc-ssd: 802.1X: EAP request-ID received.
mdc-ssd: mdc-ssd: txRspId(Transmit our identity (test) to authenticator)
mdc-ssd: 802.1X: supp state -> SSM_ACQUIRED for port 1
mdc-ssd: 802.1X: Received a authentication request packet with authentication type: 4.
mdc-ssd: txRspAuth no secret found, using default secret.
mdc-ssd: 802.1X: txRspAuth(Transmitting a reply to authenticator for authentication type=4
mdc-ssd: 802.1X: supp state -> SSM_AUTHENTICATING for port 1
mdc-ssd: 802.1X: EAP failure received.
mdc-ssd: 802.1X: supp state -> SSM_HELD for port 1
mdc-ssd: 802.1X: txStart(port=1) (transmit an EAP start packet)
mdc-ssd: 802.1X: supp state -> SSM_CONNECTING for port 1
mdc-ssd: 802.1X: EAP request-ID received.
mdc-ssd: mdc-ssd: txRspId(Transmit our identity (test) to authenticator)
mdc-ssd: 802.1X: supp state -> SSM_ACQUIRED for port 1
mdc-ssd: 802.1X: Received a authentication request packet with authentication type: 4.
mdc-ssd: txRspAuth no secret found, using default secret.
mdc-ssd: 802.1X: txRspAuth(Transmitting a reply to authenticator for authentication type=4
mdc-ssd: 802.1X: supp state -> SSM_AUTHENTICATING for port 1
mdc-ssd: 802.1X: EAP failure received.
mdc-ssd: 802.1X: supp state -> SSM_HELD for port 1
mdc-ssd: 802.1X: txStart(port=1) (transmit an EAP start packet)
mdc-ssd: 802.1X: supp state -> SSM_CONNECTING for port 1
mdc-ssd: 802.1X: EAP request-ID received.
mdc-ssd: mdc-ssd: txRspId(Transmit our identity (test) to authenticator)
mdc-ssd: 802.1X: supp state -> SSM_ACQUIRED for port 1
mdc-ssd: 802.1X: Received a authentication request packet with authentication type: 4.
mdc-ssd: txRspAuth no secret found, using default secret.
mdc-ssd: 802.1X: txRspAuth(Transmitting a reply to authenticator for authentication type=4
mdc-ssd: 802.1X: supp state -> SSM_AUTHENTICATING for port 1
mdc-ssd: 802.1X: EAP failure received.
mdc-ssd: 802.1X: supp state -> SSM_HELD for port 1
mdc-ssd: 802.1X: txLogoff(port=1) (transmit an EAP logoff packet)
mdc-ssd: 802.1X: txStart(port=1) (transmit an EAP start packet)
mdc-ssd: 802.1X: supp state -> SSM_CONNECTING for port 1
mdc-ssd: 802.1X: EAP request-ID received.
mdc-ssd: mdc-ssd: txRspId(Transmit our identity (test) to authenticator)
mdc-ssd: 802.1X: supp state -> SSM_ACQUIRED for port 1
mdc-ssd: 802.1X: Received a authentication request packet with authentication type: 4.
mdc-ssd: txRspAuth no secret found, using default secret.
mdc-ssd: 802.1X: txRspAuth(Transmitting a reply to authenticator for authentication type=4
mdc-ssd: 802.1X: supp state -> SSM_AUTHENTICATING for port 1
mdc-ssd: 802.1X: EAP failure received.
mdc-ssd: 802.1X: supp state -> SSM_HELD for port 1
mdc-ssd: 802.1X: txStart(port=1) (transmit an EAP start packet)
mdc-ssd: 802.1X: supp state -> SSM_CONNECTING for port 1
mdc-ssd: 802.1X: EAP request-ID received.
mdc-ssd: mdc-ssd: txRspId(Transmit our identity (test) to authenticator)
mdc-ssd: 802.1X: supp state -> SSM_ACQUIRED for port 1
mdc-ssd: 802.1X: Received a authentication request packet with authentication type: 4.
mdc-ssd: txRspAuth no secret found, using default secret.
mdc-ssd: 802.1X: txRspAuth(Transmitting a reply to authenticator for authentication type=4
mdc-ssd: 802.1X: supp state -> SSM_AUTHENTICATING for port 1
mdc-ssd: 802.1X: EAP failure received.
mdc-ssd: 802.1X: supp state -> SSM_HELD for port 1
mdc-ssd: 802.1X: txStart(port=1) (transmit an EAP start packet)
mdc-ssd: 802.1X: EAP request-ID received.
mdc-ssd: mdc-ssd: txRspId(Transmit our identity (test) to authenticator)
mdc-ssd: 802.1X: supp state -> SSM_ACQUIRED for port 1
mdc-ssd: 802.1X: Received a authentication request packet with authentication type: 4.
mdc-ssd: txRspAuth no secret found, using default secret.
mdc-ssd: 802.1X: txRspAuth(Transmitting a reply to authenticator for authentication type=4
mdc-ssd: 802.1X: supp state -> SSM_AUTHENTICATING for port 1
mdc-ssd: 802.1X: EAP failure received.
mdc-ssd: 802.1X: supp state -> SSM_HELD for port 1
mdc-ssd: 802.1X: txStart(port=1) (transmit an EAP start packet)
mdc-ssd: 802.1X: supp state -> SSM_CONNECTING for port 1
mdc-ssd: 802.1X: EAP request-ID received.
mdc-ssd: mdc-ssd: txRspId(Transmit our identity (test) to authenticator)
mdc-ssd: 802.1X: supp state -> SSM_ACQUIRED for port 1
mdc-ssd: 802.1X: Received a authentication request packet with authentication type: 4.
mdc-ssd: txRspAuth no secret found, using default secret.
mdc-ssd: 802.1X: txRspAuth(Transmitting a reply to authenticator for authentication type=4
mdc-ssd: 802.1X: supp state -> SSM_AUTHENTICATING for port 1
mdc-ssd: 802.1X: EAP failure received.
mdc-ssd: 802.1X: supp state -> SSM_HELD for port 1
mdc-ssd: 802.1X: txStart(port=1) (transmit an EAP start packet)
mdc-ssd: 802.1X: supp state -> SSM_CONNECTING for port 1
mdc-ssd: 802.1X: EAP request-ID received.
mdc-ssd: mdc-ssd: txRspId(Transmit our identity (test) to authenticator)
mdc-ssd: 802.1X: supp state -> SSM_ACQUIRED for port 1
mdc-ssd: 802.1X: Received a authentication request packet with authentication type: 4.
mdc-ssd: txRspAuth no secret found, using default secret.
mdc-ssd: 802.1X: txRspAuth(Transmitting a reply to authenticator for authentication type=4
mdc-ssd: 802.1X: supp state -> SSM_AUTHENTICATING for port 1
mdc-ssd: 802.1X: EAP failure received.
mdc-ssd: 802.1X: supp state -> SSM_HELD for port 1
这儿是mdc-ssc的显示,如果不执行mdc-ssd的话,就不会有反应,执行mdc-ssd以后再执行这个命令,敲help就能出现如下的提示
[hdboy@localhost hdboy]$ /usr/sbin/mdc-ssc 127.0.0.1
Copyright (c) 2001 Meetinghouse Data Communications (mtghouse.com)
> help
help - Help command
state - Show current state of mdc-ssd:
        state <interface>
start - Send an 802.1x Start command:
        start <interface>
logoff - Send an 802.1x Logoff command:
        logoff <interface>
quit - quits this client program.
> start eth0
> logogg eth0
Unknown command
> quit
[hdboy@localhost hdboy]$
我实在是弄不明白了!
您需要登录后才可以回帖 登录 | 注册

本版积分规则

快速回复 返回顶部 返回列表