Dante,
Are you using an other kind of connection (Ethernet, ADSL, IrDA,..) at
the same time?
You can see this by typing
/sbin/ifconfig
which should not contain blocks such as eth0
If there is such a block, use /sbin/ifconfig eth0 down to get rid ot it.
Also, see in /etc/wvdial.conf if you have a line
Auto Dns = yes
and if not, add one and try again.
It would be great if you could open a third terminal. Then, right after
wvdial has displayed DNS's, just give these two commands:
/sbin/ifconfig > mybug3.txt
/sbin/route -n >> mybug3.txt (note 2 >> in this one)
and send mybug3.txt
Cheers
Jacques
Dante ZePasta wrote:
Okay, per Jacques' suggestions, I used wvdial to try
to connect to my ISP (which is BruinOnline). I seemed
to get a bit further - some of the time.
The logs Jacques requested are attached - but the
command I was told to use to generate the
wvdial-specific log didn't work, so I manually copied
over everything that appeared in the terminal during
the dialing sequence into a text file.
Also, I attached two versions of "mybug1.txt" because
my modem doesn't do the same thing every time I try to
connect. Sometimes the negotiations appear to time
out before the ppp daemon recognizes the carrier;
sometimes it recognizes the carrier but then seems to
get stuck (mybug1alt) until manually terminated, and
sometimes the connection routine appears to complete
successfully - only to then tell me that DNS isn't
available/working properly(mybug1). (By the way, what
is this "pppd: sword" thing popping up all over the
place?)
Bottom line: while my modem is clearly working, I can
never seem to properly connect.
Other notes:
stupid/non-stupid mode produce virtually identical
results.
I also inserted the "Detect Carrier = 0" line into
wvdial.config.
mybug2.txt was generated at the same time as
mybug1.txt, but doesn't cover what happened in
mybug1alt; I didn't save a mybug2alt.
Thanks again.
"Marv,
Obviously, Dante's ISP is BruinOnLine (BOL)
http://www.bol.ucla.edu/
Dante does not explictly write which dialer program
generated his log
(which shows that the dialer uses wvdial), not
reporting further wvdial
output once the modem-to-modem connection is set up
and works.
It would tremendously help if Dante would use
uninterfaced wvdial
because we would see the behavior of wvdial during the
clearly failing
logon procedure.
The BOL setup (Win, Mac, no Linux) instructions are
hyper-standard and
leave no room for some trick which could fool a
standard ppp (for
example it uses PAP, not some possibly "proprietary"
variant).
My bet is that Dante's SuSE box uses a conflicting
"verbessert" version
of ppp.
No doubt, Dante: use PLAIN wvdial to try to connect.
If it still fails:
Edit /etc/ppp/options
Add one line:
debug
In the following console 1 is where you use wvdial.
Create an extra console which will be console 2. Be
root or use
su in console 2 (and already before in console 1).
In console 2 type exactly as shown:
tail -f /var/log/messages | tee mybug2.txt
Now go to console 1 and type:
wvdial | tee mybug1.txt
When wvdial terminates or hangs up,
go to console 2 and hit CTRL-C
If wvdial did not exit go to console 1 and hit CTRL-C
You now will have two files, mybug1.txt and mybug2.txt
Send them to us.
ADDITION: Dante, if you believe that your kppp works
better except for
the NO CARRIER issue, add ATX3 in the initialization
string field
available under Modem Configuration.
Jacques"
------------------------------------------------------------------------
sprite:/home/x/Desktop # wvdial | tee mybug1.txt
--> WvDial: Internet dialer version 1.54.0
--> Cannot get information for serial port.
--> Initializing modem.
--> Sending: ATZ
ATZ
OK
--> Sending: ATQ0 V1 E1 S0=0 &C1 &D2
ATQ0 V1 E1 S0=0 &C1 &D2
OK
--> Modem initialized.
--> Idle Seconds = 300, disabling automatic reconnect.
--> Sending: ATDT13102068311
--> Waiting for carrier.
ATDT13102068311
CONNECT 46667
--> Carrier detected. Starting PPP immediately.
--> Starting pppd at Wed Apr 11 15:52:05 2007
--> pid of pppd: 5401
--> pppd: sword
--> Using interface ppp0
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> Authentication (PAP) started
--> pppd: sword
--> pppd: sword
--> Authentication (PAP) successful
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> local IP address 169.232.225.241
--> pppd: sword
--> remote IP address 169.232.224.4
--> pppd: sword
--> primary DNS address 164.67.128.1
--> pppd: sword
--> secondary DNS address 164.67.128.2
--> pppd: sword
--> pppd: sword
--> Script /etc/ppp/ip-up run successful
--> Default route Ok.
--> warning, can't find address for `www.suse.de`
--> warning, address lookup does not work
--> Nameserver (DNS) failure, the connection may not work.
--> Connected... Press Ctrl-C to disconnect
--> pppd: sword
--> Terminating on signal 15
--> pppd: sword
--> Connect time 3.8 minutes.
--> pppd: sword
--> pppd: sword
--> Script /etc/ppp/ip-down started
--> pppd: sword
--> Terminate Request (Message: "User request" )
--> pppd: sword
--> Terminate Request (Message: "User request" )
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> Disconnecting at Wed Apr 11 15:55:57 2007
------------------------------------------------------------------------
--> WvDial: Internet dialer version 1.54.0
--> Cannot get information for serial port.
--> Initializing modem.
--> Sending: ATZ
ATZ
OK
--> Sending: ATQ0 V1 E1 S0=0 &C1 &D2
ATQ0 V1 E1 S0=0 &C1 &D2
OK
--> Modem initialized.
--> Idle Seconds = 300, disabling automatic reconnect.
--> Sending: ATDT13102068311
--> Waiting for carrier.
ATDT13102068311
CONNECT 38667
--> Carrier detected. Starting PPP immediately.
--> Starting pppd at Wed Apr 11 21:26:34 2007
--> pid of pppd: 6238
--> pppd: sword
--> Using interface ppp0
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
Caught signal #2! Attempting to exit gracefully...
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> Terminating on signal 15
--> pppd: sword
--> Terminate Request (Message: "User request" )
--> pppd: sword
--> Terminate Request (Message: "User request" )
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> pppd: sword
--> Disconnecting at Wed Apr 11 21:27:33 2007
------------------------------------------------------------------------
Apr 11 15:30:11 sprite pppd[4968]: Connection terminated.
Apr 11 15:30:11 sprite pppd[4968]: Exit.
Apr 11 15:31:00 sprite kernel: ALSA sound/pci/hda/hda_intel.c:525: hda_intel: azx_get_response timeout, switching to single_cmd mode...
Apr 11 15:52:05 sprite pppd[5401]: Plugin passwordfd.so loaded.
Apr 11 15:52:05 sprite pppd[5401]: pppd 2.4.4 started by root, uid 0
Apr 11 15:52:05 sprite pppd[5401]: using channel 2
Apr 11 15:52:05 sprite pppd[5401]: Using interface ppp0
Apr 11 15:52:05 sprite pppd[5401]: Connect: ppp0 <--> /dev/pts/2
Apr 11 15:52:05 sprite pppd[5401]: sent [LCP ConfReq id=0x1 <asyncmap 0x0> <magic 0xff0d0bdb> <pcomp> <accomp>]
Apr 11 15:52:07 sprite pppd[5401]: sent [LCP ConfReq id=0x1 <asyncmap 0x0> <magic 0xff0d0bdb> <pcomp> <accomp>]
Apr 11 15:52:09 sprite pppd[5401]: sent [LCP ConfReq id=0x1 <asyncmap 0x0> <magic 0xff0d0bdb> <pcomp> <accomp>]
Apr 11 15:52:09 sprite pppd[5401]: rcvd [LCP ConfAck id=0x1 <asyncmap 0x0> <magic 0xff0d0bdb> <pcomp> <accomp>]
Apr 11 15:52:11 sprite pppd[5401]: sent [LCP ConfReq id=0x1 <asyncmap 0x0> <magic 0xff0d0bdb> <pcomp> <accomp>]
Apr 11 15:52:11 sprite pppd[5401]: rcvd [LCP ConfReq id=0x4e <asyncmap 0xa0000> <auth pap> <magic 0x875032f> <pcomp> <accomp>]
Apr 11 15:52:11 sprite pppd[5401]: sent [LCP ConfAck id=0x4e <asyncmap 0xa0000> <auth pap> <magic 0x875032f> <pcomp> <accomp>]
Apr 11 15:52:11 sprite pppd[5401]: rcvd [LCP ConfAck id=0x1 <asyncmap 0x0> <magic 0xff0d0bdb> <pcomp> <accomp>]
Apr 11 15:52:11 sprite pppd[5401]: sent [LCP EchoReq id=0x0 magic=0xff0d0bdb]
Apr 11 15:52:11 sprite pppd[5401]: sent [PAP AuthReq id=0x1 user="jordanrm" password=<hidden>]
Apr 11 15:52:11 sprite pppd[5401]: rcvd [LCP EchoRep id=0x0 magic=0x875032f]
Apr 11 15:52:11 sprite pppd[5401]: rcvd [PAP AuthAck id=0x1 ""]
Apr 11 15:52:11 sprite pppd[5401]: PAP authentication succeeded
Apr 11 15:52:11 sprite kernel: PPP BSD Compression module registered
Apr 11 15:52:11 sprite kernel: PPP Deflate Compression module registered
Apr 11 15:52:11 sprite pppd[5401]: sent [CCP ConfReq id=0x1 <deflate 15> <deflate(old#) 15> <bsd v1 15>]
Apr 11 15:52:11 sprite pppd[5401]: sent [IPCP ConfReq id=0x1 <compress VJ 0f 01> <addr 0.0.0.0> <ms-dns1 0.0.0.0> <ms-dns3 0.0.0.0>]
Apr 11 15:52:11 sprite pppd[5401]: rcvd [IPCP ConfReq id=0xf0 <compress VJ 0f 00> <addr 169.232.224.4>]
Apr 11 15:52:11 sprite pppd[5401]: sent [IPCP ConfAck id=0xf0 <compress VJ 0f 00> <addr 169.232.224.4>]
Apr 11 15:52:12 sprite pppd[5401]: rcvd [LCP ProtRej id=0x4f 80 fd 01 01 00 0f 1a 04 78 00 18 04 78 00 15 03 2f]
Apr 11 15:52:12 sprite pppd[5401]: Protocol-Reject for 'Compression Control Protocol' (0x80fd) received
Apr 11 15:52:12 sprite pppd[5401]: rcvd [IPCP ConfNak id=0x1 <addr 169.232.225.241> <ms-dns1 164.67.128.1> <ms-dns3 164.67.128.2>]
Apr 11 15:52:12 sprite pppd[5401]: sent [IPCP ConfReq id=0x2 <compress VJ 0f 01> <addr 169.232.225.241> <ms-dns1 164.67.128.1> <ms-dns3 164.67.128.2>]
Apr 11 15:52:12 sprite pppd[5401]: rcvd [IPCP ConfAck id=0x2 <compress VJ 0f 01> <addr 169.232.225.241> <ms-dns1 164.67.128.1> <ms-dns3 164.67.128.2>]
Apr 11 15:52:12 sprite pppd[5401]: not replacing default route to eth1 [192.168.0.100]
Apr 11 15:52:12 sprite pppd[5401]: local IP address 169.232.225.241
Apr 11 15:52:12 sprite pppd[5401]: remote IP address 169.232.224.4
Apr 11 15:52:12 sprite pppd[5401]: primary DNS address 164.67.128.1
Apr 11 15:52:12 sprite pppd[5401]: secondary DNS address 164.67.128.2
Apr 11 15:52:12 sprite pppd[5401]: Script /etc/ppp/ip-up started (pid 5421)
Apr 11 15:52:12 sprite modify_resolvconf: Service pppd modified /etc/resolv.conf. See info block in this file
Apr 11 15:52:12 sprite ip-up: SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Apr 11 15:52:12 sprite SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Apr 11 15:52:12 sprite SuSEfirewall2: Setting up rules from /etc/sysconfig/SuSEfirewall2 ...
Apr 11 15:52:13 sprite SuSEfirewall2: batch committing...
Apr 11 15:52:13 sprite SuSEfirewall2: Firewall rules successfully set
Apr 11 15:52:13 sprite pppd[5401]: Script /etc/ppp/ip-up finished (pid 5421), status = 0x0
Apr 11 15:54:54 sprite su: (to root) jordan on /dev/pts/5
Apr 11 15:55:57 sprite pppd[5401]: Terminating on signal 15
Apr 11 15:55:57 sprite pppd[5401]: Connect time 3.8 minutes.
Apr 11 15:55:57 sprite pppd[5401]: Sent 0 bytes, received 0 bytes.
Apr 11 15:55:57 sprite pppd[5401]: Script /etc/ppp/ip-down started (pid 5649)
Apr 11 15:55:57 sprite pppd[5401]: sent [LCP TermReq id=0x2 "User request"]
Apr 11 15:55:57 sprite pppd[5401]: rcvd [LCP TermReq id=0x2 "User request"]
Apr 11 15:55:57 sprite pppd[5401]: sent [LCP TermAck id=0x2]
Apr 11 15:55:57 sprite pppd[5401]: rcvd [LCP TermAck id=0x2]
Apr 11 15:55:57 sprite pppd[5401]: Connection terminated.
Apr 11 15:55:57 sprite pppd[5401]: Waiting for 1 child processes...
Apr 11 15:55:57 sprite pppd[5401]: script /etc/ppp/ip-down, pid 5649
Apr 11 15:55:57 sprite modify_resolvconf: restored /etc/resolv.conf.saved.by.pppd.ppp0 to /etc/resolv.conf
Apr 11 15:55:57 sprite modify_resolvconf: removing info block from /etc/resolv.conf, because there is no backup left
Apr 11 15:55:57 sprite SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Apr 11 15:55:57 sprite ip-down: SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Apr 11 15:55:57 sprite SuSEfirewall2: Setting up rules from /etc/sysconfig/SuSEfirewall2 ...
Apr 11 15:55:57 sprite SuSEfirewall2: batch committing...
Apr 11 15:55:57 sprite SuSEfirewall2: Firewall rules successfully set