Jump to content


Photo

Networking a classic Mac via serial port -> OS X /unix /Linux -> internet


  • Please log in to reply
74 replies to this topic

#61 t3h

t3h
  • 6502

Posted 04 April 2016 - 11:15 AM

Add "noauth" to the pppd options to tell it you don't need the other end to authenticate. It's complaining you don't have a secrets file with the password in it you expect the client to use.

#62 galgot

galgot
  • 6502

Posted 04 April 2016 - 05:32 PM

Thanks. pppd seems to be working on the linux side with "noauth" added. But I can't get a connection on the Minivmac side...

How would you configure macTCP ? Would you put the Linux machine IP as the gateway, or my main router ? 



#63 mactjaap

mactjaap
  • 6502
  • LocationThe Netherlands

Posted 17 February 2017 - 03:00 PM

Consider for TCP/IP and AFTP file sharing for old Macintosh also the MacIPgw VM or macIPpi aproach. Read all about it on:

 

http://www.macip.net/   MacIPgw VM

http://www.macip.net/?page_id=113 MacIPpi


Collection: Apple II (ITT 2020), LISA 2, Macintosh 128K, 512K, Plus, ED, SE, Portable, PowerBook 100 and a FastPath5 router.
Looking for TCP/IP over LocalTalk?? I made something very usefull... Look at http://www.macip.net


#64 jefframsey

jefframsey
  • 6502

Posted 14 May 2017 - 02:40 AM

Hi All,

I used the info from this thread and a howto over at raspberrypi.org to create a PPP->serial->USB->WiFi router. I wrote up a blog post on my wordpress if anyone is interested: https://jeffhacksthi...-serial-router/

#65 Machead

Machead
  • 6502
  • LocationPacific Co., WA

Posted 15 May 2017 - 03:21 AM

I tried this method with my 6360 with System 7.5.3 and a Linux box, but FreePPP always hangs my computer, and I can't even force-quit it! I've been able to make a PPP connection with Apple Remote Access, but it can't connect to the Internet. IP forwarding is on.


Edited by Machead, 15 May 2017 - 03:23 AM.


#66 jefframsey

jefframsey
  • 6502

Posted 15 May 2017 - 05:11 AM

I tried this method with my 6360 with System 7.5.3 and a Linux box, but FreePPP always hangs my computer, and I can't even force-quit it! I've been able to make a PPP connection with Apple Remote Access, but it can't connect to the Internet. IP forwarding is on.


I used MacPPP, but I am only running 7.1.1 so I had no choice.

One thing I found out when I dove into this process, the command "sysctl -w net.inet.ip.forwarding=1" only allows IP forwarding in the kernel of some *nix computers but does not enable the forwarding for a modern Linux box. You must enable IP forwarding in IPTables.

Try this command on the Linux box: sudo I-tables -t nat -A POSTROUTING -o wlan0 -j MASQUERADE
(Replace the [wlan0] with the name of the network connection that your Linux computer uses to connect to the Internet. if0, eth0, etc.)

If that doesn't work, there may be something different already in your IPTables configuration. If so it will take a bit more investigation to solve this for you.

Edited by jefframsey, 15 May 2017 - 05:15 AM.


#67 Machead

Machead
  • 6502
  • LocationPacific Co., WA

Posted 15 May 2017 - 09:06 PM

I tried that command. No change.



#68 jefframsey

jefframsey
  • 6502

Posted 16 May 2017 - 03:13 AM

I tried that command. No change.

What flavor a version of Linux are you working with? Also, please post the results of this command:

sudo iptables -S

Edited by jefframsey, 16 May 2017 - 03:14 AM.


#69 Machead

Machead
  • 6502
  • LocationPacific Co., WA

Posted 16 May 2017 - 05:25 AM

What flavor a version of Linux are you working with?

Linux Mint 18.1.

 

 

Also, please post the results of this command:

sudo iptables -S

 

-P INPUT DROP
-P FORWARD DROP
-P OUTPUT ACCEPT
-N ufw-after-forward
-N ufw-after-input
-N ufw-after-logging-forward
-N ufw-after-logging-input
-N ufw-after-logging-output
-N ufw-after-output
-N ufw-before-forward
-N ufw-before-input
-N ufw-before-logging-forward
-N ufw-before-logging-input
-N ufw-before-logging-output
-N ufw-before-output
-N ufw-logging-allow
-N ufw-logging-deny
-N ufw-not-local
-N ufw-reject-forward
-N ufw-reject-input
-N ufw-reject-output
-N ufw-skip-to-policy-forward
-N ufw-skip-to-policy-input
-N ufw-skip-to-policy-output
-N ufw-track-forward
-N ufw-track-input
-N ufw-track-output
-N ufw-user-forward
-N ufw-user-input
-N ufw-user-limit
-N ufw-user-limit-accept
-N ufw-user-logging-forward
-N ufw-user-logging-input
-N ufw-user-logging-output
-N ufw-user-output
-A INPUT -j ufw-before-logging-input
-A INPUT -j ufw-before-input
-A INPUT -j ufw-after-input
-A INPUT -j ufw-after-logging-input
-A INPUT -j ufw-reject-input
-A INPUT -j ufw-track-input
-A FORWARD -j ufw-before-logging-forward
-A FORWARD -j ufw-before-forward
-A FORWARD -j ufw-after-forward
-A FORWARD -j ufw-after-logging-forward
-A FORWARD -j ufw-reject-forward
-A FORWARD -j ufw-track-forward
-A OUTPUT -j ufw-before-logging-output
-A OUTPUT -j ufw-before-output
-A OUTPUT -j ufw-after-output
-A OUTPUT -j ufw-after-logging-output
-A OUTPUT -j ufw-reject-output
-A OUTPUT -j ufw-track-output
-A ufw-after-input -p udp -m udp --dport 137 -j ufw-skip-to-policy-input
-A ufw-after-input -p udp -m udp --dport 138 -j ufw-skip-to-policy-input
-A ufw-after-input -p tcp -m tcp --dport 139 -j ufw-skip-to-policy-input
-A ufw-after-input -p tcp -m tcp --dport 445 -j ufw-skip-to-policy-input
-A ufw-after-input -p udp -m udp --dport 67 -j ufw-skip-to-policy-input
-A ufw-after-input -p udp -m udp --dport 68 -j ufw-skip-to-policy-input
-A ufw-after-input -m addrtype --dst-type BROADCAST -j ufw-skip-to-policy-input
-A ufw-after-logging-forward -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] "
-A ufw-after-logging-input -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] "
-A ufw-before-forward -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A ufw-before-forward -p icmp -m icmp --icmp-type 3 -j ACCEPT
-A ufw-before-forward -p icmp -m icmp --icmp-type 4 -j ACCEPT
-A ufw-before-forward -p icmp -m icmp --icmp-type 11 -j ACCEPT
-A ufw-before-forward -p icmp -m icmp --icmp-type 12 -j ACCEPT
-A ufw-before-forward -p icmp -m icmp --icmp-type 8 -j ACCEPT
-A ufw-before-forward -j ufw-user-forward
-A ufw-before-input -i lo -j ACCEPT
-A ufw-before-input -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A ufw-before-input -m conntrack --ctstate INVALID -j ufw-logging-deny
-A ufw-before-input -m conntrack --ctstate INVALID -j DROP
-A ufw-before-input -p icmp -m icmp --icmp-type 3 -j ACCEPT
-A ufw-before-input -p icmp -m icmp --icmp-type 4 -j ACCEPT
-A ufw-before-input -p icmp -m icmp --icmp-type 11 -j ACCEPT
-A ufw-before-input -p icmp -m icmp --icmp-type 12 -j ACCEPT
-A ufw-before-input -p icmp -m icmp --icmp-type 8 -j ACCEPT
-A ufw-before-input -p udp -m udp --sport 67 --dport 68 -j ACCEPT
-A ufw-before-input -j ufw-not-local
-A ufw-before-input -d 224.0.0.251/32 -p udp -m udp --dport 5353 -j ACCEPT
-A ufw-before-input -d 239.255.255.250/32 -p udp -m udp --dport 1900 -j ACCEPT
-A ufw-before-input -j ufw-user-input
-A ufw-before-output -o lo -j ACCEPT
-A ufw-before-output -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A ufw-before-output -j ufw-user-output
-A ufw-logging-allow -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW ALLOW] "
-A ufw-logging-deny -m conntrack --ctstate INVALID -m limit --limit 3/min --limit-burst 10 -j RETURN
-A ufw-logging-deny -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] "
-A ufw-not-local -m addrtype --dst-type LOCAL -j RETURN
-A ufw-not-local -m addrtype --dst-type MULTICAST -j RETURN
-A ufw-not-local -m addrtype --dst-type BROADCAST -j RETURN
-A ufw-not-local -m limit --limit 3/min --limit-burst 10 -j ufw-logging-deny
-A ufw-not-local -j DROP
-A ufw-skip-to-policy-forward -j DROP
-A ufw-skip-to-policy-input -j DROP
-A ufw-skip-to-policy-output -j ACCEPT
-A ufw-track-output -p tcp -m conntrack --ctstate NEW -j ACCEPT
-A ufw-track-output -p udp -m conntrack --ctstate NEW -j ACCEPT
-A ufw-user-limit -m limit --limit 3/min -j LOG --log-prefix "[UFW LIMIT BLOCK] "
-A ufw-user-limit -j REJECT --reject-with icmp-port-unreachable
-A ufw-user-limit-accept -j ACCEPT


Edited by Machead, 16 May 2017 - 05:26 AM.


#70 mactjaap

mactjaap
  • 6502
  • LocationThe Netherlands

Posted 16 May 2017 - 10:02 PM

@jefframsey

Cool write up about PPP! I’m thinking of including PPP service on my MacIPpi project (http://www.macip.net/?page_id=113). Would be cool to facilitate people without a LocalTalk bridge but with a serial USB cable.

 

Could you post some pictures how your Macintosh SE is connected to the Pi?

And some wirering details? How do you connect the SE to the Pi?


Collection: Apple II (ITT 2020), LISA 2, Macintosh 128K, 512K, Plus, ED, SE, Portable, PowerBook 100 and a FastPath5 router.
Looking for TCP/IP over LocalTalk?? I made something very usefull... Look at http://www.macip.net


#71 jefframsey

jefframsey
  • 6502

Posted 18 May 2017 - 04:47 AM

Linux Mint 18.1.
-P INPUT DROP
-P FORWARD DROP
-P OUTPUT ACCEPT
-N ufw-after-forward
-N ufw-after-input
-N ufw-after-logging-forward
-N ufw-after-logging-input
-N ufw-after-logging-output
-N ufw-after-output
-N ufw-before-forward
-N ufw-before-input
-N ufw-before-logging-forward
-N ufw-before-logging-input
-N ufw-before-logging-output
-N ufw-before-output
-N ufw-logging-allow
-N ufw-logging-deny
-N ufw-not-local
-N ufw-reject-forward
-N ufw-reject-input
-N ufw-reject-output
-N ufw-skip-to-policy-forward
-N ufw-skip-to-policy-input
-N ufw-skip-to-policy-output
-N ufw-track-forward
-N ufw-track-input
-N ufw-track-output
-N ufw-user-forward
-N ufw-user-input
-N ufw-user-limit
-N ufw-user-limit-accept
-N ufw-user-logging-forward
-N ufw-user-logging-input
-N ufw-user-logging-output
-N ufw-user-output
-A INPUT -j ufw-before-logging-input
-A INPUT -j ufw-before-input
-A INPUT -j ufw-after-input
-A INPUT -j ufw-after-logging-input
-A INPUT -j ufw-reject-input
-A INPUT -j ufw-track-input
-A FORWARD -j ufw-before-logging-forward
-A FORWARD -j ufw-before-forward
-A FORWARD -j ufw-after-forward
-A FORWARD -j ufw-after-logging-forward
-A FORWARD -j ufw-reject-forward
-A FORWARD -j ufw-track-forward
-A OUTPUT -j ufw-before-logging-output
-A OUTPUT -j ufw-before-output
-A OUTPUT -j ufw-after-output
-A OUTPUT -j ufw-after-logging-output
-A OUTPUT -j ufw-reject-output
-A OUTPUT -j ufw-track-output
-A ufw-after-input -p udp -m udp --dport 137 -j ufw-skip-to-policy-input
-A ufw-after-input -p udp -m udp --dport 138 -j ufw-skip-to-policy-input
-A ufw-after-input -p tcp -m tcp --dport 139 -j ufw-skip-to-policy-input
-A ufw-after-input -p tcp -m tcp --dport 445 -j ufw-skip-to-policy-input
-A ufw-after-input -p udp -m udp --dport 67 -j ufw-skip-to-policy-input
-A ufw-after-input -p udp -m udp --dport 68 -j ufw-skip-to-policy-input
-A ufw-after-input -m addrtype --dst-type BROADCAST -j ufw-skip-to-policy-input
-A ufw-after-logging-forward -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] "
-A ufw-after-logging-input -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] "
-A ufw-before-forward -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A ufw-before-forward -p icmp -m icmp --icmp-type 3 -j ACCEPT
-A ufw-before-forward -p icmp -m icmp --icmp-type 4 -j ACCEPT
-A ufw-before-forward -p icmp -m icmp --icmp-type 11 -j ACCEPT
-A ufw-before-forward -p icmp -m icmp --icmp-type 12 -j ACCEPT
-A ufw-before-forward -p icmp -m icmp --icmp-type 8 -j ACCEPT
-A ufw-before-forward -j ufw-user-forward
-A ufw-before-input -i lo -j ACCEPT
-A ufw-before-input -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A ufw-before-input -m conntrack --ctstate INVALID -j ufw-logging-deny
-A ufw-before-input -m conntrack --ctstate INVALID -j DROP
-A ufw-before-input -p icmp -m icmp --icmp-type 3 -j ACCEPT
-A ufw-before-input -p icmp -m icmp --icmp-type 4 -j ACCEPT
-A ufw-before-input -p icmp -m icmp --icmp-type 11 -j ACCEPT
-A ufw-before-input -p icmp -m icmp --icmp-type 12 -j ACCEPT
-A ufw-before-input -p icmp -m icmp --icmp-type 8 -j ACCEPT
-A ufw-before-input -p udp -m udp --sport 67 --dport 68 -j ACCEPT
-A ufw-before-input -j ufw-not-local
-A ufw-before-input -d 224.0.0.251/32 -p udp -m udp --dport 5353 -j ACCEPT
-A ufw-before-input -d 239.255.255.250/32 -p udp -m udp --dport 1900 -j ACCEPT
-A ufw-before-input -j ufw-user-input
-A ufw-before-output -o lo -j ACCEPT
-A ufw-before-output -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A ufw-before-output -j ufw-user-output
-A ufw-logging-allow -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW ALLOW] "
-A ufw-logging-deny -m conntrack --ctstate INVALID -m limit --limit 3/min --limit-burst 10 -j RETURN
-A ufw-logging-deny -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] "
-A ufw-not-local -m addrtype --dst-type LOCAL -j RETURN
-A ufw-not-local -m addrtype --dst-type MULTICAST -j RETURN
-A ufw-not-local -m addrtype --dst-type BROADCAST -j RETURN
-A ufw-not-local -m limit --limit 3/min --limit-burst 10 -j ufw-logging-deny
-A ufw-not-local -j DROP
-A ufw-skip-to-policy-forward -j DROP
-A ufw-skip-to-policy-input -j DROP
-A ufw-skip-to-policy-output -j ACCEPT
-A ufw-track-output -p tcp -m conntrack --ctstate NEW -j ACCEPT
-A ufw-track-output -p udp -m conntrack --ctstate NEW -j ACCEPT
-A ufw-user-limit -m limit --limit 3/min -j LOG --log-prefix "[UFW LIMIT BLOCK] "
-A ufw-user-limit -j REJECT --reject-with icmp-port-unreachable
-A ufw-user-limit-accept -j ACCEPT

That is a whole lot of IPTables rules. I am not familiar with Linux Mint, but this article (https://forums.linux...pic.php?t=52742) shows that all of those rules are part of the ufw service, which is a firewall and may be blocking the PPP connections that you are tryin to make.

Try the following three commands (hitting enter after each one):

"sudo ufw disable"
"sudo iptables --flush"
"sudo iptables -S"

You should only get the following results:

Chain INPUT (policy ACCEPT)
target prot opt source destination

Chain FORWARD (policy ACCEPT)
target prot opt source destination

Chain OUTPUT (policy ACCEPT)
target prot opt source destination

------------------

Once you get iptables cleaned out, you should be able to run:
"sudo I-tables -t nat -A POSTROUTING -o wlan0 -j MASQUERADE" replacing the [wlan0] with whatever your interface is called that you connect to the Internet on your Linux box.

Edited by jefframsey, 18 May 2017 - 04:49 AM.


#72 jefframsey

jefframsey
  • 6502

Posted 18 May 2017 - 04:53 AM

@jefframsey

Cool write up about PPP! I’m thinking of including PPP service on my MacIPpi project (http://www.macip.net/?page_id=113). Would be cool to facilitate people without a LocalTalk bridge but with a serial USB cable.
 
Could you post some pictures how your Macintosh SE is connected to the Pi?
And some wirering details? How do you connect the SE to the Pi?


Thanks for the kind words. I updated the blog post with pics of the cable connections. As soon as I can, I will check the pinout on my minidin 8-pin to db9 serial cable. I found the cable in a drawer somewhere and it didn't work as-is so I cut the cable and rewired it to be the correct pinout. I looked through my notes and I can't seem to find the pinout that I used. I'll reverse engineer it in the morning.

#73 Machead

Machead
  • 6502
  • LocationPacific Co., WA

Posted 18 May 2017 - 05:44 AM

I did as you directed, and it now works; as I write, I am downloading Netscape 4.08 at a blazing 10 kB per second!



#74 jefframsey

jefframsey
  • 6502

Posted 18 May 2017 - 06:17 AM

I did as you directed, and it now works; as I write, I am downloading Netscape 4.08 at a blazing 10 kB per second!


Sweet! Glad to hear that.

FWIW, the last set of changes we made to iptables and ufw may or may not be retained after a reboot. You will have to search the Internet for a way to retain the current settings.

#75 Machead

Machead
  • 6502
  • LocationPacific Co., WA

Posted 22 May 2017 - 12:31 AM

The ufw settings were retained; I am now looking for a way to make pppd start up when the computer starts up. I also want a way to access HTTPS from my Mac.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users