Hi, The docs for ppp-up don't give alot of attention to logins using pap. I've just set it up very easily with EZPPP. These are the basic steps: AS root you must 1. chmod 666 /etc/resolv.conf 2. chmod 666 /dev/modem 3. chown root.root /usr/sbin/pppd 4. chmod 555 /usr/sbinpppd 5. chmod +s /usr/sbin/pppd 6. you must empty /etc/ppp/options to a zero file, since it interferes with ezppp 7. put any users who can dialout in the dialout group 8. put the ezppp binary in each dialout users home directory and let them own it. 9. Set up the /etc/ppp/pap-secrets file: For example at Mindspring: ***************************************************** #pap-secrets # client server secret ip ms999999 mindspring yuk2yak ***************************************************** Then set up the pppd arguments in ezppp: Here is the script that works perfectly: -detach defaultroute lock modem noipdefault user ms999999 remotename mindspring This script probably could be adapted to work with ppp-up, but ezppp is so easy, I have no urge to try. It will probably work with kppp under KDE. I'm going to try it later. Well this works great for me. I don't know what the security implications are of the chmod's and chown's. Since the user is owner of the binary, I doubt if it can do much havoc. Please write if you see a flaw in this. I really barely know the basics of security. zentara -- To get out of this list, please send email to majordomo@suse.com with this text in its body: unsubscribe suse-linux-e