This is the Debian GNU/Linux prepackaged version of pppd.

This package was constructed by  Alvar Bray <alvar@debian.org>
from sources obtained from:

 sunsite.unc.edu:/pub/Linux/system/Network/serial/ppp-2.1.2e.tar.gz

The options file was obtained from:

 sunsite.unc.edu:/pub/Linux/system/Network/serial/pppopt.tgz

The ppp package was originally constructed by Ian Murdock
<imurdock@debian.org> 


Changes:
Sun May 26 14:28:39 BST 1996 Alvar Bray <alvar@debian.org>
	* Applied patches from Marek Michalkiewicz 
	  <marekm@i17linuxb.ists.pwr.wroc.pl> to suport shadow
	  passwords.
	* Added Architecture and priority fields to debian.control.
	* Version 2.2.0f-2 released.

Wed May  1 19:54:15 BST 1996  Alvar Bray <alvar@debian.org>
	* Updated to upstream version 2.2.0f.
	* Changed version to 2.2.0f-1.

Sat Mar 23 09:39:49 GMT 1996  Alvar Bray <alvar@debian.org>
	* Modified runlevel change start/kill links.
	* Removed symlink /usr/include/net/route.h
	* Revision 3 released.

Tue Jan 30 23:14:51 GMT 1996  Alvar Bray <alvar@meiko.co.uk>
	* used a documemented version of the options file from 
	  source by Jim Knoble <jmknoble@mercury.interpath.net>
	* Removed /etc/ppp/ppp-connect script
	* Added /etc/ppp/chatscript called by the options file
	* Added empty ip-up and ip-down scripts.

Sun Jan 28 22:34:09 GMT 1996  Alvar Bray <alvar@meiko.co.uk>
	* Upgraded to version ppp-2.2.0e using CVS
	* Renamed package ppp-2.2.0e

Wed Nov 22 15:31:15 GMT 1995  Alvar Bray <alvar@meiko.co.uk>
	* Rebuilt using elf format - added libc5 dependency.
	* Made purge remove all ppp files (bug #1827)
	* Added missing kernel header stubs to /usr/include/net
	  (bug #1795)
	* Removed reference to /etc/init.d/functions in
	  /etc/init.d/ppp (bug #1725)
	* Added dependency on netbase (bug #1443)
	* New README (bug#1059)
	* New source using ppp-2.2.0.c from
	  sunsite.unc.edu:/pub/Linux/system/Network/serial

Ian Murdock <imurdock@debian.org>
	* added Debian GNU/Linux package maintenance system files
	* changed Makefile variables in chat and pppd directories

The following files are covered by this copyright:
 auth.c fsm.c fsm.h ipcp.c ipcp.h lcp.c lcp.h magic.c magic.h options.c
 ppp.h pppd.h sys-bsd.c sys-linux.c sys-str.c sys-ultrix.c upap.c upap.h

/*
 * Copyright (c) 1989 Carnegie Mellon University.
 * All rights reserved.
 *
 * Redistribution and use in source and binary forms are permitted
 * provided that the above copyright notice and this paragraph are
 * duplicated in all such forms and that any documentation,
 * advertising materials, and other materials related to such
 * distribution and use acknowledge that the software was developed
 * by Carnegie Mellon University.  The name of the
 * University may not be used to endorse or promote products derived
 * from this software without specific prior written permission.
 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
 * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
 */

The file auth.c is covered by this copyright:

/*
 * Copyright (c) 1993 The Australian National University.
 * All rights reserved.
 *
 * Redistribution and use in source and binary forms are permitted
 * provided that the above copyright notice and this paragraph are
 * duplicated in all such forms and that any documentation,
 * advertising materials, and other materials related to such
 * distribution and use acknowledge that the software was developed
 * by the Australian National University.  The name of the University
 * may not be used to endorse or promote products derived from this
 * software without specific prior written permission.
 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
 * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
 *
 * Copyright (c) 1989 Carnegie Mellon University.
 * All rights reserved.
 *
 * Redistribution and use in source and binary forms are permitted
 * provided that the above copyright notice and this paragraph are
 * duplicated in all such forms and that any documentation,
 * advertising materials, and other materials related to such
 * distribution and use acknowledge that the software was developed
 * by Carnegie Mellon University.  The name of the
 * University may not be used to endorse or promote products derived
 * from this software without specific prior written permission.
 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
 * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
 */

The files chap.c and chap.h are covered by this copyright:

/*
 * Copyright (c) 1991 Gregory M. Christy.
 * All rights reserved.
 *
 * Redistribution and use in source and binary forms are permitted
 * provided that the above copyright notice and this paragraph are
 * duplicated in all such forms and that any documentation,
 * advertising materials, and other materials related to such
 * distribution and use acknowledge that the software was developed
 * by Gregory M. Christy.  The name of the author may not be used to
 * endorse or promote products derived from this software without
 * specific prior written permission.
 *
 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
 * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
 */

The files md5.c and md5.h are covered by this copyright:

/*
 ***********************************************************************
 ** Copyright (C) 1990, RSA Data Security, Inc. All rights reserved.  **
 **                                                                   **
 ** License to copy and use this software is granted provided that    **
 ** it is identified as the "RSA Data Security, Inc. MD5 Message-     **
 ** Digest Algorithm" in all material mentioning or referencing this  **
 ** software or this function.                                        **
 **                                                                   **
 ** License is also granted to make and use derivative works          **
 ** provided that such works are identified as "derived from the RSA  **
 ** Data Security, Inc. MD5 Message-Digest Algorithm" in all          **
 ** material mentioning or referencing the derived work.              **
 **                                                                   **
 ** RSA Data Security, Inc. makes no representations concerning       **
 ** either the merchantability of this software or the suitability    **
 ** of this software for any particular purpose.  It is provided "as  **
 ** is" without express or implied warranty of any kind.              **
 **                                                                   **
 ** These notices must be retained in any copies of any part of this  **
 ** documentation and/or software.                                    **
 ***********************************************************************
 */

The logwtmp function is covered by this copyright:

/*
 * Copyright (c) 1988 The Regents of the University of California.
 * All rights reserved.
 *
 * Redistribution and use in source and binary forms are permitted
 * provided that the above copyright notice and this paragraph are
 * duplicated in all such forms and that any documentation,
 * advertising materials, and other materials related to such
 * distribution and use acknowledge that the software was developed
 * by the University of California, Berkeley.  The name of the
 * University may not be used to endorse or promote products derived
 * from this software without specific prior written permission.
 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
 * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
 */
