The masqdialer system is designed to let users on a LAN bring the connection
that they use to access the internet up and down.  The masqdialer system has
a few advantages over other systems, mainly that it requires a human to bring the link up and down so unlike diald or a persistant pppd process it won't 
continously dial out a broken connection and waste money.  It also allows a user
to see the status of a connection.

This is the C Masqdialer server, it is designed to serve as an (almost) drop
in replacement for the original perl masqdialer server.  The server is
compatible in that clients will not realize that someone has changed the
server (well, hopefully they will notice that it is more stable).   The
configuration and maintenance of the server has also been improved.

To install the masqdialer server you first need to unpack the archive (which
you have obviously already done since you are reading this).  After you unpack
the archive you should type "make", and an executable called "mserver" will
be created.  You should move this to /usr/local/sbin (it really doesn't matter
where you put it as long as you can execute it).  You should also move LICENSE
and HISTORY to /usr/local/share/mserver.

After you have built the server you need to configure it.  You should use your
favorite text editor on mserver.conf (you might want to back the original up).
The configuration file is made up of key/value pairs.  I you want to use a space
in the value then you must use quotes (") around the value.  Boolean values
must be either true, false, yes or no.  Each value has a comment above it with
a reasonable description, if you have any problems you can just send me mail.

If you are deploying this on your LAN is is probably on your gateway.  Make
sure that you block port 222 (or whatever your port) is from the outside world,
otherwise nasty people can telnet to port 222 and try to do nasty stuff.  I
trust ipfwadm port blocking much more than my IP checking code and I hope you
do the same.  You can add these line to your /etc/rc.d/rc.local (or equivalent
script):
/sbin/ipfwadm -I -f # This will clear all rules, only do this if this is your
		    # only rule.
/sbin/ipfwadm -I -p accept	# By default let everything through
/sbin/ipfwadm -I -a deny -W ppp0 -P tcp -D 0.0.0.0/0 222

You can add more lines and have more ports than 222 blocked (like telent, and
samba ports) so it won't matter as much if your programs are the latest version.

TODO:
 - Real argument processing
 - Documentation
