Example output and Download link
Output when run:
Code:
$ sudo pxe-boot-prepare.sh amd64
Creating /pxe/etc ...
Checking for tftpd_flags setting in /etc/rc.conf.local ...
#tftpd_flags=NO # for normal use: "[chroot dir]
tftpd_flags=/pxe
Trivial File Protocol Daemon already mentioned in /etc/rc.conf.local
So please check it ....
Creating /pxe/etc/random.seed for bootloader ...
1+0 records in
1+0 records out
512 bytes transferred in 0.000 secs (7529412 bytes/sec)
Creating /pxe/etc/boot.conf ...
Deleting /pxe/INSTALL.* ...
Copying pxeboot, bsd.rd and INSTALL.amd64 from /home/www/snapshots/amd64 ....
For autoinstall(8) creating symbolic link /pxe/auto_install pointing to /pxe/pxeboot ...
------- contents of /pxe -----------
total 14272
-rw-r--r-- 1 root wheel 46518 Dec 23 20:18 INSTALL.amd64
lrwxr-xr-x 1 root wheel 7 Dec 25 05:34 auto_install -> pxeboot
-rwxr-xr-x 1 root wheel 7552369 Dec 23 20:18 bsd.rd
drwxr-xr-x 2 root wheel 512 Dec 18 02:56 etc
-r-xr-xr-x 1 root wheel 80972 Dec 23 20:02 pxeboot
/pxe/etc:
total 8
-rw-r--r-- 1 root wheel 59 Dec 25 05:34 boot.conf
-rw------- 1 root wheel 512 Dec 25 05:34 random.seed
--- contents of /pxe/etc/boot.conf --
time
set image bsd.rd
stty com0 19200
set
set tty com0
set
--------------------------------------
The tftpd program is located at /usr/sbin/tftpd
Start it with:
/usr/sbin/tftpd /pxe
or
sudo /etc/rc.d/tftpd start
Then verify with "netstat" whether TFTP daemon is at port 69:
$ netstat -an -f inet -p udp
You should see something like this:
Active Internet connections (including servers)
Proto Recv-Q Send-Q Local Address Foreign Address (state)
udp 0 0 *.69 *.*
-----------------------------------------------------------------------------
==== Output of "ps -aux | grep tftpd | grep -v grep":
_tftpd 17590 0.0 0.1 572 624 ?? Is 7:58PM 0:00.00 /usr/sbin/tftpd /pxe
==== Output of "netstat -an -f inet -p udp":
Active Internet connections (including servers)
Proto Recv-Q Send-Q Local Address Foreign Address (state)
udp 0 0 192.168.222.20.47717 37.139.24.95.123
udp 0 0 *.69 *.*
udp 0 0 192.168.222.20.39789 129.250.35.250.123
udp 0 0 192.168.222.20.10462 185.10.50.162.123
udp 0 0 192.168.222.20.34057 94.228.220.14.123
udp 0 0 *.37947 *.*
udp 0 0 127.0.0.10.53 *.*
udp 0 0 192.168.222.20.53 *.*
udp 0 0 127.0.0.1.53 *.*
udp 0 0 *.514 *.*
-----------------------------------------------------------------------------
__________________
You don't need to be a genius to debug a pf.conf firewall ruleset, you just need the guts to run tcpdump
Last edited by J65nko; 25th December 2014 at 05:53 AM.
|