7156 Uefi pxe DHCP error
-
@george1421 I’ve learned how to read Wireshark. I isolated the port 69, during the regular boot I get the undionly.kpxe file downloaded and I’m ready to go however during the uefi boot I get the grubx64.efi and I don’t know how as it is not in my config file so where is it coming from?? and ideas @Senior-Developers @george1421 @Moderators @Developers please see my read out.
No. Time Source Destination Protocol Length Info 195 24.534142 192.168.1.130 192.168.1.109 TFTP 72 Read Request, File: undionly.kpxe, Transfer type: octet, tsize=0 Frame 195: 72 bytes on wire (576 bits), 72 bytes captured (576 bits) on interface 0 Ethernet II, Src: Vmware_0e:2b:70 (00:0c:29:0e:2b:70), Dst: Dell_31:77:89 (00:21:9b:31:77:89) Internet Protocol Version 4, Src: 192.168.1.130, Dst: 192.168.1.109 User Datagram Protocol, Src Port: 2070, Dst Port: 69 Trivial File Transfer Protocol No. Time Source Destination Protocol Length Info 198 24.536295 192.168.1.130 192.168.1.109 TFTP 77 Read Request, File: undionly.kpxe, Transfer type: octet, blksize=1456 Frame 198: 77 bytes on wire (616 bits), 77 bytes captured (616 bits) on interface 0 Ethernet II, Src: Vmware_0e:2b:70 (00:0c:29:0e:2b:70), Dst: Dell_31:77:89 (00:21:9b:31:77:89) Internet Protocol Version 4, Src: 192.168.1.130, Dst: 192.168.1.109 User Datagram Protocol, Src Port: 2071, Dst Port: 69 Trivial File Transfer Protocol No. Time Source Destination Protocol Length Info 529 50.813057 192.168.1.149 192.168.1.109 TFTP 85 Read Request, File: undionly.kpxe, Transfer type: octet, tsize=0, blksize=1468 Frame 529: 85 bytes on wire (680 bits), 85 bytes captured (680 bits) on interface 0 Ethernet II, Src: Vmware_ab:af:95 (00:0c:29:ab:af:95), Dst: Dell_31:77:89 (00:21:9b:31:77:89) Internet Protocol Version 4, Src: 192.168.1.149, Dst: 192.168.1.109 User Datagram Protocol, Src Port: 1554, Dst Port: 69 Trivial File Transfer Protocol No. Time Source Destination Protocol Length Info 532 50.814771 192.168.1.149 192.168.1.109 TFTP 77 Read Request, File: undionly.kpxe, Transfer type: octet, blksize=1468 Frame 532: 77 bytes on wire (616 bits), 77 bytes captured (616 bits) on interface 0 Ethernet II, Src: Vmware_ab:af:95 (00:0c:29:ab:af:95), Dst: Dell_31:77:89 (00:21:9b:31:77:89) Internet Protocol Version 4, Src: 192.168.1.149, Dst: 192.168.1.109 User Datagram Protocol, Src Port: 1555, Dst Port: 69 Trivial File Transfer Protocol No. Time Source Destination Protocol Length Info 675 51.198680 192.168.1.149 192.168.1.109 TFTP 74 Read Request, File: grubx64.efi, Transfer type: octet, blksize=512 Frame 675: 74 bytes on wire (592 bits), 74 bytes captured (592 bits) on interface 0 Ethernet II, Src: Vmware_ab:af:95 (00:0c:29:ab:af:95), Dst: Dell_31:77:89 (00:21:9b:31:77:89) Internet Protocol Version 4, Src: 192.168.1.149, Dst: 192.168.1.109 User Datagram Protocol, Src Port: 1556, Dst Port: 69 Trivial File Transfer Protocol No. Time Source Destination Protocol Length Info 677 51.200515 192.168.1.149 192.168.1.109 TFTP 74 Read Request, File: grubx64.efi, Transfer type: octet, blksize=512 Frame 677: 74 bytes on wire (592 bits), 74 bytes captured (592 bits) on interface 0 Ethernet II, Src: Vmware_ab:af:95 (00:0c:29:ab:af:95), Dst: Dell_31:77:89 (00:21:9b:31:77:89) Internet Protocol Version 4, Src: 192.168.1.149, Dst: 192.168.1.109 User Datagram Protocol, Src Port: 1557, Dst Port: 69 Trivial File Transfer Protocol```
-
@dureal99d Could I ask you to install tcpdump on your FOG server then run the following command to capture a new pcap file? The other one contains other internal communications that I don’t should see plus it confuses me to dig out what is going on.
sudo tcpdump -w output.pcap port 67 or port 68 or port 69 or port 4011
This will filter out all requests except dhcp, tftp, and dhcpProxy. UEFI boot the target computer and lets see where that gub boot is coming.
-
@dureal99d If I had to guess, the “grubx64.efi” is coming from netboot of the ISO you’re loading at the time this is being performed. Just a guess, but what do I know?
-
@george1421 ill do it promptly
-
@Tom-Elliott I think we all know you know a whole heck of alot
-
HERE is the dump file
No. Time Source Destination Protocol Length Info 1 0.000000 0.0.0.0 255.255.255.255 DHCP 342 DHCP Request - Transaction ID 0xdf5767a9 Frame 1: 342 bytes on wire (2736 bits), 342 bytes captured (2736 bits) Ethernet II, Src: HuaweiTe_1d:36:6b (e0:a3:ac:1d:36:6b), Dst: Broadcast (ff:ff:ff:ff:ff:ff) Internet Protocol Version 4, Src: 0.0.0.0, Dst: 255.255.255.255 User Datagram Protocol, Src Port: 68, Dst Port: 67 Bootstrap Protocol (Request) No. Time Source Destination Protocol Length Info 2 261.631833 0.0.0.0 255.255.255.255 DHCP 389 DHCP Discover - Transaction ID 0xd0ae397e Frame 2: 389 bytes on wire (3112 bits), 389 bytes captured (3112 bits) Ethernet II, Src: Vmware_ab:af:95 (00:0c:29:ab:af:95), Dst: Broadcast (ff:ff:ff:ff:ff:ff) Internet Protocol Version 4, Src: 0.0.0.0, Dst: 255.255.255.255 User Datagram Protocol, Src Port: 68, Dst Port: 67 Bootstrap Protocol (Discover) No. Time Source Destination Protocol Length Info 3 261.633023 169.254.255.1 255.255.255.255 DHCP 363 DHCP Offer - Transaction ID 0xd0ae397e Frame 3: 363 bytes on wire (2904 bits), 363 bytes captured (2904 bits) Ethernet II, Src: AsustekC_37:56:88 (1c:b7:2c:37:56:88), Dst: Broadcast (ff:ff:ff:ff:ff:ff) Internet Protocol Version 4, Src: 169.254.255.1, Dst: 255.255.255.255 User Datagram Protocol, Src Port: 67, Dst Port: 68 Bootstrap Protocol (Offer) No. Time Source Destination Protocol Length Info 4 265.327148 0.0.0.0 255.255.255.255 DHCP 401 DHCP Request - Transaction ID 0xd0ae397e Frame 4: 401 bytes on wire (3208 bits), 401 bytes captured (3208 bits) Ethernet II, Src: Vmware_ab:af:95 (00:0c:29:ab:af:95), Dst: Broadcast (ff:ff:ff:ff:ff:ff) Internet Protocol Version 4, Src: 0.0.0.0, Dst: 255.255.255.255 User Datagram Protocol, Src Port: 68, Dst Port: 67 Bootstrap Protocol (Request) No. Time Source Destination Protocol Length Info 5 265.328586 169.254.255.1 255.255.255.255 DHCP 363 DHCP ACK - Transaction ID 0xd0ae397e Frame 5: 363 bytes on wire (2904 bits), 363 bytes captured (2904 bits) Ethernet II, Src: AsustekC_37:56:88 (1c:b7:2c:37:56:88), Dst: Broadcast (ff:ff:ff:ff:ff:ff) Internet Protocol Version 4, Src: 169.254.255.1, Dst: 255.255.255.255 User Datagram Protocol, Src Port: 67, Dst Port: 68 Bootstrap Protocol (ACK) No. Time Source Destination Protocol Length Info 6 265.331364 192.168.1.149 192.168.1.109 TFTP 85 Read Request, File: undionly.kpxe, Transfer type: octet, tsize=0, blksize=1468 Frame 6: 85 bytes on wire (680 bits), 85 bytes captured (680 bits) Ethernet II, Src: Vmware_ab:af:95 (00:0c:29:ab:af:95), Dst: Dell_31:77:89 (00:21:9b:31:77:89) Internet Protocol Version 4, Src: 192.168.1.149, Dst: 192.168.1.109 User Datagram Protocol, Src Port: 1845, Dst Port: 69 Trivial File Transfer Protocol No. Time Source Destination Protocol Length Info 7 265.333596 192.168.1.149 192.168.1.109 TFTP 77 Read Request, File: undionly.kpxe, Transfer type: octet, blksize=1468 Frame 7: 77 bytes on wire (616 bits), 77 bytes captured (616 bits) Ethernet II, Src: Vmware_ab:af:95 (00:0c:29:ab:af:95), Dst: Dell_31:77:89 (00:21:9b:31:77:89) Internet Protocol Version 4, Src: 192.168.1.149, Dst: 192.168.1.109 User Datagram Protocol, Src Port: 1846, Dst Port: 69 Trivial File Transfer Protocol No. Time Source Destination Protocol Length Info 8 265.606931 192.168.1.149 192.168.1.109 TFTP 74 Read Request, File: grubx64.efi, Transfer type: octet, blksize=512 Frame 8: 74 bytes on wire (592 bits), 74 bytes captured (592 bits) Ethernet II, Src: Vmware_ab:af:95 (00:0c:29:ab:af:95), Dst: Dell_31:77:89 (00:21:9b:31:77:89) Internet Protocol Version 4, Src: 192.168.1.149, Dst: 192.168.1.109 User Datagram Protocol, Src Port: 1847, Dst Port: 69 Trivial File Transfer Protocol No. Time Source Destination Protocol Length Info 9 265.608739 192.168.1.149 192.168.1.109 TFTP 74 Read Request, File: grubx64.efi, Transfer type: octet, blksize=512 Frame 9: 74 bytes on wire (592 bits), 74 bytes captured (592 bits) Ethernet II, Src: Vmware_ab:af:95 (00:0c:29:ab:af:95), Dst: Dell_31:77:89 (00:21:9b:31:77:89) Internet Protocol Version 4, Src: 192.168.1.149, Dst: 192.168.1.109 User Datagram Protocol, Src Port: 1848, Dst Port: 69 Trivial File Transfer Protocol No. Time Source Destination Protocol Length Info 10 344.041810 0.0.0.0 255.255.255.255 DHCP 389 DHCP Discover - Transaction ID 0x11d41dbd Frame 10: 389 bytes on wire (3112 bits), 389 bytes captured (3112 bits) Ethernet II, Src: Vmware_ab:af:95 (00:0c:29:ab:af:95), Dst: Broadcast (ff:ff:ff:ff:ff:ff) Internet Protocol Version 4, Src: 0.0.0.0, Dst: 255.255.255.255 User Datagram Protocol, Src Port: 68, Dst Port: 67 Bootstrap Protocol (Discover) No. Time Source Destination Protocol Length Info 11 344.042976 169.254.255.1 255.255.255.255 DHCP 363 DHCP Offer - Transaction ID 0x11d41dbd Frame 11: 363 bytes on wire (2904 bits), 363 bytes captured (2904 bits) Ethernet II, Src: AsustekC_37:56:88 (1c:b7:2c:37:56:88), Dst: Broadcast (ff:ff:ff:ff:ff:ff) Internet Protocol Version 4, Src: 169.254.255.1, Dst: 255.255.255.255 User Datagram Protocol, Src Port: 67, Dst Port: 68 Bootstrap Protocol (Offer) No. Time Source Destination Protocol Length Info 12 347.731535 0.0.0.0 255.255.255.255 DHCP 401 DHCP Request - Transaction ID 0x11d41dbd Frame 12: 401 bytes on wire (3208 bits), 401 bytes captured (3208 bits) Ethernet II, Src: Vmware_ab:af:95 (00:0c:29:ab:af:95), Dst: Broadcast (ff:ff:ff:ff:ff:ff) Internet Protocol Version 4, Src: 0.0.0.0, Dst: 255.255.255.255 User Datagram Protocol, Src Port: 68, Dst Port: 67 Bootstrap Protocol (Request) No. Time Source Destination Protocol Length Info 13 347.732909 169.254.255.1 255.255.255.255 DHCP 363 DHCP ACK - Transaction ID 0x11d41dbd Frame 13: 363 bytes on wire (2904 bits), 363 bytes captured (2904 bits) Ethernet II, Src: AsustekC_37:56:88 (1c:b7:2c:37:56:88), Dst: Broadcast (ff:ff:ff:ff:ff:ff) Internet Protocol Version 4, Src: 169.254.255.1, Dst: 255.255.255.255 User Datagram Protocol, Src Port: 67, Dst Port: 68 Bootstrap Protocol (ACK) No. Time Source Destination Protocol Length Info 14 347.734374 192.168.1.149 192.168.1.109 TFTP 85 Read Request, File: undionly.kpxe, Transfer type: octet, tsize=0, blksize=1468 Frame 14: 85 bytes on wire (680 bits), 85 bytes captured (680 bits) Ethernet II, Src: Vmware_ab:af:95 (00:0c:29:ab:af:95), Dst: Dell_31:77:89 (00:21:9b:31:77:89) Internet Protocol Version 4, Src: 192.168.1.149, Dst: 192.168.1.109 User Datagram Protocol, Src Port: 1295, Dst Port: 69 Trivial File Transfer Protocol No. Time Source Destination Protocol Length Info 15 347.736207 192.168.1.149 192.168.1.109 TFTP 77 Read Request, File: undionly.kpxe, Transfer type: octet, blksize=1468 Frame 15: 77 bytes on wire (616 bits), 77 bytes captured (616 bits) Ethernet II, Src: Vmware_ab:af:95 (00:0c:29:ab:af:95), Dst: Dell_31:77:89 (00:21:9b:31:77:89) Internet Protocol Version 4, Src: 192.168.1.149, Dst: 192.168.1.109 User Datagram Protocol, Src Port: 1296, Dst Port: 69 Trivial File Transfer Protocol No. Time Source Destination Protocol Length Info 16 348.051753 192.168.1.149 192.168.1.109 TFTP 74 Read Request, File: grubx64.efi, Transfer type: octet, blksize=512 Frame 16: 74 bytes on wire (592 bits), 74 bytes captured (592 bits) Ethernet II, Src: Vmware_ab:af:95 (00:0c:29:ab:af:95), Dst: Dell_31:77:89 (00:21:9b:31:77:89) Internet Protocol Version 4, Src: 192.168.1.149, Dst: 192.168.1.109 User Datagram Protocol, Src Port: 1297, Dst Port: 69 Trivial File Transfer Protocol No. Time Source Destination Protocol Length Info 17 348.053821 192.168.1.149 192.168.1.109 TFTP 74 Read Request, File: grubx64.efi, Transfer type: octet, blksize=512 Frame 17: 74 bytes on wire (592 bits), 74 bytes captured (592 bits) Ethernet II, Src: Vmware_ab:af:95 (00:0c:29:ab:af:95), Dst: Dell_31:77:89 (00:21:9b:31:77:89) Internet Protocol Version 4, Src: 192.168.1.149, Dst: 192.168.1.109 User Datagram Protocol, Src Port: 1298, Dst Port: 69 Trivial File Transfer Protocol
-
@dureal99d pcap?
-
@george1421 ah I see well here is a link to that file then
https://drive.google.com/file/d/0B1FgBstVnUSgbnBmWHlTNHp2Mnc/view?usp=sharing -
@george1421 were you able to download the pcap. I set it to public
-
# Don't function as a DNS server: port=0 # Log lots of extra information about DHCP transactions. log-dhcp # Set the root directory for files available via FTP. tftp-root=/tftpboot # Disable re-use of the DHCP servername and filename fields as extra # option space. That's to avoid confusing some old or broken DHCP clients. dhcp-no-override # The boot filename, Server name, Server Ip Address dhcp-boot=undionly.kpxe,,192.168.1.109 # PXE menu. The first part is the text displayed to the user. The second is the timeout, in seconds. pxe-prompt="Booting FOG Client", 30 # The known types are x86PC, PC98, IA64_EFI, Alpha, Arc_x86, # Intel_Lean_Client, IA32_EFI, ARM_EFI, BC_EFI, Xscale_EFI and X86-64_EFI # This option is first and will be the default if there is no input from the user. # PXEClient:Arch:00000 pxe-service=X86PC, "Boot BIOS PXE", undionly.kpxe # PXEClient:Arch:00007 pxe-service=BC_EFI, "Boot UEFI PXE-BC", ipxe.efi # PXEClient:Arch:00009 pxe-service=X86-64_EFI, "Boot UEFI PXE-64", ipxe.efi dhcp-range=192.168.1.109,proxy```
-
@dureal99d I see where things went wrong. I didn’t tell you the whole story.
You need to add these lines into your config file. I left the dhcp-no-override in there to give you a reference where to place the lines.
# Disable re-use of the DHCP servername and filename fields as extra # option space. That's to avoid confusing some old or broken DHCP clients. dhcp-no-override # inspect the vendor class string and match the text to set the tag dhcp-vendorclass=BIOS,PXEClient:Arch:00000 dhcp-vendorclass=IA32_UEFI,PXEClient:Arch:00006 dhcp-vendorclass=BC_UEFI,PXEClient:Arch:00007 dhcp-vendorclass=X86-64_EFI,PXEClient:Arch:00009
These lines are matching the vendor lines that sets the flags used in the pxe-service section. There is nothing to tell which vendor section line to fire so you are getting the default of… undionly.kpxe.
-
@george1421 ok
-
@dureal99d Let me have another shot at it. I just realized something I left out. Update your config file and insert these lines. I left the vendor class ones in so you knew where the add the following dhcp-boot lines. You’ll see where we pick back up with your config file with the dhcp-boot=undionly…
# inspect the vendor class string and match the text to set the tag dhcp-vendorclass=BIOS,PXEClient:Arch:00000 dhcp-vendorclass=IA32_UEFI,PXEClient:Arch:00006 dhcp-vendorclass=BC_UEFI,PXEClient:Arch:00007 dhcp-vendorclass=X86-64_EFI,PXEClient:Arch:00009 # The default boot filename, Server name, Server Ip Address dhcp-boot=undionly.kpxe,,192.168.1.109 # Set the boot file name based on the matching tag from the vendor class (above) dhcp-boot=net:IA32_UEFI,i386-efi/ipxe.efi,,192.168.1.109 dhcp-boot=net:BC_UEFI,ipxe.efi,,192.168.1.109 dhcp-boot=net:X86-64_EFI,ipxe.efi,,192.168.1.109
-
@george1421 I would like to thank you for helping and teaching me how to solve this riddle. Man I learned a lot. holy crap!!! this post can be marked as Solved. it you would please.
-
@dureal99d Your welcome. I’m glad in the end it was just a simple reboot that finally resolved the issue.
We had a hour or so chat session to work through this issue pulling apart the dhcp/pxe booting process frame by frame.