• Recent
    • Unsolved
    • Tags
    • Popular
    • Users
    • Groups
    • Search
    • Register
    • Login

    7156 Uefi pxe DHCP error

    Scheduled Pinned Locked Moved Solved
    FOG Problems
    3
    59
    20.1k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • george1421G
      george1421 Moderator @dureal99d
      last edited by

      @dureal99d Could I ask you to install tcpdump on your FOG server then run the following command to capture a new pcap file? The other one contains other internal communications that I don’t should see plus it confuses me to dig out what is going on.

      sudo tcpdump -w output.pcap port 67 or port 68 or port 69 or port 4011

      This will filter out all requests except dhcp, tftp, and dhcpProxy. UEFI boot the target computer and lets see where that gub boot is coming.

      Please help us build the FOG community with everyone involved. It's not just about coding - way more we need people to test things, update documentation and most importantly work on uniting the community of people enjoying and working on FOG!

      D 1 Reply Last reply Reply Quote 1
      • Tom ElliottT
        Tom Elliott @dureal99d
        last edited by

        @dureal99d If I had to guess, the “grubx64.efi” is coming from netboot of the ISO you’re loading at the time this is being performed. Just a guess, but what do I know?

        Please help us build the FOG community with everyone involved. It's not just about coding - way more we need people to test things, update documentation and most importantly work on uniting the community of people enjoying and working on FOG! Get in contact with me (chat bubble in the top right corner) if you want to join in.

        Web GUI issue? Please check apache error (debian/ubuntu: /var/log/apache2/error.log, centos/fedora/rhel: /var/log/httpd/error_log) and php-fpm log (/var/log/php*-fpm.log)

        Please support FOG if you like it: https://wiki.fogproject.org/wiki/index.php/Support_FOG

        D 1 Reply Last reply Reply Quote 0
        • D
          dureal99d @george1421
          last edited by

          @george1421 ill do it promptly

          D 1 Reply Last reply Reply Quote 0
          • D
            dureal99d @Tom Elliott
            last edited by

            @Tom-Elliott I think we all know you know a whole heck of alot

            1 Reply Last reply Reply Quote 0
            • D
              dureal99d @dureal99d
              last edited by

              @george1421 @Tom-Elliott

              HERE is the dump file

              No.     Time           Source                Destination           Protocol Length Info
                    1 0.000000       0.0.0.0               255.255.255.255       DHCP     342    DHCP Request  - Transaction ID 0xdf5767a9
              
              Frame 1: 342 bytes on wire (2736 bits), 342 bytes captured (2736 bits)
              Ethernet II, Src: HuaweiTe_1d:36:6b (e0:a3:ac:1d:36:6b), Dst: Broadcast (ff:ff:ff:ff:ff:ff)
              Internet Protocol Version 4, Src: 0.0.0.0, Dst: 255.255.255.255
              User Datagram Protocol, Src Port: 68, Dst Port: 67
              Bootstrap Protocol (Request)
              
              No.     Time           Source                Destination           Protocol Length Info
                    2 261.631833     0.0.0.0               255.255.255.255       DHCP     389    DHCP Discover - Transaction ID 0xd0ae397e
              
              Frame 2: 389 bytes on wire (3112 bits), 389 bytes captured (3112 bits)
              Ethernet II, Src: Vmware_ab:af:95 (00:0c:29:ab:af:95), Dst: Broadcast (ff:ff:ff:ff:ff:ff)
              Internet Protocol Version 4, Src: 0.0.0.0, Dst: 255.255.255.255
              User Datagram Protocol, Src Port: 68, Dst Port: 67
              Bootstrap Protocol (Discover)
              
              No.     Time           Source                Destination           Protocol Length Info
                    3 261.633023     169.254.255.1         255.255.255.255       DHCP     363    DHCP Offer    - Transaction ID 0xd0ae397e
              
              Frame 3: 363 bytes on wire (2904 bits), 363 bytes captured (2904 bits)
              Ethernet II, Src: AsustekC_37:56:88 (1c:b7:2c:37:56:88), Dst: Broadcast (ff:ff:ff:ff:ff:ff)
              Internet Protocol Version 4, Src: 169.254.255.1, Dst: 255.255.255.255
              User Datagram Protocol, Src Port: 67, Dst Port: 68
              Bootstrap Protocol (Offer)
              
              No.     Time           Source                Destination           Protocol Length Info
                    4 265.327148     0.0.0.0               255.255.255.255       DHCP     401    DHCP Request  - Transaction ID 0xd0ae397e
              
              Frame 4: 401 bytes on wire (3208 bits), 401 bytes captured (3208 bits)
              Ethernet II, Src: Vmware_ab:af:95 (00:0c:29:ab:af:95), Dst: Broadcast (ff:ff:ff:ff:ff:ff)
              Internet Protocol Version 4, Src: 0.0.0.0, Dst: 255.255.255.255
              User Datagram Protocol, Src Port: 68, Dst Port: 67
              Bootstrap Protocol (Request)
              
              No.     Time           Source                Destination           Protocol Length Info
                    5 265.328586     169.254.255.1         255.255.255.255       DHCP     363    DHCP ACK      - Transaction ID 0xd0ae397e
              
              Frame 5: 363 bytes on wire (2904 bits), 363 bytes captured (2904 bits)
              Ethernet II, Src: AsustekC_37:56:88 (1c:b7:2c:37:56:88), Dst: Broadcast (ff:ff:ff:ff:ff:ff)
              Internet Protocol Version 4, Src: 169.254.255.1, Dst: 255.255.255.255
              User Datagram Protocol, Src Port: 67, Dst Port: 68
              Bootstrap Protocol (ACK)
              
              No.     Time           Source                Destination           Protocol Length Info
                    6 265.331364     192.168.1.149         192.168.1.109         TFTP     85     Read Request, File: undionly.kpxe, Transfer type: octet, tsize=0, blksize=1468
              
              Frame 6: 85 bytes on wire (680 bits), 85 bytes captured (680 bits)
              Ethernet II, Src: Vmware_ab:af:95 (00:0c:29:ab:af:95), Dst: Dell_31:77:89 (00:21:9b:31:77:89)
              Internet Protocol Version 4, Src: 192.168.1.149, Dst: 192.168.1.109
              User Datagram Protocol, Src Port: 1845, Dst Port: 69
              Trivial File Transfer Protocol
              
              No.     Time           Source                Destination           Protocol Length Info
                    7 265.333596     192.168.1.149         192.168.1.109         TFTP     77     Read Request, File: undionly.kpxe, Transfer type: octet, blksize=1468
              
              Frame 7: 77 bytes on wire (616 bits), 77 bytes captured (616 bits)
              Ethernet II, Src: Vmware_ab:af:95 (00:0c:29:ab:af:95), Dst: Dell_31:77:89 (00:21:9b:31:77:89)
              Internet Protocol Version 4, Src: 192.168.1.149, Dst: 192.168.1.109
              User Datagram Protocol, Src Port: 1846, Dst Port: 69
              Trivial File Transfer Protocol
              
              No.     Time           Source                Destination           Protocol Length Info
                    8 265.606931     192.168.1.149         192.168.1.109         TFTP     74     Read Request, File: grubx64.efi, Transfer type: octet, blksize=512
              
              Frame 8: 74 bytes on wire (592 bits), 74 bytes captured (592 bits)
              Ethernet II, Src: Vmware_ab:af:95 (00:0c:29:ab:af:95), Dst: Dell_31:77:89 (00:21:9b:31:77:89)
              Internet Protocol Version 4, Src: 192.168.1.149, Dst: 192.168.1.109
              User Datagram Protocol, Src Port: 1847, Dst Port: 69
              Trivial File Transfer Protocol
              
              No.     Time           Source                Destination           Protocol Length Info
                    9 265.608739     192.168.1.149         192.168.1.109         TFTP     74     Read Request, File: grubx64.efi, Transfer type: octet, blksize=512
              
              Frame 9: 74 bytes on wire (592 bits), 74 bytes captured (592 bits)
              Ethernet II, Src: Vmware_ab:af:95 (00:0c:29:ab:af:95), Dst: Dell_31:77:89 (00:21:9b:31:77:89)
              Internet Protocol Version 4, Src: 192.168.1.149, Dst: 192.168.1.109
              User Datagram Protocol, Src Port: 1848, Dst Port: 69
              Trivial File Transfer Protocol
              
              No.     Time           Source                Destination           Protocol Length Info
                   10 344.041810     0.0.0.0               255.255.255.255       DHCP     389    DHCP Discover - Transaction ID 0x11d41dbd
              
              Frame 10: 389 bytes on wire (3112 bits), 389 bytes captured (3112 bits)
              Ethernet II, Src: Vmware_ab:af:95 (00:0c:29:ab:af:95), Dst: Broadcast (ff:ff:ff:ff:ff:ff)
              Internet Protocol Version 4, Src: 0.0.0.0, Dst: 255.255.255.255
              User Datagram Protocol, Src Port: 68, Dst Port: 67
              Bootstrap Protocol (Discover)
              
              No.     Time           Source                Destination           Protocol Length Info
                   11 344.042976     169.254.255.1         255.255.255.255       DHCP     363    DHCP Offer    - Transaction ID 0x11d41dbd
              
              Frame 11: 363 bytes on wire (2904 bits), 363 bytes captured (2904 bits)
              Ethernet II, Src: AsustekC_37:56:88 (1c:b7:2c:37:56:88), Dst: Broadcast (ff:ff:ff:ff:ff:ff)
              Internet Protocol Version 4, Src: 169.254.255.1, Dst: 255.255.255.255
              User Datagram Protocol, Src Port: 67, Dst Port: 68
              Bootstrap Protocol (Offer)
              
              No.     Time           Source                Destination           Protocol Length Info
                   12 347.731535     0.0.0.0               255.255.255.255       DHCP     401    DHCP Request  - Transaction ID 0x11d41dbd
              
              Frame 12: 401 bytes on wire (3208 bits), 401 bytes captured (3208 bits)
              Ethernet II, Src: Vmware_ab:af:95 (00:0c:29:ab:af:95), Dst: Broadcast (ff:ff:ff:ff:ff:ff)
              Internet Protocol Version 4, Src: 0.0.0.0, Dst: 255.255.255.255
              User Datagram Protocol, Src Port: 68, Dst Port: 67
              Bootstrap Protocol (Request)
              
              No.     Time           Source                Destination           Protocol Length Info
                   13 347.732909     169.254.255.1         255.255.255.255       DHCP     363    DHCP ACK      - Transaction ID 0x11d41dbd
              
              Frame 13: 363 bytes on wire (2904 bits), 363 bytes captured (2904 bits)
              Ethernet II, Src: AsustekC_37:56:88 (1c:b7:2c:37:56:88), Dst: Broadcast (ff:ff:ff:ff:ff:ff)
              Internet Protocol Version 4, Src: 169.254.255.1, Dst: 255.255.255.255
              User Datagram Protocol, Src Port: 67, Dst Port: 68
              Bootstrap Protocol (ACK)
              
              No.     Time           Source                Destination           Protocol Length Info
                   14 347.734374     192.168.1.149         192.168.1.109         TFTP     85     Read Request, File: undionly.kpxe, Transfer type: octet, tsize=0, blksize=1468
              
              Frame 14: 85 bytes on wire (680 bits), 85 bytes captured (680 bits)
              Ethernet II, Src: Vmware_ab:af:95 (00:0c:29:ab:af:95), Dst: Dell_31:77:89 (00:21:9b:31:77:89)
              Internet Protocol Version 4, Src: 192.168.1.149, Dst: 192.168.1.109
              User Datagram Protocol, Src Port: 1295, Dst Port: 69
              Trivial File Transfer Protocol
              
              No.     Time           Source                Destination           Protocol Length Info
                   15 347.736207     192.168.1.149         192.168.1.109         TFTP     77     Read Request, File: undionly.kpxe, Transfer type: octet, blksize=1468
              
              Frame 15: 77 bytes on wire (616 bits), 77 bytes captured (616 bits)
              Ethernet II, Src: Vmware_ab:af:95 (00:0c:29:ab:af:95), Dst: Dell_31:77:89 (00:21:9b:31:77:89)
              Internet Protocol Version 4, Src: 192.168.1.149, Dst: 192.168.1.109
              User Datagram Protocol, Src Port: 1296, Dst Port: 69
              Trivial File Transfer Protocol
              
              No.     Time           Source                Destination           Protocol Length Info
                   16 348.051753     192.168.1.149         192.168.1.109         TFTP     74     Read Request, File: grubx64.efi, Transfer type: octet, blksize=512
              
              Frame 16: 74 bytes on wire (592 bits), 74 bytes captured (592 bits)
              Ethernet II, Src: Vmware_ab:af:95 (00:0c:29:ab:af:95), Dst: Dell_31:77:89 (00:21:9b:31:77:89)
              Internet Protocol Version 4, Src: 192.168.1.149, Dst: 192.168.1.109
              User Datagram Protocol, Src Port: 1297, Dst Port: 69
              Trivial File Transfer Protocol
              
              No.     Time           Source                Destination           Protocol Length Info
                   17 348.053821     192.168.1.149         192.168.1.109         TFTP     74     Read Request, File: grubx64.efi, Transfer type: octet, blksize=512
              
              Frame 17: 74 bytes on wire (592 bits), 74 bytes captured (592 bits)
              Ethernet II, Src: Vmware_ab:af:95 (00:0c:29:ab:af:95), Dst: Dell_31:77:89 (00:21:9b:31:77:89)
              Internet Protocol Version 4, Src: 192.168.1.149, Dst: 192.168.1.109
              User Datagram Protocol, Src Port: 1298, Dst Port: 69
              Trivial File Transfer Protocol
              
              george1421G 1 Reply Last reply Reply Quote 0
              • george1421G
                george1421 Moderator @dureal99d
                last edited by

                @dureal99d pcap?

                Please help us build the FOG community with everyone involved. It's not just about coding - way more we need people to test things, update documentation and most importantly work on uniting the community of people enjoying and working on FOG!

                D 1 Reply Last reply Reply Quote 0
                • D
                  dureal99d @george1421
                  last edited by

                  @george1421 ah I see well here is a link to that file then
                  https://drive.google.com/file/d/0B1FgBstVnUSgbnBmWHlTNHp2Mnc/view?usp=sharing

                  D 1 Reply Last reply Reply Quote 0
                  • D
                    dureal99d @dureal99d
                    last edited by

                    @george1421 were you able to download the pcap. I set it to public

                    D 1 Reply Last reply Reply Quote 0
                    • D
                      dureal99d @dureal99d
                      last edited by

                      @george1421

                      # Don't function as a DNS server:
                      port=0
                      
                      # Log lots of extra information about DHCP transactions.
                      log-dhcp
                      
                      # Set the root directory for files available via FTP.
                      tftp-root=/tftpboot
                      
                      # Disable re-use of the DHCP servername and filename fields as extra
                      # option space. That's to avoid confusing some old or broken DHCP clients.
                      dhcp-no-override
                      
                      # The boot filename, Server name, Server Ip Address
                      dhcp-boot=undionly.kpxe,,192.168.1.109
                      
                      # PXE menu.  The first part is the text displayed to the user.  The second is the timeout, in seconds.
                      pxe-prompt="Booting FOG Client", 30
                      
                      # The known types are x86PC, PC98, IA64_EFI, Alpha, Arc_x86,
                      # Intel_Lean_Client, IA32_EFI, ARM_EFI, BC_EFI, Xscale_EFI and X86-64_EFI
                      # This option is first and will be the default if there is no input from the user.
                      
                      # PXEClient:Arch:00000
                      pxe-service=X86PC, "Boot BIOS PXE", undionly.kpxe
                      
                      # PXEClient:Arch:00007
                      pxe-service=BC_EFI, "Boot UEFI PXE-BC", ipxe.efi
                      
                      # PXEClient:Arch:00009
                      pxe-service=X86-64_EFI, "Boot UEFI PXE-64", ipxe.efi
                      
                      dhcp-range=192.168.1.109,proxy```
                      george1421G 1 Reply Last reply Reply Quote 0
                      • george1421G
                        george1421 Moderator @dureal99d
                        last edited by george1421

                        @dureal99d I see where things went wrong. I didn’t tell you the whole story.

                        You need to add these lines into your config file. I left the dhcp-no-override in there to give you a reference where to place the lines.

                        # Disable re-use of the DHCP servername and filename fields as extra
                        # option space. That's to avoid confusing some old or broken DHCP clients.
                        dhcp-no-override
                        
                        # inspect the vendor class string and match the text to set the tag
                        dhcp-vendorclass=BIOS,PXEClient:Arch:00000
                        dhcp-vendorclass=IA32_UEFI,PXEClient:Arch:00006
                        dhcp-vendorclass=BC_UEFI,PXEClient:Arch:00007
                        dhcp-vendorclass=X86-64_EFI,PXEClient:Arch:00009
                        

                        These lines are matching the vendor lines that sets the flags used in the pxe-service section. There is nothing to tell which vendor section line to fire so you are getting the default of… undionly.kpxe.

                        Please help us build the FOG community with everyone involved. It's not just about coding - way more we need people to test things, update documentation and most importantly work on uniting the community of people enjoying and working on FOG!

                        D 1 Reply Last reply Reply Quote 0
                        • D
                          dureal99d @george1421
                          last edited by

                          @george1421 ok

                          george1421G 1 Reply Last reply Reply Quote 0
                          • george1421G
                            george1421 Moderator @dureal99d
                            last edited by george1421

                            @dureal99d Let me have another shot at it. I just realized something I left out. Update your config file and insert these lines. I left the vendor class ones in so you knew where the add the following dhcp-boot lines. You’ll see where we pick back up with your config file with the dhcp-boot=undionly…

                            # inspect the vendor class string and match the text to set the tag
                            dhcp-vendorclass=BIOS,PXEClient:Arch:00000
                            dhcp-vendorclass=IA32_UEFI,PXEClient:Arch:00006
                            dhcp-vendorclass=BC_UEFI,PXEClient:Arch:00007
                            dhcp-vendorclass=X86-64_EFI,PXEClient:Arch:00009
                            
                            # The default boot filename, Server name, Server Ip Address
                            dhcp-boot=undionly.kpxe,,192.168.1.109
                            
                            # Set the boot file name based on the matching tag from the vendor class (above)
                            dhcp-boot=net:IA32_UEFI,i386-efi/ipxe.efi,,192.168.1.109
                            dhcp-boot=net:BC_UEFI,ipxe.efi,,192.168.1.109
                            dhcp-boot=net:X86-64_EFI,ipxe.efi,,192.168.1.109
                            
                            

                            Please help us build the FOG community with everyone involved. It's not just about coding - way more we need people to test things, update documentation and most importantly work on uniting the community of people enjoying and working on FOG!

                            D 1 Reply Last reply Reply Quote 2
                            • D
                              dureal99d @george1421
                              last edited by

                              @george1421 I would like to thank you for helping and teaching me how to solve this riddle. Man I learned a lot. holy crap!!! this post can be marked as Solved. it you would please.

                              george1421G 1 Reply Last reply Reply Quote 0
                              • george1421G
                                george1421 Moderator @dureal99d
                                last edited by george1421

                                @dureal99d Your welcome. I’m glad in the end it was just a simple reboot that finally resolved the issue.

                                We had a hour or so chat session to work through this issue pulling apart the dhcp/pxe booting process frame by frame.

                                Please help us build the FOG community with everyone involved. It's not just about coding - way more we need people to test things, update documentation and most importantly work on uniting the community of people enjoying and working on FOG!

                                1 Reply Last reply Reply Quote 1
                                • 1
                                • 2
                                • 3
                                • 3 / 3
                                • First post
                                  Last post

                                155

                                Online

                                12.0k

                                Users

                                17.3k

                                Topics

                                155.2k

                                Posts
                                Copyright © 2012-2024 FOG Project