TFTP hangs in PXE boot, resulting in PXE session ending.
-
@Tom-Elliott My bad. There are a two instances of pxelinux.
But now that I have that taken care of, I get through the iPXE process. But then it crashes, error message says, “Could not start download: Operation no supported” and then a link to ipxe.org
-
@_mateo sorry I didn’t go all in depth on exactly what to change and what to do but any change to a Config file typically means the service referencing that file needs to be restarted or reloaded, I typically restart to ensure things are right.
-
Again, please take a picture or tell is the exact error message you see on the screen.
-
@Sebastian-Roth Sorry! Attaching now. The error is so fast I had to shoot a video to catch it, so the last bit of the URL is missing. But this is what I’m seeing:
I was following this thread a bit, should I upload a tcpdump? https://forums.fogproject.org/topic/6067/could-not-start-download-operation-not-supported/16Edit: I also tried the new binary that you mentioned and didn’t see a change.
-
So in this article there’s this line:
In the litsp.conf that I have, it just has the “dhcp-boot=undionly.kpxe”
Is this by design since I’m on 1.2.0? -
@_mateo Look through these threads:
https://forums.fogproject.org/topic/4745/how-to-configure-dhcp-proxy/11
https://forums.fogproject.org/topic/4867/issues-booting-to-fog-using-dnsmasq/6?page=2
https://forums.fogproject.org/topic/5533/a-new-dnsmasq-issue/7
And you should probably fill in the additional dhcp-boot options.
-
Have you looked through this article yet? https://wiki.fogproject.org/wiki/index.php/Troubleshoot_TFTP
Capturing a packet dump using wireshark or tcpdump on your FOG server would definitely help. I will take a look if you upload a PCAP file.
-
@Wayne-Workman
https://forums.fogproject.org/topic/5533/a-new-dnsmasq-issue/7 - Yes. I actually had that line commented out because it was preventing the dnsmasq service from starting in the first place.I’ve also tried the tips in the other two threads. I think I may be able to modify our network DHCP. So if I just make the option 66 and 67 changes, could I just stop the dnsmasq service and everything will be okay? Or will I have to modify any other conf files?
@Sebastian-Roth 0_1454445769060_issue.pcap Hopefully I didn’t allow too much garbage to get in. Thanks for taking a look!
-
@_mateo said:
So if I just make the option 66 and 67 changes, could I just stop the dnsmasq service and everything will be okay?
Yes. And that is the best way.
-
@Wayne-Workman So it worked! Sayonara dnsmasq… Though now I’m getting a chainloading error. Know of any current materials on the topic? I see this tutorial: https://wiki.fogproject.org/wiki/index.php/Boot_looping_and_Chainloading
But I don’t know that it applies to newer fog installations.
Edit: Pic incoming
-
@Wayne-Workman
I’m not sure where the 10.129.1.79 address comes from… My Fog server is 10.92.1.174 fyi -
Well, maybe the chainloading thing is a red herring. My TFTP is just timing out, I take it?
-
@_mateo said:
I’m not sure where the 10.129.1.79 address comes from… My Fog server is 10.92.1.174 fyi
Look into this file on your fog server:
/tftpboot/default.ipxe
There is one IP Address at the bottom, this should be your FOG Server’s IP Address.Also, on your fog server, look into
Web Interface -> FOG Configuration -> FOG Settings -> Web Server -> FOG_WEB_HOST
and make sure that value is your FOG Server’s IP address.Also inside of
/opt/fog/.fogsettings
there is a field for the FOG Server’s IP address calledipaddress
This should be set to the FOG server’s IP as well.Only one of these things is wrong I think, but I’m including all three for future readers.
-
@_mateo Great that you uploaded the PCAP file and changed to use option 66/67 on your DHCP server!
Looking at the PCAP file I see another DHCP server answering you queries. An that is 10.129.1.79! This is causing the current issue. This DHCP server hands out an IP in the range of 192.168.0.x to the client and offers to be a boot server (option 66 set to 10.129.1.79). You need to find this machine! The machines MAC address is 00:0d:b9:1e:27:fc (wireshark says it’s a PcEngine NIC - not sure if that helps).
-
@Sebastian-Roth Nice.
-
@Sebastian-Roth Ah, it must be our DHCP for our public WiFi! So you think option 66 is active on that? I’ll go check! Hopefully I have access. Thanks so much.
@Wayne-Workman Thanks for the suggestions! Though, all of them were right. So I think Sebastian might be onto something.
-
We have seen home routers sending out option 66 for no reason. I really hope that you can find and stop this device from answering on the LAN altogether.
-
@Sebastian-Roth Hmm… So we could possibly have a rogue AP? I’ll have to ask my coworkers and see if they know anything about it.
-
@Sebastian-Roth Also, as a student of networking I have to ask… How do you go about analyzing PCAP? Can you just open it with Wireshark?
-
@_mateo said:
How do you go about analyzing PCAP? Can you just open it with Wireshark?
Yes.
If you’re hardcore, you use Vi. Or, not even open it and use cat with grep and awk and sed