Skip to main content

How to install TFTP server

Here's a quick tutorial on how to install TFTP (trivial file transfer protocol) server.

Login as root
Run command  yum install tftp-server to install the TFTP server
Edit the configuration file, vi /etc/xinetd.d/tftp, and you will some the following.
# default: off
# description: The tftp server serves files using the trivial file transfer 
#       protocol.  The tftp protocol is often used to boot diskless 
#       workstations, download configuration files to network-aware printers, 
#       and to start the installation process for some operating systems.
service tftp
{
        socket_type             = dgram
        protocol                = udp
        wait                    = yes
        user                    = root
        server                  = /usr/sbin/in.tftpd
        server_args             = -s /tftpboot
        disable                 = yes
        per_source              = 11
        cps                     = 100 2
        flags                   = IPv4
}

Change disable = yes to disable = no to enable the tftp server

Start the TFTP server, run the command:
/sbin/service xinetd start

The default folder is /var/lib/tftpboot

Now let's test to get a file from your TFTP server
tftp 66.55.44.1 GET test ; this command will get a test file from 66.55.44.1 TFTP server

By the way, you can use www.ping.eu to check if your UDP port 69 is open.

Here's my source: http://www.webune.com/forums/how-to-install-tftp-server-in-linux.html

Troubleshooting:
+++
When you first run the tftp 66.55.44.1 get test_file, you see a similar error as shown below.

Error on server : File not found
Connect request failed.

Solution:
Go back to the configuration file, run vi /etc/xinetd.d/tftp and update the server arguments

server_args             = -c -s /tftpboot


Try it again, you will now be able to download the test_file.
+++
Although tftpd is installed correctly, the firewall is not allowing outgoing connections. It appears that the ip_conntrack_tftp kernel module would need to be installed for tftp connections to completely work. Unfortunately, this cannot be installed on a VPS server; a dedicated server would be required.

Alternative Solution for VPS server:
Disable CSF (firewall front-end software). Please note, disabling firewall is not recommended.

+++

Tools:
Windows 7 Professional for TFTP client
VPS server for testing TFTP server
Solarwind free tool for TFTP server and client


Thank you.

If this helped you, please take the time to share this post by sharing using Google+, Facebook, Twitter, or LinkedIn

Comments

Popular posts from this blog

Alternative Social Networks

If you are planning to create your  social network  e.g. similar to Facebook. Here's a short list of alternative software's: Open Source and Free​ http://buddypress.org/  - Wordpress (Open Source and Free) http://elgg.org/  - (Open Source and Free) Commercial Social Networks software http://www.socialengine.com/  ($299 Stand Alone, $29/mo Cloud) http://www.jomsocial.com/  (run with Joomla, need to know CMS) http://www.boonex.com/  (very expensive, $399 for Standard) http://www.anahitapolis.com/ http://www.oxwall.org/ http://sharetronix.com/ http://www.moosocial.com/ http://www.jcow.net/ http://phpdolphin.com http://www.grou.ps  (from free to Commercial, I left my networks and they are selling it  http://www.phpfox.com/  (I used this before, it's hard to maintain. I moved to NING but left too after it was sold to another company) http://www.ning.com  (I don't recommend using this service, it's hard to export your data when it's time to move) S

Learning Vulnerability Scanning by KING.NET

Learning Vulnerability Scanning is fun and easy. So I hope you enjoy reading this short how to guide on how to use vulnerability scanning to secure your servers and networks. NMAP is the swiss tool that you need to learn if you're serious in Cyber Security profession. The NMAP tool can be use with NSE scripting (Nmap Scripting Engine) to automate your tasks. For example using NSE Script using a  single vulnerability (cold fusion)  to scan our test lab machine. root@kali:~# nmap -v -p 80  --script http-vuln-cve2010-2861  10.11.1.220 Starting Nmap 6.47 ( http://nmap.org ) at 2016-07-22 17:34 EDT NSE: Loaded 1 scripts for scanning. NSE: Script Pre-scanning. Initiating ARP Ping Scan at 17:34 Scanning 10.11.1.220 [1 port] Completed ARP Ping Scan at 17:34, 0.04s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 17:34 Completed Parallel DNS resolution of 1 host. at 17:35, 13.01s elapsed Initiating SYN Stealth Scan at 17:35 Scanning 10.11.1.220 [1 port] Comp