<div class="gmail_quote">On 12 October 2011 14:57, Aaron Gray <span dir="ltr"><<a href="mailto:aaronngray.lists@gmail.com">aaronngray.lists@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">
<div class="gmail_quote"><div class="im">On 11 October 2011 18:49, Tom Callaway <span dir="ltr"><<a href="mailto:tcallawa@redhat.com" target="_blank">tcallawa@redhat.com</a>></span> wrote:<br></div><div><div></div>
<div class="h5">
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div>On 10/11/2011 01:46 PM, Aaron Gray wrote:<br>
> I have two F15 machines one a desktop which is running the new Gnome 3<br>
> desktop and a laptop not running the new desktop.<br>
><br>
> TFTP is not working on the desktop machine on F15 as it was not working<br>
> on the updated F14. It worked on F14 before the update. I installed two<br>
> servers using PXE using it.<br>
<br>
</div>I assume you mean "TFTP server", here. Can you attach copies of the<br>
relevant config files and any errors that show up in the logs (server or<br>
client side)?<br>
<br></blockquote></div></div></div><br>Configuration files attached, if you need any others just ask.<br><div>
<br>
AFAICT (by using my F15 laptop on which TFTP is working fine) both client
and server are failing and causing time outs on my desktop F15 machine running new Gnome 3 desktop. <div><br></div><div>No packets are transferred
so it is not like bug <a href="https://bugzilla.redhat.com/show_bug.cgi?id=739534" target="_blank">739534</a><br>
<br><br>
[root@XXXX ang]# netstat -a -n -p --ip|grep xinetd<br>
udp 0 0 <a href="http://0.0.0.0:69" target="_blank">0.0.0.0:69</a> 0.0.0.0:* 1118/xinetd<br>
<br>
I have tried disabling both iptables and sellinux.<br>
<br>
[root@XXXX ang]# tail /var/log/messages<br>
<br>
Oct 12 14:17:29 gold xinetd[1118]: Exiting...<br>
Oct 12 14:18:19 gold xinetd[2886]: xinetd Version 2.3.14 started with libwrap loadavg labeled-networking options compiled in.<br>
Oct 12 14:18:19 gold xinetd[2886]: Started working: 2 available services<br>
<br>
<br>
rsync (the other service) appears to be working correctly.<br>
<br>
Anything else you need just shout.<br>
<br>
Many thanks for looking into this,<br><font color="#888888">
<br></font></div></div></blockquote><div><br></div><div>Additional iptables config files that did not get sent by gmail inline.</div><div><br></div><div><div>[root@XXXX etc]# cat iptables</div><div># Firewall configuration written by system-config-firewall</div>
<div># Manual customization of this file is not recommended.</div><div>*filter</div><div>:INPUT ACCEPT [0:0]</div><div>:FORWARD ACCEPT [0:0]</div><div>:OUTPUT ACCEPT [0:0]</div><div>-A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT</div>
<div>-A INPUT -p icmp -j ACCEPT</div><div>-A INPUT -i lo -j ACCEPT</div><div>-A INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT</div><div>-A INPUT -j REJECT --reject-with icmp-host-prohibited</div><div>-A FORWARD -j REJECT --reject-with icmp-host-prohibited</div>
<div>-A INPUT -m state --state NEW -m udp -p udp --dport 69 -j ACCEPT</div><div>-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT</div><div>COMMIT</div></div><div><br></div><div><br></div><div><div>[root@XXXX etc]# cat iptables-config</div>
<div># Load additional iptables modules (nat helpers)</div><div># Default: -none-</div><div># Space separated list of nat helpers (e.g. 'ip_nat_ftp ip_nat_irc'), which</div><div># are loaded after the firewall rules are applied. Options for the helpers are</div>
<div># stored in /etc/modprobe.conf.</div><div>IPTABLES_MODULES="nf_conntrack_tftp"</div><div><br></div><div># Unload modules on restart and stop</div><div># Value: yes|no, default: yes</div><div># This option has to be 'yes' to get to a sane state for a firewall</div>
<div># restart or stop. Only set to 'no' if there are problems unloading netfilter</div><div># modules.</div><div>IPTABLES_MODULES_UNLOAD="yes"</div><div><br></div><div># Save current firewall rules on stop.</div>
<div># Value: yes|no, default: no</div><div># Saves all firewall rules to /etc/sysconfig/iptables if firewall gets stopped</div><div># (e.g. on system shutdown).</div><div>IPTABLES_SAVE_ON_STOP="no"</div><div>
<br></div><div># Save current firewall rules on restart.</div><div># Value: yes|no, default: no</div><div># Saves all firewall rules to /etc/sysconfig/iptables if firewall gets</div><div># restarted.</div><div>IPTABLES_SAVE_ON_RESTART="no"</div>
<div><br></div><div># Save (and restore) rule and chain counter.</div><div># Value: yes|no, default: no</div><div># Save counters for rules and chains to /etc/sysconfig/iptables if</div><div># 'service iptables save' is called or on stop or restart if SAVE_ON_STOP or</div>
<div># SAVE_ON_RESTART is enabled.</div><div>IPTABLES_SAVE_COUNTER="no"</div><div><br></div><div># Numeric status output</div><div># Value: yes|no, default: yes</div><div># Print IP addresses and port numbers in numeric format in the status output.</div>
<div>IPTABLES_STATUS_NUMERIC="yes"</div><div><br></div><div># Verbose status output</div><div># Value: yes|no, default: yes</div><div># Print info about the number of packets and bytes plus the "input-" and</div>
<div># "outputdevice" in the status output.</div><div>IPTABLES_STATUS_VERBOSE="no"</div><div><br></div><div># Status output with numbered lines</div><div># Value: yes|no, default: yes</div><div># Print a counter/number for every rule in the status output.</div>
<div>IPTABLES_STATUS_LINENUMBERS="yes"</div></div><div><br></div><div><br></div><div>Aaron</div><div> </div></div>