How to Set Up the Ancient and Simple TFTP Server on Linux
Did you know there's a simpler alternative to the popular file transfer protocol? It's TFTP, and here's how to set it up on Linux.
TFTP (Trivial File Transfer Protocol) was first defined in 1980. It is a fairly old protocol, published as TFTP Protocol Revision 2 in June 1981 by Karen R. Sollins in RFC 783 (Request for Comments).
In the early days, the main goal of TFTP was to send and receive files over the network. In particular, it is used to transfer files required during boot to enable the system to boot over the network.
The following describes how to set up a TFTP server on a Linux machine.
What is TFTP?
TFTP is still used for file transfer purposes, with no fundamental changes to the functionality it supports. TFTP is used to download and send files over UDP/IP. It does not have additional features such as identity and authorization controls, file listing, deletion or renaming that are common in other file transfer protocols.
Unlike the Advanced File Transfer Protocol, which uses TCP at the transport layer, it works on the UDP protocol and does not have functions such as checking whether data packets belonging to files will be sent to the other end. Because of this limitation, it is more suitable for use in a LAN rather than the Internet or WAN.
Despite all of these seemingly disadvantageous properties listed above, one aspect of the TFTP protocol that is very powerful is its simplicity. Compared to its alternatives, this protocol is very easy to implement, even for environments without an operating system. Due to this feature, it has a wide range of uses in embedded systems.
Install TFTP server on Linux
When using embedded devices, it is important to install the TFTP server service. On Linux systems, it is possible to run multiple TFTP server implementations. If you are using a Debian-based distribution, you can install the tftpd-hpa, tftpd or atftpd packages. If you are not sure which one to choose, consider installing the tftpd-hpa package.
┌──(linuxmi㉿linuxmi)-[~/linuxmi.com] └─$ sudo apt-get install tftpd-hpa

After installation, the TFTP service will start listening on UDP port 69. To serve files to other systems via a TFTP server, you need to remember some prerequisites:
The first is to copy the required files to the TFTP home directory or a directory under that home directory, and the second is to make the file permissions visible to the public
To find out what the TFTP server home directory is, you can look at the TFTP_DIRECTORY variable in the /etc/default/tftpd-hpa file. Typically, you'll see directories like /var/lib/tftpboot or /srv/tftp. If necessary, you can change this directory and restart the service.
┌──(linuxmi㉿linuxmi)-[~/linuxmi.com] └─$ cat /etc/default/tftpd-hpa

For ease of use, if you change the owner of the relevant TFTP home directory to your user account, you do not need to add the sudo prefix to every command you run. Use the chown command to change ownership from root to the current user:
sudo chown -R $USER /srv/tftp
The TFTP server package name and default home directory may vary depending on the Linux distribution used.
Use TFTP server to send files
Sometimes there are situations where TFTP is the only option for moving files from an embedded Linux system to an external environment. For example, sometimes the system may not support any writable media that can be used to transfer files.
In this case, since the TFTP client may be compiled in busybox, you can send the files saved in the system to the TFTP server on the network.
To use the TFTP client application, issue the busybox tftp command:
busybox tftp
To send the sample file to the TFTP server, you need to use the following command:
busybox tftp -l example.bin -p 192.168.1.111
Although the above command is correct, an error will occur while transferring the file to the TFTP server. Since the error message returned is not self-explanatory, it can be difficult to understand what the real problem is.
The problem here is because of some security procedures on the TFTP server. TFTP requires that a file with the same name should be located in the directory where the file will be written, as a prerequisite for file upload, and that write permissions for the file should be available to everyone.
In other words, files that do not exist on the TFTP server cannot be uploaded through the TFTP client. If you create an empty file with the same name and edit its access permissions, the above upload process will succeed. To do this, you must run the following command in the relevant TFTP server home directory:
cd /srv/tftp touch example.bin chmod 666 example.bin
Now you can perform the upload successfully.
It is also possible to disable the above security measures and let the TFTP server create a file that does not exist. To do this, you can use the -c or --create parameter when starting the tftpd-hpa application. It is sufficient to add this parameter to the existing TFTPD_OPTIONS variable in the /etc/default/tftpd-hpa file:
# /etc/default/tftpd-hpa TFTP_USERNAME="tftp" TFTP_DIRECTORY="/srv/tftp" TFTP_ADDRESS="0.0.0.0:69" TFTP_OPTIONS="--secure --create"
Why use TFTP server for file transfer?
The most important advantage of TFTP is that it is fast and helps you save time. It is ideal for transferring configuration files of network devices to other systems. Furthermore, it has very simple usage standards. It can easily run with software on Windows and Linux based operating systems. Finally, in situations where FTP is technically not possible, TFTP can always save the day.
Of course, the biggest disadvantage is insecurity. Therefore, you must be very careful when transferring files using a TFTP server.
Except for file transfer, you cannot use the TFTP server to perform functions such as file deletion, editing, and modification. This feature is a major drawback for those using or looking for advanced systems. Finally, it doesn't require authentication, which is a major drawback if you're serious about your security.
Setting up TFTP on other operating systems
If you want to use TFTP on Windows, you don't need to install any third-party software. You can enable TFTP using the Turn Windows features on or off option in Control Panel.
The above is the detailed content of How to Set Up the Ancient and Simple TFTP Server on Linux. For more information, please follow other related articles on the PHP Chinese website!

The main tasks of Linux system administrators include system monitoring and performance tuning, user management, software package management, security management and backup, troubleshooting and resolution, performance optimization and best practices. 1. Use top, htop and other tools to monitor system performance and tune it. 2. Manage user accounts and permissions through useradd commands and other commands. 3. Use apt and yum to manage software packages to ensure system updates and security. 4. Configure a firewall, monitor logs, and perform data backup to ensure system security. 5. Troubleshoot and resolve through log analysis and tool use. 6. Optimize kernel parameters and application configuration, and follow best practices to improve system performance and stability.

Learning Linux is not difficult. 1.Linux is an open source operating system based on Unix and is widely used in servers, embedded systems and personal computers. 2. Understanding file system and permission management is the key. The file system is hierarchical, and permissions include reading, writing and execution. 3. Package management systems such as apt and dnf make software management convenient. 4. Process management is implemented through ps and top commands. 5. Start learning from basic commands such as mkdir, cd, touch and nano, and then try advanced usage such as shell scripts and text processing. 6. Common errors such as permission problems can be solved through sudo and chmod. 7. Performance optimization suggestions include using htop to monitor resources, cleaning unnecessary files, and using sy

The average annual salary of Linux administrators is $75,000 to $95,000 in the United States and €40,000 to €60,000 in Europe. To increase salary, you can: 1. Continuously learn new technologies, such as cloud computing and container technology; 2. Accumulate project experience and establish Portfolio; 3. Establish a professional network and expand your network.

The main uses of Linux include: 1. Server operating system, 2. Embedded system, 3. Desktop operating system, 4. Development and testing environment. Linux excels in these areas, providing stability, security and efficient development tools.

The Internet does not rely on a single operating system, but Linux plays an important role in it. Linux is widely used in servers and network devices and is popular for its stability, security and scalability.

The core of the Linux operating system is its command line interface, which can perform various operations through the command line. 1. File and directory operations use ls, cd, mkdir, rm and other commands to manage files and directories. 2. User and permission management ensures system security and resource allocation through useradd, passwd, chmod and other commands. 3. Process management uses ps, kill and other commands to monitor and control system processes. 4. Network operations include ping, ifconfig, ssh and other commands to configure and manage network connections. 5. System monitoring and maintenance use commands such as top, df, du to understand the system's operating status and resource usage.

Introduction Linux is a powerful operating system favored by developers, system administrators, and power users due to its flexibility and efficiency. However, frequently using long and complex commands can be tedious and er

Linux is suitable for servers, development environments, and embedded systems. 1. As a server operating system, Linux is stable and efficient, and is often used to deploy high-concurrency applications. 2. As a development environment, Linux provides efficient command line tools and package management systems to improve development efficiency. 3. In embedded systems, Linux is lightweight and customizable, suitable for environments with limited resources.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SublimeText3 Linux new version
SublimeText3 Linux latest version

Dreamweaver Mac version
Visual web development tools

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

SublimeText3 Mac version
God-level code editing software (SublimeText3)