End Point Manager on v14 no working

I have just upgraded to the newest distro v14 and purchased End Point Manager to auto provision my yealink t46g phones. It appears their is no port 69 listening for tftp. The firewall is turned on but I have tftp set for local and internet and have tried even adding a custom port opening in the firewall so I believe it is a problem with the service itself not listening.

tftp server works as expected in Distro 14. Make sure it’s enabled in System Admin, Provisioning protocols.

Maybe I have the same problem, I upgraded to 14 and now tftp provisioning isn’t working anymore.
I tried to dig a little deeper but don’t now what to do now.
Configuration is as follows: /etc/xinetd.d/tftp

# default: off
# description: The tftp server serves files using the trivial file transfer \
#       protocol.  The tftp protocol is often used to boot diskless \
#       workstations, download configuration files to network-aware printers, \
#       and to start the installation process for some operating systems.
service tftp
{
        socket_type             = dgram
        protocol                = udp
        wait                    = yes
        user                    = root
        server                  = /usr/sbin/in.tftpd
        server_args             = -vvv -s /tftpboot
        disable                 = no
        per_source              = 11
        cps                     = 100 2
        flags                   = IPv4
}

firewall doesn’t seem to be the problem, I disables it completely and had the same results.

when I try tftp freepbxip -c get aastra.cfg on the freepbxhost it downloads the file without error.
journalctl -u xinetd -b says Aug 10 18:44:58 myfreepbxdnsname in.tftpd[26554]: RRQ from <localaddress> filename aastra.cfg one time
If I try tftp freepbxip get aastra.cfg on my windowsmachine I get connection failed (in german it is “Verbindungsanforderung fehlgeschlagen”, don’t know the exact original translation for that).
Journalctl -u xinetd -b says exact the same as for the local freepbx but eight times.
tcpdump says (.110 is freepbx, .124 the windows client, netmask is /16, so that isn’t the problem, I can ping each other host just fine):

tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
    10.134.49.113.44137 > 10.134.47.110.69: Flags [S], cksum 0x87a1 (correct), seq 329204059, win 4380, options [mss 1460,sackOK,TS val 36124043 ecr 0,nop,wscale 4], length 0
    10.134.49.124.58027 > 10.134.47.110.69: [udp sum ok]  22 RRQ "aastra.cfg" netascii
    10.134.49.113.41672 > 10.134.47.110.69: Flags [S], cksum 0xbce3 (correct), seq 351802364, win 4380, options [mss 1460,sackOK,TS val 36124144 ecr 0,nop,wscale 4], length 0
    10.134.49.124.58027 > 10.134.47.110.69: [udp sum ok]  22 RRQ "aastra.cfg" netascii
    10.134.49.113.53657 > 10.134.47.110.69: Flags [S], cksum 0xe7ce (correct), seq 362461496, win 4380, options [mss 1460,sackOK,TS val 36124245 ecr 0,nop,wscale 4], length 0
    10.134.49.113.40427 > 10.134.47.110.69: Flags [S], cksum 0x5a3b (correct), seq 376011079, win 4380, options [mss 1460,sackOK,TS val 36124345 ecr 0,nop,wscale 4], length 0
    10.134.49.124.58027 > 10.134.47.110.69: [udp sum ok]  22 RRQ "aastra.cfg" netascii
    10.134.49.220.35794 > 10.134.47.110.69: Flags [S], cksum 0xe976 (correct), seq 383384670, win 4380, options [mss 1460,sackOK,TS val 36124068 ecr 0,nop,wscale 4], length 0
    10.134.49.113.59026 > 10.134.47.110.69: Flags [S], cksum 0x3cdb (correct), seq 401361944, win 4380, options [mss 1460,sackOK,TS val 36124446 ecr 0,nop,wscale 4], length 0
    10.134.49.220.53194 > 10.134.47.110.69: Flags [S], cksum 0xe336 (correct), seq 401915175, win 4380, options [mss 1460,sackOK,TS val 36124168 ecr 0,nop,wscale 4], length 0
    10.134.49.113.56652 > 10.134.47.110.69: Flags [S], cksum 0xd508 (correct), seq 418692036, win 4380, options [mss 1460,sackOK,TS val 36124546 ecr 0,nop,wscale 4], length 0
    10.134.49.220.54462 > 10.134.47.110.69: Flags [S], cksum 0xe85b (correct), seq 413708789, win 4380, options [mss 1460,sackOK,TS val 36124269 ecr 0,nop,wscale 4], length 0
    10.134.49.113.49127 > 10.134.47.110.69: Flags [S], cksum 0x15b4 (correct), seq 425760685, win 4380, options [mss 1460,sackOK,TS val 36124647 ecr 0,nop,wscale 4], length 0
    10.134.49.220.55878 > 10.134.47.110.69: Flags [S], cksum 0xe745 (correct), seq 436251591, win 4380, options [mss 1460,sackOK,TS val 36124369 ecr 0,nop,wscale 4], length 0
    10.134.49.113.46221 > 10.134.47.110.69: Flags [S], cksum 0x1e9d (correct), seq 450795580, win 4380, options [mss 1460,sackOK,TS val 36124747 ecr 0,nop,wscale 4], length 0
    10.134.49.124.58027 > 10.134.47.110.69: [udp sum ok]  22 RRQ "aastra.cfg" netascii
    10.134.49.220.55529 > 10.134.47.110.69: Flags [S], cksum 0xa782 (correct), seq 453962612, win 4380, options [mss 1460,sackOK,TS val 36124470 ecr 0,nop,wscale 4], length 0
    10.134.49.113.35687 > 10.134.47.110.69: Flags [S], cksum 0x68ac (correct), seq 465008149, win 4380, options [mss 1460,sackOK,TS val 36124848 ecr 0,nop,wscale 4], length 0
    10.134.49.220.60974 > 10.134.47.110.69: Flags [S], cksum 0x7919 (correct), seq 454034483, win 4380, options [mss 1460,sackOK,TS val 36124570 ecr 0,nop,wscale 4], length 0
    10.134.49.113.52806 > 10.134.47.110.69: Flags [S], cksum 0x8a61 (correct), seq 471470265, win 4380, options [mss 1460,sackOK,TS val 36124949 ecr 0,nop,wscale 4], length 0
    10.134.49.220.37678 > 10.134.47.110.69: Flags [S], cksum 0x3cf0 (correct), seq 481204569, win 4380, options [mss 1460,sackOK,TS val 36124671 ecr 0,nop,wscale 4], length 0
    10.134.49.220.54958 > 10.134.47.110.69: Flags [S], cksum 0x4f32 (correct), seq 492323465, win 4380, options [mss 1460,sackOK,TS val 36124771 ecr 0,nop,wscale 4], length 0
    10.134.49.220.56062 > 10.134.47.110.69: Flags [S], cksum 0x8739 (correct), seq 514458747, win 4380, options [mss 1460,sackOK,TS val 36124872 ecr 0,nop,wscale 4], length 0
    10.134.49.220.54690 > 10.134.47.110.69: Flags [S], cksum 0xe9ba (correct), seq 520922767, win 4380, options [mss 1460,sackOK,TS val 36124972 ecr 0,nop,wscale 4], length 0
    10.134.49.124.58027 > 10.134.47.110.69: [udp sum ok]  22 RRQ "aastra.cfg" netascii
    10.134.47.110.69 > 10.134.49.220.38170: Flags [R.], cksum 0x1245 (correct), seq 0, ack 611741024, win 0, length 0
    10.134.49.124.58027 > 10.134.47.110.69: [udp sum ok]  22 RRQ "aastra.cfg" netascii
    10.134.49.124.58027 > 10.134.47.110.69: [udp sum ok]  22 RRQ "aastra.cfg" netascii
    10.134.49.124.58027 > 10.134.47.110.69: [udp sum ok]  22 RRQ "aastra.cfg" netascii
    10.134.49.124.58027 > 10.134.47.110.69: [udp sum ok]  23 ERROR EUNDEF "timeout on receive"

Also when I just capture I have constantly this (the IPs are two snomphones which where provisioned before:

[[email protected] ~]# tcpdump -vvnn port 69
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
18:56:36.652789 IP (tos 0x0, ttl 64, id 8826, offset 0, flags [DF], proto TCP (6), length 60)
    10.134.49.113.55961 > 10.134.47.110.69: Flags [S], cksum 0x41aa (correct), seq 3302055330, win 4380, options [mss 1460,sackOK,TS val 36143064 ecr 0,nop,wscale 4], length 0
18:56:36.652844 IP (tos 0x0, ttl 64, id 54763, offset 0, flags [DF], proto TCP (6), length 40)
    10.134.47.110.69 > 10.134.49.113.55961: Flags [R.], cksum 0x3c92 (correct), seq 0, ack 3302055331, win 0, length 0
18:56:37.422395 IP (tos 0x0, ttl 64, id 30782, offset 0, flags [none], proto TCP (6), length 60)
    10.134.49.126.58655 > 10.134.47.110.69: Flags [S], cksum 0x7688 (correct), seq 750433729, win 4380, options [mss 1460,sackOK,TS val 819834 ecr 0,nop,wscale 4], length 0
18:56:37.422442 IP (tos 0x0, ttl 64, id 8137, offset 0, flags [DF], proto TCP (6), length 40)
    10.134.47.110.69 > 10.134.49.126.58655: Flags [R.], cksum 0x71f7 (correct), seq 0, ack 750433730, win 0, length 0
18:56:37.443143 IP (tos 0x0, ttl 64, id 48109, offset 0, flags [DF], proto TCP (6), length 60)
    10.134.49.220.38651 > 10.134.47.110.69: Flags [S], cksum 0x1e0b (correct), seq 3308045614, win 4380, options [mss 1460,sackOK,TS val 36142787 ecr 0,nop,wscale 4], length 0
18:56:37.443174 IP (tos 0x0, ttl 64, id 47727, offset 0, flags [DF], proto TCP (6), length 40)
    10.134.47.110.69 > 10.134.49.220.38651: Flags [R.], cksum 0x17de (correct), seq 0, ack 3308045615, win 0, length 0
18:56:37.663880 IP (tos 0x0, ttl 64, id 21807, offset 0, flags [DF], proto TCP (6), length 60)
    10.134.49.113.40391 > 10.134.47.110.69: Flags [S], cksum 0x059b (correct), seq 3319649554, win 4380, options [mss 1460,sackOK,TS val 36143165 ecr 0,nop,wscale 4], length 0
18:56:37.663940 IP (tos 0x0, ttl 64, id 55195, offset 0, flags [DF], proto TCP (6), length 40)
    10.134.47.110.69 > 10.134.49.113.40391: Flags [R.], cksum 0x00e8 (correct), seq 0, ack 3319649555, win 0, length 0
18:56:38.431528 IP (tos 0x0, ttl 64, id 30783, offset 0, flags [none], proto TCP (6), length 60)
    10.134.49.126.35894 > 10.134.47.110.69: Flags [S], cksum 0x86a6 (correct), seq 754253293, win 4380, options [mss 1460,sackOK,TS val 819935 ecr 0,nop,wscale 4], length 0
18:56:38.431573 IP (tos 0x0, ttl 64, id 8260, offset 0, flags [DF], proto TCP (6), length 40)
    10.134.47.110.69 > 10.134.49.126.35894: Flags [R.], cksum 0x827a (correct), seq 0, ack 754253294, win 0, length 0
18:56:38.449502 IP (tos 0x0, ttl 64, id 37969, offset 0, flags [DF], proto TCP (6), length 60)
    10.134.49.220.33116 > 10.134.47.110.69: Flags [S], cksum 0x0c4e (correct), seq 3319327609, win 4380, options [mss 1460,sackOK,TS val 36142888 ecr 0,nop,wscale 4], length 0
18:56:38.449531 IP (tos 0x0, ttl 64, id 48577, offset 0, flags [DF], proto TCP (6), length 40)
    10.134.47.110.69 > 10.134.49.220.33116: Flags [R.], cksum 0x0686 (correct), seq 0, ack 3319327610, win 0, length 0
18:56:38.675492 IP (tos 0x0, ttl 64, id 41138, offset 0, flags [DF], proto TCP (6), length 60)
    10.134.49.113.48661 > 10.134.47.110.69: Flags [S], cksum 0x98b0 (correct), seq 3340181520, win 4380, options [mss 1460,sackOK,TS val 36143266 ecr 0,nop,wscale 4], length 0
18:56:38.675555 IP (tos 0x0, ttl 64, id 55997, offset 0, flags [DF], proto TCP (6), length 40)
    10.134.47.110.69 > 10.134.49.113.48661: Flags [R.], cksum 0x9462 (correct), seq 0, ack 3340181521, win 0, length 0
18:56:39.438163 IP (tos 0x0, ttl 64, id 30784, offset 0, flags [none], proto TCP (6), length 60)
    10.134.49.126.56475 > 10.134.47.110.69: Flags [S], cksum 0xf684 (correct), seq 771701819, win 4380, options [mss 1460,sackOK,TS val 820035 ecr 0,nop,wscale 4], length 0
18:56:39.438206 IP (tos 0x0, ttl 64, id 9084, offset 0, flags [DF], proto TCP (6), length 40)
    10.134.47.110.69 > 10.134.49.126.56475: Flags [R.], cksum 0xf2bc (correct), seq 0, ack 771701820, win 0, length 0
18:56:39.453938 IP (tos 0x0, ttl 64, id 50957, offset 0, flags [DF], proto TCP (6), length 60)
    10.134.49.220.48756 > 10.134.47.110.69: Flags [S], cksum 0x00a1 (correct), seq 3338778753, win 4380, options [mss 1460,sackOK,TS val 36142988 ecr 0,nop,wscale 4], length 0
18:56:39.453972 IP (tos 0x0, ttl 64, id 49505, offset 0, flags [DF], proto TCP (6), length 40)
    10.134.47.110.69 > 10.134.49.220.48756: Flags [R.], cksum 0xfb3c (correct), seq 0, ack 3338778754, win 0, length 0
18:56:39.685503 IP (tos 0x0, ttl 64, id 31165, offset 0, flags [DF], proto TCP (6), length 60)
    10.134.49.113.47766 > 10.134.47.110.69: Flags [S], cksum 0xc2b4 (correct), seq 3347249338, win 4380, options [mss 1460,sackOK,TS val 36143367 ecr 0,nop,wscale 4], length 0
18:56:39.685551 IP (tos 0x0, ttl 64, id 56863, offset 0, flags [DF], proto TCP (6), length 40)
    10.134.47.110.69 > 10.134.49.113.47766: Flags [R.], cksum 0xbecb (correct), seq 0, ack 3347249339, win 0, length 0

The problems weren’t there before the upgrade to SNG7.
So, any idea what could be wrong here?

Thanks

It actually is a big. The person that responded is mistaken. I spoke with a guru on the forums and he told me it was a bug and that tftp service is disabled at install of the distro.

Edit the etc/xinetd.d/tftp file. Your looking for "disable = yes"
Change it to “disable = no” and restart the service
Service xinetd restart

TFTP for security reason is disabled by default. You can enable it in Sysadmin module.