Re: [Dnsmasq-discuss] client q: both static and dhcp

2021-06-26 Thread Dominik
Hey Carl,

On Sat, 2021-06-26 at 19:16 -0500, Carl Karsten wrote:
> I'm looking for advice on haveing some boxes to have both dynamic and
> static IPs.  

Why use a static IP at all? We have often enough seen people use static
addresses for the wrong reasons.

Consider using only DHCP and

(a) use a hostname to access the device. In the end, memorizing some-
service.lan is more reliable than 192.168.1.149. You may think
differently, but let's see what you say after not having logged into
the box for half a year - do you still know the address without looking
it up? However, you may still recall a good hostname.

(b) use a deterministic DHCP server like dnsmasq. It always tries to
assign the same IP addresses to the same devices (instead of numbering
them sequentially based on their appearance like cheap routers often
do).

Using (a), (b) or (a)+(b) doesn't require you to have a static IP at
all.

Best,
Dominik


___
Dnsmasq-discuss mailing list
Dnsmasq-discuss@lists.thekelleys.org.uk
https://lists.thekelleys.org.uk/cgi-bin/mailman/listinfo/dnsmasq-discuss


Re: [Dnsmasq-discuss] dnsmasq dhcp relay not relaying response from upstream to client

2021-06-26 Thread Bino Oetomo
Dear Nicolas Cavallari

I really appreciate your help
I will go to my rest code and do some correction

Well, actually that not freeradius (as a software name) but as a node name.

All thing come from freeradius is sourced from my rest code.

Sincerely
-bino-

On Sat, Jun 26, 2021 at 6:26 PM Nicolas Cavallari <
nicolas.cavall...@green-communications.fr> wrote:

> Let's look at the reply from freeradius:
>
> > (14) Sent code 1026 Id 24307805 from 10.10.254.1:67 to 10.10.253.1:67
> > length 0
> > (14)   DHCP-Relay-IP-Address = 10.10.253.1
> > (14)   DHCP-Client-Identifier = 0xff2784511b000100012867cc8108002784511b
> > (14)   DHCP-IP-Address-Lease-Time = 7200
> > (14)   DHCP-Client-IP-Address = 255.255.255.255
>
> This is suspicious. RFC 2131 Table 3 says ciaddr (Client IP Address)
> should be 0.0.0.0 in a DHCPOFFER, and should otherwise mirror the ciaddr
> sent by the client, which, in this case, was 0.0.0.0 too.
>
> > (14)   DHCP-Your-IP-Address = 10.10.253.3
> > (14)   DHCP-Subnet-Mask = 255.255.255.0
> > (14)   DHCP-Router-Address = 10.10.253.1
> > (14)   DHCP-Domain-Name-Server = 8.8.8.8
> > (14)   DHCP-Message-Type = DHCP-Offer
> > (14)   DHCP-Gateway-IP-Address = 10.10.253.1
> > (14)   DHCP-DHCP-Server-Identifier = 255.255.255.255
>
> This is HIGHLY suspicious. This is supposed to be the address of the
> server. The rules are set in section 4.1 of the RFC, and most notably:
>
> "a server MUST choose an address as a 'server identifier' that, to the
> best of the server's knowledge, is reachable from the client."
>
> This is not going to work well in this case.
>
> > (14)   DHCP-Opcode = Server-Message
> > (14)   DHCP-Hardware-Type = Ethernet
> > (14)   DHCP-Hardware-Address-Length = 6
> > (14)   DHCP-Hop-Count = 1
> > (14)   DHCP-Transaction-Id = 24307805
> > (14)   DHCP-Flags = 0
>
> The "broadcast" flag is not set. This means that the client supports
> unicast replies, so the relay should unicast the reply to yiaddr using
> chaddr...
>
> So what would dnsmasq do with such a response ?
>
> relay_reply4() would correctly detect that this is a server-to-relay
> response, so is_relay_reply = 1,
>
> but ciaddr is not zero, and dnsmasq will trust ciaddr over yiaddr (this
> makes perfect sense for a DHCP server, a relay should not see anything
> with ciaddr != 0 anyway). so the destination is set to
> 255.255.255.255:68, and we skip all the destination selection code (the
> one that looks at the broadcast flag), as well as the interface
> selection code.
>
> dnsmasq would probably sends the packet to 255.255.255.255:68 without
> telling on which interface it should be sent or which source address
> should be used, because ciaddr is supposed to be a unicast address. What
> the kernel would do in this case is anyone's guess.
>
> Even if such a message could be forwarded verbatim to the client, it
> would probably confuse it. When a client receives a lease from a DHCP
> server, it will renew it by sending unicast packets directly to the
> server's "server identifier" address, without involving the relay. But
> here, "server identifier" is set to 255.255.255.255...
>
> On the other hand, the ISC DHCP server/relay/client have probably seen
> their share of nonsensical DHCP implementations, and can probably see
> through freeradius's nonsense packets.
>
___
Dnsmasq-discuss mailing list
Dnsmasq-discuss@lists.thekelleys.org.uk
https://lists.thekelleys.org.uk/cgi-bin/mailman/listinfo/dnsmasq-discuss


[Dnsmasq-discuss] client q: both static and dhcp

2021-06-26 Thread Carl Karsten
This is a bit OT, if there is a better place let me know.

I'm looking for advice on haveing some boxes to have both dynamic and
static IPs.

There is a risk that my static choice collides with an IP on a random lan I
jack into, which I can deal with manually.  Might even make a MOTD message
telling me why I can't log in and see the MOTD ;)

What else might be a problem?

This conf gets me that:

juser@gator:~$ cat /etc/network/interfaces
auto lo enp0s31f6 enp0s31f6:0
iface lo inet loopback

iface enp0s31f6 inet static
address 192.168.1.31
netmask 255.255.255.0
gateway 192.168.1.1

iface enp0s31f6:0 inet dhcp

juser@gator:~$ ip a show enp0s31f6
2: enp0s31f6:  mtu 1500 qdisc pfifo_fast
state UP group default qlen 1000
link/ether 40:8d:5c:7f:bb:90 brd ff:ff:ff:ff:ff:ff
inet 192.168.1.31/24 brd 192.168.1.255 scope global enp0s31f6
   valid_lft forever preferred_lft forever
inet 192.168.1.118/24 brd 192.168.1.255 scope global secondary dynamic
enp0s31f6:0
   valid_lft 14219sec preferred_lft 14219sec
inet6 fe80::428d:5cff:fe7f:bb90/64 scope link
   valid_lft forever preferred_lft forever

juser@gator:~$ /sbin/route -n
Kernel IP routing table
Destination Gateway Genmask Flags Metric RefUse
Iface
0.0.0.0 192.168.1.1 0.0.0.0 UG0  00
enp0s31f6
192.168.1.0 0.0.0.0 255.255.255.0   U 0  00
enp0s31f6


-- 
Carl K
___
Dnsmasq-discuss mailing list
Dnsmasq-discuss@lists.thekelleys.org.uk
https://lists.thekelleys.org.uk/cgi-bin/mailman/listinfo/dnsmasq-discuss


[Dnsmasq-discuss] [PATCH] Do not crash when Ubus connection fails.

2021-06-26 Thread Etan Kissling
When using multiple dnsmasq instances Ubus only connects on one of them.
Since 3c93e8eb41952a9c91699386132d6fe83050e9be dnsmasq crashes instead.
This change avoids the crash, leading to a graceful retry + error log.

Signed-off-by: Etan Kissling 
---
 src/dnsmasq.c | 4 +---
 1 file changed, 1 insertion(+), 3 deletions(-)

diff --git a/src/dnsmasq.c b/src/dnsmasq.c
index 04582da..2b4291b 100644
--- a/src/dnsmasq.c
+++ b/src/dnsmasq.c
@@ -449,10 +449,8 @@ int main (int argc, char **argv)
   if (option_bool(OPT_UBUS))
 #ifdef HAVE_UBUS
 {
-  char *err;
   daemon->ubus = NULL;
-  if ((err = ubus_init()))
-   die(_("UBus error: %s"), err, EC_MISC);
+  (void) ubus_init(); /* Logging not set up yet. */
 }
 #else
   die(_("UBus not available: set HAVE_UBUS in src/config.h"), NULL, 
EC_BADCONF);
-- 
2.30.1 (Apple Git-130)


___
Dnsmasq-discuss mailing list
Dnsmasq-discuss@lists.thekelleys.org.uk
https://lists.thekelleys.org.uk/cgi-bin/mailman/listinfo/dnsmasq-discuss


Re: [Dnsmasq-discuss] dnsmasq dhcp relay not relaying response from upstream to client

2021-06-26 Thread Geert Stappers via Dnsmasq-discuss
On Sat, Jun 26, 2021 at 11:52:10AM +0700, Bino Oetomo wrote:
> On Sat, Jun 26, 2021 at 4:12 AM Geert Stappers  wrote:
> > On Fri, Jun 25, 2021 at 11:30:18AM +0700, Bino Oetomo wrote:
> > > but how to know if dnsmasq is receiving that response?
> >
> >   ... use networksniffer at **server** to verify that
> >the network packets actual do leave 'freeradius'
> >at the correct network interface.
> >
> > Next step will be netsniffing at the DHCP relay computer.
> >
> I'm not good in network sniffing.

Luckly there is now a good reason to get more comfortable with it.


> This is tcpdump  at the relay :
> 
> 11:42:41.275012 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 
> 08:00:27:84:51:1b, length 300
> 11:42:41.275324 IP 10.10.253.1.67 > 10.10.254.1.67: BOOTP/DHCP, Request from 
> 08:00:27:84:51:1b, length 300
> 11:42:41.433288 IP 10.10.254.1.67 > 10.10.253.1.67: BOOTP/DHCP, Reply, length 
> 301
> 11:42:45.558901 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 
> 08:00:27:84:51:1b, length 300
> 11:42:45.559148 IP 10.10.253.1.67 > 10.10.254.1.67: BOOTP/DHCP, Request from 
> 08:00:27:84:51:1b, length 300
> 11:42:45.721512 IP 10.10.254.1.67 > 10.10.253.1.67: BOOTP/DHCP, Reply, length 
> 301
> 11:42:56.982058 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 
> 08:00:27:84:51:1b, length 300
> 11:42:56.982472 IP 10.10.253.1.67 > 10.10.254.1.67: BOOTP/DHCP, Request from 
> 08:00:27:84:51:1b, length 300
> 11:42:57.113442 IP 10.10.254.1.67 > 10.10.253.1.67: BOOTP/DHCP, Reply, length 
> 301
> 
> Againt, I'm pretty sure that freeradius sent the response and it reach the
> relay.

Yes, `tcpdump` does proof that.

 
> But, still got the same conndition and client side
> 
> root@bakalandebian:~# dhclient -d enp0s8
   ...
> DHCPDISCOVER on enp0s8 to 255.255.255.255 port 67 interval 3
> DHCPDISCOVER on enp0s8 to 255.255.255.255 port 67 interval 7
> DHCPDISCOVER on enp0s8 to 255.255.255.255 port 67 interval 14
> No DHCPOFFERS received.
> No working leases in persistent database - sleeping.
> 
> Yes isc-dhcp-relay works,
> but I need to stick with dnsmasq since I need to take care about iPXE.
 
I'm also here for the great combination of iPXE and dnsmasq.


> > So kindly please help me to fix this problem
> >
> > That was recieved as
> >
> >   Kindly help me with diagnosing a problem.
> >
> >
> > Already started   :-)
> >

And there is the good observation from Nicolas Cavallari 

I suggest to continue the email thread there.

 

> > > log-dhcp
> > > dhcp-relay=10.10.253.1,10.10.254.1
> >
> > Manual page dnsmasq snippet:
> >--dhcp-relay=,[, >
> > So the 'dhcp-relay=10.10.253.1,10.10.254.1' looks good ...
> >
> I edited it to --> dhcp-relay=10.10.253.1,10.10.254.1,enp0s8
> enp0s8 is facing freeradius.

Acknowledge


> I Apologize for my bad english

Advice:
* Focus on the technical challenge  ( focus on the "original problem" )
* Prevent getting exhausted on non-native language stuff


> Dear Geert Stappers
> I really apprecate your help
 
We all appreciate a healthy community.


 
Groeten
Geert Stappers
-- 
Silence is hard to parse

___
Dnsmasq-discuss mailing list
Dnsmasq-discuss@lists.thekelleys.org.uk
https://lists.thekelleys.org.uk/cgi-bin/mailman/listinfo/dnsmasq-discuss


Re: [Dnsmasq-discuss] what is 'next-server' ? is it dhcp-option 66?

2021-06-26 Thread Geert Stappers via Dnsmasq-discuss
On Sat, Jun 26, 2021 at 02:58:16PM +0700, Bino Oetomo wrote:
> On Sat, Jun 26, 2021 at 1:24 PM Geert Stappers wrote:
> > On Sat, Jun 26, 2021 at 09:55:01AM +0700, Bino Oetomo wrote:
> > > Dear All.
> >
> > > Is 'next-server' different from dhcp-option-66?
> >
> > Yes, they are two different "fields" in a DHCP network packet.
> >
> 

Qouting https://datatracker.ietf.org/doc/html/rfc2131#page-9
RFC-2131 Dynamic Host Configuration Protocol


   0   1   2   3
   0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   | op (1)|   htype (1)   |   hlen (1)|   hops (1)|
   +---+---+---+---+
   |xid (4)|
   +---+---+
   |   secs (2)|   flags (2)   |
   +---+---+
   |  ciaddr  (4)  |
   +---+
   |  yiaddr  (4)  |
   +---+
   |  siaddr  (4)  |
   +---+
   |  giaddr  (4)  |
   +---+
   |   |
   |  chaddr  (16) |
   |   |
   |   |
   +---+
   |   |
   |  sname   (64) |
   +---+
   |   |
   |  file(128)|
   +---+
   |   |
   |  options (variable)   |
   +---+


> So, what is it's option number?
> is it the same as siaddr?

The above model of a DHCP network packet should answer those questions.



Regards
Geert Stappers
Fully are that knowning what is in the network packet,
does not mean knowning how it is implemented.
-- 
Silence is hard to parse

___
Dnsmasq-discuss mailing list
Dnsmasq-discuss@lists.thekelleys.org.uk
https://lists.thekelleys.org.uk/cgi-bin/mailman/listinfo/dnsmasq-discuss


Re: [Dnsmasq-discuss] dnsmasq dhcp relay not relaying response from upstream to client

2021-06-26 Thread Geert Stappers via Dnsmasq-discuss
On Sat, Jun 26, 2021 at 01:26:10PM +0200, Nicolas Cavallari wrote:
> Let's look at the reply from freeradius:
> 
> > (14) Sent code 1026 Id 24307805 from 10.10.254.1:67 to 10.10.253.1:67 
> > length 0
> > (14)   DHCP-Relay-IP-Address = 10.10.253.1
> > (14)   DHCP-Client-Identifier = 0xff2784511b000100012867cc8108002784511b
> > (14)   DHCP-IP-Address-Lease-Time = 7200
> > (14)   DHCP-Client-IP-Address = 255.255.255.255
> 
> This is suspicious. RFC 2131 Table 3 says ciaddr (Client IP Address) should
> be 0.0.0.0 in a DHCPOFFER, and should otherwise mirror the ciaddr sent by
> the client, which, in this case, was 0.0.0.0 too.
> 
> > (14)   DHCP-Your-IP-Address = 10.10.253.3
> > (14)   DHCP-Subnet-Mask = 255.255.255.0
> > (14)   DHCP-Router-Address = 10.10.253.1
> > (14)   DHCP-Domain-Name-Server = 8.8.8.8
> > (14)   DHCP-Message-Type = DHCP-Offer
> > (14)   DHCP-Gateway-IP-Address = 10.10.253.1
> > (14)   DHCP-DHCP-Server-Identifier = 255.255.255.255
> 
> This is HIGHLY suspicious. This is supposed to be the address of the server.

Good observation.

 
> The rules are set in section 4.1 of the RFC, and most notably:
> 
> "a server MUST choose an address as a 'server identifier' that, to the best
> of the server's knowledge, is reachable from the client."
> 
> This is not going to work well in this case.
> 
> > (14)   DHCP-Opcode = Server-Message
> > (14)   DHCP-Hardware-Type = Ethernet
> > (14)   DHCP-Hardware-Address-Length = 6
> > (14)   DHCP-Hop-Count = 1
> > (14)   DHCP-Transaction-Id = 24307805
> > (14)   DHCP-Flags = 0
> 
> The "broadcast" flag is not set. This means that the client supports unicast
> replies, so the relay should unicast the reply to yiaddr using chaddr...
> 
> So what would dnsmasq do with such a response ?
> 
> relay_reply4() would correctly detect that this is a server-to-relay
> response, so is_relay_reply = 1,
> 
> but ciaddr is not zero, and dnsmasq will trust ciaddr over yiaddr (this
> makes perfect sense for a DHCP server, a relay should not see anything with
> ciaddr != 0 anyway). so the destination is set to 255.255.255.255:68, and we
> skip all the destination selection code (the one that looks at the broadcast
> flag), as well as the interface selection code.
> 
> dnsmasq would probably sends the packet to 255.255.255.255:68 without
> telling on which interface it should be sent or which source address should
> be used, because ciaddr is supposed to be a unicast address. What the kernel
> would do in this case is anyone's guess.
> 
> Even if such a message could be forwarded verbatim to the client, it would
> probably confuse it. When a client receives a lease from a DHCP server, it
> will renew it by sending unicast packets directly to the server's "server
> identifier" address, without involving the relay. But here, "server
> identifier" is set to 255.255.255.255...
> 
> On the other hand, the ISC DHCP server/relay/client have probably seen their
> share of nonsensical DHCP implementations, and can probably see through
> freeradius's nonsense packets.

At https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2021q2/015184.html
is the message that reports "success" with  isc-dhcp-relay.

Currently there is no information if the swap of "dhcp relay" was the
only change.  There _could_ be also change at freeradius DHCP server
configuration.

Senseble thing would be revert the swap, so dnsmasq again as "dhcp relay",
and see if:
 * problem still exists
 * problem can be eliminated by re-configuring the Freeradius DHCP server



Groeten
Geert Stappers
-- 
Silence is hard to parse

___
Dnsmasq-discuss mailing list
Dnsmasq-discuss@lists.thekelleys.org.uk
https://lists.thekelleys.org.uk/cgi-bin/mailman/listinfo/dnsmasq-discuss


Re: [Dnsmasq-discuss] [PATCH v5] openwrt: Integration of connmark based DNS filtering

2021-06-26 Thread Etan Kissling


> On 16 Jun 2021, at 23:56, Etan Kissling  wrote:
> 
> This integrates the proposed Dnsmasq patch from email:
> - [PATCH v5] dnsmasq: connection track mark based DNS query filtering
> into OpenWrt 21.02.
> 
> Signed-off-by: Etan Kissling 
> (updated to latest patch)
> Signed-off-by: Etan Kissling 
> ---
> Etan Kissling :
> v2: Update to v6 of underlying dnsmasq patch.
> v3: Update to v7 of underlying dnsmasq patch.
> v4: Update to v8 of underlying dnsmasq patch.
> v5: Update to v9 of underlying dnsmasq patch (requires v2.86test2).

This has been accepted into OpenWrt master.
https://git.openwrt.org/?p=openwrt/openwrt.git;a=commitdiff;h=dea4bae7c2b963af02e1e3e3bdb5cd656a5ea3d3

Etan

___
Dnsmasq-discuss mailing list
Dnsmasq-discuss@lists.thekelleys.org.uk
https://lists.thekelleys.org.uk/cgi-bin/mailman/listinfo/dnsmasq-discuss


Re: [Dnsmasq-discuss] dnsmasq dhcp relay not relaying response from upstream to client

2021-06-26 Thread Nicolas Cavallari

Let's look at the reply from freeradius:


(14) Sent code 1026 Id 24307805 from 10.10.254.1:67 to 10.10.253.1:67
length 0
(14)   DHCP-Relay-IP-Address = 10.10.253.1
(14)   DHCP-Client-Identifier = 0xff2784511b000100012867cc8108002784511b
(14)   DHCP-IP-Address-Lease-Time = 7200
(14)   DHCP-Client-IP-Address = 255.255.255.255


This is suspicious. RFC 2131 Table 3 says ciaddr (Client IP Address) 
should be 0.0.0.0 in a DHCPOFFER, and should otherwise mirror the ciaddr 
sent by the client, which, in this case, was 0.0.0.0 too.



(14)   DHCP-Your-IP-Address = 10.10.253.3
(14)   DHCP-Subnet-Mask = 255.255.255.0
(14)   DHCP-Router-Address = 10.10.253.1
(14)   DHCP-Domain-Name-Server = 8.8.8.8
(14)   DHCP-Message-Type = DHCP-Offer
(14)   DHCP-Gateway-IP-Address = 10.10.253.1
(14)   DHCP-DHCP-Server-Identifier = 255.255.255.255


This is HIGHLY suspicious. This is supposed to be the address of the 
server. The rules are set in section 4.1 of the RFC, and most notably:


"a server MUST choose an address as a 'server identifier' that, to the 
best of the server's knowledge, is reachable from the client."


This is not going to work well in this case.


(14)   DHCP-Opcode = Server-Message
(14)   DHCP-Hardware-Type = Ethernet
(14)   DHCP-Hardware-Address-Length = 6
(14)   DHCP-Hop-Count = 1
(14)   DHCP-Transaction-Id = 24307805
(14)   DHCP-Flags = 0


The "broadcast" flag is not set. This means that the client supports 
unicast replies, so the relay should unicast the reply to yiaddr using 
chaddr...


So what would dnsmasq do with such a response ?

relay_reply4() would correctly detect that this is a server-to-relay 
response, so is_relay_reply = 1,


but ciaddr is not zero, and dnsmasq will trust ciaddr over yiaddr (this 
makes perfect sense for a DHCP server, a relay should not see anything 
with ciaddr != 0 anyway). so the destination is set to 
255.255.255.255:68, and we skip all the destination selection code (the 
one that looks at the broadcast flag), as well as the interface 
selection code.


dnsmasq would probably sends the packet to 255.255.255.255:68 without 
telling on which interface it should be sent or which source address 
should be used, because ciaddr is supposed to be a unicast address. What 
the kernel would do in this case is anyone's guess.


Even if such a message could be forwarded verbatim to the client, it 
would probably confuse it. When a client receives a lease from a DHCP 
server, it will renew it by sending unicast packets directly to the 
server's "server identifier" address, without involving the relay. But 
here, "server identifier" is set to 255.255.255.255...


On the other hand, the ISC DHCP server/relay/client have probably seen 
their share of nonsensical DHCP implementations, and can probably see 
through freeradius's nonsense packets.


___
Dnsmasq-discuss mailing list
Dnsmasq-discuss@lists.thekelleys.org.uk
https://lists.thekelleys.org.uk/cgi-bin/mailman/listinfo/dnsmasq-discuss


Re: [Dnsmasq-discuss] what is 'next-server' ? is it dhcp-option 66?

2021-06-26 Thread Bino Oetomo
Dear Geert Stappers
I really appreciate your help

On Sat, Jun 26, 2021 at 1:24 PM Geert Stappers via Dnsmasq-discuss <
dnsmasq-discuss@lists.thekelleys.org.uk> wrote:

> On Sat, Jun 26, 2021 at 09:55:01AM +0700, Bino Oetomo wrote:
> > Dear All.
>
> > Is 'next-server' different from dhcp-option-66?
>
> Yes, they are two different "fields" in a DHCP network packet.
>
> So, what is it's option number?
is it the same as siaddr?

Sincerely
-bino-
___
Dnsmasq-discuss mailing list
Dnsmasq-discuss@lists.thekelleys.org.uk
https://lists.thekelleys.org.uk/cgi-bin/mailman/listinfo/dnsmasq-discuss


Re: [Dnsmasq-discuss] what is 'next-server' ? is it dhcp-option 66?

2021-06-26 Thread Geert Stappers via Dnsmasq-discuss
On Sat, Jun 26, 2021 at 09:55:01AM +0700, Bino Oetomo wrote:
> Dear All.

Hello,

 
> I have 3 Virtualbox guest.
> A. tftp-server DNSMASQ v.2.80 with IP address 10.10.254.1
> B. dhcp-server DNSMASQ v.280 with IP address 10.10.254.2 and 10.10.253.1 
> (This one facing IPXE client)
> C. IPXE client




+-+   +-+   +-+
| |10.10.254  | | 10.10.253 | |
|  A  +---+  B  +---+  C  |
| |.1   .2| |.1.dhcp| |
+-+   +-+   +-+


 
> When I config dhcp server with:
> 'dhcp-boot=lpxelinux.0,server.name,10.10.254.1'
> IPXE client received 'next server' 10.10.254.1
> 
> Next try, I commented 'dhcp-boot' line, and put
> dhcp-option=66,10.10.254.1
> dhcp-option=67,lpxelinux.0
> 
> DNSMASQ log says:
> 
> dnsmasq-dhcp: 3891074361 next server: 10.10.253.1
> dnsmasq-dhcp: 3891074361 sent size:  1 option: 53 message-type  5
> dnsmasq-dhcp: 3891074361 sent size:  4 option: 54 server-identifier 
> 10.10.253.1
> dnsmasq-dhcp: 3891074361 sent size:  4 option: 51 lease-time  12h
> dnsmasq-dhcp: 3891074361 sent size:  4 option: 58 T1  6h
> dnsmasq-dhcp: 3891074361 sent size:  4 option: 59 T2  10h30m
> dnsmasq-dhcp: 3891074361 sent size:  4 option:  1 netmask  255.255.255.0
> dnsmasq-dhcp: 3891074361 sent size:  4 option: 28 broadcast  10.10.253.255
> dnsmasq-dhcp: 3891074361 sent size:  4 option:  3 router  10.10.253.1
> dnsmasq-dhcp: 3891074361 sent size: 12 option: 67 bootfile-name  lpxelinux.0
> dnsmasq-dhcp: 3891074361 sent size: 12 option: 66 tftp-server  10.10.254.1
> 
> and the IPXE client receive 10.10.253.1, not as described by option:66

Come again, because I do see

 > dnsmasq-dhcp: 3891074361 next server: 10.10.253.1
 > dnsmasq-dhcp: 3891074361 sent size: 12 option: 66 tftp-server  10.10.254.1
 


> Is 'next-server' different from dhcp-option-66?

Yes, they are two different "fields" in a DHCP network packet.


Regards
Geert Stappers
Did invest yesterday (in his timezone) a lot of time
in an interesting DHCPrelay related problem.
-- 
Silence is hard to parse

___
Dnsmasq-discuss mailing list
Dnsmasq-discuss@lists.thekelleys.org.uk
https://lists.thekelleys.org.uk/cgi-bin/mailman/listinfo/dnsmasq-discuss