I try to avoid TFTP. It's a great and simple protocol from the past century - but frequently, the alternatives: SCP, HTTPS, as an example, work much more efficiently. That said: sometimes you can't escape it. Sometimes it is the only alternative.
And then begins the quest for the proper software, as well as the process of installing it, configuring, etc, etc.
Enough. I've made a 100MB ISO, which, upon bootup, starts a TFTP server which allows both reading and writing of the files in /tftpboot
There is no persistent storage in this image. Upon bootup, you can ssh into the VM - using 'root' as a login, password 'tftpboot'
You can copy your files to the /tftpboot, likewise you can write to the /tftpboot via TFTP, even create the files
Understand that the TFTP is a completely insecure protocol.
There are good reasons to *not* allow the overwriting the files via TFTP, and much less to not allow the preset password for root with ssh enabled - both of which I did in this image.
The niche for this VM is a completely isolated ephemeral network used for the device setup.
By downloading this image you acknowledge you are doing this at your own risk.
Here's a few checksums of the image so you can verify the image you download is the same as the one the checksums on this page were calculated from:
$ sha256sum tftpserver.iso a67e391a9fbf152d47252ced4dcf099f0a82ec24bbf2570542aae18b19e3693b tftpserver.iso $ sha1sum tftpserver.iso a25272b64c355030ee82c48f903720bfbfb222ce tftpserver.iso $ md5sum tftpserver.iso 1fa22591feed92e2f658561974efff40 tftpserver.iso $
../ HEADER.txt 01-Jul-2024 21:41 1787 tftpserver.iso 01-Jul-2024 21:41 110100480