3 Network Working Group Bill Croft (Stanford University)
4 Request for Comments: 951 John Gilmore (Sun Microsystems)
7 BOOTSTRAP PROTOCOL (BOOTP)
10 1. Status of this Memo
12 This RFC suggests a proposed protocol for the ARPA-Internet
13 community, and requests discussion and suggestions for improvements.
14 Distribution of this memo is unlimited.
18 This RFC describes an IP/UDP bootstrap protocol (BOOTP) which allows
19 a diskless client machine to discover its own IP address, the address
20 of a server host, and the name of a file to be loaded into memory and
21 executed. The bootstrap operation can be thought of as consisting of
22 TWO PHASES. This RFC describes the first phase, which could be
23 labeled 'address determination and bootfile selection'. After this
24 address and filename information is obtained, control passes to the
25 second phase of the bootstrap where a file transfer occurs. The file
26 transfer will typically use the TFTP protocol [9], since it is
27 intended that both phases reside in PROM on the client. However
28 BOOTP could also work with other protocols such as SFTP [3] or
31 We suggest that the client's PROM software provide a way to do a
32 complete bootstrap without 'user' interaction. This is the type of
33 boot that would occur during an unattended power-up. A mechanism
34 should be provided for the user to manually supply the necessary
35 address and filename information to bypass the BOOTP protocol and
36 enter the file transfer phase directly. If non-volatile storage is
37 available, we suggest keeping default settings there and bypassing
38 the BOOTP protocol unless these settings cause the file transfer
39 phase to fail. If the cached information fails, the bootstrap should
40 fall back to phase 1 and use BOOTP.
42 Here is a brief outline of the protocol:
44 1. A single packet exchange is performed. Timeouts are used to
45 retransmit until a reply is received. The same packet field
46 layout is used in both directions. Fixed length fields of maximum
47 reasonable length are used to simplify structure definition and
50 2. An 'opcode' field exists with two values. The client
51 broadcasts a 'bootrequest' packet. The server then answers with a
52 'bootreply' packet. The bootrequest contains the client's
53 hardware address and its IP address, if known.
56 Croft & Gilmore [Page 1]
60 RFC 951 September 1985
64 3. The request can optionally contain the name of the server the
65 client wishes to respond. This is so the client can force the
66 boot to occur from a specific host (e.g. if multiple versions of
67 the same bootfile exist or if the server is in a far distant
68 net/domain). The client does not have to deal with name / domain
69 services; instead this function is pushed off to the BOOTP server.
71 4. The request can optionally contain the 'generic' filename to be
72 booted. For example 'unix' or 'ethertip'. When the server sends
73 the bootreply, it replaces this field with the fully qualified
74 path name of the appropriate boot file. In determining this name,
75 the server may consult his own database correlating the client's
76 address and filename request, with a particular boot file
77 customized for that client. If the bootrequest filename is a null
78 string, then the server returns a filename field indicating the
79 'default' file to be loaded for that client.
81 5. In the case of clients who do not know their IP addresses, the
82 server must also have a database relating hardware address to IP
83 address. This client IP address is then placed into a field in
86 6. Certain network topologies (such as Stanford's) may be such
87 that a given physical cable does not have a TFTP server directly
88 attached to it (e.g. all the gateways and hosts on a certain cable
89 may be diskless). With the cooperation of neighboring gateways,
90 BOOTP can allow clients to boot off of servers several hops away,
91 through these gateways. See the section 'Booting Through
92 Gateways' below. This part of the protocol requires no special
93 action on the part of the client. Implementation is optional and
94 requires a small amount of additional code in gateways and
99 All numbers shown are decimal, unless indicated otherwise. The BOOTP
100 packet is enclosed in a standard IP [8] UDP [7] datagram. For
101 simplicity it is assumed that the BOOTP packet is never fragmented.
102 Any numeric fields shown are packed in 'standard network byte order',
103 i.e. high order bits are sent first.
105 In the IP header of a bootrequest, the client fills in its own IP
106 source address if known, otherwise zero. When the server address is
107 unknown, the IP destination address will be the 'broadcast address'
108 255.255.255.255. This address means 'broadcast on the local cable,
109 (I don't know my net number)' [4].
113 Croft & Gilmore [Page 2]
117 RFC 951 September 1985
121 The UDP header contains source and destination port numbers. The
122 BOOTP protocol uses two reserved port numbers, 'BOOTP client' (68)
123 and 'BOOTP server' (67). The client sends requests using 'BOOTP
124 server' as the destination port; this is usually a broadcast. The
125 server sends replies using 'BOOTP client' as the destination port;
126 depending on the kernel or driver facilities in the server, this may
127 or may not be a broadcast (this is explained further in the section
128 titled 'Chicken/Egg issues' below). The reason TWO reserved ports
129 are used, is to avoid 'waking up' and scheduling the BOOTP server
130 daemons, when a bootreply must be broadcast to a client. Since the
131 server and other hosts won't be listening on the 'BOOTP client' port,
132 any such incoming broadcasts will be filtered out at the kernel
133 level. We could not simply allow the client to pick a 'random' port
134 number for the UDP source port field; since the server reply may be
135 broadcast, a randomly chosen port number could confuse other hosts
136 that happened to be listening on that port.
138 The UDP length field is set to the length of the UDP plus BOOTP
139 portions of the packet. The UDP checksum field can be set to zero by
140 the client (or server) if desired, to avoid this extra overhead in a
141 PROM implementation. In the 'Packet Processing' section below the
142 phrase '[UDP checksum.]' is used whenever the checksum might be
145 FIELD BYTES DESCRIPTION
146 ----- ----- -----------
148 op 1 packet op code / message type.
149 1 = BOOTREQUEST, 2 = BOOTREPLY
151 htype 1 hardware address type,
152 see ARP section in "Assigned Numbers" RFC.
155 hlen 1 hardware address length
156 (eg '6' for 10mb ethernet).
158 hops 1 client sets to zero,
159 optionally used by gateways
160 in cross-gateway booting.
162 xid 4 transaction ID, a random number,
163 used to match this boot request with the
164 responses it generates.
166 secs 2 filled in by client, seconds elapsed since
167 client started trying to boot.
170 Croft & Gilmore [Page 3]
174 RFC 951 September 1985
180 ciaddr 4 client IP address;
181 filled in by client in bootrequest if known.
183 yiaddr 4 'your' (client) IP address;
184 filled by server if client doesn't
185 know its own address (ciaddr was 0).
187 siaddr 4 server IP address;
188 returned in bootreply by server.
190 giaddr 4 gateway IP address,
191 used in optional cross-gateway booting.
193 chaddr 16 client hardware address,
196 sname 64 optional server host name,
197 null terminated string.
199 file 128 boot file name, null terminated string;
200 'generic' name or null in bootrequest,
201 fully qualified directory-path
204 vend 64 optional vendor-specific area,
205 e.g. could be hardware type/serial on request,
206 or 'capability' / remote file system handle
207 on reply. This info may be set aside for use
208 by a third phase bootstrap or kernel.
210 4. Chicken / Egg Issues
212 How can the server send an IP datagram to the client, if the client
213 doesnt know its own IP address (yet)? Whenever a bootreply is being
214 sent, the transmitting machine performs the following operations:
216 1. If the client knows its own IP address ('ciaddr' field is
217 nonzero), then the IP can be sent 'as normal', since the client
218 will respond to ARPs [5].
220 2. If the client does not yet know its IP address (ciaddr zero),
221 then the client cannot respond to ARPs sent by the transmitter of
222 the bootreply. There are two options:
224 a. If the transmitter has the necessary kernel or driver hooks
227 Croft & Gilmore [Page 4]
231 RFC 951 September 1985
235 to 'manually' construct an ARP address cache entry, then it can
236 fill in an entry using the 'chaddr' and 'yiaddr' fields. Of
237 course, this entry should have a timeout on it, just like any
238 other entry made by the normal ARP code itself. The
239 transmitter of the bootreply can then simply send the bootreply
240 to the client's IP address. UNIX (4.2 BSD) has this
243 b. If the transmitter lacks these kernel hooks, it can simply
244 send the bootreply to the IP broadcast address on the
245 appropriate interface. This is only one additional broadcast
246 over the previous case.
250 The client PROM must contain a simple implementation of ARP, e.g. the
251 address cache could be just one entry in size. This will allow a
252 second-phase-only boot (TFTP) to be performed when the client knows
253 the IP addresses and bootfile name.
255 Any time the client is expecting to receive a TFTP or BOOTP reply, it
256 should be prepared to answer an ARP request for its own IP to
257 hardware address mapping (if known).
259 Since the bootreply will contain (in the hardware encapsulation) the
260 hardware source address of the server/gateway, the client MAY be able
261 to avoid sending an ARP request for the server/gateway IP address to
262 be used in the following TFTP phase. However this should be treated
263 only as a special case, since it is desirable to still allow a
264 second-phase-only boot as described above.
266 6. Comparison to RARP
268 An earlier protocol, Reverse Address Resolution Protocol (RARP) [1]
269 was proposed to allow a client to determine its IP address, given
270 that it knew its hardware address. However RARP had the disadvantage
271 that it was a hardware link level protocol (not IP/UDP based). This
272 means that RARP could only be implemented on hosts containing special
273 kernel or driver modifications to access these 'raw' packets. Since
274 there are many network kernels existent now, with each source
275 maintained by different organizations, a boot protocol that does not
276 require kernel modifications is a decided advantage.
278 BOOTP provides this hardware to IP address lookup function, in
279 addition to the other useful features described in the sections
284 Croft & Gilmore [Page 5]
288 RFC 951 September 1985
294 7.1. Client Transmission
296 Before setting up the packet for the first time, it is a good idea
297 to clear the entire packet buffer to all zeros; this will place
298 all fields in their default state. The client then creates a
299 packet with the following fields.
301 The IP destination address is set to 255.255.255.255. (the
302 broadcast address) or to the server's IP address (if known). The
303 IP source address and 'ciaddr' are set to the client's IP address
304 if known, else 0. The UDP header is set with the proper length;
305 source port = 'BOOTP client' port destination port = 'BOOTP
308 'op' is set to '1', BOOTREQUEST. 'htype' is set to the hardware
309 address type as assigned in the ARP section of the "Assigned
310 Numbers" RFC. 'hlen' is set to the length of the hardware address,
311 e.g. '6' for 10mb ethernet.
313 'xid' is set to a 'random' transaction id. 'secs' is set to the
314 number of seconds that have elapsed since the client has started
315 booting. This will let the servers know how long a client has
316 been trying. As the number gets larger, certain servers may feel
317 more 'sympathetic' towards a client they don't normally service.
318 If a client lacks a suitable clock, it could construct a rough
319 estimate using a loop timer. Or it could choose to simply send
320 this field as always a fixed value, say 100 seconds.
322 If the client knows its IP address, 'ciaddr' (and the IP source
323 address) are set to this value. 'chaddr' is filled in with the
324 client's hardware address.
326 If the client wishes to restrict booting to a particular server
327 name, it may place a null-terminated string in 'sname'. The name
328 used should be any of the allowable names or nicknames of the
331 The client has several options for filling the 'file' name field.
332 If left null, the meaning is 'I want to boot the default file for
333 my machine'. A null file name can also mean 'I am only interested
334 in finding out client/server/gateway IP addresses, I dont care
337 The field can also be a 'generic' name such as 'unix' or
341 Croft & Gilmore [Page 6]
345 RFC 951 September 1985
349 'gateway'; this means 'boot the named program configured for my
350 machine'. Finally the field can be a fully directory qualified
353 The 'vend' field can be filled in by the client with
354 vendor-specific strings or structures. For example the machine
355 hardware type or serial number may be placed here. However the
356 operation of the BOOTP server should not DEPEND on this
357 information existing.
359 If the 'vend' field is used, it is recommended that a 4 byte
360 'magic number' be the first item within 'vend'. This lets a
361 server determine what kind of information it is seeing in this
362 field. Numbers can be assigned by the usual 'magic number'
363 process --you pick one and it's magic. A different magic number
364 could be used for bootreply's than bootrequest's to allow the
365 client to take special action with the reply information.
369 7.2. Client Retransmission Strategy
371 If no reply is received for a certain length of time, the client
372 should retransmit the request. The time interval must be chosen
373 carefully so as not to flood the network. Consider the case of a
374 cable containing 100 machines that are just coming up after a
375 power failure. Simply retransmitting the request every four
376 seconds will inundate the net.
378 As a possible strategy, you might consider backing off
379 exponentially, similar to the way ethernet backs off on a
380 collision. So for example if the first packet is at time 0:00,
381 the second would be at :04, then :08, then :16, then :32, then
382 :64. You should also randomize each time; this would be done
383 similar to the ethernet specification by starting with a mask and
384 'and'ing that with with a random number to get the first backoff.
385 On each succeeding backoff, the mask is increased in length by one
386 bit. This doubles the average delay on each backoff.
388 After the 'average' backoff reaches about 60 seconds, it should be
389 increased no further, but still randomized.
391 Before each retransmission, the client should update the 'secs'
392 field. [UDP checksum.]
398 Croft & Gilmore [Page 7]
402 RFC 951 September 1985
406 7.3. Server Receives BOOTREQUEST
408 [UDP checksum.] If the UDP destination port does not match the
409 'BOOTP server' port, discard the packet.
411 If the server name field (sname) is null (no particular server
412 specified), or sname is specified and matches our name or
413 nickname, then continue with packet processing.
415 If the sname field is specified, but does not match 'us', then
416 there are several options:
418 1. You may choose to simply discard this packet.
420 2. If a name lookup on sname shows it to be on this same cable,
423 3. If sname is on a different net, you may choose to forward
424 the packet to that address. If so, check the 'giaddr' (gateway
425 address) field. If 'giaddr' is zero, fill it in with my
426 address or the address of a gateway that can be used to get to
427 that net. Then forward the packet.
429 If the client IP address (ciaddr) is zero, then the client does
430 not know its own IP address. Attempt to lookup the client
431 hardware address (chaddr, hlen, htype) in our database. If no
432 match is found, discard the packet. Otherwise we now have an IP
433 address for this client; fill it into the 'yiaddr' (your IP
436 We now check the boot file name field (file). The field will be
437 null if the client is not interested in filenames, or wants the
438 default bootfile. If the field is non-null, it is used as a
439 lookup key in a database, along with the client's IP address. If
440 there is a default file or generic file (possibly indexed by the
441 client address) or a fully-specified path name that matches, then
442 replace the 'file' field with the fully-specified path name of the
443 selected boot file. If the field is non-null and no match was
444 found, then the client is asking for a file we dont have; discard
445 the packet, perhaps some other BOOTP server will have it.
447 The 'vend' vendor-specific data field should now be checked and if
448 a recognized type of data is provided, client-specific actions
449 should be taken, and a response placed in the 'vend' data field of
450 the reply packet. For example, a workstation client could provide
455 Croft & Gilmore [Page 8]
459 RFC 951 September 1985
463 an authentication key and receive from the server a capability for
464 remote file access, or a set of configuration options, which can
465 be passed to the operating system that will shortly be booted in.
467 Place my (server) IP address in the 'siaddr' field. Set the 'op'
468 field to BOOTREPLY. The UDP destination port is set to 'BOOTP
469 client'. If the client address 'ciaddr' is nonzero, send the
470 packet there; else if the gateway address 'giaddr' is nonzero, set
471 the UDP destination port to 'BOOTP server' and send the packet to
472 'giaddr'; else the client is on one of our cables but it doesnt
473 know its own IP address yet --use a method described in the 'Egg'
474 section above to send it to the client. If 'Egg' is used and we
475 have multiple interfaces on this host, use the 'yiaddr' (your IP
476 address) field to figure out which net (cable/interface) to send
477 the packet to. [UDP checksum.]
479 7.4. Server/Gateway Receives BOOTREPLY
481 [UDP checksum.] If 'yiaddr' (your [the client's] IP address)
482 refers to one of our cables, use one of the 'Egg' methods above to
483 forward it to the client. Be sure to send it to the 'BOOTP
484 client' UDP destination port.
486 7.5. Client Reception
488 Don't forget to process ARP requests for my own IP address (if I
489 know it). [UDP checksum.] The client should discard incoming
490 packets that: are not IP/UDPs addressed to the boot port; are not
491 BOOTREPLYs; do not match my IP address (if I know it) or my
492 hardware address; do not match my transaction id. Otherwise we
493 have received a successful reply. 'yiaddr' will contain my IP
494 address, if I didnt know it before. 'file' is the name of the
495 file name to TFTP 'read request'. The server address is in
496 'siaddr'. If 'giaddr' (gateway address) is nonzero, then the
497 packets should be forwarded there first, in order to get to the
500 8. Booting Through Gateways
502 This part of the protocol is optional and requires some additional
503 code in cooperating gateways and servers, but it allows cross-gateway
504 booting. This is mainly useful when gateways are diskless machines.
505 Gateways containing disks (e.g. a UNIX machine acting as a gateway),
506 might as well run their own BOOTP/TFTP servers.
508 Gateways listening to broadcast BOOTREQUESTs may decide to forward or
509 rebroadcast these requests 'when appropriate'. For example, the
512 Croft & Gilmore [Page 9]
516 RFC 951 September 1985
520 gateway could have, as part of his configuration tables, a list of
521 other networks or hosts to receive a copy of any broadcast
522 BOOTREQUESTs. Even though a 'hops' field exists, it is a poor idea
523 to simply globally rebroadcast the requests, since broadcast loops
524 will almost certainly occur.
526 The forwarding could begin immediately, or wait until the 'secs'
527 (seconds client has been trying) field passes a certain threshold.
529 If a gateway does decide to forward the request, it should look at
530 the 'giaddr' (gateway IP address) field. If zero, it should plug its
531 own IP address (on the receiving cable) into this field. It may also
532 use the 'hops' field to optionally control how far the packet is
533 reforwarded. Hops should be incremented on each forwarding. For
534 example, if hops passes '3', the packet should probably be discarded.
537 Here we have recommended placing this special forwarding function in
538 the gateways. But that does not have to be the case. As long as
539 some 'BOOTP forwarding agent' exists on the net with the booting
540 client, the agent can do the forwarding when appropriate. Thus this
541 service may or may not be co-located with the gateway.
543 In the case of a forwarding agent not located in the gateway, the
544 agent could save himself some work by plugging the broadcast address
545 of the interface receiving the bootrequest into the 'giaddr' field.
546 Thus the reply would get forwarded using normal gateways, not
547 involving the forwarding agent. Of course the disadvantage here is
548 that you lose the ability to use the 'Egg' non-broadcast method of
549 sending the reply, causing extra overhead for every host on the
552 9. Sample BOOTP Server Database
554 As a suggestion, we show a sample text file database that the BOOTP
555 server program might use. The database has two sections, delimited
556 by a line containing an percent in column 1. The first section
557 contains a 'default directory' and mappings from generic names to
558 directory/pathnames. The first generic name in this section is the
559 'default file' you get when the bootrequest contains a null 'file'
562 The second section maps hardware addresstype/address into an
563 ipaddress. Optionally you can also overide the default generic name
564 by supplying a ipaddress specific genericname. A 'suffix' item is
565 also an option; if supplied, any generic names specified by the
566 client will be accessed by first appending 'suffix' to the 'pathname'
569 Croft & Gilmore [Page 10]
573 RFC 951 September 1985
577 appropriate to that generic name. If that file is not found, then
578 the plain 'pathname' will be tried. This 'suffix' option allows a
579 whole set of custom generics to be setup without a lot of effort.
580 Below is shown the general format; fields are delimited by one or
581 more spaces or tabs; trailing empty fields may be omitted; blank
582 lines and lines beginning with '#' are ignored.
587 genericname1 pathname1
588 genericname2 pathname2
591 % end of generic names, start of address mappings
593 hostname1 hardwaretype hardwareaddr1 ipaddr1 genericname suffix
594 hostname2 hardwaretype hardwareaddr2 ipaddr2 genericname suffix
597 Here is a specific example. Note the 'hardwaretype' number is the
598 same as that shown in the ARP section of the 'Assigned Numbers' RFC.
599 The 'hardwaretype' and 'ipaddr' numbers are in decimal;
600 'hardwareaddr' is in hex.
602 # last updated by smith
607 watch /usr/diag/etherwatch
610 % end of generic names, start of address mappings
612 hamilton 1 02.60.8c.06.34.98 36.19.0.5
613 burr 1 02.60.8c.34.11.78 36.44.0.12
614 101-gateway 1 02.60.8c.23.ab.35 36.44.0.32 gate 101
615 mjh-gateway 1 02.60.8c.12.32.bc 36.42.0.64 gate mjh
616 welch-tipa 1 02.60.8c.22.65.32 36.47.0.14 tip
617 welch-tipb 1 02.60.8c.12.15.c8 36.46.0.12 tip
619 In the example above, if 'mjh-gateway' does a default boot, it will
620 get the file '/usr/boot/gate.mjh'.
626 Croft & Gilmore [Page 11]
630 RFC 951 September 1985
636 Ross Finlayson (et. al.) produced two earlier RFC's discussing TFTP
637 bootstraping [2] using RARP [1].
639 We would also like to acknowledge the previous work and comments of
640 Noel Chiappa, Bob Lyon, Jeff Mogul, Mark Lewis, and David Plummer.
644 1. Ross Finlayson, Timothy Mann, Jeffrey Mogul, Marvin Theimer. A
645 Reverse Address Resolution Protocol. RFC 903, NIC, June, 1984.
647 2. Ross Finlayson. Bootstrap Loading using TFTP. RFC 906, NIC,
650 3. Mark Lottor. Simple File Transfer Protocol. RFC 913, NIC,
653 4. Jeffrey Mogul. Broadcasting Internet Packets. RFC 919, NIC,
656 5. David Plummer. An Ethernet Address Resolution Protocol. RFC
657 826, NIC, September, 1982.
659 6. Jon Postel. File Transfer Protocol. RFC 765, NIC, June, 1980.
661 7. Jon Postel. User Datagram Protocol. RFC 768, NIC, August, 1980.
663 8. Jon Postel. Internet Protocol. RFC 791, NIC, September, 1981.
665 9. K. R. Sollins, Noel Chiappa. The TFTP Protocol. RFC 783, NIC,
683 Croft & Gilmore [Page 12]