gtpa2m2l | Application Programming |
The TPF system supports any TFTP client, such as AIX 3.1 and higher or DOS 5.0 and higher, that conforms to the Internet Activity Board (IAB) TFTP draft standard documented in Request for Comments (RFC) 1350.
However, the following differences are noted:
Overwriting of a file is controlled by its access permissions and is not done unless that file allows other write access permission.
If the TFTP configuration file does not contain an AUTH directive, the access permissions default to 444 octal, which allows owner, group, and other read access. See TPF Transmission Control Protocol/Internet Protocol for more information about the TFTP configuration file.
If the TFTP configuration file does not contain a LOG directive, transmissions are logged to the /tmp/tftp.log file. See TPF Transmission Control Protocol/Internet Protocol for more information about the TFTP configuration file.
The TFTP configuration file, /etc/tftp.conf, controls the behavior of the TFTP server for accessing files and the access permissions assigned to a file when it is stored. See TPF Transmission Control Protocol/Internet Protocol for more information about the TFTP configuration file.
The TFTP server does not perform any user validation. Carefully consider the file access rights allowed by read and write requests. The allow and deny directives that are specified in the TFTP configuration file are used to control file access. See TPF Transmission Control Protocol/Internet Protocol for more information about the TFTP configuration file.
All TPF file names specified by a TFTP client must be fully qualified path names that begin with a slash (/).
Use the tools for your system to create and maintain files of Web page content and transfer these files using the TFTP server to the TPF system where they can be accessed.
For more information about TFTP, see the following references.