Re: Not understanding certificate failures
Thank you! No problem, just wanted to understand that. Go on alert when I see failures in the logs.
Before posting, please read how to report bug or request support effectively.
Bug reports without an attached log file are usually useless.
. 2023-10-04 10:39:07.031 Certificate verified against Windows certificate store
ftpes:// -rawsettings MinTLSVersion=12 MaxTLSVersion=13
< 2023-09-26 13:55:48.579 234 AUTH command ok. Expecting TLS Negotiation.
. 2023-09-26 13:55:48.579 No data to read
. 2023-09-26 13:55:48.594 TLS connect: SSLv3/TLS write client hello
. 2023-09-26 13:55:48.594 TLS connect: SSLv3/TLS read server hello
. 2023-09-26 13:55:48.594 TLS connect: SSLv3/TLS read server certificate
. 2023-09-26 13:55:48.594 TLS connect: SSLv3/TLS read server key exchange
. 2023-09-26 13:55:48.594 TLS connect: SSLv3/TLS read server done
. 2023-09-26 13:55:48.610 TLS connect: SSLv3/TLS write client key exchange
. 2023-09-26 13:55:48.610 TLS connect: SSLv3/TLS write change cipher spec
. 2023-09-26 13:55:48.610 TLS connect: SSLv3/TLS write finished
. 2023-09-26 13:55:48.610 TLS connect: SSLv3/TLS write finished
. 2023-09-26 13:55:48.610 TLS connect: SSLv3/TLS read change cipher spec
. 2023-09-26 13:55:48.610 TLS connect: SSLv3/TLS read finished
. 2023-09-26 13:55:48.610 Verifying certificate for "agency name" with fingerprint xxx and 20 failures
. 2023-09-26 13:55:48.610 Certificate for "agency name" matches cached fingerprint and failures
. 2023-09-26 13:55:48.610 Using TLSv1.2, cipher TLSv1.2: ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA, ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(256) Mac=AEAD
< 2023-09-26 13:55:48.610 Script: TLS connection established. Waiting for welcome message...
. 2023-09-26 13:55:48.610 TLS connection established. Waiting for welcome message...