Post a reply

Options
Add an Attachment

If you do not want to add an Attachment to your Post, please leave the Fields blank.

(maximum 10 MB; please compress large files; only common media, archive, text and programming file formats are allowed)

Options

Topic review

martin

Re: ftpes:// script fails randomly...

The ! should not be a problem, unless you pass it in batch file. But If you have verified in the log (with enabled password logging) that the correct password is passed, then it's not an issue.

The Read ... bytes just says how many bytes were received from the server. In above cases, the it refers to the length of the response (530 Not logged in. vs 230 User logged in, proceed).
jfish

Re: ftpes:// script fails randomly...

Hello Martin, I've opened a ticket with the vendor... I should have mentioned this before, but the password ends with an ! point. Now I'm worried that windows is mis-interpreting this at run time but we're using the straight code from "Generate".

What does READ NN Bytes really mean? Is this local or remote?
Failure
< 2023-02-23 16:00:03.755 331 User name okay, need password.
> 2023-02-23 16:00:03.755 PASS ************
. 2023-02-23 16:00:03.880 Read 20 bytes
< 2023-02-23 16:00:03.880 530 Not logged in.

Success
2023-02-22 16:00:03.326 331 User name okay, need password.
> 2023-02-22 16:00:03.326 PASS ************
. 2023-02-22 16:00:03.405 Read 29 bytes
< 2023-02-22 16:00:03.405 230 User logged in, proceed
jfish

Re: ftpes:// script fails randomly...

Thank you Martin! We did confirm the password with loglevel. Will follow up with the server side folks.
martin

Re: ftpes:// script fails randomly...

That indeed looks like server-side problem. Maybe the server has some connection limits.
You can enable password logging (/loglevel=*) to verify that you are sending the correct password in all cases. But if the password hard coded in the script, it's not even worth it.
jfish

ftpes:// script fails randomly...

Good Day Gurus, I have an odd situation where a script has been randomly failing since 09/2022. While I don't think it is related, this connection requires a Cert File and Passphrase. I believe there may be a problem on the target server side, but I don't know how to prove it... Any suggestions or insight to let the vendor know that they have a problem on their side would be greatly appreciated. I've turned on logging... below is the success and failure... is there additional logging I can get? thanks in advance -John

When it works from the log...
< 2023-01-28 10:01:01.374 220 Welcome to Axway Gateway FTP server
> 2023-01-28 10:01:01.374 AUTH TLS
< 2023-01-28 10:01:01.413 234 Security data exchange complete.
. 2023-01-28 10:01:01.538 Server asks for authentication with a client certificate.
. 2023-01-28 10:01:01.665 Using TLSv1.2, cipher TLSv1.2: ...
< 2023-01-28 10:01:01.665 Script: TLS connection established. Waiting for welcome message...
. 2023-01-28 10:01:01.665 TLS connection established. Waiting for welcome message...
> 2023-01-28 10:01:01.665 USER XXXXXXXXXXXXXXXXXXXXXXXXXX
< 2023-01-28 10:01:01.728 331 User name okay, need password.
> 2023-01-28 10:01:01.728 PASS ************
< 2023-01-28 10:01:01.817 230 User logged in, proceed
> 2023-01-28 10:01:01.817 SYST
< 2023-01-28 10:01:01.864 215 UNIX XFB/Gateway
> 2023-01-28 10:01:01.864 FEAT

When it fails...
< 2023-01-29 10:01:01.408 220 Welcome to Axway Gateway FTP server
> 2023-01-29 10:01:01.408 AUTH TLS
< 2023-01-29 10:01:01.454 234 Security data exchange complete.
. 2023-01-29 10:01:01.603 Server asks for authentication with a client certificate.
. 2023-01-29 10:01:01.761 Using TLSv1.2, cipher TLSv1.2: ...
< 2023-01-29 10:01:01.761 Script: TLS connection established. Waiting for welcome message...
. 2023-01-29 10:01:01.761 TLS connection established. Waiting for welcome message...
> 2023-01-29 10:01:01.761 USER XXXXXXXXXXXXXXXXXXXXXXXXXX
< 2023-01-29 10:01:01.815 331 User name okay, need password.
> 2023-01-29 10:01:01.815 PASS ************
< 2023-01-29 10:01:01.903 530 Not logged in.
. 2023-01-29 10:01:01.903 Connection failed.
< 2023-01-29 10:01:01.903 Script: Access denied.