~/Source/curl/Build/src/curl -vk -T FrogFind\!.htm --ssl ftp://billwood.ca/XaraTest/FrogFind.html -p -u USER:PASS --trace-config ids,time,ssl Warning: --ssl is an insecure option, consider --ssl-reqd instead % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 011:42:36.951102 [0-0] * Host billwood.ca:21 was resolved. 11:42:36.951214 [0-0] * IPv6: (none) 11:42:36.951281 [0-0] * IPv4: 69.27.102.4 11:42:36.951369 [0-0] * Trying 69.27.102.4:21... 11:42:37.064641 [0-0] * Connected to billwood.ca (69.27.102.4) port 21 11:42:37.180140 [0-0] < 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 11:42:37.180257 [0-0] < 220-You are user number 1 of 50 allowed. 11:42:37.180357 [0-0] < 220-Local time is now 04:42. Server port: 21. 11:42:37.180466 [0-0] < 220-This is a private system - No anonymous login 11:42:37.180579 [0-0] < 220-IPv6 connections are also welcome on this server. 11:42:37.180658 [0-0] < 220 You will be disconnected after 15 minutes of inactivity. 11:42:37.180729 [0-0] > AUTH SSL 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 011:42:37.293676 [0-0] < 500 This security scheme is not implemented 11:42:37.293809 [0-0] > AUTH TLS 11:42:37.406288 [0-0] < 234 AUTH TLS OK. 11:42:37.406387 [0-0] * [SSL] added 11:42:37.406452 [0-0] * [SSL] cf_connect() 11:42:37.408050 [0-0] } [5 bytes data] 11:42:37.408169 [0-0] * TLSv1.3 (OUT), TLS handshake, Client hello (1): 11:42:37.408226 [0-0] } [512 bytes data] 11:42:37.408361 [0-0] * [SSL] ossl_bio_cf_out_write(len=517) -> 517, err=0 11:42:37.408455 [0-0] * [SSL] ossl_bio_cf_in_read(len=5) -> -1, err=81 11:42:37.408535 [0-0] * [SSL] populate_x509_store, path=/etc/ssl/certs/ca-certificates.crt, blob=0 11:42:37.522503 [0-0] * [SSL] ossl_bio_cf_in_read(len=5) -> 5, err=0 11:42:37.522604 [0-0] { [5 bytes data] 11:42:37.522714 [0-0] * [SSL] ossl_bio_cf_in_read(len=88) -> 88, err=0 11:42:37.522787 [0-0] * TLSv1.3 (IN), TLS handshake, Server hello (2): 11:42:37.522909 [0-0] { [88 bytes data] 11:42:37.523078 [0-0] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): 11:42:37.523170 [0-0] } [1 bytes data] 11:42:37.523600 [0-0] * TLSv1.3 (OUT), TLS handshake, Client hello (1): 11:42:37.523682 [0-0] } [512 bytes data] 11:42:37.523820 [0-0] * [SSL] ossl_bio_cf_out_write(len=523) -> 523, err=0 11:42:37.523897 [0-0] * [SSL] ossl_bio_cf_in_read(len=5) -> 5, err=0 11:42:37.523954 [0-0] { [5 bytes data] 11:42:37.524093 [0-0] * [SSL] ossl_bio_cf_in_read(len=1) -> 1, err=0 11:42:37.524156 [0-0] * [SSL] ossl_bio_cf_in_read(len=5) -> -1, err=81 11:42:37.643710 [0-0] * [SSL] ossl_bio_cf_in_read(len=5) -> 5, err=0 11:42:37.643819 [0-0] { [5 bytes data] 11:42:37.643967 [0-0] * [SSL] ossl_bio_cf_in_read(len=155) -> 155, err=0 11:42:37.644084 [0-0] * TLSv1.3 (IN), TLS handshake, Server hello (2): 11:42:37.644234 [0-0] { [155 bytes data] 11:42:37.644723 [0-0] * [SSL] ossl_bio_cf_in_read(len=5) -> 5, err=0 11:42:37.644794 [0-0] { [5 bytes data] 11:42:37.644905 [0-0] * [SSL] ossl_bio_cf_in_read(len=27) -> 27, err=0 11:42:37.645015 [0-0] { [1 bytes data] 11:42:37.645162 [0-0] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): 11:42:37.645208 [0-0] { [10 bytes data] 11:42:37.645326 [0-0] * [SSL] ossl_bio_cf_in_read(len=5) -> 5, err=0 11:42:37.645442 [0-0] { [5 bytes data] 11:42:37.645616 [0-0] * [SSL] ossl_bio_cf_in_read(len=2610) -> 2610, err=0 11:42:37.645733 [0-0] { [1 bytes data] 11:42:37.645860 [0-0] * TLSv1.3 (IN), TLS handshake, Certificate (11): 11:42:37.646004 [0-0] { [2593 bytes data] 11:42:37.646508 [0-0] * [SSL] ossl_bio_cf_in_read(len=5) -> 5, err=0 11:42:37.646588 [0-0] { [5 bytes data] 11:42:37.646752 [0-0] * [SSL] ossl_bio_cf_in_read(len=281) -> 281, err=0 11:42:37.646834 [0-0] { [1 bytes data] 11:42:37.646964 [0-0] * TLSv1.3 (IN), TLS handshake, CERT verify (15): 11:42:37.647062 [0-0] { [264 bytes data] 11:42:37.647216 [0-0] * [SSL] ossl_bio_cf_in_read(len=5) -> 5, err=0 11:42:37.647290 [0-0] { [5 bytes data] 11:42:37.647399 [0-0] * [SSL] ossl_bio_cf_in_read(len=69) -> 69, err=0 11:42:37.647507 [0-0] { [1 bytes data] 11:42:37.647645 [0-0] * TLSv1.3 (IN), TLS handshake, Finished (20): 11:42:37.647724 [0-0] { [52 bytes data] 11:42:37.647894 [0-0] * TLSv1.3 (OUT), TLS handshake, Finished (20): 11:42:37.647944 [0-0] } [52 bytes data] 11:42:37.648082 [0-0] * [SSL] ossl_bio_cf_out_write(len=74) -> 74, err=0 11:42:37.648190 [0-0] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 / secp256r1 / RSASSA-PSS 11:42:37.648268 [0-0] * Server certificate: 11:42:37.648340 [0-0] * subject: CN=cp1024.blacksun.ca 11:42:37.648416 [0-0] * start date: Mar 16 15:38:17 2024 GMT 11:42:37.648487 [0-0] * expire date: Jun 14 15:38:16 2024 GMT 11:42:37.648575 [0-0] * issuer: C=US; O=Let's Encrypt; CN=R3 11:42:37.648693 [0-0] * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. 11:42:37.648817 [0-0] * Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption 11:42:37.648894 [0-0] * Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption 11:42:37.648964 [0-0] * [SSL] cf_connect() -> 0, done=1 11:42:37.649043 [0-0] } [5 bytes data] 11:42:37.649176 [0-0] * [SSL] ossl_bio_cf_out_write(len=34) -> 34, err=0 11:42:37.649271 [0-0] > USER USER 11:42:37.761237 [0-0] * [SSL] ossl_bio_cf_in_read(len=5) -> 5, err=0 11:42:37.761347 [0-0] { [5 bytes data] 11:42:37.761437 [0-0] * [SSL] ossl_bio_cf_in_read(len=266) -> 266, err=0 11:42:37.761579 [0-0] { [1 bytes data] 11:42:37.761745 [0-0] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): 11:42:37.761815 [0-0] { [249 bytes data] 11:42:37.761981 [0-0] * [SSL] Added Session ID to cache for ftp://billwood.ca:21 [server] 11:42:37.762065 [0-0] * [SSL] ossl_bio_cf_in_read(len=5) -> 5, err=0 11:42:37.762131 [0-0] { [5 bytes data] 11:42:37.762302 [0-0] * [SSL] ossl_bio_cf_in_read(len=266) -> 266, err=0 11:42:37.762403 [0-0] { [1 bytes data] 11:42:37.762530 [0-0] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): 11:42:37.762599 [0-0] { [249 bytes data] 11:42:37.762734 [0-0] * old SSL session ID is stale, removing 11:42:37.762803 [0-0] * [SSL] Added Session ID to cache for ftp://billwood.ca:21 [server] 11:42:37.762886 [0-0] * [SSL] ossl_bio_cf_in_read(len=5) -> 5, err=0 11:42:37.763012 [0-0] { [5 bytes data] 11:42:37.763169 [0-0] * [SSL] ossl_bio_cf_in_read(len=55) -> 55, err=0 11:42:37.763246 [0-0] { [1 bytes data] 11:42:37.763360 [0-0] * [SSL] cf_recv(len=900) -> 38, 0 11:42:37.763427 [0-0] < 331 User USER OK. Password required 11:42:37.763558 [0-0] } [5 bytes data] 11:42:37.763681 [0-0] * [SSL] ossl_bio_cf_out_write(len=39) -> 39, err=0 11:42:37.763778 [0-0] > PASS PASS 11:42:37.909491 [0-0] * [SSL] ossl_bio_cf_in_read(len=5) -> 5, err=0 11:42:37.909596 [0-0] { [5 bytes data] 11:42:37.909815 [0-0] * [SSL] ossl_bio_cf_in_read(len=60) -> 60, err=0 11:42:37.909930 [0-0] { [1 bytes data] 11:42:37.910084 [0-0] * [SSL] cf_recv(len=900) -> 43, 0 11:42:37.910199 [0-0] < 230 OK. Current restricted directory is / 11:42:37.910296 [0-0] } [5 bytes data] 11:42:37.910447 [0-0] * [SSL] ossl_bio_cf_out_write(len=30) -> 30, err=0 11:42:37.910519 [0-0] > PBSZ 0 11:42:38.023667 [0-0] * [SSL] ossl_bio_cf_in_read(len=5) -> 5, err=0 11:42:38.023757 [0-0] { [5 bytes data] 11:42:38.023867 [0-0] * [SSL] ossl_bio_cf_in_read(len=29) -> 29, err=0 11:42:38.023975 [0-0] { [1 bytes data] 11:42:38.024093 [0-0] * [SSL] cf_recv(len=900) -> 12, 0 11:42:38.024145 [0-0] < 200 PBSZ=0 11:42:38.024218 [0-0] } [5 bytes data] 11:42:38.024352 [0-0] * [SSL] ossl_bio_cf_out_write(len=30) -> 30, err=0 11:42:38.024476 [0-0] > PROT P 11:42:38.137103 [0-0] * [SSL] ossl_bio_cf_in_read(len=5) -> 5, err=0 11:42:38.137194 [0-0] { [5 bytes data] 11:42:38.137266 [0-0] * [SSL] ossl_bio_cf_in_read(len=61) -> 61, err=0 11:42:38.137349 [0-0] { [1 bytes data] 11:42:38.137500 [0-0] * [SSL] cf_recv(len=900) -> 44, 0 11:42:38.137568 [0-0] < 200 Data protection level set to "private" 11:42:38.137651 [0-0] } [5 bytes data] 11:42:38.137814 [0-0] * [SSL] ossl_bio_cf_out_write(len=27) -> 27, err=0 11:42:38.137886 [0-0] > PWD 11:42:38.251168 [0-0] * [SSL] ossl_bio_cf_in_read(len=5) -> 5, err=0 11:42:38.251279 [0-0] { [5 bytes data] 11:42:38.251416 [0-0] * [SSL] ossl_bio_cf_in_read(len=51) -> 51, err=0 11:42:38.251499 [0-0] { [1 bytes data] 11:42:38.251672 [0-0] * [SSL] cf_recv(len=900) -> 34, 0 11:42:38.251759 [0-0] < 257 "/" is your current location 11:42:38.251853 [0-0] * Entry path is '/' 0 0 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 011:42:38.252101 [0-0] } [5 bytes data] 11:42:38.252236 [0-0] * [SSL] ossl_bio_cf_out_write(len=36) -> 36, err=0 11:42:38.252303 [0-0] > CWD XaraTest 11:42:38.364805 [0-0] * [SSL] ossl_bio_cf_in_read(len=5) -> 5, err=0 11:42:38.364922 [0-0] { [5 bytes data] 11:42:38.365063 [0-0] * [SSL] ossl_bio_cf_in_read(len=57) -> 57, err=0 11:42:38.365188 [0-0] { [1 bytes data] 11:42:38.365356 [0-0] * [SSL] cf_recv(len=900) -> 40, 0 11:42:38.365479 [0-0] < 250 OK. Current directory is /XaraTest 11:42:38.365594 [0-0] } [5 bytes data] 11:42:38.365840 [0-0] * [SSL] ossl_bio_cf_out_write(len=28) -> 28, err=0 11:42:38.365911 [0-0] > EPSV 11:42:38.365974 [0-0] * Connect data stream passively 11:42:38.478850 [0-0] * [SSL] ossl_bio_cf_in_read(len=5) -> 5, err=0 11:42:38.478952 [0-0] { [5 bytes data] 11:42:38.479085 [0-0] * [SSL] ossl_bio_cf_in_read(len=59) -> 59, err=0 11:42:38.479187 [0-0] { [1 bytes data] 11:42:38.479359 [0-0] * [SSL] cf_recv(len=900) -> 42, 0 11:42:38.479483 [0-0] < 229 Extended Passive mode OK (|||34991|) 11:42:38.479623 [0-0] * Connecting to 69.27.102.4 (69.27.102.4) port 34991 11:42:38.479729 [0-0] * Trying 69.27.102.4:34991... 11:42:38.592615 [0-0] * Connected 2nd connection to 69.27.102.4 port 34991 11:42:38.592698 [0-0] * [SSL-1] cf_connect() 11:42:38.593070 [0-0] * SSL reusing session ID 11:42:38.593334 [0-0] } [5 bytes data] 11:42:38.593434 [0-0] * TLSv1.3 (OUT), TLS handshake, Client hello (1): 11:42:38.593493 [0-0] } [610 bytes data] 11:42:38.593632 [0-0] * [SSL-1] ossl_bio_cf_out_write(len=615) -> 615, err=0 11:42:38.593708 [0-0] * [SSL-1] ossl_bio_cf_in_read(len=5) -> -1, err=81 11:42:38.593779 [0-0] * [SSL-1] populate_x509_store, path=/etc/ssl/certs/ca-certificates.crt, blob=0 11:42:38.593854 [0-0] * [SSL-1] cf_connect() -> 0, done=0 11:42:38.593931 [0-0] } [5 bytes data] 11:42:38.594076 [0-0] * [SSL] ossl_bio_cf_out_write(len=30) -> 30, err=0 11:42:38.594144 [0-0] > TYPE I 11:42:38.594240 [0-0] * [SSL-1] adjust_pollset, POLLIN fd=7 11:42:38.706183 [0-0] * [SSL-1] cf_connect() 11:42:38.706315 [0-0] * [SSL-1] ossl_bio_cf_in_read(len=5) -> -1, err=81 11:42:38.706400 [0-0] * [SSL-1] cf_connect() -> 0, done=0 11:42:38.706506 [0-0] * [SSL] ossl_bio_cf_in_read(len=5) -> 5, err=0 11:42:38.706606 [0-0] { [5 bytes data] 11:42:38.706735 [0-0] * [SSL] ossl_bio_cf_in_read(len=47) -> 47, err=0 11:42:38.706837 [0-0] { [1 bytes data] 11:42:38.706936 [0-0] * [SSL] cf_recv(len=900) -> 30, 0 11:42:38.707051 [0-0] < 200 TYPE is now 8-bit binary 11:42:38.707094 [0-0] } [5 bytes data] 11:42:38.707234 [0-0] * [SSL] ossl_bio_cf_out_write(len=42) -> 42, err=0 11:42:38.707305 [0-0] > STOR FrogFind.html 11:42:38.707409 [0-0] * [SSL-1] adjust_pollset, POLLIN fd=7 11:42:38.819454 [0-0] * [SSL-1] cf_connect() 11:42:38.819592 [0-0] * [SSL-1] ossl_bio_cf_in_read(len=5) -> -1, err=81 11:42:38.819660 [0-0] * [SSL-1] cf_connect() -> 0, done=0 11:42:38.819745 [0-0] * [SSL] ossl_bio_cf_in_read(len=5) -> 5, err=0 11:42:38.819793 [0-0] { [5 bytes data] 11:42:38.819953 [0-0] * [SSL] ossl_bio_cf_in_read(len=47) -> 47, err=0 11:42:38.820081 [0-0] { [1 bytes data] 11:42:38.820312 [0-0] * [SSL] cf_recv(len=900) -> 30, 0 11:42:38.820435 [0-0] < 150 Accepted data connection 11:42:38.820552 [0-0] * [SSL-1] cf_connect() 11:42:38.820683 [0-0] * [SSL-1] ossl_bio_cf_in_read(len=5) -> 5, err=0 11:42:38.820761 [0-0] { [5 bytes data] 11:42:38.820916 [0-0] * [SSL-1] ossl_bio_cf_in_read(len=88) -> 88, err=0 11:42:38.820991 [0-0] * TLSv1.3 (IN), TLS handshake, Server hello (2): 11:42:38.821088 [0-0] { [88 bytes data] 11:42:38.821270 [0-0] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): 11:42:38.821340 [0-0] } [1 bytes data] 11:42:38.821685 [0-0] * TLSv1.3 (OUT), TLS handshake, Client hello (1): 11:42:38.821762 [0-0] } [643 bytes data] 11:42:38.821906 [0-0] * [SSL-1] ossl_bio_cf_out_write(len=654) -> 654, err=0 11:42:38.821985 [0-0] * [SSL-1] ossl_bio_cf_in_read(len=5) -> 5, err=0 11:42:38.822051 [0-0] { [5 bytes data] 11:42:38.822182 [0-0] * [SSL-1] ossl_bio_cf_in_read(len=1) -> 1, err=0 11:42:38.822245 [0-0] * [SSL-1] ossl_bio_cf_in_read(len=5) -> -1, err=81 11:42:38.935112 [0-0] * [SSL-1] ossl_bio_cf_in_read(len=5) -> 5, err=0 11:42:38.935204 [0-0] { [5 bytes data] 11:42:38.935283 [0-0] * [SSL-1] ossl_bio_cf_in_read(len=161) -> 161, err=0 11:42:38.935415 [0-0] * TLSv1.3 (IN), TLS handshake, Server hello (2): 11:42:38.935499 [0-0] { [161 bytes data] 11:42:38.935874 [0-0] * [SSL-1] ossl_bio_cf_in_read(len=5) -> 5, err=0 11:42:38.935947 [0-0] { [5 bytes data] 11:42:38.936071 [0-0] * [SSL-1] ossl_bio_cf_in_read(len=23) -> 23, err=0 11:42:38.936160 [0-0] { [1 bytes data] 11:42:38.936263 [0-0] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): 11:42:38.936358 [0-0] { [6 bytes data] 11:42:38.936492 [0-0] * [SSL-1] ossl_bio_cf_in_read(len=5) -> 5, err=0 11:42:38.936563 [0-0] { [5 bytes data] 11:42:38.936687 [0-0] * [SSL-1] ossl_bio_cf_in_read(len=69) -> 69, err=0 11:42:38.936749 [0-0] { [1 bytes data] 11:42:38.936873 [0-0] * TLSv1.3 (IN), TLS handshake, Finished (20): 11:42:38.936969 [0-0] { [52 bytes data] 11:42:38.937182 [0-0] * TLSv1.3 (OUT), TLS handshake, Finished (20): 11:42:38.937257 [0-0] } [52 bytes data] 11:42:38.937424 [0-0] * [SSL-1] ossl_bio_cf_out_write(len=74) -> 74, err=0 11:42:38.937552 [0-0] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 / secp256r1 / UNDEF 11:42:38.937624 [0-0] * Server certificate: 11:42:38.937720 [0-0] * subject: CN=cp1024.blacksun.ca 11:42:38.937780 [0-0] * start date: Mar 16 15:38:17 2024 GMT 11:42:38.937884 [0-0] * expire date: Jun 14 15:38:16 2024 GMT 11:42:38.937994 [0-0] * issuer: C=US; O=Let's Encrypt; CN=R3 11:42:38.938094 [0-0] * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. 11:42:38.938189 [0-0] * Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption 11:42:38.938283 [0-0] * Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption 11:42:38.938359 [0-0] * [SSL-1] cf_connect() -> 0, done=1 11:42:38.938823 [0-0] } [5 bytes data] 11:42:38.938933 [0-0] * [SSL-1] ossl_bio_cf_out_write(len=1431) -> 1431, err=0 11:42:38.939003 [0-0] } [1409 bytes data] 11:42:38.939096 [0-0] * upload completely sent off: 1409 bytes 11:42:38.939179 [0-0] * Remembering we are in dir "XaraTest/" 11:42:38.939276 [0-0] * [SSL-1] ossl_bio_cf_in_read(len=5) -> -1, err=81 11:42:38.939389 [0-0] } [5 bytes data] 11:42:38.939513 [0-0] * [SSL-1] ossl_bio_cf_out_write(len=24) -> 24, err=0 11:42:38.939588 [0-0] * TLSv1.3 (OUT), TLS alert, close notify (256): 11:42:38.939719 [0-0] } [2 bytes data] 11:42:38.939838 [0-0] * [SSL-1] ossl_bio_cf_in_read(len=5) -> -1, err=81 11:42:38.939974 [0-0] * [SSL-1] SSL shutdown sent 11:42:38.940156 [0-0] * [SSL] ossl_bio_cf_in_read(len=5) -> -1, err=81 11:42:38.940206 [0-0] * [SSL] cf_recv(len=900) -> -1, 81 11:42:39.052246 [0-0] * [SSL] ossl_bio_cf_in_read(len=5) -> 5, err=0 11:42:39.052405 [0-0] { [5 bytes data] 11:42:39.052567 [0-0] * [SSL] ossl_bio_cf_in_read(len=52) -> 52, err=0 11:42:39.052689 [0-0] { [1 bytes data] 11:42:39.052809 [0-0] * [SSL] cf_recv(len=900) -> 35, 0 11:42:39.052920 [0-0] < 226-File successfully transferred 11:42:39.053004 [0-0] * [SSL] ossl_bio_cf_in_read(len=5) -> 5, err=0 11:42:39.053118 [0-0] { [5 bytes data] 11:42:39.053296 [0-0] * [SSL] ossl_bio_cf_in_read(len=76) -> 76, err=0 11:42:39.053376 [0-0] { [1 bytes data] 11:42:39.053508 [0-0] * [SSL] cf_recv(len=900) -> 59, 0 11:42:39.053575 [0-0] < 226 0.001 seconds (measured here), 0.99 Mbytes per second 100 1409 0 0 100 1409 0 668 0:00:02 0:00:02 --:--:-- 669 11:42:39.054028 [0-0] * Connection #0 to host billwood.ca left intact