Hi.
Yes I did generate the certificate and tested using filezilla client. It
worked from filezilla client though.
I updated apache's secure code..
meaning commented:
//this.sendCommand("PBSZ", pbsz);
//this.sendCommand("PROT", prot);
It got connected but not the login now..
220-FileZilla Server version 0.9.18 beta
220-written by Tim Kosse ([EMAIL PROTECTED])
220 Please visit http://sourceforge.net/projects/filezilla/
AUTH SSL
234 Using authentication type SSL
******1
******2
******3
******4
******5
*** Connected ************
Is Connected:true
USER test
Exception in thread "main"
org.apache.commons.net.ftp.FTPConnectionClosedException: Connection closed
without indication.
at org.apache.commons.net.ftp.FTP.__getReply(FTP.java:267)
at org.apache.commons.net.ftp.FTP.sendCommand(FTP.java:460)
at org.apache.commons.net.ftp.FTP.sendCommand(FTP.java:520)
at org.apache.commons.net.ftp.FTP.user(FTP.java:670)
at org.apache.commons.net.ftp.FTPClient.login(FTPClient.java:637)
at TestFTPS.main(TestFTPS.java:31)
FTPSClient client = new FTPSClient("JKS","SSL","password","0","P");
//FTPSClient client = new FTPSClient();
//client.setReaderThread(false);
client.addProtocolCommandListener(new PrintCommandListener(new
PrintWriter(System.out)));
client.connect("127.0.0.1");
System.out.println("*** Connected ************");
System.out.println("Is Connected:" + client.isConnected());
client.login("test", "test");
System.out.println("Is Connected:" + client.isConnected());
System.out.println("*** Passed Login ****");
Appreciate any advise.
regards,
Rory Winston wrote:
>
> I've tried this with Filezilla server, and it worked fine for me. Some
> initial issues I had:
>
> 1. Home dirs not being set up correctly (Filezilla will complain about
> this)
> 2. Have you generated the server certificate yourself?
>
> M wrote:
>> Hi.
>> Thanks for your reply. I did try that but still dont see anything more
>> that
>> would be helpful. I see an entry in the filezilla server but says not
>> logged in.
>>
>> FTPSClient client = new FTPSClient();
>> //client.setReaderThread(false);
>> client.addProtocolCommandListener(new PrintCommandListener(new
>> PrintWriter(System.out)));
>> client.connect("127.0.0.1", 990);
>>
>> regards,
>>
>>
>> Rory Winston wrote:
>>
>>> Can you attach a PrintCommandListener to the client, so you can see the
>>> commands being passed over the wire?
>>>
>>> FTPSClient client = new FTPSClient( ... );
>>> client.addProtocolCommandListener(new PrintCommandListener(new
>>> PrintWriter(System.out)));
>>>
>>> Then you can see what is actually happening.
>>>
>>> Cheers
>>> Rory
>>>
>>>
>>>
>>> M wrote:
>>>
>>>> Hi Rory.
>>>>
>>>> I tried the apache Jakarta FTPSClient to connect to filezilla ftps
>>>> listening
>>>> on port 990.
>>>>
>>>> When I use ftps.connect("localhost", 990); it does not get connected.
>>>>
>>>> FTPSClient client = new FTPSClient("JKS","SSL","password","0","P");
>>>> System.out.println("*****");
>>>>
>>>> client.connect("127.0.0.1",990);
>>>> System.out.println("*****");
>>>> client.getStatus();
>>>> System.out.println("*****");
>>>>
>>>>
>>>> Appreciate any tips. Thanks.
>>>>
>>>> Here's the code I downloaded from Apache Jakarta:
>>>>
>>>> /*
>>>> * Copyright 2001-2005 The Apache Software Foundation
>>>> *
>>>> * Licensed under the Apache License, Version 2.0 (the "License");
>>>> * you may not use this file except in compliance with the License.
>>>> * You may obtain a copy of the License at
>>>> *
>>>> * http://www.apache.org/licenses/LICENSE-2.0
>>>> *
>>>> * Unless required by applicable law or agreed to in writing, software
>>>> * distributed under the License is distributed on an "AS IS" BASIS,
>>>> * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
>>>> implied.
>>>> * See the License for the specific language governing permissions and
>>>> * limitations under the License.
>>>> */
>>>>
>>>>
>>>> import java.io.BufferedReader;
>>>> import java.io.BufferedWriter;
>>>> import java.io.IOException;
>>>> import java.io.InputStreamReader;
>>>> import java.io.OutputStreamWriter;
>>>> import java.net.InetAddress;
>>>> import java.net.Socket;
>>>> import java.net.SocketException;
>>>> import java.security.KeyStore;
>>>>
>>>> import javax.net.ssl.KeyManagerFactory;
>>>> import javax.net.ssl.SSLContext;
>>>> import javax.net.ssl.SSLSocket;
>>>> import javax.net.ssl.TrustManager;
>>>>
>>>> import org.apache.commons.net.SocketFactory;
>>>> import org.apache.commons.net.ftp.FTPClient;
>>>>
>>>>
>>>>
>>>> /**
>>>> *
>>>> * This class extends [EMAIL PROTECTED]
>>>> org.apache.commons.net.ftp.FTPClient} to
>>>> add
>>>> * the necessary methods that implement SSL/TLS-FTPS.
>>>> *
>>>> */
>>>> public class FTPSClient extends FTPClient {
>>>>
>>>> // Represent the method to the FTP command AUTH...
>>>> private String sslContext;
>>>>
>>>> // Secure context (can be "TLS" or "SSL")
>>>> private SSLContext context;
>>>>
>>>> private String pbsz;
>>>> private String prot;
>>>>
>>>> private BufferedReader _controlInput_;
>>>>
>>>> private BufferedWriter _controlOutput_;
>>>>
>>>>
>>>> /**
>>>> * Default constructor that selects some default options (TLS
>>>> encryption)
>>>> *
>>>> */
>>>> public FTPSClient() {
>>>> this("JCEKS", "TLS", "password", "0", "P");
>>>> }
>>>>
>>>>
>>>> /**
>>>> *
>>>> * Constructor that initializes the secure connection.
>>>> *
>>>> * @param keyStoreName Type of instance KeyStore, JKS for Java 1.3 y
>>>> JCEKS
>>>> for Java 1.4
>>>> * @param sslContext Type of the instance SSLContext, can be SSL or
>>>> TLS.
>>>> * @param password The password to access the KeyStore.
>>>> * @param pbsz Protection buffer size (Use 0 to indicate streaming)
>>>> * @param prot The protection level for the data channel
>>>> */
>>>> public FTPSClient(String keyStoreName, String sslContext, String
>>>> password,
>>>> String pbsz, String prot) {
>>>> this.sslContext = sslContext;
>>>> this.pbsz = pbsz;
>>>> this.prot = prot;
>>>>
>>>> try {
>>>> KeyStore keyStore = KeyStore.getInstance(keyStoreName);
>>>>
>>>> keyStore.load(null, password.toCharArray());
>>>>
>>>> KeyManagerFactory keyManagerFactory =
>>>> KeyManagerFactory.getInstance(KeyManagerFactory.getDefaultAlgorithm());
>>>>
>>>> keyManagerFactory.init(keyStore,
>>>> password.toCharArray());
>>>>
>>>> this.context = SSLContext.getInstance(sslContext);
>>>>
>>>> this.context.init(
>>>> keyManagerFactory.getKeyManagers(),
>>>> new TrustManager[] { (TrustManager) new
>>>> FTPSTrustManager() }, null
>>>> );
>>>> } catch (Exception e) {
>>>> e.printStackTrace();
>>>> }
>>>> }
>>>>
>>>> /**
>>>> * @see
>>>> org.apache.commons.net.SocketClient#connect(java.net.InetAddress,
>>>> int, java.net.InetAddress, int)
>>>> */
>>>> public void connect(InetAddress address, int port, InetAddress
>>>> localAddress, int localPort) throws SocketException, IOException
>>>> {
>>>> System.out.println("***** In 1 ********");
>>>> super.connect(address, port, localAddress, localPort);
>>>>
>>>> this.secure(this.pbsz,this.prot);
>>>> }
>>>>
>>>> /**
>>>> * @see
>>>> org.apache.commons.net.SocketClient#connect(java.net.InetAddress,
>>>> int)
>>>> */
>>>> public void connect(InetAddress address, int port) throws
>>>> SocketException,
>>>> IOException
>>>> {
>>>> System.out.println("***** In 2 ********");
>>>> super.connect(address, port);
>>>>
>>>> this.secure(this.pbsz,this.prot);
>>>> }
>>>>
>>>> /**
>>>> * @see org.apache.commons.net.SocketClient#connect(java.lang.String,
>>>> int,
>>>> java.net.InetAddress, int)
>>>> */
>>>> public void connect(String address, int port, InetAddress
>>>> localAddress,
>>>> int
>>>> localPort) throws SocketException, IOException
>>>> {
>>>> System.out.println("***** In 3 ********");
>>>> super.connect(address, port, localAddress, localPort);
>>>>
>>>> this.secure(this.pbsz,this.prot);
>>>> }
>>>>
>>>> /**
>>>> * @see org.apache.commons.net.SocketClient#connect(java.lang.String,
>>>> int)
>>>> */
>>>> public void connect(String address, int port) throws SocketException,
>>>> IOException
>>>> {
>>>> System.out.println("FTPSClient***** In 4 ********");
>>>> System.out.println("Address=" + address);
>>>> System.out.println("Port=" + port);
>>>> super.connect(address, port);
>>>>
>>>> this.secure(this.pbsz,this.prot);
>>>> }
>>>>
>>>> /**
>>>> *
>>>> * Initialize the secure connection with the FTP server, throw the
>>>> AUTH
>>>> SSL
>>>> o TLS command.
>>>> * Get the socket with the server, starting the "handshake" making the
>>>> socket, with a layer of securety,
>>>> * and initializing the stream of connection.
>>>> *
>>>> *
>>>> * @param pbsz Protection Buffer Size: "0" is a good value
>>>> * @param prot Data Channel Protection Level:
>>>> * Posible values:
>>>> * C - Clear
>>>> * S - Safe
>>>> * E - Confidential
>>>> * P - PrivateType of secure connection
>>>> *
>>>> * @throws IOException If there is any problem with the connection.
>>>> */
>>>> protected void secure(String pbsz, String prot) throws IOException {
>>>> this.sendCommand("AUTH", sslContext);
>>>>
>>>> SSLSocket socket =
>>>> (SSLSocket)this.context.getSocketFactory().createSocket(this._socket_,
>>>> this.getRemoteAddress().getHostAddress(), this.getRemotePort(), true);
>>>>
>>>> socket.startHandshake();
>>>>
>>>> this._socket_ = socket;
>>>>
>>>> this._controlInput_ = new BufferedReader(new
>>>> InputStreamReader(socket.getInputStream(), getControlEncoding()));
>>>> this._controlOutput_ = new BufferedWriter(new
>>>> OutputStreamWriter(socket.getOutputStream(), getControlEncoding()));
>>>>
>>>> this.setSocketFactory( new FTPSSocketFactory(this.context));
>>>>
>>>> this.sendCommand("PBSZ", pbsz);
>>>> this.sendCommand("PROT", prot);
>>>> }
>>>>
>>>> /**
>>>> * @see
>>>> org.apache.commons.net.ftp.FTPCliente#_openDataConnection_(java.lang.String,
>>>> int)
>>>> */
>>>> protected Socket _openDataConnection_(int command, String arg) throws
>>>> IOException {
>>>> Socket socket = super._openDataConnection_(command, arg);
>>>> if (socket != null) {
>>>> ((SSLSocket)socket).startHandshake();
>>>> }
>>>> return socket;
>>>> }
>>>>
>>>> }
>>>>
>>>>
>>>>
>>>>
>>>> Regards,
>>>>
>>>>
>>>>
>>>> Rory Winston wrote:
>>>>
>>>>
>>>>> Stevw
>>>>>
>>>>> I think that's a great suggestion. It moves us forward without
>>>>> necessarily sacrificing backwards compatability.
>>>>>
>>>>> I have had a look at the classes written by Jose and Paul, and
>>>>> incorporated them into my local branch copy. I had to make one minor
>>>>> change to get them to work, but other than that they seem to work
>>>>> well.
>>>>> I set up a test FTPS server using FileZilla on my local machine and
>>>>> wrote some client code:
>>>>>
>>>>> FtpsClient client = new FtpsClient();
>>>>>
>>>>> client.connect("127.0.0.1");
>>>>> client.addProtocolCommandListener(new
>>>>> PrintCommandListener(new PrintWriter(System.out)));
>>>>> client.login("user", "pass");
>>>>> client.cwd("test");
>>>>>
>>>>> for (FTPFile file : client.listFiles()) {
>>>>> System.out.println(file.getName());
>>>>> }
>>>>>
>>>>> OutputStream out = new
>>>>> FileOutputStream("c:\\temp\\test.war");
>>>>> client.retrieveFile("test.war", out);
>>>>> client.disconnect();
>>>>>
>>>>> and it seems to work a treat. If we are agreed that we should go down
>>>>> this parallel branch route, then I can move the JDK_1_4_BRANCH to
>>>>> something more sensible (i.e. Daniel's suggestion a while back to make
>>>>> the 1.4+ branch version 2), maybe NET_2_0_0. We can use the com.sun.*
>>>>> stuff for the 1.3 branch (which will probably be our 1.5.0 release)?
>>>>>
>>>>> Rory
>>>>>
>>>>> Steve Cohen wrote:
>>>>>
>>>>>
>>>>>
>>>>>> Thank you for this explanation. It is good to actually look at the
>>>>>> code instead of making assumptions, which is what I have been doing.
>>>>>>
>>>>>> The JSSE's jar does not provide javax.net.ssl versions of the
>>>>>> com.sun.net.ssl interfaces And, after doing a little research, I
>>>>>> find
>>>>>> that there are differences between JSSE 1.0.3 and the packages in JDK
>>>>>> 1.4, such that there is no backward compatibility. Basically, JSSE
>>>>>> 1.0.x is a prototype, a hack through which Sun worked out the bugs,
>>>>>> culminating in the better implementation that they released in 1.4.
>>>>>> They did not just move the JSSE.jar code into JDK 1.4. They also
>>>>>> improved it.
>>>>>>
>>>>>> Since these are new classes for us, I think it makes little sense to
>>>>>> tie into backward compatibility from the start, when that backward
>>>>>> compatibility is already out of date. I don't think there is a clean
>>>>>> way to have one code base that will work the way we'd like it for
>>>>>> both
>>>>>> cases.
>>>>>>
>>>>>> Therefore, I think the solution for this is for Jakarta Commons Net
>>>>>> to
>>>>>> take Rory Winston's suggestion and start a new branch of Commons Net
>>>>>> for JDK 1.4 only (for this and other reasons) and maintain two
>>>>>> branches for awhile, the current HEAD branch for 1.3 compatibility
>>>>>> and
>>>>>> the new branch for 1.4. The new branch can use the javax.ssl.net
>>>>>> classes, the old one can use com.sun.net.
>>>>>>
>>>>>>
>>>>>> Jose Juan Montiel wrote:
>>>>>>
>>>>>>
>>>>>>
>>>>>>> Hi Steve,
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>> What I think you're missing is that if you put jsse.jar on your
>>>>>>>> classpath, you can use javax.net.ssl with java 1.3.
>>>>>>>>
>>>>>>>>
>>>>>>> maybe i don't explain well, sorry.
>>>>>>>
>>>>>>> The three classes of com.sun.net.ssl that are used for implement
>>>>>>> FTPS
>>>>>>> (in the way that Paul did and I modified, maybe there is another...)
>>>>>>> are...
>>>>>>>
>>>>>>> com.sun.net.ssl.KeyManagerFactory
>>>>>>> (http://java.sun.com/products/jsse/doc/apidoc/com/sun/net/ssl/KeyManagerFactory.html)
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> com.sun.net.ssl.SSLContext
>>>>>>> (http://java.sun.com/products/jsse/doc/apidoc/com/sun/net/ssl/SSLContext.html)
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> com.sun.net.ssl.TrustManager
>>>>>>> (http://java.sun.com/products/jsse/doc/apidoc/com/sun/net/ssl/TrustManager.html)
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> This classes in JSSE are only in the package com.sun.net.ssl, and
>>>>>>> although in JSSE 1.0.3 there are a packege javax.net.ssl, it doesn't
>>>>>>> contain this classes, it contains javax.net.ssl.SSLSocket, a classes
>>>>>>> soon used, to implement FTPS.
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>> And the commons-net team would prefer to go that way because Sun
>>>>>>>> says that
>>>>>>>> com.sun.net may go away with some future release, but not
>>>>>>>> javax.net. Yes, this
>>>>>>>> would be a small inconvenience for java 1.3 users, but the
>>>>>>>> stability
>>>>>>>> is worth it.
>>>>>>>>
>>>>>>>>
>>>>>>> This three classes in JDK 1.4.2, were move to
>>>>>>>
>>>>>>> javax.net.ssl.KeyManagerFactory
>>>>>>> (http://java.sun.com/j2se/1.4.2/docs/api/javax/net/ssl/KeyManagerFactory.html)
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> javax.net.ssl.SSLContext
>>>>>>> (http://java.sun.com/j2se/1.4.2/docs/api/javax/net/ssl/SSLContext.html)
>>>>>>>
>>>>>>> javax.net.ssl.TrustManager
>>>>>>> (http://java.sun.com/j2se/1.4.2/docs/api/javax/net/ssl/TrustManager.html)
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> But if you download for example JDK 1.4.2 and look inside of
>>>>>>> (jre/lib)
>>>>>>> you'll find jsse.jar, the jar where still are com.sun.net.ssl. Sun,
>>>>>>> still mantain compatiblity with JDK 1.3.
>>>>>>>
>>>>>>> And still in JDK 1.5, you'll find jre/lib/jsse.jar.
>>>>>>>
>>>>>>> But when jsse.jar desapear, i offer to modified code...
>>>>>>>
>>>>>>> In other way if use javax.net.ssl.KeyManagerFactory ,
>>>>>>> javax.net.ssl.SSLContext, javax.net.ssl.TrustManager, ftps don't
>>>>>>> work
>>>>>>> under JDK 1.3.
>>>>>>>
>>>>>>> I hope explain better, this time.
>>>>>>>
>>>>>>> Then, make that you consider appropiate...
>>>>>>>
>>>>>>> Thanks all, for your time.
>>>>>>>
>>>>>>> --
>>>>>>> The whole purpose of places like Starbucks is
>>>>>>> for people with no decision-making ability
>>>>>>> whatsoever to make six decisions just to buy
>>>>>>> one cup of coffee. Short, tall, light, dark, caf,
>>>>>>> decaf, low-fat, non-fat, etc. So people who
>>>>>>> don't know what the hell they're doing or who
>>>>>>> on earth they are can, for only $2.95, get not
>>>>>>> just a cup of coffee but an absolutely defining
>>>>>>> sense of self: Tall. Decaf. Cappuccino.
>>>>>>>
>>>>>>> ---------------------------------------------------------------------
>>>>>>> To unsubscribe, e-mail: [EMAIL PROTECTED]
>>>>>>> For additional commands, e-mail: [EMAIL PROTECTED]
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>> ---------------------------------------------------------------------
>>>>>> To unsubscribe, e-mail: [EMAIL PROTECTED]
>>>>>> For additional commands, e-mail: [EMAIL PROTECTED]
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>> ---------------------------------------------------------------------
>>>>> To unsubscribe, e-mail: [EMAIL PROTECTED]
>>>>> For additional commands, e-mail: [EMAIL PROTECTED]
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>
>>>>
>>> ---------------------------------------------------------------------
>>> To unsubscribe, e-mail: [EMAIL PROTECTED]
>>> For additional commands, e-mail: [EMAIL PROTECTED]
>>>
>>>
>>>
>>>
>>
>>
>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: [EMAIL PROTECTED]
> For additional commands, e-mail: [EMAIL PROTECTED]
>
>
>
--
View this message in context:
http://www.nabble.com/-net--JSSE-classes-in-FTPS-WAS-Re%3A--net--FTPS-submission---legal-issues-tf1019716.html#a6316503
Sent from the Commons - Dev forum at Nabble.com.
---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]