Replies: 12 comments 27 replies
-
I suggest upgrading to the newest Allsky release, v2024.12.06. It has a new command to test an upload and in many cases, determine why it failed. See te main GitHub page for a link to installation instructions. |
Beta Was this translation helpful? Give feedback.
-
@jlfutari, any update? |
Beta Was this translation helpful? Give feedback.
-
@jlfutari, I googled the error. It worked for one user when they used |
Beta Was this translation helpful? Give feedback.
-
Is this a new remote Website? If not, what changed? Someone else used |
Beta Was this translation helpful? Give feedback.
-
Hi EricClaeys, Sorry for my lack of reply's and thankyou for suggestions above I have upgraded to the latest version of allsky on my Rasp PI. But other than that I haven't had time to continue with the (new)website setup (life is to busy). Fingers crossed I will get to it this week. James |
Beta Was this translation helpful? Give feedback.
-
Hi EricCleays,
I tied set ssl:verify-certificate no (because at the beginning I got a error related to invalid certificate), set ssl:check-hostname false and set ftp:ssl-auth TLS in various combinations. I use V2024-12-06 and a FTP upload to the popular (in Germany) Fritzbox. Surprisingly I got 1 image uploaded, then nothing. Over all the configuration of the new version is much more straightforward! |
Beta Was this translation helpful? Give feedback.
-
Very funny: For ftps-upload I get the handshake error I can't get rid of. |
Beta Was this translation helpful? Give feedback.
-
Eric, admin@allsky:~/allsky/scripts $ ./testUpload.sh --debug --server Executing: /home/admin/allsky/scripts/upload.sh --debug --remote-server /tmp/testUpload.sh.txt Spica/allsky/ testUpload.sh.txt testUpload.sh Test upload to Remote Server succeeded. OUTPUT: Upload output from '/tmp/testUpload.sh.txt: ---- Resolving host address... ---- 2 addresses found: 2001:9e8:202d:bf6f:9a9b:cbff:fe6f:27f5, 92.117.244.67 ---- Connecting to ehcj2i7etqqinlyu.myfritz.net (2001:9e8:202d:bf6f:9a9b:cbff:fe6f:27f5) port 42817 <--- 220 FTP server ready. ---> FEAT <--- 211- Extensions supported: <--- UTF8 <--- MDTM <--- SIZE <--- AUTH TLS <--- PBSZ <--- PROT <--- 211 end ---> AUTH TLS <--- 234 Authentication method accepted ---> OPTS UTF8 ON WARNING: Certificate verification: The certificate is NOT trusted. The certificate issuer is unknown. (BF:D0:CE:F9:08:7F:9A:2F:66:F1:EF:60:AA:1C:FB:C5:A2:8D:7D:4C) <--- 530 Please login with USER and PASS. ---> USER radinkel <--- 331 Password required for radinkel. ---> PASS XXXX <--- 230 User radinkel logged in. ---> OPTS UTF8 ON <--- 200 UTF8 ON ---> PWD <--- 257 "/" is current directory. ---> PBSZ 0 <--- 200 ok ---> PROT P <--- 200 Data channel will be secured ---> TYPE I <--- 200 Type set to I. ---> PWD 257 "/" is current directory. ---> TYPE A <--- 200 Type set to A. ---> EPSV <--- 229 Entering Extended Passive Mode (|||41383|) ---- Connecting data socket to (2001:9e8:202d:bf6f:9a9b:cbff:fe6f:27f5) port 41383 ---> LIST <--- 150 Opening ASCII mode data connection for '/bin/ls -lgA'. WARNING: Certificate verification: The certificate is NOT trusted. The certificate issuer is unknown. (BF:D0:CE:F9:08:7F:9A:2F:66:F1:EF:60:AA:1C:FB:C5:A2:8D:7D:4C) drwxrwxr-x 2 ftp ftp 240 Dec 16 2011 Bilder drwxrwxr-x 2 ftp ftp 312 Dec 16 2011 Dokumente drwxrwxrwx 5 ftp ftp 440 Feb 1 2023 FRITZ drwxrwxr-x 2 ftp ftp 232 Dec 16 2011 Musik drwxrwxrwx 4 ftp ftp 296 Jan 6 21:17 Spica drwxrwxr-x 2 ftp ftp 312 Dec 16 2011 Videos drwxrwxrwx 5 ftp ftp 368 Jan 6 20:04 allsky -rwxrw-rw- 1 ftp ftp 116 Feb 1 2024 copy_keogram.bat <--- 226 Transfer complete. -rw-rw-rw- 1 ftp ftp 8 Aug 29 2024 ftp_test.txt ---> CWD Spica <--- 250 CWD command successful. ---> CWD allsky <--- 250 CWD command successful. In DIRECTORY=Spica/allsky/: ---> EPSV <--- 229 Entering Extended Passive Mode (|||40889|) ---- Connecting data socket to (2001:9e8:202d:bf6f:9a9b:cbff:fe6f:27f5) port 40889 ---> LIST <--- 150 Opening ASCII mode data connection for '/bin/ls -lgA'. WARNING: Certificate verification: The certificate is NOT trusted. The certificate issuer is unknown. (BF:D0:CE:F9:08:7F:9A:2F:66:F1:EF:60:AA:1C:FB:C5:A2:8D:7D:4C) drwxrwxrwx 3 ftp ftp 232 Jan 6 20:15 keograms drwxrwxrwx 3 ftp ftp 232 Jan 6 20:15 startrails drwxrwxrwx 3 ftp ftp 232 Jan 6 20:15 videos -rw-rw-rw- 1 ftp ftp 2801664 Jan 6 21:19 SaveImage-server-11388 -rw-rw-rw- 1 ftp ftp 2810028 Jan 6 21:23 SaveImage-server-11403 -rw-rw-rw- 1 ftp ftp 2812689 Jan 6 21:26 SaveImage-server-26077 -rw-rw-rw- 1 ftp ftp 2785280 Jan 6 21:55 SaveImage-server-27787 -rw-rw-rw- 1 ftp ftp 2801664 Jan 6 21:32 SaveImage-server-3047 -rw-rw-rw- 1 ftp ftp 2801664 Jan 6 21:30 SaveImage-server-30774 -rw-rw-rw- 1 ftp ftp 2801664 Jan 6 22:06 SaveImage-server-9586 -rw-rw-rw- 1 ftp ftp 2801664 Jan 6 21:59 SaveImage-server-96 -rw-rw-rw- 1 ftp ftp 2810816 Jan 6 22:09 image.jpg <--- 226 Transfer complete. -rw-rw-rw- 1 ftp ftp 27 Jan 6 22:01 testUpload.sh.txt ---> TYPE I <--- 200 Type set to I. ---> EPSV <--- 229 Entering Extended Passive Mode (|||40869|) ---- Connecting data socket to (2001:9e8:202d:bf6f:9a9b:cbff:fe6f:27f5) port 40869 ---> STOR testUpload.sh-29035 <--- 150 Opening BINARY mode data connection for 'testUpload.sh-29035'. WARNING: Certificate verification: The certificate is NOT trusted. The certificate issuer is unknown. (BF:D0:CE:F9:08:7F:9A:2F:66:F1:EF:60:AA:1C:FB:C5:A2:8D:7D:4C) **** Peer closed connection ---- Connecting to ehcj2i7etqqinlyu.myfritz.net (2001:9e8:202d:bf6f:9a9b:cbff:fe6f:27f5) port 42817 <--- 220 FTP server ready. ---> FEAT <--- 211- Extensions supported: <--- UTF8 <--- MDTM <--- SIZE <--- AUTH TLS <--- PBSZ <--- PROT <--- 211 end ---> AUTH TLS <--- 234 Authentication method accepted ---> OPTS UTF8 ON WARNING: Certificate verification: The certificate is NOT trusted. The certificate issuer is unknown. (BF:D0:CE:F9:08:7F:9A:2F:66:F1:EF:60:AA:1C:FB:C5:A2:8D:7D:4C) <--- 530 Please login with USER and PASS. ---> USER radinkel <--- 331 Password required for radinkel. ---> PASS XXXX <--- 230 User radinkel logged in. ---> OPTS UTF8 ON <--- 200 UTF8 ON ---> PBSZ 0 <--- 200 ok ---> PROT P <--- 200 Data channel will be secured ---> CWD Spica <--- 250 CWD command successful. ---> CWD allsky <--- 250 CWD command successful. ---> TYPE I <--- 200 Type set to I. ---> SIZE testUpload.sh-29035 <--- 213 0 ---> EPSV <--- 229 Entering Extended Passive Mode (|||44353|) ---- Connecting data socket to (2001:9e8:202d:bf6f:9a9b:cbff:fe6f:27f5) port 44353 ---> STOR testUpload.sh-29035 <--- 150 Opening BINARY mode data connection for 'testUpload.sh-29035'. WARNING: Certificate verification: The certificate is NOT trusted. The certificate issuer is unknown. (BF:D0:CE:F9:08:7F:9A:2F:66:F1:EF:60:AA:1C:FB:C5:A2:8D:7D:4C) **** Peer closed connection ---- Connecting to ehcj2i7etqqinlyu.myfritz.net (2001:9e8:202d:bf6f:9a9b:cbff:fe6f:27f5) port 42817 <--- 220 FTP server ready. ---> FEAT <--- 211- Extensions supported: <--- UTF8 <--- MDTM <--- SIZE <--- AUTH TLS <--- PBSZ <--- PROT <--- 211 end ---> AUTH TLS <--- 234 Authentication method accepted ---> OPTS UTF8 ON WARNING: Certificate verification: The certificate is NOT trusted. The certificate issuer is unknown. (BF:D0:CE:F9:08:7F:9A:2F:66:F1:EF:60:AA:1C:FB:C5:A2:8D:7D:4C) <--- 530 Please login with USER and PASS. ---> USER radinkel <--- 331 Password required for radinkel. ---> PASS XXXX <--- 230 User radinkel logged in. ---> OPTS UTF8 ON <--- 200 UTF8 ON ---> PBSZ 0 <--- 200 ok ---> PROT P <--- 200 Data channel will be secured ---> CWD Spica <--- 250 CWD command successful. ---> CWD allsky <--- 250 CWD command successful. ---> TYPE I <--- 200 Type set to I. ---> SIZE testUpload.sh-29035 <--- 213 0 ---> EPSV <--- 229 Entering Extended Passive Mode (|||35883|) ---- Connecting data socket to (2001:9e8:202d:bf6f:9a9b:cbff:fe6f:27f5) port 35883 ---> STOR testUpload.sh-29035 <--- 150 Opening BINARY mode data connection for 'testUpload.sh-29035'. WARNING: Certificate verification: The certificate is NOT trusted. The certificate issuer is unknown. (BF:D0:CE:F9:08:7F:9A:2F:66:F1:EF:60:AA:1C:FB:C5:A2:8D:7D:4C) <--- 226 Transfer complete. ---> SITE UTIME 20250106210945 testUpload.sh-29035 **** gnutls_record_recv: Error in the pull function. ---- Connecting to ehcj2i7etqqinlyu.myfritz.net (2001:9e8:202d:bf6f:9a9b:cbff:fe6f:27f5) port 42817 <--- 220 FTP server ready. ---> FEAT <--- 211- Extensions supported: <--- UTF8 <--- MDTM <--- SIZE <--- AUTH TLS <--- PBSZ <--- PROT <--- 211 end ---> AUTH TLS <--- 234 Authentication method accepted ---> OPTS UTF8 ON WARNING: Certificate verification: The certificate is NOT trusted. The certificate issuer is unknown. (BF:D0:CE:F9:08:7F:9A:2F:66:F1:EF:60:AA:1C:FB:C5:A2:8D:7D:4C) <--- 530 Please login with USER and PASS. ---> USER radinkel <--- 331 Password required for radinkel. ---> PASS XXXX <--- 230 User radinkel logged in. ---> OPTS UTF8 ON <--- 200 UTF8 ON ---> PBSZ 0 <--- 200 ok ---> PROT P <--- 200 Data channel will be secured ---> CWD Spica <--- 250 CWD command successful. ---> CWD allsky <--- 250 CWD command successful. ---> TYPE I <--- 200 Type set to I. ---> SIZE testUpload.sh-29035 <--- 213 27 ---> SITE UTIME 20250106210945 testUpload.sh-29035 <--- 500 'SITE UTIME 20250106210945 testUpload.sh-29035': command not understood. ---> SITE UTIME testUpload.sh-29035 20250106210945 20250106210945 20250106210945 UTC <--- 500 'SITE UTIME testUpload.sh-29035 20250106210945 20250106210945 20250106210945 UTC': command not understood. ---> DELE testUpload.sh.txt <--- 250 DELE command successful. ---> TYPE A <--- 200 Type set to A. ---> EPSV <--- 229 Entering Extended Passive Mode (|||51165|) ---- Connecting data socket to (2001:9e8:202d:bf6f:9a9b:cbff:fe6f:27f5) port 51165 ---> LIST <--- 150 Opening ASCII mode data connection for '/bin/ls -lgA'. WARNING: Certificate verification: The certificate is NOT trusted. The certificate issuer is unknown. (BF:D0:CE:F9:08:7F:9A:2F:66:F1:EF:60:AA:1C:FB:C5:A2:8D:7D:4C) <--- 226 Transfer complete. ---> TYPE I <--- 200 Type set to I. ---> RNFR testUpload.sh-29035 <--- 350 File exists, ready for destination name ---> RNTO testUpload.sh.txt <--- 250 RNTO command successful. ---> QUIT <--- 221 Goodbye. Please remove 'Spica/allsky//testUpload.sh.txt' on your server. |
Beta Was this translation helpful? Give feedback.
-
When I switch to ftps, I get this: =================== RAW OUTPUT:
|
Beta Was this translation helpful? Give feedback.
-
@Radinkel, we are making progress. Your post 2 hours ago worked, I assume with Until a day age, no one reported the FYI, this isn't an Allsky problem but instead a problem determining how to properly connect to your server. Can you ask the company that provides your service? |
Beta Was this translation helpful? Give feedback.
-
@Radinkel, forgot to ask... |
Beta Was this translation helpful? Give feedback.
-
Have either of you tried FileZilla or another FTP client from your PC to the server to see if it works? |
Beta Was this translation helpful? Give feedback.
-
Hi All,
When I use the command -> cd ~/allsky; website/install.sh --remote , I get this error -> "cd: Fatal error: gnutls_handshake: An unexpected TLS packet was received." (twice).
I'm not sure how to fix/resolve this FTP error.
Any help would be great.
System
Rasp PI 4
Rasp PI OS (Bullseye)
Allsky Version: v2023.05.01_04
(screen shot attached)
James
Beta Was this translation helpful? Give feedback.
All reactions