Welcome!

By registering with us, you'll be able to discuss, share and private message with other members of our community.

SignUp Now!

Split 174 Meg file into parts

Have you tried IFTP to see if it suffers similarly? Here, it looks like this (using /V for lots of info).

Code:
v:\> iftp /v ftp://vefatica.net
Connecting to FTP server at 108.12.0.196:21.
Connected.
220 Serv-U FTP Server v14.0 ready...
USER anonymous
331 User name okay, please send complete E-mail address as password.
230 User logged in, proceed.
PWD
257 "/" is current directory.

v:\> dir ftp:
PWD
257 "/" is current directory.

PWD
257 "/" is current directory.
PWD
257 "/" is current directory.
PASV
227 Entering Passive Mode (108,12,0,196,225,174)
LIST
150 Opening ASCII mode data connection for /bin/ls.
226 Transfer complete. 806 bytes transferred. 0.79 KB/sec.
 Directory of  ftp://vefatica.net/*

2022-12-02  00:00         <DIR>    4plugins
2022-07-26  00:00         <DIR>    experimental
2014-08-08  00:00       3,657,325  arnex4.JPG
2023-07-10  18:13          72,938  conmode.zip
2023-04-03  14:10               5  foo.txt
2022-08-30  00:00         120,245  pset3264.zip
2023-08-02  17:10          66,406  rndmfile.zip
2023-04-03  18:32          48,361  ruler.zip
2023-03-15  21:19          74,062  rundown.zip
2021-02-17  00:00          45,706  shellex.zip
2023-08-02  15:53          73,943  split.zip
2023-07-02  13:16             213  web.config
           4,159,204 bytes in 10 files and 2 dirs

v:\> copy ftp:split.zip
PWD
257 "/" is current directory.
PWD
257 "/" is current directory.
CWD /split.zip
550 /split.zip: Is a file.
PASV
227 Entering Passive Mode (108,12,0,196,225,176)
LIST /split.zip
150 Opening ASCII mode data connection for /bin/ls.
226 Transfer complete. 66 bytes transferred. 0.06 KB/sec.
ftp://vefatica.net/split.zip => V:\split.zip
TYPE I
200 Type set to I.
SIZE /split.zip
213 73943
PASV
227 Entering Passive Mode (108,12,0,196,225,178)
RETR /split.zip
150 Opening BINARY mode data connection for split.zip (73943 Bytes).
226 Transfer complete. 73,943 bytes transferred. 4,814.00 KB/sec.
MDTM /split.zip
213 20230802195316.730
     1 file copied

v:\> iftp /c
QUIT
221 Goodbye, closing session.
 
Code:
TCC  30.00.22 x64   Windows 10 [Version 10.0.19045.3208]
Copyright 2023 JP Software Inc.  All Rights Reserved
Registered to DESKTOP-C293QAU

[C:\Program Files\JPSoft\TCMD30]iftp /v ftp://vefatica.net
Connecting to FTP server at 108.12.0.196:21.
Connected.
220 Serv-U FTP Server v14.0 ready...
USER anonymous
331 User name okay, please send complete E-mail address as password.
230 User logged in, proceed.
PWD
257 "/" is current directory.

[C:\Program Files\JPSoft\TCMD30]dir ftp:
PWD
257 "/" is current directory.

PWD
257 "/" is current directory.
PWD
257 "/" is current directory.
PASV
227 Entering Passive Mode (108,12,0,196,225,213)
LIST
150 Opening ASCII mode data connection for /bin/ls.
TCC: (Sys) The system cannot find the file specified.
 "ftp:/*"
                   0 bytes in 0 files and 0 dirs

[C:\Program Files\JPSoft\TCMD30]dir ftp:
PWD
451 Another command is currently pending, please try again later.
TCC: FTP protocol error: 451 Another command is currently pending, please try again later. ""

[C:\Program Files\JPSoft\TCMD30]dir ftp:*
PWD
451 Another command is currently pending, please try again later.
TCC: FTP protocol error: 451 Another command is currently pending, please try again later. ""

[C:\Program Files\JPSoft\TCMD30]iftp /c
QUIT
221 Goodbye, closing session.

[C:\Program Files\JPSoft\TCMD30]iftp /c

[C:\Program Files\JPSoft\TCMD30]
 
Code:
TCC  30.00.22 x64   Windows 10 [Version 10.0.19045.3208]
Copyright 2023 JP Software Inc.  All Rights Reserved
Registered to DESKTOP-C293QAU

[C:\Program Files\JPSoft\TCMD30]iftp /v ftp://vefatica.net
Connecting to FTP server at 108.12.0.196:21.
Connected.
220 Serv-U FTP Server v14.0 ready...
USER anonymous
331 User name okay, please send complete E-mail address as password.
230 User logged in, proceed.
PWD
257 "/" is current directory.

[C:\Program Files\JPSoft\TCMD30]dir ftp:
PWD
257 "/" is current directory.

PWD
257 "/" is current directory.
PWD
257 "/" is current directory.
PASV
227 Entering Passive Mode (108,12,0,196,225,213)
LIST
150 Opening ASCII mode data connection for /bin/ls.
TCC: (Sys) The system cannot find the file specified.
 "ftp:/*"
                   0 bytes in 0 files and 0 dirs

[C:\Program Files\JPSoft\TCMD30]dir ftp:
PWD
451 Another command is currently pending, please try again later.
TCC: FTP protocol error: 451 Another command is currently pending, please try again later. ""

[C:\Program Files\JPSoft\TCMD30]dir ftp:*
PWD
451 Another command is currently pending, please try again later.
TCC: FTP protocol error: 451 Another command is currently pending, please try again later. ""

[C:\Program Files\JPSoft\TCMD30]iftp /c
QUIT
221 Goodbye, closing session.

[C:\Program Files\JPSoft\TCMD30]iftp /c

[C:\Program Files\JPSoft\TCMD30]
Here's my view of that session. I have no clue what's going on. One oddity ... apparently, you gave the DIR command
at 18:05:59. Then, nothing for over 3 minutes! I would expect something like "226 Transfer complete." It seems you are not receiving/acknowledging the directory listing. In another post, I'll give another experiment to try.

Code:
[02] Sat 05Aug23 18:05:40 - (000269) Connected to 76.38.9.0 (local address 192.168.1.151, port 21)
[03] Sat 05Aug23 18:05:40 - (000269) IP-Name: 076-038-009-000.inf.spectrum.com (76.38.9.0)
[21] Sat 05Aug23 18:05:40 - (000269) 220 Serv-U FTP Server v14.0 ready...
[20] Sat 05Aug23 18:05:40 - (000269) USER anonymous
[21] Sat 05Aug23 18:05:40 - (000269) 331 User name okay, please send complete E-mail address as password.
[20] Sat 05Aug23 18:05:40 - (000269) PASS **********
[02] Sat 05Aug23 18:05:40 - (000269) ANONYMOUS logged in, password: JPUser@
[21] Sat 05Aug23 18:05:40 - (000269) 230 User logged in, proceed.
[20] Sat 05Aug23 18:05:40 - (000269) PWD
[21] Sat 05Aug23 18:05:40 - (000269) 257 "/" is current directory.
[20] Sat 05Aug23 18:05:59 - (000269) PWD
[21] Sat 05Aug23 18:05:59 - (000269) 257 "/" is current directory.
[20] Sat 05Aug23 18:05:59 - (000269) PWD
[21] Sat 05Aug23 18:05:59 - (000269) 257 "/" is current directory.
[20] Sat 05Aug23 18:05:59 - (000269) PWD
[21] Sat 05Aug23 18:05:59 - (000269) 257 "/" is current directory.
[20] Sat 05Aug23 18:05:59 - (000269) PASV
[21] Sat 05Aug23 18:05:59 - (000269) 227 Entering Passive Mode (192,168,1,151,225,213)
[20] Sat 05Aug23 18:05:59 - (000269) LIST
[21] Sat 05Aug23 18:05:59 - (000269) 150 Opening ASCII mode data connection for /bin/ls.
[20] Sat 05Aug23 18:09:21 - (000269) PWD
[21] Sat 05Aug23 18:09:21 - (000269) 451 Another command is currently pending, please try again later.
[20] Sat 05Aug23 18:09:45 - (000269) PWD
[21] Sat 05Aug23 18:09:45 - (000269) 451 Another command is currently pending, please try again later.
[20] Sat 05Aug23 18:09:53 - (000269) QUIT
[21] Sat 05Aug23 18:09:53 - (000269) 221 Goodbye, closing session.
[02] Sat 05Aug23 18:09:53 - (000269) User "anonymous" logged out
[02] Sat 05Aug23 18:09:53 - (000269) Closed session
 
Does this work in Explorer's location box?

1691277172096.png


It does here.

1691277393674.png


If not, I'd guess something is preventing passive ftp. Did you try shutting off that ublock origin thingy?
 
No commands. Clear Explorer's location bar, type ftp://vefatica.net in it (as in my first pic), and press <Enter>. If it works, the Explorer window will show the contents of the root FTP directory.

As for ublock origin, I know absolutely nothing about it. You mentioned it so I mentioned shutting it off.
 
That looks like what happened in the TCC experiment. In your last attempt (with Explorer) I see this.

Code:
20] Sat 05Aug23 22:51:48 - (000289) PASV
[21] Sat 05Aug23 22:51:48 - (000289) 227 Entering Passive Mode (192,168,1,151,193,136)
[02] Sat 05Aug23 22:52:20 - (000289) Closed session
[02] Sat 05Aug23 22:52:20 - (000289) User "anonymous" logged out

After the server responds OK (227) to TCC's PASV command, TCC should say LIST. But there's no activity for 30 seconds and the session is closed. That's like the TCC experiment but with a shorter timeout. So either Explorer is not receiving the "Entering Passive Mode" response, or is not sending the LIST command, or the LIST command is being blocked.

I'm out of ideas. You have been getting my plugins for a long time. Have there been any recent and drastic changes to your set-up or your ISP ... any new software that would mess with the firewall?

Do you have the file "c:\windows\system32\logfiles\firewall\pfirewall.log"? If you do and you can read it (try elevated), search for my IP (108.12.0.196) and see if there any dropped packets. If you have it and can't read it, I can tell you how to easily get permission.
 
That looks like what happened in the TCC experiment. In your last attempt (with Explorer) I see this.

Code:
20] Sat 05Aug23 22:51:48 - (000289) PASV
[21] Sat 05Aug23 22:51:48 - (000289) 227 Entering Passive Mode (192,168,1,151,193,136)
[02] Sat 05Aug23 22:52:20 - (000289) Closed session
[02] Sat 05Aug23 22:52:20 - (000289) User "anonymous" logged out

After the server responds OK (227) to TCC's PASV command, TCC should say LIST. But there's no activity for 30 seconds and the session is closed. That's like the TCC experiment but with a shorter timeout. So either Explorer is not receiving the "Entering Passive Mode" response, or is not sending the LIST command, or the LIST command is being blocked.

I'm out of ideas. You have been getting my plugins for a long time. Have there been any recent and drastic changes to your set-up or your ISP ... any new software that would mess with the firewall?

Do you have the file "c:\windows\system32\logfiles\firewall\pfirewall.log"? If you do and you can read it (try elevated), search for my IP (108.12.0.196) and see if there any dropped packets. If you have it and can't read it, I can tell you how to easily get permission.

I can send ou he output from TCC's TASKLIST but what switches would you like me to use?

c:\windows\system32\logfiles\firewall\pfirewall.log does not exist on my system
 
I doubt TASKLIST's output would help.

I think the firewall log is, by default, not enabled.
 
OK, it's been a while since I did it and I recall it being a chore. Try (1) below. If that doesn't work, try (2). You must be an administrator. When you're done, a restart might be needed; I don't know.

(1) In TCC, issue "WF.MSC" (or issue it in the RunDialog, WinKey+R). That should start the firewall config applet.

With "Windows Defender Firewall with Advanced Security on Local Computer" (top of left pane) selected, click "Windows Defender Firewall Properties" in the middle pane.

*For each profile tab (Domain, Private, Public), under "Logging" click "Customize" (then the three below).

Leave the defaults alone (Name = %systemroot%\system32\logfiles\firewall\pfirewall.log and SizeLimit = 4096).

Select "Yes" for "Log dropped packets"

Click "OK"

(2) Issue "GPEDIT.MSC"(or issue it in the RunDialog, WinKey+R). That should start the GroupPolicy applet.

In the left pane, navigate to
Code:
ComputerConfiguration
        WindowsSettings
            SecuritySettings
                WindowsDefenderFirewallWithAdvancedSecurity
                    WindowsDefenderFirewallWithAdvancedSecurity-LocalGroupPolicyObject

In the right pane, click "Windows Defender Firewall Properties".

Continue as in (1), starting at *.

(EDIT) In the Group Policy applet, for each profile, under "Logging", you might have to un-check "Not configured" (in two places).
 
Last edited:
IIRC, you might still need permission to look at the log. To get that permission, with TCC, CDD to the log directory and issue the command shown below, substituting your Windows userid for mine.

Code:
icacls * /grant vefatica:F

The log directory should be c:\windows\system32\logfiles\firewall
 
IIRC, you might still need permission to look at the log. To get that permission, with TCC, CDD to the log directory and issue the command shown below, substituting your Windows userid for mine.

Code:
icacls * /grant vefatica:F

The log directory should be c:\windows\system32\logfiles\firewall
Did not need to reboot

I think everything went smoothly setting up the logging.

going to restart the PC then what do I ned to do ?
 
Did not need to reboot

I think everything went smoothly setting up the logging.

going to restart the PC then what do I ned to do ?
Did (1) work for you? Apparently when I first did it I did (2) because now I can't use (1) because the settings are dictated by policy.
 
the log file is increasing in size so it looks like it is working
 
the log file is increasing in size so it looks like it is working
Good! Try the FTP experiment again, wait a while, and look for 108.12.0.196 (my IP) in it. The log is updated rather lazily. Sometimes accessing it makes it update, sometimes not. Which method for enabling logging worked, (1) or (2)?
 
steps (1) worked....

What mesasag3e number do I need to try again?
 
Code:
[C:\Users\csgal\Desktop]echo %_isodate at %_time & copy ftp://vefatica.net/split.zip
2023-08-06 at 23:53:19
TCC: (Sys) The system cannot find the file specified.
 "ftp://vefatica.net/split.zip"
     0 files copied
will post the details of any matching lines from the LOG file that have lines with 108.12.0.196 in them - in a few hours
 
Just disabled uBlock Origin and then did:

Code:
[C:\Users\csgal\Desktop]echo %_isodate at %_time & copy ftp://vefatica.net/split.zip
2023-08-07 at 00:46:52
TCC: (Sys) The system cannot find the file specified.
 "ftp://vefatica.net/split.zip"
     0 files copied

[C:\Users\csgal\Desktop]
 
Code:
Find "%?+108.12.0.196?+$".  Found 4 time(s) in 1 file(s). Scanned 1 file(s).
   C:\Windows\System32\LogFiles\Firewall\1.log
       : 2023-08-06 23:53:19 ALLOW TCP 192.168.1.123 108.12.0.196 51466 21 0 - 0 0 0 - - - SEND
       : 2023-08-06 23:53:20 ALLOW TCP 192.168.1.123 108.12.0.196 51467 21 0 - 0 0 0 - - - SEND
       : 2023-08-07 00:46:52 ALLOW TCP 192.168.1.123 108.12.0.196 51922 21 0 - 0 0 0 - - - SEND
       : 2023-08-07 00:46:52 ALLOW TCP 192.168.1.123 108.12.0.196 51923 21 0 - 0 0 0 - - - SEND
 
Code:
Find "%?+108.12.0.196?+$".  Found 4 time(s) in 1 file(s). Scanned 1 file(s).
   C:\Windows\System32\LogFiles\Firewall\1.log
       : 2023-08-06 23:53:19 ALLOW TCP 192.168.1.123 108.12.0.196 51466 21 0 - 0 0 0 - - - SEND
       : 2023-08-06 23:53:20 ALLOW TCP 192.168.1.123 108.12.0.196 51467 21 0 - 0 0 0 - - - SEND
       : 2023-08-07 00:46:52 ALLOW TCP 192.168.1.123 108.12.0.196 51922 21 0 - 0 0 0 - - - SEND
       : 2023-08-07 00:46:52 ALLOW TCP 192.168.1.123 108.12.0.196 51923 21 0 - 0 0 0 - - - SEND
Hmmm! I have never seen ALLOW in my firewall log (How did you did that?). ALLOW entries are not of much interest. DROP entries would be the ones of interest. Does the log have any DROP entries at all? If not, go back to configuring the log.

Here, all three profiles look like this.

1691390617240.png


And did you change the name of the log file? By default it's "pfirewall.log" (here, at least).
 
i had to make a copy of the log to be able to s4earch for the relevant lines... Guess what i can do is to ZIP /7ZIP the log then send ut to you...

I also changed Log successful connections all to No....
 
i had to make a copy of the log to be able to s4earch for the relevant lines
Why? Couldn't you just findstr 108.12.0.196 pfirewall.log (or something similar)? Anyway, zip it and include it in a private conversation in the forum. Don't forget to do the copy ftp:\\... test and give it some time to update the log
 
I have someone comoing by friday to see why it's dropping packets. I'll ZIP the log in a bit and send it to you as aa PM
 
I have someone comoing by friday to see why it's dropping packets. I'll ZIP the log in a bit and send it to you as aa PM
Have you confirmed that it IS dropping packets? Let me know the outcome.
 
Back
Top