This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

FTP uploads to ftp.sophos.com not longer working due to TLS1.0 Handshake failure

Since this week me and my colleagues cannot upload files to ftp.sophos.com:990 over explicit TLS

happens to 195.171.192.29 and 195.171.192.30

Probably caused by Sophos Servers only offering TLS 1.0

Using filezilla latest version 3.56.0 with GNUTLS 3.7.2

Error:

Fehler:	Verbindungsversuch durch Benutzer unterbrochen
Status:	Warnung: Der gewählte Port wird üblicherweise von einem anderen Protokoll verwendet.
Status:	Auflösen der IP-Adresse für ftp.sophos.com
Status:	Verbinde mit 195.171.192.29:990...
Status:	Verbindung hergestellt, warte auf Willkommensnachricht...
Status:	Initialisiere TLS...
Fehler:	GnuTLS-Fehler -8: A packet with illegal or unsupported version was received.
Status:	Verbindungsversuch fehlgeschlagen mit "ECONNABORTED - Verbindung abgebrochen".
Fehler:	Herstellen der Verbindung zum Server fehlgeschlagen

129    14:16:39,544877    my.ipaddress    195.171.192.29    TCP    52402    990    66    52402 → 990 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM=1
134    14:16:39,606162    195.171.192.29    my.ipaddress    TCP    990    52402    66    990 → 52402 [SYN, ACK] Seq=0 Ack=1 Win=5840 Len=0 MSS=1420 SACK_PERM=1 WS=128
135    14:16:39,606467    my.ipaddress    195.171.192.29    TCP    52402    990    54    52402 → 990 [ACK] Seq=1 Ack=1 Win=262656 Len=0
136    14:16:39,653103    195.171.192.29    my.ipaddress    TCP    990    52402    129    990 → 52402 [PSH, ACK] Seq=1 Ack=1 Win=5888 Len=75
137    14:16:39,653285    my.ipaddress    195.171.192.29    TCP    52402    990    64    52402 → 990 [PSH, ACK] Seq=1 Ack=76 Win=262400 Len=10
139    14:16:39,687157    195.171.192.29    my.ipaddress    TCP    990    52402    60    990 → 52402 [ACK] Seq=76 Ack=11 Win=5888 Len=0
140    14:16:39,687333    195.171.192.29    my.ipaddress    TCP    990    52402    72    990 → 52402 [PSH, ACK] Seq=76 Ack=11 Win=5888 Len=18
141    14:16:39,689429    my.ipaddress    195.171.192.29    TLSv1    52402    990    488    Client Hello
142    14:16:39,734847    195.171.192.29    my.ipaddress    TLSv1    990    52402    1474    Server Hello
143    14:16:39,734982    195.171.192.29    my.ipaddress    TCP    990    52402    1474    990 → 52402 [ACK] Seq=1514 Ack=445 Win=6912 Len=1420 [TCP segment of a reassembled PDU]
144    14:16:39,735032    my.ipaddress    195.171.192.29    TCP    52402    990    54    52402 → 990 [ACK] Seq=445 Ack=2934 Win=262656 Len=0
145    14:16:39,735074    195.171.192.29    my.ipaddress    TLSv1    990    52402    101    Certificate, Server Hello Done
146    14:16:39,735404    my.ipaddress    195.171.192.29    TCP    52402    990    54    52402 → 990 [RST, ACK] Seq=445 Ack=2981 Win=0 Len=0

Client Hello is TLS 1.2

Server Hello is only offering TLS 1.0

Can you please put this security level up again?



This thread was automatically locked due to age.