Network Working Group A. DeSchon Request for Comments: 1068 R. Braden ISI August 1988 Background File Transfer Program (BFTP) Status of This Memo This memo describes an Internet background file transfer service that is built upon the third-party transfer model of FTP. No new protocols are involved. The purpose of this memo is to stimulate discussion on new Internet service modes. Distribution of this memo is unlimited. 1. Introduction For a variety of reasons, file transfer in the Internet has generally been implemented as an interactive or "foreground" service. That is, a user runs the appropriate local FTP user interface program as an interactive command and requests a file transfer to occur in real time. If the transfer should fail to complete for any reason, the user must reissue the transfer request. Foreground file transfer is relatively simple to implement -- no subtleties of queuing or stable storage -- and in the early days of networking it provided excellent service, because the Internet/ARPANET was lightly loaded and reasonably reliable. More recently, the Internet has become increasingly subject to congestion and long delays, particularly during times of peak usage. In addition, as more of the world becomes interconnected, planned and unplanned outages of hosts, gateways, and networks sometimes make it difficult for users to successfully transfer files in foreground. Performing file transfer asynchronously (i.e., in "background"), provides a solution to some of these problems, by eliminating the requirement for a human user to be directly involved at the time that a file transfer takes place. A background file transfer service requires two components: a user interface program to collect the parameters describing the required transfer(s), and a file transfer control (FTC) daemon to carry them out. DeSchon & Braden [Page 1]
RFC 1068 August 1988 Background file transfer has a number of potential advantages for a user: o No Waiting The user can request a large transfer and ignore it until a notification message arrives through some common channel (e.g., electronic mail). o End-to-end Reliability The FTC daemon can try a transfer repeatedly until it either succeeds or fails permanently. This provides reliable end-to- end delivery of a file, in spite of the source or destination host being down or poor Internet connectivity during some time period. o Multiple File Delivery In order for background file transfer to be accepted in the Internet, it may have to include some "value-added" services. One such service would be an implementation of a multiple file transfer capability for all hosts. Such a facility is suggested in RFC-959 (see the description of "NLST") and implemented in some User-FTP programs. o Deferred Delivery The user may wish to defer a large transfer until an off-peak period. This may become important when parts of the Internet adopt accounting and traffic-based cost-recovery mechanisms. There is a serious human-engineering problem with background file transfer: if the user makes a mistake in entering parameters, this mistake may not become apparent until much later. This can be the cause of severe user frustration. To avoid this problem, the user interface program ought to verify the correctness of as many of the parameters as possible when they are entered. Of course, such foreground verification of parameters is not possible if the remote host to which the parameters apply is currently unreachable. To explore the usefulness of background file transfer in the present Internet, we have implemented a file-mover service which we call the Background File Transfer Program or BFTP. Section 2 describes BFTP and Section 3 presents our experience and conclusions. The appendices contain detailed information about the DeSchon & Braden [Page 2]
RFC 1068 August 1988 user interface language for BFTP, a description of the program organization, and sample execution scripts. 2. Background File Transfer Program 2.1 General Model In the present BFTP design, its user interface program and its FTC daemon program must execute on the same host, which we call the BFTP control host. Through the user interface program, a BFTP user will supply all of the parameters needed to transfer a file from source host S to destination host D, where S and D may be different from the BFTP control host. These parameters include: o S and D host names, o login names and passwords on S and D hosts, and o S and D file names (and optionally, directories). The user may also specify a number of optional control parameters: * Source file disposition -- Copy, move (i.e., copy and delete), or simply delete the source file. The default is copy. * Destination file operation -- Create/Replace, append to, or create a unique destination file. The default is create/replace ("STOR"). * FTP Parameters -- Explicitly set any of the FTP type, mode, or structure parameters at S and D hosts. * Multiple Transfers -- Enable "wildcard" matching to perform multiple transfers. * Start Time -- Set the time of day for the first attempt of the transfer. The default is "now" (i.e., make the first attempt as soon as the request has been queued for the FTC daemon). Finally, the user specifies a mailbox to which a completion notification message will be sent, and "submits" the request to the FTC daemon queue. The user can then exit the BFTP user DeSchon & Braden [Page 3]
RFC 1068 August 1988 interface program. If the transfer should fail permanently, the FTC daemon will send a notification message to the user's mailbox. In the event of a temporary failure (e.g., a broken TCP connection), the FTC daemon will log the failure and retry the transfer after some timeout period. The retry cycles will be repeated until the transfer succeeds or until some maximum number of tries specified has been reached. In either case, a notification message will then be sent to the user's mailbox. The user can check on the progress of the transfer by reentering the BFTP user interface program, supplying a key that was defined with the request, and displaying the current status of the request. The user may then cancel the request or leave it in the queue. The BFTP program includes a server-Telnet module, so it can be executed as a remotely-accessible service that can be reached via a Telnet connection to the BFTP well-known port (152). This allows a user on any Internet host to perform background file transfers without running BFTP locally, but instead opening a Telnet connection to port 152 on a BFTP service host. Of course, a user can also run the local BFTP user interface program directly on any host that supports it and for which the user has login privileges. The next section discusses how BFTP uses standard FTP servers to perform the transfers, while the following section covers the user interface of BFTP. 2.2 File Transfer Mechanics for BFTP The BFTP makes use of the "third party" or "Server-Server" model incorporated in the Internet File Transfer Protocol [RFC-959]. Thus, the FTC daemon opens FTP control connections to the existing FTP servers on source host S and destination host D and instructs them to transfer the desired file(s) from S to D. The S and D hosts may be any two Internet hosts supporting FTP servers (but at least one of them must support the FTP "PASV" command). This approach allows the implementation of a background file transfer capability for the entire Internet at a very low cost. Figure 1 illustrates the BFTP model of operation. Note that the BFTP control host is not necessarily the same as S or D. Figure 2 illustrates the FTP command interchange used in a typical Server- Server file transfer operation; this may be compared with the User-Server FTP scenario illustrated in Section 7 of RFC-959. DeSchon & Braden [Page 4]
RFC 1068 August 1988 Since BFTP may be asked to transfer files between any two hosts in the Internet, it must support all the file types and transfer modes that are defined in RFC-959, not just a subset implemented by particular hosts. BFTP supports the transfer of a set of files in a single request, using the standard technique: (1) Send an NLST command to the source host S, specifying a pathname containing "wildcard" characters. The reply will contain a list of matching source file names. (2) Execute a separate transfer operation for each file in this list. The destination file name in each case is assumed to be the same as the source file name; this requires that these names be compatible with the naming conventions of D. It will typically be necessary to specify working directories for the transfers at S and D, so the file names will be simple, unstructured names on each system. This approach depends upon the wildcard matching capability of the source host S. A more general implementation would acquire a complete list of the file names from the source host and do the matching in the FTC daemon, for example using a regular-expression matcher. Another useful extension would be a general pattern- matching file name transformation capability (e.g., like the one included in the 4.3BSD version of FTP) to generate appropriate destination pathnames for multiple requests. DeSchon & Braden [Page 5]
RFC 1068 August 1988 Figure 1 -- BFTP Model of Operation --------- Remote | BFTP | (telnet) o User Local | Network | <---------------- -|- User o | Server | / \ -|- --------- / \ | | | | | | v v ----------- (Submit +---+ | BFTP User | request) |---| Request | Interface | ---------> |---| Queue ----------- |---| . +---+ . / . / (foreground . / (try/retry request-- . / request) see 2.3) v v -------- +---+ | FTC | -------------> | | User | Daemon | Notify | | Mailbox -------- Message +---+ / \ / FTP \ / Control \ / Connections \ HOST S v v HOST D -------- -------- | FTP | ===========> | FTP | | Server | file | Server | -------- transfer -------- DeSchon & Braden [Page 6]
RFC 1068 August 1988 Figure 2 -- Server-Server File Transfer Server FTP BFTP Daemon Server FTP HOST S HOST C HOST D ---------- ----------- ---------- <-------- Open TCP Ctrl conn Open TCP Ctrl conn --------> <-------- (log in) (login confirm.) --------> (log in) --------> <-------- (login confirm.) <-------- TYPE, STRU, MODE, CWD (confirmations) --------> TYPE, STRU, MODE, CWD --------> <-------- (confirmations) <-------- PASV command PASV confirm --------> PORT command --------> <-------- PORT confirm RETR file --------> <-------- STOR file <------------------------------ Open TCP Data conn <------------------------------ Send file <------------------------------ Close Data conn <-------- RETR confirm STOR confirm --------> <-------- QUIT command QUIT command --------> Close Ctrl conn --------> <-------- Close Ctrl conn DeSchon & Braden [Page 7]
RFC 1068 August 1988 BFTP currently utilizes the following Server-FTP commands [RFC- 959]: USER, PASS, ACCT, PASV, PORT, RETR, STOR, STOU, CWD, NLST, MODE, STRU, TYPE, and QUIT. The FTC daemon attempts to work around FTP servers that fail to support certain commands. For example, if a server does not support the optional command "CWD", the FTC daemon will attempt to construct a complete path name using the source directory name and the source file name. However, it is necessary that at least one of the two hosts support the FTP passive (PASV) command. While many FTP server implementations support do this command, some (in particular, the 4.2BSD FTP) do not. The PASV command was officially listed as being optional in RFC-959. 2.3 Reliable Delivery The reliable delivery function of BFTP is analogous to reliable delivery in a transport protocol like TCP. Both depend upon repeated delivery attempts until success is achieved, and in both cases the choice of the retry interval requires some care to balance overhead against unresponsiveness. Humans are impatient, but even their impatience has a limit. If the file cannot be transferred "soon", a human will turn to another project; typically, there is a tendency for the transfer to become less urgent the longer the wait. The FTC daemon of BFTP therefore starts each transfer request with a very short retry interval -- e.g., 10 minutes -- and then doubles this interval for successive retries, until a maximum interval -- e.g., 4 hours -- is reached. This is essentially the exponential backoff algorithm of the Ethernet, which is also used by transport protocols such as TCP, although BFTP and TCP have quite different rationales for the algorithm. We must also define the meaning of reliable transmission for a multiple-transfer request. For example, the set of files selected by wildcard characters in a pathname is not well defined; the set may change while the request is pending, as files are created and deleted. Furthermore, it is unreasonable to regard the entire multiple transfer as a single atomic operation. Suppose that transferring a set of files fails part way through; for an atomic operation, the files which had been successfully transferred would have to be deleted pending the next retry of the entire set. This would be ridiculously inefficient and may be impossible (since the communication path may be broken when it is time to issue the deletion requests). DeSchon & Braden [Page 8]
RFC 1068 August 1988 BFTP addresses these issues in the following manner: * For a multiple file operation, the FTC daemon saves the file name list returned by the first successful NLST command in the request queue entry. This name list determines the set of source files for the transfer; there can be no later additions to the set. * The FTC daemon maintains a transfer status pointer. On each retry cycle, it tries to transfer only those files that have not already been successfully transferred. * The request is complete when all the individual file transfers have been successful, a permanent failure has occured, or when the retry limit is reached. * The notification message to the user lists the status of each of the multiple files. 2.4 BFTP User Interface The purpose of BFTP is to simplify the file transfer process and to place the burden of reliability on the BFTP control host. We have attempted to provide a "user friendly" command interface to BFTP, similar in flavor to the user interface of the TOPS-20 operating system. This interface provides extensive prompting, defaulting, and help facilities for every command. For a list of all BFTP commands, the user may enter "?<Return>" at the main BFTP prompt ("BFTP>"). Entering "help<Return>" and "explain<Return>" will provide increasing levels of explanatory material. To obtain information on a particular command, "help <command name><Return>" may be entered. The 'quit' or 'exit' command will exit from BFTP. Command and subcommand names may be abbreviated to the shortest unique sequence for that context; alternatively, a partial name can be automatically completed by typing <Return>. The normal procedure for a BFTP user is to set up a set of parameters defining the desired transfer and then submit the request to the FTC daemon. To give the user the maximum flexibility, BFTP supports three modes of submission: o Background Operation To request a reliable background file transfer, the user will issue the BFTP 'submit' command to the FTC daemon. DeSchon & Braden [Page 9]
RFC 1068 August 1988 o Foreground Verification, Background Operation The BFTP 'verify' command may be used to ascertain that file transfer parameters are valid. It causes BFTP to connect to the FTP servers on both the source and the destination hosts (if possible), log into both, verify the FTP parameters, and verify that the specified source file is present. Once the 'verify' command has successfully completed, the user can issue the 'submit' command to schedule the actual file transfer. o Foreground Operation The BFTP 'transfer' command will perform the specified third-party transfer in foreground mode. This is illustrated by the dotted path bypassing the queue in Figure 1. The easiest way to set up the parameters is to issue the 'prompt' command, which will prompt the user for all of the basic parameters required for most transfers. Certain unusual parameters must be set with the 'set' command (see Appendix B for details). When entering any parameter, the following control characters may be used: ? will display help text for the parameter, indicating its meaning, the choices, and the default, and then reprompt for the parameter. <ESC> will display the default value (or the last value set) for this parameter. The user can accept this default by entering <Return>, or else erase it with Control-W and enter a different value for the parameter, followed by <Return> to accept the entered value. <Control-W> will erase the value typed or displayed for current parameter. <Return> will accept the value displayed for this parameter, and continue to the next parameter, if any. If the user has not typed a value or used <ESC> to display the default, <Return> will display the default and then accept it. DeSchon & Braden [Page 10]
RFC 1068 August 1988 It is important to provide a means for a user to obtain status information about an earlier request or even to cancel an earlier request. However, these functions, especially cancellation, must be controlled by some user authentication. We did not want to build a user authentication database with each BFTP instance or require login to BFTP itself, and there is no Internet-wide user authentication mechanism. We adopted the following weak authentication mechanism as a compromise: * When the 'submit' command is issued, it prompts the user for a character string called a "keyword", which recorded with the request. * This keyword can be entered later as the argument to a 'find' command, which will display the status of all requests with matching keywords. * Similarly, the keyword may be used to cancel the corresponding request. If two different users happen to choose the same keywords, of course, this scheme will not protect each other's requests from accidental or malicious cancellation. However, a notification message will be sent at the time that a cancellation occurs. To make a series of similar requests, the user needs only to change the individual parameters that differ from the preceding request and then issue a new 'submit' command, for each request. There are commands for individually setting each of the parameters that 'prompt' sets -- and 'time' -- to provide a shortcut for BFTP experts. A simpler but lengthier procedure is to use the 'prompt' command to run through the current set of parameters, reentering the parameters that must change and using the sequence <ESC><return> to retain the previous value for each of the others. The same procedures may be used to correct a mistake made in entering a particular parameter. The current settings of all the BFTP parameters can be displayed at any time with the 'status' command, while the 'clear' command will return all parameters to their initial values. Finally, the 'request' command allows the user to save the current set of parameters in a file or to restore the parameters from a previously-saved file. There is also a window-based BFTP user interface for use on a Sun Workstation, described in Appendix A. The complete list of BFTP commands is presented in Appendix B. DeSchon & Braden [Page 11]
RFC 1068 August 1988 3. Experience and Conclusions BFTP has been available to users at ISI for some months. Users have reported a number of advantages of using BFTP: (a) Some users prefer the prompting style of BFTP to the user interface of the foreground FTP they normally use. (b) The BFTP "verify" command allows the user to verify that host names, passwords, and filenames are correct without having to wait for the entire transfer to take place. (c) Since results are returned through the mail system, a transfer can occur without tying up a terminal line, a phone line, or even a window. BFTP must be able to communicate with a variety of Server-FTP implementations, and we have observed much variation in the commands supported, error handling, and the timing in these servers. Some of the problems we have encountered are: (1) Some systems (e.g., 4.2BSD) do not support the PASV command. (2) 4.2/3BSD systems return a non-standard response to the NLST command. Instead of returning a list of complete path-names, they use an ad hoc format consisting of a directory name followed by a list of files. (3) 4.2/3BSD systems may return a "permanent negative completion reply" (a 5xx FTP reply code) as a result of a communications failure such as a broken TCP connection. According to RFC-959, the appropriate response is a "transient negative completion reply" (a 4xx FTP reply code), which would inform the BFTP that the transfer should be retried. (4) A number of servers return badly formatted responses. An example of this is the 4.2/3BSD response to an NLST command for a non-existent file name: an error string which is not preceded by a numerical response code. To diagnose problems that do occur, we have found it very useful to have a complete record of the interchange between the FTC daemon and the two FTP servers. This record is saved and is currently always included in the notification message mailed to the user (see Appendix D for an example). As we get more experience with this program, some of the details of the transfer may be omitted from this log. DeSchon & Braden [Page 12]
RFC 1068 August 1988 The use of library routines shared between modules makes it relatively easy to implement additional user interface programs. We are currently experimenting with a window version of BFTP, the "bftptool", which runs in the SunView environment, and is described in Appendix A. Some additional interfaces that might be useful are: o A command line interface for use in shell scripts and "Makefiles". o A more general library interface which would make it easy to invoke BFTP from a variety of programs. o Additional full-screen form based interfaces, for example a tool running in X-Window system environment. Lastly, BFTP would benefit from the resolution of the following open protocol issues: o There currently exist no provisions for Internet-wide user authentication. In the BFTP context, this means that passwords required for a file transfer must be present in BFTP request files. The security of these passwords is subject to the limitations of the file system security on the BFTP control host. Anonymous file transfer provides a partial solution, but a more general, long term solution is needed. o Better mechanisms are needed to cope with the diversity of real file systems in the Internet. For example, an extension could be made to the FTP protocol to allow the daemon to learn the delimiter conventions of each host file system. This could allow a more flexible and powerful multiple-file facility in BFTP. This could include the automatic transfer of directory subtrees, for example. 4. References [RFC-959] Postel, J., and J. Reynolds, "File Transfer Protocol (FTP)", RFC-959, USC/Information Sciences Institute, October 1985. DeSchon & Braden [Page 13]
RFC 1068 August 1988 Appendix A -- BFTP Implementation Structure BFTP has been implemented on both a Sun workstation running Sun OS 3.4 (based on 4.2BSD) and a VAX running 4.3BSD. The program modules are: the local user interface programs "bftp", the Internet server program "bftpd", and the FTC daemon "fts". BFTP makes use of the "at" command, a UNIX batch job facility, to submit requests and execute the daemon. An additional user interface program, the "bftptool", is available for Sun OS 3.4, and runs in the SunView environment. BFTP keeps its state in a set of control files: request files, command files, and message files. These files are stored in the home directory specified for the environment of the process running "bftp". If a user is running "bftp" directly, this will typically be the user's home directory. In the case where a user has made a Telnet connection to the well-known port 152 on a BFTP service host, "bftp" is started by "bftpd" (or "inetd", indirectly). As a result, the control files will be owned by the user-id under which "inetd" was started, normally "root", and stored in the top level directory "/". Note, however, that under BFTP all user files are written by the FTP servers, which are presumed to enforce the operating systems' access control conventions. Hence, BFTP does not constitute a system integrity exposure. A.1 User Interface Program The BFTP user interface program "bftp" may be run directly via a UNIX shell. Once the program has been started, the prompt "BFTP>" will appear and commands may be entered. These commands are described in detail in Appendix B. A.2 Tool-Style User Interface Program The BFTP user interface program "bftptool" may be started from a shell window in the SunView environment on a Sun workstation. The BFTP commands may be selected via the left mouse button. The various file transfer parameters appear in a form-style interface; defaults and multiple-choice style parameter values can be filled in via menus. An advantage of this form-style interface program is that it is possible to view all of the file transfer parameters simultaneously, providing the user with a sense for which parameter values might be mutually exclusive. Help information can be displayed in a text subwindow by positioning the on-screen mouse pointer over a command or a parameter, and clicking the center mouse button. (No standard mechanism for displaying help information is currently included in DeSchon & Braden [Page 14]
RFC 1068 August 1988 the SunView package.) The commands used in the "bftptool" are for the most part very similar to the commands described in Appendix B. Request submittal and the execution of the FTC daemon are identical for the "bftp" and the "bftptool" interface programs. A.3 Internet Server The Internet server program "bftpd" can be invoked by opening a Telnet connection to a well-known port, and does not require login. The "bftpd" program runs under "inetd", the standard BSD4.x well-known port dispatcher. When a SYN arrives for the BFTP well-known port, "bftpd" opens the TCP connection and performs Telnet negotiations. It then passes control to the user interface "bftp" which allows the user to enter file transfer requests. A.4 BFTP Server Daemon The BFTP file transfer control daemon program is named "fts" (for "File Transfer Service"). This module contains code to actually cause a single file transfer operation using the FTP server-server model as shown in Figures 1 and 2. It is invoked with the command "fts <request-file>". The <request-file> contains the necessary parameters for the file transfer, in ASCII format, separated by linefeeds. Such a request file may be created by the user interface program, "bftp". As a byproduct of the development of BFTP, "fts" represents a server-server FTP driver that can be run independent of the "bftp" program. Parameters used in the file transfer are read from a request file, which is created and accessed via library routines which can be shared between modules. This could be used to perform FTP's under program control. DeSchon & Braden [Page 15]
RFC 1068 August 1988 Appendix B: BFTP Command Summary B.1 Special Editing Characters In the "bftp" program, the special editing characters for command words, subcommands, and parameter fields are as follows: <return> Accept current command/field. <escape> Complete current command/field, or display default. <space> Complete and delimit current command. <delete> Erase last character. control-L Refresh screen. control-R Refresh line. control-U Erase line. control-W Erase current token. ? List legal options. B.2 BFTP Commands The remainder of Appendix B consists of a list of the BFTP commands. Each command should be followed by a carriage-return. In the description of the syntax for each command, square brackets "[]" are used to indicate a ssubcommand, or a list of possible subcommands, which are separated by the "|" character. Angle brackets "<>" are used to indicate a description of a parameter where the choices would be too numerous to list, for example "<host name/number>". B.2.1 Clear Command Return all parameters to their default values. clear B.2.2 Destination Commands Set the destination directory. ddir <directory name> Set the destination file name. dfile <file name> Set the destination host, user, and password. dhost <host name/number> <login> <password> DeSchon & Braden [Page 16]
RFC 1068 August 1988 B.2.3 Explain Command Display a short explanation of how to use BFTP. explain B.2.4 Find Command Find and display a previous request. find BFTP will prompt for the request id, which is printed when the request is first submitted. An example of a request id is "bftp583101774". BFTP also prompts for the request keyword, which was determined by the user when the request was first submitted. If no keyword was specified, a <CR> should be typed. If no request id is entered, BFTP will display all requests which contain a matching keyword. RequestID (optional): <bftp-request-id> RequestKeyword: <keyword> After BFTP has displayed a summary of a matching request, it asks whether the request is to be changed, or canceled. Do you wish to change this request? [yes | no] Do you wish to cancel this request? [yes | no] If the user indicates that the request is to be changed, BFTP will read in the parameters and cancel the existing request. At this point the user may make any desired changes and use the "submit" command to requeue the request. At this point a new request id will be assigned and displayed. DeSchon & Braden [Page 17]
RFC 1068 August 1988 Although this may happen extremely rarely, if at all, it is possible that a system crash (or the interruption of the BFTP program) at a particularly inopportune moment may leave a request which is not queued. When the "find" command locates such a request, it displays the warning: Your request is NOT currently queued. If this happens, the request may be read in and resubmitted using the following procedure: Your request is NOT currently queued. Do you wish to change this request? yes (BFTP displays the parameters that have been read in.) Previous request canceled. Use the 'submit' command to submit a new request. B.2.5 Help Command Print local help information. help help <command> B.2.6 Quit Command Clear parameters and exit the BFTP program. quit B.2.7 Prompt Command Prompt for commonly-used parameters. prompt DeSchon & Braden [Page 18]
RFC 1068 August 1988 The following are the parameters that BFTP prompts for: copy/move/delete: [copy | move | delete] ascii/ebcdic/image/local: [ascii|ebcdic] [nonprint|telnet|carriage-control] or [image] or [local] <byte size> (see "set type" for additional information) Source -- Host: <host name/number> User: <login> Password: <password> Dir: <directory including a delimiter, e.g., "/" or ">"> (either an absolute path, or relative to the login) File: <file name> Destination -- Host: <host name/number> User: <login> Password: <password> Dir: <directory> File: <file name> Once the prompting has been completed, the current values of all parameters will be displayed. Parameters not mentioned in the prompting will be initialized with default values, and may be changed via the "set" commands. DeSchon & Braden [Page 19]
RFC 1068 August 1988 B.2.8 Request Commands The request commands enable the user to save a set of BFTP parameters in a "request-file" for future use. Subcommands are provided to to list all available request-files, or to read, write, or delete a request-file. All request-files are stored in the user's home directory. Therefore, this facility is not available when the user is accessing BFTP by telneting to port 152. Delete request file "bftp-save.name". request delete <name> List all bftp-save files. request list Read a request file in as the current request. request load <name> Save the current request in a file named "bftp-save.name". request store <name> B.2.9 Set Commands The "set" commands have complex subcommand structures and are used to set many of the less commonly used FTP parameters. The subcommands of "set" are as follows: Set the account for the source/destination login. set account [source | destination] <account string> Set to true to append to destination file. set append [true | false] The source file will be copied to the destination file name. set copy The source file will be deleted after the file has been moved or copied. set delete DeSchon & Braden [Page 20]
RFC 1068 August 1988 Set the mailbox to which the results will be returned. The mailbox should be in standard internet format, for example: "deschon@isi.edu". set mailbox <mailbox string> Set the FTP transfer mode. set mode [stream | block | compress] The source file will be deleted after it has been copied. set move Set to true to transfer multiple files. set multiple [true | false] Set the port for the source/destination FTP connection. set port [source | destination] <port number> Set the FTP structure. set structure [file | record | page] Set the FTP type and format / byte size parameters. Note that a normal text file is usually "ascii", and a "binary" file is often the same as an "image" file. set type [ascii|ebcdic] [nonprint|telnet|carriage-control] or set type [image] or set type [local] <byte size> Set to true if the STOU command is to be used. If the STOU command is supported by the destination host, the file will be stored into a file having a unique file name. set unique [true | false] Set to true to display full FTP conversations for "verify" and "transfer" commands. set verbose [true | false] DeSchon & Braden [Page 21]
RFC 1068 August 1988 B.2.10 Source Commands Set the source directory. sdir <directory name> Set the source file name. sfile <file name> Set the source host, user, and password. shost <host name/number> <login> <password> B.2.11 Status Command Display the current parameter values. status B.2.12 Submit Command Submit the current request for background FTP. submit BFTP prompts for the following information: StartTime: <date and/or time> ReturnMailbox: <internet mailbox> RequestKeyword: <made-up keyword> B.2.13 Time Command Set the start time, the starting retry interval, and the maximum number of tries. time <date and/or time> <minutes between tries> <maximum number of tries> B.2.14 Transfer Command Perform the current request in the foreground. transfer DeSchon & Braden [Page 22]
RFC 1068 August 1988 B.2.15 Verify Command Make the connections now to check parameters. verify DeSchon & Braden [Page 23]
RFC 1068 August 1988 Appendix C: Example BFTP User Script deschon.isi.edu 1% telnet hobgoblin.isi.edu 152 Trying 128.9.0.42 ... Connected to hobgoblin.isi.edu. Escape character is '^]'. BFTP Server (hobgoblin.isi.edu) Background File Transfer: For help, type '?', 'help', or 'explain'. BFTP> prompt Copy/Move/Delete: copy Source -- Host: deschon.isi.edu User: deschon Password: Dir: ./ File: foo* Destination -- Host: venera.isi.edu User: deschon Password: Dir: ./temp/ File: foo* StartTime: Tue Oct 6 10:14:43 1987 (interval) 60 (tries) 5 ReturnMailbox: deschon@isi.edu RequestPassword: BFTP> set multiple true BFTP> status Request type: COPY Source -- Host: 'deschon.isi.edu' User: 'deschon' Pass: SET Acct: '' Dir: './' File: 'foo*' Port: 21 Destination -- Host: 'venera.isi.edu' DeSchon & Braden [Page 24]
RFC 1068 August 1988 User: 'deschon' Pass: SET Acct: '' Dir: './temp/' File:'foo*' Port: 21 Structure: file, Mode: stream, Type: ascii, Format: nonprint Multiple matching: TRUE Return mailbox: 'deschon@isi.edu', Password: SET Remaining tries: 5, Retry interval: 60 minutes Start after Tue Oct 6 10:14:43 1987. BFTP> submit Checking parameters... Request bftp560538880 submitted to run at 10:14 Oct 6. BFTP> quit bye Connection closed by foreign host. deschon.isi.edu 2% DeSchon & Braden [Page 25]
RFC 1068 August 1988 Appendix D: Sample BFTP Notification Message Received-Date: Tue, 6 Oct 87 10:15:52 PDT Date: Tue, 6 Oct 87 10:15:47 PDT From: root (Operator) Posted-Date: Tue, 6 Oct 87 10:15:47 PDT To: deschon Subject: BFTP Results: bftp560538880 Request bftp560538880 submitted to run at 10:14 Oct 6. Tue Oct 6 10:15:22 1987: starting... Request type: COPY Source: deschon.isi.edu-deschon-XXX--21-./-foo* Destination: venera.isi.edu-deschon-XXX--21-./temp/- Stru: F, Mode: S, Type: A N, Creation: STOR Multiple matching: TRUE Return mailbox: 'deschon@isi.edu', Password: SET Remaining tries: 5, Retry interval: 60 minutes Connect to: deschon.isi.edu, 21 deschon.isi.edu ==> 220 deschon.isi.edu FTP server (Version 4.7 Sun Sep 14 12:44:57 PDT 1986) ready. Connect to: venera.isi.edu, 21 venera.isi.edu ==> 220 venera.isi.edu FTP server (Version 4.107 Thu Mar 19 20:54:37 PST 1987) ready. deschon.isi.edu <== USER deschon deschon.isi.edu ==> 331 Password required for deschon. deschon.isi.edu <== PASS XXX deschon.isi.edu ==> 230 User deschon logged in. venera.isi.edu <== USER deschon venera.isi.edu ==> 331 Password required for deschon. venera.isi.edu <== PASS XXX venera.isi.edu ==> 230 User deschon logged in. deschon.isi.edu <== CWD ./ deschon.isi.edu ==> 200 CWD command okay. venera.isi.edu <== CWD ./temp/ venera.isi.edu ==> 250 CWD command successful. deschon.isi.edu <== PORT 128,9,1,56,4,106 deschon.isi.edu ==> 200 PORT command okay. deschon.isi.edu <== NLST foo* deschon.isi.edu ==> 150 Opening data connection for /bin/ls (128.9.1.56,1130) (0 bytes). deschon.isi.edu ==> 226 Transfer complete. deschon.isi.edu <== PASV deschon.isi.edu ==> 502 PASV command not implemented. venera.isi.edu <== PASV DeSchon & Braden [Page 26]
RFC 1068 August 1988
venera.isi.edu ==> 227 Entering Passive Mode (128,9,0,32,6,200)
deschon.isi.edu <== PORT 128,9,0,32,6,200
deschon.isi.edu ==> 200 PORT command okay.
deschon.isi.edu <== RETR foo
venera.isi.edu <== STOR foo
deschon.isi.edu ==> 150 Opening data connection for foo
(128.9.0.32,1736) (0 bytes).
deschon.isi.edu ==> 226 Transfer complete.
venera.isi.edu ==> 150 Openning data connection for foo
(128.9.1.56,20).
venera.isi.edu ==> 226 Transfer complete.
venera.isi.edu <== PASV
venera.isi.edu ==> 227 Entering Passive Mode (128,9,0,32,6,201)
deschon.isi.edu <== PORT 128,9,0,32,6,201
deschon.isi.edu ==> 200 PORT command okay.
deschon.isi.edu <== RETR foo1
venera.isi.edu <== STOR foo1
deschon.isi.edu ==> 150 Opening data connection for foo1
(128.9.0.32,1737) (4 bytes).
deschon.isi.edu ==> 226 Transfer complete.
venera.isi.edu ==> 150 Openning data connection for foo1
(128.9.1.56,20).
venera.isi.edu ==> 226 Transfer complete.
deschon.isi.edu <== QUIT
venera.isi.edu <== QUIT
Tue Oct 6 10:15:39 1987: completed successfully.
DeSchon & Braden [Page 27]
mirror server hosted at Truenetwork, Russian Federation.