Hi Christopher,
While studying your reply I had a couple of insights, did some more research and found the solution. Thank you. Here are some details…
I have been getting this Test log output Error message from the Ftp client at https://ftptest.net/ while testing my Ftp site addition to my website…
Status: Resolving address of mickwebsite.com
Status: Connecting to 99.242.126.196
…
Command: USER Mick
Reply: 530 Valid hostname is expected.
Error: Login refused by server
1. My Comments
The error had nothing to do with my CTW setup, except that I had not wisely chosen the domain for the Ftp site. To finally resolve this issue I have set up my Windows 10 IIS with a website and an ftp site, both bound to mickwebsite.com, both using the same SSL certificate. Inside inetmgr the host name is mickwebsite.com for both the website and the ftp site.
I found this solution at this ServerFault Blog…
I needed to make two changes…
[1] Login with mickwebsite.com|Mick rather than with just my user name Mick
[2] Include a binding in inetsrv to my internal IP address 10.0.0.153 for mickwebsite.com in addition to the binding to my external IP address
2. Here is part of the Preview section, before the successful run of CTW app…
Action Site Binding
Add ftp binding Micks Ftp Server ***:21:mickwebsite.com **
Update https binding Website *:443:mickwebsite.com SNI
3. Here is the Log File, after successful run of CTW app…
2023-01-04 15:31:26.897 -05:00 [INF] [Preview Mode] Completed certificate request and automated bindings update (IIS)
2023-01-04 15:31:51.830 -05:00 [INF] ---- Beginning Request [mickwebsite.com] ----
2023-01-04 15:31:51.844 -05:00 [INF] Certify/5.6.8.0 (Windows; Microsoft Windows NT 10.0.19044.0)
2023-01-04 15:31:52.097 -05:00 [INF] Beginning Certificate Request Process: mickwebsite.com using ACME Provider:Certes
2023-01-04 15:31:52.097 -05:00 [INF] Requested identifiers to include on certificate: mickwebsite.com
2023-01-04 15:31:52.097 -05:00 [INF] Beginning certificate order for requested domains
2023-01-04 15:31:52.914 -05:00 [INF] BeginCertificateOrder: creating/retrieving order. Retries remaining:2
2023-01-04 15:31:53.943 -05:00 [INF] Created ACME Order: https://acme-v02.api.letsencrypt.org/acme/order/673201047/156899437397
2023-01-04 15:31:54.201 -05:00 [INF] Fetching Authorizations.
2023-01-04 15:31:54.847 -05:00 [INF] Got http-01 challenge https://acme-v02.api.letsencrypt.org/acme/chall-v3/186463356427/qG14eg
2023-01-04 15:31:55.033 -05:00 [INF] Order authorizations already completed.
2023-01-04 15:31:55.087 -05:00 [INF] Requesting Certificate via Certificate Authority
2023-01-04 15:31:57.847 -05:00 [INF] Completed Certificate Request.
2023-01-04 15:31:57.912 -05:00 [INF] Performing Automated Certificate Binding
2023-01-04 15:31:59.221 -05:00 [INF] Completed certificate request and automated bindings update (IIS)
2023-01-04 15:32:01.035 -05:00 [INF] Request completed
2023-01-04 15:32:01.047 -05:00 [INF] Request completed
2023-01-04 15:32:46.328 -05:00 [INF] [Preview Mode] Completed certificate request and automated bindings update (IIS)
2023-01-04 15:32:51.505 -05:00 [INF] All Tests Completed OK
4. Here is test log output from successful run of the Ftp client: https://ftptest.net/
Status: Resolving address of mickwebsite.com
Status: Connecting to 99.242.126.196
Warning: The entered address does not resolve to an IPv6 address.
Status: Connected, waiting for welcome message…
Reply: 220 Microsoft FTP Service
Command: CLNT https://ftptest.net on behalf of 2607:fea8:2e1d:ba00:81fa:7f7f:6a5:7177
Reply: 500 Command not understood.
Command: AUTH TLS
Reply: 234 AUTH command ok. Expecting TLS Negotiation.
Status: Performing TLS handshake…
Status: TLS handshake successful, verifying certificate…
Status: Received 2 certificates from server.
Status: cert[0]: subject=‘CN=mickwebsite.com’ issuer=‘C=US,O=Let\27s Encrypt,CN=R3’
Status: cert[1]: subject=‘C=US,O=Let\27s Encrypt,CN=R3’ issuer=‘C=US,O=Internet Security Research Group,CN=ISRG Root X1’
Command: USER mickwebsite.com|Mick
Reply: 331 Password required
Command: PASS ******
Reply: 230 User logged in.
Command: SYST
Reply: 215 Windows_NT
Command: FEAT
Reply: 211-Extended features supported:
Reply: LANG EN*
Reply: UTF8
Reply: AUTH TLS;TLS-C;SSL;TLS-P;
Reply: PBSZ
Reply: PROT C;P;
Reply: CCC
Reply: HOST
Reply: SIZE
Reply: MDTM
Reply: REST STREAM
Reply: 211 END
Warning: The server does not indicate MLSD support. MLSD uses a well-specified listing format. Without MLSD, directory listings have to be obtained using LIST which uses an unspecified output format.
Command: PBSZ 0
Reply: 200 PBSZ command successful.
Command: PROT P
Reply: 200 PROT command successful.
Command: PWD
Reply: 257 “/” is current directory.
Status: Current path is /
Command: TYPE I
Reply: 200 Type set to I.
Command: PASV
Reply: 227 Entering Passive Mode (99,242,126,196,136,185).
Command: LIST
Status: Data connection established, performing TLS handshake…
Reply: 125 Data connection already open; Transfer starting.
Status: TLS handshake successful, verifying certificate…
Status: Received 2 certificates from server.
Status: cert[0]: subject=‘CN=mickwebsite.com’ issuer=‘C=US,O=Let\27s Encrypt,CN=R3’
Status: cert[1]: subject=‘C=US,O=Let\27s Encrypt,CN=R3’ issuer=‘C=US,O=Internet Security Research Group,CN=ISRG Root X1’
Warning: Control and transfer connection do not share the same TLS session. Without TLS session resumption, an attacker could swap transfers between you and another user connected to the same server. Make sure the server allows session resumption and caches sessions for the entire duration of the control connection.
Listing: 12-24-22 05:16PM 21 MetaTest.txt
Reply: 226 Transfer complete.
Status: Success
Thanx again
Mick