zend studio 8

i’ve just installed zend studio and suse firewall is blocking zend remote ftp connection. while i was using netbeans it didn’t block. how can i allow zend studio on firewall ?

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Which firewall is blocking it… the server or the client? Read about
Active vs. Passive FTP connections and try to set Zend Studio to use the
one like Netbeans does. Typically passive is best for client-side firewalls.

Good luck.

On 07/09/2011 05:06 PM, h R n wrote:
>
> i’ve just installed zend studio and suse firewall is blocking zend
> remote ftp connection. while i was using netbeans it didn’t block. how
> can i allow zend studio on firewall ?
>
>


Want to yell at me in person?
Come to BrainShare 2011 in October: http://tinyurl.com/brainshare2011
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.15 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQIcBAEBAgAGBQJOGOTIAAoJEF+XTK08PnB5lqYP/RnsUAeFaNhH3IB7cMNIXy4q
7bwL1a0ePGv4Kzexvq8FsWPRb/zQNMCj1NomMj/vUxT+hjHjNKUK23I1IF0TGSJa
1126TMFhCE0ZV9icxfZZhtT/uXkH4tUTiFgO34kvN081zQwZ8fUhJuSlB5cpcsIy
aXXDOAAoULHpwuYP/wzOJtowjcZ3MjKP/fpje+hkInkd9ZnaUygAuMAEH5qM+sRB
i6N1kNjk9uEjO9Cp35a+8OnFDYUhZ5XjWg6oO/t1J66ELdJLIXLbr7lC373h4CML
eWw7aXBCF9AC9GfqNeoZBm/JdzszIKRnl1RqWLo5dJ5vBNgXRNvOO9Pi0zCCL5MJ
0jzNMl8cy46VCjoh6Ax4bKP/sCMDoUl/o389SKlshJ/+rXSYF+LWkta8BvkSpcFh
vE+RktymyVVGpwrJMoraOzm4KxbZlXW5GHEH5yp9cNzutvV7UTx5UKcr//PvAxSA
QICAmY++x5CzgiPLqJvfsWU1RMZE666devlaieoz9J+w6pBpfBDZ8k9bpISNNXFW
iQyLP8I+aqyS0q+M+K4xKvvQkt9ZMY4djvUcjz7zWjC4GF1NSZux/0vxozSqHzrX
SR8HOtU3e6xMCrt6lr1xVb1vDr4vZ17lm4mw6ZO/GnvykLp9ADvrDVm+EOWLxyPl
vUv8LCltIdSsDcX3Qqvp
=6cRr
-----END PGP SIGNATURE-----

thanks for your reply.
problem is on client side. i can reach server with zend 8 on windows 7. i’ve just checked the options and the passive box is selected. but nothing changed. when i disabled the firewall it can connect. but i don’t want disable it temporary. where can i see which port is using by zend studio ? is there any settings on ide ?

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Well that’s strange… the default OpenSUSE firewall definitely blocks
Active transfers (hard not to) and definitely doesn’t block Passive (at
least, it shouldn’t). Care to get a LAN trace? It’d be best if you could
filter by the destination IP address but you could also test with Novell’s
FTP server (just login with ‘anonymous’ as the username) and use the
following command which specifies Novell’s FTP server’s IP address:

sudo /usr/sbin/tcpdump -n -s 0 host 130.57.1.88

Post the output here and we’ll see what happens. Do this from the command
line as well as with Zend if you’d like:

ftp -a 130.57.1.88
cd outgoing
put /bin/bash

Good luck.

On 07/09/2011 06:36 PM, h R n wrote:
>
> thanks for your reply. problem is on client side. i can reach server
> with zend 8 on windows 7. i’ve just checked the options and the passive
> box is selected. but nothing changed. when i disabled the firewall it
> can connect. but i don’t want disable it temporary. where can i see
> which port is using by zend studio ? is there any settings on ide ?
>
>


Want to yell at me in person?
Come to BrainShare 2011 in October: http://tinyurl.com/brainshare2011
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.15 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQIcBAEBAgAGBQJOGSLsAAoJEF+XTK08PnB5qhAP/24ZvWuiqRru7sgK5IGgmfgH
x6RUzRwnnyCQUYXJULW6KFA1nMIpR7Npj6HHnVNUDopnB6MJRchEO/2gFDcweibi
o4HNaBoLa2btEJ/DZwuy8ruQ0GwtpHrL2313iJiWCMT8v3EwjoCaCgW/5XUHbm8w
PsmJbCT0ellTqBWb+3o2PSWf5j8ZRldaXnqZJ0fTi5W637iqc/N47PljykeaQO/n
ZzPNoiOMlLPDFVzC3zfCMUwn16hBchsy6CwSzj80rBjfbecelgLr6pe3rzXtVubL
YLeyenuQ3192ZA+tz7F/V4pq7w8PRh8lmR4druOYHWID8F+QZWXiHVDmQ8TsBY2q
JC0rTf/fEgjT6gSd1xdLgFuby2Eih5Nrg0LcRLnQe3mVZxE2uj25lIVEygKa1QDV
/a+eZajPDAkY+051GccNY96SUkH9G95wzHGJcBfXfn1QzZRNr8n+ZJ0QoW+UmIIJ
7Er0W8Dx1pN8Ri5ZzkR6UYbtysBy1annt8o9cmutr/KZOubwS30yxJYzwLoT6PeB
C2r0Cb0FcgbkdJ90XERwW+c/4MkItyKcVCWyWkJWNaE0E/HHRSzIVQU5tsdFsWXm
L8uEzaJUMX5xMhWp2BuNs8rOz5xkcw+wp43gjhF97YXu3pOZ2n38i8pyLSB8HPjb
66GS8SNNYpn1qcOSAgRB
=eetc
-----END PGP SIGNATURE-----

the output is

tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
12:42:24.502319 IP 192.168.254.5.46767 > 130.57.1.88.21: Flags [S], seq 3019339395, win 4380, options [mss 1460,sackOK,TS val 1096906 ecr 0,nop,wscale 1], length 0
12:42:24.729389 IP 130.57.1.88.21 > 192.168.254.5.46767: Flags [S.], seq 2265801889, ack 3019339396, win 5792, options [mss 1380,sackOK,TS val 497493545 ecr 1096906,nop,wscale 0], length 0
12:42:24.729521 IP 192.168.254.5.46767 > 130.57.1.88.21: Flags .], ack 1, win 2190, options [nop,nop,TS val 1097133 ecr 497493545], length 0
12:42:24.959045 IP 130.57.1.88.21 > 192.168.254.5.46767: Flags [P.], seq 1:55, ack 1, win 5792, options [nop,nop,TS val 497493774 ecr 1097133], length 54
12:42:24.959213 IP 192.168.254.5.46767 > 130.57.1.88.21: Flags .], ack 55, win 2190, options [nop,nop,TS val 1097363 ecr 497493774], length 0
12:42:24.959503 IP 192.168.254.5.46767 > 130.57.1.88.21: Flags [P.], seq 1:17, ack 55, win 2190, options [nop,nop,TS val 1097363 ecr 497493774], length 16
12:42:25.187677 IP 130.57.1.88.21 > 192.168.254.5.46767: Flags .], ack 17, win 5792, options [nop,nop,TS val 497494003 ecr 1097363], length 0
12:42:25.191772 IP 130.57.1.88.21 > 192.168.254.5.46767: Flags [P.], seq 55:130, ack 17, win 5792, options [nop,nop,TS val 497494005 ecr 1097363], length 75
12:42:25.192100 IP 192.168.254.5.46767 > 130.57.1.88.21: Flags [P.], seq 17:30, ack 130, win 2190, options [nop,nop,TS val 1097596 ecr 497494005], length 13
12:42:25.424221 IP 130.57.1.88.21 > 192.168.254.5.46767: Flags [P.], seq 130:161, ack 30, win 5792, options [nop,nop,TS val 497494240 ecr 1097596], length 31
12:42:25.424490 IP 192.168.254.5.46767 > 130.57.1.88.21: Flags [P.], seq 30:36, ack 161, win 2190, options [nop,nop,TS val 1097828 ecr 497494240], length 6
12:42:25.652182 IP 130.57.1.88.21 > 192.168.254.5.46767: Flags [P.], seq 161:180, ack 36, win 5792, options [nop,nop,TS val 497494468 ecr 1097828], length 19
12:42:25.652429 IP 192.168.254.5.46767 > 130.57.1.88.21: Flags [P.], seq 36:42, ack 180, win 2190, options [nop,nop,TS val 1098056 ecr 497494468], length 6
12:42:25.879666 IP 130.57.1.88.21 > 192.168.254.5.46767: Flags [P.], seq 180:220, ack 42, win 5792, options [nop,nop,TS val 497494695 ecr 1098056], length 40
12:42:25.918999 IP 192.168.254.5.46767 > 130.57.1.88.21: Flags .], ack 220, win 2190, options [nop,nop,TS val 1098323 ecr 497494695], length 0
12:42:26.145839 IP 130.57.1.88.21 > 192.168.254.5.46767: Flags [P.], seq 220:229, ack 42, win 5792, options [nop,nop,TS val 497494961 ecr 1098323], length 9
12:42:26.145953 IP 192.168.254.5.46767 > 130.57.1.88.21: Flags .], ack 229, win 2190, options [nop,nop,TS val 1098550 ecr 497494961], length 0
12:42:26.146023 IP 192.168.254.5.46767 > 130.57.1.88.21: Flags [P.], seq 42:47, ack 229, win 2190, options [nop,nop,TS val 1098550 ecr 497494961], length 5
12:42:26.374928 IP 130.57.1.88.21 > 192.168.254.5.46767: Flags [P.], seq 229:263, ack 47, win 5792, options [nop,nop,TS val 497495191 ecr 1098550], length 34
12:42:26.414968 IP 192.168.254.5.46767 > 130.57.1.88.21: Flags .], ack 263, win 2190, options [nop,nop,TS val 1098819 ecr 497495191], length 0
12:42:43.558990 IP 192.168.254.5.46767 > 130.57.1.88.21: Flags [P.], seq 47:61, ack 263, win 2190, options [nop,nop,TS val 1115963 ecr 497495191], length 14
12:42:43.786143 IP 130.57.1.88.21 > 192.168.254.5.46767: Flags [P.], seq 263:291, ack 61, win 5792, options [nop,nop,TS val 497512604 ecr 1115963], length 28
12:42:43.786424 IP 192.168.254.5.46767 > 130.57.1.88.21: Flags .], ack 291, win 2190, options [nop,nop,TS val 1116190 ecr 497512604], length 0
12:42:43.786583 IP 192.168.254.5.46767 > 130.57.1.88.21: Flags [P.], seq 61:66, ack 291, win 2190, options [nop,nop,TS val 1116190 ecr 497512604], length 5
12:42:44.014857 IP 130.57.1.88.21 > 192.168.254.5.46767: Flags [P.], seq 291:333, ack 66, win 5792, options [nop,nop,TS val 497512832 ecr 1116190], length 42
12:42:44.055016 IP 192.168.254.5.46767 > 130.57.1.88.21: Flags .], ack 333, win 2190, options [nop,nop,TS val 1116459 ecr 497512832], length 0
12:42:53.060021 IP 192.168.254.5.46767 > 130.57.1.88.21: Flags [P.], seq 66:74, ack 333, win 2190, options [nop,nop,TS val 1125464 ecr 497512832], length 8
12:42:53.287151 IP 130.57.1.88.21 > 192.168.254.5.46767: Flags [P.], seq 333:352, ack 74, win 5792, options [nop,nop,TS val 497522106 ecr 1125464], length 19
12:42:53.287337 IP 192.168.254.5.46767 > 130.57.1.88.21: Flags .], ack 352, win 2190, options [nop,nop,TS val 1125691 ecr 497522106], length 0
12:42:53.287523 IP 192.168.254.5.46767 > 130.57.1.88.21: Flags [P.], seq 74:80, ack 352, win 2190, options [nop,nop,TS val 1125691 ecr 497522106], length 6
12:42:53.517624 IP 130.57.1.88.21 > 192.168.254.5.46767: Flags [P.], seq 352:400, ack 80, win 5792, options [nop,nop,TS val 497522336 ecr 1125691], length 48
12:42:53.518013 IP 192.168.254.5.51678 > 130.57.1.88.62841: Flags [S], seq 3475908456, win 4380, options [mss 1460,sackOK,TS val 1125922 ecr 0,nop,wscale 1], length 0
12:42:53.556879 IP 192.168.254.5.46767 > 130.57.1.88.21: Flags .], ack 400, win 2190, options [nop,nop,TS val 1125961 ecr 497522336], length 0
12:42:53.745286 IP 130.57.1.88.62841 > 192.168.254.5.51678: Flags [S.], seq 3341402432, ack 3475908457, win 5792, options [mss 1380,sackOK,TS val 497522564 ecr 1125922,nop,wscale 0], length 0
12:42:53.745375 IP 192.168.254.5.51678 > 130.57.1.88.62841: Flags .], ack 1, win 2190, options [nop,nop,TS val 1126149 ecr 497522564], length 0
12:42:53.745587 IP 192.168.254.5.46767 > 130.57.1.88.21: Flags [P.], seq 80:96, ack 400, win 2190, options [nop,nop,TS val 1126149 ecr 497522336], length 16
12:42:53.974113 IP 130.57.1.88.21 > 192.168.254.5.46767: Flags [P.], seq 400:442, ack 96, win 5792, options [nop,nop,TS val 497522793 ecr 1126149], length 42
12:42:53.974335 IP 192.168.254.5.46767 > 130.57.1.88.21: Flags .], ack 442, win 2190, options [nop,nop,TS val 1126378 ecr 497522793], length 0
12:42:53.974524 IP 192.168.254.5.51678 > 130.57.1.88.62841: Flags [F.], seq 1, ack 1, win 2190, options [nop,nop,TS val 1126378 ecr 497522564], length 0
12:42:54.202265 IP 130.57.1.88.62841 > 192.168.254.5.51678: Flags .], ack 2, win 5792, options [nop,nop,TS val 497523021 ecr 1126378], length 0

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

This appears to be correct, but Zend is not trying to send anything
really. It establishes the Passive connection correctly and then sends
one more which is to disconnect (FIN) which the server acknowledges.
This, to me, tells me that the firewall is not in the way since you get a
fully ESTABLISHED connection and then the client (ftp or Zend or whatever)
tears down the connection. Which utility did you use and what steps did
you take to create this trace? If you want to get a tcpdump the same way
but with Zend talking to your web server that may be useful as well.

Good luck.


Want to yell at me in person?
Come to BrainShare 2011 in October: http://tinyurl.com/brainshare2011
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.15 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=FXLZ
-----END PGP SIGNATURE-----

thanks for interesting.