Got a client who is getting inconsistent FTP results.

I dod a script capture as follows:


Script started on Mon Oct 24 16:00:04 2005
doctor.nl2k.ab.ca/~$ tcpdump port 121
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on exp0, link-type EN10MB (Ethernet), capture size 96 bytes
^^C^C
0 packets captured
442 packets received by filter
0 packets dropped by kernel
doctor.nl2k.ab.ca/~$ tcpdump port 12121
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on exp0, link-type EN10MB (Ethernet), capture size 96 bytes
16:00:19.619001 IP doctor.nl2k.ab.ca.ftp > 82.114.72.135.3458: FP 928393160:928393216(56) ack 2651200837 win 8760
16:00:27.619993 IP doctor.nl2k.ab.ca.ftp > 82.114.72.135.3458: FP 0:56(56) ack 1 win 8760
16:00:29.082129 IP d199-126-255-84.abhsia.telus.net.2683 > safetyresults.ca.ftp: S 1857388273:1857388273(0) win 65535
16:00:29.082169 IP safetyresults.ca.ftp > d199-126-255-84.abhsia.telus.net.2683: S 1424888950:1424888950(0) ack 1857388274 win 8760
16:00:29.200055 IP d199-126-255-84.abhsia.telus.net.2683 > safetyresults.ca.ftp: . ack 1 win 65535
16:00:29.279817 IP safetyresults.ca.ftp > d199-126-255-84.abhsia.telus.net.2683: P 1:76(75) ack 1 win 8760
16:00:29.512975 IP d199-126-255-84.abhsia.telus.net.2683 > safetyresults.ca.ftp: . ack 76 win 65460
16:00:29.512998 IP safetyresults.ca.ftp > d199-126-255-84.abhsia.telus.net.2683: P 76:142(66) ack 1 win 8760
16:00:29.843645 IP d199-126-255-84.abhsia.telus.net.2683 > safetyresults.ca.ftp: . ack 142 win 65394
16:00:43.621904 IP doctor.nl2k.ab.ca.ftp > 82.114.72.135.3458: FP 0:56(56) ack 1 win 8760
16:00:51.247151 IP d199-126-255-84.abhsia.telus.net.2683 > safetyresults.ca.ftp: P 1:11(10) ack 142 win 65394
16:00:51.352835 IP safetyresults.ca.ftp > d199-126-255-84.abhsia.telus.net.2683: . ack 11 win 8760
16:00:51.380288 IP safetyresults.ca.ftp > d199-126-255-84.abhsia.telus.net.2683: P 142:200(58) ack 11 win 8760
16:00:51.717062 IP d199-126-255-84.abhsia.telus.net.2683 > safetyresults.ca.ftp: . ack 200 win 65336
16:00:59.556548 IP d199-126-255-84.abhsia.telus.net.2683 > safetyresults.ca.ftp: P 11:33(22) ack 200 win 65336
16:00:59.629515 IP safetyresults.ca.ftp > d199-126-255-84.abhsia.telus.net.2683: P 200:248(48) ack 33 win 8760
16:00:59.920303 IP d199-126-255-84.abhsia.telus.net.2683 > safetyresults.ca.ftp: . ack 248 win 65288
16:01:09.324447 IP d199-126-255-84.abhsia.telus.net.2683 > safetyresults.ca.ftp: P 33:61(28) ack 248 win 65288
16:01:09.324528 IP safetyresults.ca.ftp > d199-126-255-84.abhsia.telus.net.2683: P 248:278(30) ack 61 win 8760
16:01:09.443698 IP d199-126-255-84.abhsia.telus.net.2683 > safetyresults.ca.ftp: P 61:67(6) ack 278 win 65258
16:01:09.555022 IP safetyresults.ca.ftp > d199-126-255-84.abhsia.telus.net.2683: . ack 67 win 8760
16:01:09.566180 IP safetyresults.ca.ftp > d199-126-255-84.abhsia.telus.net.2683: P 278:333(55) ack 67 win 8760
16:01:09.873811 IP d199-126-255-84.abhsia.telus.net.2683 > safetyresults.ca.ftp: . ack 333 win 65203
16:01:09.873839 IP safetyresults.ca.ftp > d199-126-255-84.abhsia.telus.net.2683: P 333:357(24) ack 67 win 8760
16:01:10.202595 IP d199-126-255-84.abhsia.telus.net.2683 > safetyresults.ca.ftp: . ack 357 win 65179
16:01:15.625792 IP doctor.nl2k.ab.ca.ftp > 82.114.72.135.3458: FP 0:56(56) ack 1 win 8760
16:01:44.123673 IP d199-126-255-84.abhsia.telus.net.2683 > safetyresults.ca.ftp: P 67:73(6) ack 357 win 65179
16:01:44.123844 IP safetyresults.ca.ftp > d199-126-255-84.abhsia.telus.net.2683: P 357:371(14) ack 73 win 8760
16:01:44.123895 IP safetyresults.ca.ftp > d199-126-255-84.abhsia.telus.net.2683: F 371:371(0) ack 73 win 8760
16:01:44.242448 IP d199-126-255-84.abhsia.telus.net.2683 > safetyresults.ca.ftp: . ack 372 win 65165
16:01:44.243381 IP d199-126-255-84.abhsia.telus.net.2683 > safetyresults.ca.ftp: F 73:73(0) ack 372 win 65165
16:01:44.243423 IP safetyresults.ca.ftp > d199-126-255-84.abhsia.telus.net.2683: . ack 74 win 8760
^C
32 packets captured
9875 packets received by filter
0 packets dropped by kernel
doctor.nl2k.ab.ca/~$

This is using WinXP command line FTP , no issue getting to safetyresults.ca .

doctor.nl2k.ab.ca/~$ fg
sh: fg: hwρυ : no such job
doctor.nl2k.ab.ca/~$ fgtcpdump port 21
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on exp0, link-type EN10MB (Ethernet), capture size 96 bytes
16:02:02.828237 IP d199-126-255-84.abhsia.telus.net.2693 > safetyresults.ca.ftp: S 3862326337:3862326337(0) win 65535
16:02:02.828300 IP safetyresults.ca.ftp > d199-126-255-84.abhsia.telus.net.2693: S 1493845229:1493845229(0) ack 3862326338 win 8760
16:02:03.502337 IP d199-126-255-84.abhsia.telus.net.2693 > safetyresults.ca.ftp: . ack 1 win 65535
16:02:03.539903 IP safetyresults.ca.ftp > d199-126-255-84.abhsia.telus.net.2693: P 1:76(75) ack 1 win 8760
16:02:04.781454 IP d199-126-255-84.abhsia.telus.net.2693 > safetyresults.ca.ftp: . ack 76 win 65460
16:02:04.781497 IP safetyresults.ca.ftp > d199-126-255-84.abhsia.telus.net.2693: P 76:142(66) ack 1 win 8760
16:02:05.209358 IP d199-126-255-84.abhsia.telus.net.2693 > safetyresults.ca.ftp: P 1:17(16) ack 142 win 65394
16:02:05.210264 IP safetyresults.ca.ftp > d199-126-255-84.abhsia.telus.net.2693: P 142:200(58) ack 17 win 8760
16:02:05.357580 IP d199-126-255-84.abhsia.telus.net.2693 > safetyresults.ca.ftp: P 17:31(14) ack 200 win 65336
16:02:05.358650 IP safetyresults.ca.ftp > d199-126-255-84.abhsia.telus.net.2693: P 200:248(48) ack 31 win 8760
16:02:05.484950 IP d199-126-255-84.abhsia.telus.net.2693 > safetyresults.ca.ftp: P 31:45(14) ack 248 win 65288
16:02:05.485084 IP safetyresults.ca.ftp > d199-126-255-84.abhsia.telus.net.2693: P 248:293(45) ack 45 win 8760
16:02:05.619553 IP d199-126-255-84.abhsia.telus.net.2693 > safetyresults.ca.ftp: P 45:51(6) ack 293 win 65243
16:02:05.619745 IP safetyresults.ca.ftp > d199-126-255-84.abhsia.telus.net.2693: P 293:332(39) ack 51 win 8760
16:02:05.738645 IP d199-126-255-84.abhsia.telus.net.2693 > safetyresults.ca.ftp: P 51:62(11) ack 332 win 65204
16:02:05.738778 IP safetyresults.ca.ftp > d199-126-255-84.abhsia.telus.net.2693: P 332:405(73) ack 62 win 8760
16:02:05.984324 IP d199-126-255-84.abhsia.telus.net.2693 > safetyresults.ca.ftp: . ack 405 win 65131
16:02:05.984373 IP safetyresults.ca.ftp > d199-126-255-84.abhsia.telus.net.2693: P 405:511(106) ack 62 win 8760
16:02:06.118933 IP d199-126-255-84.abhsia.telus.net.2693 > safetyresults.ca.ftp: P 62:67(5) ack 511 win 65025
16:02:06.119131 IP safetyresults.ca.ftp > d199-126-255-84.abhsia.telus.net.2693: P 511:542(31) ack 67 win 8760
16:02:06.286869 IP d199-126-255-84.abhsia.telus.net.2693 > safetyresults.ca.ftp: P 67:73(6) ack 542 win 64994
16:02:06.287048 IP safetyresults.ca.ftp > d199-126-255-84.abhsia.telus.net.2693: P 542:572(30) ack 73 win 8760
16:02:06.438755 IP d199-126-255-84.abhsia.telus.net.2693 > safetyresults.ca.ftp: P 73:80(7) ack 572 win 64964
16:02:06.440156 IP safetyresults.ca.ftp > d199-126-255-84.abhsia.telus.net.2693: P 572:601(29) ack 80 win 8760
16:02:06.575416 IP d199-126-255-84.abhsia.telus.net.2693 > safetyresults.ca.ftp: P 80:88(8) ack 601 win 64935
16:02:06.576127 IP safetyresults.ca.ftp > d199-126-255-84.abhsia.telus.net.2693: P 601:621(20) ack 88 win 8760
16:02:06.694235 IP d199-126-255-84.abhsia.telus.net.2693 > safetyresults.ca.ftp: P 88:94(6) ack 621 win 64915
16:02:06.694510 IP safetyresults.ca.ftp > d199-126-255-84.abhsia.telus.net.2693: P 621:672(51) ack 94 win 8760
16:02:06.969870 IP d199-126-255-84.abhsia.telus.net.2693 > safetyresults.ca.ftp: . ack 672 win 64864
16:02:19.633523 IP doctor.nl2k.ab.ca.ftp > 82.114.72.135.3458: FP 928393160:928393216(56) ack 2651200837 win 8760
16:02:38.805344 IP d199-126-255-84.abhsia.telus.net.2693 > safetyresults.ca.ftp: P 94:100(6) ack 672 win 64864
16:02:38.805458 IP safetyresults.ca.ftp > d199-126-255-84.abhsia.telus.net.2693: P 672:702(30) ack 100 win 8760
16:02:38.925236 IP d199-126-255-84.abhsia.telus.net.2693 > safetyresults.ca.ftp: P 100:107(7) ack 702 win 64834
16:02:38.925343 IP safetyresults.ca.ftp > d199-126-255-84.abhsia.telus.net.2693: P 702:731(29) ack 107 win 8760
16:02:39.047856 IP d199-126-255-84.abhsia.telus.net.2693 > safetyresults.ca.ftp: P 107:115(8) ack 731 win 64805
16:02:39.047953 IP safetyresults.ca.ftp > d199-126-255-84.abhsia.telus.net.2693: P 731:751(20) ack 115 win 8760
16:02:39.166703 IP d199-126-255-84.abhsia.telus.net.2693 > safetyresults.ca.ftp: P 115:121(6) ack 751 win 64785
16:02:39.166946 IP safetyresults.ca.ftp > d199-126-255-84.abhsia.telus.net.2693: P 751:802(51) ack 121 win 8760
16:02:39.472635 IP d199-126-255-84.abhsia.telus.net.2693 > safetyresults.ca.ftp: . ack 802 win 64734
16:03:23.641215 IP doctor.nl2k.ab.ca.ftp > 82.114.72.135.3458: FP 0:56(56) ack 1 win 8760
^C
40 packets captured
10920 packets received by filter
0 packets dropped by kernel
You have new mail in /var/mail/root
doctor.nl2k.ab.ca/~$

Here using a GUI Interface the client does not see the remote side safettyresults.ca .

What is happening?

doctor.nl2k.ab.ca/~$ exit
exit

Script done on Mon Oct 24 16:03:44 2005
--
Member - Liberal International
This is doctor@nl2k.ab.ca Ici doctor@nl2k.ab.ca
God Queen and country! Beware Anti-Christ rising!
Satan uses Republicanism to lead you away from the true path