test237 1015 B

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748
  1. <testcase>
  2. <info>
  3. <keywords>
  4. FTP
  5. </keywords>
  6. </info>
  7. # Server-side
  8. <reply>
  9. <servercmd>
  10. REPLY PASV 227 Entering Passiv Mode (1216,256,2,127,127,127)
  11. </servercmd>
  12. </reply>
  13. # Client-side
  14. <client>
  15. <server>
  16. ftp
  17. </server>
  18. <name>
  19. FTP getting bad host in 227-response to PASV
  20. </name>
  21. <command>
  22. ftp://%HOSTIP:%FTPPORT/237 --disable-epsv
  23. </command>
  24. </client>
  25. # Verify data after the test has been "shot"
  26. # The bogus address used here is chosen specifically so that when processed on
  27. # certain hosts with buggy resolver code, the resulting address (192.0.2.127)
  28. # is from an address block that is guaranteed never to be assigned (RFC3330).
  29. <verify>
  30. # curl: (15) Can't resolve new host 1216.256.2.127:32639
  31. # 15 => CURLE_FTP_CANT_GET_HOST
  32. # some systems just don't fail on the illegal host name/address but instead
  33. # moves on and attempt to connect to... yes, to what?
  34. # 7= CURLE_COULDNT_CONNECT
  35. <errorcode>
  36. 15, 7
  37. </errorcode>
  38. <protocol>
  39. USER anonymous
  40. PASS ftp@example.com
  41. PWD
  42. PASV
  43. </protocol>
  44. </verify>
  45. </testcase>