2
0

test237 972 B

123456789101112131415161718192021222324252627282930313233343536373839404142
  1. <testcase>
  2. # Server-side
  3. <reply>
  4. <servercmd>
  5. REPLY PASV 227 Entering Passiv Mode (1216,256,2,127,127,127)
  6. </servercmd>
  7. </reply>
  8. # Client-side
  9. <client>
  10. <server>
  11. ftp
  12. </server>
  13. <name>
  14. FTP getting bad host in 227-response to PASV
  15. </name>
  16. <command>
  17. ftp://%HOSTIP:%FTPPORT/237 --disable-epsv
  18. </command>
  19. </client>
  20. # Verify data after the test has been "shot"
  21. # The bogus address used here is chosen specifically so that when processed on
  22. # certain hosts with buggy resolver code, the resulting address (192.0.2.127)
  23. # is from an address block that is guaranteed never to be assigned (RFC3330).
  24. <verify>
  25. # curl: (15) Can't resolve new host 1216.256.2.127:32639
  26. # 15 => CURLE_FTP_CANT_GET_HOST
  27. # some systems just don't fail on the illegal host name/address but instead
  28. # moves on and attempt to connect to... yes, to what?
  29. # 7= CURLE_COULDNT_CONNECT
  30. <errorcode>
  31. 15, 7
  32. </errorcode>
  33. <protocol>
  34. USER anonymous
  35. PASS ftp@example.com
  36. PWD
  37. PASV
  38. </protocol>
  39. </verify>
  40. </testcase>