<testcase> <info> <keywords> FTP </keywords> </info> # Server-side <reply> <servercmd> REPLY PASV 227 Entering Passiv Mode (1216,256,2,127,127,127) </servercmd> </reply> # Client-side <client> <server> ftp </server> <name> FTP getting bad host in 227-response to PASV </name> <command> ftp://%HOSTIP:%FTPPORT/237 --disable-epsv </command> </client> # Verify data after the test has been "shot" # The bogus address used here is chosen specifically so that when processed on # certain hosts with buggy resolver code, the resulting address (192.0.2.127) # is from an address block that is guaranteed never to be assigned (RFC3330). <verify> # curl: (15) Can't resolve new host 1216.256.2.127:32639 # 15 => CURLE_FTP_CANT_GET_HOST # some systems just don't fail on the illegal host name/address but instead # moves on and attempt to connect to... yes, to what? # 7= CURLE_COULDNT_CONNECT <errorcode> 15, 7 </errorcode> <protocol> USER anonymous PASS ftp@example.com PWD PASV </protocol> </verify> </testcase>