1<testcase> 2<info> 3<keywords> 4FTP 5</keywords> 6</info> 7 8# Server-side 9<reply> 10<servercmd> 11REPLY PASV 227 Entering Passiv Mode (1216,256,2,127,127,127) 12</servercmd> 13</reply> 14 15# Client-side 16<client> 17<server> 18ftp 19</server> 20 <name> 21FTP getting bad host in 227-response to PASV 22 </name> 23 <command> 24ftp://%HOSTIP:%FTPPORT/237 --disable-epsv 25</command> 26</client> 27 28# Verify data after the test has been "shot" 29# The bogus address used here is chosen specifically so that when processed on 30# certain hosts with buggy resolver code, the resulting address (192.0.2.127) 31# is from an address block that is guaranteed never to be assigned (RFC3330). 32<verify> 33# curl: (15) Can't resolve new host 1216.256.2.127:32639 34# 15 => CURLE_FTP_CANT_GET_HOST 35# some systems just don't fail on the illegal host name/address but instead 36# moves on and attempt to connect to... yes, to what? 37# 7= CURLE_COULDNT_CONNECT 38<errorcode> 3915, 7 40</errorcode> 41<protocol> 42USER anonymous 43PASS ftp@example.com 44PWD 45PASV 46</protocol> 47</verify> 48</testcase> 49