On 2018-04-24 16:04:17 +0000, Hans Vlems said:
> Access to the
ftp.hp.com site was possible thru anonymous logon.
> my next commands were:
>> bin
>> cd /pub/softlib/software10/COL4171/ux-67853-1
>> ls
> Which gave this back:
> 500 Illegal PORT command.
>
> This was on a Windows 10 pro system, I64/VMS V8.4 (on an rx2600) gave
> the same result.
> What am I missing....
I have no Windows systems around to try to replicate that behavior.
Try a different (and preferably working) IP and FTP stack?
HP does have a semi-wonky FTP implementation, and with a very short
timeout. Apparently running an FTP daemon that's also not the current
release as well, based on the vsFTP site.
As for whether or not this works, here's a trace from a local Unix box:
> $ ftp
ftp.hp.com
> Trying 15.73.48.57...
> Connected to
ftp-hpcom.glb1.hp.com.
> 220 (vsFTPd 3.0.2)
> Name ({expurgated{): anonymous
> 230 Login successful.
> Remote system type is UNIX.
> Using binary mode to transfer files.
> ftp> cd pub/softlib/software10/COL4171/ux-67853-1
> 250 Directory successfully changed.
> ftp> pwd
> Remote directory: /pub/softlib/software10/COL4171/ux-67853-1
> ftp> ls
> 229 Entering Extended Passive Mode (|||40625|).
> 150 Here comes the directory listing.
> -rwxrwxr-x 1 32227 14180 16461191 Feb 03 2009 PF_CPEAKSYS0231C.zip
> 226 Directory send OK.
> ftp> bin
> 200 Switching to Binary mode.
> ftp> get PF_CPEAKSYS0231C.zip
> local: PF_CPEAKSYS0231C.zip remote: PF_CPEAKSYS0231C.zip
> 229 Entering Extended Passive Mode (|||40597|).
> 150 Opening BINARY mode data connection for PF_CPEAKSYS0231C.zip
> (16461191 bytes).
> 100%
> |*********************************************************************************************************************************|
> 16075 KiB {expurgated} 00:00 ETA
> 226 Transfer complete.
> 16461191 bytes received in {expurgated}
> ftp>
As was asked else-thread, I prefer to avoid the PCSI patch kits,
preferring the use of the EFI mechanisms directly when those are
available. That for various reasons.
And I don't expect that something that identifies itself as 231A to be
quite the same as something showing itself as 231C, FWIW.
And there are various security issues with more recent ("newer")
ProLiant iLO implementations, and I'd suspect that some of those same
issues might also or do apply to earlier iLO implementations and to the
Integrity iLO implementations.