Ok, here are two other clients:
Filezilla Client 2.2.12c
Response: 220 Please visit
http://sourceforge.net/projects/filezilla/
Command: AUTH SSL
Response: 334 Using authentication type SSL
Status: SSL connection established. Waiting for welcome message...
Command: PBSZ 0
Response: 502 Command not implemented for this authentication type
Command: PROT P
Response: 200 Protection level set to P
Command: USER xxxxxxxxx
Response: 331 Password required for xxxxxxxx
Command: PASS ********
Response: 230 Logged on
Command: FEAT
Response: 211-Features:
Response: MDTM
Response: REST STREAM
Response: SIZE
Response: MODE Z
Response: MLST type*;size*;modify*;
Response: 211 End
Command: SYST
Response: 215 UNIX emulated by FileZilla
Status: Connected
Status: Retrieving directory listing...
Command: PWD
Response: 257 "/" is current directory.
Command: MODE Z
Response: 504 MODE Z not enabled
Command: PASV
Response: 227 Entering Passive Mode (xxx,xxx,xxx,xxx)
Command: TYPE A
Response: 200 Type set to A
Command: LIST
Response: 150 Connection accepted
Status: SSL connection established
Response: 226 Transfer OK
Status: Directory listing successful
Command: PWD
Response: 257 "/" is current directory.
SmartFTP 1.1.985.6
220-FileZilla Server version 0.9.6a beta
220-written by Tim Kosse (Tim.Kosse@gmx.de)
220 Please visit
http://sourceforge.net/projects/filezilla/
AUTH TLS
334 Using authentication type TLS
Connected. Exchanging encryption keys...
Session Cipher: 128 bit RC4
SSL encrypted session established.
PBSZ 0
502 Command not implemented for this authentication type
USER xxxxxxxxxx
331 Password required for xxxxxxxxxx
PASS (hidden)
230 Logged on
SYST
215 UNIX emulated by FileZilla
FEAT
211-Features:
MDTM
REST STREAM
SIZE
MODE Z
MLST type*;size*;modify*;
211 End
PWD
257 "/" is current directory.
MODE Z
504 MODE Z not enabled
PROT P
200 Protection level set to P
PASV
227 Entering Passive Mode (xxx.xxx.xxx.xxx)
MLSD
Opening data connection IP: xxx.xxx.xxx.xxx PORT: xxxx.
150 Connection accepted
Connected. Exchanging encryption keys...
Session Cipher: 128 bit RC4
SSL encrypted session established.
384 bytes received successfully. (384 B/s) (00:00:01).
226 Transfer OK