KNOWN_BUGS 28 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755
  1. _ _ ____ _
  2. ___| | | | _ \| |
  3. / __| | | | |_) | |
  4. | (__| |_| | _ <| |___
  5. \___|\___/|_| \_\_____|
  6. Known Bugs
  7. These are problems and bugs known to exist at the time of this release. Feel
  8. free to join in and help us correct one or more of these! Also be sure to
  9. check the changelog of the current development status, as one or more of these
  10. problems may have been fixed or changed somewhat since this was written!
  11. 1. HTTP
  12. 1.1 CURLFORM_CONTENTLEN in an array
  13. 1.2 Disabling HTTP Pipelining
  14. 1.3 STARTTRANSFER time is wrong for HTTP POSTs
  15. 1.4 multipart formposts file name encoding
  16. 1.5 Expect-100 meets 417
  17. 1.6 Unnecessary close when 401 received waiting for 100
  18. 1.7 Deflate error after all content was received
  19. 1.9 HTTP/2 frames while in the connection pool kill reuse
  20. 1.10 Strips trailing dot from host name
  21. 1.11 CURLOPT_SEEKFUNCTION not called with CURLFORM_STREAM
  22. 2. TLS
  23. 2.1 CURLINFO_SSL_VERIFYRESULT has limited support
  24. 2.2 DER in keychain
  25. 2.3 GnuTLS backend skips really long certificate fields
  26. 2.4 DarwinSSL won't import PKCS#12 client certificates without a password
  27. 2.5 Client cert handling with Issuer DN differs between backends
  28. 2.6 CURL_GLOBAL_SSL
  29. 2.7 Client cert (MTLS) issues with Schannel
  30. 3. Email protocols
  31. 3.1 IMAP SEARCH ALL truncated response
  32. 3.2 No disconnect command
  33. 3.3 SMTP to multiple recipients
  34. 3.4 POP3 expects "CRLF.CRLF" eob for some single-line responses
  35. 4. Command line
  36. 4.1 -J and -O with %-encoded file names
  37. 4.2 -J with -C - fails
  38. 4.3 --retry and transfer timeouts
  39. 4.4 --upload-file . hang if delay in STDIN
  40. 4.5 Improve --data-urlencode space encoding
  41. 5. Build and portability issues
  42. 5.1 tests not compatible with python3
  43. 5.2 curl-config --libs contains private details
  44. 5.3 curl compiled on OSX 10.13 failed to run on OSX 10.10
  45. 5.4 Cannot compile against a static build of OpenLDAP
  46. 5.5 can't handle Unicode arguments in Windows
  47. 5.6 cmake support gaps
  48. 5.7 Visual Studio project gaps
  49. 5.8 configure finding libs in wrong directory
  50. 5.9 Utilize Requires.private directives in libcurl.pc
  51. 6. Authentication
  52. 6.1 NTLM authentication and unicode
  53. 6.2 MIT Kerberos for Windows build
  54. 6.3 NTLM in system context uses wrong name
  55. 6.4 Negotiate and Kerberos V5 need a fake user name
  56. 6.5 NTLM doesn't support password with § character
  57. 6.6 libcurl can fail to try alternatives with --proxy-any
  58. 7. FTP
  59. 7.1 FTP without or slow 220 response
  60. 7.2 FTP with CONNECT and slow server
  61. 7.3 FTP with NOBODY and FAILONERROR
  62. 7.4 FTP with ACCT
  63. 7.5 ASCII FTP
  64. 7.6 FTP with NULs in URL parts
  65. 7.7 FTP and empty path parts in the URL
  66. 7.8 Premature transfer end but healthy control channel
  67. 7.9 Passive transfer tries only one IP address
  68. 7.10 Stick to same family over SOCKS proxy
  69. 8. TELNET
  70. 8.1 TELNET and time limitations don't work
  71. 8.2 Microsoft telnet server
  72. 9. SFTP and SCP
  73. 9.1 SFTP doesn't do CURLOPT_POSTQUOTE correct
  74. 10. SOCKS
  75. 10.1 SOCKS proxy connections are done blocking
  76. 10.2 SOCKS don't support timeouts
  77. 10.3 FTPS over SOCKS
  78. 10.4 active FTP over a SOCKS
  79. 11. Internals
  80. 11.1 Curl leaks .onion hostnames in DNS
  81. 11.2 error buffer not set if connection to multiple addresses fails
  82. 11.3 c-ares deviates from stock resolver on http://1346569778
  83. 11.4 HTTP test server 'connection-monitor' problems
  84. 11.5 Connection information when using TCP Fast Open
  85. 11.6 slow connect to localhost on Windows
  86. 12. LDAP and OpenLDAP
  87. 12.1 OpenLDAP hangs after returning results
  88. 13. TCP/IP
  89. 13.1 --interface for ipv6 binds to unusable IP address
  90. 14 DICT
  91. 14.1 DICT responses show the underlying protocol
  92. ==============================================================================
  93. 1. HTTP
  94. 1.1 CURLFORM_CONTENTLEN in an array
  95. It is not possible to pass a 64-bit value using CURLFORM_CONTENTLEN with
  96. CURLFORM_ARRAY, when compiled on 32-bit platforms that support 64-bit
  97. integers. This is because the underlying structure 'curl_forms' uses a dual
  98. purpose char* for storing these values in via casting. For more information
  99. see the now closed related issue:
  100. https://github.com/curl/curl/issues/608
  101. 1.2 Disabling HTTP Pipelining
  102. Disabling HTTP Pipelining when there are ongoing transfers can lead to
  103. heap corruption and crash. https://curl.haxx.se/bug/view.cgi?id=1411
  104. Similarly, removing a handle when pipelining corrupts data:
  105. https://github.com/curl/curl/issues/2101
  106. 1.3 STARTTRANSFER time is wrong for HTTP POSTs
  107. Wrong STARTTRANSFER timer accounting for POST requests Timer works fine with
  108. GET requests, but while using POST the time for CURLINFO_STARTTRANSFER_TIME
  109. is wrong. While using POST CURLINFO_STARTTRANSFER_TIME minus
  110. CURLINFO_PRETRANSFER_TIME is near to zero every time.
  111. https://github.com/curl/curl/issues/218
  112. https://curl.haxx.se/bug/view.cgi?id=1213
  113. 1.4 multipart formposts file name encoding
  114. When creating multipart formposts. The file name part can be encoded with
  115. something beyond ascii but currently libcurl will only pass in the verbatim
  116. string the app provides. There are several browsers that already do this
  117. encoding. The key seems to be the updated draft to RFC2231:
  118. https://tools.ietf.org/html/draft-reschke-rfc2231-in-http-02
  119. 1.5 Expect-100 meets 417
  120. If an upload using Expect: 100-continue receives an HTTP 417 response, it
  121. ought to be automatically resent without the Expect:. A workaround is for
  122. the client application to redo the transfer after disabling Expect:.
  123. https://curl.haxx.se/mail/archive-2008-02/0043.html
  124. 1.6 Unnecessary close when 401 received waiting for 100
  125. libcurl closes the connection if an HTTP 401 reply is received while it is
  126. waiting for the the 100-continue response.
  127. https://curl.haxx.se/mail/lib-2008-08/0462.html
  128. 1.7 Deflate error after all content was received
  129. There's a situation where we can get an error in a HTTP response that is
  130. compressed, when that error is detected after all the actual body contents
  131. have been received and delivered to the appliction. This is tricky, but is
  132. ultimately a broken server.
  133. See https://github.com/curl/curl/issues/2719
  134. 1.9 HTTP/2 frames while in the connection pool kill reuse
  135. If the server sends HTTP/2 frames (like for example an HTTP/2 PING frame) to
  136. curl while the connection is held in curl's connection pool, the socket will
  137. be found readable when considered for reuse and that makes curl think it is
  138. dead and then it will be closed and a new connection gets created instead.
  139. This is *best* fixed by adding monitoring to connections while they are kept
  140. in the pool so that pings can be responded to appropriately.
  141. 1.10 Strips trailing dot from host name
  142. When given a URL with a trailing dot for the host name part:
  143. "https://example.com./", libcurl will strip off the dot and use the name
  144. without a dot internally and send it dot-less in HTTP Host: headers and in
  145. the TLS SNI field. For the purpose of resolving the name to an address
  146. the hostname is used as is without any change.
  147. The HTTP part violates RFC 7230 section 5.4 but the SNI part is accordance
  148. with RFC 6066 section 3.
  149. URLs using these trailing dots are very rare in the wild and we have not seen
  150. or gotten any real-world problems with such URLs reported. The popular
  151. browsers seem to have stayed with not stripping the dot for both uses (thus
  152. they violate RFC 6066 instead of RFC 7230).
  153. Daniel took the discussion to the HTTPbis mailing list in March 2016:
  154. https://lists.w3.org/Archives/Public/ietf-http-wg/2016JanMar/0430.html but
  155. there was not major rush or interest to fix this. The impression I get is
  156. that most HTTP people rather not rock the boat now and instead prioritize web
  157. compatibility rather than to strictly adhere to these RFCs.
  158. Our current approach allows a knowing client to send a custom HTTP header
  159. with the dot added.
  160. In a few cases there is a difference in name resolving to IP addresses with
  161. a trailing dot, but it can be noted that many HTTP servers will not happily
  162. accept the trailing dot there unless that has been specifically configured
  163. to be a fine virtual host.
  164. If URLs with trailing dots for host names become more popular or even just
  165. used more than for just plain fun experiments, I'm sure we will have reason
  166. to go back and reconsider.
  167. See https://github.com/curl/curl/issues/716 for the discussion.
  168. 1.11 CURLOPT_SEEKFUNCTION not called with CURLFORM_STREAM
  169. I'm using libcurl to POST form data using a FILE* with the CURLFORM_STREAM
  170. option of curl_formadd(). I've noticed that if the connection drops at just
  171. the right time, the POST is reattempted without the data from the file. It
  172. seems like the file stream position isn't getting reset to the beginning of
  173. the file. I found the CURLOPT_SEEKFUNCTION option and set that with a
  174. function that performs an fseek() on the FILE*. However, setting that didn't
  175. seem to fix the issue or even get called. See
  176. https://github.com/curl/curl/issues/768
  177. 2. TLS
  178. 2.1 CURLINFO_SSL_VERIFYRESULT has limited support
  179. CURLINFO_SSL_VERIFYRESULT is only implemented for the OpenSSL and NSS
  180. backends, so relying on this information in a generic app is flaky.
  181. 2.2 DER in keychain
  182. Curl doesn't recognize certificates in DER format in keychain, but it works
  183. with PEM. https://curl.haxx.se/bug/view.cgi?id=1065
  184. 2.3 GnuTLS backend skips really long certificate fields
  185. libcurl calls gnutls_x509_crt_get_dn() with a fixed buffer size and if the
  186. field is too long in the cert, it'll just return an error and the field will
  187. be displayed blank.
  188. 2.4 DarwinSSL won't import PKCS#12 client certificates without a password
  189. libcurl calls SecPKCS12Import with the PKCS#12 client certificate, but that
  190. function rejects certificates that do not have a password.
  191. https://github.com/curl/curl/issues/1308
  192. 2.5 Client cert handling with Issuer DN differs between backends
  193. When the specified client certificate doesn't match any of the
  194. server-specified DNs, the OpenSSL and GnuTLS backends behave differently.
  195. The github discussion may contain a solution.
  196. See https://github.com/curl/curl/issues/1411
  197. 2.6 CURL_GLOBAL_SSL
  198. Since libcurl 7.57.0, the flag CURL_GLOBAL_SSL is a no-op. The change was
  199. merged in https://github.com/curl/curl/commit/d661b0afb571a
  200. It was removed since it was
  201. A) never clear for applications on how to deal with init in the light of
  202. different SSL backends (the option was added back in the days when life
  203. was simpler)
  204. B) multissl introduced dynamic switching between SSL backends which
  205. emphasized (A) even more
  206. C) libcurl uses some TLS backend functionality even for non-TLS functions (to
  207. get "good" random) so applications trying to avoid the init for
  208. performance reasons would do wrong anyway
  209. D) never very carefully documented so all this mostly just happened to work
  210. for some users
  211. However, in spite of the problems with the feature, there were some users who
  212. apparently depended on this feature and who now claim libcurl is broken for
  213. them. The fix for this situation is not obvious as a downright revert of the
  214. patch is totally ruled out due to those reasons above.
  215. https://github.com/curl/curl/issues/2276
  216. 2.7 Client cert (MTLS) issues with Schannel
  217. See https://github.com/curl/curl/issues/3145
  218. 3. Email protocols
  219. 3.1 IMAP SEARCH ALL truncated response
  220. IMAP "SEARCH ALL" truncates output on large boxes. "A quick search of the
  221. code reveals that pingpong.c contains some truncation code, at line 408, when
  222. it deems the server response to be too large truncating it to 40 characters"
  223. https://curl.haxx.se/bug/view.cgi?id=1366
  224. 3.2 No disconnect command
  225. The disconnect commands (LOGOUT and QUIT) may not be sent by IMAP, POP3 and
  226. SMTP if a failure occurs during the authentication phase of a connection.
  227. 3.3 SMTP to multiple recipients
  228. When sending data to multiple recipients, curl will abort and return failure
  229. if one of the recipients indicate failure (on the "RCPT TO"
  230. command). Ordinary mail programs would proceed and still send to the ones
  231. that can receive data. This is subject for change in the future.
  232. https://curl.haxx.se/bug/view.cgi?id=1116
  233. 3.4 POP3 expects "CRLF.CRLF" eob for some single-line responses
  234. You have to tell libcurl not to expect a body, when dealing with one line
  235. response commands. Please see the POP3 examples and test cases which show
  236. this for the NOOP and DELE commands. https://curl.haxx.se/bug/?i=740
  237. 4. Command line
  238. 4.1 -J and -O with %-encoded file names
  239. -J/--remote-header-name doesn't decode %-encoded file names. RFC6266 details
  240. how it should be done. The can of worm is basically that we have no charset
  241. handling in curl and ascii >=128 is a challenge for us. Not to mention that
  242. decoding also means that we need to check for nastiness that is attempted,
  243. like "../" sequences and the like. Probably everything to the left of any
  244. embedded slashes should be cut off.
  245. https://curl.haxx.se/bug/view.cgi?id=1294
  246. -O also doesn't decode %-encoded names, and while it has even less
  247. information about the charset involved the process is similar to the -J case.
  248. Note that we won't add decoding to -O without the user asking for it with
  249. some other means as well, since -O has always been documented to use the name
  250. exactly as specified in the URL.
  251. 4.2 -J with -C - fails
  252. When using -J (with -O), automatically resumed downloading together with "-C
  253. -" fails. Without -J the same command line works! This happens because the
  254. resume logic is worked out before the target file name (and thus its
  255. pre-transfer size) has been figured out!
  256. https://curl.haxx.se/bug/view.cgi?id=1169
  257. 4.3 --retry and transfer timeouts
  258. If using --retry and the transfer timeouts (possibly due to using -m or
  259. -y/-Y) the next attempt doesn't resume the transfer properly from what was
  260. downloaded in the previous attempt but will truncate and restart at the
  261. original position where it was at before the previous failed attempt. See
  262. https://curl.haxx.se/mail/lib-2008-01/0080.html and Mandriva bug report
  263. https://qa.mandriva.com/show_bug.cgi?id=22565
  264. 4.4 --upload-file . hangs if delay in STDIN
  265. "(echo start; sleep 1; echo end) | curl --upload-file . http://mywebsite -vv"
  266. ... causes a hang when it shouldn't.
  267. See https://github.com/curl/curl/issues/2051
  268. 4.5 Improve --data-urlencode space encoding
  269. ASCII space characters in --data-urlencode are currently encoded as %20
  270. rather than +, which RFC 1866 says should be used.
  271. See https://github.com/curl/curl/issues/3229
  272. 5. Build and portability issues
  273. 5.1 tests not compatible with python3
  274. The smb test server still needs python2.
  275. See https://github.com/curl/curl/issues/3289
  276. 5.2 curl-config --libs contains private details
  277. "curl-config --libs" will include details set in LDFLAGS when configure is
  278. run that might be needed only for building libcurl. Further, curl-config
  279. --cflags suffers from the same effects with CFLAGS/CPPFLAGS.
  280. 5.3 curl compiled on OSX 10.13 failed to run on OSX 10.10
  281. See https://github.com/curl/curl/issues/2905
  282. 5.4 Cannot compile against a static build of OpenLDAP
  283. See https://github.com/curl/curl/issues/2367
  284. 5.5 can't handle Unicode arguments in Windows
  285. If a URL or filename can't be encoded using the user's current codepage then
  286. it can only be encoded properly in the Unicode character set. Windows uses
  287. UTF-16 encoding for Unicode and stores it in wide characters, however curl
  288. and libcurl are not equipped for that at the moment. And, except for Cygwin,
  289. Windows can't use UTF-8 as a locale.
  290. https://curl.haxx.se/bug/?i=345
  291. https://curl.haxx.se/bug/?i=731
  292. 5.6 cmake support gaps
  293. The cmake build setup lacks several features that the autoconf build
  294. offers. This includes:
  295. - use of correct soname for the shared library build
  296. - support for several TLS backends are missing
  297. - the unit tests cause link failures in regular non-static builds
  298. - no nghttp2 check
  299. - unusable tool_hugehelp.c with MinGW, see
  300. https://github.com/curl/curl/issues/3125
  301. 5.7 Visual Studio project gaps
  302. The Visual Studio projects lack some features that the autoconf and nmake
  303. builds offer, such as the following:
  304. - support for zlib and nghttp2
  305. - use of static runtime libraries
  306. - add the test suite components
  307. In addition to this the following could be implemented:
  308. - support for other development IDEs
  309. - add PATH environment variables for third-party DLLs
  310. 5.8 configure finding libs in wrong directory
  311. When the configure script checks for third-party libraries, it adds those
  312. directories to the LDFLAGS variable and then tries linking to see if it
  313. works. When successful, the found directory is kept in the LDFLAGS variable
  314. when the script continues to execute and do more tests and possibly check for
  315. more libraries.
  316. This can make subsequent checks for libraries wrongly detect another
  317. installation in a directory that was previously added to LDFLAGS by another
  318. library check!
  319. A possibly better way to do these checks would be to keep the pristine LDFLAGS
  320. even after successful checks and instead add those verified paths to a
  321. separate variable that only after all library checks have been performed gets
  322. appended to LDFLAGS.
  323. 5.9 Utilize Requires.private directives in libcurl.pc
  324. https://github.com/curl/curl/issues/864
  325. 6. Authentication
  326. 6.1 NTLM authentication and unicode
  327. NTLM authentication involving unicode user name or password only works
  328. properly if built with UNICODE defined together with the WinSSL/Schannel
  329. backend. The original problem was mentioned in:
  330. https://curl.haxx.se/mail/lib-2009-10/0024.html
  331. https://curl.haxx.se/bug/view.cgi?id=896
  332. The WinSSL/Schannel version verified to work as mentioned in
  333. https://curl.haxx.se/mail/lib-2012-07/0073.html
  334. 6.2 MIT Kerberos for Windows build
  335. libcurl fails to build with MIT Kerberos for Windows (KfW) due to KfW's
  336. library header files exporting symbols/macros that should be kept private to
  337. the KfW library. See ticket #5601 at https://krbdev.mit.edu/rt/
  338. 6.3 NTLM in system context uses wrong name
  339. NTLM authentication using SSPI (on Windows) when (lib)curl is running in
  340. "system context" will make it use wrong(?) user name - at least when compared
  341. to what winhttp does. See https://curl.haxx.se/bug/view.cgi?id=535
  342. 6.4 Negotiate and Kerberos V5 need a fake user name
  343. In order to get Negotiate (SPNEGO) authentication to work in HTTP or Kerberos
  344. V5 in the e-mail protocols, you need to provide a (fake) user name (this
  345. concerns both curl and the lib) because the code wrongly only considers
  346. authentication if there's a user name provided by setting
  347. conn->bits.user_passwd in url.c https://curl.haxx.se/bug/view.cgi?id=440 How?
  348. https://curl.haxx.se/mail/lib-2004-08/0182.html A possible solution is to
  349. either modify this variable to be set or introduce a variable such as
  350. new conn->bits.want_authentication which is set when any of the authentication
  351. options are set.
  352. 6.5 NTLM doesn't support password with § character
  353. https://github.com/curl/curl/issues/2120
  354. 6.6 libcurl can fail to try alternatives with --proxy-any
  355. When connecting via a proxy using --proxy-any, a failure to establish an
  356. authentication will cause libcurl to abort trying other options if the
  357. failed method has a higher preference than the alternatives. As an example,
  358. --proxy-any against a proxy which advertise Negotiate and NTLM, but which
  359. fails to set up Kerberos authentication won't proceed to try authentication
  360. using NTLM.
  361. https://github.com/curl/curl/issues/876
  362. 7. FTP
  363. 7.1 FTP without or slow 220 response
  364. If a connection is made to a FTP server but the server then just never sends
  365. the 220 response or otherwise is dead slow, libcurl will not acknowledge the
  366. connection timeout during that phase but only the "real" timeout - which may
  367. surprise users as it is probably considered to be the connect phase to most
  368. people. Brought up (and is being misunderstood) in:
  369. https://curl.haxx.se/bug/view.cgi?id=856
  370. 7.2 FTP with CONNECT and slow server
  371. When doing FTP over a socks proxy or CONNECT through HTTP proxy and the multi
  372. interface is used, libcurl will fail if the (passive) TCP connection for the
  373. data transfer isn't more or less instant as the code does not properly wait
  374. for the connect to be confirmed. See test case 564 for a first shot at a test
  375. case.
  376. 7.3 FTP with NOBODY and FAILONERROR
  377. It seems sensible to be able to use CURLOPT_NOBODY and CURLOPT_FAILONERROR
  378. with FTP to detect if a file exists or not, but it is not working:
  379. https://curl.haxx.se/mail/lib-2008-07/0295.html
  380. 7.4 FTP with ACCT
  381. When doing an operation over FTP that requires the ACCT command (but not when
  382. logging in), the operation will fail since libcurl doesn't detect this and
  383. thus fails to issue the correct command:
  384. https://curl.haxx.se/bug/view.cgi?id=635
  385. 7.5 ASCII FTP
  386. FTP ASCII transfers do not follow RFC959. They don't convert the data
  387. accordingly (not for sending nor for receiving). RFC 959 section 3.1.1.1
  388. clearly describes how this should be done:
  389. The sender converts the data from an internal character representation to
  390. the standard 8-bit NVT-ASCII representation (see the Telnet
  391. specification). The receiver will convert the data from the standard
  392. form to his own internal form.
  393. Since 7.15.4 at least line endings are converted.
  394. 7.6 FTP with NULs in URL parts
  395. FTP URLs passed to curl may contain NUL (0x00) in the RFC 1738 <user>,
  396. <password>, and <fpath> components, encoded as "%00". The problem is that
  397. curl_unescape does not detect this, but instead returns a shortened C string.
  398. From a strict FTP protocol standpoint, NUL is a valid character within RFC
  399. 959 <string>, so the way to handle this correctly in curl would be to use a
  400. data structure other than a plain C string, one that can handle embedded NUL
  401. characters. From a practical standpoint, most FTP servers would not
  402. meaningfully support NUL characters within RFC 959 <string>, anyway (e.g.,
  403. Unix pathnames may not contain NUL).
  404. 7.7 FTP and empty path parts in the URL
  405. libcurl ignores empty path parts in FTP URLs, whereas RFC1738 states that
  406. such parts should be sent to the server as 'CWD ' (without an argument). The
  407. only exception to this rule, is that we knowingly break this if the empty
  408. part is first in the path, as then we use the double slashes to indicate that
  409. the user wants to reach the root dir (this exception SHALL remain even when
  410. this bug is fixed).
  411. 7.8 Premature transfer end but healthy control channel
  412. When 'multi_done' is called before the transfer has been completed the normal
  413. way, it is considered a "premature" transfer end. In this situation, libcurl
  414. closes the connection assuming it doesn't know the state of the connection so
  415. it can't be reused for subsequent requests.
  416. With FTP however, this isn't necessarily true but there are a bunch of
  417. situations (listed in the ftp_done code) where it *could* keep the connection
  418. alive even in this situation - but the current code doesn't. Fixing this would
  419. allow libcurl to reuse FTP connections better.
  420. 7.9 Passive transfer tries only one IP address
  421. When doing FTP operations through a proxy at localhost, the reported spotted
  422. that curl only tried to connect once to the proxy, while it had multiple
  423. addresses and a failed connect on one address should make it try the next.
  424. After switching to passive mode (EPSV), curl should try all IP addresses for
  425. "localhost". Currently it tries ::1, but it should also try 127.0.0.1.
  426. See https://github.com/curl/curl/issues/1508
  427. 7.10 Stick to same family over SOCKS proxy
  428. When asked to do FTP over a SOCKS proxy, it might connect to the proxy (and
  429. then subsequently to the remote server) using for example IPv4. When doing
  430. the second connection, curl should make sure that the second connection is
  431. using the same IP protocol version as the first connection did and not try
  432. others, since the remote server will only accept the same.
  433. See https://curl.haxx.se/mail/archive-2018-07/0000.html
  434. 8. TELNET
  435. 8.1 TELNET and time limitations don't work
  436. When using telnet, the time limitation options don't work.
  437. https://curl.haxx.se/bug/view.cgi?id=846
  438. 8.2 Microsoft telnet server
  439. There seems to be a problem when connecting to the Microsoft telnet server.
  440. https://curl.haxx.se/bug/view.cgi?id=649
  441. 9. SFTP and SCP
  442. 9.1 SFTP doesn't do CURLOPT_POSTQUOTE correct
  443. When libcurl sends CURLOPT_POSTQUOTE commands when connected to a SFTP server
  444. using the multi interface, the commands are not being sent correctly and
  445. instead the connection is "cancelled" (the operation is considered done)
  446. prematurely. There is a half-baked (busy-looping) patch provided in the bug
  447. report but it cannot be accepted as-is. See
  448. https://curl.haxx.se/bug/view.cgi?id=748
  449. 10. SOCKS
  450. 10.1 SOCKS proxy connections are done blocking
  451. Both SOCKS5 and SOCKS4 proxy connections are done blocking, which is very bad
  452. when used with the multi interface.
  453. 10.2 SOCKS don't support timeouts
  454. The SOCKS4 connection codes don't properly acknowledge (connect) timeouts.
  455. According to bug #1556528, even the SOCKS5 connect code does not do it right:
  456. https://curl.haxx.se/bug/view.cgi?id=604
  457. When connecting to a SOCK proxy, the (connect) timeout is not properly
  458. acknowledged after the actual TCP connect (during the SOCKS "negotiate"
  459. phase).
  460. 10.3 FTPS over SOCKS
  461. libcurl doesn't support FTPS over a SOCKS proxy.
  462. 10.4 active FTP over a SOCKS
  463. libcurl doesn't support active FTP over a SOCKS proxy
  464. 11. Internals
  465. 11.1 Curl leaks .onion hostnames in DNS
  466. Curl sends DNS requests for hostnames with a .onion TLD. This leaks
  467. information about what the user is attempting to access, and violates this
  468. requirement of RFC7686: https://tools.ietf.org/html/rfc7686
  469. Issue: https://github.com/curl/curl/issues/543
  470. 11.2 error buffer not set if connection to multiple addresses fails
  471. If you ask libcurl to resolve a hostname like example.com to IPv6 addresses
  472. only. But you only have IPv4 connectivity. libcurl will correctly fail with
  473. CURLE_COULDNT_CONNECT. But the error buffer set by CURLOPT_ERRORBUFFER
  474. remains empty. Issue: https://github.com/curl/curl/issues/544
  475. 11.3 c-ares deviates from stock resolver on http://1346569778
  476. When using the socket resolvers, that URL becomes:
  477. * Rebuilt URL to: http://1346569778/
  478. * Trying 80.67.6.50...
  479. but with c-ares it instead says "Could not resolve: 1346569778 (Domain name
  480. not found)"
  481. See https://github.com/curl/curl/issues/893
  482. 11.4 HTTP test server 'connection-monitor' problems
  483. The 'connection-monitor' feature of the sws HTTP test server doesn't work
  484. properly if some tests are run in unexpected order. Like 1509 and then 1525.
  485. See https://github.com/curl/curl/issues/868
  486. 11.5 Connection information when using TCP Fast Open
  487. CURLINFO_LOCAL_PORT (and possibly a few other) fails when TCP Fast Open is
  488. enabled.
  489. See https://github.com/curl/curl/issues/1332
  490. 11.6 slow connect to localhost on Windows
  491. When connecting to "localhost" on Windows, curl will resolve the name for
  492. both ipv4 and ipv6 and try to connect to both happy eyeballs-style. Something
  493. in there does however make it take 200 milliseconds to succeed - which is the
  494. HAPPY_EYEBALLS_TIMEOUT define exactly. Lowering that define speeds up the
  495. connection, suggesting a problem in the HE handling.
  496. If we can *know* that we're talking to a local host, we should lower the
  497. happy eyeballs delay timeout for IPv6 (related: hardcode the "localhost"
  498. addresses, mentioned in TODO). Possibly we should reduce that delay for all.
  499. https://github.com/curl/curl/issues/2281
  500. 12. LDAP and OpenLDAP
  501. 12.1 OpenLDAP hangs after returning results
  502. By configuration defaults, openldap automatically chase referrals on
  503. secondary socket descriptors. The OpenLDAP backend is asynchronous and thus
  504. should monitor all socket descriptors involved. Currently, these secondary
  505. descriptors are not monitored, causing openldap library to never receive
  506. data from them.
  507. As a temporary workaround, disable referrals chasing by configuration.
  508. The fix is not easy: proper automatic referrals chasing requires a
  509. synchronous bind callback and monitoring an arbitrary number of socket
  510. descriptors for a single easy handle (currently limited to 5).
  511. Generic LDAP is synchronous: OK.
  512. See https://github.com/curl/curl/issues/622 and
  513. https://curl.haxx.se/mail/lib-2016-01/0101.html
  514. 13. TCP/IP
  515. 13.1 --interface for ipv6 binds to unusable IP address
  516. Since IPv6 provides a lot of addresses with different scope, binding to an
  517. IPv6 address needs to take the proper care so that it doesn't bind to a
  518. locally scoped address as that is bound to fail.
  519. https://github.com/curl/curl/issues/686
  520. 14. DICT
  521. 14.1 DICT responses show the underlying protocol
  522. When getting a DICT response, the protocol parts of DICT aren't stripped off
  523. from the output.
  524. https://github.com/curl/curl/issues/1809