TODO 48 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332
  1. _ _ ____ _
  2. ___| | | | _ \| |
  3. / __| | | | |_) | |
  4. | (__| |_| | _ <| |___
  5. \___|\___/|_| \_\_____|
  6. Things that could be nice to do in the future
  7. Things to do in project curl. Please tell us what you think, contribute and
  8. send us patches that improve things!
  9. Be aware that these are things that we could do, or have once been considered
  10. things we could do. If you want to work on any of these areas, please
  11. consider bringing it up for discussions first on the mailing list so that we
  12. all agree it is still a good idea for the project!
  13. All bugs documented in the KNOWN_BUGS document are subject for fixing!
  14. 1. libcurl
  15. 1.1 TFO support on Windows
  16. 1.2 More data sharing
  17. 1.3 struct lifreq
  18. 1.4 signal-based resolver timeouts
  19. 1.5 get rid of PATH_MAX
  20. 1.6 Modified buffer size approach
  21. 1.7 Support HTTP/2 for HTTP(S) proxies
  22. 1.8 CURLOPT_RESOLVE for any port number
  23. 1.9 Cache negative name resolves
  24. 1.10 auto-detect proxy
  25. 1.11 minimize dependencies with dynamically loaded modules
  26. 1.12 updated DNS server while running
  27. 1.13 c-ares and CURLOPT_OPENSOCKETFUNCTION
  28. 1.14 Typesafe curl_easy_setopt()
  29. 1.15 Monitor connections in the connection pool
  30. 1.16 Try to URL encode given URL
  31. 1.17 Add support for IRIs
  32. 1.18 try next proxy if one doesn't work
  33. 1.19 Timeout idle connections from the pool
  34. 1.20 SRV and URI DNS records
  35. 1.21 Have the URL API offer IDN decoding
  36. 1.22 CURLINFO_PAUSE_STATE
  37. 1.23 Offer API to flush the connection pool
  38. 1.24 TCP Fast Open for windows
  39. 1.25 Expose tried IP addresses that failed
  40. 1.26 CURL_REFUSE_CLEARTEXT
  41. 1.27 hardcode the "localhost" addresses
  42. 1.28 FD_CLOEXEC
  43. 1.29 Upgrade to websockets
  44. 2. libcurl - multi interface
  45. 2.1 More non-blocking
  46. 2.2 Better support for same name resolves
  47. 2.3 Non-blocking curl_multi_remove_handle()
  48. 2.4 Split connect and authentication process
  49. 2.5 Edge-triggered sockets should work
  50. 2.6 multi upkeep
  51. 3. Documentation
  52. 3.2 Provide cmake config-file
  53. 4. FTP
  54. 4.1 HOST
  55. 4.2 Alter passive/active on failure and retry
  56. 4.3 Earlier bad letter detection
  57. 4.4 REST for large files
  58. 4.5 ASCII support
  59. 4.6 GSSAPI via Windows SSPI
  60. 4.7 STAT for LIST without data connection
  61. 4.8 Option to ignore private IP addresses in PASV response
  62. 5. HTTP
  63. 5.1 Better persistency for HTTP 1.0
  64. 5.2 support FF3 sqlite cookie files
  65. 5.3 Rearrange request header order
  66. 5.4 Allow SAN names in HTTP/2 server push
  67. 5.5 auth= in URLs
  68. 5.6 Refuse "downgrade" redirects
  69. 5.7 QUIC
  70. 6. TELNET
  71. 6.1 ditch stdin
  72. 6.2 ditch telnet-specific select
  73. 6.3 feature negotiation debug data
  74. 7. SMTP
  75. 7.1 Pipelining
  76. 7.2 Enhanced capability support
  77. 7.3 Add CURLOPT_MAIL_CLIENT option
  78. 8. POP3
  79. 8.1 Pipelining
  80. 8.2 Enhanced capability support
  81. 9. IMAP
  82. 9.1 Enhanced capability support
  83. 10. LDAP
  84. 10.1 SASL based authentication mechanisms
  85. 11. SMB
  86. 11.1 File listing support
  87. 11.2 Honor file timestamps
  88. 11.3 Use NTLMv2
  89. 11.4 Create remote directories
  90. 12. New protocols
  91. 12.1 RSYNC
  92. 13. SSL
  93. 13.1 Disable specific versions
  94. 13.2 Provide mutex locking API
  95. 13.3 Support in-memory certs/ca certs/keys
  96. 13.4 Cache/share OpenSSL contexts
  97. 13.5 Export session ids
  98. 13.6 Provide callback for cert verification
  99. 13.7 improve configure --with-ssl
  100. 13.8 Support DANE
  101. 13.9 Configurable loading of OpenSSL configuration file
  102. 13.10 Support Authority Information Access certificate extension (AIA)
  103. 13.11 Support intermediate & root pinning for PINNEDPUBLICKEY
  104. 13.12 Support HSTS
  105. 13.13 Support HPKP
  106. 13.14 Support the clienthello extension
  107. 14. GnuTLS
  108. 14.1 SSL engine stuff
  109. 14.2 check connection
  110. 15. WinSSL/SChannel
  111. 15.1 Add support for client certificate authentication
  112. 15.3 Add support for the --ciphers option
  113. 15.4 Add option to disable client certificate auto-send
  114. 16. SASL
  115. 16.1 Other authentication mechanisms
  116. 16.2 Add QOP support to GSSAPI authentication
  117. 16.3 Support binary messages (i.e.: non-base64)
  118. 17. SSH protocols
  119. 17.1 Multiplexing
  120. 17.2 SFTP performance
  121. 17.3 Support better than MD5 hostkey hash
  122. 17.4 Support CURLOPT_PREQUOTE
  123. 18. Command line tool
  124. 18.1 sync
  125. 18.2 glob posts
  126. 18.3 prevent file overwriting
  127. 18.4 simultaneous parallel transfers
  128. 18.5 UTF-8 filenames in Content-Disposition
  129. 18.6 warning when setting an option
  130. 18.7 warning if curl version is not in sync with libcurl version
  131. 18.8 offer color-coded HTTP header output
  132. 18.9 Choose the name of file in braces for complex URLs
  133. 18.10 improve how curl works in a windows console window
  134. 18.11 Windows: set attribute 'archive' for completed downloads
  135. 18.12 keep running, read instructions from pipe/socket
  136. 18.13 support metalink in http headers
  137. 18.14 --fail without --location should treat 3xx as a failure
  138. 18.15 --retry should resume
  139. 18.16 send only part of --data
  140. 18.17 consider file name from the redirected URL with -O ?
  141. 18.18 retry on network is unreachable
  142. 18.19 expand ~/ in config files
  143. 18.20 host name sections in config files
  144. 19. Build
  145. 19.1 roffit
  146. 19.2 Enable PIE and RELRO by default
  147. 19.3 cmake test suite improvements
  148. 20. Test suite
  149. 20.1 SSL tunnel
  150. 20.2 nicer lacking perl message
  151. 20.3 more protocols supported
  152. 20.4 more platforms supported
  153. 20.5 Add support for concurrent connections
  154. 20.6 Use the RFC6265 test suite
  155. 20.7 Support LD_PRELOAD on macOS
  156. 21. Next SONAME bump
  157. 21.1 http-style HEAD output for FTP
  158. 21.2 combine error codes
  159. 21.3 extend CURLOPT_SOCKOPTFUNCTION prototype
  160. 22. Next major release
  161. 22.1 cleanup return codes
  162. 22.2 remove obsolete defines
  163. 22.3 size_t
  164. 22.4 remove several functions
  165. 22.5 remove CURLOPT_FAILONERROR
  166. 22.7 remove progress meter from libcurl
  167. 22.8 remove 'curl_httppost' from public
  168. ==============================================================================
  169. 1. libcurl
  170. 1.1 TFO support on Windows
  171. TCP Fast Open is supported on several platforms but not on Windows. Work on
  172. this was once started but never finished.
  173. See https://github.com/curl/curl/pull/3378
  174. 1.2 More data sharing
  175. curl_share_* functions already exist and work, and they can be extended to
  176. share more. For example, enable sharing of the ares channel.
  177. 1.3 struct lifreq
  178. Use 'struct lifreq' and SIOCGLIFADDR instead of 'struct ifreq' and
  179. SIOCGIFADDR on newer Solaris versions as they claim the latter is obsolete.
  180. To support IPv6 interface addresses for network interfaces properly.
  181. 1.4 signal-based resolver timeouts
  182. libcurl built without an asynchronous resolver library uses alarm() to time
  183. out DNS lookups. When a timeout occurs, this causes libcurl to jump from the
  184. signal handler back into the library with a sigsetjmp, which effectively
  185. causes libcurl to continue running within the signal handler. This is
  186. non-portable and could cause problems on some platforms. A discussion on the
  187. problem is available at https://curl.haxx.se/mail/lib-2008-09/0197.html
  188. Also, alarm() provides timeout resolution only to the nearest second. alarm
  189. ought to be replaced by setitimer on systems that support it.
  190. 1.5 get rid of PATH_MAX
  191. Having code use and rely on PATH_MAX is not nice:
  192. https://insanecoding.blogspot.com/2007/11/pathmax-simply-isnt.html
  193. Currently the SSH based code uses it a bit, but to remove PATH_MAX from there
  194. we need libssh2 to properly tell us when we pass in a too small buffer and
  195. its current API (as of libssh2 1.2.7) doesn't.
  196. 1.6 Modified buffer size approach
  197. Current libcurl allocates a fixed 16K size buffer for download and an
  198. additional 16K for upload. They are always unconditionally part of the easy
  199. handle. If CRLF translations are requested, an additional 32K "scratch
  200. buffer" is allocated. A total of 64K transfer buffers in the worst case.
  201. First, while the handles are not actually in use these buffers could be freed
  202. so that lingering handles just kept in queues or whatever waste less memory.
  203. Secondly, SFTP is a protocol that needs to handle many ~30K blocks at once
  204. since each need to be individually acked and therefore libssh2 must be
  205. allowed to send (or receive) many separate ones in parallel to achieve high
  206. transfer speeds. A current libcurl build with a 16K buffer makes that
  207. impossible, but one with a 512K buffer will reach MUCH faster transfers. But
  208. allocating 512K unconditionally for all buffers just in case they would like
  209. to do fast SFTP transfers at some point is not a good solution either.
  210. Dynamically allocate buffer size depending on protocol in use in combination
  211. with freeing it after each individual transfer? Other suggestions?
  212. 1.7 Support HTTP/2 for HTTP(S) proxies
  213. Support for doing HTTP/2 to HTTP and HTTPS proxies is still missing.
  214. 1.8 CURLOPT_RESOLVE for any port number
  215. This option allows applications to set a replacement IP address for a given
  216. host + port pair. Consider making support for providing a replacement address
  217. for the host name on all port numbers.
  218. See https://github.com/curl/curl/issues/1264
  219. 1.9 Cache negative name resolves
  220. A name resolve that has failed is likely to fail when made again within a
  221. short period of time. Currently we only cache positive responses.
  222. 1.10 auto-detect proxy
  223. libcurl could be made to detect the system proxy setup automatically and use
  224. that. On Windows, macOS and Linux desktops for example.
  225. The pull-request to use libproxy for this was deferred due to doubts on the
  226. reliability of the dependency and how to use it:
  227. https://github.com/curl/curl/pull/977
  228. libdetectproxy is a (C++) library for detecting the proxy on Windows
  229. https://github.com/paulharris/libdetectproxy
  230. 1.11 minimize dependencies with dynamically loaded modules
  231. We can create a system with loadable modules/plug-ins, where these modules
  232. would be the ones that link to 3rd party libs. That would allow us to avoid
  233. having to load ALL dependencies since only the necessary ones for this
  234. app/invoke/used protocols would be necessary to load. See
  235. https://github.com/curl/curl/issues/349
  236. 1.12 updated DNS server while running
  237. If /etc/resolv.conf gets updated while a program using libcurl is running, it
  238. is may cause name resolves to fail unless res_init() is called. We should
  239. consider calling res_init() + retry once unconditionally on all name resolve
  240. failures to mitigate against this. Firefox works like that. Note that Windows
  241. doesn't have res_init() or an alternative.
  242. https://github.com/curl/curl/issues/2251
  243. 1.13 c-ares and CURLOPT_OPENSOCKETFUNCTION
  244. curl will create most sockets via the CURLOPT_OPENSOCKETFUNCTION callback and
  245. close them with the CURLOPT_CLOSESOCKETFUNCTION callback. However, c-ares
  246. does not use those functions and instead opens and closes the sockets
  247. itself. This means that when curl passes the c-ares socket to the
  248. CURLMOPT_SOCKETFUNCTION it isn't owned by the application like other sockets.
  249. See https://github.com/curl/curl/issues/2734
  250. 1.14 Typesafe curl_easy_setopt()
  251. One of the most common problems in libcurl using applications is the lack of
  252. type checks for curl_easy_setopt() which happens because it accepts varargs
  253. and thus can take any type.
  254. One possible solution to this is to introduce a few different versions of the
  255. setopt version for the different kinds of data you can set.
  256. curl_easy_set_num() - sets a long value
  257. curl_easy_set_large() - sets a curl_off_t value
  258. curl_easy_set_ptr() - sets a pointer
  259. curl_easy_set_cb() - sets a callback PLUS its callback data
  260. 1.15 Monitor connections in the connection pool
  261. libcurl's connection cache or pool holds a number of open connections for the
  262. purpose of possible subsequent connection reuse. It may contain a few up to a
  263. significant amount of connections. Currently, libcurl leaves all connections
  264. as they are and first when a connection is iterated over for matching or
  265. reuse purpose it is verified that it is still alive.
  266. Those connections may get closed by the server side for idleness or they may
  267. get a HTTP/2 ping from the peer to verify that they're still alive. By adding
  268. monitoring of the connections while in the pool, libcurl can detect dead
  269. connections (and close them) better and earlier, and it can handle HTTP/2
  270. pings to keep such ones alive even when not actively doing transfers on them.
  271. 1.16 Try to URL encode given URL
  272. Given a URL that for example contains spaces, libcurl could have an option
  273. that would try somewhat harder than it does now and convert spaces to %20 and
  274. perhaps URL encoded byte values over 128 etc (basically do what the redirect
  275. following code already does).
  276. https://github.com/curl/curl/issues/514
  277. 1.17 Add support for IRIs
  278. IRIs (RFC 3987) allow localized, non-ascii, names in the URL. To properly
  279. support this, curl/libcurl would need to translate/encode the given input
  280. from the input string encoding into percent encoded output "over the wire".
  281. To make that work smoothly for curl users even on Windows, curl would
  282. probably need to be able to convert from several input encodings.
  283. 1.18 try next proxy if one doesn't work
  284. Allow an application to specify a list of proxies to try, and failing to
  285. connect to the first go on and try the next instead until the list is
  286. exhausted. Browsers support this feature at least when they specify proxies
  287. using PACs.
  288. https://github.com/curl/curl/issues/896
  289. 1.19 Timeout idle connections from the pool
  290. libcurl currently keeps connections in its connection pool for an indefinite
  291. period of time, until it either gets reused, gets noticed that it has been
  292. closed by the server or gets pruned to make room for a new connection.
  293. To reduce overhead (especially for when we add monitoring of the connections
  294. in the pool), we should introduce a timeout so that connections that have
  295. been idle for N seconds get closed.
  296. 1.20 SRV and URI DNS records
  297. Offer support for resolving SRV and URI DNS records for libcurl to know which
  298. server to connect to for various protocols (including HTTP!).
  299. 1.21 Have the URL API offer IDN decoding
  300. Similar to how URL decoding/encoding is done, we could have URL functions to
  301. convert IDN host names to punycode (probably not the reverse).
  302. https://github.com/curl/curl/issues/3232
  303. 1.22 CURLINFO_PAUSE_STATE
  304. Return information about the transfer's current pause state, in both
  305. directions. https://github.com/curl/curl/issues/2588
  306. 1.23 Offer API to flush the connection pool
  307. Sometimes applications want to flush all the existing connections kept alive.
  308. An API could allow a forced flush or just a forced loop that would properly
  309. close all connections that have been closed by the server already.
  310. 1.24 TCP Fast Open for windows
  311. libcurl supports the CURLOPT_TCP_FASTOPEN option since 7.49.0 for Linux and
  312. Mac OS. Windows supports TCP Fast Open starting with Windows 10, version 1607
  313. and we should add support for it.
  314. 1.25 Expose tried IP addresses that failed
  315. When libcurl fails to connect to a host, it should be able to offer the
  316. application the list of IP addresses that were used in the attempt.
  317. https://github.com/curl/curl/issues/2126
  318. 1.26 CURL_REFUSE_CLEARTEXT
  319. An environment variable that when set will make libcurl refuse to use any
  320. cleartext network protocol. That's all non-encrypted ones (FTP, HTTP, Gopher,
  321. etc). By adding the check to libcurl and not just curl, this environment
  322. variable can then help users to block all libcurl-using programs from
  323. accessing the network using unsafe protocols.
  324. The variable could be given some sort of syntax or different levels and be
  325. used to also allow for example users to refuse libcurl to do transfers with
  326. HTTPS certificate checks disabled.
  327. It could also automatically refuse usernames in URLs when set
  328. (see CURLOPT_DISALLOW_USERNAME_IN_URL)
  329. 1.27 hardcode the "localhost" addresses
  330. There's this new spec getting adopted that says "localhost" should always and
  331. unconditionally be a local address and not get resolved by a DNS server. A
  332. fine way for curl to fix this would be to simply hard-code the response to
  333. 127.0.0.1 and/or ::1 (depending on what IP versions that are requested). This
  334. is what the browsers probably will do with this hostname.
  335. https://bugzilla.mozilla.org/show_bug.cgi?id=1220810
  336. https://tools.ietf.org/html/draft-ietf-dnsop-let-localhost-be-localhost-02
  337. 1.28 FD_CLOEXEC
  338. It sets the close-on-exec flag for the file descriptor, which causes the file
  339. descriptor to be automatically (and atomically) closed when any of the
  340. exec-family functions succeed. Should probably be set by default?
  341. https://github.com/curl/curl/issues/2252
  342. 1.29 Upgrade to websockets
  343. libcurl could offer a smoother path to get to a websocket connection.
  344. See https://github.com/curl/curl/issues/3523
  345. Michael Kaufmann suggestion here:
  346. https://curl.haxx.se/video/curlup-2017/2017-03-19_05_Michael_Kaufmann_Websocket_support_for_curl.mp4
  347. 2. libcurl - multi interface
  348. 2.1 More non-blocking
  349. Make sure we don't ever loop because of non-blocking sockets returning
  350. EWOULDBLOCK or similar. Blocking cases include:
  351. - Name resolves on non-windows unless c-ares or the threaded resolver is used
  352. - SOCKS proxy handshakes
  353. - file:// transfers
  354. - TELNET transfers
  355. - The "DONE" operation (post transfer protocol-specific actions) for the
  356. protocols SFTP, SMTP, FTP. Fixing Curl_done() for this is a worthy task.
  357. 2.2 Better support for same name resolves
  358. If a name resolve has been initiated for name NN and a second easy handle
  359. wants to resolve that name as well, make it wait for the first resolve to end
  360. up in the cache instead of doing a second separate resolve. This is
  361. especially needed when adding many simultaneous handles using the same host
  362. name when the DNS resolver can get flooded.
  363. 2.3 Non-blocking curl_multi_remove_handle()
  364. The multi interface has a few API calls that assume a blocking behavior, like
  365. add_handle() and remove_handle() which limits what we can do internally. The
  366. multi API need to be moved even more into a single function that "drives"
  367. everything in a non-blocking manner and signals when something is done. A
  368. remove or add would then only ask for the action to get started and then
  369. multi_perform() etc still be called until the add/remove is completed.
  370. 2.4 Split connect and authentication process
  371. The multi interface treats the authentication process as part of the connect
  372. phase. As such any failures during authentication won't trigger the relevant
  373. QUIT or LOGOFF for protocols such as IMAP, POP3 and SMTP.
  374. 2.5 Edge-triggered sockets should work
  375. The multi_socket API should work with edge-triggered socket events. One of
  376. the internal actions that need to be improved for this to work perfectly is
  377. the 'maxloops' handling in transfer.c:readwrite_data().
  378. 2.6 multi upkeep
  379. In libcurl 7.62.0 we introduced curl_easy_upkeep. It unfortunately only works
  380. on easy handles. We should introduces a version of that for the multi handle,
  381. and also consider doing "upkeep" automatically on connections in the
  382. connection pool when the multi handle is in used.
  383. See https://github.com/curl/curl/issues/3199
  384. 3. Documentation
  385. 3.2 Provide cmake config-file
  386. A config-file package is a set of files provided by us to allow applications
  387. to write cmake scripts to find and use libcurl easier. See
  388. https://github.com/curl/curl/issues/885
  389. 4. FTP
  390. 4.1 HOST
  391. HOST is a command for a client to tell which host name to use, to offer FTP
  392. servers named-based virtual hosting:
  393. https://tools.ietf.org/html/rfc7151
  394. 4.2 Alter passive/active on failure and retry
  395. When trying to connect passively to a server which only supports active
  396. connections, libcurl returns CURLE_FTP_WEIRD_PASV_REPLY and closes the
  397. connection. There could be a way to fallback to an active connection (and
  398. vice versa). https://curl.haxx.se/bug/feature.cgi?id=1754793
  399. 4.3 Earlier bad letter detection
  400. Make the detection of (bad) %0d and %0a codes in FTP URL parts earlier in the
  401. process to avoid doing a resolve and connect in vain.
  402. 4.4 REST for large files
  403. REST fix for servers not behaving well on >2GB requests. This should fail if
  404. the server doesn't set the pointer to the requested index. The tricky
  405. (impossible?) part is to figure out if the server did the right thing or not.
  406. 4.5 ASCII support
  407. FTP ASCII transfers do not follow RFC959. They don't convert the data
  408. accordingly.
  409. 4.6 GSSAPI via Windows SSPI
  410. In addition to currently supporting the SASL GSSAPI mechanism (Kerberos V5)
  411. via third-party GSS-API libraries, such as Heimdal or MIT Kerberos, also add
  412. support for GSSAPI authentication via Windows SSPI.
  413. 4.7 STAT for LIST without data connection
  414. Some FTP servers allow STAT for listing directories instead of using LIST,
  415. and the response is then sent over the control connection instead of as the
  416. otherwise usedw data connection: https://www.nsftools.com/tips/RawFTP.htm#STAT
  417. This is not detailed in any FTP specification.
  418. 4.8 Option to ignore private IP addresses in PASV response
  419. Some servers respond with and some other FTP client implementations can
  420. ignore private (RFC 1918 style) IP addresses when received in PASV responses.
  421. To consider for libcurl as well. See https://github.com/curl/curl/issues/1455
  422. 5. HTTP
  423. 5.1 Better persistency for HTTP 1.0
  424. "Better" support for persistent connections over HTTP 1.0
  425. https://curl.haxx.se/bug/feature.cgi?id=1089001
  426. 5.2 support FF3 sqlite cookie files
  427. Firefox 3 is changing from its former format to a a sqlite database instead.
  428. We should consider how (lib)curl can/should support this.
  429. https://curl.haxx.se/bug/feature.cgi?id=1871388
  430. 5.3 Rearrange request header order
  431. Server implementors often make an effort to detect browser and to reject
  432. clients it can detect to not match. One of the last details we cannot yet
  433. control in libcurl's HTTP requests, which also can be exploited to detect
  434. that libcurl is in fact used even when it tries to impersonate a browser, is
  435. the order of the request headers. I propose that we introduce a new option in
  436. which you give headers a value, and then when the HTTP request is built it
  437. sorts the headers based on that number. We could then have internally created
  438. headers use a default value so only headers that need to be moved have to be
  439. specified.
  440. 5.4 Allow SAN names in HTTP/2 server push
  441. curl only allows HTTP/2 push promise if the provided :autority header value
  442. exactly matches the host name given in the URL. It could be extended to allow
  443. any name that would match the Subject Alternative Names in the server's TLS
  444. certificate.
  445. See https://github.com/curl/curl/pull/3581
  446. 5.5 auth= in URLs
  447. Add the ability to specify the preferred authentication mechanism to use by
  448. using ;auth=<mech> in the login part of the URL.
  449. For example:
  450. http://test:pass;auth=NTLM@example.com would be equivalent to specifying --user
  451. test:pass;auth=NTLM or --user test:pass --ntlm from the command line.
  452. Additionally this should be implemented for proxy base URLs as well.
  453. 5.6 Refuse "downgrade" redirects
  454. See https://github.com/curl/curl/issues/226
  455. Consider a way to tell curl to refuse to "downgrade" protocol with a redirect
  456. and/or possibly a bit that refuses redirect to change protocol completely.
  457. 5.7 QUIC
  458. The standardization process of QUIC has been taken to the IETF and can be
  459. followed on the [IETF QUIC Mailing
  460. list](https://www.ietf.org/mailman/listinfo/quic). I'd like us to get on the
  461. bandwagon. Ideally, this would be done with a separate library/project to
  462. handle the binary/framing layer in a similar fashion to how HTTP/2 is
  463. implemented. This, to allow other projects to benefit from the work and to
  464. thus broaden the interest and chance of others to participate.
  465. 6. TELNET
  466. 6.1 ditch stdin
  467. Reading input (to send to the remote server) on stdin is a crappy solution for
  468. library purposes. We need to invent a good way for the application to be able
  469. to provide the data to send.
  470. 6.2 ditch telnet-specific select
  471. Move the telnet support's network select() loop go away and merge the code
  472. into the main transfer loop. Until this is done, the multi interface won't
  473. work for telnet.
  474. 6.3 feature negotiation debug data
  475. Add telnet feature negotiation data to the debug callback as header data.
  476. 7. SMTP
  477. 7.1 Pipelining
  478. Add support for pipelining emails.
  479. 7.2 Enhanced capability support
  480. Add the ability, for an application that uses libcurl, to obtain the list of
  481. capabilities returned from the EHLO command.
  482. 7.3 Add CURLOPT_MAIL_CLIENT option
  483. Rather than use the URL to specify the mail client string to present in the
  484. HELO and EHLO commands, libcurl should support a new CURLOPT specifically for
  485. specifying this data as the URL is non-standard and to be honest a bit of a
  486. hack ;-)
  487. Please see the following thread for more information:
  488. https://curl.haxx.se/mail/lib-2012-05/0178.html
  489. 8. POP3
  490. 8.1 Pipelining
  491. Add support for pipelining commands.
  492. 8.2 Enhanced capability support
  493. Add the ability, for an application that uses libcurl, to obtain the list of
  494. capabilities returned from the CAPA command.
  495. 9. IMAP
  496. 9.1 Enhanced capability support
  497. Add the ability, for an application that uses libcurl, to obtain the list of
  498. capabilities returned from the CAPABILITY command.
  499. 10. LDAP
  500. 10.1 SASL based authentication mechanisms
  501. Currently the LDAP module only supports ldap_simple_bind_s() in order to bind
  502. to an LDAP server. However, this function sends username and password details
  503. using the simple authentication mechanism (as clear text). However, it should
  504. be possible to use ldap_bind_s() instead specifying the security context
  505. information ourselves.
  506. 11. SMB
  507. 11.1 File listing support
  508. Add support for listing the contents of a SMB share. The output should probably
  509. be the same as/similar to FTP.
  510. 11.2 Honor file timestamps
  511. The timestamp of the transferred file should reflect that of the original file.
  512. 11.3 Use NTLMv2
  513. Currently the SMB authentication uses NTLMv1.
  514. 11.4 Create remote directories
  515. Support for creating remote directories when uploading a file to a directory
  516. that doesn't exist on the server, just like --ftp-create-dirs.
  517. 12. New protocols
  518. 12.1 RSYNC
  519. There's no RFC for the protocol or an URI/URL format. An implementation
  520. should most probably use an existing rsync library, such as librsync.
  521. 13. SSL
  522. 13.1 Disable specific versions
  523. Provide an option that allows for disabling specific SSL versions, such as
  524. SSLv2 https://curl.haxx.se/bug/feature.cgi?id=1767276
  525. 13.2 Provide mutex locking API
  526. Provide a libcurl API for setting mutex callbacks in the underlying SSL
  527. library, so that the same application code can use mutex-locking
  528. independently of OpenSSL or GnutTLS being used.
  529. 13.3 Support in-memory certs/ca certs/keys
  530. You can specify the private and public keys for SSH/SSL as file paths. Some
  531. programs want to avoid using files and instead just pass them as in-memory
  532. data blobs. There's probably a challenge to make this work across the
  533. plethory of different TLS and SSH backends that curl supports.
  534. https://github.com/curl/curl/issues/2310
  535. 13.4 Cache/share OpenSSL contexts
  536. "Look at SSL cafile - quick traces look to me like these are done on every
  537. request as well, when they should only be necessary once per SSL context (or
  538. once per handle)". The major improvement we can rather easily do is to make
  539. sure we don't create and kill a new SSL "context" for every request, but
  540. instead make one for every connection and re-use that SSL context in the same
  541. style connections are re-used. It will make us use slightly more memory but
  542. it will libcurl do less creations and deletions of SSL contexts.
  543. Technically, the "caching" is probably best implemented by getting added to
  544. the share interface so that easy handles who want to and can reuse the
  545. context specify that by sharing with the right properties set.
  546. https://github.com/curl/curl/issues/1110
  547. 13.5 Export session ids
  548. Add an interface to libcurl that enables "session IDs" to get
  549. exported/imported. Cris Bailiff said: "OpenSSL has functions which can
  550. serialise the current SSL state to a buffer of your choice, and recover/reset
  551. the state from such a buffer at a later date - this is used by mod_ssl for
  552. apache to implement and SSL session ID cache".
  553. 13.6 Provide callback for cert verification
  554. OpenSSL supports a callback for customised verification of the peer
  555. certificate, but this doesn't seem to be exposed in the libcurl APIs. Could
  556. it be? There's so much that could be done if it were!
  557. 13.7 improve configure --with-ssl
  558. make the configure --with-ssl option first check for OpenSSL, then GnuTLS,
  559. then NSS...
  560. 13.8 Support DANE
  561. DNS-Based Authentication of Named Entities (DANE) is a way to provide SSL
  562. keys and certs over DNS using DNSSEC as an alternative to the CA model.
  563. https://www.rfc-editor.org/rfc/rfc6698.txt
  564. An initial patch was posted by Suresh Krishnaswamy on March 7th 2013
  565. (https://curl.haxx.se/mail/lib-2013-03/0075.html) but it was a too simple
  566. approach. See Daniel's comments:
  567. https://curl.haxx.se/mail/lib-2013-03/0103.html . libunbound may be the
  568. correct library to base this development on.
  569. Björn Stenberg wrote a separate initial take on DANE that was never
  570. completed.
  571. 13.9 Configurable loading of OpenSSL configuration file
  572. libcurl calls the OpenSSL function CONF_modules_load_file() in openssl.c,
  573. Curl_ossl_init(). "We regard any changes in the OpenSSL configuration as a
  574. security risk or at least as unnecessary."
  575. Please add a configuration switch or something similar to disable the
  576. CONF_modules_load_file() call.
  577. See https://github.com/curl/curl/issues/2724
  578. 13.10 Support Authority Information Access certificate extension (AIA)
  579. AIA can provide various things like CRLs but more importantly information
  580. about intermediate CA certificates that can allow validation path to be
  581. fulfilled when the HTTPS server doesn't itself provide them.
  582. Since AIA is about downloading certs on demand to complete a TLS handshake,
  583. it is probably a bit tricky to get done right.
  584. See https://github.com/curl/curl/issues/2793
  585. 13.11 Support intermediate & root pinning for PINNEDPUBLICKEY
  586. CURLOPT_PINNEDPUBLICKEY does not consider the hashes of intermediate & root
  587. certificates when comparing the pinned keys. Therefore it is not compatible
  588. with "HTTP Public Key Pinning" as there also intermediate and root certificates
  589. can be pinned. This is very useful as it prevents webadmins from "locking
  590. themself out of their servers".
  591. Adding this feature would make curls pinning 100% compatible to HPKP and allow
  592. more flexible pinning.
  593. 13.12 Support HSTS
  594. "HTTP Strict Transport Security" is TOFU (trust on first use), time-based
  595. features indicated by a HTTP header send by the webserver. It is widely used
  596. in browsers and it's purpose is to prevent insecure HTTP connections after
  597. a previous HTTPS connection. It protects against SSLStripping attacks.
  598. Doc: https://developer.mozilla.org/en-US/docs/Web/Security/HTTP_strict_transport_security
  599. RFC 6797: https://tools.ietf.org/html/rfc6797
  600. 13.13 Support HPKP
  601. "HTTP Public Key Pinning" is TOFU (trust on first use), time-based
  602. features indicated by a HTTP header send by the webserver. It's purpose is
  603. to prevent Man-in-the-middle attacks by trusted CAs by allowing webadmins
  604. to specify which CAs/certificates/public keys to trust when connection to
  605. their websites.
  606. It can be build based on PINNEDPUBLICKEY.
  607. Wikipedia: https://en.wikipedia.org/wiki/HTTP_Public_Key_Pinning
  608. OWASP: https://www.owasp.org/index.php/Certificate_and_Public_Key_Pinning
  609. Doc: https://developer.mozilla.org/de/docs/Web/Security/Public_Key_Pinning
  610. RFC: https://tools.ietf.org/html/draft-ietf-websec-key-pinning-21
  611. 13.14 Support the clienthello extension
  612. Certain stupid networks and middle boxes have a problem with SSL handshake
  613. pakets that are within a certain size range because how that sets some bits
  614. that previously (in older TLS version) were not set. The clienthello
  615. extension adds padding to avoid that size range.
  616. https://tools.ietf.org/html/rfc7685
  617. https://github.com/curl/curl/issues/2299
  618. 14. GnuTLS
  619. 14.1 SSL engine stuff
  620. Is this even possible?
  621. 14.2 check connection
  622. Add a way to check if the connection seems to be alive, to correspond to the
  623. SSL_peak() way we use with OpenSSL.
  624. 15. WinSSL/SChannel
  625. 15.1 Add support for client certificate authentication
  626. WinSSL/SChannel currently makes use of the OS-level system and user
  627. certificate and private key stores. This does not allow the application
  628. or the user to supply a custom client certificate using curl or libcurl.
  629. Therefore support for the existing -E/--cert and --key options should be
  630. implemented by supplying a custom certificate to the SChannel APIs, see:
  631. - Getting a Certificate for Schannel
  632. https://msdn.microsoft.com/en-us/library/windows/desktop/aa375447.aspx
  633. 15.3 Add support for the --ciphers option
  634. The cipher suites used by WinSSL/SChannel are configured on an OS-level
  635. instead of an application-level. This does not allow the application or
  636. the user to customize the configured cipher suites using curl or libcurl.
  637. Therefore support for the existing --ciphers option should be implemented
  638. by mapping the OpenSSL/GnuTLS cipher suites to the SChannel APIs, see
  639. - Specifying Schannel Ciphers and Cipher Strengths
  640. https://msdn.microsoft.com/en-us/library/windows/desktop/aa380161.aspx
  641. 15.4 Add option to disable client certificate auto-send
  642. Microsoft says "By default, Schannel will, with no notification to the client,
  643. attempt to locate a client certificate and send it to the server." That could
  644. be considered a privacy violation and unexpected.
  645. Some Windows users have come to expect that default behavior and to change the
  646. default to make it consistent with other SSL backends would be a breaking
  647. change. An option should be added that can be used to disable the default
  648. Schannel auto-send behavior.
  649. https://github.com/curl/curl/issues/2262
  650. 16. SASL
  651. 16.1 Other authentication mechanisms
  652. Add support for other authentication mechanisms such as OLP,
  653. GSS-SPNEGO and others.
  654. 16.2 Add QOP support to GSSAPI authentication
  655. Currently the GSSAPI authentication only supports the default QOP of auth
  656. (Authentication), whilst Kerberos V5 supports both auth-int (Authentication
  657. with integrity protection) and auth-conf (Authentication with integrity and
  658. privacy protection).
  659. 16.3 Support binary messages (i.e.: non-base64)
  660. Mandatory to support LDAP SASL authentication.
  661. 17. SSH protocols
  662. 17.1 Multiplexing
  663. SSH is a perfectly fine multiplexed protocols which would allow libcurl to do
  664. multiple parallel transfers from the same host using the same connection,
  665. much in the same spirit as HTTP/2 does. libcurl however does not take
  666. advantage of that ability but will instead always create a new connection for
  667. new transfers even if an existing connection already exists to the host.
  668. To fix this, libcurl would have to detect an existing connection and "attach"
  669. the new transfer to the existing one.
  670. 17.2 SFTP performance
  671. libcurl's SFTP transfer performance is sub par and can be improved, mostly by
  672. the approach mentioned in "1.6 Modified buffer size approach".
  673. 17.3 Support better than MD5 hostkey hash
  674. libcurl offers the CURLOPT_SSH_HOST_PUBLIC_KEY_MD5 option for verifying the
  675. server's key. MD5 is generally being deprecated so we should implement
  676. support for stronger hashing algorithms. libssh2 itself is what provides this
  677. underlying functionality and it supports at least SHA-1 as an alternative.
  678. SHA-1 is also being deprecated these days so we should consider working with
  679. libssh2 to instead offer support for SHA-256 or similar.
  680. 17.4 Support CURLOPT_PREQUOTE
  681. The two other QUOTE options are supported for SFTP, but this was left out for
  682. unknown reasons!
  683. 18. Command line tool
  684. 18.1 sync
  685. "curl --sync http://example.com/feed[1-100].rss" or
  686. "curl --sync http://example.net/{index,calendar,history}.html"
  687. Downloads a range or set of URLs using the remote name, but only if the
  688. remote file is newer than the local file. A Last-Modified HTTP date header
  689. should also be used to set the mod date on the downloaded file.
  690. 18.2 glob posts
  691. Globbing support for -d and -F, as in 'curl -d "name=foo[0-9]" URL'.
  692. This is easily scripted though.
  693. 18.3 prevent file overwriting
  694. Add an option that prevents curl from overwriting existing local files. When
  695. used, and there already is an existing file with the target file name
  696. (either -O or -o), a number should be appended (and increased if already
  697. existing). So that index.html becomes first index.html.1 and then
  698. index.html.2 etc.
  699. 18.4 simultaneous parallel transfers
  700. The client could be told to use maximum N simultaneous parallel transfers and
  701. then just make sure that happens. It should of course not make more than one
  702. connection to the same remote host. This would require the client to use the
  703. multi interface. https://curl.haxx.se/bug/feature.cgi?id=1558595
  704. Using the multi interface would also allow properly using parallel transfers
  705. with HTTP/2 and supporting HTTP/2 server push from the command line.
  706. 18.5 UTF-8 filenames in Content-Disposition
  707. RFC 6266 documents how UTF-8 names can be passed to a client in the
  708. Content-Disposition header, and curl does not support this.
  709. https://github.com/curl/curl/issues/1888
  710. 18.6 warning when setting an option
  711. Display a warning when libcurl returns an error when setting an option.
  712. This can be useful to tell when support for a particular feature hasn't been
  713. compiled into the library.
  714. 18.7 warning if curl version is not in sync with libcurl version
  715. This is usually a sign of a funny, weird or unexpected install situations
  716. that aren't always quickly nor easily detected by users. curl and libcurl are
  717. always released in sync and should use the same version numbers unless very
  718. special situations.
  719. 18.8 offer color-coded HTTP header output
  720. By offering different color output on the header name and the header
  721. contents, they could be made more readable and thus help users working on
  722. HTTP services.
  723. 18.9 Choose the name of file in braces for complex URLs
  724. When using braces to download a list of URLs and you use complicated names
  725. in the list of alternatives, it could be handy to allow curl to use other
  726. names when saving.
  727. Consider a way to offer that. Possibly like
  728. {partURL1:name1,partURL2:name2,partURL3:name3} where the name following the
  729. colon is the output name.
  730. See https://github.com/curl/curl/issues/221
  731. 18.10 improve how curl works in a windows console window
  732. If you pull the scrollbar when transferring with curl in a Windows console
  733. window, the transfer is interrupted and can get disconnected. This can
  734. probably be improved. See https://github.com/curl/curl/issues/322
  735. 18.11 Windows: set attribute 'archive' for completed downloads
  736. The archive bit (FILE_ATTRIBUTE_ARCHIVE, 0x20) separates files that shall be
  737. backed up from those that are either not ready or have not changed.
  738. Downloads in progress are neither ready to be backed up, nor should they be
  739. opened by a different process. Only after a download has been completed it's
  740. sensible to include it in any integer snapshot or backup of the system.
  741. See https://github.com/curl/curl/issues/3354
  742. 18.12 keep running, read instructions from pipe/socket
  743. Provide an option that makes curl not exit after the last URL (or even work
  744. without a given URL), and then make it read instructions passed on a pipe or
  745. over a socket to make further instructions so that a second subsequent curl
  746. invoke can talk to the still running instance and ask for transfers to get
  747. done, and thus maintain its connection pool, DNS cache and more.
  748. 18.13 support metalink in http headers
  749. Curl has support for downloading a metalink xml file, processing it, and then
  750. downloading the target of the metalink. This is done via the --metalink option.
  751. It would be nice if metalink also supported downloading via metalink
  752. information that is stored in HTTP headers (RFC 6249). Theoretically this could
  753. also be supported with the --metalink option.
  754. See https://tools.ietf.org/html/rfc6249
  755. See also https://lists.gnu.org/archive/html/bug-wget/2015-06/msg00034.html for
  756. an implematation of this in wget.
  757. 18.14 --fail without --location should treat 3xx as a failure
  758. To allow a command line like this to detect a redirect and consider it a
  759. failure:
  760. curl -v --fail -O https://example.com/curl-7.48.0.tar.gz
  761. ... --fail must treat 3xx responses as failures too. The least problematic
  762. way to implement this is probably to add that new logic in the command line
  763. tool only and not in the underlying CURLOPT_FAILONERROR logic.
  764. 18.15 --retry should resume
  765. When --retry is used and curl actually retries transfer, it should use the
  766. already transferred data and do a resumed transfer for the rest (when
  767. possible) so that it doesn't have to transfer the same data again that was
  768. already transferred before the retry.
  769. See https://github.com/curl/curl/issues/1084
  770. 18.16 send only part of --data
  771. When the user only wants to send a small piece of the data provided with
  772. --data or --data-binary, like when that data is a huge file, consider a way
  773. to specify that curl should only send a piece of that. One suggested syntax
  774. would be: "--data-binary @largefile.zip!1073741823-2147483647".
  775. See https://github.com/curl/curl/issues/1200
  776. 18.17 consider file name from the redirected URL with -O ?
  777. When a user gives a URL and uses -O, and curl follows a redirect to a new
  778. URL, the file name is not extracted and used from the newly redirected-to URL
  779. even if the new URL may have a much more sensible file name.
  780. This is clearly documented and helps for security since there's no surprise
  781. to users which file name that might get overwritten. But maybe a new option
  782. could allow for this or maybe -J should imply such a treatment as well as -J
  783. already allows for the server to decide what file name to use so it already
  784. provides the "may overwrite any file" risk.
  785. This is extra tricky if the original URL has no file name part at all since
  786. then the current code path will error out with an error message, and we can't
  787. *know* already at that point if curl will be redirected to a URL that has a
  788. file name...
  789. See https://github.com/curl/curl/issues/1241
  790. 18.18 retry on network is unreachable
  791. The --retry option retries transfers on "transient failures". We later added
  792. --retry-connrefused to also retry for "connection refused" errors.
  793. Suggestions have been brought to also allow retry on "network is unreachable"
  794. errors and while totally reasonable, maybe we should consider a way to make
  795. this more configurable than to add a new option for every new error people
  796. want to retry for?
  797. https://github.com/curl/curl/issues/1603
  798. 18.19 expand ~/ in config files
  799. For example .curlrc could benefit from being able to do this.
  800. See https://github.com/curl/curl/issues/2317
  801. 18.20 host name sections in config files
  802. config files would be more powerful if they could set different
  803. configurations depending on used URLs, host name or possibly origin. Then a
  804. default .curlrc could a specific user-agent only when doing requests against
  805. a certain site.
  806. 19. Build
  807. 19.1 roffit
  808. Consider extending 'roffit' to produce decent ASCII output, and use that
  809. instead of (g)nroff when building src/tool_hugehelp.c
  810. 19.2 Enable PIE and RELRO by default
  811. Especially when having programs that execute curl via the command line, PIE
  812. renders the exploitation of memory corruption vulnerabilities a lot more
  813. difficult. This can be attributed to the additional information leaks being
  814. required to conduct a successful attack. RELRO, on the other hand, masks
  815. different binary sections like the GOT as read-only and thus kills a handful
  816. of techniques that come in handy when attackers are able to arbitrarily
  817. overwrite memory. A few tests showed that enabling these features had close
  818. to no impact, neither on the performance nor on the general functionality of
  819. curl.
  820. 19.3 cmake test suite improvements
  821. The cmake build doesn't support 'make show' so it doesn't know which tests
  822. are in the makefile or not (making appveyor builds do many false warnings
  823. about it) nor does it support running the test suite if building out-of-tree.
  824. See https://github.com/curl/curl/issues/3109
  825. 20. Test suite
  826. 20.1 SSL tunnel
  827. Make our own version of stunnel for simple port forwarding to enable HTTPS
  828. and FTP-SSL tests without the stunnel dependency, and it could allow us to
  829. provide test tools built with either OpenSSL or GnuTLS
  830. 20.2 nicer lacking perl message
  831. If perl wasn't found by the configure script, don't attempt to run the tests
  832. but explain something nice why it doesn't.
  833. 20.3 more protocols supported
  834. Extend the test suite to include more protocols. The telnet could just do FTP
  835. or http operations (for which we have test servers).
  836. 20.4 more platforms supported
  837. Make the test suite work on more platforms. OpenBSD and Mac OS. Remove
  838. fork()s and it should become even more portable.
  839. 20.5 Add support for concurrent connections
  840. Tests 836, 882 and 938 were designed to verify that separate connections aren't
  841. used when using different login credentials in protocols that shouldn't re-use
  842. a connection under such circumstances.
  843. Unfortunately, ftpserver.pl doesn't appear to support multiple concurrent
  844. connections. The read while() loop seems to loop until it receives a disconnect
  845. from the client, where it then enters the waiting for connections loop. When
  846. the client opens a second connection to the server, the first connection hasn't
  847. been dropped (unless it has been forced - which we shouldn't do in these tests)
  848. and thus the wait for connections loop is never entered to receive the second
  849. connection.
  850. 20.6 Use the RFC6265 test suite
  851. A test suite made for HTTP cookies (RFC 6265) by Adam Barth is available at
  852. https://github.com/abarth/http-state/tree/master/tests
  853. It'd be really awesome if someone would write a script/setup that would run
  854. curl with that test suite and detect deviances. Ideally, that would even be
  855. incorporated into our regular test suite.
  856. 20.7 Support LD_PRELOAD on macOS
  857. LD_RELOAD doesn't work on macOS, but there are tests which require it to run
  858. properly. Look into making the preload support in runtests.pl portable such
  859. that it uses DYLD_INSERT_LIBRARIES on macOS.
  860. 21. Next SONAME bump
  861. 21.1 http-style HEAD output for FTP
  862. #undef CURL_FTP_HTTPSTYLE_HEAD in lib/ftp.c to remove the HTTP-style headers
  863. from being output in NOBODY requests over FTP
  864. 21.2 combine error codes
  865. Combine some of the error codes to remove duplicates. The original
  866. numbering should not be changed, and the old identifiers would be
  867. macroed to the new ones in an CURL_NO_OLDIES section to help with
  868. backward compatibility.
  869. Candidates for removal and their replacements:
  870. CURLE_FILE_COULDNT_READ_FILE => CURLE_REMOTE_FILE_NOT_FOUND
  871. CURLE_FTP_COULDNT_RETR_FILE => CURLE_REMOTE_FILE_NOT_FOUND
  872. CURLE_FTP_COULDNT_USE_REST => CURLE_RANGE_ERROR
  873. CURLE_FUNCTION_NOT_FOUND => CURLE_FAILED_INIT
  874. CURLE_LDAP_INVALID_URL => CURLE_URL_MALFORMAT
  875. CURLE_TFTP_NOSUCHUSER => CURLE_TFTP_ILLEGAL
  876. CURLE_TFTP_NOTFOUND => CURLE_REMOTE_FILE_NOT_FOUND
  877. CURLE_TFTP_PERM => CURLE_REMOTE_ACCESS_DENIED
  878. 21.3 extend CURLOPT_SOCKOPTFUNCTION prototype
  879. The current prototype only provides 'purpose' that tells what the
  880. connection/socket is for, but not any protocol or similar. It makes it hard
  881. for applications to differentiate on TCP vs UDP and even HTTP vs FTP and
  882. similar.
  883. 22. Next major release
  884. 22.1 cleanup return codes
  885. curl_easy_cleanup() returns void, but curl_multi_cleanup() returns a
  886. CURLMcode. These should be changed to be the same.
  887. 22.2 remove obsolete defines
  888. remove obsolete defines from curl/curl.h
  889. 22.3 size_t
  890. make several functions use size_t instead of int in their APIs
  891. 22.4 remove several functions
  892. remove the following functions from the public API:
  893. curl_getenv
  894. curl_mprintf (and variations)
  895. curl_strequal
  896. curl_strnequal
  897. They will instead become curlx_ - alternatives. That makes the curl app
  898. still capable of using them, by building with them from source.
  899. These functions have no purpose anymore:
  900. curl_multi_socket
  901. curl_multi_socket_all
  902. 22.5 remove CURLOPT_FAILONERROR
  903. Remove support for CURLOPT_FAILONERROR, it has gotten too kludgy and weird
  904. internally. Let the app judge success or not for itself.
  905. 22.7 remove progress meter from libcurl
  906. The internally provided progress meter output doesn't belong in the library.
  907. Basically no application wants it (apart from curl) but instead applications
  908. can and should do their own progress meters using the progress callback.
  909. The progress callback should then be bumped as well to get proper 64bit
  910. variable types passed to it instead of doubles so that big files work
  911. correctly.
  912. 22.8 remove 'curl_httppost' from public
  913. curl_formadd() was made to fill in a public struct, but the fact that the
  914. struct is public is never really used by application for their own advantage
  915. but instead often restricts how the form functions can or can't be modified.
  916. Changing them to return a private handle will benefit the implementation and
  917. allow us much greater freedoms while still maintaining a solid API and ABI.