xref: /curl/docs/TODO (revision a3b4ffd4)
1                                  _   _ ____  _
2                              ___| | | |  _ \| |
3                             / __| | | | |_) | |
4                            | (__| |_| |  _ <| |___
5                             \___|\___/|_| \_\_____|
6
7                Things that could be nice to do in the future
8
9 Things to do in project curl. Please tell us what you think, contribute and
10 send us patches that improve things.
11
12 Be aware that these are things that we could do, or have once been considered
13 things we could do. If you want to work on any of these areas, please
14 consider bringing it up for discussions first on the mailing list so that we
15 all agree it is still a good idea for the project.
16
17 All bugs documented in the KNOWN_BUGS document are subject for fixing.
18
19 1. libcurl
20 1.1 TFO support on Windows
21 1.2 Consult %APPDATA% also for .netrc
22 1.3 struct lifreq
23 1.4 alt-svc sharing
24 1.5 get rid of PATH_MAX
25 1.6 thread-safe sharing
26 1.8 CURLOPT_RESOLVE for any port number
27 1.9 Cache negative name resolves
28 1.10 auto-detect proxy
29 1.11 minimize dependencies with dynamically loaded modules
30 1.12 updated DNS server while running
31 1.13 c-ares and CURLOPT_OPENSOCKETFUNCTION
32 1.14 connect to multiple IPs in parallel
33 1.15 Monitor connections in the connection pool
34 1.16 Try to URL encode given URL
35 1.17 Add support for IRIs
36 1.18 try next proxy if one does not work
37 1.19 provide timing info for each redirect
38 1.20 SRV and URI DNS records
39 1.21 netrc caching and sharing
40 1.22 CURLINFO_PAUSE_STATE
41 1.23 Offer API to flush the connection pool
42 1.25 Expose tried IP addresses that failed
43 1.28 FD_CLOEXEC
44 1.29 WebSocket read callback
45 1.30 config file parsing
46 1.31 erase secrets from heap/stack after use
47 1.32 add asynch getaddrinfo support
48 1.33 make DoH inherit more transfer properties
49
50 2. libcurl - multi interface
51 2.1 More non-blocking
52 2.2 Better support for same name resolves
53 2.3 Non-blocking curl_multi_remove_handle()
54 2.4 Split connect and authentication process
55 2.5 Edge-triggered sockets should work
56 2.6 multi upkeep
57 2.7 Virtual external sockets
58 2.8 dynamically decide to use socketpair
59
60 3. Documentation
61 3.1 Improve documentation about fork safety
62
63 4. FTP
64 4.1 HOST
65 4.4 Support CURLOPT_PREQUOTE for directories listings
66 4.6 GSSAPI via Windows SSPI
67 4.7 STAT for LIST without data connection
68 4.8 Passive transfer could try other IP addresses
69
70 5. HTTP
71 5.1 Provide the error body from a CONNECT response
72 5.2 Obey Retry-After in redirects
73 5.3 Rearrange request header order
74 5.4 Allow SAN names in HTTP/2 server push
75 5.5 auth= in URLs
76 5.6 alt-svc should fallback if alt-svc does not work
77 5.7 Require HTTP version X or higher
78
79 6. TELNET
80 6.1 ditch stdin
81 6.2 ditch telnet-specific select
82 6.3 feature negotiation debug data
83 6.4 exit immediately upon connection if stdin is /dev/null
84
85 7. SMTP
86 7.1 Passing NOTIFY option to CURLOPT_MAIL_RCPT
87 7.2 Enhanced capability support
88 7.3 Add CURLOPT_MAIL_CLIENT option
89
90 8. POP3
91 8.2 Enhanced capability support
92
93 9. IMAP
94 9.1 Enhanced capability support
95 9.2 upload unread
96
97 10. LDAP
98 10.1 SASL based authentication mechanisms
99 10.2 CURLOPT_SSL_CTX_FUNCTION for LDAPS
100 10.3 Paged searches on LDAP server
101 10.4 Certificate-Based Authentication
102
103 11. SMB
104 11.1 File listing support
105 11.2 Honor file timestamps
106 11.3 Use NTLMv2
107 11.4 Create remote directories
108
109 12. FILE
110 12.1 Directory listing on non-POSIX
111
112 13. TLS
113 13.1 TLS-PSK with OpenSSL
114 13.2 TLS channel binding
115 13.3 Defeat TLS fingerprinting
116 13.4 Consider OCSP stapling by default
117 13.5 Export session ids
118 13.6 Provide callback for cert verification
119 13.7 Less memory massaging with Schannel
120 13.8 Support DANE
121 13.9 TLS record padding
122 13.10 Support Authority Information Access certificate extension (AIA)
123 13.11 Some TLS options are not offered for HTTPS proxies
124 13.13 Make sure we forbid TLS 1.3 post-handshake authentication
125 13.14 Support the clienthello extension
126 13.15 Select signature algorithms
127 13.16 Share the CA cache
128 13.17 Add missing features to TLS backends
129
130 15. Schannel
131 15.1 Extend support for client certificate authentication
132 15.2 Extend support for the --ciphers option
133 15.4 Add option to allow abrupt server closure
134
135 16. SASL
136 16.1 Other authentication mechanisms
137 16.2 Add QOP support to GSSAPI authentication
138
139 17. SSH protocols
140 17.1 Multiplexing
141 17.2 Handle growing SFTP files
142 17.3 Read keys from ~/.ssh/id_ecdsa, id_ed25519
143 17.4 Support CURLOPT_PREQUOTE
144 17.5 SSH over HTTPS proxy with more backends
145 17.6 SFTP with SCP://
146
147 18. Command line tool
148 18.1 sync
149 18.2 glob posts
150 18.4 --proxycommand
151 18.5 UTF-8 filenames in Content-Disposition
152 18.6 Option to make -Z merge lined based outputs on stdout
153 18.7 specify which response codes that make -f/--fail return error
154 18.9 Choose the name of file in braces for complex URLs
155 18.10 improve how curl works in a Windows console window
156 18.11 Windows: set attribute 'archive' for completed downloads
157 18.12 keep running, read instructions from pipe/socket
158 18.13 Acknowledge Ratelimit headers
159 18.14 --dry-run
160 18.15 --retry should resume
161 18.16 send only part of --data
162 18.17 consider filename from the redirected URL with -O ?
163 18.18 retry on network is unreachable
164 18.19 expand ~/ in config files
165 18.20 hostname sections in config files
166 18.21 retry on the redirected-to URL
167 18.23 Set the modification date on an uploaded file
168 18.24 Use multiple parallel transfers for a single download
169 18.25 Prevent terminal injection when writing to terminal
170 18.26 Custom progress meter update interval
171 18.27 -J and -O with %-encoded filenames
172 18.28 -J with -C -
173 18.29 --retry and transfer timeouts
174
175 19. Build
176 19.2 Enable PIE and RELRO by default
177 19.3 Do not use GNU libtool on OpenBSD
178 19.4 Package curl for Windows in a signed installer
179 19.5 make configure use --cache-file more and better
180
181 20. Test suite
182 20.1 SSL tunnel
183 20.2 nicer lacking perl message
184 20.3 more protocols supported
185 20.4 more platforms supported
186 20.6 Use the RFC 6265 test suite
187 20.8 Run web-platform-tests URL tests
188
189 21. MQTT
190 21.1 Support rate-limiting
191 21.2 Support MQTTS
192 21.3 Handle network blocks
193
194 22. TFTP
195 22.1 TFTP does not convert LF to CRLF for mode=netascii
196
197 23. Gopher
198 23.1 Handle network blocks
199
200==============================================================================
201
2021. libcurl
203
2041.1 TFO support on Windows
205
206 libcurl supports the CURLOPT_TCP_FASTOPEN option since 7.49.0 for Linux and
207 macOS. Windows supports TCP Fast Open starting with Windows 10, version 1607
208 and we should add support for it.
209
210 TCP Fast Open is supported on several platforms but not on Windows. Work on
211 this was once started but never finished.
212
213 See https://github.com/curl/curl/pull/3378
214
2151.2 Consult %APPDATA% also for .netrc
216
217 %APPDATA%\.netrc is not considered when running on Windows. should not it?
218
219 See https://github.com/curl/curl/issues/4016
220
2211.3 struct lifreq
222
223 Use 'struct lifreq' and SIOCGLIFADDR instead of 'struct ifreq' and
224 SIOCGIFADDR on newer Solaris versions as they claim the latter is obsolete.
225 To support IPv6 interface addresses for network interfaces properly.
226
2271.4 alt-svc sharing
228
229 The share interface could benefit from allowing the alt-svc cache to be
230 possible to share between easy handles.
231
232 See https://github.com/curl/curl/issues/4476
233
234 The share interface offers CURL_LOCK_DATA_CONNECT to have multiple easy
235 handle share a connection cache, but due to how connections are used they are
236 still not thread-safe when used shared.
237
238 See https://github.com/curl/curl/issues/4915 and lib1541.c
239
240 The share interface offers CURL_LOCK_DATA_HSTS to have multiple easy handle
241 share a HSTS cache, but this is not thread-safe.
242
2431.5 get rid of PATH_MAX
244
245 Having code use and rely on PATH_MAX is not nice:
246 https://insanecoding.blogspot.com/2007/11/pathmax-simply-isnt.html
247
248 Currently the libssh2 SSH based code uses it, but to remove PATH_MAX from
249 there we need libssh2 to properly tell us when we pass in a too small buffer
250 and its current API (as of libssh2 1.2.7) does not.
251
2521.6 thread-safe sharing
253
254 Using the share interface users can share some data between easy handles but
255 several of the sharing options are documented as not safe and supported to
256 share between multiple concurrent threads. Fixing this would enable more
257 users to share data in more powerful ways.
258
2591.8 CURLOPT_RESOLVE for any port number
260
261 This option allows applications to set a replacement IP address for a given
262 host + port pair. Consider making support for providing a replacement address
263 for the hostname on all port numbers.
264
265 See https://github.com/curl/curl/issues/1264
266
2671.9 Cache negative name resolves
268
269 A name resolve that has failed is likely to fail when made again within a
270 short period of time. Currently we only cache positive responses.
271
2721.10 auto-detect proxy
273
274 libcurl could be made to detect the system proxy setup automatically and use
275 that. On Windows, macOS and Linux desktops for example.
276
277 The pull-request to use libproxy for this was deferred due to doubts on the
278 reliability of the dependency and how to use it:
279 https://github.com/curl/curl/pull/977
280
281 libdetectproxy is a (C++) library for detecting the proxy on Windows
282 https://github.com/paulharris/libdetectproxy
283
2841.11 minimize dependencies with dynamically loaded modules
285
286 We can create a system with loadable modules/plug-ins, where these modules
287 would be the ones that link to 3rd party libs. That would allow us to avoid
288 having to load ALL dependencies since only the necessary ones for this
289 app/invoke/used protocols would be necessary to load. See
290 https://github.com/curl/curl/issues/349
291
2921.12 updated DNS server while running
293
294 If /etc/resolv.conf gets updated while a program using libcurl is running, it
295 is may cause name resolves to fail unless res_init() is called. We should
296 consider calling res_init() + retry once unconditionally on all name resolve
297 failures to mitigate against this. Firefox works like that. Note that Windows
298 does not have res_init() or an alternative.
299
300 https://github.com/curl/curl/issues/2251
301
3021.13 c-ares and CURLOPT_OPENSOCKETFUNCTION
303
304 curl creates most sockets via the CURLOPT_OPENSOCKETFUNCTION callback and
305 close them with the CURLOPT_CLOSESOCKETFUNCTION callback. However, c-ares
306 does not use those functions and instead opens and closes the sockets itself.
307 This means that when curl passes the c-ares socket to the
308 CURLMOPT_SOCKETFUNCTION it is not owned by the application like other
309 sockets.
310
311 See https://github.com/curl/curl/issues/2734
312
3131.14 connect to multiple IPs in parallel
314
315 curl currently implements the happy eyeball algorithm for connecting to the
316 IPv4 and IPv6 alternatives for a host in parallel, sticking with the
317 connection that "wins". We could implement a similar algorithm per individual
318 IP family as well when there are multiple available addresses: start with the
319 first address, then start a second attempt N milliseconds after and then a
320 third another N milliseconds later. That way there would be less waiting when
321 the first IP has problems. It also improves the connection timeout value
322 handling for multiple address situations.
323
3241.15 Monitor connections in the connection pool
325
326 libcurl's connection cache or pool holds a number of open connections for the
327 purpose of possible subsequent connection reuse. It may contain a few up to a
328 significant amount of connections. Currently, libcurl leaves all connections
329 as they are and first when a connection is iterated over for matching or
330 reuse purpose it is verified that it is still alive.
331
332 Those connections may get closed by the server side for idleness or they may
333 get an HTTP/2 ping from the peer to verify that they are still alive. By
334 adding monitoring of the connections while in the pool, libcurl can detect
335 dead connections (and close them) better and earlier, and it can handle
336 HTTP/2 pings to keep such ones alive even when not actively doing transfers
337 on them.
338
3391.16 Try to URL encode given URL
340
341 Given a URL that for example contains spaces, libcurl could have an option
342 that would try somewhat harder than it does now and convert spaces to %20 and
343 perhaps URL encoded byte values over 128 etc (basically do what the redirect
344 following code already does).
345
346 https://github.com/curl/curl/issues/514
347
3481.17 Add support for IRIs
349
350 IRIs (RFC 3987) allow localized, non-ASCII, names in the URL. To properly
351 support this, curl/libcurl would need to translate/encode the given input
352 from the input string encoding into percent encoded output "over the wire".
353
354 To make that work smoothly for curl users even on Windows, curl would
355 probably need to be able to convert from several input encodings.
356
3571.18 try next proxy if one does not work
358
359 Allow an application to specify a list of proxies to try, and failing to
360 connect to the first go on and try the next instead until the list is
361 exhausted. Browsers support this feature at least when they specify proxies
362 using PACs.
363
364 https://github.com/curl/curl/issues/896
365
3661.19 provide timing info for each redirect
367
368 curl and libcurl provide timing information via a set of different
369 time-stamps (CURLINFO_*_TIME). When curl is following redirects, those
370 returned time value are the accumulated sums. An improvement could be to
371 offer separate timings for each redirect.
372
373 https://github.com/curl/curl/issues/6743
374
3751.20 SRV and URI DNS records
376
377 Offer support for resolving SRV and URI DNS records for libcurl to know which
378 server to connect to for various protocols (including HTTP).
379
3801.21 netrc caching and sharing
381
382 The netrc file is read and parsed each time a connection is setup, which
383 means that if a transfer needs multiple connections for authentication or
384 redirects, the file might be reread (and parsed) multiple times. This makes
385 it impossible to provide the file as a pipe.
386
3871.22 CURLINFO_PAUSE_STATE
388
389 Return information about the transfer's current pause state, in both
390 directions. https://github.com/curl/curl/issues/2588
391
3921.23 Offer API to flush the connection pool
393
394 Sometimes applications want to flush all the existing connections kept alive.
395 An API could allow a forced flush or just a forced loop that would properly
396 close all connections that have been closed by the server already.
397
3981.25 Expose tried IP addresses that failed
399
400 When libcurl fails to connect to a host, it could offer the application the
401 addresses that were used in the attempt. Source + dest IP, source + dest port
402 and protocol (UDP or TCP) for each failure. Possibly as a callback. Perhaps
403 also provide "reason".
404
405 https://github.com/curl/curl/issues/2126
406
4071.28 FD_CLOEXEC
408
409 It sets the close-on-exec flag for the file descriptor, which causes the file
410 descriptor to be automatically (and atomically) closed when any of the
411 exec-family functions succeed. Should probably be set by default?
412
413 https://github.com/curl/curl/issues/2252
414
4151.29 WebSocket read callback
416
417 Call the read callback once the connection is established to allow sending
418 the first message in the connection.
419
420 https://github.com/curl/curl/issues/11402
421
4221.30 config file parsing
423
424 Consider providing an API, possibly in a separate companion library, for
425 parsing a config file like curl's -K/--config option to allow applications to
426 get the same ability to read curl options from files.
427
428 See https://github.com/curl/curl/issues/3698
429
4301.31 erase secrets from heap/stack after use
431
432 Introducing a concept and system to erase secrets from memory after use, it
433 could help mitigate and lessen the impact of (future) security problems etc.
434 However: most secrets are passed to libcurl as clear text from the
435 application and then clearing them within the library adds nothing...
436
437 https://github.com/curl/curl/issues/7268
438
4391.32 add asynch getaddrinfo support
440
441 Use getaddrinfo_a() to provide an asynch name resolver backend to libcurl
442 that does not use threads and does not depend on c-ares. The getaddrinfo_a
443 function is (probably?) glibc specific but that is a widely used libc among
444 our users.
445
446 https://github.com/curl/curl/pull/6746
447
4481.33 make DoH inherit more transfer properties
449
450 Some options are not inherited because they are not relevant for the DoH SSL
451 connections, or inheriting the option may result in unexpected behavior. For
452 example the user's debug function callback is not inherited because it would
453 be unexpected for internal handles (ie DoH handles) to be passed to that
454 callback.
455
456 If an option is not inherited then it is not possible to set it separately
457 for DoH without a DoH-specific option. For example:
458 CURLOPT_DOH_SSL_VERIFYHOST, CURLOPT_DOH_SSL_VERIFYPEER and
459 CURLOPT_DOH_SSL_VERIFYSTATUS.
460
461 See https://github.com/curl/curl/issues/6605
462
4632. libcurl - multi interface
464
4652.1 More non-blocking
466
467 Make sure we do not ever loop because of non-blocking sockets returning
468 EWOULDBLOCK or similar. Blocking cases include:
469
470 - Name resolves on non-Windows unless c-ares or the threaded resolver is used.
471
472 - The threaded resolver may block on cleanup:
473 https://github.com/curl/curl/issues/4852
474
475 - file:// transfers
476
477 - TELNET transfers
478
479 - GSSAPI authentication for FTP transfers
480
481 - The "DONE" operation (post transfer protocol-specific actions) for the
482 protocols SFTP, SMTP, FTP. Fixing multi_done() for this is a worthy task.
483
484 - curl_multi_remove_handle for any of the above. See section 2.3.
485
486 - Calling curl_ws_send() from a callback
487
4882.2 Better support for same name resolves
489
490 If a name resolve has been initiated for name NN and a second easy handle
491 wants to resolve that name as well, make it wait for the first resolve to end
492 up in the cache instead of doing a second separate resolve. This is
493 especially needed when adding many simultaneous handles using the same host
494 name when the DNS resolver can get flooded.
495
4962.3 Non-blocking curl_multi_remove_handle()
497
498 The multi interface has a few API calls that assume a blocking behavior, like
499 add_handle() and remove_handle() which limits what we can do internally. The
500 multi API need to be moved even more into a single function that "drives"
501 everything in a non-blocking manner and signals when something is done. A
502 remove or add would then only ask for the action to get started and then
503 multi_perform() etc still be called until the add/remove is completed.
504
5052.4 Split connect and authentication process
506
507 The multi interface treats the authentication process as part of the connect
508 phase. As such any failures during authentication does not trigger the
509 relevant QUIT or LOGOFF for protocols such as IMAP, POP3 and SMTP.
510
5112.5 Edge-triggered sockets should work
512
513 The multi_socket API should work with edge-triggered socket events. One of
514 the internal actions that need to be improved for this to work perfectly is
515 the 'maxloops' handling in transfer.c:readwrite_data().
516
5172.6 multi upkeep
518
519 In libcurl 7.62.0 we introduced curl_easy_upkeep. It unfortunately only works
520 on easy handles. We should introduces a version of that for the multi handle,
521 and also consider doing "upkeep" automatically on connections in the
522 connection pool when the multi handle is in used.
523
524 See https://github.com/curl/curl/issues/3199
525
5262.7 Virtual external sockets
527
528 libcurl performs operations on the given file descriptor that presumes it is
529 a socket and an application cannot replace them at the moment. Allowing an
530 application to fully replace those would allow a larger degree of freedom and
531 flexibility.
532
533 See https://github.com/curl/curl/issues/5835
534
5352.8 dynamically decide to use socketpair
536
537 For users who do not use curl_multi_wait() or do not care for
538 curl_multi_wakeup(), we could introduce a way to make libcurl NOT
539 create a socketpair in the multi handle.
540
541 See https://github.com/curl/curl/issues/4829
542
5433. Documentation
544
5453.1 Improve documentation about fork safety
546
547 See https://github.com/curl/curl/issues/6968
548
5494. FTP
550
5514.1 HOST
552
553 HOST is a command for a client to tell which hostname to use, to offer FTP
554 servers named-based virtual hosting:
555
556 https://datatracker.ietf.org/doc/html/rfc7151
557
5584.4 Support CURLOPT_PREQUOTE for directions listings
559
560 The lack of support is mostly an oversight and requires the FTP state machine
561 to get updated to get fixed.
562
563 https://github.com/curl/curl/issues/8602
564
5654.6 GSSAPI via Windows SSPI
566
567 In addition to currently supporting the SASL GSSAPI mechanism (Kerberos V5)
568 via third-party GSS-API libraries, such as Heimdal or MIT Kerberos, also add
569 support for GSSAPI authentication via Windows SSPI.
570
5714.7 STAT for LIST without data connection
572
573 Some FTP servers allow STAT for listing directories instead of using LIST,
574 and the response is then sent over the control connection instead of as the
575 otherwise usedw data connection: https://www.nsftools.com/tips/RawFTP.htm#STAT
576
577 This is not detailed in any FTP specification.
578
5794.8 Passive transfer could try other IP addresses
580
581 When doing FTP operations through a proxy at localhost, the reported spotted
582 that curl only tried to connect once to the proxy, while it had multiple
583 addresses and a failed connect on one address should make it try the next.
584
585 After switching to passive mode (EPSV), curl could try all IP addresses for
586 "localhost". Currently it tries ::1, but it should also try 127.0.0.1.
587
588 See https://github.com/curl/curl/issues/1508
589
5905. HTTP
591
5925.1 Provide the error body from a CONNECT response
593
594 When curl receives a body response from a CONNECT request to a proxy, it
595 always just reads and ignores it. It would make some users happy if curl
596 instead optionally would be able to make that responsible available. Via a
597 new callback? Through some other means?
598
599 See https://github.com/curl/curl/issues/9513
600
6015.2 Obey Retry-After in redirects
602
603 The Retry-After is said to dicate "the minimum time that the user agent is
604 asked to wait before issuing the redirected request" and libcurl does not
605 obey this.
606
607 See https://github.com/curl/curl/issues/11447
608
6095.3 Rearrange request header order
610
611 Server implementers often make an effort to detect browser and to reject
612 clients it can detect to not match. One of the last details we cannot yet
613 control in libcurl's HTTP requests, which also can be exploited to detect
614 that libcurl is in fact used even when it tries to impersonate a browser, is
615 the order of the request headers. I propose that we introduce a new option in
616 which you give headers a value, and then when the HTTP request is built it
617 sorts the headers based on that number. We could then have internally created
618 headers use a default value so only headers that need to be moved have to be
619 specified.
620
6215.4 Allow SAN names in HTTP/2 server push
622
623 curl only allows HTTP/2 push promise if the provided :authority header value
624 exactly matches the hostname given in the URL. It could be extended to allow
625 any name that would match the Subject Alternative Names in the server's TLS
626 certificate.
627
628 See https://github.com/curl/curl/pull/3581
629
6305.5 auth= in URLs
631
632 Add the ability to specify the preferred authentication mechanism to use by
633 using ;auth=<mech> in the login part of the URL.
634
635 For example:
636
637 http://test:pass;auth=NTLM@example.com would be equivalent to specifying
638 --user test:pass;auth=NTLM or --user test:pass --ntlm from the command line.
639
640 Additionally this should be implemented for proxy base URLs as well.
641
6425.6 alt-svc should fallback if alt-svc does not work
643
644 The alt-svc: header provides a set of alternative services for curl to use
645 instead of the original. If the first attempted one fails, it should try the
646 next etc and if all alternatives fail go back to the original.
647
648 See https://github.com/curl/curl/issues/4908
649
6505.7 Require HTTP version X or higher
651
652 curl and libcurl provide options for trying higher HTTP versions (for example
653 HTTP/2) but then still allows the server to pick version 1.1. We could
654 consider adding a way to require a minimum version.
655
656 See https://github.com/curl/curl/issues/7980
657
6586. TELNET
659
6606.1 ditch stdin
661
662 Reading input (to send to the remote server) on stdin is a crappy solution
663 for library purposes. We need to invent a good way for the application to be
664 able to provide the data to send.
665
6666.2 ditch telnet-specific select
667
668 Move the telnet support's network select() loop go away and merge the code
669 into the main transfer loop. Until this is done, the multi interface does not
670 work for telnet.
671
6726.3 feature negotiation debug data
673
674 Add telnet feature negotiation data to the debug callback as header data.
675
6766.4 exit immediately upon connection if stdin is /dev/null
677
678 If it did, curl could be used to probe if there is an server there listening
679 on a specific port. That is, the following command would exit immediately
680 after the connection is established with exit code 0:
681
682    curl -s --connect-timeout 2 telnet://example.com:80 </dev/null
683
6847. SMTP
685
6867.1 Passing NOTIFY option to CURLOPT_MAIL_RCPT
687
688 Is there a way to pass the NOTIFY option to the CURLOPT_MAIL_RCPT option ?  I
689 set a string that already contains a bracket. For instance something like
690 that: curl_slist_append( recipients, "<foo@bar> NOTIFY=SUCCESS,FAILURE" );
691
692 https://github.com/curl/curl/issues/8232
693
6947.2 Enhanced capability support
695
696 Add the ability, for an application that uses libcurl, to obtain the list of
697 capabilities returned from the EHLO command.
698
6997.3 Add CURLOPT_MAIL_CLIENT option
700
701 Rather than use the URL to specify the mail client string to present in the
702 HELO and EHLO commands, libcurl should support a new CURLOPT specifically for
703 specifying this data as the URL is non-standard and to be honest a bit of a
704 hack ;-)
705
706 Please see the following thread for more information:
707 https://curl.se/mail/lib-2012-05/0178.html
708
709
7108. POP3
711
7128.2 Enhanced capability support
713
714 Add the ability, for an application that uses libcurl, to obtain the list of
715 capabilities returned from the CAPA command.
716
7179. IMAP
718
7199.1 Enhanced capability support
720
721 Add the ability, for an application that uses libcurl, to obtain the list of
722 capabilities returned from the CAPABILITY command.
723
7249.2 upload unread
725
726 Uploads over IMAP currently always set the email as "read" (or "seen"). It
727 would be good to offer a way for users to select for uploads to remain
728 unread.
729
73010. LDAP
731
73210.1 SASL based authentication mechanisms
733
734 Currently the LDAP module only supports ldap_simple_bind_s() in order to bind
735 to an LDAP server. However, this function sends username and password details
736 using the simple authentication mechanism (as clear text). However, it should
737 be possible to use ldap_bind_s() instead specifying the security context
738 information ourselves.
739
74010.2 CURLOPT_SSL_CTX_FUNCTION for LDAPS
741
742 CURLOPT_SSL_CTX_FUNCTION works perfectly for HTTPS and email protocols, but
743 it has no effect for LDAPS connections.
744
745 https://github.com/curl/curl/issues/4108
746
74710.3 Paged searches on LDAP server
748
749 https://github.com/curl/curl/issues/4452
750
75110.4 Certificate-Based Authentication
752
753 LDAPS not possible with macOS and Windows with Certificate-Based Authentication
754
755 https://github.com/curl/curl/issues/9641
756
75711. SMB
758
75911.1 File listing support
760
761 Add support for listing the contents of a SMB share. The output should
762 probably be the same as/similar to FTP.
763
76411.2 Honor file timestamps
765
766 The timestamp of the transferred file should reflect that of the original
767 file.
768
76911.3 Use NTLMv2
770
771 Currently the SMB authentication uses NTLMv1.
772
77311.4 Create remote directories
774
775 Support for creating remote directories when uploading a file to a directory
776 that does not exist on the server, just like --ftp-create-dirs.
777
778
77912. FILE
780
78112.1 Directory listing on non-POSIX
782
783 Listing the contents of a directory accessed with FILE only works on
784 platforms with opendir. Support could be added for more systems, like
785 Windows.
786
78713. TLS
788
78913.1 TLS-PSK with OpenSSL
790
791 Transport Layer Security pre-shared key ciphersuites (TLS-PSK) is a set of
792 cryptographic protocols that provide secure communication based on pre-shared
793 keys (PSKs). These pre-shared keys are symmetric keys shared in advance among
794 the communicating parties.
795
796 https://github.com/curl/curl/issues/5081
797
79813.2 TLS channel binding
799
800 TLS 1.2 and 1.3 provide the ability to extract some secret data from the TLS
801 connection and use it in the client request (usually in some sort of
802 authentication) to ensure that the data sent is bound to the specific TLS
803 connection and cannot be successfully intercepted by a proxy. This
804 functionality can be used in a standard authentication mechanism such as
805 GSS-API or SCRAM, or in custom approaches like custom HTTP Authentication
806 headers.
807
808 For TLS 1.2, the binding type is usually tls-unique, and for TLS 1.3 it is
809 tls-exporter.
810
811 https://datatracker.ietf.org/doc/html/rfc5929
812 https://datatracker.ietf.org/doc/html/rfc9266
813 https://github.com/curl/curl/issues/9226
814
81513.3 Defeat TLS fingerprinting
816
817 By changing the order of TLS extensions provided in the TLS handshake, it is
818 sometimes possible to circumvent TLS fingerprinting by servers. The TLS
819 extension order is of course not the only way to fingerprint a client.
820
82113.4 Consider OCSP stapling by default
822
823 Treat a negative response a reason for aborting the connection. Since OCSP
824 stapling is presumed to get used much less in the future when Let's Encrypt
825 drops the OCSP support, the benefit of this might however be limited.
826
827 https://github.com/curl/curl/issues/15483
828
82913.5 Export session ids
830
831 Add an interface to libcurl that enables "session IDs" to get
832 exported/imported. Cris Bailiff said: "OpenSSL has functions which can
833 serialise the current SSL state to a buffer of your choice, and recover/reset
834 the state from such a buffer at a later date - this is used by mod_ssl for
835 apache to implement and SSL session ID cache".
836
83713.6 Provide callback for cert verification
838
839 OpenSSL supports a callback for customised verification of the peer
840 certificate, but this does not seem to be exposed in the libcurl APIs. Could
841 it be? There is so much that could be done if it were.
842
84313.7 Less memory massaging with Schannel
844
845 The Schannel backend does a lot of custom memory management we would rather
846 avoid: the repeated alloc + free in sends and the custom memory + realloc
847 system for encrypted and decrypted data. That should be avoided and reduced
848 for 1) efficiency and 2) safety.
849
85013.8 Support DANE
851
852 DNS-Based Authentication of Named Entities (DANE) is a way to provide SSL
853 keys and certs over DNS using DNSSEC as an alternative to the CA model.
854 https://www.rfc-editor.org/rfc/rfc6698.txt
855
856 An initial patch was posted by Suresh Krishnaswamy on March 7th 2013
857 (https://curl.se/mail/lib-2013-03/0075.html) but it was a too simple
858 approach. See Daniel's comments:
859 https://curl.se/mail/lib-2013-03/0103.html . libunbound may be the
860 correct library to base this development on.
861
862 Björn Stenberg wrote a separate initial take on DANE that was never
863 completed.
864
86513.9 TLS record padding
866
867 TLS (1.3) offers optional record padding and OpenSSL provides an API for it.
868 I could make sense for libcurl to offer this ability to applications to make
869 traffic patterns harder to figure out by network traffic observers.
870
871 See https://github.com/curl/curl/issues/5398
872
87313.10 Support Authority Information Access certificate extension (AIA)
874
875 AIA can provide various things like CRLs but more importantly information
876 about intermediate CA certificates that can allow validation path to be
877 fulfilled when the HTTPS server does not itself provide them.
878
879 Since AIA is about downloading certs on demand to complete a TLS handshake,
880 it is probably a bit tricky to get done right.
881
882 See https://github.com/curl/curl/issues/2793
883
88413.11 Some TLS options are not offered for HTTPS proxies
885
886 Some TLS related options to the command line tool and libcurl are only
887 provided for the server and not for HTTPS proxies. --proxy-tls-max,
888 --proxy-tlsv1.3, --proxy-curves and a few more.
889 For more Documentation on this see:
890 https://curl.se/libcurl/c/tls-options.html
891
892 https://github.com/curl/curl/issues/12286
893
89413.13 Make sure we forbid TLS 1.3 post-handshake authentication
895
896 RFC 8740 explains how using HTTP/2 must forbid the use of TLS 1.3
897 post-handshake authentication. We should make sure to live up to that.
898
899 See https://github.com/curl/curl/issues/5396
900
90113.14 Support the clienthello extension
902
903 Certain stupid networks and middle boxes have a problem with SSL handshake
904 packets that are within a certain size range because how that sets some bits
905 that previously (in older TLS version) were not set. The clienthello
906 extension adds padding to avoid that size range.
907
908 https://datatracker.ietf.org/doc/html/rfc7685
909 https://github.com/curl/curl/issues/2299
910
91113.15 Select signature algorithms
912
913 Consider adding an option or a way for users to select TLS signature
914 algorithm. The signature algorithms set by a client are used directly in the
915 supported signature algorithm in the client hello message.
916
917 https://github.com/curl/curl/issues/12982
918
91913.16 Share the CA cache
920
921 For TLS backends that supports CA caching, it makes sense to allow the share
922 object to be used to store the CA cache as well via the share API. Would
923 allow multiple easy handles to reuse the CA cache and save themselves from a
924 lot of extra processing overhead.
925
92613.17 Add missing features to TLS backends
927
928 The feature matrix at https://curl.se/libcurl/c/tls-options.html shows which
929 features are supported by which TLS backends, and thus also where there are
930 feature gaps.
931
93215. Schannel
933
93415.1 Extend support for client certificate authentication
935
936 The existing support for the -E/--cert and --key options could be
937 extended by supplying a custom certificate and key in PEM format, see:
938 - Getting a Certificate for Schannel
939   https://msdn.microsoft.com/en-us/library/windows/desktop/aa375447.aspx
940
94115.2 Extend support for the --ciphers option
942
943 The existing support for the --ciphers option could be extended
944 by mapping the OpenSSL/GnuTLS cipher suites to the Schannel APIs, see
945 - Specifying Schannel Ciphers and Cipher Strengths
946   https://msdn.microsoft.com/en-us/library/windows/desktop/aa380161.aspx
947
94815.4 Add option to allow abrupt server closure
949
950 libcurl with Schannel errors without a known termination point from the server
951 (such as length of transfer, or SSL "close notify" alert) to prevent against
952 a truncation attack. Really old servers may neglect to send any termination
953 point. An option could be added to ignore such abrupt closures.
954
955 https://github.com/curl/curl/issues/4427
956
95716. SASL
958
95916.1 Other authentication mechanisms
960
961 Add support for other authentication mechanisms such as OLP,
962 GSS-SPNEGO and others.
963
96416.2 Add QOP support to GSSAPI authentication
965
966 Currently the GSSAPI authentication only supports the default QOP of auth
967 (Authentication), whilst Kerberos V5 supports both auth-int (Authentication
968 with integrity protection) and auth-conf (Authentication with integrity and
969 privacy protection).
970
971
97217. SSH protocols
973
97417.1 Multiplexing
975
976 SSH is a perfectly fine multiplexed protocols which would allow libcurl to do
977 multiple parallel transfers from the same host using the same connection,
978 much in the same spirit as HTTP/2 does. libcurl however does not take
979 advantage of that ability but does instead always create a new connection for
980 new transfers even if an existing connection already exists to the host.
981
982 To fix this, libcurl would have to detect an existing connection and "attach"
983 the new transfer to the existing one.
984
98517.2 Handle growing SFTP files
986
987 The SFTP code in libcurl checks the file size *before* a transfer starts and
988 then proceeds to transfer exactly that amount of data. If the remote file
989 grows while the transfer is in progress libcurl does not notice and does not
990 adapt. The OpenSSH SFTP command line tool does and libcurl could also just
991 attempt to download more to see if there is more to get...
992
993 https://github.com/curl/curl/issues/4344
994
99517.3 Read keys from ~/.ssh/id_ecdsa, id_ed25519
996
997 The libssh2 backend in curl is limited to only reading keys from id_rsa and
998 id_dsa, which makes it fail connecting to servers that use more modern key
999 types.
1000
1001 https://github.com/curl/curl/issues/8586
1002
100317.4 Support CURLOPT_PREQUOTE
1004
1005 The two other QUOTE options are supported for SFTP, but this was left out for
1006 unknown reasons.
1007
100817.5 SSH over HTTPS proxy with more backends
1009
1010 The SSH based protocols SFTP and SCP did not work over HTTPS proxy at
1011 all until PR https://github.com/curl/curl/pull/6021 brought the
1012 functionality with the libssh2 backend. Presumably, this support
1013 can/could be added for the other backends as well.
1014
101517.6 SFTP with SCP://
1016
1017 OpenSSH 9 switched their 'scp' tool to speak SFTP under the hood. Going
1018 forward it might be worth having curl or libcurl attempt SFTP if SCP fails to
1019 follow suite.
1020
102118. Command line tool
1022
102318.1 sync
1024
1025 "curl --sync http://example.com/feed[1-100].rss" or
1026 "curl --sync http://example.net/{index,calendar,history}.html"
1027
1028 Downloads a range or set of URLs using the remote name, but only if the
1029 remote file is newer than the local file. A Last-Modified HTTP date header
1030 should also be used to set the mod date on the downloaded file.
1031
103218.2 glob posts
1033
1034 Globbing support for -d and -F, as in 'curl -d "name=foo[0-9]" URL'.
1035 This is easily scripted though.
1036
103718.4 --proxycommand
1038
1039 Allow the user to make curl run a command and use its stdio to make requests
1040 and not do any network connection by itself. Example:
1041
1042   curl --proxycommand 'ssh pi@raspberrypi.local -W 10.1.1.75 80' \
1043        http://some/otherwise/unavailable/service.php
1044
1045 See https://github.com/curl/curl/issues/4941
1046
104718.5 UTF-8 filenames in Content-Disposition
1048
1049 RFC 6266 documents how UTF-8 names can be passed to a client in the
1050 Content-Disposition header, and curl does not support this.
1051
1052 https://github.com/curl/curl/issues/1888
1053
105418.6 Option to make -Z merge lined based outputs on stdout
1055
1056 When a user requests multiple lined based files using -Z and sends them to
1057 stdout, curl does not "merge" and send complete lines fine but may send
1058 partial lines from several sources.
1059
1060 https://github.com/curl/curl/issues/5175
1061
106218.7 specify which response codes that make -f/--fail return error
1063
1064 Allows a user to better specify exactly which error code(s) that are fine
1065 and which are errors for their specific uses cases
1066
106718.9 Choose the name of file in braces for complex URLs
1068
1069 When using braces to download a list of URLs and you use complicated names
1070 in the list of alternatives, it could be handy to allow curl to use other
1071 names when saving.
1072
1073 Consider a way to offer that. Possibly like
1074 {partURL1:name1,partURL2:name2,partURL3:name3} where the name following the
1075 colon is the output name.
1076
1077 See https://github.com/curl/curl/issues/221
1078
107918.10 improve how curl works in a Windows console window
1080
1081 If you pull the scrollbar when transferring with curl in a Windows console
1082 window, the transfer is interrupted and can get disconnected. This can
1083 probably be improved. See https://github.com/curl/curl/issues/322
1084
108518.11 Windows: set attribute 'archive' for completed downloads
1086
1087 The archive bit (FILE_ATTRIBUTE_ARCHIVE, 0x20) separates files that shall be
1088 backed up from those that are either not ready or have not changed.
1089
1090 Downloads in progress are neither ready to be backed up, nor should they be
1091 opened by a different process. Only after a download has been completed it is
1092 sensible to include it in any integer snapshot or backup of the system.
1093
1094 See https://github.com/curl/curl/issues/3354
1095
109618.12 keep running, read instructions from pipe/socket
1097
1098 Provide an option that makes curl not exit after the last URL (or even work
1099 without a given URL), and then make it read instructions passed on a pipe or
1100 over a socket to make further instructions so that a second subsequent curl
1101 invoke can talk to the still running instance and ask for transfers to get
1102 done, and thus maintain its connection pool, DNS cache and more.
1103
110418.13 Acknowledge Ratelimit headers
1105
1106 Consider a command line option that can make curl do multiple serial requests
1107 while acknowledging server specified rate limits:
1108 https://datatracker.ietf.org/doc/draft-ietf-httpapi-ratelimit-headers/
1109
1110 See https://github.com/curl/curl/issues/5406
1111
111218.14 --dry-run
1113
1114 A command line option that makes curl show exactly what it would do and send
1115 if it would run for real.
1116
1117 See https://github.com/curl/curl/issues/5426
1118
111918.15 --retry should resume
1120
1121 When --retry is used and curl actually retries transfer, it should use the
1122 already transferred data and do a resumed transfer for the rest (when
1123 possible) so that it does not have to transfer the same data again that was
1124 already transferred before the retry.
1125
1126 See https://github.com/curl/curl/issues/1084
1127
112818.16 send only part of --data
1129
1130 When the user only wants to send a small piece of the data provided with
1131 --data or --data-binary, like when that data is a huge file, consider a way
1132 to specify that curl should only send a piece of that. One suggested syntax
1133 would be: "--data-binary @largefile.zip!1073741823-2147483647".
1134
1135 See https://github.com/curl/curl/issues/1200
1136
113718.17 consider filename from the redirected URL with -O ?
1138
1139 When a user gives a URL and uses -O, and curl follows a redirect to a new
1140 URL, the filename is not extracted and used from the newly redirected-to URL
1141 even if the new URL may have a much more sensible filename.
1142
1143 This is clearly documented and helps for security since there is no surprise
1144 to users which filename that might get overwritten, but maybe a new option
1145 could allow for this or maybe -J should imply such a treatment as well as -J
1146 already allows for the server to decide what filename to use so it already
1147 provides the "may overwrite any file" risk.
1148
1149 This is extra tricky if the original URL has no filename part at all since
1150 then the current code path does error out with an error message, and we
1151 cannot *know* already at that point if curl is redirected to a URL that has a
1152 filename...
1153
1154 See https://github.com/curl/curl/issues/1241
1155
115618.18 retry on network is unreachable
1157
1158 The --retry option retries transfers on "transient failures". We later added
1159 --retry-connrefused to also retry for "connection refused" errors.
1160
1161 Suggestions have been brought to also allow retry on "network is unreachable"
1162 errors and while totally reasonable, maybe we should consider a way to make
1163 this more configurable than to add a new option for every new error people
1164 want to retry for?
1165
1166 https://github.com/curl/curl/issues/1603
1167
116818.19 expand ~/ in config files
1169
1170 For example .curlrc could benefit from being able to do this.
1171
1172 See https://github.com/curl/curl/issues/2317
1173
117418.20 hostname sections in config files
1175
1176 config files would be more powerful if they could set different
1177 configurations depending on used URLs, hostname or possibly origin. Then a
1178 default .curlrc could a specific user-agent only when doing requests against
1179 a certain site.
1180
118118.21 retry on the redirected-to URL
1182
1183 When curl is told to --retry a failed transfer and follows redirects, it
1184 might get an HTTP 429 response from the redirected-to URL and not the
1185 original one, which then could make curl decide to rather retry the transfer
1186 on that URL only instead of the original operation to the original URL.
1187
1188 Perhaps extra emphasized if the original transfer is a large POST that
1189 redirects to a separate GET, and that GET is what gets the 529
1190
1191 See https://github.com/curl/curl/issues/5462
1192
119318.23 Set the modification date on an uploaded file
1194
1195 For SFTP and possibly FTP, curl could offer an option to set the
1196 modification time for the uploaded file.
1197
1198 See https://github.com/curl/curl/issues/5768
1199
120018.24 Use multiple parallel transfers for a single download
1201
1202 To enhance transfer speed, downloading a single URL can be split up into
1203 multiple separate range downloads that get combined into a single final
1204 result.
1205
1206 An ideal implementation would not use a specified number of parallel
1207 transfers, but curl could:
1208 - First start getting the full file as transfer A
1209 - If after N seconds have passed and the transfer is expected to continue for
1210   M seconds or more, add a new transfer (B) that asks for the second half of
1211   A's content (and stop A at the middle).
1212 - If splitting up the work improves the transfer rate, it could then be done
1213   again. Then again, etc up to a limit.
1214
1215 This way, if transfer B fails (because Range: is not supported) it lets
1216 transfer A remain the single one. N and M could be set to some sensible
1217 defaults.
1218
1219 See https://github.com/curl/curl/issues/5774
1220
122118.25 Prevent terminal injection when writing to terminal
1222
1223 curl could offer an option to make escape sequence either non-functional or
1224 avoid cursor moves or similar to reduce the risk of a user getting tricked by
1225 clever tricks.
1226
1227 See https://github.com/curl/curl/issues/6150
1228
122918.26 Custom progress meter update interval
1230
1231 Users who are for example doing large downloads in CI or remote setups might
1232 want the occasional progress meter update to see that the transfer is
1233 progressing and has not stuck, but they may not appreciate the
1234 many-times-a-second frequency curl can end up doing it with now.
1235
123618.27 -J and -O with %-encoded filenames
1237
1238 -J/--remote-header-name does not decode %-encoded filenames. RFC 6266 details
1239 how it should be done. The can of worm is basically that we have no charset
1240 handling in curl and ASCII >=128 is a challenge for us. Not to mention that
1241 decoding also means that we need to check for nastiness that is attempted,
1242 like "../" sequences and the like. Probably everything to the left of any
1243 embedded slashes should be cut off.
1244 https://curl.se/bug/view.cgi?id=1294
1245
1246 -O also does not decode %-encoded names, and while it has even less
1247 information about the charset involved the process is similar to the -J case.
1248
1249 Note that we do not decode -O without the user asking for it with some other
1250 means, since -O has always been documented to use the name exactly as
1251 specified in the URL.
1252
125318.28 -J with -C -
1254
1255 When using -J (with -O), automatically resumed downloading together with "-C
1256 -" fails. Without -J the same command line works. This happens because the
1257 resume logic is worked out before the target filename (and thus its
1258 pre-transfer size) has been figured out. This can be improved.
1259
1260 https://curl.se/bug/view.cgi?id=1169
1261
126218.29 --retry and transfer timeouts
1263
1264 If using --retry and the transfer timeouts (possibly due to using -m or
1265 -y/-Y) the next attempt does not resume the transfer properly from what was
1266 downloaded in the previous attempt but truncates and restarts at the original
1267 position where it was at before the previous failed attempt. See
1268 https://curl.se/mail/lib-2008-01/0080.html and Mandriva bug report
1269 https://qa.mandriva.com/show_bug.cgi?id=22565
1270
1271
127219. Build
1273
127419.2 Enable PIE and RELRO by default
1275
1276 Especially when having programs that execute curl via the command line, PIE
1277 renders the exploitation of memory corruption vulnerabilities a lot more
1278 difficult. This can be attributed to the additional information leaks being
1279 required to conduct a successful attack. RELRO, on the other hand, masks
1280 different binary sections like the GOT as read-only and thus kills a handful
1281 of techniques that come in handy when attackers are able to arbitrarily
1282 overwrite memory. A few tests showed that enabling these features had close
1283 to no impact, neither on the performance nor on the general functionality of
1284 curl.
1285
128619.3 Do not use GNU libtool on OpenBSD
1287
1288 When compiling curl on OpenBSD with "--enable-debug" it gives linking errors
1289 when you use GNU libtool. This can be fixed by using the libtool provided by
1290 OpenBSD itself. However for this the user always needs to invoke make with
1291 "LIBTOOL=/usr/bin/libtool". It would be nice if the script could have some
1292 magic to detect if this system is an OpenBSD host and then use the OpenBSD
1293 libtool instead.
1294
1295 See https://github.com/curl/curl/issues/5862
1296
129719.4 Package curl for Windows in a signed installer
1298
1299 See https://github.com/curl/curl/issues/5424
1300
130119.5 make configure use --cache-file more and better
1302
1303 The configure script can be improved to cache more values so that repeated
1304 invokes run much faster.
1305
1306 See https://github.com/curl/curl/issues/7753
1307
130820. Test suite
1309
131020.1 SSL tunnel
1311
1312 Make our own version of stunnel for simple port forwarding to enable HTTPS
1313 and FTP-SSL tests without the stunnel dependency, and it could allow us to
1314 provide test tools built with either OpenSSL or GnuTLS
1315
131620.2 nicer lacking perl message
1317
1318 If perl was not found by the configure script, do not attempt to run the tests
1319 but explain something nice why it does not.
1320
132120.3 more protocols supported
1322
1323 Extend the test suite to include more protocols. The telnet could just do FTP
1324 or http operations (for which we have test servers).
1325
132620.4 more platforms supported
1327
1328 Make the test suite work on more platforms. OpenBSD and macOS. Remove
1329 fork()s and it should become even more portable.
1330
133120.6 Use the RFC 6265 test suite
1332
1333 A test suite made for HTTP cookies (RFC 6265) by Adam Barth is available at
1334 https://github.com/abarth/http-state/tree/master/tests
1335
1336 It would be good if someone would write a script/setup that would run curl
1337 with that test suite and detect deviances. Ideally, that would even be
1338 incorporated into our regular test suite.
1339
134020.8 Run web-platform-tests URL tests
1341
1342 Run web-platform-tests URL tests and compare results with browsers on wpt.fyi
1343
1344 It would help us find issues to fix and help us document where our parser
1345 differs from the WHATWG URL spec parsers.
1346
1347 See https://github.com/curl/curl/issues/4477
1348
134921. MQTT
1350
135121.1 Support rate-limiting
1352
1353 The rate-limiting logic is done in the PERFORMING state in multi.c but MQTT
1354 is not (yet) implemented to use that.
1355
135621.2 Support MQTTS
1357
135821.3 Handle network blocks
1359
1360  Running test suite with
1361  `CURL_DBG_SOCK_WBLOCK=90 ./runtests.pl -a mqtt` makes several
1362  MQTT test cases fail where they should not.
1363
136422. TFTP
1365
136622.1 TFTP does not convert LF to CRLF for mode=netascii
1367
1368 RFC 3617 defines that an TFTP transfer can be done using "netascii"
1369 mode. curl does not support extracting that mode from the URL nor does it treat
1370 such transfers specifically. It should probably do LF to CRLF translations
1371 for them.
1372
1373 See https://github.com/curl/curl/issues/12655
1374
137523. Gopher
1376
137723.1 Handle network blocks
1378
1379  Running test suite with
1380  `CURL_DBG_SOCK_WBLOCK=90 ./runtests.pl -a 1200 to 1300` makes several
1381  Gopher test cases fail where they should not.
1382