1                                  _   _ ____  _
2                              ___| | | |  _ \| |
3                             / __| | | | |_) | |
4                            | (__| |_| |  _ <| |___
5                             \___|\___/|_| \_\_____|
6
7                Things that could be nice to do in the future
8
9 Things to do in project curl. Please tell us what you think, contribute and
10 send us patches that improve things!
11
12 Be aware that these are things that we could do, or have once been considered
13 things we could do. If you want to work on any of these areas, please
14 consider bringing it up for discussions first on the mailing list so that we
15 all agree it is still a good idea for the project!
16
17 All bugs documented in the KNOWN_BUGS document are subject for fixing!
18
19 1. libcurl
20 1.1 TFO support on Windows
21 1.2 More data sharing
22 1.3 struct lifreq
23 1.4 signal-based resolver timeouts
24 1.5 get rid of PATH_MAX
25 1.6 Modified buffer size approach
26 1.7 Support HTTP/2 for HTTP(S) proxies
27 1.8 CURLOPT_RESOLVE for any port number
28 1.9 Cache negative name resolves
29 1.10 auto-detect proxy
30 1.11 minimize dependencies with dynamically loaded modules
31 1.12 updated DNS server while running
32 1.13 c-ares and CURLOPT_OPENSOCKETFUNCTION
33 1.14 Typesafe curl_easy_setopt()
34 1.15 Monitor connections in the connection pool
35 1.16 Try to URL encode given URL
36 1.17 Add support for IRIs
37 1.18 try next proxy if one doesn't work
38 1.19 Timeout idle connections from the pool
39 1.20 SRV and URI DNS records
40 1.21 Have the URL API offer IDN decoding
41 1.22 CURLINFO_PAUSE_STATE
42 1.23 Offer API to flush the connection pool
43 1.24 TCP Fast Open for windows
44 1.25 Expose tried IP addresses that failed
45 1.26 CURL_REFUSE_CLEARTEXT
46 1.27 hardcode the "localhost" addresses
47 1.28 FD_CLOEXEC
48 1.29 Upgrade to websockets
49 1.30 config file parsing
50
51 2. libcurl - multi interface
52 2.1 More non-blocking
53 2.2 Better support for same name resolves
54 2.3 Non-blocking curl_multi_remove_handle()
55 2.4 Split connect and authentication process
56 2.5 Edge-triggered sockets should work
57 2.6 multi upkeep
58
59 3. Documentation
60 3.2 Provide cmake config-file
61
62 4. FTP
63 4.1 HOST
64 4.2 Alter passive/active on failure and retry
65 4.3 Earlier bad letter detection
66 4.4 REST for large files
67 4.5 ASCII support
68 4.6 GSSAPI via Windows SSPI
69 4.7 STAT for LIST without data connection
70 4.8 Option to ignore private IP addresses in PASV response
71
72 5. HTTP
73 5.1 Better persistency for HTTP 1.0
74 5.2 support FF3 sqlite cookie files
75 5.3 Rearrange request header order
76 5.4 Allow SAN names in HTTP/2 server push
77 5.5 auth= in URLs
78 5.6 Refuse "downgrade" redirects
79 5.7 QUIC
80
81 6. TELNET
82 6.1 ditch stdin
83 6.2 ditch telnet-specific select
84 6.3 feature negotiation debug data
85
86 7. SMTP
87 7.1 Pipelining
88 7.2 Enhanced capability support
89 7.3 Add CURLOPT_MAIL_CLIENT option
90
91 8. POP3
92 8.1 Pipelining
93 8.2 Enhanced capability support
94
95 9. IMAP
96 9.1 Enhanced capability support
97
98 10. LDAP
99 10.1 SASL based authentication mechanisms
100
101 11. SMB
102 11.1 File listing support
103 11.2 Honor file timestamps
104 11.3 Use NTLMv2
105 11.4 Create remote directories
106
107 12. New protocols
108 12.1 RSYNC
109
110 13. SSL
111 13.1 Disable specific versions
112 13.2 Provide mutex locking API
113 13.3 Support in-memory certs/ca certs/keys
114 13.4 Cache/share OpenSSL contexts
115 13.5 Export session ids
116 13.6 Provide callback for cert verification
117 13.7 improve configure --with-ssl
118 13.8 Support DANE
119 13.9 Configurable loading of OpenSSL configuration file
120 13.10 Support Authority Information Access certificate extension (AIA)
121 13.11 Support intermediate & root pinning for PINNEDPUBLICKEY
122 13.12 Support HSTS
123 13.13 Support HPKP
124 13.14 Support the clienthello extension
125
126 14. GnuTLS
127 14.1 SSL engine stuff
128 14.2 check connection
129
130 15. WinSSL/SChannel
131 15.1 Add support for client certificate authentication
132 15.3 Add support for the --ciphers option
133 15.4 Add option to disable client certificate auto-send
134
135 16. SASL
136 16.1 Other authentication mechanisms
137 16.2 Add QOP support to GSSAPI authentication
138 16.3 Support binary messages (i.e.: non-base64)
139
140 17. SSH protocols
141 17.1 Multiplexing
142 17.2 SFTP performance
143 17.3 Support better than MD5 hostkey hash
144 17.4 Support CURLOPT_PREQUOTE
145
146 18. Command line tool
147 18.1 sync
148 18.2 glob posts
149 18.3 prevent file overwriting
150 18.4 simultaneous parallel transfers
151 18.5 UTF-8 filenames in Content-Disposition
152 18.6 warning when setting an option
153 18.7 warning if curl version is not in sync with libcurl version
154 18.8 offer color-coded HTTP header output
155 18.9 Choose the name of file in braces for complex URLs
156 18.10 improve how curl works in a windows console window
157 18.11 Windows: set attribute 'archive' for completed downloads
158 18.12 keep running, read instructions from pipe/socket
159 18.13 support metalink in http headers
160 18.14 --fail without --location should treat 3xx as a failure
161 18.15 --retry should resume
162 18.16 send only part of --data
163 18.17 consider file name from the redirected URL with -O ?
164 18.18 retry on network is unreachable
165 18.19 expand ~/ in config files
166 18.20 host name sections in config files
167
168 19. Build
169 19.1 roffit
170 19.2 Enable PIE and RELRO by default
171 19.3 cmake test suite improvements
172
173 20. Test suite
174 20.1 SSL tunnel
175 20.2 nicer lacking perl message
176 20.3 more protocols supported
177 20.4 more platforms supported
178 20.5 Add support for concurrent connections
179 20.6 Use the RFC6265 test suite
180 20.7 Support LD_PRELOAD on macOS
181
182 21. Next SONAME bump
183 21.1 http-style HEAD output for FTP
184 21.2 combine error codes
185 21.3 extend CURLOPT_SOCKOPTFUNCTION prototype
186
187 22. Next major release
188 22.1 cleanup return codes
189 22.2 remove obsolete defines
190 22.3 size_t
191 22.4 remove several functions
192 22.5 remove CURLOPT_FAILONERROR
193 22.7 remove progress meter from libcurl
194 22.8 remove 'curl_httppost' from public
195
196==============================================================================
197
1981. libcurl
199
2001.1 TFO support on Windows
201
202 TCP Fast Open is supported on several platforms but not on Windows. Work on
203 this was once started but never finished.
204
205 See https://github.com/curl/curl/pull/3378
206
2071.2 More data sharing
208
209 curl_share_* functions already exist and work, and they can be extended to
210 share more. For example, enable sharing of the ares channel.
211
2121.3 struct lifreq
213
214 Use 'struct lifreq' and SIOCGLIFADDR instead of 'struct ifreq' and
215 SIOCGIFADDR on newer Solaris versions as they claim the latter is obsolete.
216 To support IPv6 interface addresses for network interfaces properly.
217
2181.4 signal-based resolver timeouts
219
220 libcurl built without an asynchronous resolver library uses alarm() to time
221 out DNS lookups. When a timeout occurs, this causes libcurl to jump from the
222 signal handler back into the library with a sigsetjmp, which effectively
223 causes libcurl to continue running within the signal handler. This is
224 non-portable and could cause problems on some platforms. A discussion on the
225 problem is available at https://curl.haxx.se/mail/lib-2008-09/0197.html
226
227 Also, alarm() provides timeout resolution only to the nearest second. alarm
228 ought to be replaced by setitimer on systems that support it.
229
2301.5 get rid of PATH_MAX
231
232 Having code use and rely on PATH_MAX is not nice:
233 https://insanecoding.blogspot.com/2007/11/pathmax-simply-isnt.html
234
235 Currently the SSH based code uses it a bit, but to remove PATH_MAX from there
236 we need libssh2 to properly tell us when we pass in a too small buffer and
237 its current API (as of libssh2 1.2.7) doesn't.
238
2391.6 Modified buffer size approach
240
241 Current libcurl allocates a fixed 16K size buffer for download and an
242 additional 16K for upload. They are always unconditionally part of the easy
243 handle. If CRLF translations are requested, an additional 32K "scratch
244 buffer" is allocated. A total of 64K transfer buffers in the worst case.
245
246 First, while the handles are not actually in use these buffers could be freed
247 so that lingering handles just kept in queues or whatever waste less memory.
248
249 Secondly, SFTP is a protocol that needs to handle many ~30K blocks at once
250 since each need to be individually acked and therefore libssh2 must be
251 allowed to send (or receive) many separate ones in parallel to achieve high
252 transfer speeds. A current libcurl build with a 16K buffer makes that
253 impossible, but one with a 512K buffer will reach MUCH faster transfers. But
254 allocating 512K unconditionally for all buffers just in case they would like
255 to do fast SFTP transfers at some point is not a good solution either.
256
257 Dynamically allocate buffer size depending on protocol in use in combination
258 with freeing it after each individual transfer? Other suggestions?
259
2601.7 Support HTTP/2 for HTTP(S) proxies
261
262 Support for doing HTTP/2 to HTTP and HTTPS proxies is still missing.
263
2641.8 CURLOPT_RESOLVE for any port number
265
266 This option allows applications to set a replacement IP address for a given
267 host + port pair. Consider making support for providing a replacement address
268 for the host name on all port numbers.
269
270 See https://github.com/curl/curl/issues/1264
271
2721.9 Cache negative name resolves
273
274 A name resolve that has failed is likely to fail when made again within a
275 short period of time. Currently we only cache positive responses.
276
2771.10 auto-detect proxy
278
279 libcurl could be made to detect the system proxy setup automatically and use
280 that. On Windows, macOS and Linux desktops for example.
281
282 The pull-request to use libproxy for this was deferred due to doubts on the
283 reliability of the dependency and how to use it:
284 https://github.com/curl/curl/pull/977
285
286 libdetectproxy is a (C++) library for detecting the proxy on Windows
287 https://github.com/paulharris/libdetectproxy
288
2891.11 minimize dependencies with dynamically loaded modules
290
291 We can create a system with loadable modules/plug-ins, where these modules
292 would be the ones that link to 3rd party libs. That would allow us to avoid
293 having to load ALL dependencies since only the necessary ones for this
294 app/invoke/used protocols would be necessary to load.  See
295 https://github.com/curl/curl/issues/349
296
2971.12 updated DNS server while running
298
299 If /etc/resolv.conf gets updated while a program using libcurl is running, it
300 is may cause name resolves to fail unless res_init() is called. We should
301 consider calling res_init() + retry once unconditionally on all name resolve
302 failures to mitigate against this. Firefox works like that. Note that Windows
303 doesn't have res_init() or an alternative.
304
305 https://github.com/curl/curl/issues/2251
306
3071.13 c-ares and CURLOPT_OPENSOCKETFUNCTION
308
309 curl will create most sockets via the CURLOPT_OPENSOCKETFUNCTION callback and
310 close them with the CURLOPT_CLOSESOCKETFUNCTION callback. However, c-ares
311 does not use those functions and instead opens and closes the sockets
312 itself. This means that when curl passes the c-ares socket to the
313 CURLMOPT_SOCKETFUNCTION it isn't owned by the application like other sockets.
314
315 See https://github.com/curl/curl/issues/2734
316
3171.14 Typesafe curl_easy_setopt()
318
319 One of the most common problems in libcurl using applications is the lack of
320 type checks for curl_easy_setopt() which happens because it accepts varargs
321 and thus can take any type.
322
323 One possible solution to this is to introduce a few different versions of the
324 setopt version for the different kinds of data you can set.
325
326  curl_easy_set_num() - sets a long value
327
328  curl_easy_set_large() - sets a curl_off_t value
329
330  curl_easy_set_ptr() - sets a pointer
331
332  curl_easy_set_cb() - sets a callback PLUS its callback data
333
3341.15 Monitor connections in the connection pool
335
336 libcurl's connection cache or pool holds a number of open connections for the
337 purpose of possible subsequent connection reuse. It may contain a few up to a
338 significant amount of connections. Currently, libcurl leaves all connections
339 as they are and first when a connection is iterated over for matching or
340 reuse purpose it is verified that it is still alive.
341
342 Those connections may get closed by the server side for idleness or they may
343 get a HTTP/2 ping from the peer to verify that they're still alive. By adding
344 monitoring of the connections while in the pool, libcurl can detect dead
345 connections (and close them) better and earlier, and it can handle HTTP/2
346 pings to keep such ones alive even when not actively doing transfers on them.
347
3481.16 Try to URL encode given URL
349
350 Given a URL that for example contains spaces, libcurl could have an option
351 that would try somewhat harder than it does now and convert spaces to %20 and
352 perhaps URL encoded byte values over 128 etc (basically do what the redirect
353 following code already does).
354
355 https://github.com/curl/curl/issues/514
356
3571.17 Add support for IRIs
358
359 IRIs (RFC 3987) allow localized, non-ascii, names in the URL. To properly
360 support this, curl/libcurl would need to translate/encode the given input
361 from the input string encoding into percent encoded output "over the wire".
362
363 To make that work smoothly for curl users even on Windows, curl would
364 probably need to be able to convert from several input encodings.
365
3661.18 try next proxy if one doesn't work
367
368 Allow an application to specify a list of proxies to try, and failing to
369 connect to the first go on and try the next instead until the list is
370 exhausted. Browsers support this feature at least when they specify proxies
371 using PACs.
372
373 https://github.com/curl/curl/issues/896
374
3751.19 Timeout idle connections from the pool
376
377 libcurl currently keeps connections in its connection pool for an indefinite
378 period of time, until it either gets reused, gets noticed that it has been
379 closed by the server or gets pruned to make room for a new connection.
380
381 To reduce overhead (especially for when we add monitoring of the connections
382 in the pool), we should introduce a timeout so that connections that have
383 been idle for N seconds get closed.
384
3851.20 SRV and URI DNS records
386
387 Offer support for resolving SRV and URI DNS records for libcurl to know which
388 server to connect to for various protocols (including HTTP!).
389
3901.21 Have the URL API offer IDN decoding
391
392 Similar to how URL decoding/encoding is done, we could have URL functions to
393 convert IDN host names to punycode (probably not the reverse).
394 https://github.com/curl/curl/issues/3232
395
3961.22 CURLINFO_PAUSE_STATE
397
398 Return information about the transfer's current pause state, in both
399 directions. https://github.com/curl/curl/issues/2588
400
4011.23 Offer API to flush the connection pool
402
403 Sometimes applications want to flush all the existing connections kept alive.
404 An API could allow a forced flush or just a forced loop that would properly
405 close all connections that have been closed by the server already.
406
4071.24 TCP Fast Open for windows
408
409 libcurl supports the CURLOPT_TCP_FASTOPEN option since 7.49.0 for Linux and
410 Mac OS. Windows supports TCP Fast Open starting with Windows 10, version 1607
411 and we should add support for it.
412
4131.25 Expose tried IP addresses that failed
414
415 When libcurl fails to connect to a host, it should be able to offer the
416 application the list of IP addresses that were used in the attempt.
417
418 https://github.com/curl/curl/issues/2126
419
4201.26 CURL_REFUSE_CLEARTEXT
421
422 An environment variable that when set will make libcurl refuse to use any
423 cleartext network protocol. That's all non-encrypted ones (FTP, HTTP, Gopher,
424 etc). By adding the check to libcurl and not just curl, this environment
425 variable can then help users to block all libcurl-using programs from
426 accessing the network using unsafe protocols.
427
428 The variable could be given some sort of syntax or different levels and be
429 used to also allow for example users to refuse libcurl to do transfers with
430 HTTPS certificate checks disabled.
431
432 It could also automatically refuse usernames in URLs when set
433 (see CURLOPT_DISALLOW_USERNAME_IN_URL)
434
4351.27 hardcode the "localhost" addresses
436
437 There's this new spec getting adopted that says "localhost" should always and
438 unconditionally be a local address and not get resolved by a DNS server. A
439 fine way for curl to fix this would be to simply hard-code the response to
440 127.0.0.1 and/or ::1 (depending on what IP versions that are requested). This
441 is what the browsers probably will do with this hostname.
442
443 https://bugzilla.mozilla.org/show_bug.cgi?id=1220810
444
445 https://tools.ietf.org/html/draft-ietf-dnsop-let-localhost-be-localhost-02
446
4471.28 FD_CLOEXEC
448
449 It sets the close-on-exec flag for the file descriptor, which causes the file
450 descriptor to be automatically (and atomically) closed when any of the
451 exec-family functions succeed. Should probably be set by default?
452
453 https://github.com/curl/curl/issues/2252
454
4551.29 Upgrade to websockets
456
457 libcurl could offer a smoother path to get to a websocket connection.
458 See https://github.com/curl/curl/issues/3523
459
460 Michael Kaufmann suggestion here:
461 https://curl.haxx.se/video/curlup-2017/2017-03-19_05_Michael_Kaufmann_Websocket_support_for_curl.mp4
462
4631.30 config file parsing
464
465 Consider providing an API, possibly in a separate companion library, for
466 parsing a config file like curl's -K/--config option to allow applications to
467 get the same ability to read curl options from files.
468
469 See https://github.com/curl/curl/issues/3698
470
4712. libcurl - multi interface
472
4732.1 More non-blocking
474
475 Make sure we don't ever loop because of non-blocking sockets returning
476 EWOULDBLOCK or similar. Blocking cases include:
477
478 - Name resolves on non-windows unless c-ares or the threaded resolver is used
479 - SOCKS proxy handshakes
480 - file:// transfers
481 - TELNET transfers
482 - The "DONE" operation (post transfer protocol-specific actions) for the
483   protocols SFTP, SMTP, FTP. Fixing Curl_done() for this is a worthy task.
484
4852.2 Better support for same name resolves
486
487 If a name resolve has been initiated for name NN and a second easy handle
488 wants to resolve that name as well, make it wait for the first resolve to end
489 up in the cache instead of doing a second separate resolve. This is
490 especially needed when adding many simultaneous handles using the same host
491 name when the DNS resolver can get flooded.
492
4932.3 Non-blocking curl_multi_remove_handle()
494
495 The multi interface has a few API calls that assume a blocking behavior, like
496 add_handle() and remove_handle() which limits what we can do internally. The
497 multi API need to be moved even more into a single function that "drives"
498 everything in a non-blocking manner and signals when something is done. A
499 remove or add would then only ask for the action to get started and then
500 multi_perform() etc still be called until the add/remove is completed.
501
5022.4 Split connect and authentication process
503
504 The multi interface treats the authentication process as part of the connect
505 phase. As such any failures during authentication won't trigger the relevant
506 QUIT or LOGOFF for protocols such as IMAP, POP3 and SMTP.
507
5082.5 Edge-triggered sockets should work
509
510 The multi_socket API should work with edge-triggered socket events. One of
511 the internal actions that need to be improved for this to work perfectly is
512 the 'maxloops' handling in transfer.c:readwrite_data().
513
5142.6 multi upkeep
515
516 In libcurl 7.62.0 we introduced curl_easy_upkeep. It unfortunately only works
517 on easy handles. We should introduces a version of that for the multi handle,
518 and also consider doing "upkeep" automatically on connections in the
519 connection pool when the multi handle is in used.
520
521 See https://github.com/curl/curl/issues/3199
522
5233. Documentation
524
5253.2 Provide cmake config-file
526
527 A config-file package is a set of files provided by us to allow applications
528 to write cmake scripts to find and use libcurl easier. See
529 https://github.com/curl/curl/issues/885
530
5314. FTP
532
5334.1 HOST
534
535 HOST is a command for a client to tell which host name to use, to offer FTP
536 servers named-based virtual hosting:
537
538 https://tools.ietf.org/html/rfc7151
539
5404.2 Alter passive/active on failure and retry
541
542 When trying to connect passively to a server which only supports active
543 connections, libcurl returns CURLE_FTP_WEIRD_PASV_REPLY and closes the
544 connection. There could be a way to fallback to an active connection (and
545 vice versa). https://curl.haxx.se/bug/feature.cgi?id=1754793
546
5474.3 Earlier bad letter detection
548
549 Make the detection of (bad) %0d and %0a codes in FTP URL parts earlier in the
550 process to avoid doing a resolve and connect in vain.
551
5524.4 REST for large files
553
554 REST fix for servers not behaving well on >2GB requests. This should fail if
555 the server doesn't set the pointer to the requested index. The tricky
556 (impossible?) part is to figure out if the server did the right thing or not.
557
5584.5 ASCII support
559
560 FTP ASCII transfers do not follow RFC959. They don't convert the data
561 accordingly.
562
5634.6 GSSAPI via Windows SSPI
564
565 In addition to currently supporting the SASL GSSAPI mechanism (Kerberos V5)
566 via third-party GSS-API libraries, such as Heimdal or MIT Kerberos, also add
567 support for GSSAPI authentication via Windows SSPI.
568
5694.7 STAT for LIST without data connection
570
571 Some FTP servers allow STAT for listing directories instead of using LIST,
572 and the response is then sent over the control connection instead of as the
573 otherwise usedw data connection: https://www.nsftools.com/tips/RawFTP.htm#STAT
574
575 This is not detailed in any FTP specification.
576
5774.8 Option to ignore private IP addresses in PASV response
578
579 Some servers respond with and some other FTP client implementations can
580 ignore private (RFC 1918 style) IP addresses when received in PASV responses.
581 To consider for libcurl as well. See https://github.com/curl/curl/issues/1455
582
5835. HTTP
584
5855.1 Better persistency for HTTP 1.0
586
587 "Better" support for persistent connections over HTTP 1.0
588 https://curl.haxx.se/bug/feature.cgi?id=1089001
589
5905.2 support FF3 sqlite cookie files
591
592 Firefox 3 is changing from its former format to a a sqlite database instead.
593 We should consider how (lib)curl can/should support this.
594 https://curl.haxx.se/bug/feature.cgi?id=1871388
595
5965.3 Rearrange request header order
597
598 Server implementors often make an effort to detect browser and to reject
599 clients it can detect to not match. One of the last details we cannot yet
600 control in libcurl's HTTP requests, which also can be exploited to detect
601 that libcurl is in fact used even when it tries to impersonate a browser, is
602 the order of the request headers. I propose that we introduce a new option in
603 which you give headers a value, and then when the HTTP request is built it
604 sorts the headers based on that number. We could then have internally created
605 headers use a default value so only headers that need to be moved have to be
606 specified.
607
6085.4 Allow SAN names in HTTP/2 server push
609
610 curl only allows HTTP/2 push promise if the provided :autority header value
611 exactly matches the host name given in the URL. It could be extended to allow
612 any name that would match the Subject Alternative Names in the server's TLS
613 certificate.
614
615 See https://github.com/curl/curl/pull/3581
616
6175.5 auth= in URLs
618
619 Add the ability to specify the preferred authentication mechanism to use by
620 using ;auth=<mech> in the login part of the URL.
621
622 For example:
623
624 http://test:pass;auth=NTLM@example.com would be equivalent to specifying --user
625 test:pass;auth=NTLM or --user test:pass --ntlm from the command line.
626
627 Additionally this should be implemented for proxy base URLs as well.
628
6295.6 Refuse "downgrade" redirects
630
631 See https://github.com/curl/curl/issues/226
632
633 Consider a way to tell curl to refuse to "downgrade" protocol with a redirect
634 and/or possibly a bit that refuses redirect to change protocol completely.
635
6365.7 QUIC
637
638 The standardization process of QUIC has been taken to the IETF and can be
639 followed on the [IETF QUIC Mailing
640 list](https://www.ietf.org/mailman/listinfo/quic). I'd like us to get on the
641 bandwagon. Ideally, this would be done with a separate library/project to
642 handle the binary/framing layer in a similar fashion to how HTTP/2 is
643 implemented. This, to allow other projects to benefit from the work and to
644 thus broaden the interest and chance of others to participate.
645
646
6476. TELNET
648
6496.1 ditch stdin
650
651Reading input (to send to the remote server) on stdin is a crappy solution for
652library purposes. We need to invent a good way for the application to be able
653to provide the data to send.
654
6556.2 ditch telnet-specific select
656
657 Move the telnet support's network select() loop go away and merge the code
658 into the main transfer loop. Until this is done, the multi interface won't
659 work for telnet.
660
6616.3 feature negotiation debug data
662
663  Add telnet feature negotiation data to the debug callback as header data.
664
665
6667. SMTP
667
6687.1 Pipelining
669
670 Add support for pipelining emails.
671
6727.2 Enhanced capability support
673
674 Add the ability, for an application that uses libcurl, to obtain the list of
675 capabilities returned from the EHLO command.
676
6777.3 Add CURLOPT_MAIL_CLIENT option
678
679 Rather than use the URL to specify the mail client string to present in the
680 HELO and EHLO commands, libcurl should support a new CURLOPT specifically for
681 specifying this data as the URL is non-standard and to be honest a bit of a
682 hack ;-)
683
684 Please see the following thread for more information:
685 https://curl.haxx.se/mail/lib-2012-05/0178.html
686
687
6888. POP3
689
6908.1 Pipelining
691
692 Add support for pipelining commands.
693
6948.2 Enhanced capability support
695
696 Add the ability, for an application that uses libcurl, to obtain the list of
697 capabilities returned from the CAPA command.
698
6999. IMAP
700
7019.1 Enhanced capability support
702
703 Add the ability, for an application that uses libcurl, to obtain the list of
704 capabilities returned from the CAPABILITY command.
705
70610. LDAP
707
70810.1 SASL based authentication mechanisms
709
710 Currently the LDAP module only supports ldap_simple_bind_s() in order to bind
711 to an LDAP server. However, this function sends username and password details
712 using the simple authentication mechanism (as clear text). However, it should
713 be possible to use ldap_bind_s() instead specifying the security context
714 information ourselves.
715
71611. SMB
717
71811.1 File listing support
719
720Add support for listing the contents of a SMB share. The output should probably
721be the same as/similar to FTP.
722
72311.2 Honor file timestamps
724
725The timestamp of the transferred file should reflect that of the original file.
726
72711.3 Use NTLMv2
728
729Currently the SMB authentication uses NTLMv1.
730
73111.4 Create remote directories
732
733Support for creating remote directories when uploading a file to a directory
734that doesn't exist on the server, just like --ftp-create-dirs.
735
73612. New protocols
737
73812.1 RSYNC
739
740 There's no RFC for the protocol or an URI/URL format.  An implementation
741 should most probably use an existing rsync library, such as librsync.
742
74313. SSL
744
74513.1 Disable specific versions
746
747 Provide an option that allows for disabling specific SSL versions, such as
748 SSLv2 https://curl.haxx.se/bug/feature.cgi?id=1767276
749
75013.2 Provide mutex locking API
751
752 Provide a libcurl API for setting mutex callbacks in the underlying SSL
753 library, so that the same application code can use mutex-locking
754 independently of OpenSSL or GnutTLS being used.
755
75613.3 Support in-memory certs/ca certs/keys
757
758 You can specify the private and public keys for SSH/SSL as file paths. Some
759 programs want to avoid using files and instead just pass them as in-memory
760 data blobs. There's probably a challenge to make this work across the
761 plethory of different TLS and SSH backends that curl supports.
762 https://github.com/curl/curl/issues/2310
763
76413.4 Cache/share OpenSSL contexts
765
766 "Look at SSL cafile - quick traces look to me like these are done on every
767 request as well, when they should only be necessary once per SSL context (or
768 once per handle)". The major improvement we can rather easily do is to make
769 sure we don't create and kill a new SSL "context" for every request, but
770 instead make one for every connection and re-use that SSL context in the same
771 style connections are re-used. It will make us use slightly more memory but
772 it will libcurl do less creations and deletions of SSL contexts.
773
774 Technically, the "caching" is probably best implemented by getting added to
775 the share interface so that easy handles who want to and can reuse the
776 context specify that by sharing with the right properties set.
777
778 https://github.com/curl/curl/issues/1110
779
78013.5 Export session ids
781
782 Add an interface to libcurl that enables "session IDs" to get
783 exported/imported. Cris Bailiff said: "OpenSSL has functions which can
784 serialise the current SSL state to a buffer of your choice, and recover/reset
785 the state from such a buffer at a later date - this is used by mod_ssl for
786 apache to implement and SSL session ID cache".
787
78813.6 Provide callback for cert verification
789
790 OpenSSL supports a callback for customised verification of the peer
791 certificate, but this doesn't seem to be exposed in the libcurl APIs. Could
792 it be? There's so much that could be done if it were!
793
79413.7 improve configure --with-ssl
795
796 make the configure --with-ssl option first check for OpenSSL, then GnuTLS,
797 then NSS...
798
79913.8 Support DANE
800
801 DNS-Based Authentication of Named Entities (DANE) is a way to provide SSL
802 keys and certs over DNS using DNSSEC as an alternative to the CA model.
803 https://www.rfc-editor.org/rfc/rfc6698.txt
804
805 An initial patch was posted by Suresh Krishnaswamy on March 7th 2013
806 (https://curl.haxx.se/mail/lib-2013-03/0075.html) but it was a too simple
807 approach. See Daniel's comments:
808 https://curl.haxx.se/mail/lib-2013-03/0103.html . libunbound may be the
809 correct library to base this development on.
810
811 Björn Stenberg wrote a separate initial take on DANE that was never
812 completed.
813
81413.9 Configurable loading of OpenSSL configuration file
815
816 libcurl calls the OpenSSL function CONF_modules_load_file() in openssl.c,
817 Curl_ossl_init(). "We regard any changes in the OpenSSL configuration as a
818 security risk or at least as unnecessary."
819
820 Please add a configuration switch or something similar to disable the
821 CONF_modules_load_file() call.
822
823 See https://github.com/curl/curl/issues/2724
824
82513.10 Support Authority Information Access certificate extension (AIA)
826
827 AIA can provide various things like CRLs but more importantly information
828 about intermediate CA certificates that can allow validation path to be
829 fulfilled when the HTTPS server doesn't itself provide them.
830
831 Since AIA is about downloading certs on demand to complete a TLS handshake,
832 it is probably a bit tricky to get done right.
833
834 See https://github.com/curl/curl/issues/2793
835
83613.11 Support intermediate & root pinning for PINNEDPUBLICKEY
837
838 CURLOPT_PINNEDPUBLICKEY does not consider the hashes of intermediate & root
839 certificates when comparing the pinned keys. Therefore it is not compatible
840 with "HTTP Public Key Pinning" as there also intermediate and root certificates
841 can be pinned. This is very useful as it prevents webadmins from "locking
842 themself out of their servers".
843
844 Adding this feature would make curls pinning 100% compatible to HPKP and allow
845 more flexible pinning.
846
84713.12 Support HSTS
848
849 "HTTP Strict Transport Security" is TOFU (trust on first use), time-based
850 features indicated by a HTTP header send by the webserver. It is widely used
851 in browsers and it's purpose is to prevent insecure HTTP connections after
852 a previous HTTPS connection. It protects against SSLStripping attacks.
853
854 Doc: https://developer.mozilla.org/en-US/docs/Web/Security/HTTP_strict_transport_security
855 RFC 6797: https://tools.ietf.org/html/rfc6797
856
85713.13 Support HPKP
858
859 "HTTP Public Key Pinning" is TOFU (trust on first use), time-based
860 features indicated by a HTTP header send by the webserver. It's purpose is
861 to prevent Man-in-the-middle attacks by trusted CAs by allowing webadmins
862 to specify which CAs/certificates/public keys to trust when connection to
863 their websites.
864
865 It can be build based on PINNEDPUBLICKEY.
866
867 Wikipedia: https://en.wikipedia.org/wiki/HTTP_Public_Key_Pinning
868 OWASP: https://www.owasp.org/index.php/Certificate_and_Public_Key_Pinning
869 Doc: https://developer.mozilla.org/de/docs/Web/Security/Public_Key_Pinning
870 RFC: https://tools.ietf.org/html/draft-ietf-websec-key-pinning-21
871
87213.14 Support the clienthello extension
873
874 Certain stupid networks and middle boxes have a problem with SSL handshake
875 pakets that are within a certain size range because how that sets some bits
876 that previously (in older TLS version) were not set. The clienthello
877 extension adds padding to avoid that size range.
878
879 https://tools.ietf.org/html/rfc7685
880 https://github.com/curl/curl/issues/2299
881
88214. GnuTLS
883
88414.1 SSL engine stuff
885
886 Is this even possible?
887
88814.2 check connection
889
890 Add a way to check if the connection seems to be alive, to correspond to the
891 SSL_peak() way we use with OpenSSL.
892
89315. WinSSL/SChannel
894
89515.1 Add support for client certificate authentication
896
897 WinSSL/SChannel currently makes use of the OS-level system and user
898 certificate and private key stores. This does not allow the application
899 or the user to supply a custom client certificate using curl or libcurl.
900
901 Therefore support for the existing -E/--cert and --key options should be
902 implemented by supplying a custom certificate to the SChannel APIs, see:
903 - Getting a Certificate for Schannel
904   https://msdn.microsoft.com/en-us/library/windows/desktop/aa375447.aspx
905
90615.3 Add support for the --ciphers option
907
908 The cipher suites used by WinSSL/SChannel are configured on an OS-level
909 instead of an application-level. This does not allow the application or
910 the user to customize the configured cipher suites using curl or libcurl.
911
912 Therefore support for the existing --ciphers option should be implemented
913 by mapping the OpenSSL/GnuTLS cipher suites to the SChannel APIs, see
914 - Specifying Schannel Ciphers and Cipher Strengths
915   https://msdn.microsoft.com/en-us/library/windows/desktop/aa380161.aspx
916
91715.4 Add option to disable client certificate auto-send
918
919 Microsoft says "By default, Schannel will, with no notification to the client,
920 attempt to locate a client certificate and send it to the server." That could
921 be considered a privacy violation and unexpected.
922
923 Some Windows users have come to expect that default behavior and to change the
924 default to make it consistent with other SSL backends would be a breaking
925 change. An option should be added that can be used to disable the default
926 Schannel auto-send behavior.
927
928 https://github.com/curl/curl/issues/2262
929
93016. SASL
931
93216.1 Other authentication mechanisms
933
934 Add support for other authentication mechanisms such as OLP,
935 GSS-SPNEGO and others.
936
93716.2 Add QOP support to GSSAPI authentication
938
939 Currently the GSSAPI authentication only supports the default QOP of auth
940 (Authentication), whilst Kerberos V5 supports both auth-int (Authentication
941 with integrity protection) and auth-conf (Authentication with integrity and
942 privacy protection).
943
94416.3 Support binary messages (i.e.: non-base64)
945
946  Mandatory to support LDAP SASL authentication.
947
948
94917. SSH protocols
950
95117.1 Multiplexing
952
953 SSH is a perfectly fine multiplexed protocols which would allow libcurl to do
954 multiple parallel transfers from the same host using the same connection,
955 much in the same spirit as HTTP/2 does. libcurl however does not take
956 advantage of that ability but will instead always create a new connection for
957 new transfers even if an existing connection already exists to the host.
958
959 To fix this, libcurl would have to detect an existing connection and "attach"
960 the new transfer to the existing one.
961
96217.2 SFTP performance
963
964 libcurl's SFTP transfer performance is sub par and can be improved, mostly by
965 the approach mentioned in "1.6 Modified buffer size approach".
966
96717.3 Support better than MD5 hostkey hash
968
969 libcurl offers the CURLOPT_SSH_HOST_PUBLIC_KEY_MD5 option for verifying the
970 server's key. MD5 is generally being deprecated so we should implement
971 support for stronger hashing algorithms. libssh2 itself is what provides this
972 underlying functionality and it supports at least SHA-1 as an alternative.
973 SHA-1 is also being deprecated these days so we should consider working with
974 libssh2 to instead offer support for SHA-256 or similar.
975
97617.4 Support CURLOPT_PREQUOTE
977
978 The two other QUOTE options are supported for SFTP, but this was left out for
979 unknown reasons!
980
98118. Command line tool
982
98318.1 sync
984
985 "curl --sync http://example.com/feed[1-100].rss" or
986 "curl --sync http://example.net/{index,calendar,history}.html"
987
988 Downloads a range or set of URLs using the remote name, but only if the
989 remote file is newer than the local file. A Last-Modified HTTP date header
990 should also be used to set the mod date on the downloaded file.
991
99218.2 glob posts
993
994 Globbing support for -d and -F, as in 'curl -d "name=foo[0-9]" URL'.
995 This is easily scripted though.
996
99718.3 prevent file overwriting
998
999 Add an option that prevents curl from overwriting existing local files. When
1000 used, and there already is an existing file with the target file name
1001 (either -O or -o), a number should be appended (and increased if already
1002 existing). So that index.html becomes first index.html.1 and then
1003 index.html.2 etc.
1004
100518.4 simultaneous parallel transfers
1006
1007 The client could be told to use maximum N simultaneous parallel transfers and
1008 then just make sure that happens. It should of course not make more than one
1009 connection to the same remote host. This would require the client to use the
1010 multi interface. https://curl.haxx.se/bug/feature.cgi?id=1558595
1011
1012 Using the multi interface would also allow properly using parallel transfers
1013 with HTTP/2 and supporting HTTP/2 server push from the command line.
1014
101518.5 UTF-8 filenames in Content-Disposition
1016
1017 RFC 6266 documents how UTF-8 names can be passed to a client in the
1018 Content-Disposition header, and curl does not support this.
1019
1020 https://github.com/curl/curl/issues/1888
1021
102218.6 warning when setting an option
1023
1024 Display a warning when libcurl returns an error when setting an option.
1025 This can be useful to tell when support for a particular feature hasn't been
1026 compiled into the library.
1027
102818.7 warning if curl version is not in sync with libcurl version
1029
1030 This is usually a sign of a funny, weird or unexpected install situations
1031 that aren't always quickly nor easily detected by users. curl and libcurl are
1032 always released in sync and should use the same version numbers unless very
1033 special situations.
1034
103518.8 offer color-coded HTTP header output
1036
1037 By offering different color output on the header name and the header
1038 contents, they could be made more readable and thus help users working on
1039 HTTP services.
1040
104118.9 Choose the name of file in braces for complex URLs
1042
1043 When using braces to download a list of URLs and you use complicated names
1044 in the list of alternatives, it could be handy to allow curl to use other
1045 names when saving.
1046
1047 Consider a way to offer that. Possibly like
1048 {partURL1:name1,partURL2:name2,partURL3:name3} where the name following the
1049 colon is the output name.
1050
1051 See https://github.com/curl/curl/issues/221
1052
105318.10 improve how curl works in a windows console window
1054
1055 If you pull the scrollbar when transferring with curl in a Windows console
1056 window, the transfer is interrupted and can get disconnected. This can
1057 probably be improved. See https://github.com/curl/curl/issues/322
1058
105918.11 Windows: set attribute 'archive' for completed downloads
1060
1061 The archive bit (FILE_ATTRIBUTE_ARCHIVE, 0x20) separates files that shall be
1062 backed up from those that are either not ready or have not changed.
1063
1064 Downloads in progress are neither ready to be backed up, nor should they be
1065 opened by a different process. Only after a download has been completed it's
1066 sensible to include it in any integer snapshot or backup of the system.
1067
1068 See https://github.com/curl/curl/issues/3354
1069
107018.12 keep running, read instructions from pipe/socket
1071
1072 Provide an option that makes curl not exit after the last URL (or even work
1073 without a given URL), and then make it read instructions passed on a pipe or
1074 over a socket to make further instructions so that a second subsequent curl
1075 invoke can talk to the still running instance and ask for transfers to get
1076 done, and thus maintain its connection pool, DNS cache and more.
1077
107818.13 support metalink in http headers
1079
1080 Curl has support for downloading a metalink xml file, processing it, and then
1081 downloading the target of the metalink. This is done via the --metalink option.
1082 It would be nice if metalink also supported downloading via metalink
1083 information that is stored in HTTP headers (RFC 6249). Theoretically this could
1084 also be supported with the --metalink option.
1085
1086 See https://tools.ietf.org/html/rfc6249
1087
1088 See also https://lists.gnu.org/archive/html/bug-wget/2015-06/msg00034.html for
1089 an implematation of this in wget.
1090
109118.14 --fail without --location should treat 3xx as a failure
1092
1093 To allow a command line like this to detect a redirect and consider it a
1094 failure:
1095
1096    curl -v --fail -O https://example.com/curl-7.48.0.tar.gz
1097
1098 ... --fail must treat 3xx responses as failures too. The least problematic
1099 way to implement this is probably to add that new logic in the command line
1100 tool only and not in the underlying CURLOPT_FAILONERROR logic.
1101
110218.15 --retry should resume
1103
1104 When --retry is used and curl actually retries transfer, it should use the
1105 already transferred data and do a resumed transfer for the rest (when
1106 possible) so that it doesn't have to transfer the same data again that was
1107 already transferred before the retry.
1108
1109 See https://github.com/curl/curl/issues/1084
1110
111118.16 send only part of --data
1112
1113 When the user only wants to send a small piece of the data provided with
1114 --data or --data-binary, like when that data is a huge file, consider a way
1115 to specify that curl should only send a piece of that. One suggested syntax
1116 would be: "--data-binary @largefile.zip!1073741823-2147483647".
1117
1118 See https://github.com/curl/curl/issues/1200
1119
112018.17 consider file name from the redirected URL with -O ?
1121
1122 When a user gives a URL and uses -O, and curl follows a redirect to a new
1123 URL, the file name is not extracted and used from the newly redirected-to URL
1124 even if the new URL may have a much more sensible file name.
1125
1126 This is clearly documented and helps for security since there's no surprise
1127 to users which file name that might get overwritten. But maybe a new option
1128 could allow for this or maybe -J should imply such a treatment as well as -J
1129 already allows for the server to decide what file name to use so it already
1130 provides the "may overwrite any file" risk.
1131
1132 This is extra tricky if the original URL has no file name part at all since
1133 then the current code path will error out with an error message, and we can't
1134 *know* already at that point if curl will be redirected to a URL that has a
1135 file name...
1136
1137 See https://github.com/curl/curl/issues/1241
1138
113918.18 retry on network is unreachable
1140
1141 The --retry option retries transfers on "transient failures". We later added
1142 --retry-connrefused to also retry for "connection refused" errors.
1143
1144 Suggestions have been brought to also allow retry on "network is unreachable"
1145 errors and while totally reasonable, maybe we should consider a way to make
1146 this more configurable than to add a new option for every new error people
1147 want to retry for?
1148
1149 https://github.com/curl/curl/issues/1603
1150
115118.19 expand ~/ in config files
1152
1153 For example .curlrc could benefit from being able to do this.
1154
1155 See https://github.com/curl/curl/issues/2317
1156
115718.20 host name sections in config files
1158
1159 config files would be more powerful if they could set different
1160 configurations depending on used URLs, host name or possibly origin. Then a
1161 default .curlrc could a specific user-agent only when doing requests against
1162 a certain site.
1163
1164
116519. Build
1166
116719.1 roffit
1168
1169 Consider extending 'roffit' to produce decent ASCII output, and use that
1170 instead of (g)nroff when building src/tool_hugehelp.c
1171
117219.2 Enable PIE and RELRO by default
1173
1174 Especially when having programs that execute curl via the command line, PIE
1175 renders the exploitation of memory corruption vulnerabilities a lot more
1176 difficult. This can be attributed to the additional information leaks being
1177 required to conduct a successful attack. RELRO, on the other hand, masks
1178 different binary sections like the GOT as read-only and thus kills a handful
1179 of techniques that come in handy when attackers are able to arbitrarily
1180 overwrite memory. A few tests showed that enabling these features had close
1181 to no impact, neither on the performance nor on the general functionality of
1182 curl.
1183
118419.3 cmake test suite improvements
1185
1186 The cmake build doesn't support 'make show' so it doesn't know which tests
1187 are in the makefile or not (making appveyor builds do many false warnings
1188 about it) nor does it support running the test suite if building out-of-tree.
1189
1190 See https://github.com/curl/curl/issues/3109
1191
119220. Test suite
1193
119420.1 SSL tunnel
1195
1196 Make our own version of stunnel for simple port forwarding to enable HTTPS
1197 and FTP-SSL tests without the stunnel dependency, and it could allow us to
1198 provide test tools built with either OpenSSL or GnuTLS
1199
120020.2 nicer lacking perl message
1201
1202 If perl wasn't found by the configure script, don't attempt to run the tests
1203 but explain something nice why it doesn't.
1204
120520.3 more protocols supported
1206
1207 Extend the test suite to include more protocols. The telnet could just do FTP
1208 or http operations (for which we have test servers).
1209
121020.4 more platforms supported
1211
1212 Make the test suite work on more platforms. OpenBSD and Mac OS. Remove
1213 fork()s and it should become even more portable.
1214
121520.5 Add support for concurrent connections
1216
1217 Tests 836, 882 and 938 were designed to verify that separate connections aren't
1218 used when using different login credentials in protocols that shouldn't re-use
1219 a connection under such circumstances.
1220
1221 Unfortunately, ftpserver.pl doesn't appear to support multiple concurrent
1222 connections. The read while() loop seems to loop until it receives a disconnect
1223 from the client, where it then enters the waiting for connections loop. When
1224 the client opens a second connection to the server, the first connection hasn't
1225 been dropped (unless it has been forced - which we shouldn't do in these tests)
1226 and thus the wait for connections loop is never entered to receive the second
1227 connection.
1228
122920.6 Use the RFC6265 test suite
1230
1231 A test suite made for HTTP cookies (RFC 6265) by Adam Barth is available at
1232 https://github.com/abarth/http-state/tree/master/tests
1233
1234 It'd be really awesome if someone would write a script/setup that would run
1235 curl with that test suite and detect deviances. Ideally, that would even be
1236 incorporated into our regular test suite.
1237
123820.7 Support LD_PRELOAD on macOS
1239
1240 LD_RELOAD doesn't work on macOS, but there are tests which require it to run
1241 properly. Look into making the preload support in runtests.pl portable such
1242 that it uses DYLD_INSERT_LIBRARIES on macOS.
1243
124421. Next SONAME bump
1245
124621.1 http-style HEAD output for FTP
1247
1248 #undef CURL_FTP_HTTPSTYLE_HEAD in lib/ftp.c to remove the HTTP-style headers
1249 from being output in NOBODY requests over FTP
1250
125121.2 combine error codes
1252
1253 Combine some of the error codes to remove duplicates.  The original
1254 numbering should not be changed, and the old identifiers would be
1255 macroed to the new ones in an CURL_NO_OLDIES section to help with
1256 backward compatibility.
1257
1258 Candidates for removal and their replacements:
1259
1260    CURLE_FILE_COULDNT_READ_FILE => CURLE_REMOTE_FILE_NOT_FOUND
1261
1262    CURLE_FTP_COULDNT_RETR_FILE => CURLE_REMOTE_FILE_NOT_FOUND
1263
1264    CURLE_FTP_COULDNT_USE_REST => CURLE_RANGE_ERROR
1265
1266    CURLE_FUNCTION_NOT_FOUND => CURLE_FAILED_INIT
1267
1268    CURLE_LDAP_INVALID_URL => CURLE_URL_MALFORMAT
1269
1270    CURLE_TFTP_NOSUCHUSER => CURLE_TFTP_ILLEGAL
1271
1272    CURLE_TFTP_NOTFOUND => CURLE_REMOTE_FILE_NOT_FOUND
1273
1274    CURLE_TFTP_PERM => CURLE_REMOTE_ACCESS_DENIED
1275
127621.3 extend CURLOPT_SOCKOPTFUNCTION prototype
1277
1278 The current prototype only provides 'purpose' that tells what the
1279 connection/socket is for, but not any protocol or similar. It makes it hard
1280 for applications to differentiate on TCP vs UDP and even HTTP vs FTP and
1281 similar.
1282
128322. Next major release
1284
128522.1 cleanup return codes
1286
1287 curl_easy_cleanup() returns void, but curl_multi_cleanup() returns a
1288 CURLMcode. These should be changed to be the same.
1289
129022.2 remove obsolete defines
1291
1292 remove obsolete defines from curl/curl.h
1293
129422.3 size_t
1295
1296 make several functions use size_t instead of int in their APIs
1297
129822.4 remove several functions
1299
1300 remove the following functions from the public API:
1301
1302 curl_getenv
1303
1304 curl_mprintf (and variations)
1305
1306 curl_strequal
1307
1308 curl_strnequal
1309
1310 They will instead become curlx_ - alternatives. That makes the curl app
1311 still capable of using them, by building with them from source.
1312
1313 These functions have no purpose anymore:
1314
1315 curl_multi_socket
1316
1317 curl_multi_socket_all
1318
131922.5 remove CURLOPT_FAILONERROR
1320
1321 Remove support for CURLOPT_FAILONERROR, it has gotten too kludgy and weird
1322 internally. Let the app judge success or not for itself.
1323
132422.7 remove progress meter from libcurl
1325
1326 The internally provided progress meter output doesn't belong in the library.
1327 Basically no application wants it (apart from curl) but instead applications
1328 can and should do their own progress meters using the progress callback.
1329
1330 The progress callback should then be bumped as well to get proper 64bit
1331 variable types passed to it instead of doubles so that big files work
1332 correctly.
1333
133422.8 remove 'curl_httppost' from public
1335
1336 curl_formadd() was made to fill in a public struct, but the fact that the
1337 struct is public is never really used by application for their own advantage
1338 but instead often restricts how the form functions can or can't be modified.
1339
1340 Changing them to return a private handle will benefit the implementation and
1341 allow us much greater freedoms while still maintaining a solid API and ABI.
1342