KNOWN_BUGS 44 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174
  1. _ _ ____ _
  2. ___| | | | _ \| |
  3. / __| | | | |_) | |
  4. | (__| |_| | _ <| |___
  5. \___|\___/|_| \_\_____|
  6. Known Bugs
  7. These are problems and bugs known to exist at the time of this release. Feel
  8. free to join in and help us correct one or more of these! Also be sure to
  9. check the changelog of the current development status, as one or more of these
  10. problems may have been fixed or changed somewhat since this was written!
  11. 1. HTTP
  12. 1.2 Multiple methods in a single WWW-Authenticate: header
  13. 1.3 STARTTRANSFER time is wrong for HTTP POSTs
  14. 1.4 multipart formposts file name encoding
  15. 1.5 Expect-100 meets 417
  16. 1.6 Unnecessary close when 401 received waiting for 100
  17. 1.7 Deflate error after all content was received
  18. 1.8 DoH is not used for all name resolves when enabled
  19. 1.11 CURLOPT_SEEKFUNCTION not called with CURLFORM_STREAM
  20. 2. TLS
  21. 2.1 CURLINFO_SSL_VERIFYRESULT has limited support
  22. 2.2 DER in keychain
  23. 2.3 Unable to use PKCS12 certificate with Secure Transport
  24. 2.4 Secure Transport will not import PKCS#12 client certificates without a password
  25. 2.5 Client cert handling with Issuer DN differs between backends
  26. 2.6 CURL_GLOBAL_SSL
  27. 2.7 Client cert (MTLS) issues with Schannel
  28. 2.8 Schannel disable CURLOPT_SSL_VERIFYPEER and verify hostname
  29. 2.9 TLS session cache does not work with TFO
  30. 2.10 Store TLS context per transfer instead of per connection
  31. 2.11 Schannel TLS 1.2 handshake bug in old Windows versions
  32. 2.12 FTPS with Schannel times out file list operation
  33. 2.14 Secure Transport disabling hostname validation also disables SNI
  34. 2.15 Renegotiate from server may cause hang for OpenSSL backend
  35. 3. Email protocols
  36. 3.1 IMAP SEARCH ALL truncated response
  37. 3.2 No disconnect command
  38. 3.3 POP3 expects "CRLF.CRLF" eob for some single-line responses
  39. 3.4 AUTH PLAIN for SMTP is not working on all servers
  40. 4. Command line
  41. 4.1 -J and -O with %-encoded file names
  42. 4.2 -J with -C - fails
  43. 4.3 --retry and transfer timeouts
  44. 5. Build and portability issues
  45. 5.1 OS400 port requires deprecated IBM library
  46. 5.2 curl-config --libs contains private details
  47. 5.3 curl compiled on OSX 10.13 failed to run on OSX 10.10
  48. 5.4 Build with statically built dependency
  49. 5.5 cannot handle Unicode arguments in non-Unicode builds on Windows
  50. 5.7 Visual Studio project gaps
  51. 5.8 configure finding libs in wrong directory
  52. 5.9 Utilize Requires.private directives in libcurl.pc
  53. 5.10 SMB tests fail with Python 2
  54. 5.11 configure --with-gssapi with Heimdal is ignored on macOS
  55. 5.12 flaky Windows CI builds
  56. 6. Authentication
  57. 6.1 NTLM authentication and unicode
  58. 6.2 MIT Kerberos for Windows build
  59. 6.3 NTLM in system context uses wrong name
  60. 6.4 Negotiate and Kerberos V5 need a fake user name
  61. 6.5 NTLM does not support password with § character
  62. 6.6 libcurl can fail to try alternatives with --proxy-any
  63. 6.7 Do not clear digest for single realm
  64. 6.8 RTSP authentication breaks without redirect support
  65. 6.9 SHA-256 digest not supported in Windows SSPI builds
  66. 6.10 curl never completes Negotiate over HTTP
  67. 6.11 Negotiate on Windows fails
  68. 6.12 cannot use Secure Transport with Crypto Token Kit
  69. 7. FTP
  70. 7.1 FTP without or slow 220 response
  71. 7.2 FTP with CONNECT and slow server
  72. 7.3 FTP with NOBODY and FAILONERROR
  73. 7.4 FTP with ACCT
  74. 7.5 ASCII FTP
  75. 7.6 FTP with NULs in URL parts
  76. 7.7 FTP and empty path parts in the URL
  77. 7.8 Premature transfer end but healthy control channel
  78. 7.9 Passive transfer tries only one IP address
  79. 7.10 FTPS needs session reuse
  80. 7.11 FTPS upload data loss with TLS 1.3
  81. 8. TELNET
  82. 8.1 TELNET and time limitations do not work
  83. 8.2 Microsoft telnet server
  84. 9. SFTP and SCP
  85. 9.1 SFTP does not do CURLOPT_POSTQUOTE correct
  86. 9.2 wolfssh: publickey auth does not work
  87. 9.3 Remote recursive folder creation with SFTP
  88. 10. SOCKS
  89. 10.3 FTPS over SOCKS
  90. 10.4 active FTP over a SOCKS
  91. 11. Internals
  92. 11.1 Curl leaks .onion hostnames in DNS
  93. 11.2 error buffer not set if connection to multiple addresses fails
  94. 11.3 Disconnects do not do verbose
  95. 11.4 HTTP test server 'connection-monitor' problems
  96. 11.5 Connection information when using TCP Fast Open
  97. 11.6 slow connect to localhost on Windows
  98. 11.7 signal-based resolver timeouts
  99. 11.8 DoH leaks memory after followlocation
  100. 11.9 DoH does not inherit all transfer options
  101. 11.10 Blocking socket operations in non-blocking API
  102. 11.11 A shared connection cache is not thread-safe
  103. 11.12 'no_proxy' string-matches IPv6 numerical addresses
  104. 11.13 wakeup socket disconnect causes havoc
  105. 11.14 Multi perform hangs waiting for threaded resolver
  106. 11.15 CURLOPT_OPENSOCKETPAIRFUNCTION is missing
  107. 11.16 libcurl uses renames instead of locking for atomic operations
  108. 12. LDAP
  109. 12.1 OpenLDAP hangs after returning results
  110. 12.2 LDAP on Windows does authentication wrong?
  111. 12.3 LDAP on Windows does not work
  112. 12.4 LDAPS with NSS is slow
  113. 13. TCP/IP
  114. 13.1 --interface for ipv6 binds to unusable IP address
  115. 14. DICT
  116. 14.1 DICT responses show the underlying protocol
  117. 15. CMake
  118. 15.1 use correct SONAME
  119. 15.2 support build with GnuTLS
  120. 15.3 unusable tool_hugehelp.c with MinGW
  121. 15.4 build docs/curl.1
  122. 15.5 build on Linux links libcurl to libdl
  123. 15.6 uses -lpthread instead of Threads::Threads
  124. 15.7 generated .pc file contains strange entries
  125. 15.8 libcurl.pc uses absolute library paths
  126. 15.9 cert paths autodetected when cross-compiling
  127. 15.10 libspsl is not supported
  128. 15.11 ExternalProject_Add does not set CURL_CA_PATH
  129. 15.12 cannot enable LDAPS on Windows
  130. 15.13 CMake build with MIT Kerberos does not work
  131. 16. Applications
  132. 16.1 pulseUI VPN client
  133. 17. HTTP/2
  134. 17.1 Excessive HTTP/2 packets with TCP_NODELAY
  135. 17.2 HTTP/2 frames while in the connection pool kill reuse
  136. 17.3 ENHANCE_YOUR_CALM causes infinite retries
  137. 17.4 Connection failures with parallel HTTP/2
  138. 17.5 HTTP/2 connections through HTTPS proxy frequently stall
  139. 18. HTTP/3
  140. 18.1 If the HTTP/3 server closes connection during upload curl hangs
  141. 18.2 Uploading HTTP/3 files gets interrupted at certain file sizes
  142. 18.3 HTTP/3 download is 5x times slower than HTTP/2
  143. 18.4 Downloading with HTTP/3 produces broken files
  144. 18.5 HTTP/3 download with quiche halts after a while
  145. 18.6 HTTP/3 multipart POST with quiche fails
  146. 18.7 HTTP/3 quiche upload large file fails
  147. 18.8 HTTP/3 does not support client certs
  148. 18.9 connection migration does not work
  149. ==============================================================================
  150. 1. HTTP
  151. 1.2 Multiple methods in a single WWW-Authenticate: header
  152. The HTTP responses headers WWW-Authenticate: can provide information about
  153. multiple authentication methods as multiple headers or as several methods
  154. within a single header. The latter way, several methods in the same physical
  155. line, is not supported by libcurl's parser. (For no good reason.)
  156. 1.3 STARTTRANSFER time is wrong for HTTP POSTs
  157. Wrong STARTTRANSFER timer accounting for POST requests Timer works fine with
  158. GET requests, but while using POST the time for CURLINFO_STARTTRANSFER_TIME
  159. is wrong. While using POST CURLINFO_STARTTRANSFER_TIME minus
  160. CURLINFO_PRETRANSFER_TIME is near to zero every time.
  161. https://github.com/curl/curl/issues/218
  162. https://curl.se/bug/view.cgi?id=1213
  163. 1.4 multipart formposts file name encoding
  164. When creating multipart formposts. The file name part can be encoded with
  165. something beyond ascii but currently libcurl will only pass in the verbatim
  166. string the app provides. There are several browsers that already do this
  167. encoding. The key seems to be the updated draft to RFC2231:
  168. https://tools.ietf.org/html/draft-reschke-rfc2231-in-http-02
  169. 1.5 Expect-100 meets 417
  170. If an upload using Expect: 100-continue receives an HTTP 417 response, it
  171. ought to be automatically resent without the Expect:. A workaround is for
  172. the client application to redo the transfer after disabling Expect:.
  173. https://curl.se/mail/archive-2008-02/0043.html
  174. 1.6 Unnecessary close when 401 received waiting for 100
  175. libcurl closes the connection if an HTTP 401 reply is received while it is
  176. waiting for the 100-continue response.
  177. https://curl.se/mail/lib-2008-08/0462.html
  178. 1.7 Deflate error after all content was received
  179. There's a situation where we can get an error in a HTTP response that is
  180. compressed, when that error is detected after all the actual body contents
  181. have been received and delivered to the application. This is tricky, but is
  182. ultimately a broken server.
  183. See https://github.com/curl/curl/issues/2719
  184. 1.8 DoH is not used for all name resolves when enabled
  185. Even if DoH is specified to be used, there are some name resolves that are
  186. done without it. This should be fixed. When the internal function
  187. `Curl_resolver_wait_resolv()` is called, it does not use DoH to complete the
  188. resolve as it otherwise should.
  189. See https://github.com/curl/curl/pull/3857 and
  190. https://github.com/curl/curl/pull/3850
  191. 1.11 CURLOPT_SEEKFUNCTION not called with CURLFORM_STREAM
  192. I'm using libcurl to POST form data using a FILE* with the CURLFORM_STREAM
  193. option of curl_formadd(). I have noticed that if the connection drops at just
  194. the right time, the POST is reattempted without the data from the file. It
  195. seems like the file stream position is not getting reset to the beginning of
  196. the file. I found the CURLOPT_SEEKFUNCTION option and set that with a
  197. function that performs an fseek() on the FILE*. However, setting that did not
  198. seem to fix the issue or even get called. See
  199. https://github.com/curl/curl/issues/768
  200. 2. TLS
  201. 2.1 CURLINFO_SSL_VERIFYRESULT has limited support
  202. CURLINFO_SSL_VERIFYRESULT is only implemented for the OpenSSL, NSS and
  203. GnuTLS backends, so relying on this information in a generic app is flaky.
  204. 2.2 DER in keychain
  205. Curl does not recognize certificates in DER format in keychain, but it works
  206. with PEM. https://curl.se/bug/view.cgi?id=1065
  207. 2.3 Unable to use PKCS12 certificate with Secure Transport
  208. See https://github.com/curl/curl/issues/5403
  209. 2.4 Secure Transport will not import PKCS#12 client certificates without a password
  210. libcurl calls SecPKCS12Import with the PKCS#12 client certificate, but that
  211. function rejects certificates that do not have a password.
  212. https://github.com/curl/curl/issues/1308
  213. 2.5 Client cert handling with Issuer DN differs between backends
  214. When the specified client certificate does not match any of the
  215. server-specified DNs, the OpenSSL and GnuTLS backends behave differently.
  216. The github discussion may contain a solution.
  217. See https://github.com/curl/curl/issues/1411
  218. 2.6 CURL_GLOBAL_SSL
  219. Since libcurl 7.57.0, the flag CURL_GLOBAL_SSL is a no-op. The change was
  220. merged in https://github.com/curl/curl/commit/d661b0afb571a
  221. It was removed since it was
  222. A) never clear for applications on how to deal with init in the light of
  223. different SSL backends (the option was added back in the days when life
  224. was simpler)
  225. B) multissl introduced dynamic switching between SSL backends which
  226. emphasized (A) even more
  227. C) libcurl uses some TLS backend functionality even for non-TLS functions (to
  228. get "good" random) so applications trying to avoid the init for
  229. performance reasons would do wrong anyway
  230. D) not documented carefully so all this mostly just happened to work
  231. for some users
  232. However, in spite of the problems with the feature, there were some users who
  233. apparently depended on this feature and who now claim libcurl is broken for
  234. them. The fix for this situation is not obvious as a downright revert of the
  235. patch is totally ruled out due to those reasons above.
  236. https://github.com/curl/curl/issues/2276
  237. 2.7 Client cert (MTLS) issues with Schannel
  238. See https://github.com/curl/curl/issues/3145
  239. 2.8 Schannel disable CURLOPT_SSL_VERIFYPEER and verify hostname
  240. This seems to be a limitation in the underlying Schannel API.
  241. https://github.com/curl/curl/issues/3284
  242. 2.9 TLS session cache does not work with TFO
  243. See https://github.com/curl/curl/issues/4301
  244. 2.10 Store TLS context per transfer instead of per connection
  245. The GnuTLS `backend->cred` and the OpenSSL `backend->ctx` data and their
  246. proxy versions (and possibly other TLS backends), could be better moved to be
  247. stored in the Curl_easy handle instead of in per connection so that a single
  248. transfer that makes multiple connections can reuse the context and reduce
  249. memory consumption.
  250. https://github.com/curl/curl/issues/5102
  251. 2.11 Schannel TLS 1.2 handshake bug in old Windows versions
  252. In old versions of Windows such as 7 and 8.1 the Schannel TLS 1.2 handshake
  253. implementation likely has a bug that can rarely cause the key exchange to
  254. fail, resulting in error SEC_E_BUFFER_TOO_SMALL or SEC_E_MESSAGE_ALTERED.
  255. https://github.com/curl/curl/issues/5488
  256. 2.12 FTPS with Schannel times out file list operation
  257. "Instead of the command completing, it just sits there until the timeout
  258. expires." - the same command line seems to work with other TLS backends and
  259. other operating systems. See https://github.com/curl/curl/issues/5284.
  260. 2.14 Secure Transport disabling hostname validation also disables SNI
  261. SNI is the hostname that is sent by the TLS library to the server as part of
  262. the TLS handshake. Secure Transport does not send SNI when hostname validation
  263. is disabled. Servers that host multiple websites may not know which
  264. certificate to serve without SNI or which backend server to connect to. The
  265. server may serve the certificate of a default server or abort.
  266. If a server aborts a handshake then curl shows error "SSL peer handshake
  267. failed, the server most likely requires a client certificate to connect".
  268. In this case the error may also have been caused by lack of SNI.
  269. https://github.com/curl/curl/issues/6347
  270. 2.15 Renegotiate from server may cause hang for OpenSSL backend
  271. A race condition has been observed when, immediately after the initial
  272. handshake, curl has sent an HTTP request to the server and at the same time
  273. the server has sent a TLS hello request (renegotiate) to curl. Both are
  274. waiting for the other to respond. OpenSSL is supposed to send a handshake
  275. response but does not.
  276. https://github.com/curl/curl/issues/6785
  277. https://github.com/openssl/openssl/issues/14722
  278. 3. Email protocols
  279. 3.1 IMAP SEARCH ALL truncated response
  280. IMAP "SEARCH ALL" truncates output on large boxes. "A quick search of the
  281. code reveals that pingpong.c contains some truncation code, at line 408, when
  282. it deems the server response to be too large truncating it to 40 characters"
  283. https://curl.se/bug/view.cgi?id=1366
  284. 3.2 No disconnect command
  285. The disconnect commands (LOGOUT and QUIT) may not be sent by IMAP, POP3 and
  286. SMTP if a failure occurs during the authentication phase of a connection.
  287. 3.3 POP3 expects "CRLF.CRLF" eob for some single-line responses
  288. You have to tell libcurl not to expect a body, when dealing with one line
  289. response commands. Please see the POP3 examples and test cases which show
  290. this for the NOOP and DELE commands. https://curl.se/bug/?i=740
  291. 3.4 AUTH PLAIN for SMTP is not working on all servers
  292. Specifying "--login-options AUTH=PLAIN" on the command line does not seem to
  293. work correctly.
  294. See https://github.com/curl/curl/issues/4080
  295. 4. Command line
  296. 4.1 -J and -O with %-encoded file names
  297. -J/--remote-header-name does not decode %-encoded file names. RFC6266 details
  298. how it should be done. The can of worm is basically that we have no charset
  299. handling in curl and ascii >=128 is a challenge for us. Not to mention that
  300. decoding also means that we need to check for nastiness that is attempted,
  301. like "../" sequences and the like. Probably everything to the left of any
  302. embedded slashes should be cut off.
  303. https://curl.se/bug/view.cgi?id=1294
  304. -O also does not decode %-encoded names, and while it has even less
  305. information about the charset involved the process is similar to the -J case.
  306. Note that we will not add decoding to -O without the user asking for it with
  307. some other means as well, since -O has always been documented to use the name
  308. exactly as specified in the URL.
  309. 4.2 -J with -C - fails
  310. When using -J (with -O), automatically resumed downloading together with "-C
  311. -" fails. Without -J the same command line works! This happens because the
  312. resume logic is worked out before the target file name (and thus its
  313. pre-transfer size) has been figured out!
  314. https://curl.se/bug/view.cgi?id=1169
  315. 4.3 --retry and transfer timeouts
  316. If using --retry and the transfer timeouts (possibly due to using -m or
  317. -y/-Y) the next attempt does not resume the transfer properly from what was
  318. downloaded in the previous attempt but will truncate and restart at the
  319. original position where it was at before the previous failed attempt. See
  320. https://curl.se/mail/lib-2008-01/0080.html and Mandriva bug report
  321. https://qa.mandriva.com/show_bug.cgi?id=22565
  322. 5. Build and portability issues
  323. 5.1 OS400 port requires deprecated IBM library
  324. curl for OS400 requires QADRT to build, which provides ASCII wrappers for
  325. libc/POSIX functions in the ILE, but IBM no longer supports or even offers
  326. this library to download.
  327. See https://github.com/curl/curl/issues/5176
  328. 5.2 curl-config --libs contains private details
  329. "curl-config --libs" will include details set in LDFLAGS when configure is
  330. run that might be needed only for building libcurl. Further, curl-config
  331. --cflags suffers from the same effects with CFLAGS/CPPFLAGS.
  332. 5.3 curl compiled on OSX 10.13 failed to run on OSX 10.10
  333. See https://github.com/curl/curl/issues/2905
  334. 5.4 Build with statically built dependency
  335. The build scripts in curl (autotools, cmake and others) are primarily done to
  336. work with shared/dynamic third party dependencies. When linking with shared
  337. libraries, the dependency "chain" is handled automatically by the library
  338. loader - on all modern systems.
  339. If you instead link with a static library, we need to provide all the
  340. dependency libraries already at the link command line.
  341. Figuring out all the dependency libraries for a given library is hard, as it
  342. might also involve figuring out the dependencies of the dependencies and they
  343. may vary between platforms and even change between versions.
  344. When using static dependencies, the build scripts will mostly assume that
  345. you, the user, will provide all the necessary additional dependency libraries
  346. as additional arguments in the build. With configure, by setting LIBS/LDFLAGS
  347. on the command line.
  348. We welcome help to improve curl's ability to link with static libraries, but
  349. it is likely a task that we can never fully support.
  350. 5.5 cannot handle Unicode arguments in non-Unicode builds on Windows
  351. If a URL or filename cannot be encoded using the user's current codepage then
  352. it can only be encoded properly in the Unicode character set. Windows uses
  353. UTF-16 encoding for Unicode and stores it in wide characters, however curl
  354. and libcurl are not equipped for that at the moment except when built with
  355. _UNICODE and UNICODE defined. And, except for Cygwin, Windows cannot use UTF-8
  356. as a locale.
  357. https://curl.se/bug/?i=345
  358. https://curl.se/bug/?i=731
  359. https://curl.se/bug/?i=3747
  360. 5.7 Visual Studio project gaps
  361. The Visual Studio projects lack some features that the autoconf and nmake
  362. builds offer, such as the following:
  363. - support for zlib and nghttp2
  364. - use of static runtime libraries
  365. - add the test suite components
  366. In addition to this the following could be implemented:
  367. - support for other development IDEs
  368. - add PATH environment variables for third-party DLLs
  369. 5.8 configure finding libs in wrong directory
  370. When the configure script checks for third-party libraries, it adds those
  371. directories to the LDFLAGS variable and then tries linking to see if it
  372. works. When successful, the found directory is kept in the LDFLAGS variable
  373. when the script continues to execute and do more tests and possibly check for
  374. more libraries.
  375. This can make subsequent checks for libraries wrongly detect another
  376. installation in a directory that was previously added to LDFLAGS by another
  377. library check!
  378. A possibly better way to do these checks would be to keep the pristine LDFLAGS
  379. even after successful checks and instead add those verified paths to a
  380. separate variable that only after all library checks have been performed gets
  381. appended to LDFLAGS.
  382. 5.9 Utilize Requires.private directives in libcurl.pc
  383. https://github.com/curl/curl/issues/864
  384. 5.10 SMB tests fail with Python 2
  385. The error message says "TreeConnectAndX not found".
  386. See https://github.com/curl/curl/issues/5983
  387. 5.11 configure --with-gssapi with Heimdal is ignored on macOS
  388. ... unless you also pass --with-gssapi-libs
  389. https://github.com/curl/curl/issues/3841
  390. 5.12 flaky Windows CI builds
  391. We run many CI builds for each commit and PR on github, and especially a
  392. number of the Windows builds are flaky. This means that we rarely get all CI
  393. builds go green and complete without errors. This is unfortunate as it makes
  394. us sometimes miss actual build problems and it is surprising to newcomers to
  395. the project who (rightfully) do not expect this.
  396. See https://github.com/curl/curl/issues/6972
  397. 6. Authentication
  398. 6.1 NTLM authentication and unicode
  399. NTLM authentication involving unicode user name or password only works
  400. properly if built with UNICODE defined together with the Schannel
  401. backend. The original problem was mentioned in:
  402. https://curl.se/mail/lib-2009-10/0024.html
  403. https://curl.se/bug/view.cgi?id=896
  404. The Schannel version verified to work as mentioned in
  405. https://curl.se/mail/lib-2012-07/0073.html
  406. 6.2 MIT Kerberos for Windows build
  407. libcurl fails to build with MIT Kerberos for Windows (KfW) due to KfW's
  408. library header files exporting symbols/macros that should be kept private to
  409. the KfW library. See ticket #5601 at https://krbdev.mit.edu/rt/
  410. 6.3 NTLM in system context uses wrong name
  411. NTLM authentication using SSPI (on Windows) when (lib)curl is running in
  412. "system context" will make it use wrong(?) user name - at least when compared
  413. to what winhttp does. See https://curl.se/bug/view.cgi?id=535
  414. 6.4 Negotiate and Kerberos V5 need a fake user name
  415. In order to get Negotiate (SPNEGO) authentication to work in HTTP or Kerberos
  416. V5 in the e-mail protocols, you need to provide a (fake) user name (this
  417. concerns both curl and the lib) because the code wrongly only considers
  418. authentication if there's a user name provided by setting
  419. conn->bits.user_passwd in url.c https://curl.se/bug/view.cgi?id=440 How?
  420. https://curl.se/mail/lib-2004-08/0182.html A possible solution is to
  421. either modify this variable to be set or introduce a variable such as
  422. new conn->bits.want_authentication which is set when any of the authentication
  423. options are set.
  424. 6.5 NTLM does not support password with § character
  425. https://github.com/curl/curl/issues/2120
  426. 6.6 libcurl can fail to try alternatives with --proxy-any
  427. When connecting via a proxy using --proxy-any, a failure to establish an
  428. authentication will cause libcurl to abort trying other options if the
  429. failed method has a higher preference than the alternatives. As an example,
  430. --proxy-any against a proxy which advertise Negotiate and NTLM, but which
  431. fails to set up Kerberos authentication will not proceed to try authentication
  432. using NTLM.
  433. https://github.com/curl/curl/issues/876
  434. 6.7 Do not clear digest for single realm
  435. https://github.com/curl/curl/issues/3267
  436. 6.8 RTSP authentication breaks without redirect support
  437. RTSP authentication broke in 7.66.0. A work-around is to enable RTSP in
  438. CURLOPT_REDIR_PROTOCOLS. Authentication should however not be considered an
  439. actual redirect so a "proper" fix needs to be different and not require users
  440. to allow redirects to RTSP to work.
  441. See https://github.com/curl/curl/pull/4750
  442. 6.9 SHA-256 digest not supported in Windows SSPI builds
  443. Windows builds of curl that have SSPI enabled use the native Windows API calls
  444. to create authentication strings. The call to InitializeSecurityContext fails
  445. with SEC_E_QOP_NOT_SUPPORTED which causes curl to fail with CURLE_AUTH_ERROR.
  446. Microsoft does not document supported digest algorithms and that SEC_E error
  447. code is not a documented error for InitializeSecurityContext (digest).
  448. https://github.com/curl/curl/issues/6302
  449. 6.10 curl never completes Negotiate over HTTP
  450. Apparently it is not working correctly...?
  451. See https://github.com/curl/curl/issues/5235
  452. 6.11 Negotiate on Windows fails
  453. When using --negotiate (or NTLM) with curl on Windows, SSL/TSL handshake
  454. fails despite having a valid kerberos ticket cached. Works without any issue
  455. in Unix/Linux.
  456. https://github.com/curl/curl/issues/5881
  457. 6.12 cannot use Secure Transport with Crypto Token Kit
  458. https://github.com/curl/curl/issues/7048
  459. 7. FTP
  460. 7.1 FTP without or slow 220 response
  461. If a connection is made to a FTP server but the server then just never sends
  462. the 220 response or otherwise is dead slow, libcurl will not acknowledge the
  463. connection timeout during that phase but only the "real" timeout - which may
  464. surprise users as it is probably considered to be the connect phase to most
  465. people. Brought up (and is being misunderstood) in:
  466. https://curl.se/bug/view.cgi?id=856
  467. 7.2 FTP with CONNECT and slow server
  468. When doing FTP over a socks proxy or CONNECT through HTTP proxy and the multi
  469. interface is used, libcurl will fail if the (passive) TCP connection for the
  470. data transfer is not more or less instant as the code does not properly wait
  471. for the connect to be confirmed. See test case 564 for a first shot at a test
  472. case.
  473. 7.3 FTP with NOBODY and FAILONERROR
  474. It seems sensible to be able to use CURLOPT_NOBODY and CURLOPT_FAILONERROR
  475. with FTP to detect if a file exists or not, but it is not working:
  476. https://curl.se/mail/lib-2008-07/0295.html
  477. 7.4 FTP with ACCT
  478. When doing an operation over FTP that requires the ACCT command (but not when
  479. logging in), the operation will fail since libcurl does not detect this and
  480. thus fails to issue the correct command:
  481. https://curl.se/bug/view.cgi?id=635
  482. 7.5 ASCII FTP
  483. FTP ASCII transfers do not follow RFC959. They do not convert the data
  484. accordingly (not for sending nor for receiving). RFC 959 section 3.1.1.1
  485. clearly describes how this should be done:
  486. The sender converts the data from an internal character representation to
  487. the standard 8-bit NVT-ASCII representation (see the Telnet
  488. specification). The receiver will convert the data from the standard
  489. form to his own internal form.
  490. Since 7.15.4 at least line endings are converted.
  491. 7.6 FTP with NULs in URL parts
  492. FTP URLs passed to curl may contain NUL (0x00) in the RFC 1738 <user>,
  493. <password>, and <fpath> components, encoded as "%00". The problem is that
  494. curl_unescape does not detect this, but instead returns a shortened C string.
  495. From a strict FTP protocol standpoint, NUL is a valid character within RFC
  496. 959 <string>, so the way to handle this correctly in curl would be to use a
  497. data structure other than a plain C string, one that can handle embedded NUL
  498. characters. From a practical standpoint, most FTP servers would not
  499. meaningfully support NUL characters within RFC 959 <string>, anyway (e.g.,
  500. Unix pathnames may not contain NUL).
  501. 7.7 FTP and empty path parts in the URL
  502. libcurl ignores empty path parts in FTP URLs, whereas RFC1738 states that
  503. such parts should be sent to the server as 'CWD ' (without an argument). The
  504. only exception to this rule, is that we knowingly break this if the empty
  505. part is first in the path, as then we use the double slashes to indicate that
  506. the user wants to reach the root dir (this exception SHALL remain even when
  507. this bug is fixed).
  508. 7.8 Premature transfer end but healthy control channel
  509. When 'multi_done' is called before the transfer has been completed the normal
  510. way, it is considered a "premature" transfer end. In this situation, libcurl
  511. closes the connection assuming it does not know the state of the connection so
  512. it cannot be reused for subsequent requests.
  513. With FTP however, this is not necessarily true but there are a bunch of
  514. situations (listed in the ftp_done code) where it *could* keep the connection
  515. alive even in this situation - but the current code does not. Fixing this would
  516. allow libcurl to reuse FTP connections better.
  517. 7.9 Passive transfer tries only one IP address
  518. When doing FTP operations through a proxy at localhost, the reported spotted
  519. that curl only tried to connect once to the proxy, while it had multiple
  520. addresses and a failed connect on one address should make it try the next.
  521. After switching to passive mode (EPSV), curl should try all IP addresses for
  522. "localhost". Currently it tries ::1, but it should also try 127.0.0.1.
  523. See https://github.com/curl/curl/issues/1508
  524. 7.10 FTPS needs session reuse
  525. When the control connection is reused for a subsequent transfer, some FTPS
  526. servers complain about "missing session reuse" for the data channel for the
  527. second transfer.
  528. https://github.com/curl/curl/issues/4654
  529. 7.11 FTPS upload data loss with TLS 1.3
  530. During FTPS upload curl does not attempt to read TLS handshake messages sent
  531. after the initial handshake. OpenSSL servers running TLS 1.3 may send such a
  532. message. When curl closes the upload connection if unread data has been
  533. received (such as a TLS handshake message) then the TCP protocol sends an
  534. RST to the server, which may cause the server to discard or truncate the
  535. upload if it has not read all sent data yet, and then return an error to curl
  536. on the control channel connection.
  537. Since 7.78.0 this is mostly fixed. curl will do a single read before closing
  538. TLS connections (which causes the TLS library to read handshake messages),
  539. however there is still possibility of an RST if more messages need to be read
  540. or a message arrives after the read but before close (network race condition).
  541. https://github.com/curl/curl/issues/6149
  542. 8. TELNET
  543. 8.1 TELNET and time limitations do not work
  544. When using telnet, the time limitation options do not work.
  545. https://curl.se/bug/view.cgi?id=846
  546. 8.2 Microsoft telnet server
  547. There seems to be a problem when connecting to the Microsoft telnet server.
  548. https://curl.se/bug/view.cgi?id=649
  549. 9. SFTP and SCP
  550. 9.1 SFTP does not do CURLOPT_POSTQUOTE correct
  551. When libcurl sends CURLOPT_POSTQUOTE commands when connected to a SFTP server
  552. using the multi interface, the commands are not being sent correctly and
  553. instead the connection is "cancelled" (the operation is considered done)
  554. prematurely. There is a half-baked (busy-looping) patch provided in the bug
  555. report but it cannot be accepted as-is. See
  556. https://curl.se/bug/view.cgi?id=748
  557. 9.2 wolfssh: publickey auth does not work
  558. When building curl to use the wolfSSH backend for SFTP, the publickey
  559. authentication does not work. This is simply functionality not written for curl
  560. yet, the necessary API for make this work is provided by wolfSSH.
  561. See https://github.com/curl/curl/issues/4820
  562. 9.3 Remote recursive folder creation with SFTP
  563. On this servers, the curl fails to create directories on the remote server
  564. even when CURLOPT_FTP_CREATE_MISSING_DIRS option is set.
  565. See https://github.com/curl/curl/issues/5204
  566. 10. SOCKS
  567. 10.3 FTPS over SOCKS
  568. libcurl does not support FTPS over a SOCKS proxy.
  569. 10.4 active FTP over a SOCKS
  570. libcurl does not support active FTP over a SOCKS proxy
  571. 11. Internals
  572. 11.1 Curl leaks .onion hostnames in DNS
  573. Curl sends DNS requests for hostnames with a .onion TLD. This leaks
  574. information about what the user is attempting to access, and violates this
  575. requirement of RFC7686: https://tools.ietf.org/html/rfc7686
  576. Issue: https://github.com/curl/curl/issues/543
  577. 11.2 error buffer not set if connection to multiple addresses fails
  578. If you ask libcurl to resolve a hostname like example.com to IPv6 addresses
  579. only. But you only have IPv4 connectivity. libcurl will correctly fail with
  580. CURLE_COULDNT_CONNECT. But the error buffer set by CURLOPT_ERRORBUFFER
  581. remains empty. Issue: https://github.com/curl/curl/issues/544
  582. 11.3 Disconnects do not do verbose
  583. Due to how libcurl keeps connections alive in the "connection pool" after use
  584. to potentially transcend the life-time of the initial easy handle that was
  585. used to drive the transfer over that connection, it uses a *separate* and
  586. internal easy handle when it shuts down the connection. That separate
  587. connection might not have the exact same settings as the original easy
  588. handle, and in particular it is often note-worthy that it does not have the
  589. same VERBOSE and debug callbacks setup so that an application will not get
  590. the protocol data for the disconnect phase of a transfer the same way it got
  591. all the other data.
  592. This is because the original easy handle might have already been freed at that
  593. point and the application might not at all be prepared that the callback
  594. would get called again long after the handle was freed.
  595. See for example https://github.com/curl/curl/issues/6995
  596. 11.4 HTTP test server 'connection-monitor' problems
  597. The 'connection-monitor' feature of the sws HTTP test server does not work
  598. properly if some tests are run in unexpected order. Like 1509 and then 1525.
  599. See https://github.com/curl/curl/issues/868
  600. 11.5 Connection information when using TCP Fast Open
  601. CURLINFO_LOCAL_PORT (and possibly a few other) fails when TCP Fast Open is
  602. enabled.
  603. See https://github.com/curl/curl/issues/1332 and
  604. https://github.com/curl/curl/issues/4296
  605. 11.6 slow connect to localhost on Windows
  606. When connecting to "localhost" on Windows, curl will resolve the name for
  607. both ipv4 and ipv6 and try to connect to both happy eyeballs-style. Something
  608. in there does however make it take 200 milliseconds to succeed - which is the
  609. HAPPY_EYEBALLS_TIMEOUT define exactly. Lowering that define speeds up the
  610. connection, suggesting a problem in the HE handling.
  611. If we can *know* that we are talking to a local host, we should lower the
  612. happy eyeballs delay timeout for IPv6 (related: hardcode the "localhost"
  613. addresses, mentioned in TODO). Possibly we should reduce that delay for all.
  614. https://github.com/curl/curl/issues/2281
  615. 11.7 signal-based resolver timeouts
  616. libcurl built without an asynchronous resolver library uses alarm() to time
  617. out DNS lookups. When a timeout occurs, this causes libcurl to jump from the
  618. signal handler back into the library with a sigsetjmp, which effectively
  619. causes libcurl to continue running within the signal handler. This is
  620. non-portable and could cause problems on some platforms. A discussion on the
  621. problem is available at https://curl.se/mail/lib-2008-09/0197.html
  622. Also, alarm() provides timeout resolution only to the nearest second. alarm
  623. ought to be replaced by setitimer on systems that support it.
  624. 11.8 DoH leaks memory after followlocation
  625. https://github.com/curl/curl/issues/4592
  626. 11.9 DoH does not inherit all transfer options
  627. Some options are not inherited because they are not relevant for the DoH SSL
  628. connections, or inheriting the option may result in unexpected behavior. For
  629. example the user's debug function callback is not inherited because it would
  630. be unexpected for internal handles (ie DoH handles) to be passed to that
  631. callback.
  632. If an option is not inherited then it is not possible to set it separately for
  633. DoH without a DoH-specific option. For example: CURLOPT_DOH_SSL_VERIFYHOST,
  634. CURLOPT_DOH_SSL_VERIFYPEER and CURLOPT_DOH_SSL_VERIFYSTATUS.
  635. See https://github.com/curl/curl/issues/6605
  636. 11.10 Blocking socket operations in non-blocking API
  637. The list of blocking socket operations is in TODO section "More non-blocking".
  638. 11.11 A shared connection cache is not thread-safe
  639. The share interface offers CURL_LOCK_DATA_CONNECT to have multiple easy
  640. handle share a connection cache, but due to how connections are used they are
  641. still not thread-safe when used shared.
  642. See https://github.com/curl/curl/issues/4915 and lib1541.c
  643. 11.12 'no_proxy' string-matches IPv6 numerical addresses
  644. This has the downside that "::1" for example does not match "::0:1" even
  645. though they are in fact the same address.
  646. See https://github.com/curl/curl/issues/5745
  647. 11.13 wakeup socket disconnect causes havoc
  648. waking an iPad breaks the wakeup socket pair, triggering a POLLIN event and
  649. resulting in SOCKERRNO being set to ENOTCONN.
  650. This condition, and other possible error conditions on the wakeup socket, are
  651. not handled, so the condition remains on the FD and curl_multi_poll will
  652. never block again.
  653. See https://github.com/curl/curl/issues/6132 and
  654. https://github.com/curl/curl/pull/6133
  655. 11.14 Multi perform hangs waiting for threaded resolver
  656. If a threaded resolver takes a long time to complete, libcurl can be blocked
  657. waiting for it for a longer time than expected - and longer than the set
  658. timeouts.
  659. See https://github.com/curl/curl/issues/2975 and
  660. https://github.com/curl/curl/issues/4852
  661. 11.15 CURLOPT_OPENSOCKETPAIRFUNCTION is missing
  662. When libcurl creates sockets with socketpair(), those are not "exposed" in
  663. CURLOPT_OPENSOCKETFUNCTION and therefore might surprise and be unknown to
  664. applications that expects and wants all sockets known beforehand. One way to
  665. address this issue is to introduce a CURLOPT_OPENSOCKETPAIRFUNCTION callback.
  666. https://github.com/curl/curl/issues/5747
  667. 11.16 libcurl uses renames instead of locking for atomic operations
  668. For saving cookies, alt-svc and hsts files. This is bad when for example the
  669. file is stored in a directory where the application has no write permission
  670. but it has permission for the file.
  671. https://github.com/curl/curl/issues/6882
  672. https://github.com/curl/curl/pull/6884
  673. 12. LDAP
  674. 12.1 OpenLDAP hangs after returning results
  675. By configuration defaults, openldap automatically chase referrals on
  676. secondary socket descriptors. The OpenLDAP backend is asynchronous and thus
  677. should monitor all socket descriptors involved. Currently, these secondary
  678. descriptors are not monitored, causing openldap library to never receive
  679. data from them.
  680. As a temporary workaround, disable referrals chasing by configuration.
  681. The fix is not easy: proper automatic referrals chasing requires a
  682. synchronous bind callback and monitoring an arbitrary number of socket
  683. descriptors for a single easy handle (currently limited to 5).
  684. Generic LDAP is synchronous: OK.
  685. See https://github.com/curl/curl/issues/622 and
  686. https://curl.se/mail/lib-2016-01/0101.html
  687. 12.2 LDAP on Windows does authentication wrong?
  688. https://github.com/curl/curl/issues/3116
  689. 12.3 LDAP on Windows does not work
  690. A simple curl command line getting "ldap://ldap.forumsys.com" returns an
  691. error that says "no memory" !
  692. https://github.com/curl/curl/issues/4261
  693. 12.4 LDAPS with NSS is slow
  694. See https://github.com/curl/curl/issues/5874
  695. 13. TCP/IP
  696. 13.1 --interface for ipv6 binds to unusable IP address
  697. Since IPv6 provides a lot of addresses with different scope, binding to an
  698. IPv6 address needs to take the proper care so that it does not bind to a
  699. locally scoped address as that is bound to fail.
  700. https://github.com/curl/curl/issues/686
  701. 14. DICT
  702. 14.1 DICT responses show the underlying protocol
  703. When getting a DICT response, the protocol parts of DICT are not stripped off
  704. from the output.
  705. https://github.com/curl/curl/issues/1809
  706. 15. CMake
  707. 15.1 use correct SONAME
  708. The autotools build sets the SONAME properly according to VERSIONINFO in
  709. lib/Makefile.am and so should cmake to make comparable build.
  710. See https://github.com/curl/curl/pull/5935
  711. 15.2 support build with GnuTLS
  712. 15.3 unusable tool_hugehelp.c with MinGW
  713. see https://github.com/curl/curl/issues/3125
  714. 15.4 build docs/curl.1
  715. The cmake build does not create the docs/curl.1 file and therefore must rely on
  716. it being there already. This makes the --manual option not work and test
  717. cases like 1139 cannot function.
  718. 15.5 build on Linux links libcurl to libdl
  719. ... which it should not need to!
  720. See https://github.com/curl/curl/issues/6165
  721. 15.6 uses -lpthread instead of Threads::Threads
  722. See https://github.com/curl/curl/issues/6166
  723. 15.7 generated .pc file contains strange entries
  724. The Libs.private field of the generated .pc file contains -lgcc -lgcc_s -lc
  725. -lgcc -lgcc_s
  726. See https://github.com/curl/curl/issues/6167
  727. 15.8 libcurl.pc uses absolute library paths
  728. The libcurl.pc file generated by cmake contains things like Libs.private:
  729. /usr/lib64/libssl.so /usr/lib64/libcrypto.so /usr/lib64/libz.so. The
  730. autotools equivalent would say Libs.private: -lssl -lcrypto -lz
  731. See https://github.com/curl/curl/issues/6169
  732. 15.9 cert paths autodetected when cross-compiling
  733. The autotools build disables the ca_path/ca_bundle detection when
  734. cross-compiling. The cmake build keeps doing the detection.
  735. See https://github.com/curl/curl/issues/6178
  736. 15.10 libspsl is not supported
  737. See https://github.com/curl/curl/issues/6214
  738. 15.11 ExternalProject_Add does not set CURL_CA_PATH
  739. CURL_CA_BUNDLE and CURL_CA_PATH are not set properly when cmake's
  740. ExternalProject_Add is used to build curl as a dependency.
  741. See https://github.com/curl/curl/issues/6313
  742. 15.12 cannot enable LDAPS on Windows
  743. See https://github.com/curl/curl/issues/6284
  744. 15.13 CMake build with MIT Kerberos does not work
  745. Minimum CMake version was bumped in curl 7.71.0 (#5358) Since CMake 3.2
  746. try_compile started respecting the CMAKE_EXE_FLAGS. The code dealing with
  747. MIT Kerberos detection sets few variables to potentially weird mix of space,
  748. and ;-separated flags. It had to blow up at some point. All the CMake checks
  749. that involve compilation are doomed from that point, the configured tree
  750. cannot be built.
  751. https://github.com/curl/curl/issues/6904
  752. 16. Applications
  753. 16.1 pulseUI VPN client
  754. This application crashes at startup with libcurl 7.74.0 (and presumably later
  755. versions too) after we cleaned up OpenSSL initialization. Since this is the
  756. only known application to do this, we suspect it is related to something they
  757. are doing in their setup that is not kosher. We have not been able to get in
  758. contact with them nor got any technical details to help us debug this
  759. further.
  760. See
  761. https://community.pulsesecure.net/t5/Pulse-Desktop-Clients/Linux-Pulse-Client-does-not-work-with-curl-7-74/m-p/44378
  762. and https://github.com/curl/curl/issues/6306
  763. 17. HTTP/2
  764. 17.1 Excessive HTTP/2 packets with TCP_NODELAY
  765. Because of how curl sets TCP_NODELAY by default, HTTP/2 requests are issued
  766. using more separate TCP packets than it would otherwise need to use. This
  767. means spending more bytes than it has to. Just disabling TCP_NODELAY for
  768. HTTP/2 is also not the correct fix because that then makes the outgoing
  769. packets to get delayed.
  770. See https://github.com/curl/curl/issues/6363
  771. 17.2 HTTP/2 frames while in the connection pool kill reuse
  772. If the server sends HTTP/2 frames (like for example an HTTP/2 PING frame) to
  773. curl while the connection is held in curl's connection pool, the socket will
  774. be found readable when considered for reuse and that makes curl think it is
  775. dead and then it will be closed and a new connection gets created instead.
  776. This is *best* fixed by adding monitoring to connections while they are kept
  777. in the pool so that pings can be responded to appropriately.
  778. 17.3 ENHANCE_YOUR_CALM causes infinite retries
  779. Infinite retries with 2 parallel requests on one connection receiving GOAWAY
  780. with ENHANCE_YOUR_CALM error code.
  781. See https://github.com/curl/curl/issues/5119
  782. 17.4 Connection failures with parallel HTTP/2
  783. See https://github.com/curl/curl/issues/5611
  784. 17.5 HTTP/2 connections through HTTPS proxy frequently stall
  785. See https://github.com/curl/curl/issues/6936
  786. 18. HTTP/3
  787. 18.1 If the HTTP/3 server closes connection during upload curl hangs
  788. See https://github.com/curl/curl/issues/6606
  789. 18.2 Uploading HTTP/3 files gets interrupted at certain file sizes
  790. See https://github.com/curl/curl/issues/6510
  791. 18.3 HTTP/3 download is 5x times slower than HTTP/2
  792. See https://github.com/curl/curl/issues/6494
  793. 18.4 Downloading with HTTP/3 produces broken files
  794. See https://github.com/curl/curl/issues/7351
  795. 18.5 HTTP/3 download with quiche halts after a while
  796. See https://github.com/curl/curl/issues/7339
  797. 18.6 HTTP/3 multipart POST with quiche fails
  798. https://github.com/curl/curl/issues/7125
  799. 18.7 HTTP/3 quiche upload large file fails
  800. https://github.com/curl/curl/issues/7532
  801. 18.8 HTTP/3 does not support client certs
  802. aka "mutual authentication".
  803. https://github.com/curl/curl/issues/7625
  804. 18.9 connection migration does not work
  805. https://github.com/curl/curl/issues/7695