[Daniel's week] March 27, 2026

Daniel Stenberg daniel at haxx.se
Fri Mar 27 17:29:54 CET 2026


# March 27, 2026

What a week. Things moved forward. Fun and busy.

## Feature window

We opened the curl feature windows this Saturday and there has been fierce 
activity this week to merge a series of pull requests with changes. The 
in-the-works RELEASE-NOTES currently lists eight changes and over one hundred 
thirty bugfixes.

## Dropping RTMP

For six months we have repeatedly mentioned that RTMP is going away in the 
next release. This week we finally removed the code and there is no more 
support for the suite of URL schemes the RTMP protocol used [1].

## NTLM

We have moved NTLM support over to opt-in [2]. Unless you specifically ask for 
it when you build curl, it will not build with support for this quirky old 
authentication method. We have also added complete “NTLM removal” in the 
deprecated document. Scheduled to happen in September unless someone makes a 
lot of noise about it.

## SMB

curl only ever supported SMB version one, which is old, deprecated and 
insecure. This protocol also goes opt-in now and is only enabled when 
explicitly told so when building curl. As an extra bonus, SMB requires NTLM to 
function so you need to enable that as well if you truly want SMB. This too is 
a warm-up for September 2026 when we plan to completely rip out support for 
this protocol from curl.

## local crypto

In our ongoing quest to remove code we don’t need, or perhaps don’t want, we 
fell over our crypto implementations this week. They are in-tree 
implementations for md4, md5 and sha256 to make it possible to build curl and 
use it without a TLS/crypto library - and still offer some of the features 
that need those algorithms.

Since building without TLD is such a rare thing these days and since the TLS 
libraries all provide these algorithms themselves, we have decided we want to 
get rid of our implementations and rather just say that if you want these 
features you need a TLS library. The plan is to drop the local implementations 
in October 2026. This gives everyone some time to figure out if you are 
affected and if so, what to do about it.

## emails

I received yet another “weird email” this week where someone asked me details 
about something I have no idea about and they contacted me probably because 
they found my email in the curl license that probably is shown somewhere in 
the product. As I made this latest email public I realized my official 
collection now has 100 emails and I wrote a blog post about it [3].

## Don’t trust, verify

It started out as a document [4] for curl on how you can verify that the curl 
you download is in fact the tarball made available by the project and that the 
tarball has only and exactly the correct contents, but as I did that I 
realized it could be worth also doing a blog post version [5] of the document 
just to help spreading the message more widely.

Not only how users and consumers of curl can verify curl but it also details 
and enumerates a lot of what we verify when we work on curl and how we work 
hard to keep curl safe and secure.

It is hard and deliberate work. Security does not come by accident.

## Distro meeting

About fifteen persons joined the curo distro meeting 2026 on Thursday evening 
(my time), with representatives from some six, seven different distributions. 
There were some notable ones absent, but I was pleased to see the attendance 
and I think we had a good discussion and time well spent.

I talked briefly about where we are in the project right now and what to 
expect coming up soon, like the things going opt-in and what we have removed 
recently and plan to remove later this year. To keep everyone in the loop.

We talked about testing, release candidates, potential issues with running the 
test suite in parallel. Some time was spent on the QUIC and HTTP/3 situation, 
about how we got here and what’s in the tea leaves for the future.

All of us were there because we want curl to work smoothly for end users of 
these distros. We all share a common goal. A friendly and goal-oriented group 
of people.

## ECH on Debian

Samuel Henrique wrote a blog post about using curl with ECH on Debian [6]. ECH 
is Encrypted Client Hello and is a way to finally encrypt the target host name 
in TLS handshakes. curl has experimental support for this and support exists 
in the soon coming OpenSSL version 4, as well as in some of the other TLS 
backends curl supports.

## curl on a big screen

Jenson Hwang (Nvidia CEO) did a presentation about something AI related and as 
a consequence I could do a screengrab with a very large curl command line 
installing software via a pipe to bash [7].

## Security

We received more than ten security reports this week, both via Hackerone but 
also several over email. One of the reports has been determined accurate and 
it will be published as a CVE in sync with the pending release. We strongly 
discourage users from sending us reports over email and instead use Hackerone 
for two primary reasons:

A) as a means for us to keep track of a large number of concurrent issues that 
each exists, transitions and is discussed independently of each other. That 
operation gets much more complicated over email. *In particular* when multiple 
issues are bundled into single emails.

B) to allow us to easily disclose and make public every single report 
(including the entire communication chain) once we have dealt with them. Email 
communication makes this much more complicated.

## Coming up

- another week of open feature window

## Links

[1] = https://daniel.haxx.se/blog/2026/03/21/bye-bye-rtmp/
[2] = https://daniel.haxx.se/blog/2026/03/22/ntlm-and-smb-go-opt-in/
[3] = https://daniel.haxx.se/blog/2026/03/25/one-hundred-weirdo-emails/
[4] = https://curl.se/docs/verify.html
[5] = https://daniel.haxx.se/blog/2026/03/26/dont-trust-verify/
[6] = https://samueloph.dev/blog/i-use-curl-with-ech-btw-in-debian/
[7] = https://mastodon.social/@bagder/116280705328672025

-- 

  / daniel.haxx.se


More information about the daniel mailing list