I think involuntary introducing https in systems not expecting it, and not in 
need for it, is not the way to go
Lot of simple scripts performing automated tests, configure embedded devices, 
etc, will break because the server not talking https
Secure systems will specify https:// explicitly and not rely on good intentions 
of lower layer

I can imagine an option for specifying the default fallback, one one can set it 
to prefer https:// as a safety net that can be applied, to catch forgotten urls 
without a scheme deep down in an application, or provide a quick 'flip' between 
encrypted an unencrypted mode.

Erik

-----Original Message-----
From: curl-library <[email protected]> On Behalf Of Daniel 
Stenberg via curl-library
Sent: woensdag 19 september 2018 11:02
To: libcurl hacking <[email protected]>
Cc: Daniel Stenberg <[email protected]>
Subject: Deprecate falling back to http:// ?

Hi!

The URL parser in libcurl accepts URLs without a scheme, the "text://" part of 
URLs.

If no scheme is specified, libcurl guesses which scheme that was intended based 
on some basic hueristics and if nothing matches it falls back to plain old 
"http://";.

In this day and age of growing HTTPS use and slow decay of plain HTTP, maybe it 
is time to change the fallback in libcurl and make it instead go with HTTPS if 
nothing else matches?

I'm a little scared this might hurt a lot of users running scripts relying on 
this since forever.

(Brought to attention since I'm adding the CURLU_GUESS_SCHEME to the URL API in 
https://github.com/curl/curl/pull/3018)

Thoughts?

-- 

  / daniel.haxx.se
-------------------------------------------------------------------
Unsubscribe: https://cool.haxx.se/list/listinfo/curl-library
Etiquette:   https://curl.haxx.se/mail/etiquette.html

-------------------------------------------------------------------
Unsubscribe: https://cool.haxx.se/list/listinfo/curl-library
Etiquette:   https://curl.haxx.se/mail/etiquette.html

Reply via email to