02 Apr 2026
Planet Debian
Samuel Henrique: Bringing HTTP/3 to curl on Amazon Linux

tl;dr
Starting with curl 8.17.0-1.amzn2023.0.2 in Amazon Linux 2023, you can now use HTTP/3.
dnf swap -y libcurl-minimal libcurl-full
dnf swap -y curl-minimal curl-full
curl --http3-only https://example.com
(HTTP/3 is only enabled in the curl -full builds)
Or, if you would like to try it out in a container:
podman run amazonlinux:2023 /bin/sh -c 'dnf upgrade -y --releasever=latest && dnf swap -y libcurl-minimal libcurl-full && dnf swap -y curl-minimal curl-full && curl --http3-only https://example.com'
For a list of test endpoints, you can refer to https://bagder.github.io/HTTP3-test/
The Upgrade I Didn't Have to Make
My teammate Steve Zarkos, who previously worked on upgrading OpenSSL in Amazon Linux from 3.0 to 3.2, spent the last few months on the complex task of bumping OpenSSL again, this time to 3.5. A bump like this only happens after extensive code analysis and testing, something that I didn't foresee happening when AL2023 was released but that was a notable request from users.
Having enabled HTTP/3 on Debian, I was always keeping an eye on when I would get to do the same for Amazon Linux (mind you, I work at AWS, in the Amazon Linux org). The bump to OpenSSL 3.5 was the perfect opportunity to do that, for the first time Amazon Linux is shipping an OpenSSL version that is supported by ngtcp2 for HTTP/3 support.
Non-Intrusive Change
In order to avoid any intrusive changes to existing users of AL2023, I've only enabled HTTP/3 in the full build of curl, not in the minimal one, this means there is no change for the minimal images.
The way curl handles HTTP/3 today also does not lead to any behavior changes for those who have the full variants of curl installed, this is due to the fact that HTTP/3 is only used if the user explicitly asks for it with the flags --http3 or --http3-only.
Side Quests
Supporting HTTP/3 on curl also requires building it with ngtcp2 and nghttp3, two packages which were not shipped in Amazon Linux, besides, my team doesn't even own the curl package, we are a security team so our packages are the security related stuff such as OpenSSL and GnuTLS. Our main focus is the services behind Amazon Linux's vulnerability handling, not package maintenance.
I worked with the owners of the curl package and got approvals on a plan to introduce the two new dependencies under their ownership and to enable the feature on curl, I appreciate their responsiveness.
Amazon Linux 2023 is forked from Fedora, so while introducing ngtcp2, I also sent a couple of Pull Requests upstream to keep things in sync:
[ngtcp2] package latest release 1.21.0
While building the curl package in Amazon Linux, I've noticed the build was taking 1 hour from start to end, and the culprit was something well known to me; tests.
The curl test suite is quite extensive, with more than 1600 tests, all of that running without parallelization, running two times for each build of the package; once for the minimal build and again for the full build.
I had previously enabled parallel tests in Debian back in 2024 but never got around to submit the same improvements to Amazon Linux or Fedora, this is now fixed. The build times for Amazon Linux came down to 10 minutes under the same host (previously 1 hour), and Fedora promptly merged my PR to do the same there:
All of this uncovered a test which is timing-dependent, meaning it's not supposed to be run with high levels of parallelism, so there goes another PR, this time to curl:
Flag test 766 as timing-dependent#21155
What started as enabling a single feature turned into improvements that landed in curl, Fedora, and Amazon Linux alike. I did this in a mix of work and volunteer time, mostly during work hours (work email address used when this was the case), but I'm glad I put in the extra time for the sake of improving curl for everyone.
Release Notes
Amazon Linux 2023 release notes for 2023.10.20260330
02 Apr 2026 12:00am GMT
01 Apr 2026
Planet Debian
Joey Hess: banning all Anthropic employees

Per my policies, I need to ban every employee and contractor of Anthropic Inc from ever contributing code to any of my projects. Anyone have a list?
Any project that requires a Developer Certificate of Origin or similar should be doing this, because Anthropic is making tools that explicitly lie about the origin of patches to free software projects.
UNDERCOVER MODE - CRITICAL
You are operating UNDERCOVER in a PUBLIC/OPEN-SOURCE repository. [...] Do not blow your cover.
NEVER include in commit messages or PR descriptions:
[...] The phrase 'Claude Code' or any mention that you are an AI
Co-Authored-By lines or any other attribution
-- via @vedolos
01 Apr 2026 4:36pm GMT
Ben Hutchings: FOSS activity in March 2026

- Debian packages:
- firmware-nonfree:
- Bugs:
- Merge requests:
- opened and merged !140: Update to 20260309
- opened and merged !141: Clean up packaging (from Nicolas Boulenguez)
- opened !142: Replace copy-firmware.sh; install files and generate metainfo.xml at build time
- Uploads:
- uploaded version 20260110-1~bpo13+1 to trixie-backports
- uploaded version 20260221-1 to unstable
- uploaded version 20260221-1~bpo13+1 to trixie-backports
- uploaded version 20260309-1 to unstable
- hexagon-dsp-binaries:
- Bugs:
- replied to and reassigned #1130844: firmware-qcom-soc depends on unavailable package firmware-qcom-dsp
- Bugs:
- initramfs-tools:
- libtirpc:
- libvirt:
- Bugs:
- replied to and reassigned #1130974: libvirt: Should use nftables for IP masquerading to work with PREEMPT_RT
- Bugs:
- linux:
- Bugs:
- Merge requests:
- reviewed !1842: Merge kernel-wedge and use directly
- reviewed and merged !1849: Cleanup installer
- merged !1853: [amd64] drivers/platform/x86/uniwill: Enable UNIWILL_LAPTOP as module
- opened and merged !1854: Fix ordering of kernel version strings for multiple Debian revisions
- reviewed and closed !1857: crypto: padlock-sha - Disable for Zhaoxin processor
- opened !1862: Fix regressions in debian/bin/test-patches
- opened !1865: Draft: hyperv-daemons: Build using upstream Makefile; install hv_fcopy_uio_daemon
- (LTS) worked on backports to 5.10 and 6.1 of the fixes for "CrackArmor" security flaws
- Uploads:
- (LTS) uploaded version 5.10.251-1 to bullseye-security
- uploaded version 6.12.74-2~bpo12+1 to bookworm-backports
- uploaded version 6.18.15-1~bpo13+1 to trixie-backports
- uploaded version 6.19.6-2~bpo13+1 to trixie-backports
- uploaded version 6.19.8-1~bpo13+1 to trixie-backports
- (LTS) linux-6.1:
- Uploads:
- uploaded version 6.1.164-1~deb11u1 to bullseye-security
- Uploads:
- linux-base:
- Uploads:
- uploaded version 4.12.1~bpo12+1 to bookworm-backports
- Uploads:
- sgt-puzzles:
- wireless-regdb:
- Uploads:
- (LTS) uploaded version 2026.02.04-1~deb11u1 to bullseye-security
- Uploads:
- firmware-nonfree:
- Debian non-packages:
- kernel-team:
- added script to show status of all kernel team backports
- pipeline:
- kernel-team:
- Mailing lists:
- debian-kernel:
- posted and replied to Agenda items for kernel-team meeting on 2026-03-18
- replied to How is "keep two last kernels" policy implemented?
- debian-lts-announce:
- linux-bluetooth:
- netdev:
- (LTS) replied to [PATCH net v2] net: consume xmit errors of GSO frames
- stable/patches:
- debian-kernel:
01 Apr 2026 3:30pm GMT