TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Chrome is deploying HTTP/3 and IETF QUIC

386 pointsby cautionover 4 years ago

24 comments

Randorover 4 years ago
With both a DNS-over-HTTP client and potentially a DNS-over-QUIC in the browser and serving advertisements over QUIC... there is a good chance that the world will see unblockable advertisements in our near future.<p>I don&#x27;t think this is a good idea... about a decade ago... as a research project I ran honeypot farm of 13 machines to learn more about malware. The honeypot machines were autonomously surfing the net, parsing the DOM and choosing random links. I ran them in a sandbox and was getting weekly malware hits.<p>Much to my surprise... most of the malware was coming over advertisement networks on shady websites.
评论 #24711335 未加载
评论 #24716897 未加载
评论 #24711685 未加载
评论 #24711644 未加载
评论 #24711333 未加载
评论 #24716383 未加载
评论 #24711554 未加载
评论 #24712969 未加载
评论 #24713276 未加载
评论 #24718868 未加载
评论 #24712696 未加载
coddle-harkover 4 years ago
I’m not an expert but QUIC doesn’t seem like enough of an improvement over TCP to warrant replacing it, especially given that it’s even more complex.<p>- 0-RTT handshakes are great but there’s still the problem of slow start.<p>- QUIC’s congestion control mechanism is pretty much the same as TCP’s and doesn’t perform particularly well over e.g. mobile networks.<p>- Mandatory TLS means it’s going to be a huge PITA if you ever need to run a quic service locally (say, in a container).<p>- Having it in user space means there’a a good chance we’ll end up with 100s of implementations, all with their own quirks. It’s bad enough trying to optimise for the three big TCP stacks.
评论 #24711590 未加载
评论 #24710827 未加载
评论 #24710813 未加载
评论 #24710816 未加载
评论 #24717368 未加载
评论 #24710799 未加载
评论 #24710829 未加载
评论 #24716755 未加载
评论 #24710807 未加载
fenesiistvanover 4 years ago
After my opinion around 4% performance improvement doesn&#x27;t justify the introduction of this more complicated protocol (maybe google knows how this benefit their ad business, like forcing everyody to https so they can increase their control over the internet, since their scripts are already included by the majority of the websites, reporting them all the important metrics, regardless of HTTPS)
评论 #24711211 未加载
评论 #24711136 未加载
评论 #24711254 未加载
评论 #24712171 未加载
评论 #24711071 未加载
评论 #24711066 未加载
评论 #24711776 未加载
评论 #24711707 未加载
评论 #24711059 未加载
parhamnover 4 years ago
Those are pretty modest gains for a layer 4 change. It&#x27;s going to be much harder to tool&#x2F;debug this stuff. Is it expected that servers pretty much always support all the HTTP protocols or is the goal to eventually replace the earlier forms?
评论 #24711063 未加载
评论 #24715708 未加载
评论 #24710826 未加载
xfalcoxover 4 years ago
Relying on Alt-Svc for HTTP&#x2F;3 is really bad, so I hope Chromium is following this with <a href="https:&#x2F;&#x2F;blog.cloudflare.com&#x2F;speeding-up-https-and-http-3-negotiation-with-dns&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blog.cloudflare.com&#x2F;speeding-up-https-and-http-3-neg...</a> right away.
djhaskin987over 4 years ago
Does anyone else think it&#x27;s weird&#x2F;futile that they&#x27;re building a protocol over UDP?<p>QUIC is disabled on our corporate network, simply because the network firewall&#x2F;SSL inspector can&#x27;t see what&#x27;s going on, and can&#x27;t regulate traffic, so it just blocks all UDP. our internet still works because sites see that QUIC doesn&#x27;t work and fall back to TCP. Heaven forbid the entire web moves to QUIC or we&#x27;d be in trouble.
评论 #24712299 未加载
评论 #24711820 未加载
评论 #24716406 未加载
评论 #24711786 未加载
jeffbeeover 4 years ago
Anyone know why there&#x27;s no new URL scheme for HTTP&#x2F;3? We didn&#x27;t rely on Alt-Svc headers for switching to HTTPS. We gave it its own scheme. Why aren&#x27;t we doing that for HTTP&#x2F;3?
评论 #24710397 未加载
评论 #24710652 未加载
评论 #24710373 未加载
评论 #24714232 未加载
garganzolover 4 years ago
The level of complexity of this thing goes way beyond the HTTP over CORBA experiment that took place at the end of millennium.<p>The point is: despite CORBA&#x27;s convoluted complexity, at least HTTP + CORBA experiment was somewhat sane as it allowed to use multiplexed connections right out of the box and relied upon standard network capabilities without reinventing the wheel. All that in 1999 or so.<p>DNS over HTTPS, QUIC et al look nothing less than a monopolistic attack on open web. Google really wants to own the Internet.
评论 #24716418 未加载
Aachenover 4 years ago
Has the amplification attack been solved recently? Last I checked the spec still said &quot;at most 3x amplification&quot; (which I expect will be enough for attackers) and the server implementation that I was testing went <i>well</i> beyond that. If that&#x27;s not solved and this gets deployed on a few big networks, I can already tell you what the next popular protocol will be for taking down websites.
评论 #24713223 未加载
drenvukover 4 years ago
Can someone provide the tradeoffs and benefits of QUIC vs WebSockets vs WebRTC? I know websockets are tcp and WebRTC requires some special tunneling logic but aside from that I don&#x27;t particularly know how quic is better or different aside from using udp.
评论 #24710520 未加载
评论 #24710471 未加载
评论 #24710743 未加载
评论 #24710403 未加载
gravypodover 4 years ago
Does anyone know when HTTP&#x2F;3 is going to get wider support in gRPC. There&#x27;s an open issue in the github project about this [0]. In IoT use cases where you want to do bi-directional stream of data to&#x2F;from a location getting rid of some head of line blocking will make me a happy camper.<p>0 - <a href="https:&#x2F;&#x2F;github.com&#x2F;grpc&#x2F;grpc&#x2F;issues&#x2F;19126" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;grpc&#x2F;grpc&#x2F;issues&#x2F;19126</a>
fenollpover 4 years ago
While this seems good to have a more efficient transport, I can&#x27;t make sense of this<p><pre><code> &gt; Since the subsequent IETF drafts 30 and 31 do not have compatibility-breaking changes, we currently are not planning to change the over-the-wire identifier. </code></pre> Are there slow-moving internal software at Google that relies on this nonce? This looks like the kind of thing that some clients will tend to rely on (for a reason yet unknown). That&#x27;s how clients grow the standard in unintended ways, no?<p>On another note:<p><pre><code> 3. optionally, the trailer field section, if present, sent as a single HEADERS frame. </code></pre> I see you&#x27;re paving the way for gRPC on the Web (of browsers) by adding trailers (a header sent after the body), which is not supported today for HTTP&#x2F;1 not &#x2F;2 by at least the top 3 browser vendors in volume.<p>I&#x27;m divided: I&#x27;d be glad to get rid of grpc-gateway and websockets but isn&#x27;t proto-encoded communication bad for the open Web &#x2F;in principle&#x2F;? Maybe it&#x27;s only a tooling problem.
评论 #24713586 未加载
ohnoesjmrover 4 years ago
Implementing QUIC is not trivial, so I suspect it will be years until it gets reasonable adoption in standard frameworks and languages that prefer not to interop with C.
评论 #24710543 未加载
评论 #24710415 未加载
评论 #24710859 未加载
评论 #24710506 未加载
GNOMESover 4 years ago
I remember a Hacker News post that many of the top Firewall vendors suggest disabling UDP over port 443. Apparently it&#x27;s hard for packet inspection, restricted browsing etc in the enterprise space.<p>Have there been any leaps in Firewall tech, or will most companies still disable this?
评论 #24714271 未加载
评论 #24710780 未加载
评论 #24710953 未加载
nlyover 4 years ago
Does anyone know what the maturity of standalone C-compatible implementations is like?<p>Curl seem to be evaluating two different stacks: ngtcp2+nghttp3 (C, seems to be from developers behind aria2) and Quiche (Rust, from Cloudflare)<p>Then there&#x27;s Google&#x27;s C++ QUICHE implementation which seems to not be used by anyone outside of Chromium (Even node.js apparently isn&#x27;t using this, unless the code is just old).<p>There are several more: <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;HTTP&#x2F;3#Libraries" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;HTTP&#x2F;3#Libraries</a><p>It&#x27;s a bit of a mess, and until Curl makes a decision I&#x27;m not sure where to go.
The_rationalistover 4 years ago
Unrelated: chromium 86 bring the backforward cache which make back navigation instantaneous in many cases, this was I believe, the biggest optimization that was Firefox only
ssss11over 4 years ago
Is this being added to Chromium code? Its hard to tell if its being added (and in which release) or if parts of it or all of it are already in Chrome or Chromium and are just being enabled now
评论 #24713415 未加载
Ericson2314over 4 years ago
I am generally pro QUIC, but after seeing <a href="https:&#x2F;&#x2F;tools.ietf.org&#x2F;html&#x2F;draft-ietf-quic-datagram-01" rel="nofollow">https:&#x2F;&#x2F;tools.ietf.org&#x2F;html&#x2F;draft-ietf-quic-datagram-01</a> I have to ask, why not have all the streaming stuff on top of this? Then the layering looks like:<p>1: connections management + encryption<p>2: streams and multiplexing<p>Seems pretty good to me?
评论 #24712276 未加载
forgotmypw17over 4 years ago
I think it&#x27;s safe to accept that this will become adopted and then HTTP&#x2F;1.1 will get the cross-out treatment?..
评论 #24714108 未加载
The_rationalistover 4 years ago
Where are the benchmarcks for standard tasks?
evolve2kover 4 years ago
“Today this changes. We&#x27;ve found that IETF QUIC significantly outperforms HTTP over TLS 1.3 over TCP. In particular, Google search latency decreases by over 2%. YouTube rebuffer time decreased by over 9%, while client throughput increased by over 3% on desktop and over 7% on mobile.“<p>This is the most sickening sentence for me. The myopic internal focus. ‘Look we’ve made our new thing a standard and look it makes our products run faster’. This is just blatant exploitation that’s occurring as there is too much centralised ownership. In my opinion this is predatory behaviour packaged up as open source good for all.
评论 #24713016 未加载
评论 #24714344 未加载
评论 #24714459 未加载
评论 #24713008 未加载
评论 #24712657 未加载
评论 #24712621 未加载
评论 #24727196 未加载
评论 #24713308 未加载
The_rationalistover 4 years ago
If only HTTP3 what based on sctp instead
评论 #24717856 未加载
02020202over 4 years ago
i would like to see peformance comparison with SRT for example or other udp-based protocol. i mean, it its good for video, it must be good for web too.
The_rationalistover 4 years ago
Those incremental gains doesn&#x27;t seems much better than what linux Tcp improvments get each year, especially if turning on state of the art congestion &#x2F; bufferbloat algorithms. Also Tcp fast open is ridiculously old and I can&#x27;t see how mainstream equipment still wouldn&#x27;t support it on average.