Skip to main content
  • Time to update the Network Time Protocol

    The Network Time Protocol (NTP) is a foundational Internet standard that has provided clock synchronization between computer systems since the early 1980s. It was first standardized as RFC 958 in Sept 1984 with several revisions in the following years. Discussions have been ongoing in the NTP working group for a few years now about updating NTPv4 to NTPv5. This update is motivated by lessons learned, ongoing vulnerabilities, and emerging use cases.

    • Karen O'DonoghueNTP Working Group Chair
    • Dieter SieboldNTP Working Group Chair
    30 Sep 2022
  • Report from IAB workshop on Analyzing IETF Data (AID) 2021 published

    The Internet Architecture Board (IAB) has published the official report from the workshop on Analyzing IETF Data (AID) 2021.

      28 Sep 2022
    • Applied Networking Research Prize presentations at IETF 115

      The Internet Research Task Force (IRTF) open session at the IETF 115 meeting will feature presentations on research into domain hijacking, the IETF's organizational culture, and DDoS attack detection and mitigation.

        27 Sep 2022
      • Supporting diversity and inclusion at IETF meetings by providing childcare

        Thanks to the generous support of IETF Diversity & Inclusion sponsors, onsite childcare at an IETF meeting was provided for the first time ever during IETF 114. The successful experience and continued support of sponsors means it will again be offered at the IETF 115 meeting on 5-11 November 2022.

          14 Sep 2022
        • IETF Annual Report 2021

          The IETF Annual Report 2021 provides a summary of Internet Engineering Task Force (IETF), Internet Architecture Board (IAB), Internet Research Task Force (IRTF), and RFC Editor community activities from last year.

            9 Sep 2022

          Filter by topic and date

          Filter by topic and date

          QUIC working group looks to bring more security to Internet traffic

          • Grant GrossIETF Blog Reporter

          14 Jun 2021

          Lucas Pardue serves as co-chair of the IETF QUIC Working Group, which focuses on a standards-track specification for a UDP-based, stream-multiplexing, encrypted transport protocol. The IETF blog recently asked Pardue about the QUIC standards project.

          Pardue, from London, also works as a senior software engineer at Cloudflare, a U.S. web infrastructure and website security company. An edited version of the conversation appears below.

          IETF blog: What is the QUIC working group? When did it start? 

          Pardue: The QUIC Working Group (WG) is a collection of talented researchers, practitioners, engineers, developers, policy makers, infrastructure operators, service providers ... you name it. Since 2016, we've been working on standardizing version 1 of the QUIC protocol, including transport behavior, loss detection, recovery, congestion control, security, and, in unison with the HTTP Working Group, an application mapping of HTTP to QUIC. 

          For those that might remember, the work on QUIC started long before 2016. We took that as a starting point and wrote a charter that would help us develop a set of documents that had the consensus of the working group and wider IETF community. And as we finish the work on version 1 with the publication of RFCs, we enter a new chapter for the working group. It focuses on maintenance and evolution of the protocol as well as becoming the home for new ideas that leverage the rich extensibility capabilities of QUIC. We have a bright future ahead. 

          IETF blog: How does QUIC improve the performance, privacy and security characteristics of services that use it? 

          Pardue: The QUIC transport protocol is secure by default, meaning it provides strong integrity, authenticity, and confidentiality for all that choose to use it. Services today that use TCP (with or without TLS) should treat QUIC as almost a drop-in replacement substitute. And with the Unreliable Datagram extension that the group is working on, we're on course to be a substitute for DTLS or other such protocols. The one key thing is that QUIC, unlike TCP, protects packet metadata – very little information is exposed to passive observers and no one in the middle is able to manipulate things like sequence numbers or options. This presents some challenges to conventional ways of managing traffic but it fixes a big problem – ossification. 

          When a third party tinkers with your traffic without coordinating with you, they make assumptions about the protocol and the systems the protocol traverses. Those assumptions can create friction when the first party (the endpoints) want to improve or experiment with things. And where the friction is extreme it renders extensions moot or even breaks the protocol, leading to a reluctance or inability to change or evolve. Securing QUIC prevents un-coordinated tinkering and gives us an excellent platform to move ahead with. Today QUIC provides fast handshakes, thanks to Zero Round-Trip time, and many implementers have smart congestion controllers. Tomorrow, the base performance of the protocol can only get better. 

          On the performance side of things, avoiding Head-of-Line blocking is the killer feature of QUIC. This is achieved via stream multiplexing which I'll talk about some more in a later question. This is less of a drop-in replacement than other parts of QUIC, and requires the application using QUIC to be smart about how it interacts with independent streams. 

          IETF blog: How widely is QUIC deployed? How did it come to be widely deployed?

          Pardue: As the QUIC working group has worked on developing the specifications we have seen many implementations of client and server code. Of those, a subset has made it into “production” deployments such as web browsers and public-facing services. Cloudflare made QUIC and HTTP/3 support publicly available to all in September 2019. We've been really happy to see people turning it on and testing with developer/canary/nightly channels of browsers such as Chrome, Firefox, and Safari. As the specifications near maturity, it’s very exciting to see client support start entering the stable channels and getting turned on by default. 

          End users should start to benefit from QUIC's improved security and performance without having to take any manual action. According to data from Cloudflare Radar, in mid-January 2021 the global share of HTTP versions was approximately: 24 percent of HTTP/1.1, 75 percent for HTTP/2, and less than 1 percent for HTTP/3. By mid-February, adoption in HTTP/3 had grown to just over 5.5 percent, with HTTP/2 falling to 69 percent, and HTTP/3 growth substituting for HTTP/2 usage. By mid-May, HTTP/3 represented 12 percent of HTTP traffic share.

          We expect the trend to continue as more browsers and websites get QUIC-enabled.

          IETF blog: What’s the importance of stream multiplexing and encrypted transport protocol?

          Pardue: I've explained how protection from tinkerers helps above in question 2, so won't repeat that here. But let’s not forget that private communications should be just that, private. Encrypted transports are a foundational building block to improving user security and privacy – they enable application developers a foundation on which to build additional security, such as the Web Origin model, same-origin policy, and restriction of web APIs to secure contexts. QUIC's stream multiplexing can help mitigate the phenomena of Head-of-Line (HoL) blocking, where a lost packet holds up everything behind it. This manifests in many ways that can affect end-user experiences. 

          If some critical website script is blocked behind less urgent data, you can be stuck looking at a blank page. If part of your video stream is dropped, you can't simply skip to the bits you do have, instead you might end up watching a spinning icon while it buffers or manually reload and hope things resume where you left them. QUIC has ways to mitigate HoL blocking that if used correctly, can improve the quality of experience, especially helping in networks that experience regular problems. 

          In TCP there is one logical bytestream; data sent in this stream is guaranteed to be received in-order. The TCP stream is split up into segments for transmission over the network using IP, and since the network is not guaranteed to be reliable, it might lose packets or reorder them. It's the job of TCP to handle such events and present the stream as expected. This usually works well but sometimes HoL blocking rears its ugly head. Imagine you sent the sequence A, B, C, D, E in separate packets and the third one was lost. The receiver gets the sequence A, B, D, E. It can't present all four values to the application, only the first contiguous range A, B.

          QUIC streams can fix this. Each stream, identified by a 62-bit integer, is independent and behaves like its own mini-TCP, all under a common protection. A sender could choose to split A, B, C, D, E over different streams and the sender could read them out in any order. If a packet with one of the values gets lost, no problem, you just read everything as it arrives! The challenge however is reading the sequence back in the order it was sent. The stream ID can be used to help here but how that actually happens is described by an application mapping like HTTP/3. Solving HoL blocking is possible, but tuning it for the best quality of experience is the next area of opportunity. 

          IETF blog: What’s next for QUIC?

          Pardue: I'm super excited for the next chapter of QUIC. As people deploy version 1, we'll learn and identify potential improvements. QUIC versioning and extensibility is rich and robust. We have updated the working group charter in order to broaden the scope of work that we can consider. Some of the new ideas, like smarter retransmissions have been adopted, and we are considering candidates like qlog for richer standardized endpoint logging. Personally, I'm excited about the application-layer possibilities that QUIC is enabling. The IETF has already formed the MASQUE and WebTransport working groups that build upon QUIC foundations. The future is bright.


          Share this page