akdor1154 3 hours ago

Damn it's nice reading a simple static site like this. Links open instantly to the next fully laid out page of content. If only the rest of the web could be like this..

  • madeofpalk an hour ago

    Worth nothing, that react application (using React Server Components?)! If you have javascript enabled, it renders as a single page app, fetching each additional page via an API. If you disable JS, it renders it all on the server.

  • INTPenis 3 hours ago

    Agreed but where is the actual git repo? I see a text saying this "contents get updated automatically on every commit to this git repository" but where is "this git repository"?

    I can't find a link to the source anywhere.

kevg123 29 minutes ago

> As the packet loss rate increases, HTTP/2 performs less and less well. At 2% packet loss (which is a terrible network quality, mind you), tests have proven that HTTP/1 users are usually better off - because they typically have up to six TCP connections to distribute lost packets over. This means for every lost packet the other connections can still continue.

Why doesn't HTTP/2 use more than one socket?

  • thwarted 9 minutes ago

    Because one thing it tries to optimize for is avoiding TLS session negotiation.

sedatk 2 hours ago

The document is now five years old and full of statements like “we’ll see that in the upcoming years”. I think it’s due for an update.

code_martial 3 hours ago

Here’s a conceptual background about how and why HTTP/3 came to be (recollected from memory):

HTTP/1.0 was built primarily as a textual request-response protocol over the very suitable TCP protocol which guaranteed reliable byte stream semantics. The usual pattern was to use a TCP connection to exchange a request and response pair.

As websites grew more complex, a web page was no longer just one document but a collection of resources stitched together into a main document. Many of these resources came from the same source, so HTTP/1.1 came along with one main optimisation — the ability to reuse a connection for multiple resources using Keep Alive semantics.

This was important because TCP connections and TLS (nee SSL) took many round-trips to get established and transmitting at optimal speed. Latency is one thing that cannot be optimised by adding more hardware because it’s a function of physical distance and network topology.

HTTP/2 came along as a way to improve performance for dynamic applications that were relying more and more on continuous bi-directional data exchange and not just one-and-done resource downloads. Two of its biggest advancements were faster (fewer round-trips) TLS negotiation and the concept of multiple streams over the same TCP connection.

HTTP/2 fixed pretty much everything that could be fixed with HTTP performance and semantics for contemporary connected applications but it was still a protocol that worked over TCP. TCP is really good when you have a generally stable physical network (think wired connections) but it performs really badly with frequent interruptions (think Wi-Fi with handoffs and mobile networks).

Besides the issues with connection reestablishment, there was also the challenge of “head of the line blocking” — since TCP has no awareness of multiplexed HTTP/2 streams, it blocks everything if a packet is dropped, instead of blocking only the stream to which the packet belonged. This renders HTTP/2 multiplexing a lot less effective.

In parallel with HTTP/2, work was also being done to optimise the network connection experience for devices on mobile and wireless networks. The outcome was QUIC — another L4 protocol over UDP (which itself is barebones enough to be nicknamed “the null protocol”). Unlike TCP, UDP just tosses data packets between endpoints without much consideration of their fate or the connection state.

QUIC’s main innovation is to integrate encryption into the transport layer and elevate connection semantics to the application space, and allow for the connection state to live at the endpoints rather than in the transport components. This allows retaining context as devices migrate between access points and cellular towers.

So HTTP/3? Well, one way to think about it is that it is HTTP/2 semantics over QUIC transport. So you get excellent latency characteristics over frequently interrupted networks and you get true stream multiplexing semantics because QUIC doesn’t try to enforce delivery order or any such thing.

Is HTTP/3 the default option going forward? Maybe not until we get the level of support that TCP enjoys at the hardware level. Currently, managing connection state in application software means that over controlled environments (like E-W communications within a data centre), HTTP/3 may not have as good a throughput as HTTP/2.

  • newpavlov 38 minutes ago

    Thank you for a great overview! I wish HTTP3/QUIC was the "default option" and had much wider adoption.

    Unfortunately, software implementations of QUIC suffer from dealing with UDP directly. Every UDP packet involves one syscall, which is relatively expensive in modern times. And accounting for MTU further makes the situation ~64 times worse.

    In-kernel implementations and/or io-uring may improve this unfortunate situation, but today in practice it's hard to achieve the same throughput as with plain TCP. I also vaguely remember that QUIC makes load-balancing more challenging for ISPs, since they can not distinguish individual streams as with TCP.

    Finally, QUIC arrived a bit too late and it gets blocked in some jurisdictions (e.g. Russia) and corporate environments similarly to ESNI.

  • NeutralForest 2 hours ago

    Thanks for taking the time to make this, that was helpful!

    • code_martial an hour ago

      Glad you found it helpful! Most of it is distilled from High Performance Browser Networking (https://hpbn.co/). It’s a very well organised, easy to follow book. Highly recommended!

      Unfortunately, it’s not updated to include QUIC and HTTP/3 so I had to piece together the info from various sources.

derelicta 30 minutes ago

It's still crazy how quickly http3 got adopted by web actors. Can't wait til we do the same for IMAP and SMTP

ahoka 4 hours ago

Anyone else blocks UDP 80/443 due to privacy concerns?

  • detaro 4 hours ago

    What privacy concern do you have that does not apply to TCP 80/443?

    • ahoka 3 hours ago

      Tracking sessions across different physical connections has some non-trivial privacy implications:

      https://http3-explained.haxx.se/en/quic/quic-connections#con...

      • NavinF 3 hours ago

        How do you imagine other protocols handle switching physical connections? With HTTP 1, you send your session ID as a cookie after wasting time creating a new TCP connection

        • ahoka 3 hours ago

          Yes, obviously, but we already know how that is used. This is a more complex protocol that might enable attack vectors that were not possible before and we do not think about when accessing websites:

          But see the notes taken from the HTTP/3 RFC itself, written by the authors:

          10.11. Privacy Considerations

             Several characteristics of HTTP/3 provide an observer an opportunity
             to correlate actions of a single client or server over time.  These
             include the value of settings, the timing of reactions to stimulus,
             and the handling of any features that are controlled by settings.
          
             As far as these create observable differences in behavior, they could
             be used as a basis for fingerprinting a specific client.
          
             HTTP/3's preference for using a single QUIC connection allows
             correlation of a user's activity on a site.  Reusing connections for
             different origins allows for correlation of activity across those
             origins.
          
             Several features of QUIC solicit immediate responses and can be used
             by an endpoint to measure latency to their peer; this might have
             privacy implications in certain scenarios.
ckbkr10 4 hours ago

Sounds overly complicated, I doubt this will have a widespread adoption

  • gucci-on-fleek 3 hours ago

    About 30% percent of traffic to Cloudflare uses HTTP/3 [0], so it seems pretty popular already. For comparison, this is 3× as much traffic as HTTP/1.1.

    [0]: https://radar.cloudflare.com/adoption-and-usage#http1x-vs-ht...

    • mgaunard 3 hours ago

      and then cloudflare converts that to http/2 or even 1.1 for the backend

      • vanviegen 3 hours ago

        So? Those protocols work fine within the reliable low latency network of a datacenter.

        • wongarsu 2 hours ago

          I'd even go as far as claiming that on reliable wired connections (like between cloudflare and your backend) HTTP/2 is superior to HTTP/3. Choosing HTTP/3 for that part of the journey would be a downgrade

          • klempner 2 hours ago

            At the very least, the benefits of QUIC are very very dubious for low RTT connections like inside a datacenter, especially when you're losing a bunch of hardware support and moving a fair bit of actual work to userspace where threads need to be scheduled etc. On the other hand Cloudflare to backend is not necessarily low RTT and likely has nonzero congestion.

            With that said, I am 100% in agreement that the primary benefits of QUIC in most cases would be between client and CDN, whereas the costs are comparable at every hop.

            • hshdhdhehd an hour ago

              Is CF typically serving from the edge, or serving from the nearest to the server? I imagine it would be from the edge so that it can CDN what it can. So... most of the time it wont be a low latency connection from CF to backend. Unless your back end is globally distributed too.

  • ofrzeta 3 hours ago

    "As of September 2024, HTTP/3 is supported by more than 95% of major web browsers in use and 34% of the top 10 million websites."

    https://en.wikipedia.org/wiki/HTTP/3