Jump to content

QUIC

For the technical specification, see RFC 9000.

QUIC (originally "Quick UDP Internet Connections") is a secure transport protocol standardised by the IETF that runs over UDP and integrates transport and cryptographic handshakes into a single layer.[1] QUIC underpins HTTP/3 and DNS over QUIC (DoQ) and is a central example of how encrypted transports change network operations, traffic management, and DNS-based policy tools.[2][3]

Origins and Standardization[edit | edit source]

QUIC began as a proprietary Google transport in the early 2010s, designed to reduce latency compared with TCP+TLS by combining the cryptographic and transport handshakes, eliminating connection-level head-of-line blocking, and enabling connection migration in user space over UDP.[4] The IETF chartered the QUIC Working Group in 2016 to create a standards-track version with encrypted transport headers, a stable wire image, and a robust versioning model.[5]

The resulting specification set consists of RFC 9000 (transport), RFC 9001 (TLS 1.3 integration), and RFC 9002 (loss detection and congestion control), plus RFC 9114 defining HTTP/3 as HTTP over QUIC and RFC 9250 defining DNS over QUIC.[1][3] These documents together define "IETF QUIC", distinct from earlier Google deployments, and anchor QUIC in the IETF’s change-control and IANA registry processes.

Deployment and Roles[edit | edit source]

By the mid-2020s, QUIC and HTTP/3 had been deployed at scale by major content and platform providers, including Google, Meta, and large content-delivery networks such as Cloudflare. Measurements show growing fractions of Web traffic using HTTP/3, with QUIC traffic concentrated on a relatively small number of large providers and CDNs.[6][7] Major browsers (Chrome, Microsoft Edge, Firefox, Safari) implement QUIC and enable HTTP/3 by default when supported by servers.[4]

Operational studies report that HTTP/3 over QUIC can reduce connection setup and page-load latency compared to HTTP/2 over TCP+TLS, especially on lossy or mobile networks, and improves robustness when clients move between access networks via QUIC’s connection migration features.[2][8]

Beyond web traffic, QUIC is being adopted as a substrate for other protocols. DNS over QUIC uses QUIC streams to carry encrypted DNS queries and responses, aiming to provide privacy properties similar to DNS over TLS with reduced head-of-line blocking.[3] Recursive resolvers such as Unbound implement DoQ both as a client and as a server, and European operators and research groups discuss DoQ in the context of modernising DNS privacy and resilience.[9][10]

Governance Aspects[edit | edit source]

QUIC is specified and versioned in the IETF, not by ICANN or the RIR system, and it operates entirely above the IP and DNS layers. Its governance relevance comes from how it redistributes control between endpoints, networks, and application platforms.

Encrypted Transport and Operational Visibility[edit | edit source]

QUIC encrypts not only application data but also almost all transport-layer control information, exposing only a minimal and version-independent "wire image" to the network.[11] On-path devices cannot safely modify transport fields, and common operational practices based on inspecting TCP sequence numbers, flags, or application headers become less effective or infeasible.[11] Operator analyses emphasise that QUIC pushes more responsibility for performance, congestion control, and security decisions to endpoints and cooperating proxies, limiting the role of traditional middleboxes.[8]

This increased opacity complicates regulatory and enterprise arrangements that rely on in-network inspection or modification of transport and application headers, including some content-filtering regimes, specialised lawful-intercept designs, and fine-grained traffic classification.

Endpoint and Platform Control[edit | edit source]

Historically, general-purpose transport on the public Internet was dominated by TCP, implemented in operating-system kernels and evolving slowly. QUIC, running in user space over UDP, allows application platforms to innovate in congestion control, connection management, and encrypted transport features with less dependence on OS-level TCP stacks.[5][6]

SSAC’s analysis of evolving name resolution notes that applications increasingly embed their own resolution and transport logic, using mechanisms such as DoH and DoQ without relying on network-provided resolvers. QUIC strengthens this trend at the transport layer: browsers and large CDNs that control both endpoints effectively become transport providers, deciding which QUIC versions and parameters are used for HTTP/3 and related protocols. From an Internet governance perspective, this contributes to wider debates about centralisation, platform power, and the distribution of responsibilities for security, abuse management, and lawful access between end systems, networks, and standards bodies.

See Also[edit | edit source]

References[edit | edit source]

Semantic properties for "QUIC"