quinn-proto

Async-friendly QUIC implementation in Rust

Latest version: 0.11.8 registry icon
Maintenance score
100
Safety score
95
Popularity score
100
Check your open source dependency risks. Get immediate insight about security, stability and licensing risks.
Security
  Vulnerabilities
Version Suggest Low Medium High Critical
0.11.8 0 0 0 0 0
0.11.7 0 0 0 0 0
0.11.6 0 0 1 0 0
0.11.5 0 0 1 0 0
0.11.4 0 0 1 0 0
0.11.3 0 0 1 0 0
0.11.2 0 0 1 0 0
0.11.1 0 0 1 0 0
0.11.0 0 0 1 0 0
0.10.6 0 0 0 0 0
0.10.5 0 0 0 0 0
0.10.4 0 0 1 0 0
0.10.3 0 0 1 0 0
0.10.2 0 0 1 0 0
0.10.1 0 0 1 0 0
0.10.0 0 0 1 0 0
0.9.6 0 0 0 0 0
0.9.5 0 0 0 0 0
0.9.4 0 0 1 0 0
0.9.3 0 0 1 0 0
0.9.2 0 0 1 0 0
0.9.1 0 0 1 0 0
0.9.0 0 0 1 0 0
0.8.4 0 0 1 0 0
0.8.3 0 0 1 0 0
0.8.2 0 0 1 0 0
0.8.1 0 0 1 0 0
0.8.0 0 0 1 0 0
0.7.3 0 0 1 0 0
0.7.2 0 0 1 0 0
0.7.1 0 0 1 0 0
0.7.0 0 0 1 0 0
0.6.1 0 0 1 0 0
0.6.0 0 0 1 0 0
0.5.2 0 0 1 0 0
0.5.0 0 0 1 0 0
0.4.0 0 0 1 0 0
0.3.0 0 0 1 0 0
0.2.0 0 0 1 0 0
0.1.0 0 0 1 0 0

Stability
Latest release:

0.11.8 - This version is safe to use because it has no known security vulnerabilities at this time. Find out if your coding project uses this component and get notified of any reported security vulnerabilities with Meterian-X Open Source Security Platform

Licensing

Maintain your licence declarations and avoid unwanted licences to protect your IP the way you intended.

Apache-2.0   -   Apache License 2.0

Not a wildcard

Not proprietary

OSI Compliant


MIT   -   MIT License

Not a wildcard

Not proprietary

OSI Compliant



Documentation Crates.io Build status codecov Chat Chat License: MIT License: Apache 2.0

Quinn is a pure-Rust, async-compatible implementation of the IETF QUIC transport protocol. The project was founded by Dirkjan Ochtman and Benjamin Saunders as a side project in 2018, and has seen more than 30 releases since then. If you're using Quinn in a commercial setting, please consider sponsoring the project.

Features

  • Simultaneous client/server operation
  • Ordered and unordered stream reads for improved performance
  • Works on stable Rust, tested on Linux, macOS and Windows
  • Pluggable cryptography, with a standard implementation backed by rustls and ring
  • Application-layer datagrams for small, unreliable messages
  • Future-based async API
  • Minimum supported Rust version of 1.66

Overview

  • quinn: High-level async API based on tokio, see examples for usage. This will be used by most developers. (Basic benchmarks are included.)
  • quinn-proto: Deterministic state machine of the protocol which performs no I/O internally and is suitable for use with custom event loops (and potentially a C or C++ API).
  • quinn-udp: UDP sockets with ECN information tuned for the protocol.
  • bench: Benchmarks without any framework.
  • fuzz: Fuzz tests.

Getting Started

Examples

$ cargo run --example server ./
$ cargo run --example client https://localhost:4433/Cargo.toml

This launches an HTTP 0.9 server on the loopback address serving the current working directory, with the client fetching ./Cargo.toml. By default, the server generates a self-signed certificate and stores it to disk, where the client will automatically find and trust it.

Links

Usage Notes

Click to show the notes

Buffers

A Quinn endpoint corresponds to a single UDP socket, no matter how many connections are in use. Handling high aggregate data rates on a single endpoint can require a larger UDP buffer than is configured by default in most environments. If you observe erratic latency and/or throughput over a stable network link, consider increasing the buffer sizes used. For example, you could adjust the SO_SNDBUF and SO_RCVBUF options of the UDP socket to be used before passing it in to Quinn. Note that some platforms (e.g. Linux) require elevated privileges or modified system configuration for a process to increase its UDP buffer sizes.

Certificates

By default, Quinn clients validate the cryptographic identity of servers they connect to. This prevents an active, on-path attacker from intercepting messages, but requires trusting some certificate authority. For many purposes, this can be accomplished by using certificates from Let's Encrypt for servers, and relying on the default configuration for clients.

For some cases, including peer-to-peer, trust-on-first-use, deliberately insecure applications, or any case where servers are not identified by domain name, this isn't practical. Arbitrary certificate validation logic can be implemented by enabling the dangerous_configuration feature of rustls and constructing a Quinn ClientConfig with an overridden certificate verifier by hand.

When operating your own certificate authority doesn't make sense, rcgen can be used to generate self-signed certificates on demand. To support trust-on-first-use, servers that automatically generate self-signed certificates should write their generated certificate to persistent storage and reuse it on future runs.

Contribution

All feedback welcome. Feel free to file bugs, requests for documentation and any other feedback to the issue tracker.

The quinn-proto test suite uses simulated IO for reproducibility and to avoid long sleeps in certain timing-sensitive tests. If the SSLKEYLOGFILE environment variable is set, the tests will emit UDP packets for inspection using external protocol analyzers like Wireshark, and NSS-compatible key logs for the client side of each connection will be written to the path specified in the variable.

The minimum supported Rust version for published releases of our crates will always be at least 6 months old at the time of release.