Re: [quicwg/base-drafts] Padding outside QUIC packet (#3333)

Kazuho Oku <> Tue, 14 January 2020 01:18 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id 65D4F12001B for <>; Mon, 13 Jan 2020 17:18:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -6.595
X-Spam-Status: No, score=-6.595 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_IMAGE_ONLY_28=1.404, HTML_MESSAGE=0.001, MAILING_LIST_MULTI=-1, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: (amavisd-new); dkim=pass (1024-bit key)
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id wYUtNBo2392T for <>; Mon, 13 Jan 2020 17:18:11 -0800 (PST)
Received: from ( []) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by (Postfix) with ESMTPS id 8342F120020 for <>; Mon, 13 Jan 2020 17:18:11 -0800 (PST)
Received: from ( []) by (Postfix) with ESMTP id A162BC602D3 for <>; Mon, 13 Jan 2020 17:18:10 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=pf2014; t=1578964690; bh=JiqkcyaodxWlr6QHLr4nDCzcqNHnOjZB5Rd/EksWBiI=; h=Date:From:Reply-To:To:Cc:In-Reply-To:References:Subject:List-ID: List-Archive:List-Post:List-Unsubscribe:From; b=RcTSb9ApjFB8Zu9g/p+JogsUMjPk+mQeTAxFr5vWyKaMZ+7mFY8aEo0nEFwh2EeMG L+dPGBH/2ykr50thpFPHzfvhDtLYmuw68d81Vrn1fHSxC96SrPbZ/S4JwZ9d/Q1rbi /J09eYbvdCRELwKx6Tz6DgGhSGaR0ydaTNIUISgw=
Date: Mon, 13 Jan 2020 17:18:10 -0800
From: Kazuho Oku <>
Reply-To: quicwg/base-drafts <>
To: quicwg/base-drafts <>
Cc: Subscribed <>
Message-ID: <quicwg/base-drafts/issues/3333/>
In-Reply-To: <quicwg/base-drafts/issues/>
References: <quicwg/base-drafts/issues/>
Subject: Re: [quicwg/base-drafts] Padding outside QUIC packet (#3333)
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5e1d16d2921d2_30a03f7ed04cd964550e"; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: kazuho
X-GitHub-Recipient: quic-issues
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
Archived-At: <>
X-Mailman-Version: 2.1.29
List-Id: Notification list for GitHub issues related to the QUIC WG <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Tue, 14 Jan 2020 01:18:13 -0000

This behavior should continue to be allowed. We allow endpoints to send a QUIC packet (as part of a coalesced packet) knowing that the peer would de unable to decrypt it (see [section 14.3.1]( The issue being discussed here is a variant of that.

That said, I am not sure if we want to suggest padding outside of a QUIC packet, because such a design might have wired implications to the CC logic. IIUC, current congestion logic is based on the following principles:
* an ack-eliciting packet consumes bytes-in-flight
* an ack-only packet does not consume bytes-in-flight
* we allow ack-eliciting packets and ack-only packets to be coalesced, because that does not change the load on the network

I am not sure how we can adjust these principles so that padding outside QUIC packets can be taken into consideration (when necessary), or if making such adjustment is worth the additional complexity.

You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub: