Fast UDP I/O for Firefox in Rust

Debugging & Real‑World Networking Quirks

  • Commenters relate to the article’s “buy the same laptop” debugging story; networking bugs are seen as notoriously hardware‑ and NIC‑specific.
  • Mentions of UDP checksum offload oddities (e.g., 0x0000/0xFFFF meanings) and “mystery packet runts” reinforce how driver/NIC behavior can obscure bugs.
  • One commenter warns that high‑rate UDP/QUIC can effectively DoS smaller hosts and LANs, which is why many networks aggressively rate‑limit or drop UDP.

APIs, GSO/GRO, and Zero‑Copy

  • Some are surprised the article focuses on sendmmsg/recvmmsg, calling them “old” and expecting io_uring instead.
  • Others respond that io_uring doesn’t have a true multi‑datagram equivalent; GSO/GRO is still the main path, and some kernel developers would like to deprecate sendmmsg/recvmmsg.
  • Zero‑copy RX/TX (e.g., Linux msg_zerocopy, RDMA, AF_XDP, userspace NIC drivers) is discussed as promising but complex, hardware‑dependent, and less suitable for browsers due to loss of OS‑level control.
  • Windows/macOS GSO/GRO analogues exist but are described as buggy, raising questions about OS vendor priorities for high‑performance networking.

Performance Gains & Limits

  • The headline result noticed by readers: CPU‑bound throughput jumped from <1 Gbit/s to ~4 Gbit/s; CPU time now mostly in syscalls and crypto.
  • Many see this as a big practical win for laptops/mobile (better efficiency).
  • Others argue 4 Gbit/s is not “fast” relative to what modern CPUs and memory copies can achieve, suggesting 10–20× potential remains untapped due to protocol, API, and kernel design constraints rather than Firefox’s code.
  • There is an extended subthread debating how expensive syscalls actually are on modern CPUs, with conflicting measurements (tens vs hundreds of nanoseconds) and no clear consensus.

QUIC, HTTP/3, and Certificates

  • A question arises whether the new Rust QUIC/UDP stack allows re‑enabling HTTP/3 over self‑signed certs.
  • Multiple replies emphasize this is a policy choice, not a technical limitation or library issue: browsers intentionally make unverifiable HTTPS hard to use to preserve the security model.
  • Critics argue this harms local‑device scenarios and that “TOFU”/self‑signed encryption still usefully protects against passive surveillance; others counter that users must not be allowed to “pretend” such connections are secure.
  • Private PKIs and reverse proxies are proposed as workarounds, but are seen as too complex for nontechnical users.

Project Collaboration & Mozilla

  • The article credits building on the Quinn UDP library; commenters ask whether financial sponsorship accompanies that, noting that contributions so far have mainly been code.
  • This triggers a side discussion on Mozilla’s finances and priorities (executive pay vs. OSS sponsorship), with skepticism that “Mozilla has no money.”

Miscellaneous

  • Readers praise the article’s clear, technical style and wish more Mozilla communication looked like this.
  • There is clarification that Firefox’s minimum Android version has recently been raised, reducing legacy constraints.
  • Some users still report HTTP/3/QUIC issues with specific providers and are pointed to Bugzilla for reproduction help.
  • Brief curiosity about whether this groundwork might eventually enable browser‑native BitTorrent over UDP.