msquic VS wdt

Compare msquic vs wdt and see what are their differences.

msquic

Cross-platform, C implementation of the IETF QUIC protocol, exposed to C, C++, C# and Rust. (by microsoft)

wdt

Warp speed Data Transfer (WDT) is an embeddedable library (and command line tool) aiming to transfer data between 2 systems as fast as possible over multiple TCP paths. (by facebookarchive)
Our great sponsors
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
  • SaaSHub - Software Alternatives and Reviews
msquic wdt
19 3
3,833 2,640
2.0% -
9.6 4.2
3 days ago over 2 years ago
C C++
MIT License GNU General Public License v3.0 or later
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

msquic

Posts with mentions or reviews of msquic. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-04-02.
  • Msquic: Cross-platform C implementation of QUIC protocol for C, C++, C#, Rust
    1 project | news.ycombinator.com | 24 Jul 2023
  • Avoiding HTTP/3 (for a while) as a pragmatic default
    4 projects | news.ycombinator.com | 2 Apr 2023
    I referred to sockets as an API design, not to express an opinion on whether you should place your protocol implementations inside or outside the kernel. (Although that’s undeniably an interesting question that by all rights should have been settled by now, but isn’t.)

    Even then, I didn’t mean you should reproduce the Berkeley socket API verbatim (ZeroMQ-style); multiple streams per connection does not sound like a particularly good fit to it (although apparently people have managed to fit SCTP into it[1]?). I only meant that with the current mainstream libraries[2,3,4], establishing a QUIC connection and transmitting bytestreams or datagrams over it seems quite a bit more involved than performing the equivalent TCP actions using sockets.

    [1] https://datatracker.ietf.org/doc/html/rfc6458

    [2] https://quiche.googlesource.com/quiche

    [3] https://github.com/microsoft/msquic

    [4] https://github.com/litespeedtech/lsquic

  • My plan for making 256bit signed and unsigned integers in C. Please help me understand this concept better.
    2 projects | /r/C_Programming | 26 Mar 2023
    The documentation of MS QUIC says it is cross-platform, it should work on Linux, it has a CMake preset for Linux and you can download the prebuilt binary releases for Linux.
  • Best performing quic implementation?
    4 projects | /r/rust | 5 Mar 2023
  • Show HN: Protect Your CI/CD from SolarWinds-Type Attacks with This Agent
    4 projects | news.ycombinator.com | 25 Jan 2023
    Hello HN, my name is Varun, and I am the co-founder of StepSecurity. Here is the backstory about Harden-Runner. We thoroughly researched past software supply chain security incidents. The devastating breaches of SolarWinds, Codecov, and others, have one thing in common – they attacked the CI/ CD pipeline or the build server.

    These incidents made it clear that a purpose-built security agent was needed for CI/ CD. While there are numerous agents available for desktops and servers, such as from CrowdStrike and Lacework, none have been tailored specifically to address the unique risks present in CI/CD pipelines.

    With the understanding that a specialized solution was needed to secure CI/CD environments, we developed Harden-Runner, an open-source solution tailored specifically for GitHub Actions hosted runners. It can be seamlessly integrated into your workflow by simply adding a step. The agent installation process is also lightning-fast, taking no more than 5 seconds to complete.

    Harden-Runner's security agent is designed to closely monitor all aspects of the workflow run, including DNS, network, file, and process events. This allows for real-time identification of any potential security breaches. To prevent incidents like the Codecov breach, where exfiltration of credentials occurred, Harden-Runner allows you to set policies that restrict outbound traffic at both the DNS and network layers. Additionally, we are actively working on implementing further restrictions at the application layer, such as using HTTP verbs and paths, to provide an even more comprehensive security solution.

    An excellent example of how Harden-Runner effectively blocks outbound traffic can be found in the following link: https://app.stepsecurity.io/github/microsoft/msquic/actions/.... As you can see, all traffic to unauthorized endpoints is highlighted in red, indicating that it has been blocked; this is because these endpoints are not included in the allowed list defined in the GitHub Actions workflow file, which can be viewed here: https://github.com/microsoft/msquic/blob/aaecb0fac5a3902dd24....

    One of the key features of Harden-Runner's monitoring capabilities is its ability to detect any tampering or alteration of files during the build process, similar to the SolarWinds incident. To further enhance security and protect against potential malicious tools or attempts to disable the agent, Harden-Runner includes a disable-sudo mode. This mode effectively disables the use of 'sudo' on the hosted runner, providing an additional layer of protection

    Harden-Runner has already been adopted by over 600 open-source repositories: https://github.com/step-security/harden-runner/network/depen.... To fully understand the capabilities of Harden-Runner and how it can protect against past supply chain attacks, please try out our attack simulator GitHub repository at https://github.com/step-security/attack-simulator. I would love to hear your feedback.

  • Least painful path to multiplatform builds?
    4 projects | /r/cpp_questions | 10 Aug 2022
    https://github.com/microsoft/msquic (QUIC / HTTP3)
  • msquic VS MsQuic.Net - a user suggested alternative
    2 projects | 15 Jul 2022
  • The Illustrated QUIC Connection
    2 projects | news.ycombinator.com | 20 Jun 2022
    3 projects | /r/netsec | 22 Apr 2022
  • Msquic - Cross-platform, C implementation of the IETF QUIC protocol.
    1 project | /r/github_trends | 21 Apr 2022

wdt

Posts with mentions or reviews of wdt. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-11-16.
  • .plan
    11 projects | news.ycombinator.com | 16 Nov 2021
    I like the way you're thinking here, I think the limitations you mentioned with gemini may stand... for me it's kind of like the limitations generally speaking with markdown. Doesn't leave much room for doing stuff like parsing the raw data when they aren't in a hierarchical structure with xpaths you can target and stuff like that, it just throws out so much baby with the bathwater that I'm ready to scream infanticide.

    Any thoughts on fast experimental protocols like warp data transfer [1] or fast and secure protocol [2] ? I know they're not exactly the most open things or wellsupported in terms of what you're looking for but I've been really wondering when we're going to start seeing pressure to relieve network congestion using stuff like this.

    [1] https://github.com/facebookarchive/wdt

  • Show HN: Wcp – a reimplementation of cp using io_uring. With a nice progress bar
    2 projects | news.ycombinator.com | 7 Mar 2021
    That's great stuff, I wonder how it compares to wdt[0] when there's only one TCP path. This has been my go-to tool to transfer files on the network.

    0: https://github.com/facebook/wdt

  • Data transfer to new Lustre storage overwhelms campus network
    1 project | /r/DataHoarder | 25 Feb 2021
    I guess? If you’re building parallel infrastructure (vlans are not enough obviously) just for running Aspera over it might not be the worst thing ever, but that’s an expensive way to live and that’s before you pay for the A$pera licenses. There are free and better behaved platforms out there like https://github.com/facebook/wdt if you don’t want other applications’ TCP sessions to time out while you’re trying to squeeze out the last half percent with Aspera.

What are some alternatives?

When comparing msquic and wdt you can also consider the following projects:

quiche - 🥧 Savoury implementation of the QUIC transport protocol and HTTP/3

PcapPlusPlus - PcapPlusPlus is a multiplatform C++ library for capturing, parsing and crafting of network packets. It is designed to be efficient, powerful and easy to use. It provides C++ wrappers for the most popular packet processing engines such as libpcap, Npcap, WinPcap, DPDK, AF_XDP and PF_RING.

lsquic - LiteSpeed QUIC and HTTP/3 Library

netcode.io - A protocol for secure client/server connections over UDP

quinn - Async-friendly QUIC implementation in Rust

POCO - The POCO C++ Libraries are powerful cross-platform C++ libraries for building network- and internet-based applications that run on desktop, server, mobile, IoT, and embedded systems.

openmptcprouter - OpenMPTCProuter is an open source solution to aggregate multiple internet connections using Multipath TCP (MPTCP) on OpenWrt

nghttp2 - nghttp2 - HTTP/2 C Library and tools

shadowsocks-rust - A Rust port of shadowsocks

WebSocket++ - C++ websocket client/server library

mvfst - An implementation of the QUIC transport protocol.

libcurl - A command line tool and library for transferring data with URL syntax, supporting DICT, FILE, FTP, FTPS, GOPHER, GOPHERS, HTTP, HTTPS, IMAP, IMAPS, LDAP, LDAPS, MQTT, POP3, POP3S, RTMP, RTMPS, RTSP, SCP, SFTP, SMB, SMBS, SMTP, SMTPS, TELNET, TFTP, WS and WSS. libcurl offers a myriad of powerful features