As transport encryption has become the default on the Internet, long-established ways of observing network performance have quietly broken. Engineers can no longer rely on visible sequence numbers, acknowledgements, or timestamps to understand latency on real traffic. This article explains one of the most influential responses to that problem: the QUIC spin bit.
The discussion is based on research published at ACM IMC 2018 by contributors to the MAMI Project (2016–2018). The original paper is copyrighted by ACM and is not hosted here. What follows is an original technical analysis and update, written to explain what the spin bit solved, what it did not, and what it still teaches us today.
Why encryption broke passive latency measurement
Round-trip time (RTT) is one of the most basic metrics in networking. It affects congestion control, application responsiveness, and user experience. Historically, RTT could be measured passively by observing live traffic, without injecting probes or altering flows.
In TCP, this was often done using sequence numbers, acknowledgements, or the TCP timestamp option. These mechanisms allowed an on-path observer to correlate packets in each direction and infer how long a response took to return.
Encryption changed this model. Modern transport protocols, especially QUIC, encrypt nearly all transport metadata. Packet numbers, acknowledgements, and timing information are no longer visible on the wire. From the network’s point of view, packets still flow, but the relationships between them disappear.
This creates a practical problem. Operators are still expected to diagnose congestion, troubleshoot performance issues, and understand large-scale latency trends. Active probing can help, but it adds overhead and does not always reflect real application traffic. The question becomes whether passive measurement is still possible at all.
The idea behind explicit measurement signals
The spin bit is part of a broader design philosophy sometimes described as explicit measurability. Instead of inferring performance indirectly, endpoints voluntarily expose a minimal signal that allows measurement without revealing sensitive state.
This approach accepts two constraints:
- Encryption is non-negotiable. Payloads and most control data must remain confidential.
- Some degree of observability is necessary for a functioning Internet.
Rather than weakening encryption or relying on brittle heuristics, explicit signals aim to expose just enough information to support specific operational needs, and no more.
What the spin bit actually is
At its core, the spin bit is a single bit in the transport header that toggles once per round-trip time. One endpoint flips the bit when it receives a packet from its peer, and the peer reflects that value back.
To an on-path observer, this produces a repeating pattern: the time between consecutive transitions corresponds to the RTT of the flow. Importantly, this works even if the observer sees traffic in only one direction.
The research extended this idea with two additional bits, called the Valid Edge Counter (VEC). These bits indicate whether a particular transition is reliable, allowing observers to discard samples affected by packet loss, reordering, or application-induced delay.
Together, these three bits allow passive RTT measurement with minimal state and negligible overhead, without changing transport behavior or sending extra packets.
Why this mattered for QUIC
QUIC was the first widely deployed transport protocol designed with encryption as a baseline requirement. Unlike TCP, it hides acknowledgements and packet numbers from the network.
From a measurement perspective, this meant that established passive techniques simply stopped working. Even basic RTT estimation became impossible without cooperation from the endpoints.
The spin bit demonstrated that QUIC could support passive measurement without compromising its security goals. It showed that explicit signals could coexist with encryption, provided they were carefully scoped and optional.
This was not a minor detail. It influenced how the IETF approached measurability during QUIC standardisation and helped frame later discussions about observability in encrypted protocols.
Accuracy, limitations, and real-world constraints
The original evaluation showed that the spin bit could track RTT accurately under a wide range of conditions, including moderate loss and reordering. The VEC mechanism, in particular, helped filter out misleading samples that would otherwise skew results.
At the same time, the paper was clear about limitations:
- At most one RTT sample per RTT can be observed.
- Severe loss or reordering reduces the sample rate.
- Endpoints can opt out entirely by disabling the signal.
These are not flaws so much as consequences of the design goals. The spin bit was never intended to provide fine-grained telemetry or per-packet timing. It was designed to offer a coarse but robust view of latency trends on real traffic.
What changed after publication
In the years since the paper was published, deployment has been uneven. Some QUIC implementations enable the spin bit by default, others disable it, randomise it, or allow it only in controlled environments.
Large CDNs and browser vendors have to balance operational benefits against privacy considerations. Even a single bit, when observed at scale, can contribute to traffic analysis or fingerprinting if misused.
As a result, the spin bit today is best understood as an experiment that succeeded technically but raised broader policy and deployment questions.
Why the spin bit is still relevant
Despite limited deployment, the spin bit remains highly relevant for three reasons.
First, it provides a concrete example of how encrypted protocols can still be observable without reverting to deep inspection. This is increasingly important as more protocol layers adopt encryption.
Second, it clarified the trade-offs involved. The debate is no longer framed as “visibility versus privacy”, but as “which minimal signals are acceptable, and under what conditions”.
Third, it influenced later work on explicit signals for loss, congestion, and path changes. Even where the spin bit itself is disabled, its design principles continue to shape protocol discussions.
From middleboxes to modern networks
When the paper was written, the term “middlebox” referred mainly to NATs, firewalls, and load balancers. Today, the landscape looks different.
Content delivery networks, edge proxies, zero-trust gateways, and overlay networks all sit between endpoints. They terminate connections, migrate paths, and apply policy in ways that blur traditional boundaries.
These systems still need latency information. The underlying problem the spin bit addressed has not disappeared; it has moved and multiplied.
What the spin bit teaches us now
The most durable lesson from this work is not the specific mechanism, but the approach.
- Passive measurement will not survive by accident in encrypted protocols.
- If observability is needed, it must be designed explicitly.
- Signals should be minimal, optional, and purpose-specific.
Whether future protocols expose RTT, loss, or other metrics, the same questions will apply. Who benefits from the signal? Who can observe it? What new risks does it introduce?
The spin bit provides a reference point for answering those questions with evidence rather than speculation.
Where this leaves practitioners
For operators and engineers, the practical takeaway is nuanced. The spin bit is not a universal solution, and it is not guaranteed to be available on every path.
However, understanding it helps explain why certain measurements have become harder, and why some proposed fixes are deliberately conservative. It also highlights why collaboration between protocol designers, operators, and privacy experts is necessary.
Encrypted transport is now the norm. Measurement techniques must evolve accordingly, and the spin bit shows one credible path forward, even if it is not the final one.
The original MAMI Project explored these tensions early. Many of the questions it raised are still unresolved, but they are now central to how the Internet is built and operated.
An archived copy of the original ACM IMC 2018 paper is available via the Internet Archive. Copyright remains with the Association for Computing Machinery (ACM).

