Re: [Endymail] We're not done yet

Dave Crocker <dhc@dcrocker.net> Tue, 18 November 2014 22:02 UTC

Return-Path: <dhc@dcrocker.net>
X-Original-To: endymail@ietfa.amsl.com
Delivered-To: endymail@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 97CE51A8A52 for <endymail@ietfa.amsl.com>; Tue, 18 Nov 2014 14:02:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.301
X-Spam-Level:
X-Spam-Status: No, score=-2.301 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SwoFpEJqUiGc for <endymail@ietfa.amsl.com>; Tue, 18 Nov 2014 14:02:54 -0800 (PST)
Received: from sbh17.songbird.com (sbh17.songbird.com [72.52.113.17]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 46CC01A1B0C for <endymail@ietf.org>; Tue, 18 Nov 2014 14:02:49 -0800 (PST)
Received: from [192.168.1.66] (76-218-8-156.lightspeed.sntcca.sbcglobal.net [76.218.8.156]) (authenticated bits=0) by sbh17.songbird.com (8.13.8/8.13.8) with ESMTP id sAIM2joo020385 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT) for <endymail@ietf.org>; Tue, 18 Nov 2014 14:02:48 -0800
Message-ID: <546BC201.6030004@dcrocker.net>
Date: Tue, 18 Nov 2014 14:02:41 -0800
From: Dave Crocker <dhc@dcrocker.net>
Organization: Brandenburg InternetWorking
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: endymail <endymail@ietf.org>
References: <CACsn0ck-bueehMDjgx-Co=bL0pLkeJM=Fqc0T_SDT4bdX4nzPg@mail.gmail.com> <20141117063948.GX13179@mournblade.imrryr.org> <alpine.LFD.2.10.1411170150290.7218@bofh.nohats.ca> <20141117072536.GY13179@mournblade.imrryr.org> <alpine.LFD.2.10.1411170229450.7218@bofh.nohats.ca> <20141117074941.GA13179@mournblade.imrryr.org> <CACsn0cmbjTMR__Fh_Z6i=_Ky8z5XPaqUu5NZetVJW0YYnpOC1A@mail.gmail.com> <546B14D2.2060109@cs.tcd.ie>
In-Reply-To: <546B14D2.2060109@cs.tcd.ie>
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 8bit
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.0 (sbh17.songbird.com [72.52.113.66]); Tue, 18 Nov 2014 14:02:48 -0800 (PST)
Archived-At: http://mailarchive.ietf.org/arch/msg/endymail/J8vp7CpwzP-VnsVbbI6ZJWYEPaE
X-Mailman-Approved-At: Tue, 18 Nov 2014 14:04:00 -0800
Subject: Re: [Endymail] We're not done yet
X-BeenThere: endymail@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: dcrocker@bbiw.net
List-Id: <endymail.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/endymail>, <mailto:endymail-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/endymail/>
List-Post: <mailto:endymail@ietf.org>
List-Help: <mailto:endymail-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/endymail>, <mailto:endymail-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Nov 2014 22:02:56 -0000

On 11/18/2014 1:43 AM, Stephen Farrell wrote:
> 
> 
> On 18/11/14 05:11, Watson Ladd wrote:
>> Do architecture and requirements documents actually work? Or do they
>> end up overcomplicating solutions, 
...
> I know Dave Crocker has done some work in this space (and he's
> the author of RFC5598 as well) - so Dave, do you think there'd
> be value in an RFC along those lines describing an architecture
> for a modern secure interpersonal messaging system that could
> scale and supports implementations with privacy friendly
> features? 



Whether it's code, protocol specifications, architecture or
requirements, whatever is written requires serious discipline and
careful attention to utility -- that is, to being useful.  Each of these
has a long history of examples of impracticality, bloat, and/or
silliness.  (The worst piece of code I've ever seen what written in a
highly structure-oriented language; the prettiest piece of code was
written in assembler.  So code is as subject to abuse as architecture
documents.)

Requirements docs tend to suffer from failures to distinguish between
what really is essential, versus what is merely desired. (Hence, almost
all the IETF documents that call themselves 'requirements' should be
re-labeled, IMO.)

Architecture defines components, objects and the relationships among
them.  Good architecture docs clarify things well and guide further work.

Architecture exists whether we document or not.  The difference is that
when it is documented, we have a better chance of sharing the same
understanding of it, and therefore meaning the same thing as we discuss
things.  (As a consequence, good architecture docs often allows
debugging issues prior to the work of coding.)

Quite a bit of discussion on this list has been about architecture, when
it hasn't debated specific algorithms.  But I'm unclear what goals are
being agreed to or met or how decisions being made satisfy them.
Documenting the architecture doesn't answer such questions, but it
provides a useful place for reviewing whether the decisions match and
satisfy the goals.

d/
-- 
Dave Crocker
Brandenburg InternetWorking
bbiw.net