Re: "Discuss" criteria

Dave Crocker <dhc2@dcrocker.net> Wed, 03 January 2007 22:49 UTC

Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1H2Evn-0001vz-6O; Wed, 03 Jan 2007 17:49:59 -0500
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1H2Evl-0001vu-8I for ietf@ietf.org; Wed, 03 Jan 2007 17:49:57 -0500
Received: from sb7.songbird.com ([208.184.79.137]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1H2Evj-0004pj-Lm for ietf@ietf.org; Wed, 03 Jan 2007 17:49:57 -0500
Received: from [10.99.239.235] (no-dns-yet.demon.co.uk [80.176.189.195] (may be forged)) (authenticated bits=0) by sb7.songbird.com (8.12.11.20060308/8.12.11) with ESMTP id l03Mnh3X026378 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ietf@ietf.org>; Wed, 3 Jan 2007 14:49:45 -0800
Message-ID: <459C32FD.5000406@dcrocker.net>
Date: Wed, 03 Jan 2007 22:49:33 +0000
From: Dave Crocker <dhc2@dcrocker.net>
Organization: Brandenburg InternetWorking
User-Agent: Thunderbird 1.5.0.9 (Windows/20061207)
MIME-Version: 1.0
To: ietf@ietf.org
References: <4581CEA0.9080209@cisco.com> <ed6d469d0612171633r641def7ete64740f996a87adf@mail.gmail.com> <4585F860.30409@dcrocker.net> <4586C1C0.3000602@cisco.com><4586CD0E.3060501@dcrocker.net> <4587AA14.7010907@zurich.ibm.com><4587FC58.8050501@dcrocker.net> <458804D4.7040601@zurich.ibm.com><459157ED.8030208@dcrocker.net><394B9AA6-742C-4C68-B27C-10C207B45947@cisco.com><45938E65.8050708@zurich.ibm.com> <4594036F.8090601@dcrocker.net> <053301c72b46$67b7c3b0$6a01a8c0@china.huawei.com>
In-Reply-To: <053301c72b46$67b7c3b0$6a01a8c0@china.huawei.com>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Transfer-Encoding: quoted-printable
X-SongbirdInformation: support@songbird.com for more information
X-Songbird: Clean
X-Songbird-From: dhc2@dcrocker.net
X-Spam-Score: 1.8 (+)
X-Scan-Signature: 8a85b14f27c9dcbe0719e27d46abc1f8
Subject: Re: "Discuss" criteria
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: dcrocker@bbiw.net
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
Errors-To: ietf-bounces@ietf.org

Seems like grouping criteria might be helpful, to try to understand the core 
reason for for including them in the list... or considering exclusion:



A.  BASIC FAILURE  (Won't Work / Major Document Problem)
--------------------------------------------------------

> * The specification is impossible to implement due to technical or clarity 
> issues.

This probably means that there has been a fundamental failure of the entire IETF
WG and oversight process.


> * The protocol has technical flaws that will prevent it from working 
> properly, or the description is unclear in such a way that the reader cannot 
> understand it without ambiguity.

This probably means that something was missed, but can be fixed, or that the
document has a -- presumably fixable -- flaw that is a show-stopper.


> * It is unlikely that multiple implementations of the specification would 
> interoperate, usually due to vagueness or incomplete specification.

This is probably a variant of the first concern -- or possibly entirely
redundant with it -- albeit stated differently.  If, in fact, it is different,
it would help to clarify in what way.


> * Widespread deployment would be damaging to the Internet or an enterprise 
> network for reasons of congestion control, scalability, or the like.

Again, a concern of this type, during a late-stage step, indicates a fundamental
failure of the IETF process.


> * The specification would create serious security holes, or the described 
> protocol has self-defeating security vulnerabilities (e.g. a protocol that 
> cannot fulfill its purpose without security properties it does not provide).

This seems to be a variant of the preceding point, but stated specifically in
terms of Security.  The obvious process question is why the working groupdid
not obtain an adequate security review earlier, and make changes accordingly?


> * It would present serious operational issues in widespread deployment,by 
> for example neglecting network management or configuration entirely.

There is often a failure to distinguish between new and peculiar problems that
are created by a particular specification, versus general problems that already
exist.

A classic example of this is citing basic DNS problems, for specifications that
are merely consumers of the DNS and, hence, are not creating any new problems.



B.  IMPURE
----------

(The title of this set might seem flippant, but I cannot think of a more useful
label.  This has to do with issues that likely are secondary, to not being able
to work.  Otherwise, one of the first set of criteria would be used.)


> * Failure to conform with IAB architecture (e.g., RFC1958 (Carpenter, B., 
> “Architectural Principles of the Internet,” June 1996.) [2], or UNSAF 
> (Daigle, L., “IAB Considerations for UNilateral Self-Address Fixing (UNSAF) 
> Across Network Address Translation,” November 2002.) [3]) in the absence of 
> any satisfactory text explaining this architectural decision.

Since IAB architecture documents have no formal, normative status, it's not
clear how to pursue this.  When the IAB speaks on a topic, formally, certainly
the rest of the IETF needs to listen.  Perhaps the specification needs tobe
required to explain any deviance from IAB recommendations.

However it seems clear this criterion is not claiming that the specification
"won't work" but that it has a problem more in the abstract. To raise this as a
Discuss it seems that the AD ought to explain what the negative impact ofthis
specification will be.



C.  PROCEDURAL BREAKAGE
-----------------------

Everything in this section represent tactical show-stoppers, in that the problem
is with the working group's not having been diligent enough in doing required
steps. Clearly the steps must be taken before the document can progress, pending
good outcomes from those steps, of course.  (And also of course, is the small
question of how the document got to the IESG before the required work hadbeen
done?)


> * The specification was not properly vetted against the I-D Checklist. 
> Symptoms include broken ABNF or XML, missing Security Considerations, and so 
> on.


> * The draft omits a normative reference necessary for its implementation, or 
> cites such a reference merely informatively rather than normatively.

> * The document does not meet criteria for advancement in its designated 
> standards track, for example because it is a document going to Full Standard 
> that contains 'down references' to RFCs at a lower position in the standards 
> track, or a Standards Track document that contains only informational 
> guidance.

> * IETF process related to document advancement was not carried out; e.g., 
> there are unresolved and substantive Last Call comments which the document 
> does not address, the document is outside the scope of the charter of the WG 
> which requested its publication, and so on.



D.  CONSTITUENCY MISMATCH
-------------------------

> * The IETF as a whole does not have consensus on the technical approachor 
> document. There are cases where individual working groups or areas have 
> forged rough consensus around a technical approach which does not garner IETF
>  consensus. An AD may DISCUSS a document where she or he believes this to be 
> the case. While the Area Director should describe the technical area where 
> consensus is flawed, the focus of the DISCUSS and its resolution shouldbe on
>  how to forge a cross-IETF consensus.

Presumably, the working group has been populated by people interested in using
the specification in the near-term. If no such people are active in the working 
group, then why has a standards effort been pursued?

The above criterion says that these motivated participants' concerns are not 
sufficient, when weighed against the more detached desires of the active IETF 
community.

Asserting this criterion seems to represent an IETF failure at so many different
levels, that it raises fundamental questions about the nature and purpose of the
IETF.  By implication, it says that we do not care as much about the people who 
are going to depend upon the protocol, as we do about those who won't.

There certainly are times that the nature of Internet architecture permits
fielding only one proposal.  However there are plenty of examples of fielding
multiple solutions, and letting the market choose among them.  So the above
criterion would seem to impose a universal requirement for unanimity that was
most definitely not part of the IETF model, for example, 10-15 years ago.



d/
-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net



_______________________________________________
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf





_______________________________________________
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf