Bad/Good ideas and damage control by experienced participants (was: Harassment, abuse, accountability. and IETF mailing lists)

Keith Moore <moore@network-heretics.com> Mon, 13 June 2022 23:52 UTC

Return-Path: <moore@network-heretics.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0653EC157B4C for <ietf@ietfa.amsl.com>; Mon, 13 Jun 2022 16:52:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.908
X-Spam-Level:
X-Spam-Status: No, score=-6.908 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=messagingengine.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Yr9Biua7mPR6 for <ietf@ietfa.amsl.com>; Mon, 13 Jun 2022 16:51:56 -0700 (PDT)
Received: from wout2-smtp.messagingengine.com (wout2-smtp.messagingengine.com [64.147.123.25]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B26CCC14792E for <ietf@ietf.org>; Mon, 13 Jun 2022 16:51:51 -0700 (PDT)
Received: from compute3.internal (compute3.nyi.internal [10.202.2.43]) by mailout.west.internal (Postfix) with ESMTP id DA9DE3200934; Mon, 13 Jun 2022 19:51:48 -0400 (EDT)
Received: from mailfrontend1 ([10.202.2.162]) by compute3.internal (MEProxy); Mon, 13 Jun 2022 19:51:49 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:cc:content-type:date:date:feedback-id :feedback-id:from:from:in-reply-to:in-reply-to:message-id :mime-version:references:reply-to:sender:subject:subject:to:to :x-me-proxy:x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s= fm2; t=1655164308; x=1655250708; bh=PCvzHtbQvWiminvedL0Ui3tGkfjd vJyzdcbBDIOqlzM=; b=ehCKTJcKyfdlbYG0vldT20o9CvL50IZNsndE+h60aCMu EiwBgIioEEhAwHZmZMk/43I5pvKefjZYbUuwXtH9uyO3jnYdzTw3K5CaHrZiZe7L UiFYvCmrk3fKIinSnin8KXc9aN0jr2PF0pUSc+aLEt9b/cr5eBEioeWGuOnS2z1Z kj6GafGc/C23cqs5xMCjjWhsP+vFYpdRJjxQl+esfbUdbLwVJphsMkinZ8kg9mlI c1f5KTTiigaUjPtfqk9jA/kkto0OvS11MK85W/v+0fHps4ofZzNUrGGYb3EfcVIv qdZUkrxMuvMmy3NuP/IO5aPzCy+u+9cWXlJcsB2aiA==
X-ME-Sender: <xms:k82nYnUL68Ie4qgAuewnMtwxEZgnLud6naJo4XAH4k6nkerFQ_p3ZA> <xme:k82nYvkaMXgkJbPVMf-jRdffC1O2EmCoGCi_CdRPtCW_D9VcfLekJtl-7HdT4e8o9 tINf5u2BUmnSw>
X-ME-Received: <xmr:k82nYjaKEA7oCGqG4zq3eQqOysdqDoYRxpPlzxgl9VqsA7K1ApAHXlQF-QWjennIsI95BQdM7xBsffipM56rs9lZOueNq83i5McAbjO0vQT3QlK7yPkDRw>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvfedruddukedgvdejucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmne cujfgurheptgfkffggfgfuvfevfhfhjgesrgdtreertdefjeenucfhrhhomhepmfgvihht hhcuofhoohhrvgcuoehmohhorhgvsehnvghtfihorhhkqdhhvghrvghtihgtshdrtghomh eqnecuggftrfgrthhtvghrnheptdfftddvvdeifeffiefghfdtudduteehieegveeigffg gedvkeeihfehfedujeetnecuvehluhhsthgvrhfuihiivgeptdenucfrrghrrghmpehmrg hilhhfrhhomhepmhhoohhrvgesnhgvthifohhrkhdqhhgvrhgvthhitghsrdgtohhm
X-ME-Proxy: <xmx:k82nYiXJ4lsYwUyElfFlKvWvhxMuQw_-EKeHbS4fDjmeFA3tLJmiSA> <xmx:k82nYhmnpqCl7IGzMnuY9L1WUR2fY8YUn1kn0xb0zAYAmW36XAJuIQ> <xmx:k82nYvc3CFvkhsqsmnKQwFxzsiRrgHsF6RNv_bMxvuaDOHGdj8a3rw> <xmx:lM2nYhv02duVlJZMyb2NVhtwCwmDxIFnBrxhSDwtSm-2UR0MimR1GA>
Feedback-ID: i5d8c41f0:Fastmail
Received: by mail.messagingengine.com (Postfix) with ESMTPA; Mon, 13 Jun 2022 19:51:47 -0400 (EDT)
Content-Type: multipart/alternative; boundary="------------2jPqecGxzlmvu6AqwXuoGYMb"
Message-ID: <62beb11b-d0c9-263a-d53f-c76411e5ab9f@network-heretics.com>
Date: Mon, 13 Jun 2022 19:51:46 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.9.1
Subject: Bad/Good ideas and damage control by experienced participants (was: Harassment, abuse, accountability. and IETF mailing lists)
Content-Language: en-US
To: Phillip Hallam-Baker <phill@hallambaker.com>, Tim Bray <tbray@textuality.com>
Cc: Barry Leiba <barryleiba@computer.org>, IETF discussion list <ietf@ietf.org>
References: <16C5EC99A155D55344E1F195@PSB> <A62BB706DDC6044CA7676E0B@PSB> <629DB8E5.7070206@btconnect.com> <a0556611-dc43-9280-1ab1-1ae747b21eff@network-heretics.com> <cba4c1b9-772f-8baa-d0fc-c94701747ec0@gmail.com> <C6E2D9FD91539FC17B7AD498@PSB> <8CD09EF0-A825-4539-9B3F-38B881BA4F2D@ietf.org> <6410e897-4a1a-35d7-9564-fe1b9445b2c5@network-heretics.com> <82ACFD06-E4C4-4DB5-A3DE-6543E41F8CB3@ietf.org> <2b247525-b651-1292-940e-fc98c2df84d0@network-heretics.com> <6.2.5.6.2.20220612063104.15cf60b0@elandnews.com> <aaebeec0-3b9b-5821-a3a2-f29259cac5c2@network-heretics.com> <CAHw9_iJGU=msLrfvXtdMhuE8icTaU+AhV1Cw+3hjC=kZkRWYxg@mail.gmail.com> <cbabb17d-b99c-0d1e-966c-d3240068acfe@network-heretics.com> <CAC4RtVA6SNR12vcz2v0VF0X-yh-73aBHufnQyu_66ih=axmyAw@mail.gmail.com> <e60ab74c-4a22-46ef-82f9-2d76fe08965c@network-heretics.com> <CAHBU6itHz5kV-CjueVKQuWrnh_TwL2=GkF4g8s53b8akG+-JHQ@mail.gmail.com> <CAMm+LwiQ58NkNSdJ-nJ5QMqe7ZFV75mkaeJ1HY+e+9+pUQPXcw@mail.gmail.com>
From: Keith Moore <moore@network-heretics.com>
In-Reply-To: <CAMm+LwiQ58NkNSdJ-nJ5QMqe7ZFV75mkaeJ1HY+e+9+pUQPXcw@mail.gmail.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/0An0KC3TdpeqjWXaJ8yTPq15yqY>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Jun 2022 23:52:01 -0000

On 6/13/22 19:06, Phillip Hallam-Baker wrote:

> I am mostly in agreement with Tim except that I have also met the 
> 'reverse victim' tactic where the person whose general unpleasantness 
> and aggressive behavior caused the code of conduct to be introduced in 
> the first place weaponizes it by making a series of challenges.

> The issue I think we need to focus on is what are the criteria that 
> maximize the scope for open discussion without people being shut down 
> by deliberate rudeness or for that matter unintentional rudeness or 
> people playing political games.
>
> I know that when I make a proposal and the first four responses are of 
> the form 'that is already being done by <new proposal>' that this is 
> the result of someone involved in <new proposal> seeing a potential 
> competitor and sending an email round to their mates telling them to 
> jump on the thread quick in the hope of squashing the threat.
>
> I also know that when someone says my proposal is good but it 
> absolutely MUST be built on top of some scheme that was developed 
> years back but never made it to deployment that they are trying to 
> make me carry their boat anchor for them.
>
> I also know that whenever someone says 'we can't spend time 
> considering alternative design proposals because it is absolutely 
> essential that this be deployed in 12 months' that the proposed WG is 
> doomed and I can expect to be the SECDIR reviewer for something pretty 
> similar to what was rejected on the grounds of insufficient time 
> roughly 8 years later.
>
> But most folk don't know to expect that sort of behavior.
>
>
<SOAPBOX>
I think the example that Tim cited is both ageist and misandrist, and 
the implication that participants with that attitude should be somehow 
favored seems extremely dubious to me.   I don't know why denigrating 
people because of their age and/or gender and/or facial hair color is 
any better than prejudice based on race, sexual presentation or 
preference, body size or shape, nationality or ethnicity, religion, 
etc.   Clearly those who are old enough to have grey beards should have 
had the decency to die already, or at least to Know Their Places.   Some 
people seem to think that this kind of prejudice is acceptable, and that 
others should naturally agree with it and support it.

We have a long way to go as a species.
</SOAPBOX>

But I suspect that his example (and your message, PHB) also illustrates 
a phenomenon that exists in IETF, what I've sometimes called "damage 
control" but that's actually a poor name.

Experienced participants know that once an idea gets momentum, it's 
difficult to stop it or to steer it in a different direction.    This 
can be true for Good Ideas, Bad Ideas, Good Ideas for which success 
requires solving some difficult or unsolved problem, ideas that are 
aligned with your interest, and/or ideas that you see as contrary to 
your interest.

So there's a common practice of trying hard to nip some kinds of ideas 
in the bud, especially prior to forming a WG.    Because once a WG gets 
a charter there's a strong expectation in the community that it's going 
to be allowed to produce RFCs, and that IESG is going to approve those 
RFCs in some form, even if those ideas really are horrible or the 
resulting RFCs are horrible. And while attempts to fix fundamental 
problems in charter wording are often unsuccessful, attempts to fix them 
at Last Call time are usually even less successful.   So there's a 
narrow window in time to keep this from happening.

Experienced IETF participants (regardless of the color of their facial 
hair or whether they have any) understand this phenomenon, so they 
naturally try to work the process to improve anticipated outcomes.  And 
it's at least possible that wisdom conferred by experience better 
enables one to have a better sense of which ideas are Good, Bad, or 
otherwise.   On the other hand, sometimes less experienced people are 
right, because they haven't been burned by choices made in the distant 
past that aren't being made any more, or which are less relevant than 
they once were. Experience is far from infallible, and some people are 
wise beyond their years.

I do think that inherently Bad Ideas and some inherently Good Ideas 
exist, with a lot of in-between.  But it's often hard to prove that an 
idea is Bad or Good, especially before a WG is actually formed.    Often 
we don't know how Bad or Good an idea is until it's had several years of 
deployment, after which of course it's even harder to get rid of 
them.    (I won't cite examples here because that would be unnecessarily 
divisive, but I'm sure that many of us have no trouble finding some.)

It's hard to see how to avoid the situation entirely.  WGs invest years 
in their work, and nobody wants to see years of their work thrown away 
even if/when they realize that the result is like sausage in the worst 
(sorry) ways.

But we might at least explicitly recognize why this happens and point it 
out to newcomers, so they're not surprised by it.   Maybe we could 
recognize and record expressed concerns, and expect WGs and/or document 
authors to explicitly state whether and how they've addressed those 
concerns as their documents evolve. Maybe we could learn a bit from 
agile practices that try to adapt designs along with emerging 
understanding of their consequences, rather than trying to anticipate 
and solve every problem up front.   Maybe that would reduce some of the 
pressure to anticipate every problem before WG charter time and Last 
Call time.

I think it's a real problem, but I emphatically disagree with the ageist 
and misandrist expression of that problem.

Keith