Re: Rights in early RFCs

"Joel M. Halpern" <jmh@joelhalpern.com> Sun, 16 June 2019 05:26 UTC

Return-Path: <jmh@joelhalpern.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 53EC51200FE for <ietf@ietfa.amsl.com>; Sat, 15 Jun 2019 22:26:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.635
X-Spam-Level:
X-Spam-Status: No, score=0.635 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_SBL_CSS=3.335, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UMpCaJ4_tAmC for <ietf@ietfa.amsl.com>; Sat, 15 Jun 2019 22:26:08 -0700 (PDT)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 43D99120092 for <ietf@ietf.org>; Sat, 15 Jun 2019 22:26:08 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id 45RN9X07Phz14YcC; Sat, 15 Jun 2019 22:26:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=2.tigertech; t=1560662768; bh=9+/UQyDUay0YoJi7htVMmDeNbcjLP8EGFB5XKNqS6r8=; h=Subject:To:References:From:Date:In-Reply-To:From; b=fIzfJbLet8hjnJ7lJgye+n8oZ5n3hpx6nYYmwjcnTmmsaNsJy86Ss4tIM8oAShCHL XlHi8fHO9HGh5ZmcweAifbF5MSJs8ACMRv3rr56yKhqrsSdVtXEP0Lio1je+GKMWst clfMtYn6ReZoGSB2h/wmVowQscHBRGr/6OzeLvTU=
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (unknown [110.8.254.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 45RN9V053Sz14Yc9; Sat, 15 Jun 2019 22:26:05 -0700 (PDT)
Subject: Re: Rights in early RFCs
To: John C Klensin <john-ietf@jck.com>, Keith Moore <moore@network-heretics.com>, ietf@ietf.org
References: <alpine.OSX.2.21.9999.1906141728410.11884@ary.qy> <A89856255D980EBDE462508F@PSB> <F1C084A6-BB9E-4AFB-AB31-C547FD0FEEE4@sobco.com> <A3DE5329-2B88-4FB4-A1D5-E85EEC409A08@vpnc.org> <CAHbuEH5qcpPmUa7TnY6UhsCJCGMYtPAW=F5uQOWrnZYVLrFmtA@mail.gmail.com> <c907cb94-98c2-8c7d-9d7f-4633d9bedfe2@network-heretics.com> <0A3F315FFC165D4643E9A581@PSB>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <9695485d-2e00-a961-3209-0c9d1def684f@joelhalpern.com>
Date: Sun, 16 Jun 2019 14:26:03 +0900
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:60.0) Gecko/20100101 Thunderbird/60.7.0
MIME-Version: 1.0
In-Reply-To: <0A3F315FFC165D4643E9A581@PSB>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/6ooxmtl7mVW4-GSfPvK45p8f3oE>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 16 Jun 2019 05:26:12 -0000

I think there are two separate issues.

First, the way they structured their profile, they were making verbatim 
quotes, and then putting there own text around taht.  As far as I can 
tell, in terms of our copyright rules, we have said they have the right 
to do that.  I believe the trust will have to tell them that they have 
those rights.

The fact that the profile they are building around those quotes does not 
match our intentions is a different problem.  It is not, as far as I can 
tell, a problem the trust can deal with.  The trust can call IESG 
attention to the activity, in hopes that via discussion the right things 
happen.  But as long as what they quote is verbatim, and they include 
our boilerplate where required, we do not have the right to decide 
whether we like or dislike the usage.

Put differently, what I have seen looks a lot like the case John 
describes below as a perfectly valid usage that we can't stop.  But the 
IESG can certainly talk to them about the interoperability issues.

Yours,
Joel

On 6/15/19 4:52 PM, John C Klensin wrote:
> 
> 
> --On Saturday, June 15, 2019 16:32 -0400 Keith Moore
> <moore@network-heretics.com> wrote:
> 
>> On 6/15/19 6:48 AM, Kathleen Moriarty wrote:
>>
>>> I'll add to Paul's description.  Within the request, for one
>>> document,  they wish to make a profile.  Normally, that's
>>> fine.  Except that they  want to change keywords in
>>> directions that they should not be changed  in a profile.
>>> For instance changing a MUST to a SHOULD or even a MUST
>>> NOT.  This obviously results in the profile not being in
>>> compliance  with the referenced document and therefore not
>>> interoperable.
>>
>> Why would this community want to grant permission to do that,
>> even if it were in our power to do so?
> 
> Keith (and others),
> 
> I've supplied a good deal of historical information to John
> Levine off-list, but your question goes to what I think is the
> key issue.  Unless we, for some reason I can't imagine, want to
> encourage the creation of confusion about what our standards do
> or do not say or require, we shouldn't grant this permission or
> spend energy exploring ways to figure out what can or cannot
> reasonably be granted and/or what is in the IETF Trust's power
> to grant.   Instead, we should encourage whomever this is to
> incorporate our standard (or selected parts of it) by reference
> (something we could not prevent if we wanted to) and then to
> identify what they want to make different.
> 
> 	"Our protocol is just like the IETF's User Datagram
> 	Protocol [RFC768] except that where the FizzleFraz case
> 	is mentioned the implementer MUST NOT do Garglezork even
> 	if the IETF requires doing so."
> 
> Is a perfectly good style of statement.  We couldn't prevent it
> if we wanted to (although some effort to explain to them why it
> would be a bad idea might be in order depending on what they are
> actually trying to do and why).  And it creates absolutely no
> confusion about what the IETF Protocol is.
> 
> It seems to me that trying to give them permission to make
> partial copies in support of developing a forked or conflicting
> standard is not in the interest of either the IETF community or
> the RFC Series and that, if the IETF Trust is exploring doing
> so, they are in danger of losing their way about their
> obligations to the community.
> 
> best,
>     john
> 
> 
> 
>