RE: Diversity and Inclusiveness in the IETF

Hannes Tschofenig <Hannes.Tschofenig@arm.com> Wed, 24 February 2021 08:47 UTC

Return-Path: <Hannes.Tschofenig@arm.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 041A33A11C7; Wed, 24 Feb 2021 00:47:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.098
X-Spam-Level: *
X-Spam-Status: No, score=1.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RAND_MKTG_HEADER=2.999, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=vQsQA1uY; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=vQsQA1uY
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AsvCZ50zmQCu; Wed, 24 Feb 2021 00:47:50 -0800 (PST)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com (mail-eopbgr60048.outbound.protection.outlook.com [40.107.6.48]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 048EB3A11C4; Wed, 24 Feb 2021 00:47:49 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=XgMRL/Mf3D4kxnEqOXmVz1Idr8+PSridq3U6Dp/HYLA=; b=vQsQA1uYMIb9RWltMl0oY2LLBJ9Uovy6RTG1jvpIhDSyWfzpRYADNQLtmTwoM7t+QC1WOOCaodCZkOCpSpofGbxokux2FDEstAcX7462eks5YfGxg2i1ICRnE1syKvtoCNCdjXhp2Ba0WItMyVHxwXxae9O+VlpnVrCRKPbN80Y=
Received: from DB9PR06CA0022.eurprd06.prod.outlook.com (2603:10a6:10:1db::27) by AM8PR08MB6340.eurprd08.prod.outlook.com (2603:10a6:20b:368::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3868.29; Wed, 24 Feb 2021 08:47:47 +0000
Received: from DB5EUR03FT041.eop-EUR03.prod.protection.outlook.com (2603:10a6:10:1db:cafe::29) by DB9PR06CA0022.outlook.office365.com (2603:10a6:10:1db::27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3868.27 via Frontend Transport; Wed, 24 Feb 2021 08:47:47 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; ietf.org; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;ietf.org; dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DB5EUR03FT041.mail.protection.outlook.com (10.152.21.4) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3868.27 via Frontend Transport; Wed, 24 Feb 2021 08:47:47 +0000
Received: ("Tessian outbound a87bfa165cc0:v71"); Wed, 24 Feb 2021 08:47:46 +0000
X-CR-MTA-TID: 64aa7808
Received: from 938d29e7c9d9.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 8F165E94-44FD-42D3-835F-ED4FF360ADF9.1; Wed, 24 Feb 2021 08:47:41 +0000
Received: from EUR02-AM5-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 938d29e7c9d9.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Wed, 24 Feb 2021 08:47:41 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=DW761wrI0tT7NrvuPH+AzwPf/gCOg9LEdiuI6c09Vuom2BZeWGKnyEdngTOqfcRLAIcLs0TDHC1lBxnfHb+FMlqf1D9+o39Jobmys3iCfhJxzqgAjRXsF8pVMNzDdwS3dqJbqWIEQz+ZOdqoNOPJsOlYVkJWGM429DLoS3vJ8WDAc0l2nVHT3iKxhPe0n9JtUWIB1mnHm7vCQIhb8QWPwYkzZ7WYf/uceRrTnHRTJgNQ5Hxp4sMPmg94kDXWe44gjHTAK8yf/Ija4k4l35ykK9f6Wl7aI7+lAZsllhARwHTHuyfO5F7u1Iswx6XHwKYuSZEyFKuZL3rsSgy5h79lIw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=XgMRL/Mf3D4kxnEqOXmVz1Idr8+PSridq3U6Dp/HYLA=; b=NxYuhwZ+/0qxkvsasoG6PQzXe48bSvIzn7ddwPcYBl2w1SN/lPXNw7TeZFPNlzmti/xmxKn7rjup97B46YpH7YTBipUL1KB1UQk6ap6OKUxX0WWfzFBFQE7cLGszY3v9VTxsaBKbPJ2jX3HNGCuvpd4t7CtHVqjEw4w8/VafwVlx65nWvGuVcnYz+LBn6Wp77aKi2e5kG/E4KHv0ttQ1d7md97aTrsGf10RlqG7+SjCkQeUYIsyfewMSt+wcIyyV8MnezG6QTIX46OqdY8BAPMjMg14rAC7nNz91FfOrPnFryUwA+s+3lgG8dRSbG4rX3XiQ/Z4oW46+thrN1f6EYA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=XgMRL/Mf3D4kxnEqOXmVz1Idr8+PSridq3U6Dp/HYLA=; b=vQsQA1uYMIb9RWltMl0oY2LLBJ9Uovy6RTG1jvpIhDSyWfzpRYADNQLtmTwoM7t+QC1WOOCaodCZkOCpSpofGbxokux2FDEstAcX7462eks5YfGxg2i1ICRnE1syKvtoCNCdjXhp2Ba0WItMyVHxwXxae9O+VlpnVrCRKPbN80Y=
Received: from AM0PR08MB3716.eurprd08.prod.outlook.com (2603:10a6:208:106::13) by AM9PR08MB6931.eurprd08.prod.outlook.com (2603:10a6:20b:30f::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3912.2; Wed, 24 Feb 2021 08:47:41 +0000
Received: from AM0PR08MB3716.eurprd08.prod.outlook.com ([fe80::7484:8c2b:e664:648]) by AM0PR08MB3716.eurprd08.prod.outlook.com ([fe80::7484:8c2b:e664:648%7]) with mapi id 15.20.3868.033; Wed, 24 Feb 2021 08:47:40 +0000
From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
To: Brian E Carpenter <brian.e.carpenter@gmail.com>, Fernando Gont <fgont@si6networks.com>, "'ietf@ietf.org'" <ietf@ietf.org>, GENDISPATCH List <gendispatch@ietf.org>, Keith Moore <moore@network-heretics.com>
Subject: RE: Diversity and Inclusiveness in the IETF
Thread-Topic: Diversity and Inclusiveness in the IETF
Thread-Index: AQHXCXgbtlRdrPa6OEShU5hVFqdRTqplfalggADLMgCAAKfG8A==
Date: Wed, 24 Feb 2021 08:47:40 +0000
Message-ID: <AM0PR08MB371640432AA23B27BB2D948DFA9F9@AM0PR08MB3716.eurprd08.prod.outlook.com>
References: <37eecb9b-f0eb-e21c-b162-b1f0339e4981@si6networks.com> <AM0PR08MB37168C83CF19A3CDFEF15FD8FA809@AM0PR08MB3716.eurprd08.prod.outlook.com> <1fdfebbf-58ab-0f18-da53-ec06d9953c5f@gmail.com>
In-Reply-To: <1fdfebbf-58ab-0f18-da53-ec06d9953c5f@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: 6B02749AACE28349BB9E57859EE00A62.0
x-checkrecipientchecked: true
Authentication-Results-Original: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=arm.com;
x-originating-ip: [80.92.115.86]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: 0f11fe5f-f565-456f-64b1-08d8d8a0dc02
x-ms-traffictypediagnostic: AM9PR08MB6931:|AM8PR08MB6340:
X-Microsoft-Antispam-PRVS: <AM8PR08MB63400093CD236FA4991C3AECFA9F9@AM8PR08MB6340.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
x-ms-oob-tlc-oobclassifiers: OLM:10000;OLM:10000;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: 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
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM0PR08MB3716.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(376002)(39860400002)(346002)(136003)(396003)(366004)(66476007)(66556008)(66574015)(52536014)(86362001)(55016002)(64756008)(2906002)(186003)(110136005)(83380400001)(66446008)(26005)(478600001)(8936002)(8676002)(71200400001)(5660300002)(9686003)(33656002)(6506007)(7696005)(66946007)(76116006)(316002)(491001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: =?utf-8?B?enkyYUhleTg5dUt5N053b0FLZ3h1a29JWnZRZkI3NHRzNGo5UGdXc1ptR3FO?= =?utf-8?B?WjhNNjAyMmIrcnRseFdzSS9BRE0ySzErRmc1d2pmMDhxUTlXNGRTQlYwMjFp?= =?utf-8?B?S2VIeWRGdUF4dCtHdXRacStuR1dUNVlxYitpS0RnZjNsTjZzMS9NRG90Um5E?= =?utf-8?B?VHhxL0M1KzJ6WTlYbmNqMjBuTjVSamtsMlJ2L0hseVo1SlF3MU1IcTBlcWRk?= =?utf-8?B?WlBHNG9VdUJiMGdQYlpFSXJpU0tIQ3Z6OUlQZTE2d0NBeWVYZ2VuYlJ6RDNM?= =?utf-8?B?aHltaSs0M09RTGJKb2hkOXJDaWNXYU1Ld0ZNRWRWWUVBRGNsaDBtcWhoalVV?= =?utf-8?B?bGEzK3FjTnpaenBRUk5OWU85Z0UrdkxvUllMOG5MTFNxM1hLaXlhWTdHdVl2?= =?utf-8?B?eUgvZUFwN0N6L0JhOStGaDMxS2ppK0xxSjVSTWZFNlA0N3JJRDBqQmRCbzBJ?= =?utf-8?B?bW9DZnhHUXhHWU52L1VpTHlFQ1lZdjlHcUdQWFNYd1pQNWttdWxRWFRSRWRi?= =?utf-8?B?UVdKa1ZMQ2hUTEVzblBRb05NVzNHaTNsdXRKMzVWMGNVS2lQakErMU9ONnc0?= =?utf-8?B?RjdpTW1QUldyTVFsdks4d0gweWsvRGs5enNLVUFTTmVGc3dxUTVNNUFBQVlP?= =?utf-8?B?S0NvRDFHemxzR0dFL2laVkhHLzN4MmtaZURVaDBjbU5vSFZlZW9heE9yd1Bj?= =?utf-8?B?Mm92dXkvR2g1bkRUN1VvR3dBK0NpL1p1OFJjNStZaVREV3R0ajdmbTdPTEFI?= =?utf-8?B?cEIycVFMMHJNdWJjTFJ2dk9sbG9tcXprajlnQ0ZyOXQzYWRVdFJBQy92eldw?= =?utf-8?B?OWYyRWFDWFFjT1NuL3BHdndpUkVINjM0SmE3VGltdzBYemVHc1ZYL0RINnpi?= =?utf-8?B?VEdKY1J4SzJiTzkvdnlTUld6eTFNc2JFQVZ5bk5iS2lRRE9HcUxxWjVmbVNR?= =?utf-8?B?UXZWNHEvQkNueXpBd09SUFQ0TVZuT0ExWHFvZlRvb1JpRmQyZTFrTEtKTkFp?= =?utf-8?B?VHcyazZZQVNkU3h5UU1Za2RoZDNYOStJUjI0Ly92ZGVYR1VuR2lHVlQ1Sk4z?= =?utf-8?B?Z01pYlQ0OFRQUWZYNFUrd1VBRk90eWNKSjNoTy8xRGttT2d6Qk9tV2RaWS9O?= =?utf-8?B?L0FDSmliQmlLaGdkSWtMT1NHYXlhZ1ZyRVFidUJZNGh0clBINFY4Z2FDMkJP?= =?utf-8?B?a0pGR1gycUZGbHBGTjZpbVcxRnhkaElXNURkU0NJaHFNTElRZGREVjNsV0sr?= =?utf-8?B?QmR2dE13dTl5SmNoSmtrbnVUQmxHRG9kUlowTENzNHhYc3JlaC9zTmNMeUEx?= =?utf-8?B?SjRaUERRc0tHVjFiUVlPZUVIVU5NL1R6bDVyeEdPZGN2NDNOOXJ3bWtFcVZW?= =?utf-8?B?ZHdkdU05ODFzckJVbEwvbnBtakRyQjdhL3QzMXFxUktTNWtQaTMxVWNKcFhV?= =?utf-8?B?NmtudTZUSDB3TTRXVzE1SEg3cHE1OTdhRW5GQVkwRzNSQk5uUWg4dGtLbzhL?= =?utf-8?B?SDliQUxZdmJRS1ZIdVlpb1I2VHhRY0lkOWRKQ2MvL2FuTkFmRUJOVTZ0TkFS?= =?utf-8?B?c0YzeXZnTEZUQ09obzNMM0J3dDc1bDRBT0NIbEVZeGpiMmdMMUNTMHkxZk8v?= =?utf-8?B?R3B1bnRPM215a0RnRzJ0dWdNUVdham44TkROcVptcFgwdmZ4ejMyc3ZDcU50?= =?utf-8?B?NU10SzJBVXpINXNtKzVoQWdJV1pma0dZb29WOE1VKzRjR1cySG02WUM2T3Y2?= =?utf-8?Q?l0N6FoVf6qDCv7aGiAm7TEKJ8ja+4T9xoNByuIp?=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR08MB6931
Original-Authentication-Results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: DB5EUR03FT041.eop-EUR03.prod.protection.outlook.com
X-MS-Office365-Filtering-Correlation-Id-Prvs: 6f6b1b50-8dfa-434c-1f42-08d8d8a0d85d
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(4636009)(396003)(136003)(346002)(39860400002)(376002)(46966006)(36840700001)(66574015)(7696005)(26005)(82310400003)(186003)(33656002)(70586007)(336012)(316002)(110136005)(47076005)(81166007)(52536014)(9686003)(8676002)(450100002)(6506007)(356005)(86362001)(83380400001)(36860700001)(8936002)(5660300002)(70206006)(478600001)(82740400003)(55016002)(2906002)(491001); DIR:OUT; SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 24 Feb 2021 08:47:47.0331 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 0f11fe5f-f565-456f-64b1-08d8d8a0dc02
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource: DB5EUR03FT041.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM8PR08MB6340
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/qqr3dZ19k73Oo47vAs0qqv_uqK0>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Feb 2021 08:47:53 -0000

Hi Brian,

Thanks for the questions.

> Can you justify "increasing number"? I don't mean compared to 1986, but compared (for example) to 2011? As long as I can remember, people have been concerned about participants who are "goers" rather than "doers" at meetings, and you seem to be adding a further concern, "doers" whose action is to write text rather than write code.

[Hannes] I started noticing it after the IETF started the hackathons, which gave implementers more visibility. In the groups I participate in, I regularly ask around for volunteers to join the hackathon. Then, you get an idea who is interested to participate and who isn't. The hackathons are also a "light" form of coding because you are selecting a really small specification aspect only. Hence, the bar is pretty low for entry. At f2f hackathons you also have a number of people joining who use the event to chat. So, you have to take this into account as well.

[Hannes] Since I am attending a small number of the working groups I am obviously curious whether others have made a similar observation. Maybe I am hanging around in the "wrong" groups. I also attend OAuth and TLS, which are different. In those two groups a lot of implementation and deployment work is happening.

> Also, you don't mention operators, whose role is not to write code at all but whose contribution to the IETF is essential. So that's another category of "doers".

[Hannes] Actually, I wouldn't make this distinction because it is really about the persons involved. Every bigger organization has people who are more disconnected from the engineering than others. That's totally fine. Also consider that we are not talking about writing product-quality implementations in this conversation. Those implementations are often, with the level of specialization in our world, created and maintained by bigger teams in a company. With our regularly changing drafts I would recommend to wait with product-quality code till the specification matures or is completed.

> I'd like to see some actual facts about these various categories of "doers". What % were they 10 or 20 years ago, and what % are they now? Has the hackathon changed the numbers? Etc.

[Hannes] We could collect some numbers. I doubt it would be easy to collect them from the past. We could re-use the document shepherd writeup. Already today we (at least Rifaat and I do it) indicate whether there are implementations of a specific specification. We could add information about testing, hackathon participations, and details about the implementations. We could capture whether the authors themselves have worked on the code or someone else. If it was someone else, we could try to loop them into the discussion to collect the feedback.

> > I would include this aspect under diversity, particularly when talking about the new leadership election cycles.
> Yes, it should be on NomCom's radar. The need for enough ops people has long been understood, but recent development experience is also relevant.

> > Participating in some working groups I more and more get the impression to sit in a document writing class rather than in an Internet engineering organization.
> Since our principal output is text, that isn't so surprising, but I think there's a case for sending any spec that does not adhere to RFC7942/BCP205 back to the WG.

[Hannes] On the surface, it looks like we are producing text. But actually we want much more. We want running code (in the sense of deployed code) and we should expand it to "running secure code".
I think that this is the biggest mental obstacle. If we believe our work is done when the specification is done, then we will fail to reach the full potential of our work. I understand that this message is inconvenient because many participants have difficulties to influence the deployment or even implementations. This is also the cause of a lot of frustration in the IETF work because person A says or writes "I went feature foo." but persons B and C then need to implement 'foo' and then deploy it. Needless to say that persons B and C are less excited about doing the work for person A. IMHO this is the root cause of many conflicts as far as I can see.

> > *: I am also including authors of protocol specifications that do not implement their own specifications.
> That's a bit cruel.

[Hannes] The IETF mission statement says that we care about "engineering quality" and "running code" then we have to figure out how we get there. As mentioned in other conversations, for me this means more use of formal methods for security protocols and implementations supporting specifications. I would also point to the need for testing but I am already now stretching the limits of what people are willing to hear...

> In larger organisations, it might be totally infeasible. But again, RFC7942 is our friend.

[Hannes] As mention above, I am not asking for product-quality code. For what I am trying to accomplish, namely to feed implementation experience back into the specification work, I would already be happy to get the implementers involved. Having worked in a big telco equipment manufacturer myself I know that the implementers do not start their work until the specification is finished (or even years later). So, you would need some prototyping work while you are writing the spec. At least when I was working for this unnamed telco equipment manufacturer, developing prototypes and PoCs was in scope of my work.

Ciao
Hannes

IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.