Re: The IETF environment

S Moonesamy <sm+ietf@elandsys.com> Mon, 28 April 2014 14:50 UTC

Return-Path: <sm@elandsys.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E99611A0A22 for <ietf@ietfa.amsl.com>; Mon, 28 Apr 2014 07:50:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.651
X-Spam-Level:
X-Spam-Status: No, score=-2.651 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RP_MATCHES_RCVD=-0.651] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GPTptW3FguIQ for <ietf@ietfa.amsl.com>; Mon, 28 Apr 2014 07:50:52 -0700 (PDT)
Received: from mx.ipv6.elandsys.com (mx.ipv6.elandsys.com [IPv6:2001:470:f329:1::1]) by ietfa.amsl.com (Postfix) with ESMTP id 6EF0E1A0A13 for <ietf@ietf.org>; Mon, 28 Apr 2014 07:50:52 -0700 (PDT)
Received: from SUBMAN.elandsys.com ([197.224.135.94]) (authenticated bits=0) by mx.elandsys.com (8.14.5/8.14.5) with ESMTP id s3SEoMdO015347 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 28 Apr 2014 07:50:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=opendkim.org; s=mail2010; t=1398696638; bh=oE0gfjOUCkzelBvSY2Wuj55x5sOUUTRL7vXnEdNHlMc=; h=Date:To:From:Subject:Cc:In-Reply-To:References; b=F12fCm6ynEENuia0498iXYbsJx04FSrh4xXD6hb+dsoGp1YvaVdnY63muZi+x8G5O k+rVxowPUZ5VWNDdkzp0+8v/aI/lwcfYdBiQj1ncgEeE/4XgiovCKOoLmIBwLO2JGF XajgQos9vIqMnNxkm0q5DWzjQDKyBomxkOscorNw=
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=elandsys.com; s=mail; t=1398696638; i=@elandsys.com; bh=oE0gfjOUCkzelBvSY2Wuj55x5sOUUTRL7vXnEdNHlMc=; h=Date:To:From:Subject:Cc:In-Reply-To:References; b=UPvX8JN0zUerpef11CM3LPDr8LpnNZLpTEXfdCzs4ykJ3W69I3Uxv9K/R7+ci/Gj3 zx9L1GfhRGApLq92R5kM0zsQzRyG/wvU+mexlrgDael0DS/9mLZBQUYgSd5K4igEzr 7VXMoIgoS1NnKwHm25Vz7nFCJ2wHJJnSI6QL0gV0=
Message-Id: <6.2.5.6.2.20140428055512.0d3d6088@resistor.net>
X-Mailer: QUALCOMM Windows Eudora Version 6.2.5.6
Date: Mon, 28 Apr 2014 07:45:25 -0700
To: Phillip Hallam-Baker <hallam@gmail.com>
From: S Moonesamy <sm+ietf@elandsys.com>
Subject: Re: The IETF environment
In-Reply-To: <CAMm+LwgVjd7V08OHkV90QeJDwkEdA7S+yvwenO4K2hrDxV-icg@mail.g mail.com>
References: <53499A5E.9020805@meetinghouse.net> <5349A261.9040500@dcrocker.net> <5349AE35.2000908@meetinghouse.net> <5349BCDA.7080701@gmail.com> <01P6L9JZF5SC00004W@mauve.mrochek.com> <CAL0qLwZr=wVX6eD+yGVOaxkSy5fJbuAErTshOG+2BywUvkDfAA@mail.gmail.com> <01P6QCMYYMJ000004W@mauve.mrochek.com> <6EF4DECC078B08C89F163155@JcK-HP8200.jck.com> <01P6QVVGQA4W00004W@mauve.mrochek.com> <5350A9FB.9010307@dougbarton.us> <01P6S93XQ9TI00004W@mauve.mrochek.com> <5351A89D.7000700@dougbarton.us> <01P6STS0F6I600004X@mauve.mrochek.com> <5356F23F.40909@dougbarton.us> <01P71CGX4VD8000052@mauve.mrochek.com> <5359D543.5070900@dcrocker.net> <01P721HY5XZO000052@mauve.mrochek.com> <535A7D87.6080200@dcrocker.net> <CAMm+LwgVjd7V08OHkV90QeJDwkEdA7S+yvwenO4K2hrDxV-icg@mail.gmail.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format="flowed"
Archived-At: http://mailarchive.ietf.org/arch/msg/ietf/CyMmFvWDU7PTWpK9CUUGMu54nko
Cc: ietf@ietf.org
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Apr 2014 14:50:54 -0000

Hi Phillip,
At 10:28 26-04-2014, Phillip Hallam-Baker wrote:
>There is really no precedent for discovering that a rogue agency was
>conspiring to sabotage efforts to provide Internet security.

The IETF have been considering security in its protocols for the last 
11 years.  It has also been considering cryptography for use on the 
Internet.  About a year ago it was found that all does not provide 
the security one would expect.  There hasn't been such a 
precedent.  Perpass is an unusual occurrence.

The comments on the thread describe the IETF environment as "people 
coming together
to work on stuff" whereas people from the outside consider the IETF 
as more than that.  The question which has not been discussed is 
whether the IETF accepts the responsibility for all aspects of its 
protocols.  If the answer to that question is "yes" it would be up to 
the IESG to figure out how to solve the problem(s) in a timely manner.

Regards,
S. Moonesamy