Re: discussion style and respect

Phillip Hallam-Baker <phill@hallambaker.com> Sat, 13 June 2015 22:25 UTC

Return-Path: <hallam@gmail.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 18CA81B311A for <ietf@ietfa.amsl.com>; Sat, 13 Jun 2015 15:25:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.423
X-Spam-Level: *
X-Spam-Status: No, score=1.423 tagged_above=-999 required=5 tests=[BAYES_50=0.8, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FM_FORGED_GMAIL=0.622, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2aIlN4vlq3WV for <ietf@ietfa.amsl.com>; Sat, 13 Jun 2015 15:25:44 -0700 (PDT)
Received: from mail-la0-x22b.google.com (mail-la0-x22b.google.com [IPv6:2a00:1450:4010:c03::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3505C1B3112 for <ietf@ietf.org>; Sat, 13 Jun 2015 15:25:44 -0700 (PDT)
Received: by lacny3 with SMTP id ny3so18040820lac.3 for <ietf@ietf.org>; Sat, 13 Jun 2015 15:25:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date:message-id:subject :from:to:cc:content-type; bh=Q9fyWAbgmhklmj4PC8+fUECScXcyWakxU7lvfY9Z0OM=; b=0zvTHkLkksXJ90Uui+2ZvYcDwo4WAtKUJpd5+32bplu8BwubLwObQyPtC2K14fy8QN r+Dw4ZOYNPTLQKQpVa5DxBum5Psx+h3ZptLOW01Kxoe0iGbVkDJJdSSX48PUFQL1FCPa BdXWOlWLxnsqkkTQB/IzpU7bzK6bGNYid/IybYgCk112SD72r5NKDEwRD/WaZqTST5aA ZmQWlIK+eC17KcIn72sZUz47J2kkbWwh4CXVn4aVQvETMDYuTBgu2Xolmh/YaXj6ituc tunAAnuKhLDsrfb+tN9fXyWHeX554oMTkbxDuDdbzoB+BQAPoPwuxSz1AW13a4e1vCPf ospQ==
MIME-Version: 1.0
X-Received: by 10.153.7.104 with SMTP id db8mr21299423lad.124.1434234342621; Sat, 13 Jun 2015 15:25:42 -0700 (PDT)
Sender: hallam@gmail.com
Received: by 10.112.203.163 with HTTP; Sat, 13 Jun 2015 15:25:42 -0700 (PDT)
In-Reply-To: <557C9116.2080701@gmail.com>
References: <20150610204037.6837A1ACD25@ietfa.amsl.com> <5578AB4F.3020406@dcrocker.net> <48E1A67CB9CA044EADFEAB87D814BFF632D561D2@eusaamb107.ericsson.se> <20150610215800.867D91B2C4A@ietfa.amsl.com> <CAMm+Lwi5=TfVd26QOx6THXCKsRrgKpi9rHdST5WQZ=Ayzw+sMA@mail.gmail.com> <557A27C5.8030600@gmail.com> <F66440F9-6795-46B6-A4C9-8EFAA4CF79AE@piuha.net> <20150612165256.7E4001ABD3C@ietfa.amsl.com> <557B3C30.602@gmail.com> <132d01d0a580$427d28c0$c7777a40$@tndh.net> <20150613102154.GH23916@verdi> <54BFB0E8D227E8EEF55AF353@JcK-HP8200.jck.com> <557C9116.2080701@gmail.com>
Date: Sat, 13 Jun 2015 18:25:42 -0400
X-Google-Sender-Auth: Ed5j0sY-mi0HO_GWsmegPMwe_N0
Message-ID: <CAMm+LwjT-1Te1_7Byoc_0fNKszDDX=eiqBSb3MKzGjvZw_1Qzw@mail.gmail.com>
Subject: Re: discussion style and respect
From: Phillip Hallam-Baker <phill@hallambaker.com>
To: Brian E Carpenter <brian.e.carpenter@gmail.com>
Content-Type: multipart/alternative; boundary="001a1134c8a08448b805186db4c8"
Archived-At: <http://mailarchive.ietf.org/arch/msg/ietf/dNfrfvlqukf1lKqjRXX-3yrvh3w>
Cc: John C Klensin <john-ietf@jck.com>, IETF Discussion Mailing List <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 13 Jun 2015 22:25:46 -0000

On Sat, Jun 13, 2015 at 4:22 PM, Brian E Carpenter <
brian.e.carpenter@gmail.com> wrote:

> On 14/06/2015 01:19, John C Klensin wrote:
>
> <snip>
> >...   However, if a WG is
> > started with a "solution" and a group of people behind it, there
> > are some bad effects:
> >
> > (i) Attempts to challenge or change that "solution" can easily
> > cause belligerent encounters.  From the standpoint of those who
> > created the solution, they have already done the work, reached
> > agreement, and possibly even deployed that solution.  Proposed
> > changes (at least ones of any significance) look to them like
> > either unnecessary delays and a waste of time or like attacks.
>
> Yes, and this is certainly a very real situation. I've personally
> experienced it in the past, and am currently experiencing it
> (without belligerence, fortunately).
>
> It calls for an open mind, a good understanding of the sunk cost
> fallacy, and consciously neutral chairing.
>

One of the structural problems in the industry is that most of the hard
core technologists use Linux while most of the end users work on Microsoft
or OSX. That has some very significant consequences that I don't think are
widely appreciated.

I deliberately have a hybrid environment where I use Windows for
development, Mac for personal and Linux for the machine shop. I don't do
that because I believe each is best suited for those tasks, I do it to
avoid being biased.

Working from a Linux mindset has the consequence that the network protocol
stack is very fluid. Use of a new transport option in an application
setting, use of raw DNS records is completely natural. The fact that 5% of
the deployed base can make such changes with ease blinds folk to the fact
that it is a five to ten year deployment lag on Windows or OSX.

What possibly saved us in the past is that Microsoft saw itself as the
industry leader and put a lot of resources into maintaining that role. In
particular being aggressively proactive in deployment of IPv6, IPSEC, PKIX
and other specs. They have not played that role since Bill Gates stood down
as CEO however and that has consequences.


In the security area, one of the structural problems is that there are folk
who believe that the commercial cryptography industry is the enemy and that
they have absolutely nothing of value to contribute. So rather often it is
necessary to introduce ideas in ways that the source isn't known so that
they aren't shot down.