Re: RFC 5378 "contributions"

Theodore Tso <tytso@mit.edu> Fri, 16 January 2009 00:23 UTC

Return-Path: <ietf-bounces@ietf.org>
X-Original-To: ietf-archive@megatron.ietf.org
Delivered-To: ietfarch-ietf-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7FCD43A691B; Thu, 15 Jan 2009 16:23:35 -0800 (PST)
X-Original-To: ietf@core3.amsl.com
Delivered-To: ietf@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 072D23A691B for <ietf@core3.amsl.com>; Thu, 15 Jan 2009 16:23:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.843
X-Spam-Level:
X-Spam-Status: No, score=-1.843 tagged_above=-999 required=5 tests=[AWL=-0.189, BAYES_00=-2.599, HELO_MISMATCH_ORG=0.611, IP_NOT_FRIENDLY=0.334]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 54a6JoldLTDb for <ietf@core3.amsl.com>; Thu, 15 Jan 2009 16:23:34 -0800 (PST)
Received: from thunker.thunk.org (THUNK.ORG [69.25.196.29]) by core3.amsl.com (Postfix) with ESMTP id E6B933A67FC for <ietf@ietf.org>; Thu, 15 Jan 2009 16:23:33 -0800 (PST)
Received: from root (helo=closure.thunk.org) by thunker.thunk.org with local-esmtp (Exim 4.50 #1 (Debian)) id 1LNcUV-0001zD-Hr; Thu, 15 Jan 2009 19:23:15 -0500
Received: from tytso by closure.thunk.org with local (Exim 4.69) (envelope-from <tytso@mit.edu>) id 1LNcUU-0003VH-Hk; Thu, 15 Jan 2009 19:23:14 -0500
Date: Thu, 15 Jan 2009 19:23:14 -0500
From: Theodore Tso <tytso@mit.edu>
To: Marshall Eubanks <tme@multicasttech.com>
Subject: Re: RFC 5378 "contributions"
Message-ID: <20090116002314.GB10683@mit.edu>
References: <50E312B117033946BA23AA102C8134C6031B3970@SDCPEXCCL2MX.wilmerhale.com> <20090115035256.GB81320@shinkuro.com> <CFD40B6FB7A87F31F3D9CABE@PST.JCK.COM> <0882F36F-6800-4E5E-BC9F-EBA8C7D1877D@multicasttech.com> <20090115142929.GE30522@mit.edu> <D01F4A5C-9507-4005-B4A0-C00CE2E6973E@multicasttech.com>
MIME-Version: 1.0
Content-Disposition: inline
In-Reply-To: <D01F4A5C-9507-4005-B4A0-C00CE2E6973E@multicasttech.com>
User-Agent: Mutt/1.5.17+20080114 (2008-01-14)
X-SA-Exim-Connect-IP: <locally generated>
X-SA-Exim-Mail-From: tytso@mit.edu
X-SA-Exim-Scanned: No (on thunker.thunk.org); SAEximRunCond expanded to false
Cc: John C Klensin <john-ietf@jck.com>, ietf@ietf.org
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: ietf-bounces@ietf.org
Errors-To: ietf-bounces@ietf.org

On Thu, Jan 15, 2009 at 11:50:46AM -0500, Marshall Eubanks wrote:
>
> Consider the threat model here.
>
> This threat applies ONLY to material that the Trust licenses to
> third parties (such as, say, the IEEE) for inclusion and
> modification in their standards. (Just reprinting or translating an
> RFC is not at issue.)

So this licensing to third parties is not automatic; which makes sense
in terms of letting the IESG to have a control point before allowing
another standards body to take over a standard (or try to take over a
standard).

However, that presumably wouldn't be tree for allowing text or code to
be used in implementations, open source or otherwise --- I assume
that wouldn't require prior permission first, right?

> If the Trust does NOT license your material to third parties, then there 
> is no infringement, no one with standing to sue, and no risk to authors. 
> It may be necessary for the Trust to state that they will not assume 5378 
> to be in place for this purpose until there is a replacement. (In that 
> case, if the IEEE or some other body wants to take over an RFC and modify 
> it, they will have to get explicit permission from all authors until 
> there is a replacement for 5378 in place, just as they did before 5378 as 
> put into place.) My understanding is that the Trust is responsible for 
> these licenses, and so they could just (in their best judgement) refuse 
> to issue them without further conditions.

So there probably isn't much risk for a standards bodies wanting to
take over a MIB, for example, But what about someone using pseudo-code
from a RFC where the RFC editor is required to make an assertion that
he/she had all of the rights, and the code or pseudo code was
contributed by a third party who copied the code from some Microsoft
source they had access to while they were a graduate student?   

> Or (and this is my opinion), maybe the authors should only warrant  
> _their work_ as being subject to such licenses, and put the burden on  
> the Trust to obtain any necessary approvals from other parties, only  
> alerting the Trust to the extent they know of such prior authorship. My 
> understanding is that this would require a 5378bis.

That I think is the key; each person can only warrant what they
themselves have authored.  Something that might be worth looking at is
the Developer's Certification of Origin, which is how Linux Kernel
developers deal with contributions for the Linux Kernel.  Anything
which gets incoproated into the kernel must have a Signed-off-by, like
this:

Signed-off-by: "Theodore Ts'o" <tytso@mit.edu>

What this mean is an explicit assertion of the following:

	Developer's Certificate of Origin 1.1

	By making a contribution to this project, I certify that:

        (a) The contribution was created in whole or in part by me and I
            have the right to submit it under the open source license
            indicated in the file; or

        (b) The contribution is based upon previous work that, to the best
            of my knowledge, is covered under an appropriate open source
            license and I have the right under that license to submit that
            work with modifications, whether created in whole or in part
            by me, under the same open source license (unless I am
            permitted to submit under a different license), as indicated
            in the file; or

        (c) The contribution was provided directly to me by some other
            person who certified (a), (b) or (c) and I have not modified
            it.

	(d) I understand and agree that this project and the contribution
	    are public and that a record of the contribution (including all
	    personal information I submit with it, including my sign-off) is
	    maintained indefinitely and may be redistributed consistent with
	    this project or the open source license(s) involved.

This would obviously have to be modified for the IETF's purpose, but
what's nice about it is that each Linux Kernel Developer is only
making assertions about things which he or she has personally has
control over, and by using the Signed-off-by chain, it's possible to
see the handoffs as the patch was passed up the chain from one
developer to another, i.e:

commit 166348dd37a4baacfb6fe495954b56f56b116f0c
Author: Aneesh Kumar K.V <aneesh.kumar@linux.vnet.ibm.com>
Date:   Mon Sep 8 23:08:40 2008 -0400

    ext4: Don't add the inode to journal handle until after the block is allocated
    
    Make sure we don't add the inode to the journal handle until after the
    block allocation, so that a journal commit will not include the inode in
    case of block allocation failure.
    
    Signed-off-by: Aneesh Kumar K.V <aneesh.kumar@linux.vnet.ibm.com>
    Signed-off-by: Mingming Cao <cmm@us.ibm.com>
    Signed-off-by: "Theodore Ts'o" <tytso@mit.edu>

						- Ted
_______________________________________________
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf