Re: Last Call: <draft-secretaries-good-practices-06.txt> (IETF Working Groups' Secretaries) to Best Current Practice

"Murray S. Kucherawy" <superuser@gmail.com> Mon, 08 December 2014 18:17 UTC

Return-Path: <superuser@gmail.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9F6721A6FA9 for <ietf@ietfa.amsl.com>; Mon, 8 Dec 2014 10:17:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZH_E1ZkLsjpe for <ietf@ietfa.amsl.com>; Mon, 8 Dec 2014 10:17:12 -0800 (PST)
Received: from mail-wi0-x236.google.com (mail-wi0-x236.google.com [IPv6:2a00:1450:400c:c05::236]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3E36A1A87BA for <ietf@ietf.org>; Mon, 8 Dec 2014 10:17:05 -0800 (PST)
Received: by mail-wi0-f182.google.com with SMTP id h11so5613424wiw.15 for <ietf@ietf.org>; Mon, 08 Dec 2014 10:17:03 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=rg5+IxOgesjANfwGiz4Vff/qKEXz9tBMTjjlFR+tQGQ=; b=RL+/3BCcc0f4xCTD/cIaFDV+d1RueaYb2MXNMZMKi1iEc4RGDlPozquX9EGFiA4r3Z FKUDsMR5n/YIhriTRvm3/JhRmBKMf4pR/jyGeQAd/1xIRl+34p5L1GQoxYQNwbnFjoAO sCJoUFMO48nJaXdpSw57ahhNi11iE/f7XsGTr9Pjj7sUb7lxVg8yfFQbzOx+yA7rJMGO vrT1SNYZuVe4p8rchPEkFsQMseQsL2GyLwzKs7YDagWc1eoSILBG/ISCdCUf88ZekGc0 glGXufKK5/uK5KC/trvp6uKxmTqCG61xI5pM8DIDd5T27+hSRMaFhZ15c1SfZEoGVnbT Jg9Q==
MIME-Version: 1.0
X-Received: by 10.180.82.226 with SMTP id l2mr25607618wiy.61.1418062623664; Mon, 08 Dec 2014 10:17:03 -0800 (PST)
Received: by 10.27.76.134 with HTTP; Mon, 8 Dec 2014 10:17:03 -0800 (PST)
In-Reply-To: <547F1DBA.9030408@alcatel-lucent.com>
References: <20140612132656.8100.57197.idtracker@ietfa.amsl.com> <CAL0qLwZEo-AN4Er0gmbCyWJwTqOKBUKKMHEMQ_YqhK+oB+pcgg@mail.gmail.com> <547F1DBA.9030408@alcatel-lucent.com>
Date: Mon, 08 Dec 2014 10:17:03 -0800
Message-ID: <CAL0qLwZ2jjUm0LKVTtOnFpnUYfGvvKjM_WAP8jH=2Yc5bKD__A@mail.gmail.com>
Subject: Re: Last Call: <draft-secretaries-good-practices-06.txt> (IETF Working Groups' Secretaries) to Best Current Practice
From: "Murray S. Kucherawy" <superuser@gmail.com>
To: Martin Vigoureux <martin.vigoureux@alcatel-lucent.com>
Content-Type: multipart/alternative; boundary="f46d044403daf3ee470509b86e1a"
Archived-At: http://mailarchive.ietf.org/arch/msg/ietf/gQ-YGmJkGEOPfy-woDAE-XjQkXU
Cc: ietf <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Dec 2014 18:17:18 -0000

On Wed, Dec 3, 2014 at 6:27 AM, Martin Vigoureux <
martin.vigoureux@alcatel-lucent.com> wrote:

>
> I've read this document and am generally in support of its progression.
>> However, I have a few questions and comments.
>>
>> The filename portion of the document says "good practices".  This is a
>> minor point since that name will vanish on publication, but since it
>> also does say it in the Abstract, I wonder if the original intent may
>> have gotten lost.  This seems to be an accretion of possible functions
>> of a WG Secretary, but doesn't really explain how best to perform those
>> functions (which I infer from the filename).
>>
>
> I like to view it as: "it is good if a secretary does all that"
>

I didn't get that impression.  I got the impression that it's a list of
things a secretary might do.  If the goal is to encourage secretaries to be
assigned that do most or all of these things, then that's gotten lost.


>
>  The document amounts to an enumeration of the functions of the WG
>> co-chair, minus the authority to make consensus calls and moderate the
>> mailing list.  Could not the co-chair delegate at least the list
>> moderation function to a secretary?  What about issuing and tracking
>> calls for document adoption?
>>
>
> In principle Chairs can delegate whatever they want.
>

Yes, of course.  I just noted that this was absent, and it can be a pretty
major thing to help the co-chairs.


>
>  Does ensuring documents are in the correct state include submitting them
>> to the IESG for publication, or is that a reserved function for the
>> co-chairs?
>>
>
> As far as I remember, a "Delegate", in the datatracker sense, can press
> the submit to IESG button.
>
>
The experience of other WG chairs and ADs might be different, but it seems
to me there might be some functions like this one that really should be
restricted to the co-chairs since they're ultimately the ones responsible
for the document's handoff to the IESG.  Otherwise, at that point, why not
just make the WG secretary into the chair?


>  The document makes reference to several tools or components of tools
>> (the datatracker in particular) that I've never seen.  That's not to say
>> they don't exist, but I haven't seen them and couldn't find them just
>> now, so it makes me wonder if the tools team would have to do a bunch of
>> work to get reality to match what's written here.  For example, I just
>> went into the datatracker and as a working group co-chair I have
>> privileges in that system with respect to my working groups.  However, I
>> didn't see anywhere in there that I can declare a WG Secretary or
>> delegate some or all of my powers to that person, despite the fact that
>> Section 4 says such things "shall" be done.  Is this something that a
>> co-chair would have to request of the Secretariat directly or via a
>> sponsoring Area Director?  If not, does the tools team intend to add that?
>>
>
> I am not sure to understand; which of the mentioned tools you do not know?
> As said by Loa, an e-mail to the Secretariat does the trick.
> Yet, if I remember correctly, once you have a secretary for your WG you
> can delegate powers to that person from the datatracker.
>

Maybe that's what's missing from my experience: The relationship isn't
created by any button I have access to now, but an email to the Secretariat
is needed to establish it.  That's also something Robert Sparks may have
answered in that the current navigation to create a WG secretary is broken
but will be fixed.


> I think that if appointment of WG Secretaries who do most or even some
>> of these functions has become commonplace, then this should officially
>> update RFC2418.  What RFC2418 says now is a four-line section; if that's
>> obsolescent, we shouldn't leave it that way without at least offering a
>> pointer to the more current practice.  More generally, if RFC2418 is
>> obsolescent, I think we should think about updating it in its entirety.
>>
>
> Following discussions on 06 we have decided that this document would not
> update 2418. We have produced 07 in that sense.
>

OK, then I suppose I disagree with that consensus.  You're basically trying
to augment what little is in 2418, and it should be handled that way.


>  The end of Section 3 might overlap or even conflict with
>> draft-leiba-extended-doc-shepherd (currently expired but not
>> forgotten).  Is there a plan to reconcile these, or am I wrong about
>> there being common ground here?
>>
>
> I doubt there is any conflict.
>

That makes it sound like you haven't checked... ;-)


>
>  I was under the impression that Security Considerations has to do with
>> impact on the Internet, not on our processes, and so the content of that
>> section isn't really needed (other than to point out what I just said),
>> but I could be wrong about that.
>>
>
> I think the content of that section is important, even if not relevant to
> Internet, and it does not fit so badly in a section called Security
> Considerations.
>

BCP 72, which makes that section mandatory for protocols, doesn't say
anything about using that section to talk about "security" with respect to
our processes.  I think, given that, the section is misnamed.

-MSK