Re: Split the IANA functions?

John Curran <jcurran@istaff.org> Mon, 06 January 2014 20:51 UTC

Return-Path: <jcurran@istaff.org>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 77AAC1AE1CB for <ietf@ietfa.amsl.com>; Mon, 6 Jan 2014 12:51:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.9
X-Spam-Level:
X-Spam-Status: No, score=-3.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, GB_I_LETTER=-2, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BdMfBffazjIi for <ietf@ietfa.amsl.com>; Mon, 6 Jan 2014 12:51:26 -0800 (PST)
Received: from mho-02-ewr.mailhop.org (mho-02-ewr.mailhop.org [204.13.248.72]) by ietfa.amsl.com (Postfix) with ESMTP id 6B25B1AE152 for <ietf@ietf.org>; Mon, 6 Jan 2014 12:51:26 -0800 (PST)
Received: from [38.88.12.58] (helo=[10.1.201.38]) by mho-02-ewr.mailhop.org with esmtpsa (TLSv1:AES128-SHA:128) (Exim 4.72) (envelope-from <jcurran@istaff.org>) id 1W0H8n-000KoK-Q2; Mon, 06 Jan 2014 20:51:17 +0000
X-Mail-Handler: Dyn Standard SMTP by Dyn
X-Originating-IP: 38.88.12.58
X-Report-Abuse-To: abuse@dyndns.com (see http://www.dyndns.com/services/sendlabs/outbound_abuse.html for abuse reporting information)
X-MHO-User: U2FsdGVkX1/2UbFDP1LcTDWfrtJRMBI4
Content-Type: text/plain; charset="iso-8859-1"
Mime-Version: 1.0 (Mac OS X Mail 7.1 \(1827\))
Subject: Re: Split the IANA functions?
From: John Curran <jcurran@istaff.org>
In-Reply-To: <CAMm+LwhN8+z9q4KQXVY9bWA6TAqxx1=Qg0OUfK=VGCSDg5uWEA@mail.gmail.com>
Date: Mon, 06 Jan 2014 15:51:16 -0500
Content-Transfer-Encoding: quoted-printable
Message-Id: <DD618936-0D13-41F1-8D89-2E3171D864B5@istaff.org>
References: <CAMm+LwinAb6+7BoMzwBWyu63vofndxK9VY6DSNN0Ykza4SxuMQ@mail.gmail.com> <52CB0010.5010407@gmail.com> <CAMm+LwhN8+z9q4KQXVY9bWA6TAqxx1=Qg0OUfK=VGCSDg5uWEA@mail.gmail.com>
To: Phillip Hallam-Baker <hallam@gmail.com>
X-Mailer: Apple Mail (2.1827)
Cc: IETF Discussion Mailing List <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Jan 2014 20:51:28 -0000

On Jan 6, 2014, at 2:58 PM, Phillip Hallam-Baker <hallam@gmail.com> wrote:

> I am not suggesting changing the operation of the registry or taking it away from ICANN which is what I would see as 'blowing the bolts'.
> 
> I am suggesting painting a new sign for the protocol side of the functions.
> 
> The closest analogy I have is that in Vermont during hunting season it is very common to find a cow with 'COW' painted on the side in big white letters. The reason for this is that there is a particular type of 'hunter' who comes up from the city once a year with his mates, a large quantity of beer and an injudicious quantity of firearms and ammunition. They are liable shoot anything that moves. Labeling the livestock is the best way to mitigate the losses.
> ...

It is admirable goal, i.e. setup things so that the IETF is truly doing just technical coordination, 
and thus does not attract any government/policy attention... However, it does sort of presume 
that the "protocol development side" stays away from such public policy matters, does it not?

Alas, the success of the Internet actually preempts any reasonable chance of creating competing 
protocols and approaches that will achieve similar success - basic network economies make 
interoperability with (and therefore adoption of) IETF-specified protocols a near absolute 
requirement for successful global deployment.  For example, if the IETF decides that certain 
protocol should be encrypted by default, then governments have to live with that outcome;
 i.e. arguing that there is any meaningful workaround is specious.

What happens when the IETF makes a decision that particular "public policy" requirements 
are _to be considered_ (perpass), or specifically _not to be considered_ (RFC 2804) in protocol
development?   Such is the equivalent of exercising a "control point" (your term) on the Internet, 
and one that's entirely with respect to protocol development matters (not names or numbers).  
The fact that there is not an "enforcement mechanism" doesn't preclude the control point aspects; 
i.e. if there's an IETF consensus (quite appropriately) that pervasive surveillance activities are
"a technical attack that should be mitigated in the design of IETF protocols", then governments
are impacted by that public policy decision of the IETF. 

> The vulnerability is to folk whose knowledge of the IETF and IANA is equivalent to the weekend hunter types. It is important to take the issue off the table.

See above.  The IETF would also need to truly be neutral (and not imbed publicl policy values
into protocol requirements) in order to take the issue off the table.  Trying to separate the IANA 
tasks with the theoretical goal of technical purity thus would mean not advancing some fairly
important social values, and these already put the IETF into the cross-hairs due to the control
aspects.

/John

Disclaimer: My views alone.