Re: The IETF, Standards process, and the impact on the RFC series document production

Nico Williams <nico@cryptonector.com> Fri, 04 October 2019 20:22 UTC

Return-Path: <nico@cryptonector.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E7194120090 for <ietf@ietfa.amsl.com>; Fri, 4 Oct 2019 13:22:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cryptonector.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rMRZDshOK0Xc for <ietf@ietfa.amsl.com>; Fri, 4 Oct 2019 13:22:03 -0700 (PDT)
Received: from bisque.elm.relay.mailchannels.net (bisque.elm.relay.mailchannels.net [23.83.212.18]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D085312004A for <ietf@ietf.org>; Fri, 4 Oct 2019 13:22:02 -0700 (PDT)
X-Sender-Id: dreamhost|x-authsender|nico@cryptonector.com
Received: from relay.mailchannels.net (localhost [127.0.0.1]) by relay.mailchannels.net (Postfix) with ESMTP id D95B25A0961; Fri, 4 Oct 2019 20:22:01 +0000 (UTC)
Received: from pdx1-sub0-mail-a65.g.dreamhost.com (100-96-6-126.trex.outbound.svc.cluster.local [100.96.6.126]) (Authenticated sender: dreamhost) by relay.mailchannels.net (Postfix) with ESMTPA id 042615A0704; Fri, 4 Oct 2019 20:22:01 +0000 (UTC)
X-Sender-Id: dreamhost|x-authsender|nico@cryptonector.com
Received: from pdx1-sub0-mail-a65.g.dreamhost.com ([TEMPUNAVAIL]. [64.90.62.162]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384) by 0.0.0.0:2500 (trex/5.18.3); Fri, 04 Oct 2019 20:22:01 +0000
X-MC-Relay: Neutral
X-MailChannels-SenderId: dreamhost|x-authsender|nico@cryptonector.com
X-MailChannels-Auth-Id: dreamhost
X-Snatch-Spill: 703f9e6b0f871e22_1570220521432_993173465
X-MC-Loop-Signature: 1570220521432:2055562705
X-MC-Ingress-Time: 1570220521431
Received: from pdx1-sub0-mail-a65.g.dreamhost.com (localhost [127.0.0.1]) by pdx1-sub0-mail-a65.g.dreamhost.com (Postfix) with ESMTP id 9A3197FADF; Fri, 4 Oct 2019 13:21:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=cryptonector.com; h=date :from:to:cc:subject:message-id:references:mime-version :content-type:in-reply-to; s=cryptonector.com; bh=ul9rI0LssnLff9 GO5wNsQ2YlS5w=; b=I5MdY9vUG2plNWh67mgbtWN8+NB+j2L11Ay7I7ekwP8h7n Z5Hb+Tr4b+JuEeW2X3WUlGKe6J7YSFvzIVf4pbY6WpG8Gg2HWGY0J7wZkI0hRuam WAVRnRKrM85fPqZBtiH4wx5RsJQu5v/vtPQWq4oDuA/WouYyWXxB6Yr7KDATM=
Received: from localhost (unknown [24.28.108.183]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) (Authenticated sender: nico@cryptonector.com) by pdx1-sub0-mail-a65.g.dreamhost.com (Postfix) with ESMTPSA id A8E807F710; Fri, 4 Oct 2019 13:21:53 -0700 (PDT)
Date: Fri, 04 Oct 2019 15:21:51 -0500
X-DH-BACKEND: pdx1-sub0-mail-a65
From: Nico Williams <nico@cryptonector.com>
To: John C Klensin <john-ietf@jck.com>
Cc: Michael StJohns <mstjohns@comcast.net>, ietf@ietf.org
Subject: Re: The IETF, Standards process, and the impact on the RFC series document production
Message-ID: <20191004202150.GJ5002@localhost>
References: <394203C8F4EF044AA616736F@PSB> <4097464f-d038-2439-5ca5-70bac46b25ea@huitema.net> <69DAA6BBBE243BAD98926154@PSB> <371c3b14-8bfc-a476-3ff9-7268485bad12@huitema.net> <87a3e050-6e94-fcb0-70b8-cb907a029a0f@comcast.net> <20191004164815.GG5002@localhost> <CD23F5236075A5EB09DBF350@PSB> <20191004174220.GH5002@localhost> <0DA8661C532CEDFA2D117C50@PSB>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <0DA8661C532CEDFA2D117C50@PSB>
User-Agent: Mutt/1.9.4 (2018-02-28)
X-VR-OUT-STATUS: OK
X-VR-OUT-SCORE: -100
X-VR-OUT-SPAMCAUSE: gggruggvucftvghtrhhoucdtuddrgedufedrhedugddugeefucetufdoteggodetrfdotffvucfrrhhofhhilhgvmecuggftfghnshhusghstghrihgsvgdpffftgfetoffjqffuvfenuceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmnecujfgurhepfffhvffukfhfgggtuggjfgesthdtredttdervdenucfhrhhomheppfhitghoucghihhllhhirghmshcuoehnihgtohestghrhihpthhonhgvtghtohhrrdgtohhmqeenucfkphepvdegrddvkedruddtkedrudekfeenucfrrghrrghmpehmohguvgepshhmthhppdhhvghloheplhhotggrlhhhohhsthdpihhnvghtpedvgedrvdekrddutdekrddukeefpdhrvghtuhhrnhdqphgrthhhpefpihgtohcuhghilhhlihgrmhhsuceonhhitghosegtrhihphhtohhnvggtthhorhdrtghomheqpdhmrghilhhfrhhomhepnhhitghosegtrhihphhtohhnvggtthhorhdrtghomhdpnhhrtghpthhtohepnhhitghosegtrhihphhtohhnvggtthhorhdrtghomhenucevlhhushhtvghrufhiiigvpedt
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/ptCArgK2uBohdlgPBLed2kXZIgI>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Oct 2019 20:22:05 -0000

On Fri, Oct 04, 2019 at 03:48:37PM -0400, John C Klensin wrote:
> --On Friday, October 4, 2019 12:42 -0500 Nico Williams
> <nico@cryptonector.com> wrote:
> 
> > On Fri, Oct 04, 2019 at 01:07:57PM -0400, John C Klensin wrote:
> >> --On Friday, October 4, 2019 11:48 -0500 Nico Williams
> >> <nico@cryptonector.com> wrote:
> >> > We could design such a naming scheme and bolt it onto the
> >> > existing RFCs, much like STDs have distinct (and stable)
> >> > numbers from the RFCs that back them.
> >> > 
> >> > E.g., we could have names like:
> >> > 
> >> >   STD-DNS-xx
> >> >   RFC-DNS-xx-vv
> >> > 
> >> >   STD-PKIX-xxx
> >> >   RFC-PKIX-xxx-vv
> >> > ...
> >> 
> >> I won't try to spend the time today to explain why that would
> >> cause a different set of problems other than to note that we
> > 
> > Maybe you can try tomorrow then?  I don't see any obvious
> > problems.
> 
> Mike's examples of the ITU-T and IEEE 802.x problems should be
> suff9icent to put your naming proposal to rest, but let me add
> two examples of the sort of question I was thinking about.   

And yet they weren't.

> (1) RFCs 5890-5894 and maybe 5895 and others are collectively
> known as "IDNA2008".  Do they become RFC-IDNA-nn or, given what
> they do, RFC-DNS-nn?  [...]

Yes, possibly.  I.e., both, if that's deemed to be useful.

>               [...]?  And are other documents that specify
> special characteristics or syntax for DNS labels become part of
> RFC-DNS-nnn or are they separate?  Similarly, are DNSSEC and the
> various encrypted DNS query specs and proposals properly
> RFC-DNS-nn or do they get their own subseries?

Ditto.

> (2) There are interesting dependencies among PRECIS work, IDNA,
> specifications for language negotiation, language tag and media
> type specifications, and the several interdependent
> specifications for non-ASCII email addresses.  If each
> specification get a single number --regardless of which
> sub-series it is associated with -- then the system breaks down
> with regard to the other groups.  In particular, are the latter
> group part of email or part of some more or less generic I18n
> category?

Same answer.  You could have one RFC in zero, one, or more series as
appropriate.

I'd expect an RFC that specifies a new DNS RR type for, say, TLS, to be
in at least a series related to TLS.  I could find the misc RR type in
an IANA registry (since I know to look there), and such an RFC might not
be said to modify core DNS in any way, but it might still be useful for
it to *also* appear in the DNS series.

> I think any way you would go with this would either require
> drastic changes in how we do standards or would turn out to
> create as much confusion as it solved.

One could begin curating "series" like this right now without any change
to anything, though without any authority or process to maintain it it
wouldn't be so valuable.  What process is needed to establish and
maintain such series?

For maintenance, sometime in between WG adoption and AUTH48, the
authors, WG, IESG, or IETF, would get to pick zero, one, or more series
to contain the new RFC.

For establishment we might task WGs with proposing appropriate series.
Or the RFC-Editor might have this as a responsibility.

Since we're discussing the RFC-Editor SOW, and since organizing the
series might be the sort of task that might fall in the RFC-Editor's
purview, I think this is on-topic.

Nico
--