Re: Idea for a process experiment to reward running code...

John C Klensin <john-ietf@jck.com> Mon, 03 December 2012 12:30 UTC

Return-Path: <john-ietf@jck.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5474121F86D3 for <ietf@ietfa.amsl.com>; Mon, 3 Dec 2012 04:30:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level:
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aULt8gWB7Dc4 for <ietf@ietfa.amsl.com>; Mon, 3 Dec 2012 04:30:03 -0800 (PST)
Received: from bsa2.jck.com (bsa2.jck.com [70.88.254.51]) by ietfa.amsl.com (Postfix) with ESMTP id AB1DF21F8704 for <ietf@ietf.org>; Mon, 3 Dec 2012 04:30:03 -0800 (PST)
Received: from [198.252.137.115] (helo=JcK-HP8200.jck.com) by bsa2.jck.com with esmtp (Exim 4.71 (FreeBSD)) (envelope-from <john-ietf@jck.com>) id 1TfV9s-0000yk-L0; Mon, 03 Dec 2012 07:30:00 -0500
Date: Mon, 03 Dec 2012 07:29:55 -0500
From: John C Klensin <john-ietf@jck.com>
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>, Brian E Carpenter <brian.e.carpenter@gmail.com>
Subject: Re: Idea for a process experiment to reward running code...
Message-ID: <F7593F537812C4E15A63563F@JcK-HP8200.jck.com>
In-Reply-To: <50BC8CF1.8020700@cs.tcd.ie>
References: <50BA64AB.3010106@cs.tcd.ie> <50BC401C.8020101@it.aoyama.ac.jp> <50BC86B7.1010706@gmail.com> <50BC8CF1.8020700@cs.tcd.ie>
X-Mailer: Mulberry/4.0.8 (Win32)
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Cc: IETF-Discussion <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Dec 2012 12:30:04 -0000

--On Monday, December 03, 2012 11:28 +0000 Stephen Farrell
<stephen.farrell@cs.tcd.ie> wrote:

>> Encouraging running code is a Good Thing. Publishing sloppy
>> specifications is a Bad Thing.
> 
> Sure. I guess I'd hope that we push back on sloppy specs as
> usual, but that the running code might make that less likely,
> or at least more likely to be just editorial.

Stephen,

I agree with Brian, but want to reinforce thinking about this a
little differently and in a way that may draw several other
sub-threads together.  The IETF is functioning here as a
standards body, not an certification body for implementability.
Knowing that something can be implemented, and implemented at
production quality, has traditionally been an IETF hallmark (and
hence part of Dave Clark's slogan) relative to other bodies who
have standardized the un-implementable.  IMO, when we approve
something as a Proposed Standard, it suggests that we have
evaluated and approved it along three quite separate dimensions:

	(1) Utility of the idea as something that should be
	implemented (or at least as a decent and reasonable way
	to do something)
	
	(2) Quality of the protocol and whether the
	specification adequately describes it.
	
	(3) Whether the specification can be implemented

Failures are possible on any of the three.  It is possible for a
well-specified and implementable idea to be utterly useless.  It
is possible to have a useful and well-designed protocol, with
implementations by insiders, to be so badly described that it is
unlikely that anyone else could figure out how to implement it.
It is, as Brian pointed out in his recent note, possibly to have
a hack-level implementation and/or one that doesn't work in the
edge cases.

Using any of those three in a way that enables shortcuts around
the other two puts us at risk or creating bad standards.  Even a
few bad standards could be used to hold the IETF up to ridicule
in ways that would weaken everything else that we do for a long
time... and the fact that we saw them as the result of a process
experience would be no protection at all.  Worse from the
standpoint of a speed-up procedure, someone's discovering a
problem after a hasty IESG approval could easily lead to an
appeal on the grounds that the process used did not allow for
adequate review, a result that would cost far more time than the
difference between the current and proposed procedure.

As others have pointed out, there are lots of other ways to
speed things up, most of which fall within the discretion of
individual WGs, ADs, and the IESG without any changes at all.
At least a few of them would involve "changes" back to what RFC
2026 already specifies, including treating Proposed Standards as
Proposed Standards, and eliminating, e.g., days or weeks or
post-IETF-Last-Call AD nitpicking over text in favor of
practicing the intent of the "no known technical defects" rule
of 2026 and letting the RFC Editor do their job.  But "you claim
to have done consideration 3, therefore you get to shortcut
considerations 1 and 2" should not be one of them.

best,
   john