Re: [OAUTH-WG] Diversity and Inclusiveness in the IETF

Hannes Tschofenig <Hannes.Tschofenig@arm.com> Tue, 23 February 2021 12:47 UTC

Return-Path: <Hannes.Tschofenig@arm.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E7D9F3A2AF6; Tue, 23 Feb 2021 04:47:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.1
X-Spam-Level: *
X-Spam-Status: No, score=1.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RAND_MKTG_HEADER=2.999, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=dxpYb2oe; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=dxpYb2oe
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dK2-K5fzjGea; Tue, 23 Feb 2021 04:47:01 -0800 (PST)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com (mail-eopbgr00055.outbound.protection.outlook.com [40.107.0.55]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 995C73A2ACC; Tue, 23 Feb 2021 04:47:00 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=sQFczHC5ibas5kgEXhbUMc+UeDDeyLuE4wFEVbYXtm4=; b=dxpYb2oeJzkyOa0LiTlJp+RmHsHFUQ1dzc3ot17XOrkzv1TfHlW0RCMx6M0519f4Uyzy6hjIIs2n1Bhr4wvoMRntwzQ70LprVzS2/MMReIX1Yr4cB85n/Y9y7EqqtJNHzMkJw9tydbVoCb2usj4Cnl1xoQS+8B7OcE3YKzqPGRo=
Received: from DB8PR04CA0023.eurprd04.prod.outlook.com (2603:10a6:10:110::33) by HE1PR0802MB2219.eurprd08.prod.outlook.com (2603:10a6:3:c3::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3868.29; Tue, 23 Feb 2021 12:46:55 +0000
Received: from DB5EUR03FT052.eop-EUR03.prod.protection.outlook.com (2603:10a6:10:110:cafe::ef) by DB8PR04CA0023.outlook.office365.com (2603:10a6:10:110::33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3868.27 via Frontend Transport; Tue, 23 Feb 2021 12:46:55 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; ietf.org; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;ietf.org; dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DB5EUR03FT052.mail.protection.outlook.com (10.152.21.82) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3868.27 via Frontend Transport; Tue, 23 Feb 2021 12:46:55 +0000
Received: ("Tessian outbound fb307b4548b2:v71"); Tue, 23 Feb 2021 12:46:55 +0000
X-CR-MTA-TID: 64aa7808
Received: from 4d6303114c64.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 6F555F1C-EBA3-4772-9260-47173B0DB090.1; Tue, 23 Feb 2021 12:46:50 +0000
Received: from EUR04-HE1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 4d6303114c64.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Tue, 23 Feb 2021 12:46:50 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=e1UYdU9qLImeVU5D4nWM+jO5lUk74NmYwDxTOcY3Vl8hfcuXqiiZnkKagYZFiE+TJEQ6oQs+S74oVSKVJ3JNksWLI860QESEAhMt4bnfy/IMlftNQ7uR2XaQzIp9pOu+EnCF1lbfzjucaRCtlnjbpAbhY0CTNZiwB2dJSUjx7o9RHX+gPjXAa/j9L7JGqLnCUk//h9eL95UBQ+P9XXQzafQzl+DkuoSF42cJ31Gd2z/XibjxqYl+rx5RC1BEx9s+J6LswPB/upWpK5c1P/EODZ7ktAVHbeHtxMS4u+LHqsz+/PA0UG45ODBXqcL8DGWIIFTc8piOL91l2MOIUSqWAA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=sQFczHC5ibas5kgEXhbUMc+UeDDeyLuE4wFEVbYXtm4=; b=Rag0cZN0zfgHmeqzNI0wixx3ZHVcubyhZpBpnYzL13NnEBw/trk/GUc/Iske1WPJukiRBPZU+HuSE6VBNa6p4RkXg0QAKhjmAC0wMWTkOdvFuKauqyDTiXfIdZbmKXO2dPkLINeplnD8XM/oI8X1jk/WCHWtnsZANEd2MAehxTic2HUxFAPf85LrnsxqO/bQaTYUjYfHXTt+uJ5Cw2V9v7WdHF/Ll7I/WKX8pTX39nHEgptugNArv3pf4oBlmzW9luIpNq4zMwSPSvYplULnjHYzD5OqghXXkpRBjBGcRX+WMbSe1OF/AtgqDKrdMrs9Zjm9/BE3lvrF2nWuszDcIg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=sQFczHC5ibas5kgEXhbUMc+UeDDeyLuE4wFEVbYXtm4=; b=dxpYb2oeJzkyOa0LiTlJp+RmHsHFUQ1dzc3ot17XOrkzv1TfHlW0RCMx6M0519f4Uyzy6hjIIs2n1Bhr4wvoMRntwzQ70LprVzS2/MMReIX1Yr4cB85n/Y9y7EqqtJNHzMkJw9tydbVoCb2usj4Cnl1xoQS+8B7OcE3YKzqPGRo=
Received: from AM0PR08MB3716.eurprd08.prod.outlook.com (2603:10a6:208:106::13) by AM0PR08MB3907.eurprd08.prod.outlook.com (2603:10a6:208:109::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3868.29; Tue, 23 Feb 2021 12:46:48 +0000
Received: from AM0PR08MB3716.eurprd08.prod.outlook.com ([fe80::7484:8c2b:e664:648]) by AM0PR08MB3716.eurprd08.prod.outlook.com ([fe80::7484:8c2b:e664:648%7]) with mapi id 15.20.3868.033; Tue, 23 Feb 2021 12:46:48 +0000
From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
To: Bron Gondwana <brong@fastmailteam.com>, "ietf@ietf.org" <ietf@ietf.org>
CC: "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: Diversity and Inclusiveness in the IETF
Thread-Index: AQHXCXgbtlRdrPa6OEShU5hVFqdRTqplIz0AgABqRRCAABPPgIAABh3g
Date: Tue, 23 Feb 2021 12:46:48 +0000
Message-ID: <AM0PR08MB371608D64FF113417D8B3C2DFA809@AM0PR08MB3716.eurprd08.prod.outlook.com>
References: <37eecb9b-f0eb-e21c-b162-b1f0339e4981@si6networks.com> <3c2d646d-f18d-4d88-b458-29dbd486432b@beta.fastmail.com> <AM0PR08MB371669108E9CEA561BEC9EF6FA809@AM0PR08MB3716.eurprd08.prod.outlook.com> <d6648437-332b-4668-a1c7-591f2c287539@dogfood.fastmail.com>
In-Reply-To: <d6648437-332b-4668-a1c7-591f2c287539@dogfood.fastmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: 53FC5C4466259A4FB510A3E2BEEF471F.0
x-checkrecipientchecked: true
Authentication-Results-Original: fastmailteam.com; dkim=none (message not signed) header.d=none;fastmailteam.com; dmarc=none action=none header.from=arm.com;
x-originating-ip: [80.92.115.86]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: 55b8c082-efb1-4aa6-0273-08d8d7f91a0e
x-ms-traffictypediagnostic: AM0PR08MB3907:|HE1PR0802MB2219:
X-Microsoft-Antispam-PRVS: <HE1PR0802MB2219BE3EDA7FC18668C4CD40FA809@HE1PR0802MB2219.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
x-ms-oob-tlc-oobclassifiers: OLM:820;OLM:820;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: pCho264FVF3De02FeLeeWJ5bcxHPioTlJWHTG7AkXAJfuNqcwk3G4OB+rb9tjKiFduNyubJuEVlRphell9VMuYRFYtngHPT9rPOpp7bwKRXLwhbN3LqUcbjUhRUtFSwGCRFW7ENrFtPEsNJAzcBLAO+qQfN0Qf9rxTWiWsDutRLfkr2OfLB/WK8NXZa9YKTmKRVQThl+yYbiB0N+XeILc78/gE62m6PK6MIVR2h722THgPVW671ASlc4bsQkUPen+0GIA4iLvsH42s1moqWZwpLytHrK7e3Jy6RW3dqop0gNfIYkpqi0MVqqNjijkHWJFFxeBlwl8ifNYH9m3+vrJSdPvxX434PO6jxg3IUQUiwyxf59JdS9Ge4f8Nkc2GTplqmLC87xJJJAzgTbr0y4arZJMUje0+55PFtdbhI9kJvLXG9NjE0bZUnO7DbtYDcpGKMcmERf0Th1wM3Yms4WUxJO+2VweuIN+6N9ldxSGKArxrksfKHvBZE2WAKb8VO068OEFXIxDF9UzfMaK9aJ9a//2Z/zTLIHXTLJ7AIacaxN6n01veIL3X+H/TlKHCbiGvVObEIYBtadWhKo4Ms9x+7oLmnicyHjmifKuOWjZAE=
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM0PR08MB3716.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(346002)(376002)(136003)(39860400002)(366004)(396003)(66946007)(966005)(76116006)(71200400001)(86362001)(66476007)(478600001)(9326002)(8936002)(66556008)(66446008)(33656002)(64756008)(55016002)(52536014)(26005)(2906002)(66574015)(316002)(9686003)(110136005)(186003)(83380400001)(4326008)(6506007)(166002)(5660300002)(8676002)(53546011)(7696005); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: GbHz5nVHqL7TW+ETuJ6s2t6GDfMd2BOBJV2+ekCIagt/PDZzP+oGmzdOmnW9JV4uFkbmVjl1fC1i8qzIRXfkpjayGnaeurkz826N/p0YhoFkC1yCAzqxj3fyPwod1pof7/NfcTsqe6cefXarPTQZgf1tXP+Vp6EbII2iPFoZJpMxoRv62+RYvukS0YyCCsslNV3mg2Ysm+HbxKB8sVRpnSvthQYzDgyvWmDwhAqP52CioLiTE/TXRU5hMD5Pngs4ZDWqjOMIYIcaestcC0rKuuj1JDOKBwF255NJ9SD0C3iMx1LdIiiBQ+BAmiNh3cKATsTYc5L6WENYv54Kd7XI6R7CJVcKyNLEJnegr/0aAyU6k484s3Uxj3odTLBmAXPIX4rNQqVhbMNLtpkKWGC0CDLXQE514F3K0BZ9PhbeQjXi2TiIUeNpPCaPztEsIEfT8WN+quqO9v/7UnwhC3h+ImFy9b7RflfVBDpKXh51cdJxgPP4xc3v9wWs/zlIfStxB7nc9BxgD92foD7sZLMGmO+V/Y261LCI6l7kWlwMkNaDQ9aLA1JGAkV+pqqNmFGpqEDuDzIqt3X4GC+aQZ38+vC+sq9B/1ome86N7YD2ZZsQQzWOkC+CLhynnj5RjPunXoFneb+B9LyMsu32LI3M0MLQp82WUwra7ezvVi3E8wzcOADJStKbEeWNoDtuKQq6PViF5f8jyv3q93N0VTxTvDvlmdqzJFW8+fg8ezn2rKEU4pdPaPMAs8lcN4d8fUP6oru3xPFObhbzOPUZcckeeyBcyUbkPTl4SBALbIucMpPNr6i+k2F29+RBCqLQuWkJMLlqPhSRPBOT70SGQOlWHd77ajfwDeVEza0vKLJLz8xPU07IKSe2zxQ5ZKbLPnymXM/szvlYbs5rE0SB/JNYq0bZmbY7hnvK2Ejlbpq5kBdh4zXtwoSwyQe4NZ4uStMJb73LyqqYohOwJbu5BFk7x/XyVM6s3rmD1BpHz9bstvFSfEZroyUcM8AbWMKynir9O2woTA/P6NQU3w+v39ouiNUk/c2S9MOQoYzwhg02hcWfgqA9r25IUM2mkgb+ckXA6jnQf766f8+XCzJb7DdFSDZG/1/7gD/Lbrim5W2ZNYTiBHG0GkehDHtklnEjugJA2Pp0DJCTBXupARZoDn2pJ9T7RR0ERkerNgEre8JDM2tR9HaGX2yaLLN6t6Csj4p9ppWhT7LQ3G0KF556c/8xUtHlmbItWTDzdcwRfMLYJQ//Cyf/x/TPEERjS8m8H9VeVaPBL+yOzaEuSd84lbQz5NRrLLt9wmPdAjUqVEWn8HvLpuRrrfoJb74A1FmkOf+G
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_AM0PR08MB371608D64FF113417D8B3C2DFA809AM0PR08MB3716eurp_"
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB3907
Original-Authentication-Results: fastmailteam.com; dkim=none (message not signed) header.d=none;fastmailteam.com; dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: DB5EUR03FT052.eop-EUR03.prod.protection.outlook.com
X-MS-Office365-Filtering-Correlation-Id-Prvs: 7207b351-44a5-4bb4-ce8e-08d8d7f915b9
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: YNzFfE9lD17pQYudRZQosDX5ybDpBfTXwDV/Hw3zwAkjgIsDgCWI8ZywMfkkUO9epm6BREXU0cDdlwlNm0b6vQejgun4N5nwYe5hxBtKJhECBSLyGxvcLyO05I0u7sEdnDw74FQibR5XE2wTK43ORD9jxf4e15/fu4PdEjigkfzdOHiYkN66XkZ3KWr7bCcUYx9rGxdv4JVyJBJ9ockpVJO+z1MHGBLWeN+y0CB+iNIgo1FutsadA4S+rO+Bfj3IcB/hab8JfiZVuoAMyu+Hgv6WvVb7IF0OvWTDFb615aoCCAoXDSMmw21c9at6eHMrIWfnK5oYqreW5Ivbsiu9NSwoQDzedIgPtNZ4GPHPE0dSy4az1qUWIL1V1Y1XWUCvM0uoFTyraGkYBewazlWZxoaksZiiAIuNCTFvVpems0qsoka6Nxz77fjT+y1Ydosu4YPGjeOaVEbFEX64Bf05IH8HXvlnNE1Zhs0UQz29W0b7acxlCIzBK4xPBmRXa7H3tPs+iVSYsdYoPOfeF/2FRk+E+fdLfXqNjh8O2iTcYIZmlP4iVhL3wBDOqagh0duW3MEFqpvJf+QleB8iFOc/nBHqT16oBz8rvUm7JmW6goO609Z2k7V36HsEEb2g4DTrH1T2RDt/jjaYq/ZNJCQp88OprzC3ePOwnb9vEMEcbViHItHr/6WarGK8NxJyrLBMUcPJJsSWBmf4JSTFxb9bW5vYJzTZ6QveGngHk302zz8=
X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(4636009)(39860400002)(376002)(136003)(346002)(396003)(36840700001)(46966006)(82740400003)(82310400003)(83380400001)(86362001)(81166007)(166002)(356005)(110136005)(336012)(186003)(6506007)(33964004)(53546011)(66574015)(316002)(9686003)(36860700001)(55016002)(26005)(4326008)(7696005)(70206006)(450100002)(70586007)(5660300002)(8676002)(9326002)(8936002)(966005)(52536014)(30864003)(478600001)(33656002)(47076005)(2906002); DIR:OUT; SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 23 Feb 2021 12:46:55.6779 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 55b8c082-efb1-4aa6-0273-08d8d7f91a0e
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource: DB5EUR03FT052.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0802MB2219
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/1VkGV_PQX92AML0J_DMNodW2MgU>
Subject: Re: [OAUTH-WG] Diversity and Inclusiveness in the IETF
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Feb 2021 12:47:11 -0000

Hi Bron,

Let me also tell you a personal story. I was in the army in Austria and a commander of a small group. Everyone on the base knew about a pub in the city that was extremely dangerous and, according to stories, you would most likely get stabbed there. I was wondering about that place and went there. Guess what: I was there alone with the waitress. Everyone was too afraid to go there.

Maybe there is a lesson here. Just give it a try*.

Getting back to the OAuth group: Groups typically go through cycles. At the beginning when participants do not know each other the discussions are often rough. When there is not much content (typically during a requirements gathering phase) everyone has an opinion to share. As time goes on, the situation improves and everyone gets to know each other better, hangs around after the official WG meetings and meets at non-IETF events. That’s where it gets more civilized. We went through those stages as well.

Groups that work on exciting technologies also attract “rock stars” (as I call them). We had those in the OAuth group as well. It caused a lot of stress for the entire group but also for us chairs. When you have several people who do not accept a proposal different than their own then it gets tricky. Unfortunately, chairs don’t have much to say in the IETF either.

I believe it helped us to get together in workshops (we organized a series of OAuth workshops), met at industry events (the Internet Identity Workshop, etc.) and scheduled regular “virtual office hours”. Of course, we still have disagreements and it would be a lie to say that all our meetings have been productive. Productivity has, however, been increased. The meetings were certainly passionate. On the other hand, I have been in working group meetings where there was no passion, no discussion and no productivity. Not great either.

I don’t know whether it is already too late for your document (which is dated 2016) to consider the use of OAuth but Rifaat and I are happy to put you on the spot in one of our future virtual office hours or virtual interim meetings.

Ciao
Hannes

PS: This is not a general life advice. There are many things you better skip...

From: Bron Gondwana <brong@fastmailteam.com>
Sent: Tuesday, February 23, 2021 12:51 PM
To: Hannes Tschofenig <Hannes.Tschofenig@arm.com>; ietf@ietf.org
Cc: oauth@ietf.org
Subject: Re: Diversity and Inclusiveness in the IETF

Without wishing to litigate the entire issue here (happy to remove the wider IETF list and just talk on the OAuth group), we never brought any work to the OAuth group because everybody who we spoke to warned us that nothing would get done.

There's a term "missing stair" https://en.wikipedia.org/wiki/Missing_stair which describes this phenomenon, where "everybody knows" something, but new participants are forced to discover it through either having someone tell them quietly, or just notice it for themselves.

...

Just as an anecdote, the last time I bothered to attend an OAuth meeting in person I had this to say about it on our internal slack channel when asked:"they can't agree about what they don't agree on".

The topic that had taken basically the entire meeting and had been totally unproductive - was a particular key in a JSON Web Token going to clash with a reserved word in either javascript itself or one of the other environments in which this token had to be evaluated.  There were people saying "this won't work, just rename the key" and others saying "I like this name and insist upon us keeping it".  No progress was made that day.

In fact, here's the extract of my report on the OAuth meeting at IETF102 (a detailed long email with pictures of poutine, icecream, and a report on every session I attended).  Names extracted to protect the others involved, but other text left exactly as it was, complete with typoes:

Thursday 19th: (Aug 2018)

9:30am OAUTH<https://datatracker.ietf.org/meeting/102/materials/agenda-102-oauth-03>:  Fecking OAUTH as they say.  I came out of this saying "they can't even agree about what they don't agree on".  <Name redacted> says it was even worse in the past.  What a fustercluck.  Don't expect anything workwhile out of this group unfortunately.  <Other name redacted> and I were just looking at each other like WTF the entire time.

Maybe it's become heaps better since then.  But I wouldn't want to have been a new participant trying to get anything done in that session.

...

The authentication flow as originally put into JMAP (before it came to the IETF) can be seen in the initial draft here if you're interested:

https://www.ietf.org/archive/id/draft-jenkins-jmap-00.txt

But we decided in the interests of expediency to just drop it rather than trying to progress that work anywhere at the IETF.

Regards,

Bron.

On Tue, Feb 23, 2021, at 22:00, Hannes Tschofenig wrote:

Hi Bron,



I have to respond to your statements about the OAuth working group below.



While we do not pay attention to keeping the charter page up-to-date, we have been able to advance our documents, produce many implementations, and got those deployed all over the Internet.



The bar for acceptance of new work varies among working group in the IETF. Some working groups develop technology that got widely deployed and hence randomly changing specs isn’t such a great idea because you have to consider the deployment situation as well. This is a situation many IETF working groups face. Reaching (widespread) deployment is great on one hand and a pain on the other.



There are other groups, which are early in their lifecycle. In those groups you do not need to worry about deployments, backwards compatibility or even any source code.



In general, Rifaat and I are always open for anyone in the IETF (and outside) to reach out to us, if they want to bring new work forward to the group. Sometimes proposed work fits into the group and sometimes it does not. The work on JOSE, for example, was put into a separate working group even though it was initially developed for use with JSON Web Tokens.



I don’t recall having chatted with you or with someone from the JMAP community on the use of OAuth. Sorry if my memory does not serve me well today.  Typically, applications just use OAuth and therefore there is no need to reach out to the OAuth working group.



Ciao

Hannes


From: ietf <ietf-bounces@ietf.org<mailto:ietf-bounces@ietf.org>> On Behalf Of Bron Gondwana
Sent: Tuesday, February 23, 2021 5:20 AM
To: ietf@ietf.org<mailto:ietf@ietf.org>
Subject: Re: Diversity and Inclusiveness in the IETF



Thanks Fernando,



I would add to this document something about inertia, backwards compatibility and existing dysfunction.



Many ideas are shut down because they aren't in the right place, or don't fit comfortably into the existing corpus of IETF documents.



When we brought JMAP to the IETF it was after a long process of socialisation, and still there was significant work in the first couple of meetings just to convince people that "this is worth doing, the existing work the IETF has done in this neighborhood is not sufficient".



JMAP also had an authentication scheme in it originally.  It was a good authentication scheme, but applications don't do authentication schemes, that's the bailiwick of OAUTH, where ideas go to die (in my experience, that working group has been dysfunctional for my entire time at IETF - exhibit 'A' being the "Milestones" section of the about page, which lists 6 items all due in 2017)



So we just removed all mention of authentication method and handwaved "the connection will be authenticated", because we wanted to publish something during the decade with years starting '201'.



... all that to say.  One of the biggest barriers to entry in the IETF is stumbling across an area in which no work is able to progress due to entrenched issues within that area.



And I'm not arguing for "no barriers to entry", because there needs to be a sanity check that we're actually producing high quality specifications, and that our specifications are compatible with each other so the entirety of the IETF's work product is a coherent whole.  But it's hard to get started if you don't already have the connections to have your work sponsored by somebody who already knows their way around the IETF's idiosyncrasies.  I'm doing some of that sponsoring myself now for the people from tc39 who are trying to get the IETF to look at defining an extended datetime format.



Cheers,



Bron.



On Tue, Feb 23, 2021, at 11:07, Fernando Gont wrote:

Folks,



We have submitted a new I-D, entitled "Diversity and Inclusiveness in

the IETF".



The I-D is available at:

https://www.ietf.org/archive/id/draft-gont-diversity-analysis-00.txt



We expect that our document be discussed in the gendispatch wg

(https://datatracker.ietf.org/wg/gendispatch/about/). But given the

breadth of the topic and possible views, we'll be glad to discuss it

where necessary/applicable/desired.



As explicitly noted in our I-D, we're probably only scratching the

surface here -- but we believe that our document is probably a good

start to discuss many aspects of diversity that deserve discussion.



Thanks!



Regards,

--

Fernando Gont

SI6 Networks

e-mail: fgont@si6networks.com<mailto:fgont@si6networks.com>

PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492













--

  Bron Gondwana, CEO, Fastmail Pty Ltd

  brong@fastmailteam.com<mailto:brong@fastmailteam.com>




IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.

--
  Bron Gondwana, CEO, Fastmail Pty Ltd
  brong@fastmailteam.com<mailto:brong@fastmailteam.com>


IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.