Re: [Rfced-future] [rfc-i] RSWG & AUTH48 (was Re: [admin-discuss] Public archival of AUTH48 communications)

Toerless Eckert <tte@cs.fau.de> Thu, 03 March 2022 06:44 UTC

Return-Path: <eckert@i4.informatik.uni-erlangen.de>
X-Original-To: rfced-future@ietfa.amsl.com
Delivered-To: rfced-future@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E41013A13AA for <rfced-future@ietfa.amsl.com>; Wed, 2 Mar 2022 22:44:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.649
X-Spam-Level:
X-Spam-Status: No, score=-1.649 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.248, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, T_SPF_TEMPERROR=0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JFRO6QngDUef for <rfced-future@ietfa.amsl.com>; Wed, 2 Mar 2022 22:44:25 -0800 (PST)
Received: from faui40.informatik.uni-erlangen.de (faui40.informatik.uni-erlangen.de [131.188.34.40]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B089D3A11CD for <rfced-future@iab.org>; Wed, 2 Mar 2022 22:44:25 -0800 (PST)
Received: from faui48e.informatik.uni-erlangen.de (faui48e.informatik.uni-erlangen.de [IPv6:2001:638:a000:4134::ffff:51]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by faui40.informatik.uni-erlangen.de (Postfix) with ESMTPS id 01BB4549AF2; Thu, 3 Mar 2022 07:44:19 +0100 (CET)
Received: by faui48e.informatik.uni-erlangen.de (Postfix, from userid 10463) id E7DFE4EA7EE; Thu, 3 Mar 2022 07:44:19 +0100 (CET)
Date: Thu, 03 Mar 2022 07:44:19 +0100
From: Toerless Eckert <tte@cs.fau.de>
To: Carsten Bormann <cabo@tzi.org>
Cc: Christian Huitema <huitema@huitema.net>, rfced-future@iab.org, RFC Interest <rfc-interest@rfc-editor.org>, "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <YiBjw7P7CW5Lf2oH@faui48e.informatik.uni-erlangen.de>
References: <8129A65C40CD88E0B5C94AA8@PSB> <7BC3F808-434B-48CF-B96B-0CF7D8B9F3A7@tzi.org> <EEF0F457622EDF74E090BC66@PSB> <BEB26FE0-CC24-4EC2-B7E5-6556A2425A24@eggert.org> <11721.1646248947@localhost> <af3a9d13-7ec2-4e48-355a-a3870af06361@joelhalpern.com> <a52626d5-13aa-ab1a-cb13-282bd9bcf812@gmail.com> <269b5f09-4840-b038-085c-839e0a1c3c6b@huitema.net> <YiBc6Mjj2++jxE0h@faui48e.informatik.uni-erlangen.de> <D5AC5684-506B-4214-9678-75B5C1FCBED2@tzi.org>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <D5AC5684-506B-4214-9678-75B5C1FCBED2@tzi.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/rfced-future/1OYcnln0HAXk-0QmSDLenHaGWgs>
Subject: Re: [Rfced-future] [rfc-i] RSWG & AUTH48 (was Re: [admin-discuss] Public archival of AUTH48 communications)
X-BeenThere: rfced-future@iab.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: RFC Editor Future Development Program <rfced-future.iab.org>
List-Unsubscribe: <https://www.iab.org/mailman/options/rfced-future>, <mailto:rfced-future-request@iab.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rfced-future/>
List-Post: <mailto:rfced-future@iab.org>
List-Help: <mailto:rfced-future-request@iab.org?subject=help>
List-Subscribe: <https://www.iab.org/mailman/listinfo/rfced-future>, <mailto:rfced-future-request@iab.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Mar 2022 06:44:32 -0000

Thanks, Carsten

What you describe would be a much bigger problem than what i imagined.
Like "we don't catch issues in WG, we don't catch issues in AD/IETF/IESG
review... they end up in AUTH48".

But then it sounds like you'd suggest that it's not only public
visibility but also public input that may be encouraged in the AUTH48
process in your view ? Even when not solicited from current AUTH48
actors. ?? Or a hard ask for authors to be responsible to quicker
escalate anything they can't or shouldn't attempt to do with just
authors/rfc-editors to the WG or other entities.

Let me rephrase: How would you describe the responsibitiles and
accountabilities to improve the process ?

"Make it public and let them come" ?

("All the planning charts and demolition orders have been on display at your local planning department...")

Cheers
    Toerless

On Thu, Mar 03, 2022 at 07:24:49AM +0100, Carsten Bormann wrote:
> On 3. Mar 2022, at 07:15, Toerless Eckert <tte@cs.fau.de> wrote:
> > 
> > I am not aware of backroom dealings for non-editorial changes
> > during AUTH48.
> 
> Of course not. That is the point of backroom dealings!
> 
> More seriously, there is a continuum here, and transparency could help keeping everyone subtly more honest.
> 
> But I’m really not so concerned about backroom deals, but simply with the lack of breadth of the small group finishing the AUTH48.
> Watching some AUTH48 processes from the sidelines and not understanding WHY a vexing change was made can be frustrating.
> These can be editorial mistakes that come back to haunt.
> Lack of breadth can also lead to actual technical errors creeping in — there again is a continuum for these.
> Often, the lack of breadth also leads to longer resolution times, where the actual expert on a question might just have chimed in at the right time.
> 
> Grüße, Carsten

-- 
---
tte@cs.fau.de