Re: [Rfced-future] [rfc-i] RSWG & AUTH48 (was Re: [admin-discuss] Public archival of AUTH48 communications)

Toerless Eckert <tte@cs.fau.de> Thu, 03 March 2022 06:15 UTC

Return-Path: <eckert@i4.informatik.uni-erlangen.de>
X-Original-To: rfced-future@ietfa.amsl.com
Delivered-To: rfced-future@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 90D923A08D3 for <rfced-future@ietfa.amsl.com>; Wed, 2 Mar 2022 22:15:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.881
X-Spam-Level:
X-Spam-Status: No, score=-5.881 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.248, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_NEUTRAL=0.779, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ti5wc2IeKDAD for <rfced-future@ietfa.amsl.com>; Wed, 2 Mar 2022 22:15:11 -0800 (PST)
Received: from faui40.informatik.uni-erlangen.de (faui40.informatik.uni-erlangen.de [IPv6:2001:638:a000:4134::ffff:40]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ABA963A096C for <rfced-future@iab.org>; Wed, 2 Mar 2022 22:15:10 -0800 (PST)
Received: from faui48e.informatik.uni-erlangen.de (faui48e.informatik.uni-erlangen.de [IPv6:2001:638:a000:4134::ffff:51]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by faui40.informatik.uni-erlangen.de (Postfix) with ESMTPS id C120E549FC7; Thu, 3 Mar 2022 07:15:04 +0100 (CET)
Received: by faui48e.informatik.uni-erlangen.de (Postfix, from userid 10463) id AD5554EA7EE; Thu, 3 Mar 2022 07:15:04 +0100 (CET)
Date: Thu, 03 Mar 2022 07:15:04 +0100
From: Toerless Eckert <tte@cs.fau.de>
To: Christian Huitema <huitema@huitema.net>
Cc: Brian E Carpenter <brian.e.carpenter@gmail.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, rfced-future@iab.org, RFC Interest <rfc-interest@rfc-editor.org>
Message-ID: <YiBc6Mjj2++jxE0h@faui48e.informatik.uni-erlangen.de>
References: <CA+9kkMAg_xbTODu=UE288uxTVhL=+r18p5ywC6ZGaUvpyXO8bA@mail.gmail.com> <7C442BD6-F634-4129-9764-1BE29382D629@att.com> <8129A65C40CD88E0B5C94AA8@PSB> <7BC3F808-434B-48CF-B96B-0CF7D8B9F3A7@tzi.org> <EEF0F457622EDF74E090BC66@PSB> <BEB26FE0-CC24-4EC2-B7E5-6556A2425A24@eggert.org> <11721.1646248947@localhost> <af3a9d13-7ec2-4e48-355a-a3870af06361@joelhalpern.com> <a52626d5-13aa-ab1a-cb13-282bd9bcf812@gmail.com> <269b5f09-4840-b038-085c-839e0a1c3c6b@huitema.net>
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <269b5f09-4840-b038-085c-839e0a1c3c6b@huitema.net>
Archived-At: <https://mailarchive.ietf.org/arch/msg/rfced-future/91v2uH8kSqRX2VHgfawic-A4Htg>
Subject: Re: [Rfced-future] [rfc-i] RSWG & AUTH48 (was Re: [admin-discuss] Public archival of AUTH48 communications)
X-BeenThere: rfced-future@iab.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: RFC Editor Future Development Program <rfced-future.iab.org>
List-Unsubscribe: <https://www.iab.org/mailman/options/rfced-future>, <mailto:rfced-future-request@iab.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rfced-future/>
List-Post: <mailto:rfced-future@iab.org>
List-Help: <mailto:rfced-future-request@iab.org?subject=help>
List-Subscribe: <https://www.iab.org/mailman/listinfo/rfced-future>, <mailto:rfced-future-request@iab.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Mar 2022 06:15:17 -0000

I am not aware of backroom dealings for non-editorial changes
during AUTH48. Examples would be useful to start having a more
educated opinion.

I do not think we should or could expect for parties currently
not involved in the AUTH48 process to start acting in the future as
additional accountable watchdogs just because we make AUTH48 communications
public. In the absense of knowing any specific examples, i can
only imagine that such an interest watchdog party might happen
if the IETF approved last draft was a very tough compromise and
a non-author party has severe concerns about abuse of AUTH48.

But in any such case i imagine that it should already be possible
to escalate such a situation after publication of the RFC and
demand for it to be taken down ("this RFC does not match functionally
the last draft and this AUTH48 change should have been IESG/WG discussed...")
If such a process is not well defined, then i think its better to do that
than to expect additional process for AUTH48. E.g.: 1 month of
"conditional publishing" of RFC in which time any such concerns
can be raised (non-editorial change from last draft during AUTH48).

That said, i am all for a real-time publically accessible
stream of AUTH48 communications. I just don't think we should
expect it to be used by our processes for anything but a)
openness and curiosity and b) reference reading for when the AUTH48
process does result in notification of IETF/WG for a required
change beyond AUTH48 purview.

Cheers
    Toerless

On Wed, Mar 02, 2022 at 04:14:48PM -0800, Christian Huitema wrote:
> On 3/2/2022 12:31 PM, Brian E Carpenter wrote:
> 
> > Joel's concern is reasonable but I think the boundary between policy and
> > operations will always be hard to fix precisely.
> > 
> > That said, I slightly disagree with Lars. It's *exactly* because the
> > policy requirements might differ between streams that the RSWG/RSAB
> > structure is the right place to discuss this. To be specific, the
> > lack of public debate about non-editorial changes at AUTH48 is of
> > real concern in the IETF standards process, but might be considered
> > a non-issue for the Independent Stream. And the desired settings might
> > be different for the other three streams (including the new Editorial
> > stream). That - public debate during AUTH48 - would be a policy issue.
> > The details of which mailing lists and/or version management systems
> > are used is operational.
> 
> The request to make AUTH48  discussions public is rooted in the standard
> making requirements. RFCs coming out of the IETF streams are standard
> documents. The process must be fully transparent, if only to avoid
> appearances of last minute backroom dealing. The responsibility for ensuring
> the requiring transparency is squarely on the IESG and the IETF chair, not
> on the RSWG/RSAB or the RPC.
> 
> -- Christian Huitema
> 
> 
> _______________________________________________
> rfc-interest mailing list
> rfc-interest@rfc-editor.org
> https://www.rfc-editor.org/mailman/listinfo/rfc-interest

-- 
---
tte@cs.fau.de