Re: [Rfced-future] [rfc-i] RSWG & AUTH48 (was Re: [admin-discuss] Public archival of AUTH48 communications)

John C Klensin <john-ietf@jck.com> Thu, 03 March 2022 01:10 UTC

Return-Path: <john-ietf@jck.com>
X-Original-To: rfced-future@ietfa.amsl.com
Delivered-To: rfced-future@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9FA0F3A0490 for <rfced-future@ietfa.amsl.com>; Wed, 2 Mar 2022 17:10:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.907
X-Spam-Level:
X-Spam-Status: No, score=-1.907 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cy2FUkWjuOIw for <rfced-future@ietfa.amsl.com>; Wed, 2 Mar 2022 17:10:52 -0800 (PST)
Received: from bsa2.jck.com (bsa2.jck.com [70.88.254.51]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 191423A05F8 for <rfced-future@iab.org>; Wed, 2 Mar 2022 17:10:51 -0800 (PST)
Received: from [198.252.137.10] (helo=PSB) by bsa2.jck.com with esmtp (Exim 4.82 (FreeBSD)) (envelope-from <john-ietf@jck.com>) id 1nPZzR-000CYL-Je; Wed, 02 Mar 2022 20:10:45 -0500
Date: Wed, 02 Mar 2022 20:10:40 -0500
From: John C Klensin <john-ietf@jck.com>
To: Christian Huitema <huitema@huitema.net>, Brian E Carpenter <brian.e.carpenter@gmail.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, rfced-future@iab.org, RFC Interest <rfc-interest@rfc-editor.org>
Message-ID: <44BEBF9E833CCA2C76E69EB0@PSB>
In-Reply-To: <269b5f09-4840-b038-085c-839e0a1c3c6b@huitema.net>
References: <164574145917.13799.12710132950530774405@ietfa.amsl.com> <CA+9kkMC+vkyMPbt755Bu0cZHfmY-Pz6CdU1-J+8sBa8cPkA0dg@mail.gmail.c om> <CABcZeBMeRFOU+az=b8QJmD+-4GHivwZenMHEXsrbnamuoEmwEA@mail.gmail.com> <CA+9kkMAg_xbTODu=UE288uxTVhL=+r18p5ywC6ZGaUvpyXO8bA@mail.gmail.c om> <7C442BD6-F634-4129-9764-1BE29382D629@att.com> <8129A65C40CD88E0B5C94AA8@PSB> <7BC3F808-434B-48CF-B96B-0CF7D8B9F3A7@tzi.org> <EEF0F457622EDF74E090BC66@PSB> <BEB26FE0-CC24-4EC2-B7E5-6556A2425A24@eggert.org> <11721.1646248947@localhost> <af3a9d13-7ec2-4e48-355a-a3870af06361@joelhalpern.com> <a52626d5-13aa-ab1a-cb13-282bd9bcf812@gmail.com> <269b5f09-4840-b038-085c-839e0a1c3c6b@huitema.net>
X-Mailer: Mulberry/4.0.8 (Win32)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline
X-SA-Exim-Connect-IP: 198.252.137.10
X-SA-Exim-Mail-From: john-ietf@jck.com
X-SA-Exim-Scanned: No (on bsa2.jck.com); SAEximRunCond expanded to false
Archived-At: <https://mailarchive.ietf.org/arch/msg/rfced-future/FH5fwARPIYN_R9B5K1erfmTN9hU>
Subject: Re: [Rfced-future] [rfc-i] RSWG & AUTH48 (was Re: [admin-discuss] Public archival of AUTH48 communications)
X-BeenThere: rfced-future@iab.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: RFC Editor Future Development Program <rfced-future.iab.org>
List-Unsubscribe: <https://www.iab.org/mailman/options/rfced-future>, <mailto:rfced-future-request@iab.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rfced-future/>
List-Post: <mailto:rfced-future@iab.org>
List-Help: <mailto:rfced-future-request@iab.org?subject=help>
List-Subscribe: <https://www.iab.org/mailman/listinfo/rfced-future>, <mailto:rfced-future-request@iab.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Mar 2022 01:10:57 -0000


--On Wednesday, March 2, 2022 16:14 -0800 Christian Huitema
<huitema@huitema.net> wrote:

> On 3/2/2022 12:31 PM, Brian E Carpenter wrote:
> 
>> Joel's concern is reasonable but I think the boundary between
>> policy and operations will always be hard to fix precisely.
>> 
>> That said, I slightly disagree with Lars. It's *exactly*
>> because the policy requirements might differ between streams
>> that the RSWG/RSAB structure is the right place to discuss
>> this. To be specific, the lack of public debate about
>> non-editorial changes at AUTH48 is of real concern in the
>> IETF standards process, but might be considered a non-issue
>> for the Independent Stream. And the desired settings might be
>> different for the other three streams (including the new
>> Editorial stream). That - public debate during AUTH48 - would
>> be a policy issue. The details of which mailing lists and/or
>> version management systems are used is operational. 
> 
> The request to make AUTH48  discussions public is rooted in
> the standard making requirements. RFCs coming out of the IETF
> streams are standard documents. The process must be fully
> transparent, if only to avoid appearances of last minute
> backroom dealing. The responsibility for ensuring the
> requiring transparency is squarely on the IESG and the IETF
> chair, not on the RSWG/RSAB or the RPC.

But (i) AUTH48 is used by all four existing streams, (ii) even
if the IETF stream, it is used for non-standards track documents
as well as standards track ones.  

It may be that neither of those makes a difference.   However,
in the IETF Stream (with, AFAICT, parallels in the others), the
AD with responsibility for the document has the responsibility
for saying "Hey, the questions that have been raised and/or the
changes that have been required, are large enough that there is
a possibility that the document does not represent IETF
consensus.  We need to pull it back and hand the new working
version back to the WG (for WG documents) and/or issue a new
Last Call (for everything).  I don't see making the discussions
more public actually helping with that except for after-the-fact
arguments about what went wrong (if something did).

I should also point out that sometime unfortunate changes have
been made to documents after Last Call but not in editing but in
decisions made or requested during IESG discussion and balloting.

I would have written your last sentence as saying that the
responsibility for ensuring that the document that gets through
AUTH48 and gets published is technically (and in any other
substantive way) the same as the one that went through IETF Last
Call is squarely on the IESG, particularly the responsible AD.
If one is concerned that is not adequate (last minute backroom
dealing or not, it seems to be that it would be far more
effective to require, as I suggested a while ago, that, after a
document clears AUTH48, that version be posted for final
community review as an I-D --with the potential to appeal or
otherwise force additional IESG or community review rather than
publishing a short time later-- rather by making (or expecting)
the community to wade through discussions of, e.g., punctuation
or capitalization in order to see if substantive errors or
deviations from community decisions were made.  

In the general case, I don't see a problem making the AUTH48
discussions public for those who might be fascinated by them or
have excess time on their hands.  But, if the problem you are
trying to solve is the suspicion of the content of standards
being distorted by nefarious actions, I don't think it is likely
to be efficient at catching those problems.

And I still believe that this discussion is not desirable for
this list at this point and should be handed off to the RPC.  If
this RSWG doesn't consider the decisions the RPC makes to be
appropriate, they should by all means take it up.

   best,
    john