Re: [Rfced-future] [rfc-i] RSWG & AUTH48 (was Re: [admin-discuss] Public archival of AUTH48 communications)

John C Klensin <john-ietf@jck.com> Fri, 04 March 2022 03:07 UTC

Return-Path: <john-ietf@jck.com>
X-Original-To: rfced-future@ietfa.amsl.com
Delivered-To: rfced-future@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 554DF3A0C62 for <rfced-future@ietfa.amsl.com>; Thu, 3 Mar 2022 19:07:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.907
X-Spam-Level:
X-Spam-Status: No, score=-1.907 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QKAACT1ItRGN for <rfced-future@ietfa.amsl.com>; Thu, 3 Mar 2022 19:07:19 -0800 (PST)
Received: from bsa2.jck.com (bsa2.jck.com [70.88.254.51]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 89A0F3A0D98 for <rfced-future@iab.org>; Thu, 3 Mar 2022 19:07:19 -0800 (PST)
Received: from [198.252.137.10] (helo=PSB) by bsa2.jck.com with esmtp (Exim 4.82 (FreeBSD)) (envelope-from <john-ietf@jck.com>) id 1nPyHa-000F27-6P; Thu, 03 Mar 2022 22:07:06 -0500
Date: Thu, 03 Mar 2022 22:07:00 -0500
From: John C Klensin <john-ietf@jck.com>
To: Michael Richardson <mcr+ietf@sandelman.ca>, Carsten Bormann <cabo@tzi.org>, Toerless Eckert <tte@cs.fau.de>, rfced-future@iab.org, RFC Interest <rfc-interest@rfc-editor.org>
Message-ID: <D1908D64BC74C4F3C9444271@PSB>
In-Reply-To: <30761.1646334921@localhost>
References: <CA+9kkMAg_xbTODu=UE288uxTVhL=+r18p5ywC6ZGaUvpyXO8bA@mail.gmail.com> <7C442BD6-F634-4129-9764-1BE29382D629@att.com> <8129A65C40CD88E0B5C94AA8@PSB> <7BC3F808-434B-48CF-B96B-0CF7D8B9F3A7@tzi.org> <EEF0F457622EDF74E090BC66@PSB> <BEB26FE0-CC24-4EC2-B7E5-6556A2425A24@eggert.org> <11721.1646248947@localhost> <af3a9d13-7ec2-4e48-355a-a3870af06361@joelhalpern.com> <a52626d5-13aa-ab1a-cb13-282bd9bcf812@gmail.com> <269b5f09-4840-b038-085c-839e0a1c3c6b@huitema.net> <YiBc6Mjj2++jxE0h@faui48e.informatik.uni-erlangen.de> <D5AC5684-506B-4214-9678-75B5C1FCBED2@tzi.org> <30761.1646334921@localhost>
X-Mailer: Mulberry/4.0.8 (Win32)
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
X-SA-Exim-Connect-IP: 198.252.137.10
X-SA-Exim-Mail-From: john-ietf@jck.com
X-SA-Exim-Scanned: No (on bsa2.jck.com); SAEximRunCond expanded to false
Archived-At: <https://mailarchive.ietf.org/arch/msg/rfced-future/Im5DTfGQBv8tfINlSy9tRfDhRpI>
Subject: Re: [Rfced-future] [rfc-i] RSWG & AUTH48 (was Re: [admin-discuss] Public archival of AUTH48 communications)
X-BeenThere: rfced-future@iab.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: RFC Editor Future Development Program <rfced-future.iab.org>
List-Unsubscribe: <https://www.iab.org/mailman/options/rfced-future>, <mailto:rfced-future-request@iab.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rfced-future/>
List-Post: <mailto:rfced-future@iab.org>
List-Help: <mailto:rfced-future-request@iab.org?subject=help>
List-Subscribe: <https://www.iab.org/mailman/listinfo/rfced-future>, <mailto:rfced-future-request@iab.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Mar 2022 03:07:26 -0000


--On Thursday, March 3, 2022 14:15 -0500 Michael Richardson
<mcr+ietf@sandelman.ca> wrote:

>...
>     > Of course not. That is the point of backroom dealings!
> 
> at least, if you are any good at them.
> 
>     > More seriously, there is a continuum here, and
> transparency could help     > keeping everyone subtly more
> honest.
> 
> I would say it differently.
> 
> People not involved any a specific AUTH48 can't be sure what
> horse trading may have occurred during the editing, or who
> initiated it. ADs might be able to say that they have never
> seen any backroom dealings, and specific authors may agree for
> specific documents, but suspicious could still remain.
> 
> Having a public audit trail just makes everyone feel happy.

 
>     > But I'm really not so concerned about backroom deals,
> but simply with     > the lack of breadth of the small group
> finishing the AUTH48.
> 
> Agreed.

It once again feels to me as if two separate concerns are being
conflated and that the above identifies them.

Concern 1: There is a suspicion that something nefarious is
going on.
	Plausible solution: Make the correspondence public
	either in real time or on request later. (Not a perfect
	solution, see "observation" below.)

Concern 2: The AUTH48 reviewers lack breadth or are sufficiently
invested in one vision of the document to not be able to
reliably make good critical decisions consistent with consensus
of the Stream/ Approving body.   Using the IETF Stream as an
example, with no malice at all, inconsistency between the views
of the community and those of the authors and IESG could be
another part of this concern.
	Plausible solution:  Figure out a better way to allow
	broader review immediately pre-publication. 

Observation: those two concerns are not mutually exclusive and
neither are the plausible solutions.  And the weakness in the
proposed solution to Concern 1 is that, if there is information
about the reason to make one seemingly equivalent choice over
another that should not be generally discussed or, if someone
actually and intentionally wanted to do something nefarious, the
proposal would allow either to be kept out of the public record,
with no way to tell them apart.   Because of the first case,
forcing all AUTH48 correspondence to be public might easily
result in lower-quality documents.

    best,
    john