Re: bozoproofing the net, was The Value of Reputation

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




--On Sunday, 01 January, 2006 19:20 -0800 Dave Crocker
<dhc2@xxxxxxxxxxxx> wrote:

>>   If such agreement cannot be reached, then I think
>> DKIM has much more serious problems about applicability and
>> the definition of the problems being solved than whether or
>> not this is required.
> 
> John,
> 
> Unfortunately what you appear to be saying is that you are
> certain of serious problems, and  are happy to assert them as
> a barrier to progress -- after all, you want to insist that a
> requirement for dealing with your fears be included as a
> chartered deliverable -- but you do not feel compelled to
> provide a solid basis for these fears.
> 
> Before imposing requirements on an IETF effort, one should
> make a pragmatic case for it.  At base, the case you have so
> far made is that the reasonable mechanism of DKIM might get
> mis-used, just as any other reasonable mechanism might be.

Dave, 

We seem to have reached a fundamental disconnect about how we
think consensus decisions are reached in the IETF and, for that
matter, in other situations. I'm going to try to avoid
characterizing your position, or even what it looks like to me,
because you could quite legitimately complain that I had no way
to understand your internal thought processes.  But I can, and I
think should, explain mine.

I think we find consensus around the IETF by giving plausible
objections the benefit of the doubt and trying to find middle
grounds to accommodate them.  If we can't do so, then we can't.
Then we need to figure out how "rough" a consensus we are
willing to tolerate and either move forward or give up.  I don't
believe we have ever turned "winning by exhaustion" or "winning
by intimidation" into virtues, even though those techniques are
sometimes demonstrably effective.  I also believe it is far more
useful to the IETF for us to struggle, together, to find,
understand, and, if appropriate, adjust to, a sincere concern or
objection, rather than to simply attack either the objection or
the objector.

We have both seen, and I believe we have both objected to,
situations in which a WG has said, in essence, "you approved our
charter, and we have done all this work, so you are obligated to
approve our result".  I don't like seeing the IETF get into that
position and have proposed remedies for it --including quicker
chartering, aggressive monitoring, and rapid termination of
groups that have gotten off course-- but those ideas haven't
gotten very much traction.  So we live with what we have, which
is the notion that conditions that should be imposed on a WG
(along with special freedoms that are to be given to it) must be
in the charter.

Now this proposed WG has asked for something exceptional, which
is the right to confine its discussions to a particular range of
alternatives determined by a self-selected design team (no
matter how much that design team consists of experienced IETF
folks and has asked for review within the broader IETF
community, the decision-making to this point remains vested in
that closed design team).  I think that the use of the design
team to develop a competent and consistent proposal is a
wonderful idea but, when the design team then shows up and says
what appears (at least to me) to be "charter the WG but confine
to working on our solution, presumably as we define it" then I
believe that the burden is on the design team to demonstrate
that approach is safe and consistent with IETF principles.  I
don't think the design team, or some of its members, get to say
"we have proposed this exceptional procedure and we are entitled
to use it unless someone can _prove_, to our satisfaction, that
it is harmful".  Your views, obviously, may differ but, to me,
the very essence of asking for an exceptional procedure is that
you justify and demonstrate the safety and appropriateness of
the exceptions, not that others be forced to prove that they are
harmful.

It seems to me that the IETF also has the right to ask a whole
range of "what problem does this solve" and, especially given
the requested constraint, "what value does an IETF WG add"
questions.  Those questions are, I believe, asked fairly
regularly of other proposed WGs although the presence of the
constraint request has caused them to be asked somewhat more
intensively this time than usual.   And, again, I suggest that
it is our precedent that the proposers of the WG need to respond
to those questions rather than saying, e.g., "unless you can
identify a technical flaw in our proposal, we are entitled to a
charter and provisions of our own choosing".  

> You keep implying that it is somehow a mysterious and big deal
> to have a voluntary, validated identity associated with
> message transit.

No, I keep "implying" (I've actually tried to be fairly
explicit) that it is not well-understood what problems this
proposed protocol solves and what operational side-effects its
deployment might cause.  If those issues were security ones, I
think there would be absolutely no doubt that explanations were
required.  But, to the extent that we understand the boundary
between "security issues" and other types of side effects, these
issues are on the other side of that line.  But the IESG has
always, at least as long as I can remember such things, had the
right to require an applicability statement for a protocol being
proposed for standardization and to require that applicability
statement cover either or both of the "what problem is being
solved?" question and the "what are the side-effects?" ones.

Those of us who believe that sort of statement should be
required of a proposed WG have three choices: 

	(i) we can ask that it be made a charter requirement, or 
	
	(ii) we can try to get into the WG and argue that it is
	a critical piece of work and that that protocol proposal
	isn't complete without it, or 
	
	(iii) we can wait until Last Call and, if the statement
	doesn't appear, argue that the protocol should not be
	approved until the A/S is provided.

Taking these in reverse order, the latter would almost certainly
be treated by the WG as the worst sort of "late surprise",
perhaps especially if it came from the community rather than,
e.g., an IESG member who had been suggesting it informally for
some time.  The second, it appears to me, could too easily be
blocked by a possibly-reasonable interpretation of the notion
that the existing documents determine the WG's scope.
Assurances by several potential participant-leaders of the WG
that such discussions would not be blocked seem to be to be
somewhat countered by aggressively-taken positions during the
charter discussions that anyone raising any procedurals issues
at all must either prove harm or demonstrate serious technical
flaws in the technical proposal.  And that leaves us with the
first option.

Again, all I'm asking for here is that the charter include
requirements for an explicit statement of the problems to which
the proposed protocol is applicable and for some analysis of the
consequences of applying it in some situations in which it is
not applicable.  If the work is worth doing, that should not be
hard.  I don't believe that it would be unreasonable for the
community to take a stronger step and require that those
statements be prepared and reach consensus pre-charter but, in
the spirit of trying to let the work go forward, I'm not asking
for that... only that the applicability materials be prepared as
part of generating a proposed standard.   If the charter draft
didn't contain an apparent request for a restriction of WG scope
to the content of the materials prepared by the design team, I
would be happy with a strong suggestion now and arguing for the
importance of the applicability materials in the WG after
chartering.  But I am concerned that the exclusion might
preclude this entire discussion.  I can't _prove_ that would
happen, but I don't believe I am under any obligation to do so,
no matter how many times you repeat that demand or its
variation: if you want this exceptional restriction in the
charter, then I believe it is your obligation to demonstrate
that it is safe and that all relevant issues will be dealt with
openly and appropriately rather than, e.g., having their
proponents shouted or verbally bludgeoned into submission.

      john


_______________________________________________

Ietf@xxxxxxxx
https://www1.ietf.org/mailman/listinfo/ietf

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]