Last day: Call for volunteers: narrative minutes of IESG meetings

2005-08-02 Thread Brian E Carpenter

Today's the last day to volunteer. By the way, we're thinking
of picking two volunteers, to share the load.

Brian

 Original Message 
Subject: Call for volunteers: narrative minutes of IESG meetings
Date: Mon, 25 Jul 2005 08:50:05 -0400
From: Brian Carpenter [EMAIL PROTECTED]
To: IETF Announcement list ietf-announce@ietf.org

The comments on the attached proposal were strongly favourable.
The IESG would now like to call for volunteers to act as its
Recording Secretary (scribe) for a 6 month trial period.

Volunteers should write to iesg@ietf.org by August 2nd.
We'll keep names confidential, unless of course people choose
to volunteer in public.

Details will be settled with the chosen volunteer, but the general
guidelines are:

- the scribe will attend the regular IESG telechats
(11:30 - 14:00 US ET on alternate Thursdays; this time cannot be changed).

- the scribe will record narrative minutes of the discussions, and
will not take part in the discussions except to ask for clarifications.

- the narrative minutes will be published after review by the IESG.
The intent is to do this about two weeks after the meeting in question.

- confidential items (principally personnel discussions) will not be
reported in detail. The scribe will not take part in any sessions that
liaisons are excluded from (i.e. nominating discussions and appeal
discussions).

   Brian Carpenter

 Original Message 
Subject: A proposed experiment in narrative minutes of IESG meetings
Date: Thu, 14 Jul 2005 15:19:34 +0200
From: Brian E Carpenter [EMAIL PROTECTED]
Organization: IBM
To: ietf@ietf.org

The IESG is interested in carrrying out an experiment to publish
narrative minutes for IESG meetings as well as the regular minutes
of decisions taken.

Currently the IESG minutes are a formal record of decisions taken
and (like the agenda) are generated semi-automatically by the
secretariat. This is a well-oiled process that we don't want to
disturb. However, the community clearly would like more information
about the way the IESG reaches its decisions, beyond the record
of comments on each document that is stored in the I-D tracker.

We propose that, for an initial period of 6 months, a member of
the community will be added to regular IESG meetings as a recording
secretary who will write narrative minutes of the discussions,
which will be posted publicly after IESG review for accuracy.
(As always, personnel discussions will need to remain private
or be minuted with great care.)

The IESG welcomes comments on this proposal, to iesg@ietf.org
or ietf@ietf.org as appropriate. If the community seems to be
in favour of this experiment, we will soon call for volunteers
and pick one person to act for the initial six months. After
six months, we will ask the community whether the results
justify continuing the effort. The main question will be whether
the community is getting useful extra information.

(Thanks to Spencer Dawkins for triggering this idea.)

   Brian for the IESG

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Let's make the benches longer.... (Re: draft-klensin-nomcom-term-00.txt)

2005-08-02 Thread Harald Tveit Alvestrand

On rereading, my previous reply could have been better formulated..

--On 1. august 2005 12:42 -0400 Eric Rosen [EMAIL PROTECTED] wrote:




the  normal process  for AD  replacement  involved choosing  which of
the people who had  worked with the AD for  a long time could do  the
job this time,


In American vernacular, this procedure is known as cronyism.

Generally, one doesn't expect to see this advocated in a public forum ;-)


The selection mechanism I advocated was the following (quoted from the 
expired draft):



5. Details

   All members of the leadership are selected by the nomcom for
   membership in an area.
   The nomcom also selects which member is supervisor and vice
   supervisor for an area.

   [UNCERTAIN]The supervisor may also be selected by the members of the
   council, or by other means.  Yearly selection by the council?
   It's also been suggested that instead of nomcom selecting everyone,
   the leadership team can make selections to the area councils, based
   on recommendations from the area supervisor.  This would not increase
   the load on the nomcom as much as envisaged here.  [/UNCERTAIN]

   Special care should be taken that the composition of area teams and
   the leadership team results in functional teams.


(The term area supervisor is a concept that is a successor to the current 
term AD - the draft tried to use new names to point out that things 
changed.)


One core difference between this idea and directorates is that directorates 
serve, explicitly, at the pleasure of an AD; ADs can create, disband or 
replace directorates without any public input or control. Your concern is 
one reason why the idea was different.


Note that nothing here prevents the nomcom from picking people outside the 
council to be supervisor; if all is well, common sense would say that 
they don't, but when things are not well, they should have the power (IMHO).


But the idea didn't generate any groundswell of let's do it, either in 
the community or in the IESG, so I turned to fixing things that were more 
obviously broken, with more obvious fixes.


Harald


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Completely out of scope: Restaurant reccomendation

2005-08-02 Thread Olaf M. Kolkman



Yesterday I had a very nice salad in this slightly overpriced  
restaurant down the road from the IETF venue. Its a Brasserie  
specialized in Fruit de Mere.


I ordered Salade Italienne. Very nice indeed, until I hit a bug,  
covered in olive oil, that was enjoying the salad too. I am not a  
specialist in insects but I know cockroaches come in many different  
shapes and forms. The small animal covered in oil could have been a  
baby cockroach.


I signaled the waiter and after several Oh-la-la's he offered me a  
new salad. I lost my appetite so I refused. So far nothing to  
complain about. But then came the bill. I was charged. Then I  
specifically asked if something could be done about that. And to be  
honest I'd settled for anything symbolic, free wine, free desert,  
espresso, anything. But the waiter could not be convinced.


Hence my recommendation. Do not go to:
  Le Ternes Pereire
  84, Avenue de Ternes
  75017 Paris

Actually pass by, look at the menu, and if the waiter tries to  
convince you to come in just mention the cockroach in the salad.


http://www.bio.umass.edu/biology/kunkel/cockroach.html


--Olaf


PS. Somebody suggested that it would be nice to have a meeting Wiki  
for recommendations on restaurants, stories about pickpockets, and  
other non process and non technical cruft.


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Completely out of scope: Restaurant reccomendation

2005-08-02 Thread Clint Chaplin
So, who is going to volunteer to set up said wiki?  I'm not
technically proficient

On 8/2/05, Olaf M. Kolkman [EMAIL PROTECTED] wrote:
 
 
 PS. Somebody suggested that it would be nice to have a meeting Wiki
 for recommendations on restaurants, stories about pickpockets, and
 other non process and non technical cruft.
 

-- 
Clint (JOATMON) Chaplin
Wireless Security Technologist
Wireless Standards Manager

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: I'm not the microphone police, but ...

2005-08-02 Thread JFC (Jefsey) Morfin

At 17:22 01/08/2005, Spencer Dawkins wrote:

That would be fine, if I changed the Newcomer's Orientation :-)
Spencer


Spencer,
However, many people here are not using their 'individual money' to get 
here in Paris. Our name badges list our employers (in most cases).  I 
think its a different issue if I come to the mic and say, 'We at the ACME 
company would like to state, for the record, that we support the foo bar 
proposal and hope it becomes an official RFC as soon as possible.  It 
doesn't bug me one-way or another if folks state their name  who pays 
the bills.


Spencer,
I do not claim that my technical positions are correct, but that they are 
independent and I pretend they prove that IETF is what it claims: by 
individuals. I pay dearly that independence for years (which has many other 
RD advantages). This permits me, may be clumsily but loyally, to support 
for free the interests of open-source, of small industries, of developing 
countries, of a user-centric architecture. So, what is sad is when I am 
asked by an IETF establishment member do you realise how much you _cost_ 
to the industry?. Which industry? Not mine in any case. Fostering 
competition is not favoring my competition.


This is why I suggest the real danger for the IETF is the collusion of 
large organisations through external consortia to get a market dominance 
through de facto excluding IETF standardisation and IANA registry control. 
And this is why I suggest the best way to address it is simply to ask for 
the truth, the whole truth.


Participation should be individual, but published details should include 
who foots the costs, the corporation, the relevant consortia and main 
customers for consultants. We need everyone, including commercial 
consortia, individual searchers, non-profits, Government, Academic 
projects, etc., but, please read RFC 3869, on a equal participation 
opportunity basis. This is the only way to obtain open, scalable and 
uniform standards.


I live nearby the Palais des Congrès. But I do not come since I am not 
invited for free by IASA as we are invited by ICANN. The IETF policy must 
be consistent: there is no reason to pay personal money to help interests I 
defend to be treated unequal, due to often disclosed but non published 
affinities. They get there far more than what they pay for, why would I in 
addition subsidise them?


jfc


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Completely out of scope: Restaurant reccomendation

2005-08-02 Thread Will McAfee
On 8/2/05, Olaf M. Kolkman [EMAIL PROTECTED] wrote:
 
 
 Yesterday I had a very nice salad in this slightly overpriced
 restaurant down the road from the IETF venue. Its a Brasserie
 specialized in Fruit de Mere.
 
 I ordered Salade Italienne. Very nice indeed, until I hit a bug,
 covered in olive oil, that was enjoying the salad too. I am not a
 specialist in insects but I know cockroaches come in many different
 shapes and forms. The small animal covered in oil could have been a
 baby cockroach.
 
 I signaled the waiter and after several Oh-la-la's he offered me a
 new salad. I lost my appetite so I refused. So far nothing to
 complain about. But then came the bill. I was charged. Then I
 specifically asked if something could be done about that. And to be
 honest I'd settled for anything symbolic, free wine, free desert,
 espresso, anything. But the waiter could not be convinced.
 
 Hence my recommendation. Do not go to:
   Le Ternes Pereire
   84, Avenue de Ternes
   75017 Paris
 
 Actually pass by, look at the menu, and if the waiter tries to
 convince you to come in just mention the cockroach in the salad.
 
 http://www.bio.umass.edu/biology/kunkel/cockroach.html
 
 
 --Olaf
 
 
 PS. Somebody suggested that it would be nice to have a meeting Wiki
 for recommendations on restaurants, stories about pickpockets, and
 other non process and non technical cruft.
 
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www1.ietf.org/mailman/listinfo/ietf
 
You should have refused to pay citing health concerns, and thretened
to report the restaurant.  Exactly what kind of conditions does the
kitchen have that a baby cockroach would make it into the salad?  And
further, why would it be common enough that they would have to charge
for these salads, or not be profitable?

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Reminder: IAOC Office hours

2005-08-02 Thread Lucy E. Lynch
All -

Members of the IAOC will be holding office hours tues/wed/thurs in Room
325M form 3:30-4:30PM. Take the elevator next to the terminal room up to
3.5 and follow signs.

A draft pdf of my slides for the Plenary can be viewed at:
http://koi.uoregon.edu/~iaoc/ietf-63-iaoc-lel.pdf

Please drop by if you have questions or comments.

Lucy E. Lynch   Academic User Services
Computing CenterUniversity of Oregon
llynch  @darkwing.uoregon.edu   (541) 346-1774

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: I'm not the microphone police, but ...

2005-08-02 Thread Hallam-Baker, Phillip
 Behalf Of JFC (Jefsey) Morfin

 This is why I suggest the real danger for the IETF is the 
 collusion of 
 large organisations through external consortia to get a 
 market dominance 
 through de facto excluding IETF standardisation and IANA 
 registry control. 
 And this is why I suggest the best way to address it is 
 simply to ask for 
 the truth, the whole truth.

The problem with this approach is that it becomes self-defeating. The
work of the IETF gets clogged up by individuals whose sole objective is
to block what they see as the encroachments of evil corporations at all
costs. Even if they can't see the evil globalization scheme immediately
they will block progress anyway just in case. The result is that
corporations that want to get work done either go to other forums or
craft proposals that are so narrowly drafted that they amount to a
rubber stamp.

Certainly there are bizare corporations attempting to achieve some sort
of stranglehold. Anyone remember digital convergence and the CueCat?
That type of behavior tends to come from market entrants rather than
established companies. Once you have a stake in the open Internet the
probability of success in a closed 'walled garden' scheme isn't high
enough to be interesting. 


Furthermore the people working for those corporations tend to consider
themselves advocates for and responsible to their customers and their
customer's customers at least as much if not more than their
shareholders. 

Sit at the back of the plenary sessions. Watch the number of people
opening up their laptop and starting a telnet session. Less than 5% of
the billion plus Internet users interact with their machine in that way.
The IETF membership is totally unrepresentative of the billion plus
Internet users. Worse still the prevaling attitude is of the 'anyone can
become like us only not quite so skilled' type. Most people don't want
to have to become computer experts.


The IETF does not have a veto over the development of the Internet.
There are plenty of standards organizations to choose from. Nor for that
matter does IANA. All IANA is is a voluntary arrangement that exists
because people choose to recognize it. There is in practice nothing to
stop individuals simply declaring that they will use a particular code
point.

As a thought experiment consider what happens if someone decides they
want the DNS RR 88 and just goes and uses it. If they succeed and their
standard is used nobody else is going to accept issue of RR #88. And
that is all anyone needs from IANA.

This total lack of control is actually not such a bad thing. It means
that if the International 'Internet Governance' cabal that wants to
capture the IANA were to succeed the success it would not matter very
much.


 This is the only way to obtain open, scalable and 
 uniform standards.

Are these the right goals? 

Surely meeting the needs of the users should come somewhere in the list.

Uniformity in standards can be a good thing. But there are also
disadvantages to insisting on 'consistency' with what are at this point
quarter century old designs. 

Ten years ago I would have thought that the idea of 'disposable'
standards whose sole purpose was to effect a transition to some other
standard was mad. Today I really don't see any problem with the idea
that you write a spec whose sole purpose is to enable a transition. 


It is pretty hard for any standard to get anywhere unless it is 'open'.
It is not exactly in my employer's interest to allow a competitor to
gain such a position. Nor is it in my competitor's interest to allow me
to achieve such a position. 

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Internet Draft Process Procedure

2005-08-02 Thread zhen

Hello folks,

Just a quick question about the acceptance of Internet-Drafts. Is there
such a term called acceptance about Internet-drafts or they will be
anounced anyway as long as being proposed? As I figured that it's  like
everyone talks about his/her opinions freely in the form of I-D. An I-D is
certainly not equal to a journal paper.

Looking forward to being clarified.


Zhen




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Personal Security Reminder

2005-08-02 Thread IETF Secretariat
Please be sure you do not leave any of your belongs unattended anywhere in the
meeting venue, including meeting rooms. Your belongs may be picked up by either
security or someone else and you may not be able to retrieve them.

Several people already have computer bags picked up and they may or maynot be
lost.

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: I'm not the microphone police, but ...

2005-08-02 Thread JFC (Jefsey) Morfin

At 16:23 02/08/2005, Hallam-Baker, Phillip wrote:

 Behalf Of JFC (Jefsey) Morfin
 This is why I suggest the real danger for the IETF is the
 collusion of
 large organisations through external consortia to get a
 market dominance
 through de facto excluding IETF standardisation and IANA
 registry control.
 And this is why I suggest the best way to address it is
 simply to ask for
 the truth, the whole truth.


Hallam,
I still must answer you very cute remark on what one could name delta 
sec. I am giving a lot of thinking. I find it very interesting. So I will 
be careful about this one :-)



The problem with this approach is that it becomes self-defeating. The
work of the IETF gets clogged up by individuals whose sole objective is
to block what they see as the encroachments of evil corporations at all
costs.


This is unfortunately what I must do right now. But unfortunately this is 
not what I see, it is what they demonstrate.



Even if they can't see the evil globalization scheme immediately
they will block progress anyway just in case. The result is that
corporations that want to get work done either go to other forums or
craft proposals that are so narrowly drafted that they amount to a
rubber stamp.


Except if you can grab a BCP. I am not sure you are actually right. You 
certainly know a few cases. I known one before: I actually partly oppose 
your company. I gave up as it was my first IETF opposition. Today I see 
that it would have been tremendously beneficiary to your company if I had 
hold my position. The problem with IETF is there is no architectural common 
vision. So you do not know if your rubber stamp is at the proper place.


This is why would prefer to have a good evaluation of all the interests 
supporting a proposition. Having to road map, I could at least understand 
who supports. If there is a good distribution of support, this is good. If 
there is only a commercial, or a political, etc. support: warning. This is 
simply some more sophisticated rough consensus evaluation process. Avoiding 
consensus by exhaustion organised by affinity groups.



Certainly there are bizare corporations attempting to achieve some sort
of stranglehold. Anyone remember digital convergence and the CueCat?
That type of behavior tends to come from market entrants rather than
established companies. Once you have a stake in the open Internet the
probability of success in a closed 'walled garden' scheme isn't high
enough to be interesting.


Unless you are dominant and want to protect that dominance.


Furthermore the people working for those corporations tend to consider
themselves advocates for and responsible to their customers and their
customer's customers at least as much if not more than their
shareholders.


dominance makes this the same. You have so many customers that their 
stability seems to be part of the internet. But dominance in an area can be 
defeated by dominance or greassroots effort in an area which looked 
orthogonal. The problem is that it may create disruption. Look at Internet 
balkanisation.



Sit at the back of the plenary sessions. Watch the number of people
opening up their laptop and starting a telnet session. Less than 5% of
the billion plus Internet users interact with their machine in that way.
The IETF membership is totally unrepresentative of the billion plus
Internet users. Worse still the prevaling attitude is of the 'anyone can
become like us only not quite so skilled' type. Most people don't want
to have to become computer experts.

The IETF does not have a veto over the development of the Internet.
There are plenty of standards organizations to choose from. Nor for that
matter does IANA. All IANA is is a voluntary arrangement that exists
because people choose to recognize it. There is in practice nothing to
stop individuals simply declaring that they will use a particular code
point.


IETF and IANA have a defacto monopoly on the architecture. This 
architecture must evoluate for years. This only lead to the question: will 
they make it or who will? Two responses today: ITU or grassroots. If 
someone believes the ITU is able to do it  so it is grassroots. But 
grassroots is balkanisation, starting by the dominant securing their 
dominant territory. And grassroots undermining it.


This has good and bad effect. At this time I have not yet determined the 
best way out of IETF.



As a thought experiment consider what happens if someone decides they
want the DNS RR 88 and just goes and uses it. If they succeed and their
standard is used nobody else is going to accept issue of RR #88. And
that is all anyone needs from IANA.

This total lack of control is actually not such a bad thing. It means
that if the International 'Internet Governance' cabal that wants to
capture the IANA were to succeed the success it would not matter very
much.


The IANA time is over. The problem is its consistent replacement.


 This is the only way to obtain open, scalable and
 uniform 

RE: I'm not the microphone police, but ...

2005-08-02 Thread Hallam-Baker, Phillip
 From: JFC (Jefsey) Morfin [mailto:[EMAIL PROTECTED] 

 Except if you can grab a BCP. I am not sure you are actually 
 right. You certainly know a few cases. 

The lack of an IETF endorsed spec from MARID did not stop Microsoft from
holding an industry gala two weeks ago in NYC. Nobody commented or
appeared to care that the spec was not ratified.

Think of it as a recess appointment.


 The problem with IETF is there is no architectural common vision. 

No, that is its strength. The Web was not part of the IETF common
vision. SSL was diametrically opposed to the IETF security vision.

 IETF and IANA have a defacto monopoly on the architecture.

No they don't. W3C and OASIS are both more influential as standards
bodies at this point, particularly once we get above the session layer.

The URI identifier architecture introduced in PICS and since adopted in
XML eliminates the need for fixed registries like the IANA. That was the
whole point, to eliminate the control point. I did not want a central
registry of PICS censorship schemes. Of course other people did, mostly
the people who used euphemisms like 'content selection' rather than
censorship.

 For example the whole IPv6 issue is that they did not understand that 
 their current deployement (2001) is disposable.

The failure to get the deployment stakeholders round the table to ask
the question 'what will it take to make this happen' is in my view the
root cause.



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Very helpful Parisians (Was: Cautionary tale: Paris pickpockets)

2005-08-02 Thread Steven M. Bellovin
There's been a lot of discussion about petty crime in Paris -- I posted 
my own story (and if you need to know how to get an emergency passport 
in Paris, talk to me offline).  Let me follow up on my own posting.

To recap, my wife's purse was stolen at a restaurant very close to the 
hotel.  Two Parisians found it under a scooter about 1 km from here.  
They went to a fair amount of trouble to locate me -- my wife and I 
don't have the same last name, but they found a minor card in the purse 
that mentioned my name -- and delivered the purse to me here at the 
hotel.

Yes, the money was gone, as was her phone.  The credit cards and 
passports were still there, though of course they'd been canceled.  
(Obviously, our threat model was too great)  The less-critical 
stuff -- but still a nuisance to replace -- was there.  A set of keys 
was there.  (We did not assume a trans-Atlantic burglary ring.  And if 
the opposition really was that competent, they'd have copied the keys, 
or at least the critical data about them, before discarding them.  Not 
in my threat model)

There certainly is a petty crime problem in Paris.  See 'CRIME' in
http://travel.state.gov/travel/cis_pa_tw/cis/cis_1116.html for the U.S. 
consulate's opinion.  Frankly, though, I'm overwhelmed at the efforts 
of two people who owed me exactly nothing.

Yes, there are good people in the word.

--Steven M. Bellovin, http://www.cs.columbia.edu/~smb



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: I'm not the microphone police, but ...

2005-08-02 Thread Aki Niemi

My 2 cents:

I firmly believe in the individual and voluntary aspects of IETF
attendance. I also belong to both categories; sure my employer pays for
the expenses, but nobody forced me to come over. (Come on it's Paris
after all, although I have gone to all of the Minneapolis meetings, too. ;)

I represent many things here -- first and foremost I'm an engineer and
an end user. Naturally, my interests may be affected by what I do in my
real work. I think that applies to most people here, and I think it
would be naive to think otherwise.

And whether or not people mention their affiliate at the mic is a
much smaller issue IMO to whether they use their company email
account. That is a much more visible and relevant label in IETF work
that mostly happens on mailing lists anyway.

Cheers,
Aki

ext Spencer Dawkins wrote:

That would be fine, if I changed the Newcomer's Orientation :-)

Spencer



Spencer,

However, many people here are not using their 'individual money' to
 get here in Paris. Our name badges list our employers (in most 
cases).  I think its a different issue if I come to the mic and 
say, 'We at the ACME company would like to state, for the record, 
that we support the foo bar proposal and hope it becomes an 
official RFC as soon as possible.  It doesn't bug me one-way or 
another if folks state their name  who pays the bills.





___ Ietf mailing list 
Ietf@ietf.org https://www1.ietf.org/mailman/listinfo/ietf




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Completely out of scope: Restaurant reccomendation

2005-08-02 Thread Henrik Levkowetz
Sounds like something the Tools Team could provide.  Should I set up
one?

Henrik

On 2005-08-02 11:13 Clint Chaplin said the following:
 So, who is going to volunteer to set up said wiki?  I'm not
 technically proficient
 
 On 8/2/05, Olaf M. Kolkman [EMAIL PROTECTED] wrote:
 
 
 PS. Somebody suggested that it would be nice to have a meeting Wiki
 for recommendations on restaurants, stories about pickpockets, and
 other non process and non technical cruft.
 
 



signature.asc
Description: OpenPGP digital signature
___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


A Complaint to the IETF and IESG (was Re: Please change the Subject: when you change the subject [Re: Sarcarm and intimidation])

2005-08-02 Thread Dean Anderson
I haven't changed the subject. The correct subject is sarcasm and
intimidation. I have just provided specific examples of sarcasm and
intimidation that have happened while working on spam issues for the
IETF. Those specific exmaples fall under the topic of the subject header.
Your complaint about subject change is frivolous.

Nor am I playing rhetorical games with Noel Chiappa. I asked him a direct,
relevant, specific question, and he didn't answer it. Instead he gave me a
sarcastic, frivolous, and irrelevant response.  The original story Chiappa
gave about Parry meets the Doctor is often cited to mean: Did I give
you the impression I cared about your feelings?, which means that they
don't care what you think. This is sarcasm, and is exactly what
Hallam-Baker started to complain about under the topic sarcasm and
intimidation.

The recent behavior by Carpenter and Chiappa has rather proved the point
by Hallam-Baker, myself, and others.  The frivolous complaints about
message topic give the impression of intimidation. And I feel intimidated
by the Chair's insistence on squelching the topic of sarcasm and
intimidation and specifically any examples of sarcasm and intimidation
involving IETF work on spam.  So do others.  This is inappropriate
behavior by the current Chair, and by former IESG members.

It is rather amazing that someone (a former IESG Member!)  would be so
brazen as to be sarcastic during a complaint about sarcasm and
intimidation.  Plainly, they seem to feel a right to be sarcastic. But I
find no such right in the IETF or ISOC Code of Conduct, nor in the Mission
Statement of the IETF.  Just the opposite: One is expected to be courteous
and respectful, and sarcasm is neither courteous nor respectful.

A complaint on this inappropriate behavior is hereby brought to the
attention of the IESG.

Dean Anderson
President
Av8 Internet, Inc

On Fri, 22 Jul 2005, Brian E Carpenter wrote:

 ...
  Does this mean that you think the IETF should disband the ASRG, drop all
  current I-D's relating to spam, and quit working on spam issues?  
 
 What I think is that if you change the subject, you should change
 the Subject:, so that people who might be interested in Sarcarm
 and intimidation but aren't interested in Spam don't waste their
 time.
 
 Brian
 
 
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www1.ietf.org/mailman/listinfo/ietf
 
 

-- 
Av8 Internet   Prepared to pay a premium for better service?
www.av8.net faster, more reliable, better service
617 344 9000   





___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Internet Draft Process Procedure

2005-08-02 Thread Brian E Carpenter

They are posted if they follow the guidelines, in particular
the mandatory text about intellectual property etc.

See http://www.ietf.org/ietf/1id-guidelines.html

Posting an I-D implies nothing about its status.
It simply means it is on line for 6 months.

A working group may decide to adopt a draft as a WG draft,
and I suppose that could be called acceptance but it does
not imply approval.

Only a draft that has followed the full process (RFC 2026)
can be approved by the IESG.

I suggest reading the Tao at http://www.ietf.org/tao.html

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Brian E Carpenter
IETF Chair
Distinguished Engineer, Internet Standards  Technology, IBM




[EMAIL PROTECTED] wrote:

Hello folks,

Just a quick question about the acceptance of Internet-Drafts. Is there
such a term called acceptance about Internet-drafts or they will be
anounced anyway as long as being proposed? As I figured that it's  like
everyone talks about his/her opinions freely in the form of I-D. An I-D is
certainly not equal to a journal paper.

Looking forward to being clarified.


Zhen




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: I'm not the microphone police, but ...

2005-08-02 Thread Hallam-Baker, Phillip
There are cases where it is useful for a group to be able to take notice
of first hand experience that comes from employment.

For example I am currently reading a somewhat sureal thread in which an
individual who clearly has no experience or understanding of running
network operations for a large ISP (million plus customers) is lecturing
folk on the lack of scalability of a protocol proposed by and already
deployed by several ISPs of that type of scale.

Another issue that frequently comes up is that people will assert that a
proposal to make a new use of DNS will increase load on the system and
thus risk bringing down core DNS and thus the Internet. Except in cases
where the protocol is catastrophically bad and unnecessarily wasteful of
resources these dire predictions have never yet proved true, nor are
they likely to - most load on the core DNS is due to attacks and baddly
configured DNS systems. Even if the load on the core DNS were to
increase the point of the infrastructure is to serve the needs of users,
not the other way around.


The point I am trying to make here is that we are not dealing with a
domain that is entirely academic theory. There are cases where
operational experience is significant and affiliation can carry
significance.

If I hear several major infrastructure providers say that they have
examined a proposal and the resource requirements do not cause them
concern as far as their operations go I think it is reasonable to give
such a statement considerable weight unless there are very good reasons
to think otherwise.

Likewise I would take a concern raised by several major infrastructure
providers that a proposal did have unacceptable resource requirements
very seriously, although I would want to see some documentation and
explanation of the claim.

We do not need to give a veto to major infrastructure providers but
there has to be a mechanism that allows companies to raise issues on the
record from time to time when they choose. If only to avoid the need to
argue at interminable length why a 'scalability issue' is nothing of the
sort.

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: I'm not the microphone police, but ...

2005-08-02 Thread JFC (Jefsey) Morfin
Interesting: I like you piercing spirit. But, I am afraid you are too much 
legacy intoxicated :-) what I think surprising. I suppose we agree but you 
have odd ways of seeing it.


At 18:58 02/08/2005, Hallam-Baker, Phillip wrote:

 From: JFC (Jefsey) Morfin [mailto:[EMAIL PROTECTED]
 Except if you can grab a BCP. I am not sure you are actually
 right. You certainly know a few cases.

The lack of an IETF endorsed spec from MARID did not stop Microsoft from
holding an industry gala two weeks ago in NYC. Nobody commented or
appeared to care that the spec was not ratified.

Think of it as a recess appointment.

 The problem with IETF is there is no architectural common vision.

No, that is its strength. The Web was not part of the IETF common
vision. SSL was diametrically opposed to the IETF security vision.


I am afraid you speak of details. These are applications. There is no 
common vision of the reality of the digital ecosystem nature. IETF has fun 
over layer 8 and 9. Layer 8 to 12 have a precise meaning, as has layer 0. 
Sharing this meaning would help a common analysis and avoid confusing 
Multilingual Internet with a bunch of typewritters, using typographer ISO 
tables to document it.



 IETF and IANA have a defacto monopoly on the architecture.

No they don't. W3C and OASIS are both more influential as standards
bodies at this point, particularly once we get above the session layer.


Again you speak of details. Of applications. I am speaking of the network 
architecture. The evolution of the architecture is very very slow.
What I say is that in the real world, users are not interested in all that. 
This is for application providers and applications are decided by the 
users. Who known the W3C and SGML 10 years ago. Will we still know them 10 
years from now?



The URI identifier architecture introduced in PICS and since adopted in
XML eliminates the need for fixed registries like the IANA. That was the
whole point, to eliminate the control point. I did not want a central
registry of PICS censorship schemes. Of course other people did, mostly
the people who used euphemisms like 'content selection' rather than
censorship.


Agree. But IMHO this is a way to introduce at application level the very 
basic root name principle introduced by Robert Tréhin and Joe Rinde in 
1977 which founded the International Network, in part the OSI and defaulted 
to root with the Internet defaulting its architectural parameter to 
mono from multiple in Tymnet and from separated in OSI. This is what 
we have to correct now.


I would phrase it another way. The IANA is one of the many roots in the 
International Network forest. But that trunc of that root hidden the 
forest. The Multilingual Internet is probably the best application to force 
and fund the necessary effort to look at the forests. But some suspect that 
the resulting user-centric architecture (each one having its many roots) 
has a different economical model.


And status quo is the best target for dominant one. At ICANN they use to 
call the stakeholders 



 For example the whole IPv6 issue is that they did not understand that
 their current deployement (2001) is disposable.

The failure to get the deployment stakeholders round the table to ask
the question 'what will it take to make this happen' is in my view the
root cause.


I do not. Because what will make it to happen is the disappearance of 
stakeholders. Let understand, the current network is made of people who 
want to organise, to sell, etc. it. The future stable IPv6 network by 
nature (it would not be an evolution otherwise) will be made of people 
wanting just want to use it. And the first thing they want to get rid of is 
the artificial limitations of the stakeholders.


Take care. I am quite interested in your security factor in relations. Did 
you work on that (I did not recall exactly how you termed it: we called 
delta sec, and people grab the idea quick). I suppose that network 
security could be discussed in a similar way to network value?

jfc








___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


missing mouse

2005-08-02 Thread Aaron Falk
I seem to have left a small wireless mouse somewhere, probably the terminal 
room.  Has anybody seen it?


--aaron

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: I'm not the microphone police, but ...

2005-08-02 Thread John C Klensin



--On Tuesday, August 02, 2005 07:23 -0700 Hallam-Baker, 
Phillip [EMAIL PROTECTED] wrote:



Certainly there are bizare corporations attempting to achieve
some sort of stranglehold. Anyone remember digital convergence
and the CueCat? That type of behavior tends to come from
market entrants rather than established companies. Once you
have a stake in the open Internet the probability of success
in a closed 'walled garden' scheme isn't high enough to be
interesting.


At the risk of providing an irritating counterexample or two...

Please explain this to almost every wireless carrier in the 
world, especially those offering “3G” or similar 
Internet-based data services.   Established actors, significant 
stake in the Internet, but business models based on walled 
gardens.  A discussion with, e.g., AOL, might also be of 
interest.These are, I would suggest, established companies 
and fairly significant market actors.


 john



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Protocol Action: 'Media Type Specifications and Registration Procedures' to BCP

2005-08-02 Thread The IESG
The IESG has approved the following document:

- 'Media Type Specifications and Registration Procedures '
   draft-freed-media-type-reg-05.txt as a BCP

This document has been reviewed in the IETF but is not the product of an
IETF Working Group. 

The IESG contact person is Scott Hollenbeck.

A URL of this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-freed-media-type-reg-05.txt

Technical Summary
 
This document defines procedures for the specification and
registration of media types for use in MIME and other Internet
protocols.  Combined with Multipurpose Internet Mail Extensions
(MIME) Part Four: Registration Procedures (draft-freed-mime-p4),
this draft obsoletes RFC 2048 if approved.
 
Working Group Summary

This document is the work of individual submitters.  It was
subjected to MIME-types review, but it is has not been reviewed
by an IETF working group.  MIME-type review comments have been
incorporated into the document.  Most IETF last call comments were
also incorporated into the document, but one of the Last Call
comments, explicitly allowing text subtypes to be treated
differently in the restricted use case, was not accepted.
There was rough consensus to support this decision.

Protocol Quality

Ted Hardie and Scott Hollenbeck have reviewed this specification
for the IESG.


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce


Document Action: 'TCP/IP Field Behavior' to Informational RFC

2005-08-02 Thread The IESG
The IESG has approved the following document:

- 'TCP/IP Field Behavior '
   draft-ietf-rohc-tcp-field-behavior-04.txt as an Informational RFC

This document is the product of the Robust Header Compression Working Group.
It was also given a review by the TCPM Working Group. 

The IESG contact persons are Allison Mankin and Jon Peterson.

A URL of this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-rohc-tcp-field-behavior-04.txt




___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce


Document Action: 'A Framework for Conferencing with the Session Initiation Protocol' to Informational RFC

2005-08-02 Thread The IESG
The IESG has approved the following document:

- 'A Framework for Conferencing with the Session Initiation Protocol '
   draft-ietf-sipping-conferencing-framework-05.txt as an Informational RFC

This document is the product of the Session Initiation Proposal Investigation 
Working Group. 

The IESG contact persons are Allison Mankin and Jon Peterson.

A URL of this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-sipping-conferencing-framework-05.txt

The WG chair shepherd of this document was Gonzalo Camarillo.


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce


Protocol Action: 'The TLS Protocol Version 1.1' to Proposed Standard

2005-08-02 Thread The IESG
The IESG has approved the following document:

- 'The TLS Protocol Version 1.1 '
   draft-ietf-tls-rfc2246-bis-13.txt as a Proposed Standard

This document is the product of the Transport Layer Security Working Group. 

The IESG contact persons are Russ Housley and Sam Hartman.

A URL of this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-tls-rfc2246-bis-13.txt

Technical Summary
 
  The Transport Layer Security (TLS) protocol provides
  secure communications for connection-oriented data.  A large
  number of network protocols operate over TCP or other
  connection oriented transports.  TLS provides a generic 
  security layer which allows these protocols to treat a 
  connection as an authenticated, confidential channel.  TLS 1.0
  and it's predecessor SSL are widely deployed.  TLS 1.1 is an 
  update to TLS 1.0 which clarifies some issues and fixes some
  known security problems.
 
Working Group Summary
 
  This document is a fairly minor update to TLS 1.0.  There are
  only a few technical changes, and they were fairly noncontroversial.
  No important unresolved issues were raised in Working Group Last
  Call.
 
Protocol Quality
 
  TLS 1.0 is very widely deployed.  GnuTLS claims to support TLS 1.1.
  Some of the changes in TLS 1.0 (reducing the number of different
  alert types sent) are implemented in standard TLS 1.0 implementations
  as well.  The remaining changes to make TLS 1.1 (the explicit IV)
  are very minor and have already been implemented in OpenSSL in
  the context of DTLS, though not TLS.

  This document was reviewed by Russ Housley for the IESG.


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce


Personal Security Reminder

2005-08-02 Thread IETF Secretariat
Please be sure you do not leave any of your belongs unattended anywhere in the
meeting venue, including meeting rooms. Your belongs may be picked up by either
security or someone else and you may not be able to retrieve them.

Several people already have computer bags picked up and they may or maynot be
lost.

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce


PGP Key Signing at IETF63

2005-08-02 Thread IETF Agenda
Once again, we will be holding a PGP Key signing party at the IETF-63
meeting in Paris. We have been scheduled to meet at 1930 on the evening
of Wednesday, August 3 in room 322M.  As usual, if the plenary runs over,
we will start approximately five minutes *after* the plenary session ends.

Please note the unusual time, due to the change in the meeting schedule
for this week.  Note that even though the printed agendas say 2200, we
will meet at approximately 1930, as indicated here and in the online
agenda.  In the unlikely event the agenda should conclude early, we will
begin the key-signing approximately five minutes after the plenary, in
order to allow people to take advantage of the extra time for dinner or
evening social events.

The procedure we will use is the following:

o People who wish to participate may do so in one of two ways. You may
 bring slips of paper with your name, e-mail address, key-id, and key
 fingerprint. (One way of generating this if using gpg is gpg
 --list-keys --fingerprint [EMAIL PROTECTED]) You should bring
 enough for everyone who may attend; given recent attendance patterns,
 around 50 should be more than enough. (You can generally fit 10-12
 strips containing your key fingerprint on a single sheet of paper, and
 then cut out strips to hand out.)

o Alternatively, you may email an ASCII extract of their PGP public key
 to [EMAIL PROTECTED] by noon on Wednesday, August 3(*). Please include
 a subject line of IETF PGP KEY, and please DO NOT MIME-ENCRYPT your
 e-mail. Send it to me as plain text, and do NOT base-64 encode things.
 (My process is not quite as automated as Ted's, so I'll probably be able
 to notice and fix any problems, but it's better not to take chances).

 The method of generating the ASCII extract under Unix is:

   pgp -kxa my_email_address mykey.asc (pgp 2.6.2)
   pgpk -xa my_email_address  mykey.asc (pgp 5.x)
   gpg --export -a my_email_address  mykey.asc (gpg)

 If you're using Windows or Macintosh, hopefully it will be Intuitively
 Obvious (tm) using the GUI interface how to generate an ASCII armored
 key that begins -BEGIN PGP PUBLIC KEY BLOCK-.

o By 1700 on Wednesday, you will be able to fetch complete key ring
 from any of the following locations with all of the keys that were
 submitted:

   /afs/grand.central.org/project/ietf-pgp/ietf63/ietf63.pgp
   http://grand.central.org/dl/ietf-pgp/ietf63/ietf63.pgp
   ftp://grand.central.org/pub/ietf-pgp/ietf63/ietf63.pgp

o At 1930, come prepared with the PGP Key fingerprint of your PGP
 public key; we will have handouts with all of the key fingerprints of
 the keys that people have mailed in.

o In turn, readers at the front of the room will recite people's keys;
 as your key fingerprint is read, stand up, and at the end of reading
 of your PGP key fingerprint, acknowledge that the fingerprint as read
 was correct.

o Later that evening, or perhaps when you get home, you can sign the
 keys corresponding to the fingerprints which you were able to verify
 on the handout; note that it is advisable that you only sign keys of
 people when you have personal knowledge that the person who stood up
 during the reading of his/her fingerprint really is the person which
 he/she claimed to be.

o Send the signed keys to the owners, and, optionally, to the PGP key
 servers. Some poeple opt to NOT send the signed keys to the
 keyservers, but rather choose to send them only to the e-mail address
 on the key's userid, encrypted for that particular key. This tends to
 ensures the validity of the e-mail address.

Note that you don't have to have a laptop with you; if you don't have
any locally trusted computing resources during the key signing party,
you can make notes on the handout, and on the strips of papers, and then
take these and sign the keys later.

Acknowledgement: The bulk of the text of this message was taken from the
messages usually sent by Ted Ts'o to announce IETF key signing parties.

(*) Normally I'm pretty lax about the noon deadline, accepting things
as late as during the plenary.  However, in order to keep things running
on time with the unusual schedule of this week's meeting, I intend to
prepare the photocopied fingerprint lists before the plenary session.
So, I'll be applying the deadline more strictly than usual.


-- Jeffrey T. Hutzelman (N3NHS) [EMAIL PROTECTED]
  Sr. Research Systems Programmer
  School of Computer Science - Research Computing Facility
  Carnegie Mellon University - Pittsburgh, PA

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce