Re: delegating (portions of) ietf list disciplinary process

2005-09-29 Thread Dave Crocker




2. An IETF netiquette committee, to offload list banning procedures
from the IESG.


I don't think so.  I prefer that this responsibility stay with a few
individuals, so that it is taken very seriously -- not only by them
but by everyone.  A committee would lead to dilution of responsibility
as well as endless discussion on every dispute.


Good point.

As much as I believe the IETF should not give veto authority to any single 
individual, this is one case where it is probably better.


My sense is that, without exception, IETF participants involved in deciding 
process objections has taken their role extremely seriously.  It's difficult 
to believe that this would be any different.  In addition, any abuse by the 
ombudsperson will be very quickly reported and corrected.


d/
--

 Dave Crocker
 Brandenburg InternetWorking
 +1.408.246.8253
 dcrocker  a t ...
 WE'VE MOVED to:  www.bbiw.net

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: delegating (portions of) ietf list disciplinary process

2005-09-29 Thread Nick Staff
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On 
 
  2. An IETF netiquette committee, to offload list banning 
 procedures 
  from the IESG.
  
  I don't think so.  I prefer that this responsibility stay 
 with a few 
  individuals, so that it is taken very seriously -- not only by them 
  but by everyone.  A committee would lead to dilution of 
 responsibility 
  as well as endless discussion on every dispute.
 
 Good point.
 
 As much as I believe the IETF should not give veto authority 
 to any single individual, this is one case where it is 
 probably better.
 
 My sense is that, without exception, IETF participants 
 involved in deciding process objections has taken their role 
 extremely seriously.  It's difficult to believe that this 
 would be any different.  In addition, any abuse by the 
 ombudsperson will be very quickly reported and corrected.
 
 d/
 -- 
 
   Dave Crocker
Dave-

Of course it's a matter of opinion, so it's not like I'm trying to tell you
I'm right and you're wrong, but think about every high court in the United
states and many in Europe - none of them are 1 person but rather a group.
There are reasons for this, most important of which is no one is right all
the time - no one no matter how wisened sees every situation clearly from
all angles - not to  mention most everyone has their hot issues and areas of
predjudice or misunderstanding.  Having a group of seven or nine helps
neutralize individual errors.  I'd feel much safer being judged by tcp than
udp.

nick


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Minority opinions [Re: [EMAIL PROTECTED]: Mismanagement of the DNSOP list]]

2005-09-29 Thread Brian E Carpenter

JFC (Jefsey) Morfin wrote:

At 19:17 27/09/2005, Brian E Carpenter wrote:


...

My proposition would be to create a minority position system. Where 
such groups could be accepted as opposing without having to be fighting.



There is a perfectly civilised way of handling minority opinions already.

Please see RFC 3246 and RFC 3248 for an example I was personally
involved in. 3246 is the consensus and 3248 is the minority
opinion.



Unfortunately not. RFC 3246 is Standard Track, RFC 3248 is 
informational. RFC 3246 is published.


They are both published, and obviously the consensus document is
the one on the standards track. It exactly an example of the IETF
publishing a minority opinion. Obviously, we couldn't publish two
standards for the same bits.

This case is when two IETF groups 
have different opinions.


The case I refer to is when an SSDO consensus opposes an IETF-WG 
consensus, 


That doesn't affect what the IETF publishes. The IETF publishes
the documents that it reaches consensus on, after considering all
contributions. Liaisons from other SDOs are considered. That doesn't
mean we take them as instructions or have any obligations.

When we become aware of another SDO working on an alternative
solution, we normally attempt to engage in dialogue, but there is
no algorithm for how that dialogue will terminate.

while the Internet is no more a place where one can consider 
that an erroneous RFC supported by market leaders will quickly deprecate 
and not hurt.


The resources of the other SSDO are dedicated to its own business. It 
may however make the effort of a QA delegate to the Internet standard 
process. Experience shows that without an MoU a conflict may quickly 
develop (as if two foot-ball teams met, but one team would, in addition 
to be a challenger, have only one player present. This is all the more 
true if the results of the match counts for the world cup).


The minority position would avoid to enter into an SSDO/IETF complex 
MoU and liaison committee (I feel you are not found of anyway). All the 
more than the problem may be purely occasional and the solution be to 
politely pay attention to mutual needs rather than to ban the SSDO 
liaison. This can only be detrimental to a final common solution and 
would resolve nothing since the SSDO has human resources a plenty.


If people from another SDO wish to submit a draft for publication as
an RFC, I can't see any reason why the RFC 3248 approach won't work.
I can't see any need to add more process than we already have.

Brian



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


UN plans to take over our job!

2005-09-29 Thread Will McAfee
http://www.theregister.co.uk/2005/09/28/wsis_geneva/
This is not their place to be deciding as if they ever
owned the Internet. They have no rights to the Internet,
by the very nature of it's structure.
___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: UN plans to take over our job!

2005-09-29 Thread Brian E Carpenter

Will, don't believe everything you read on the Web.

ISOC is heavily involved on our behalf in the WSIS
meetings and despite all the noise I am hopeful that
rational results will occur.

Brian

Will McAfee wrote:

http://www.theregister.co.uk/2005/09/28/wsis_geneva/
This is not their place to be deciding as if they ever
owned the Internet. They have no rights to the Internet,
by the very nature of it's structure.





___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: [dnsop] [EMAIL PROTECTED]: Mismanagement of the DNSOP list]

2005-09-29 Thread Dean Anderson
On Thu, 29 Sep 2005, grenville armitage wrote:

 Since when have political conspiracy theories, 

Political conspiracy theory? The disparagement machine is working overtime.

 allusions to impending legal action

I made no allusions.  I demanded compliance with the law and performance of
fiduciary duty, and for the IETF to stop defamation. That isn't an allusion.

 and references to other people's dating lives 

I made no reference to anyone else's dating life.  However, memory serves that
we dated the same girl.  It is quite reasonable to question if the new partner
of a lost romance is a target for long term vengeful behavior and animosity.  
Some people hold these grudges their entire lives.

 been admirable examples of 'forceful, stubborn, or persistent' discourse?

These characteristics are all more admirable than court proven liar,
professionally dishonest, or lack of personal integrity


--Dean

-- 
Av8 Internet   Prepared to pay a premium for better service?
www.av8.net faster, more reliable, better service
617 344 9000   




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Correct middlebox behavior

2005-09-29 Thread Melinda Shore
On 9/28/05 6:50 PM, Fleischman, Eric [EMAIL PROTECTED] wrote:
 I believe that Keith's first paragraph below is widely accepted by the
 IETF. However, after re-reading RFC 3234, RFC 3303, and others I did not
 find any text within any RFC to explain our consensus opinion concerning
 correct middlebox behavior to be used to guide those outside of our
 community.

Well, there is no IETF consensus on correct middlebox behavior.
The behave working group is putting together documents that
I think are probably pretty close to what you're asking for.
RFC 3424 describes IAB concerns about some NAT workaround
techniques but in that case the burden is on the workaround,
not the middlebox.

Melinda

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: delegating (portions of) ietf list disciplinary process

2005-09-29 Thread Dean Anderson
On Thu, 29 Sep 2005, Nick Staff wrote:

 Of course it's a matter of opinion, so it's not like I'm trying to tell you
 I'm right and you're wrong, but think about every high court in the United
 states and many in Europe - none of them are 1 person but rather a group.
 There are reasons for this, most important of which is no one is right all
 the time - no one no matter how wisened sees every situation clearly from
 all angles - not to  mention most everyone has their hot issues and areas of
 predjudice or misunderstanding.  Having a group of seven or nine helps
 neutralize individual errors.  I'd feel much safer being judged by tcp than
 udp.

This is a good idea.

--Dean

-- 
Av8 Internet   Prepared to pay a premium for better service?
www.av8.net faster, more reliable, better service
617 344 9000   



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: delegating (portions of) ietf list disciplinary process (fwd)

2005-09-29 Thread Dean Anderson
Let me ask you Ken: Are you participating in the IETF as part of your job?  Or
are you just here for personal kicks?

On Thu, 29 Sep 2005, Ken Raeburn wrote:

 Perhaps there is no legal standing for an expectation of privacy.   

It has nothing to do with legal standing. Its a question of etiquette.  Office
etiquette and backyard-fence etiquette are different.

 Still, it is generally considered discourteous among most serious email users,
 I think.  But we seem to have gone past the point where that matters to
 people.

This is only true with respect to PERSONAL communication. BUSINESS communication
is not personal communication.  

If my friends tell me something personal outside of business, I keep it private,
because its personal.  My friends don't write personal notes to the IETF Chair
complaining about me and my company. [certainly not feigning having no
position.] That would be business, and they probably wouldn't be my friends
anymore.

If you file a motion with the FCC or write a nasty gram to the IETF Chair, its a
business document. I have every right to publish it. Its not personal. 

And I do business favors, too, but I have no obligation to do so.

You don't understand the distinction between business and personal.

Actually, I'm now convinced that this is the whole problem with the abuse at the
IETF: An inability to distinguish between personal and organizational interests
and subject matter.

 So, if I wanted to make comments to you about IETF matters, people's personal
 conduct on mailing lists, etc, that I didn't want made public to fuel
 arguments I specifically don't want to add to, I should ask you to sign an NDA
 first?  Got it, I'll keep that in mind.

Those are business topics.  If you are concerned about fueling something, then
you should keep silent. Only a lack of fact adds fuel, otherwise known as
hyperbole.  You should consider your business commications differently from your
personal communications.

 This has been vaguely entertaining for a while, at least until a friend of
 mine became one of the side targets.

Oh, I sympathize.  I thought it funny too, until I became a target of repeated
abuse, defamation, and disparagement for merely making true statements that
counterfeit anti-spammers didn't like.

The good thing is, lies wash off. But the truth sticks with you forever. Once
you are a Court-proven liar, associate with a court-proven liar, dishonest etc.,
that doesn't go away.  Alan Brown will be a 3-time court proven liar for the
rest of his life, unless he becomes a 4-time court proven liar.  Nothing he does
will ever remove that.  

Even a lesser miscreant, Chris Neill, fired for conducting open relay abuse he
was convinced was undetectable in 1999, just recently sent me a nasty gram.  6 
years later, and he hasn't forgotten. 

--Dean

-- 
Av8 Internet   Prepared to pay a premium for better service?
www.av8.net faster, more reliable, better service
617 344 9000   






___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Fwd: UN plans to take over our job!

2005-09-29 Thread Will McAfee
-- Forwarded message --From: Will McAfee [EMAIL PROTECTED]Date: Sep 29, 2005 10:22 AM
Subject: Re: UN plans to take over our job!To: Doo Timbir [EMAIL PROTECTED]Looking back, I guess I was talking like an idiot. I apologize, for this, was just outraged at this treatment of the Internet as something they owned. And also The Register is no tabloid. =/ 

On 9/29/05, Doo Timbir [EMAIL PROTECTED] wrote:
 

I personally think that it is too late for any group to lay hold of the Internet.

The right thing to do is to allow it to be[exist] the way it is period!

Sincerely,
Doo Timbir.Will McAfee [EMAIL PROTECTED] wrote:


http://www.theregister.co.uk/2005/09/28/wsis_geneva/
This is not their place to be deciding as if they ever
owned the Internet. They have no rights to the Internet,
by the very nature of it's structure.___Ietf mailing list
Ietf@ietf.orghttps://www1.ietf.org/mailman/listinfo/ietf




Yahoo! Messenger NEW - crystal clear PC to PC 
calling worldwide with voicemail 


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Question about the normative nature of IETF RFCs

2005-09-29 Thread C. M. Heard
JFC (Jefsey) Morfin wrote:
 Interestingly, Transpac, the French X.25/Minitel network (by then the
 largest data network in the world, so acting as a kind of reference)
 published a test machine (probably around 1982?) everyone could use
 to verify his conformance to the (stringent) network requirments. At
 the Den Hague ISIS Club (1984?) the Dutch PTTs proposed to extend that
 pratice to the whole International Network, standardising the running
 test program concept (for OSI, DECNET, IBM/SNA, Swift, Sita, etc..
 then supported protocols). . This was further discussed within the
 CEPT (European Public Operators Club) for OSI services, but I did not
 heard of any decision or CCITT (ITU-T) proposition. This kind of
 standardisation by the running test was a standard question when
 discussing a new root name interconect. But I do not think it was used
 by any other OSI operators ?
 
 The concept is however appealing: to add a test running code to an
 RFC, as a way to document, check and enforce its standard?

My experience with this sort of thing was pretty negative.  I worked
on an X.25 DTE implementation in the early 1980s, and we had to get
it certified by a US government agency in order to be allowed on one
of the government networks.  The certification code appeared to have
had been written by a junior engineer, and it required behaviour that
was inconsistent with the written standards and would have caused
significant interoperability problems.  So we did what everyone else
did:  we submitted hacked code for the certification test, got the
certification paper, and then deployed our original code (which was
compliant with the standard and was known to interoperate with the
equipment we had to talk to).

My hazy recollection of the Transpac certification tests is that
their test machine actually did a relatively good job, but that they
did not require certification to connect to their network.  IIRC
they didn't believe that non-conforming behaviour from a DTE would
harm the network ... if it failed to interoperate, it the
customer/vendor would be motivated to fix it.

//cmh


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Minority opinions [Re: [EMAIL PROTECTED]: Mismanagement of the DNSOP list]]

2005-09-29 Thread JFC (Jefsey) Morfin

At 13:32 29/09/2005, Brian E Carpenter wrote:

They are both published, and obviously the consensus document is
the one on the standards track. It exactly an example of the IETF
publishing a minority opinion. Obviously, we couldn't publish two
standards for the same bits.


Dear Brian,
this is why we need to find ways to help consensual standard publication first.
The problem is worst if the document claims to be a BCP.


This case is when two IETF groups have different opinions.
The case I refer to is when an SSDO consensus opposes an IETF-WG consensus,


That doesn't affect what the IETF publishes. The IETF publishes
the documents that it reaches consensus on, after considering all
contributions. Liaisons from other SDOs are considered. That doesn't
mean we take them as instructions or have any obligations.


We should not be here to develop non-interoperability.
However we know that competition may lead to some oddities. This is 
the theme of RFC 3869.



When we become aware of another SDO working on an alternative
solution, we normally attempt to engage in dialogue, but there is
no algorithm for how that dialogue will terminate.


normally should be replaced by SHOULD.

All what I call for is not even to engage in a dialog, but to respect 
others and not refuse the dialog. And a way to politely but clearly 
address the possible non-technical motivations. I think an Ombudsman 
can help that. And that the minority position is the way to inform 
that he has been informed and taken the issue seriously. The impact 
is only to make the things even. Disfavors no one, helps everyone.



If people from another SDO wish to submit a draft for publication as
an RFC, I can't see any reason why the RFC 3248 approach won't work.
I can't see any need to add more process than we already have.


The RFC 3248 approach is internal to IETF.

Other SSDOs have their own charters and agenda. We are talking of 
interoperability. When IETF disregards others, it is lucky others pay 
attention and delegate a resource they need. Forcing others to become 
more competent in a whole IETF area they are not interested in to 
publish a document so the better win, just to prevent a lobby from 
creating a profitable interoperability conflict with other commercial 
or non-profit/publicly funded SSDO, is not the way I see global 
networking. Please consider RFC 3869.


I may be wrong though.
jfc


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: Question about the normative nature of IETF RFCs

2005-09-29 Thread Bill Sommerfeld
On Wed, 2005-09-28 at 16:50, Fleischman, Eric wrote:
 That RFC said hosts do X and other devices (which in that era meant
 routers) do Y. They do Y because they are not hosts -- 

middleboxes are sometimes router-like, and sometimes host-like, and
sometimes both at the same time, and sometimes neither.

And this is just another instance whereby the specs are always
incomplete -- something new comes along which is neither host nor
router.  and, in such cases, implementors need to use their brains about
which behavior makes most sense given the context rather than
interpreting the words in the spec as if they were code.

 rather than correctly behaving as middleboxes are supposed to do.

except that I don't believe there's a single type of middlebox ...

- Bill



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Question about the normative nature of IETF RFCs

2005-09-29 Thread Melinda Shore
On 9/29/05 1:24 PM, Bill Sommerfeld [EMAIL PROTECTED] wrote:
 except that I don't believe there's a single type of middlebox ...

There certainly isn't.  RFC 3234 created a middlebox taxonomy
based on what we knew at the time, and I think it's held up
pretty well over the past three years.  People worried about
middleboxes should probably give it a read.

Melinda

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: Minority opinions [Re: [EMAIL PROTECTED]: Mismanagement of the DNSOP list]]

2005-09-29 Thread Thomas Gal
 At 13:32 29/09/2005, Brian E Carpenter wrote:
 They are both published, and obviously the consensus document is the 
 one on the standards track. It exactly an example of the IETF 
 publishing a minority opinion. Obviously, we couldn't publish two 
 standards for the same bits.
 
 Dear Brian,
 this is why we need to find ways to help consensual standard 
 publication first.
 The problem is worst if the document claims to be a BCP.
 
 This case is when two IETF groups have different opinions.
 The case I refer to is when an SSDO consensus opposes an IETF-WG 
 consensus,
 
 That doesn't affect what the IETF publishes. The IETF publishes the 
 documents that it reaches consensus on, after considering all 
 contributions. Liaisons from other SDOs are considered. That doesn't 
 mean we take them as instructions or have any obligations.
 
 We should not be here to develop non-interoperability.
 However we know that competition may lead to some oddities. 
 This is the theme of RFC 3869.
 

So you said:
1) we shouldn't develop anything that disagrees with anything else (implying
external consensus as well as internal consensus).
-AND-
2) we should support spreading minority opinions, and the minority opinion
should be of the same status as the main opinion. 

That position is untenable. First you complained about the lack of minority
opinion, then the difference in status, then the fact that everyone didn't
just hang around waiting for everyone to agree. Perhaps instead of repeated
disagreement with people's positions, you should offer a clear concise
vision of your own.

As far as finding a consensual standard, in anything I believe an open
mike in coordination with rough consensus and running code will always be
the best answer. 

 When we become aware of another SDO working on an 
 alternative solution, 
 we normally attempt to engage in dialogue, but there is no algorithm 
 for how that dialogue will terminate.
 
 normally should be replaced by SHOULD.
 

Why? So people who disagree internally can form an external body to
essentially propigate a DOS situation on our progress? So instead of
focusing on the technical issue at hand we can have engineers and scientists
(mostly) concerned with politics and diplomacy? I do not agree at all.

 All what I call for is not even to engage in a dialog, but to 
 respect others and not refuse the dialog. And a way to 
 politely but clearly address the possible non-technical 
 motivations. I think an Ombudsman can help that. And that the 
 minority position is the way to inform that he has been 
 informed and taken the issue seriously. The impact is only to 
 make the things even. Disfavors no one, helps everyone.
 

Who is not permitted to make their voice heard on an IETF list? Are you
saying non-technical matters should in any way trump technical issues? I
don't believe that idea will find much of a home in this forum.

 If people from another SDO wish to submit a draft for 
 publication as an 
 RFC, I can't see any reason why the RFC 3248 approach won't work.
 I can't see any need to add more process than we already have.
 
 The RFC 3248 approach is internal to IETF.
 
 Other SSDOs have their own charters and agenda. We are 
 talking of interoperability. When IETF disregards others, it 
 is lucky others pay attention and delegate a resource they 
 need. Forcing others to become more competent in a whole IETF 
 area they are not interested in to publish a document so the 
 better win, just to prevent a lobby from creating a 
 profitable interoperability conflict with other commercial or 
 non-profit/publicly funded SSDO, is not the way I see global 
 networking. Please consider RFC 3869.
 
 I may be wrong though.

I don't know about wrong, but seemingly political. It seems you've managed
to find fault in many other's statements (sometimes to the point of
contradicting your own), and succeded in prognosticating doomsday scenarios
all without suggesting a proactive response or outcome in anyway.

-Tom


smime.p7s
Description: S/MIME cryptographic signature
___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: UN plans to take over our job!

2005-09-29 Thread Anthony G. Atkielski
Will McAfee writes:

 http://www.theregister.co.uk/2005/09/28/wsis_geneva/
 This is not their place to be deciding as if they ever
 owned the Internet. They have no rights to the Internet,
 by the very nature of it's structure.

Placing governments in charge of the Internet would be a disaster, the
worst possible thing that could happen to it.


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Correct middlebox behavior

2005-09-29 Thread Joe Touch
This doesn't cover all of what middleboxes do, but the part about them
faking responses (e.g., to splice connections), hijacking, or NATing are
covered in RFC1122 sec 3.2.1.3:

When a host sends any datagram, the IP source address MUST
be one of its own IP addresses (but not a broadcast or
multicast address).

I don't see anything in 1812 that prohibits routers from modifying the
contents of an IP datagram, but the term 'forwarding' never permits
modification of the IP payload either.

Joe

Fleischman, Eric wrote:
 Friends,
 
 I believe that Keith's first paragraph below is widely accepted by the
 IETF. However, after re-reading RFC 3234, RFC 3303, and others I did not
 find any text within any RFC to explain our consensus opinion concerning
 correct middlebox behavior to be used to guide those outside of our
 community. Specifically, can anyone point me to text within any RFC that
 states the ideas contained within Keith's first paragraph below?
 
 --Eric
 
 -Original Message-
 From: Keith Moore [mailto:[EMAIL PROTECTED] 
 Subject: Re: Question about the normative nature of IETF RFCs
 
 
Most protocols weren't designed to operate with middleboxes. 
In the absence of a provision in a protocol specification for 
a middlebox, any middlebox that interferes with the 
interoperation of a protocol is inherently violating the 
protocol standards.
 
 
In general, protocol specifications don't (and shouldn't)
try to explicitly enumerate don't do X for every possible 
X that is harmful.  And middleboxes are generally harmful.
 
 
 
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www1.ietf.org/mailman/listinfo/ietf


signature.asc
Description: OpenPGP digital signature
___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: UN plans to take over our job!

2005-09-29 Thread Joel Jaeggli

On Thu, 29 Sep 2005, Anthony G. Atkielski wrote:


Will McAfee writes:


http://www.theregister.co.uk/2005/09/28/wsis_geneva/
This is not their place to be deciding as if they ever
owned the Internet. They have no rights to the Internet,
by the very nature of it's structure.


Placing governments in charge of the Internet would be a disaster, the
worst possible thing that could happen to it.


I'm the king, and you're nothing!

That's right, you're the king of nothing.

With appologies to Alice and Ralph

joelja



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf



--
--
Joel Jaeggli   Unix Consulting [EMAIL PROTECTED]
GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: delegating (portions of) ietf list disciplinary process (fwd)

2005-09-29 Thread Ken Raeburn

On Sep 29, 2005, at 9:39, Dean Anderson wrote:
Let me ask you Ken: Are you participating in the IETF as part of  
your job?  Or

are you just here for personal kicks?


It's part of my job; has been for a few years.

It has nothing to do with legal standing. Its a question of  
etiquette.  Office

etiquette and backyard-fence etiquette are different.


True.

Still, it is generally considered discourteous among most serious  
email users,
I think.  But we seem to have gone past the point where that  
matters to

people.


This is only true with respect to PERSONAL communication. BUSINESS  
communication

is not personal communication.


Business communication is not one homogeneous class of  
communications.  Technical matters on the IETF lists are one thing;  
personnel discussions about employees would be quite another.  And  
the level of privacy expected, and the degree of rudeness associated  
with publishing someone's not-previously-public communications, vary;  
they are not binary choices.  Email I might exchange with selected  
individuals outside MIT on how to implement some feature in our (open  
source, repository-accessible) product would fall somewhere in  
between.  In my experience there is certainly work-related email that  
is not legally required to be private but would be considered rude to  
disseminate widely without getting permission.


In this particular case, where it sounds like the mailing list was  
explicitly kept off the recipient list, that sounds like a pretty  
clear indication that the sender probably didn't want it as public as  
the previous mail being responded to -- much as if someone took you  
aside from a crowd to make a couple of comments instead of shouting  
at you in the middle of the room.  Perhaps you don't distinguish  
those cases; other people do.  But apparently your interpretation of  
business etiquette trumps his wishes, and whatever his intent was in  
not including the IETF at large ... in your mind, though apparently  
not his, and not mine.



You don't understand the distinction between business and personal.


I understand that the type of a communication cannot be fully  
represented in one binary digit.


Actually, I'm now convinced that this is the whole problem with the  
abuse at the
IETF: An inability to distinguish between personal and  
organizational interests

and subject matter.


There may be some of that.  I strongly doubt that's all there is to  
it, though.


So, if I wanted to make comments to you about IETF matters,  
people's personal

conduct on mailing lists, etc, that I didn't want made public to fuel
arguments I specifically don't want to add to, I should ask you to  
sign an NDA

first?  Got it, I'll keep that in mind.


Those are business topics.  If you are concerned about fueling  
something, then
you should keep silent. Only a lack of fact adds fuel, otherwise  
known as

hyperbole.


Sometimes what's needed is to encourage both sides to step back a bit  
from a dispute for a while, or suggest that one side use or abandon  
some specific line of argument to make the discussion more  
productive.  I think that's sometimes better done in private  
communication with individual parties rather than in public, but it's  
still business, and one shouldn't need an NDA to figure out that it's  
preferably not to be made public.  (Then again, I guess sometimes  
making it public -- look!  even so-and-so thinks you're a loser!   
clearly I'm right! -- may suit one person's desire to fan the  
flames, or to win at all costs.  It may be jumping to conclusions  
to think that *everyone* wants a polite, productive discussion, or  
that they're capable of engaging in one in the face of strong  
opposition)




I'm sad to say, I've actually looked at a little of the stuff you've  
posted on the web page you set up recently, concerning Ted Ts'o.  I  
picked the July 1 off-list stuff to look at, briefly.  From that  
admittedly small sample... let me try to phrase this carefully to  
avoid anything that might be construed as an ad-hominem attack: I  
disagree with your summary of some of the messages I reviewed.


Ted disagrees with you on the importance of some things you bring up,  
and says what you're presenting isn't very useful (to the discussion  
at hand, I would assume he meant, on reading his message); your  
summary turns this into ``Tso says facts are not useful to the  
IETF.''  Without a qualifier like these facts and this  
discussion, that's an unsupported, even absurd, generalization;  
you're ascribing to Ted statements that he did not make.


Ted asked for information on the court-proven liars (plural, your  
phrase), and you seem to have responded with info on multiple court  
cases against one person.  Ted points that out, and uses the somewhat  
inaccurate description lost a lawsuit in doing so.  He does  
acknowledge that this *one* person is, in at least one instance, a  
court-proven liar as you put it; his 

Re: delegating (portions of) ietf list disciplinary process (fwd)

2005-09-29 Thread Harald Tveit Alvestrand
--On torsdag, september 29, 2005 17:02:48 -0400 Ken Raeburn 
[EMAIL PROTECTED] wrote:



So, to summarize my look at a few of the messages: You both lose  points
for some of your statements or how you tried to make your  arguments, and
the accuracy of the summary page is questionable.   None of it, so far,
really suggests any sort of professional  dishonesty on Ted's part to me.
(If this were a research paper  instead of an email message, I'd probably
want him to be much more  careful and even pedantic in his arguments, but
that would be about  the quality of the work, not honesty.)


I think you illustrate quite well why I'm glad I don't have to talk to Dean 
Anderson any more.


Any conversation where I can't toss of a casual remark without getting 
virtually crucified for it is a conversation not worth having.






___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: UN

2005-09-29 Thread Alexis Turner
I don't want to clutter up everyone's inboxes with dozens of rants that
amount to hyperventilating and lots of Iiii's!, but if anyone would
like to e-mail me off list with their thoughts on the UN's WSIS conference
and why having them replace ICANN would be a good/bad thing for the
Internet, I would love to hear it.  I'm not looking to pick a fight or
argue - I'm just honestly interested in hearing the various opinions.  The
issue is a lot bigger than anything I can get my head around right now,
and hearing what other people have to say would help me think about it
more constructively.

I myself am on this list more or less Just for kicks, or, as I prefer to
think of it, personal edification, but do note that it is possible
quotes from your e-mails will make it onto a personal site that I use for
my own rambling and probably incoherent research.  If you don't want
this, just say so.
-Alexis

PS: Bonus points if you actually read what they are proposing before you
respond.

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: delegating (portions of) ietf list disciplinary process (fwd)

2005-09-29 Thread Alexis Turner
Geez, Harald.  You misspelled off.  Am I going to have to virtually
crucify you in front of the list for this?
-Alexis


On Thu, 29 Sep 2005, Harald Tveit Alvestrand wrote:

::I think you illustrate quite well why I'm glad I don't have to talk to Dean
::Anderson any more.
::
::Any conversation where I can't toss of a casual remark without getting
::virtually crucified for it is a conversation not worth having.

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: UN

2005-09-29 Thread Peter Dambier

Alexis Turner wrote:

I don't want to clutter up everyone's inboxes with dozens of rants that
amount to hyperventilating and lots of Iiii's!, but if anyone would
like to e-mail me off list with their thoughts on the UN's WSIS conference
and why having them replace ICANN would be a good/bad thing for the
Internet, I would love to hear it.  I'm not looking to pick a fight or
argue - I'm just honestly interested in hearing the various opinions.  The
issue is a lot bigger than anything I can get my head around right now,
and hearing what other people have to say would help me think about it
more constructively.

I myself am on this list more or less Just for kicks, or, as I prefer to
think of it, personal edification, but do note that it is possible
quotes from your e-mails will make it onto a personal site that I use for
my own rambling and probably incoherent research.  If you don't want
this, just say so.
-Alexis

PS: Bonus points if you actually read what they are proposing before you
respond.



Hi Alexis,

I followed the discussion list. I could hardly follow it.

Is there a UN?

To me it looks like a bunch of small and not so small dictators at the table
and several rooms full of intelligent people outside.

It might be interesting to give them the internet. But how should you do
that? What could they do with it?

Give them the root. The root operators will laughingly stand up and go away.
Each of them will start running his own root on his own hardware.

The internet hardware? Belongs to companies that were not allowed to join.
How should all the internet operators find out what the UN want them to
do if they dont allow them in?

I dont think anything but a lot of wasted paper will come out of that meeting.


Kind regards,
Peter and Karin Dambier


--
Peter and Karin Dambier
Public-Root
Graeffstrasse 14
D-64646 Heppenheim
+49-6252-671788 (Telekom)
+49-179-108-3978 (O2 Genion)
+49-6252-750308 (VoIP: sipgate.de)
+1-360-448-1275 (VoIP: freeworldialup.com)
mail: [EMAIL PROTECTED]
http://iason.site.voila.fr
http://www.kokoom.com/iason


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: UN

2005-09-29 Thread Paul Hoffman

At 1:41 AM +0200 9/30/05, Peter Dambier wrote:

Give them the root. The root operators will laughingly stand up and go away.
Each of them will start running his own root on his own hardware.


You talk as if you were a root operator and you know what they would 
do. In fact, you run an alternate root, not a real root, so it seems 
that you knowing what real root operators would do is particularly 
unlikely.


--Paul Hoffman, Director
--VPN Consortium

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: delegating (portions of) ietf list disciplinary process

2005-09-29 Thread Nick Staff
 From: Theodore Ts'o [mailto:[EMAIL PROTECTED] 
 

Ted-
Sorry for taking so long to respond - I wanted to give some thought to your
questions before replying (comments in-line)


 On Tue, Sep 27, 2005 at 06:47:36PM -0700, Nick Staff wrote:
   2. An IETF netiquette committee, to offload list banning 
   procedures from the IESG.
 
  I'm a big fan of the netiquette committee.  I'd like to 
 suggest that 
  volunteers be allowed to throw their names into the hat and that 
  members be selected blindly from that pool.  This would of course 
  avoid any stacking or favoritism, but we would need a 
 qualifier that 
  prevented interlopers from submitting their name.  Though I hate to 
  suggest it as it would exclude me from selection, having 
 attended an 
  IETF meeting in the last x years could possibly be a good filter.
 
 Maybe.  I see two potential problems:
 
 1) Serving on this committee is going to be no fun at all.  
 Getting qualified people to sign up for what will only be 
 seen as a sh*t job is going to be difficult. 

I figure if Brian was able to get multiple volunteers for the IESG scribe
position (of which I was one), then this should be a cakewalk ;)

 And how do you 
 exclude certain known
 (repeat) troublemakers from throwing their hat into the ring? 
  Or maybe you don't, but then if they get selected, they 
 would then have the opportunity to practice their own unique 
 form of DOS on the netiquette committee?
 
Here are some general design points I've been thinking about to help prevent
the DOS you speak of as well as some other pitfalls:

1. 7 or 9 member committee
2. Members selected blindly from pool of volunteers
*Let's not forget that no matter who you are, there is someone out there who
thinks you're a troublemaker, that you're dumb, mean, etc.  This is why it's
open to all volunteers, to prevent the tainting of the committee and the
stacking towards one point of view.*
3. Majority can close discussion and force vote
3a. Unanimous minority can stay vote for max of 2 days
4. Verdicts are made up of 2 separate votes
4a. In the first vote, the committee members vote whether to sustain or
refute the petitioners claim.
4b. In the second vote (which immediately follows the first) the members
vote on the punishment. One of the choices MUST always be to issue a
warning.  The other choices will vary depending on the petition.
4bb.  Anyone who is issued 3 warnings in less that a years time, on
subsequent punishment votes there MUST NOT be the choice to issue a
warning.  This will be for a period of 1 year beginning on the day their
third warning was issued.
4c. Note that when a petition is sustained the committee votes on a
PUNISHMENT FOR THE ACCUSED, and when a petition is refuted the committee
votes on a PUNISHMENT FOR THE ACCUSER.  This should help curtail frivolity.
5. Any sentence suspending someone's posting rights due to abusive/off-topic
posts is required to pass with no greater than 1 dissenter.  This is to
enforce the idea that if there can be sensible disagreement about whether a
post's off-topic, then it's too subjective for such a serious punishment.
5a. When 2 voting choices differ only on length of time, then their votes
may be added together to reach the needed majority - however in those cases
the shorter of the two sentences MUST be imposed.  For example if 6 members
vote for a 1 year ban and 2 vote for 30 days (with 1 voting for a warning)
then even though there is not sufficient majority for a ban, the six votes
and the two votes can be added together which means the ban will pass -
however it can only be a 30 day ban and can never be the greater of the two.
6. In all cases the dissenting minority is allowed to publish their
dissention along-side the majority verdict (in fact, one MUST NOT ever be
stored, displayed, or considered without the other.

 2) Unless discussion of the decisions of the netiquette 
 committee, during the committee is considering a request, and 
 after the committee has rendered a decision, is ruled out of 
 scope, it's not going to help the very long discussions such 
 as this one which plague the IETF list.
 In the worst case, we can assume that the mailing list abuser 
 will immediately appeal any decision of the netiquette 
 committee, which means that after inventing this entire 
 mechanism, it may not have any effect other than prolonging the agony.

I know personally, if I feel a process is fair, then even if I hate the
decision I can accept it and move on.  That's another reason why I think it
should be an unmanipulated membership.

I also think the dissenting opinion will help here.  Sometimes just hearing
someone agree with you is enough to calm the whole situation down and give
someone a sense of justice or understanding - even if the majority verdict
is against them.

thanks,
Nick


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: delegating (portions of) ietf list disciplinary process

2005-09-29 Thread grenville armitage


I, for one, welcome our new,
everyone must be heard multiple times and feel good-bearing overlords.

Oh. This isn't a slashdot discussion? My bad.

gja
(feeling grumpy)


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Summary of the LLMNR Last Call

2005-09-29 Thread Bill Manning


On Sep 20, 2005, at 10:55, Bernard Aboba wrote:


DNSsec is very important for other reasons, such as the current
pharming attacks.  The risks have been known in the security community
since at least 1991, and publicly since at least 1995.  The long-
predicted attacks are now happening.  We really need to get DNSsec
deployed, independent of mDNS or LLMNR.  Given that there is now some
forward progress on DNSsec, it's not at all unreasonable for either or
both of those specs to rely on it to solve some of their particular
security risks.


Couldn't agree more.  But if I'm not mistaken, the current DNSSEC
specifications do not mandate that DNS stub resolvers be DNSSEC-aware
validating, which is what would be required for use in a peer-to-peer 
name

resolution protocol.  There is also the DNSEXT WG edict that mDNS/LLMNR
not share a cache with DNS, which makes it difficult for mDNS/LLMNR to
utilize trust anchors or acquired keys present in the DNS cache.


not to  distract too much from the LC issues  but there is an 
ongoing effort
to define ways to have a standard API for validation by applications.  
Part of
that work is understand what the term cache means in this context.   
And does
validation have to work in lockstep w/ resolution?   Regardless, a 
common API
is highly valuable.  there have been a couple of meetings on these 
issues already

and we would be glad to have more inputs.

--bill



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: UN

2005-09-29 Thread Anthony G. Atkielski
Paul Hoffman writes:

 You talk as if you were a root operator and you know what they would
 do. In fact, you run an alternate root, not a real root, so it seems
 that you knowing what real root operators would do is particularly 
 unlikely.

There really isn't any such thing as a real root or alternate root
on the Internet, just as paper currency and coins have no real
value.  It all depends on what the majority decides to do.  If
everyone switches to an alternate root tomorrow, then the real
root won't matter.


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: UN plans to take over our job!

2005-09-29 Thread Johan Henriksson
 Will McAfee writes:

 http://www.theregister.co.uk/2005/09/28/wsis_geneva/
 This is not their place to be deciding as if they ever
 owned the Internet. They have no rights to the Internet,
 by the very nature of it's structure.

 Placing governments in charge of the Internet would be a disaster, the
 worst possible thing that could happen to it.

a peer 2 peer replacement for DNS tops my internet wish list;
with such, we would not need the top organizations we have today,
it would be much harder for anyone to claim the net and thus
we wouldn't be having this discussion.

of course, a p2p net of that size is a challenge but it's that
kind of thing that make engineering fun :)

- Johan Henriksson


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: UN

2005-09-29 Thread kent crispin
On Fri, Sep 30, 2005 at 05:40:24AM +0200, Anthony G. Atkielski wrote:
 Paul Hoffman writes:
 
  You talk as if you were a root operator and you know what they would
  do. In fact, you run an alternate root, not a real root, so it seems
  that you knowing what real root operators would do is particularly 
  unlikely.
 
 There really isn't any such thing as a real root or alternate root
 on the Internet, just as paper currency and coins have no real
 value.  It all depends on what the majority decides to do.  If
 everyone switches to an alternate root tomorrow, then the real
 root won't matter.

That's sounds good, but in fact, it's utter nonsense.  It's like saying that
the only difference between rowboat and a cargo ship is what people believe
about them.  In fact, if everybody started using one of the alternate roots,
it would simply collapse. 

There is far more to the real root system than just human sentiment.  There
is heavy duty infrastructure, both human and physical, involved.

-- 
Kent Crispin 
[EMAIL PROTECTED]p: +1 310 823 9358  f: +1 310 823 8649
[EMAIL PROTECTED] SIP: [EMAIL PROTECTED]


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RFC 4211 on the Internet X.509 Public Key Infrastructure Certificate Request Message Format (CRMF)

2005-09-29 Thread rfc-editor

A new Request for Comments is now available in online RFC libraries.


RFC 4211

Title:  Internet X.509 Public Key Infrastructure
Certificate Request Message Format (CRMF)
Author(s):  J. Schaad
Status: Standards Track
Date:   September 2005
Mailbox:[EMAIL PROTECTED]
Pages:  40
Characters: 86136
Obsoletes:  2511

I-D Tag:draft-ietf-pkix-rfc2511bis-08.txt

URL:ftp://ftp.rfc-editor.org/in-notes/rfc4211.txt


This document describes the Certificate Request Message Format (CRMF)
syntax and semantics.  This syntax is used to convey a request for a
certificate to a Certification Authority (CA), possibly via a
Registration Authority (RA), for the purposes of X.509 certificate
production.  The request will typically include a public key and the
associated registration information.  This document does not define a
certificate request protocol.

This document is a product of the Public-Key Infrastructure (X.509)
Working Group of the IETF.

This is now a Proposed Standard Protocol.

This document specifies an Internet standards track protocol for
the Internet community, and requests discussion and suggestions
for improvements.  Please refer to the current edition of the
Internet Official Protocol Standards (STD 1) for the
standardization state and status of this protocol.  Distribution
of this memo is unlimited.

This announcement is sent to the IETF list and the RFC-DIST list.
Requests to be added to or deleted from the IETF distribution list
should be sent to [EMAIL PROTECTED]  Requests to be
added to or deleted from the RFC-DIST distribution list should
be sent to [EMAIL PROTECTED]

Details on obtaining RFCs via FTP or EMAIL may be obtained by sending
an EMAIL message to [EMAIL PROTECTED] with the message body 
help: ways_to_get_rfcs.  For example:

To: [EMAIL PROTECTED]
Subject: getting rfcs

help: ways_to_get_rfcs

Requests for special distribution should be addressed to either the
author of the RFC in question, or to [EMAIL PROTECTED]  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.

Submissions for Requests for Comments should be sent to
[EMAIL PROTECTED]  Please consult RFC 2223, Instructions to RFC
Authors, for further information.


Joyce K. Reynolds and Sandy Ginoza
USC/Information Sciences Institute

...

Below is the data which will enable a MIME compliant Mail Reader 
implementation to automatically retrieve the ASCII version
of the RFCs.
ftp://ftp.isi.edu/in-notes/rfc4211.txt

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce