Petition to the IESG for a PR-action against Jefsey Morfin posted

2005-09-30 Thread Harald Tveit Alvestrand
I have now finished my work on a petition explaining to the IESG why I 
think Jefsey Morfin should be banned from posting on the IETF list under 
RFC 3683.


It's time to figure out whether there are more people who agree with me and 
the other signatories on this.


Please read the petition, and if you agree, sign it.

Petition: http://www.alvestrand.no/ietf/jefsey-pr-action.php

The online version includes references to sample postings by Jefsey.
Main body of text reproduced below.

This message will be posted to the IETF list, the ietf-languages list and 
the LTRU mailing list. Please keep discussion on the IETF list.



   Jefsey Morfin PR-Action Petition

  Last modified: September 28, 2005

  This message is a request to the IESG to consider
  approving a PR-action, as per RFC 3683, barring the
  person known as Jean-Francois Charles Morfin
  (Jefsey), an individual known to be posting from the
  addresses [EMAIL PROTECTED], [EMAIL PROTECTED],
  [EMAIL PROTECTED], [EMAIL PROTECTED],
  [EMAIL PROTECTED] and [EMAIL PROTECTED], from the
  IETF mailing list, and giving blanket permission to any
  manager of any IETF mailing list to bar him from
  posting there, as per the RFC.

Disruptive behaviour

  Based on the public record of Jefsey's postings, we
  believe that Jefsey Morfin is engaging in disruptive
  behaviour that has caused considerable damage to the
  ability of the IETF to proceed speedily and with
  consensus in the working groups in which he has
  participated.

  In particular, his postings exhibit:
* Use of inflammatory language towards others [1]
* Misquoting and misrepresenting of other people's
  arguments [2]
* Refusal to stop pursuing an argument in the face of
  consensus against him [3]
* Misrepresentation of non-IETF organizations [4]
* Personal attacks and use of threatening language
  against people who disagree with him, using
  attributes such as language, nationality or
  employer [5]
* Postings that seem to serve no purpose apart from
  inciting negative reaction [6]
* Very limited ability to contribute anything with
  actual technical content to the discussion

  Effects of this behaviour is to make other people
  either angry enough to post further inflammatory emails
  to the lists (disrupting constructive discussion) or to
  cause participants with valuable insight to drop out of
  the conversation (reducing the input to the IETF
  process), or to refuse to consider contributing work on
  documents in WGs where Jefsey is active (making it
  harder to get work done).

Previous chastisement history

  A number of people have tried explaining to Jefsey why
  his behaviour is inappropriate. No change in behaviour
  has occured. [A]

  To the petitioners' knowledge, his posting rights to
  IETF mailing lists have been suspended three times -
  once to the LTRU WG's mailing list [B], and twice to
  the ietf-languages mailing list [C][D].

  These suspensions have produced no change in behaviour.

Conclusion

  We, the undersigned, believe that the material
  presented above provides a clear case that Jefsey
  Morfin is being abusive of the consensus-driven
  process, as required by RFC 3683, and therefore ask
  that the IESG undertake a PR-action against Jefsey
  Morfin.



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Petition to the IESG for a PR-action against Jefsey Morfin posted

2005-09-30 Thread william(at)elan.net


Would it be too much to ask for new rules so that in the future these 
petitions be discussed on some other mail list setup for this purpose
(and for other general issues of ietf email lists administration) and 
that ietf@ietf.org be only used to indicate new petition or results of

one and remind those interested where to post comments about it.

--
William Leibzon
Elan Networks
[EMAIL PROTECTED]

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: UN plans to take over our job!

2005-09-30 Thread Peter Dambier

Johan Henriksson wrote:

Will McAfee writes:



http://www.theregister.co.uk/2005/09/28/wsis_geneva/
This is not their place to be deciding as if they ever
owned the Internet. They have no rights to the Internet,
by the very nature of it's structure.


Placing governments in charge of the Internet would be a disaster, the
worst possible thing that could happen to it.


Gouvernements are not in charge of DNS and they probably never
will be. Who pays for the root-servers? With whom do they have
contracts?

As long as nobody pays for them they will do what they want.

MIL and ARPA will close their service. So will do EDU. The rest
will join The Public-Root, ORSC, opennic, ...

The UN will talk and talk and ...




a peer 2 peer replacement for DNS tops my internet wish list;
with such, we would not need the top organizations we have today,
it would be much harder for anyone to claim the net and thus
we wouldn't be having this discussion.

of course, a p2p net of that size is a challenge but it's that
kind of thing that make engineering fun :)



Please have a look at

http://iason.site.voila.fr
http://www.kokoom.com/iason

especially the part about bifurcation. Part of it is in english.

It is science fiction but it is strong and maybe it will
replace DNS some time.

There used to be NIS as a competitor to /etc/hosts.

DNS has broken a lot of things that used to work with /etc/hosts.
NIS did not break anything but it did not scale the way DNS was
supposed to.

DNS did not scale either. With some 80% of all domains living in
.com we face a flat file not a tree :)


Kind regards,
Peter and Karin Dambier


--
Peter and Karin Dambier
Public-Root
Graeffstrasse 14
D-64646 Heppenheim
+49-6252-671788 (Telekom)
+49-179-108-3978 (O2 Genion)
+49-6252-750308 (VoIP: sipgate.de)
+1-360-448-1275 (VoIP: freeworldialup.com)
mail: [EMAIL PROTECTED]
http://iason.site.voila.fr
http://www.kokoom.com/iason


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: UN

2005-09-30 Thread Stephane Bortzmeyer
On Thu, Sep 29, 2005 at 10:34:06PM -0700,
 kent crispin [EMAIL PROTECTED] wrote 
 a message of 32 lines which said:

 In fact, if everybody started using one of the alternate roots, it
 would simply collapse.

You're mixing the network of root servers with the root
(Doc/NTIA). The first is a delicate engineering achievment and is not
easy to replace. The second one is just a desk with two civil
servants.
 
 There is heavy duty infrastructure, both human and physical,
 involved.

So, I would rephrase Anthony G. Atkielski's thought experiment:

If every root name server operator switches to an alternate root
tomorrow, then the real root won't matter.

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: UN plans to take over our job!

2005-09-30 Thread Stephane Bortzmeyer
On Fri, Sep 30, 2005 at 08:45:29AM +0200,
 Johan Henriksson [EMAIL PROTECTED] wrote 
 a message of 25 lines which said:

 a peer 2 peer replacement for DNS tops my internet wish list;

Is it a formal call to a new WG? Please provide a candidate charter
:-) I'd subscribe immediately :-)



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: UN plans to take over our job!

2005-09-30 Thread Stephane Bortzmeyer
On Thu, Sep 29, 2005 at 07:31:17AM -0400,
 Will McAfee [EMAIL PROTECTED] wrote 
 a message of 40 lines which said:

 http://www.theregister.co.uk/2005/09/28/wsis_geneva/

There is no discussion here of a plan to take over IETF job (when you
say our job, I assume, from the mailing list it is posted on, that
you refer to IETFers).

The root DNS zone or the IP address allocation (the real subjects of
the discussion at the WSIS) are not managed by IETF so we have nothing
to win or lose here.

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


quick comments over Harald's use of RFC 3683

2005-09-30 Thread JFC (Jefsey) Morfin
I quickly reviewed 
the  http://www.alvestrand.no/ietf/jefsey-pr-action.php. It calls 
for some quick comments.


- the petition text is IMHO standard, however my non-American culture 
finds some wording purposely hurting. But IANAL.
- the proposition has a first annex of often wrongly/childly 
characterized (as this is probably usual in a controversy) exchanges 
and links to a list of mails. The quick perusal of all these selected 
and out of context mails seems to globally weak the accusation.


More seriously, this calls for a comment on the motives of the action 
and on the lynching RFC 3683 seems to permit without warranting the 
rights of the lynched person. I do not wish to comments this by 
mail and will simply submit two Drafts which will permit to more 
seriously discuss and update the technical and systemic issues 
involved and suggestion proposed. I also need IESG guidance on three 
particular points.


I cannot object Harald's request to send him support in using the 
IETF list. I only suggest you keep it as short as possible so we do 
not waste time and bandwidth over noise. This only happens because I 
came here considering the IETF important to the Internet users, and 
because I did refuse to transform it in an intra/inter-SSDO 
battle-field: I thank people wishing to support me to keep sending 
_private_ mails or to abstain wasting their time. Feuds happens in 
Research when official thinking is challenged. Usually History 
decides the loser is the bitter.


I do not have much time to dedicate to this, but I am ready to help a 
deeper thinking about RFC 3683 practicalities over a real case. I 
think the IETF needs it, not to be used, and may be blocked, in 
circumstances discussed by RFC 3869. This is why I do _co-sign_ 
Harald's motion (with mention: to get a copy of the co-signatories 
exchanges and to help the discussion of the RFC 3683 refinements the 
IETF we probably needs).


I only see this as a confirmation, by my competition, of the probable 
market impact of my technical propositions (based on the work of 
many worldwide), and an attempt to prevent or discredit them and my 
planned appeals or appeals support on behalf of the common good.


This is only for me a pressing incitation to develop them faster. I 
am going to do this without waiting anymore for the consensus I hoped 
still possible. The attempt to still delay me/us has failed. Sorry.

jfc



I have now finished my work on a petition explaining to the IESG why 
I think Jefsey Morfin should be banned from posting on the IETF list 
under RFC 3683.


It's time to figure out whether there are more people who agree with 
me and the other signatories on this.


Please read the petition, and if you agree, sign it.

Petition: http://www.alvestrand.no/ietf/jefsey-pr-action.php

The online version includes references to sample postings by Jefsey.
Main body of text reproduced below.

This message will be posted to the IETF list, the ietf-languages 
list and the LTRU mailing list. Please keep discussion on the IETF list.



   Jefsey Morfin PR-Action Petition

  Last modified: September 28, 2005

  This message is a request to the IESG to consider
  approving a PR-action, as per RFC 3683, barring the
  person known as Jean-Francois Charles Morfin
  (Jefsey), an individual known to be posting from the
  addresses [EMAIL PROTECTED], [EMAIL PROTECTED],
  [EMAIL PROTECTED], [EMAIL PROTECTED],
  [EMAIL PROTECTED] and [EMAIL PROTECTED], from the
  IETF mailing list, and giving blanket permission to any
  manager of any IETF mailing list to bar him from
  posting there, as per the RFC.

Disruptive behaviour

  Based on the public record of Jefsey's postings, we
  believe that Jefsey Morfin is engaging in disruptive
  behaviour that has caused considerable damage to the
  ability of the IETF to proceed speedily and with
  consensus in the working groups in which he has
  participated.

  In particular, his postings exhibit:
* Use of inflammatory language towards others [1]
* Misquoting and misrepresenting of other people's
  arguments [2]
* Refusal to stop pursuing an argument in the face of
  consensus against him [3]
* Misrepresentation of non-IETF organizations [4]
* Personal attacks and use of threatening language
  against people who disagree with him, using
  attributes such as language, nationality or
  employer [5]
* Postings that seem to serve no purpose apart from
  inciting negative reaction [6]
* Very limited ability to contribute anything with
  actual technical content to the discussion

  Effects of this behaviour is to make other people
  either angry enough to post further inflammatory emails
  to the lists (disrupting constructive discussion) or to
  cause participants with valuable insight to drop out of
  the conversation (reducing the input to the IETF
  process), or to refuse to 

Re: Petition to the IESG for a PR-action against Jefsey Morfin posted

2005-09-30 Thread Julien . Maisonneuve

Harald,
Just out of curiosity : is there a symmetrical way to oppose a petition 
like this one ? Or can arguments only be one-sided ?
I think such a petition page should contain several choices : approve, 
disapprove, don't care,...
The way it is done on the page is heavily slanted towards approval of 
the ban, and offers no way to oppose it. This is understandable because 
it is partial, but partiality should not have a say when gathering 
opinions that may ultimately result in collective action.
What we need is a tool to weight whether there is a significant majority 
of people approving the ban, not one that tells us some people want it 
(which will always be verified).

Regards,
Julien..

Harald Tveit Alvestrand wrote:

I have now finished my work on a petition explaining to the IESG why I 
think Jefsey Morfin should be banned from posting on the IETF list 
under RFC 3683.



--
Julien Maisonneuve  2.333
Alcanet 2101 1145   Alcatel HQ - Standardisation
Tel +33 1 4076 1145 54 rue la Boëtie, F-75008 Paris
Fax +33 1 4076 5912 [EMAIL PROTECTED]


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


p2p dns (was: Re: UN plans to take over our job!)

2005-09-30 Thread Johan Henriksson


 On Fri, Sep 30, 2005 at 08:45:29AM +0200,
  Johan Henriksson [EMAIL PROTECTED] wrote
  a message of 25 lines which said:

 a peer 2 peer replacement for DNS tops my internet wish list;

 Is it a formal call to a new WG? Please provide a candidate charter :-)
I'd subscribe immediately :-)

is there an interest? I don't have much experience of IETF, much less in
taking care of a wg. but if more people would want to work on such a
thing, I could look into how to start up such an endeavor.

(although I doubt it would grow into a substitute in the end; rather a
complement)

- Johan Henriksson




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: UN

2005-09-30 Thread Brian E Carpenter

Hi,

Although what WSIS may or may not decide is undoubtedly of
interest to the Internet community, I really think it is a
distraction here and now until there are concrete questions
for us to discuss. Our community's route to the WSIS discussions
is through the ISOC - where basic membership is free, by the way.

 Brian

Peter Dambier wrote:

Alexis Turner wrote:


I don't want to clutter up everyone's inboxes with dozens of rants that
amount to hyperventilating and lots of Iiii's!, but if anyone would
like to e-mail me off list with their thoughts on the UN's WSIS 
conference

and why having them replace ICANN would be a good/bad thing for the
Internet, I would love to hear it.  I'm not looking to pick a fight or
argue - I'm just honestly interested in hearing the various opinions.  
The

issue is a lot bigger than anything I can get my head around right now,
and hearing what other people have to say would help me think about it
more constructively.

I myself am on this list more or less Just for kicks, or, as I 
prefer to

think of it, personal edification, but do note that it is possible
quotes from your e-mails will make it onto a personal site that I use for
my own rambling and probably incoherent research.  If you don't want
this, just say so.
-Alexis

PS: Bonus points if you actually read what they are proposing before you
respond.



Hi Alexis,

I followed the discussion list. I could hardly follow it.

Is there a UN?

To me it looks like a bunch of small and not so small dictators at the 
table

and several rooms full of intelligent people outside.

It might be interesting to give them the internet. But how should you do
that? What could they do with it?

Give them the root. The root operators will laughingly stand up and go 
away.

Each of them will start running his own root on his own hardware.

The internet hardware? Belongs to companies that were not allowed to join.
How should all the internet operators find out what the UN want them to
do if they dont allow them in?

I dont think anything but a lot of wasted paper will come out of that 
meeting.



Kind regards,
Peter and Karin Dambier





___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: p2p dns (was: Re: UN plans to take over our job!)

2005-09-30 Thread Elwyn Davies
Johan: I imagine you have seen this paper on the subject of a p2p DNS 
substitute based on CHORD, but it is interesting reading for others.

http://www.cs.rice.edu/Conferences/IPTPS02/178.pdf

Regards,
Elwyn Davies

Johan Henriksson wrote:

 


On Fri, Sep 30, 2005 at 08:45:29AM +0200,
Johan Henriksson [EMAIL PROTECTED] wrote
a message of 25 lines which said:

   


a peer 2 peer replacement for DNS tops my internet wish list;
 


Is it a formal call to a new WG? Please provide a candidate charter :-)
   


I'd subscribe immediately :-)

is there an interest? I don't have much experience of IETF, much less in
taking care of a wg. but if more people would want to work on such a
thing, I could look into how to start up such an endeavor.

(although I doubt it would grow into a substitute in the end; rather a
complement)

- Johan Henriksson




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf
 



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Petition to the IESG for a PR-action against Jefsey Morfin posted

2005-09-30 Thread Brian E Carpenter

William,

It's hard to make that a rule. Unfortunately, this is the catch-all
list for the IETF. Note, Harald is not inviting discussion -
only a URL to click on.

   Brian

william(at)elan.net wrote:


Would it be too much to ask for new rules so that in the future these 
petitions be discussed on some other mail list setup for this purpose
(and for other general issues of ietf email lists administration) and 
that ietf@ietf.org be only used to indicate new petition or results of

one and remind those interested where to post comments about it.




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: p2p dns (was: Re: UN plans to take over our job!)

2005-09-30 Thread Steve Crocker
I believe the system described in the cited paper does exactly the  
reverse of what's being discussed here.  CHORD and its relatives  
provide an alternative way of serving the data, but the hierarchical  
structure of domain names remains the same.  If I understand the  
intent of this thread, the desire is to create a P2P naming system,  
similar to a web of trust, that does not require a hierarchical  
naming system and the administrative machinery needed to maintain  
that naming system.  That is, I thought the thrust of this thread is  
how to create an alternative to the IANA, not how to how to create an  
alternative to the root servers.


Steve

Steve Crocker
[EMAIL PROTECTED]


On Sep 30, 2005, at 9:21 AM, Elwyn Davies wrote:

Johan: I imagine you have seen this paper on the subject of a p2p  
DNS substitute based on CHORD, but it is interesting reading for  
others.

http://www.cs.rice.edu/Conferences/IPTPS02/178.pdf

Regards,
Elwyn Davies

Johan Henriksson wrote:






On Fri, Sep 30, 2005 at 08:45:29AM +0200,
Johan Henriksson [EMAIL PROTECTED] wrote
a message of 25 lines which said:




a peer 2 peer replacement for DNS tops my internet wish list;


Is it a formal call to a new WG? Please provide a candidate  
charter :-)




I'd subscribe immediately :-)

is there an interest? I don't have much experience of IETF, much  
less in

taking care of a wg. but if more people would want to work on such a
thing, I could look into how to start up such an endeavor.

(although I doubt it would grow into a substitute in the end;  
rather a

complement)

- Johan Henriksson




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Petition to the IESG for a PR-action against Jefsey Morfin posted

2005-09-30 Thread Harald Tveit Alvestrand



--On fredag, september 30, 2005 14:36:39 +0200 
[EMAIL PROTECTED] wrote:



Harald,
Just out of curiosity : is there a symmetrical way to oppose a petition
like this one ? Or can arguments only be one-sided ?
I think such a petition page should contain several choices : approve,
disapprove, don't care,...


Sure there is - create your own page, write your petition text, and ask 
people to sign up there. I'll even share the PHP code with you if you want 
it!


I have taken on the role of arguing *for* banning Jefsey from the IETF. I'm 
not neutral in any way, shape or form. It's the IESG's business to say 
whether or not the requirements of the RFC are fulfiled.



The way it is done on the page is heavily slanted towards approval of the
ban, and offers no way to oppose it. This is understandable because it is
partial, but partiality should not have a say when gathering opinions
that may ultimately result in collective action.


The IESG decides based on evidence presented to it. One of the pieces of 
evidence is that the people (10 so far) who have signed the petition 
believe that Jefsey Morfin is being abusive of the consensus-driven 
process (that's a quote from RFC 3683). Others may want to present other 
relevant evidence.


I'm acting as advocate in this case. I'm not the jury.

  Harald

PS: I recommend reading both RFC 3683 and a selection of Jefsey's messages 
before making up your mind about the case



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: UN plans to take over our job!

2005-09-30 Thread Gene Gaines
An update.

http://www.iht.com/articles/2005/09/29/business/net.php

EU and U.S. clash over control of Net
By Tom Wright International Herald Tribune

FRIDAY, SEPTEMBER 30, 2005

GENEVA The United States and Europe clashed here Thursday in one
of their sharpest public disagreements in months, after European
Union negotiators proposed stripping the Americans of their
effective control of the Internet.
 
The European decision to back the rest of the world in demanding
the creation of a new international body to govern the Internet
clearly caught the Americans off balance and left them largely
isolated at talks designed to come up with a new way of
regulating the digital traffic of the 21st century.
 
It's a very shocking and profound change of the EU's position,
said David Gross, the State Department official in charge of
America's international communications policy. The EU's
proposal seems to represent an historic shift in the regulatory
approach to the Internet from one that is based on private
sector leadership to a government, top-down control of the
Internet.
 
Delegates meeting in Geneva for the past two weeks had been
hoping to reach consensus for a draft document by Friday after
two years of debate. The talks on international digital issues,
called the World Summit on the Information Society and organized
by the United Nations, were scheduled to conclude in November at
a meeting in Tunisia. Instead, the talks have deadlocked, with
the United States fighting a solitary battle against countries
that want to see a global body take over supervision of the
Internet.
 
The United States lost its only ally late Wednesday when the EU
made a surprise proposal to create an intergovernmental body
that would set principles for running the Internet. Currently,
the U.S. Commerce Department approves changes to the Internet's
root zone files, which are administered by the Internet
Corporation for Assigned Names and Numbers, or Icann, a
nonprofit organization based in Marina del Rey, California.
 
more








___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: quick comments over Harald's use of RFC 3683

2005-09-30 Thread Ole Jacobsen

JFC,

Since I have engaged in debate with you on another list, maybe I can
offer some constructive criticism to perhaps make you understand why
people react the way they do, up to and including this proposed action.
I have cc'd the IETF and IESG since I others may agree or disagree with
me and offer feedback to you privately or publically.

1. Your postings are Long, Rambling and Frequent (LRF). I have a certain
sympathy for people whose native language is not English (like myself)  
when they post on these lists. However, this usually results in fewer, not
more words, a la We meet lunch 11 cafe? In your case--and unlike in the
digital picture case--more words/pixels does not contribute to the clarity
of the image, quite the opposite in fact. Rambling refers to your tendency
to make references to everything under the sun while discussing a given
topic. Frequent just adds to the irritation. It's not like anyone on this
list gets too little mail.

2. Your posting appears to come from a position where the IETF members
collectively are just clueless, have not seen the light or found their way
to your particular techno-religion. Some call this preaching, and in this
case the choir is not appreciative.

3. Some of your postings can be read as personal attacks. While some may
call this your debating style, there are clearly instances when you
cross the line.  This really isn't a good way to make friends with a large
group of people.

4. Some of your arguments appear to be technical in nature, but are 
incomprehensible even to our most respected experts. It is of course 
POSSIBLE that they are wrong and you are right, but if you are unable to
explain your position even to them after many rounds, does it not seem
like you are wasting your, their and our time?

Thanks for listening.

Ole


Ole J. Jacobsen 
Editor and Publisher,  The Internet Protocol Journal
Academic Research and Technology Initiatives, Cisco Systems
Tel: +1 408-527-8972   GSM: +1 415-370-4628
E-mail: [EMAIL PROTECTED]  URL: http://www.cisco.com/ipj



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Petition to the IESG for a PR-action against Jefsey Morfin posted

2005-09-30 Thread Julien . Maisonneuve
(this should not go on [EMAIL PROTECTED], but for lack of a better list... 
please disregard if it bothers you)

Harald Tveit Alvestrand wrote:

Sure there is - create your own page, write your petition text, and 
ask people to sign up there. I'll even share the PHP code with you if 
you want it!


This is not what I call a symmetrical means to express disapproval : 
for the average reader, it take a *lot* more work to defend than to attack.
So I take your answer is there is no symmetrical way and it is a lot 
harder to express disapproval than approval. This is what I call a 
slanted process, and I would deem it inappropriate in any oranization 
that prides itself on fair and balanced processes.
Note that the whole issue of list ban is treading on first amendment 
grounds in a way that could end up in court.


I have taken on the role of arguing *for* banning Jefsey from the 
IETF. I'm not neutral in any way, shape or form. It's the IESG's 
business to say whether or not the requirements of the RFC are fulfiled.


This is what I call partial. Being partial is perfectly OK. It's just 
that I don't think the process should rely on partiality. I even think 
it should exclude partiality as much as possible. The way to do that 
here is to allow people to express their opinion in an unslanted way.

Your page would be a perfect tool if it wasn't slanted

The IESG decides based on evidence presented to it. One of the pieces 
of evidence is that the people (10 so far) who have signed the 
petition believe that Jefsey Morfin is being abusive of the 
consensus-driven process (that's a quote from RFC 3683). Others may 
want to present other relevant evidence.


Presenting slanted evidence is hardly a positive action. You will always 
find a few people to ban a controversial poster. It will always be 
harder to find people on the defending side, because the individual 
interest in defending a (controversial) person is always low and will 
generally not justify defensive actions.
That process will inevitably result in banning people even though a 
(possibly silent) majority doesn't approve it. This is not what I would 
call consensus-based decision.



I'm acting as advocate in this case. I'm not the jury.


Or rather prosecutor ?

PS: I recommend reading both RFC 3683 and a selection of Jefsey's 
messages before making up your mind about the case


I haven't, and I'm not even sure I care.
I'm worried about the process, and about the number of times it seems to 
be invoked.
Banning should be exceptional. Now we are presented with two dubious 
(read non obvious, possibly requiring very careful inspection to arrive 
to a conclusion) cases in the space of a few days, and it appears that 
the process itself is hardly symmetrical and lacks clear consensus 
safeguards.

In a balanced world, this would spell doom for RFC3683.

Regards,
Julien.

--
Julien Maisonneuve
(not speaking for my employer or anyone else)



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Petition to the IESG for a PR-action against Jefsey Morfin posted

2005-09-30 Thread Michael Froomkin - U.Miami School of Law

/legal lurk

No first amendment issues are implicated here.  The first amendment only 
protects US persons (citizens  residents) against actions by the US 
government.  Both sides of that equation are absent here.


This is private action against a private party.  It may implicate the 
moral principles of freedom of expression but these are not ordinarily 
actionable either in the US or elsewhere.  YMMV of course.


Please note that this comment expresses no opinion on the merits of the 
ban.


legal lurk

On Fri, 30 Sep 2005 [EMAIL PROTECTED] wrote:

[much edited]

Note that the whole issue of list ban is treading on first amendment grounds 
in a way that could end up in court.


--
http://www.icannwatch.org   Personal Blog: http://www.discourse.net
A. Michael Froomkin   |Professor of Law|   [EMAIL PROTECTED]
U. Miami School of Law, P.O. Box 248087, Coral Gables, FL 33124 USA
+1 (305) 284-4285  |  +1 (305) 284-6506 (fax)  |  http://www.law.tm
   --It's @#$% hot here.--

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: UN

2005-09-30 Thread Anthony G. Atkielski
kent crispin writes:

 That's sounds good, but in fact, it's utter nonsense.  It's like saying that
 the only difference between rowboat and a cargo ship is what people believe
 about them.  In fact, if everybody started using one of the alternate roots,
 it would simply collapse.

Well, no.  If everyone started using the same alternate roots, then
the alternate roots would effectively be the real roots.

 There is far more to the real root system than just human sentiment.  There
 is heavy duty infrastructure, both human and physical, involved.

Nothing prevents the operators of alternate roots from putting the
same type of infrastructure into place.



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: UN plans to take over our job!

2005-09-30 Thread Anthony G. Atkielski
Johan Henriksson writes:

 a peer 2 peer replacement for DNS tops my internet wish list;
 with such, we would not need the top organizations we have today,
 it would be much harder for anyone to claim the net and thus
 we wouldn't be having this discussion.

You need an authoritative root.  I don't want worldwide TLDs to be
diverted by unscrupulous local operators.


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Petition to the IESG for a PR-action against Jefsey Morfin posted

2005-09-30 Thread Margaret Wasserman


Hi Julien,

I think that there is some misunderstanding regarding what is 
happening.  Harald Alvestrand is not in charge of an IETF PR-action 
process, and he has no official role in this process.


Harald is attempting to assemble information that he will use to 
propose a PR-action (a Posting Rights action), as described in RFC 
3683.  Once he has assembled this information, he will presumably use 
the information to persuade a member of the IESG (an AD) to sponsor 
this action.  That AD would then be in charge of running a fair and 
open process to decide whether or not Jefsey Morphin's posting rights 
should be revoked.


If Harald finds an AD who will sponsor this action, then the process 
described in RFC 3683 would be followed.  That process includes an 
IETF Last Call period, during which any member of the community may 
comment on the action.  After that, the IESG would make a decision on 
the action using the usual consensus-based process.  Like all IESG 
decisions, that decision is also subject to appeal.  This is all 
described quite clearly in RFC 3683.


Harald is not required to be impartial in this effort, any more than 
a document author is required to be impartial in garnering support 
for his own technical work.  It is the AD's job to make sure that the 
process of evaluating the PR-action is run fairly.


If an AD does decide to sponsor this PR-action, there will be an 
explicit opportunity for the community to comment on this action (the 
IETF LC) before a decision is made regarding it.


Margaret

At 5:46 PM +0200 9/30/05, [EMAIL PROTECTED] wrote:
This is not what I call a symmetrical means to express disapproval 
: for the average reader, it take a *lot* more work to defend than 
to attack.


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Petition to the IESG for a PR-action [....]

2005-09-30 Thread Frank Ellermann
[EMAIL PROTECTED] wrote:

 (this should not go on [EMAIL PROTECTED], but for lack of a better
 list... please disregard if it bothers you)

[...]

 Banning should be exceptional.

So far 3683 was never used (please correct me if I'm wrong).

 Now we are presented with two dubious (read non obvious,
 possibly requiring very careful inspection to arrive
 to a conclusion) cases in the space of a few days

Very different at the moment:  Only an AD can start (or
prepare to start) a PR action.  That might be what we've
seen in the first case.

This second case is still at the convince an AD to support
to start a PR action stage.  It's a private petition of
Harald (he's affected as listmom of the tag review list, so
unlike most others he's not free to use his killfile there).

 it appears that the process itself is hardly symmetrical
 and lacks clear consensus safeguards.

That would come later in the last call.  At the moment the
second case is a private list of signatures, same idea as e.g.
http://old.openspf.org/cgi-bin/openspf_pledge.cgi - but of
course the signatures of several (former) IETF Chairs, ADs,
WG co-Chairs, Unicode Chair, TAO author, etc. might impress
the poor active AD(s) who finally get(s) this list...

 In a balanced world, this would spell doom for RFC3683.

...so far it's like an unpublished I-D.  If you don't agree
with it you could ignore it until the potential last call.

 Bye, Frank



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: delegating (portions of) ietf list disciplinary process (fwd)

2005-09-30 Thread Dave Crocker



Alexis Turner wrote:

Geez, Harald.  You misspelled off.  Am I going to have to virtually
crucify you in front of the list for this?



yes.


--

 Dave Crocker
 Brandenburg InternetWorking
 +1.408.246.8253
 dcrocker  a t ...
 WE'VE MOVED to:  www.bbiw.net

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Petition to the IESG for a PR-action against Jefsey Morfin posted

2005-09-30 Thread Steven M. Bellovin
In message [EMAIL PROTECTED], Margaret Wasserman writes:

Harald is attempting to assemble information that he will use to 
propose a PR-action (a Posting Rights action), as described in RFC 
3683.  Once he has assembled this information, he will presumably use 
the information to persuade a member of the IESG (an AD) to sponsor 
this action.  That AD would then be in charge of running a fair and 
open process to decide whether or not Jefsey Morphin's posting rights 
should be revoked.


I confess that I'm uneasy about Harald's action.  It has too much the 
air of an unpopularity contest -- every one who doesn't like Jefsey's
should sign on to kick him off the mailing list.  

--Steven M. Bellovin, http://www.cs.columbia.edu/~smb



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Petition to the IESG for a PR-action against Jefsey Morfin posted

2005-09-30 Thread Anthony G. Atkielski
If the IESG has the time to compile blacklists and go on witch hunts,
perhaps it doesn't have enough work to justify its existence.


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Reexamining premises (was Re: UN plans to take over our job!)

2005-09-30 Thread Michael Mealling

entire discussion by smart people deleted for brevity


Might I suggest all participants in this discussion figure out what you
really want to use DNS for if you were to assume it didn't exist in the
first place. Imagine going back in time to 1986 and explaining to
everyone at the IETF the way things would develop and then, after
they've stopped laughing, imagine what kind of system would have
resulted. My personal suspicion is that two things would be very different:

There wouldn't be one monolithic namespace/protocol/system. At least two
systems would exist: one for hiding IP network layer topology from apps
and another for describing and naming services for end users.

The system that faced the users would be inherently trademark friendly
and wouln't be hierarchical. The output of such a system wouldn't be an
IP address but instead a complex record that described a compound object
called a 'service'. It might be what people today call peer to peer
(although I have yet to find a good definition of what that means) but
that might not be an issue since the names wouldn't be hierarchical.

What I find humorous is that this community's default position seems to
be to attempt to play politics with those who are professionals at it
rather than solving the problems with technology which is what you'd
think we're good at

-MM

/me goes back to building rockets which is much more fun...

--
Michael Mealling  Masten Space Systems, Inc.
VP Business Development   473 Sapena Ct.
Office: +1-678-581-9656Suite 23
Cell: +1-678-640-6884 Santa Clara, CA 95054
http://masten-space.com/




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Petition to the IESG for a PR-action against Jefsey Morfin posted

2005-09-30 Thread Harald Tveit Alvestrand



--On fredag, september 30, 2005 14:00:51 -0400 Steven M. Bellovin 
[EMAIL PROTECTED] wrote:



In message [EMAIL PROTECTED], Margaret Wasserman
writes:


Harald is attempting to assemble information that he will use to
propose a PR-action (a Posting Rights action), as described in RFC
3683.  Once he has assembled this information, he will presumably use
the information to persuade a member of the IESG (an AD) to sponsor
this action.  That AD would then be in charge of running a fair and
open process to decide whether or not Jefsey Morphin's posting rights
should be revoked.



I confess that I'm uneasy about Harald's action.  It has too much the
air of an unpopularity contest -- every one who doesn't like Jefsey's
should sign on to kick him off the mailing list.


It doesn't make me feel good either. But the alternatives I saw were:

- Don't do anything, and let Jefsey continue doing damage
- Make a solo proposal (or one with its supporters gathered privately) to 
the IESG for a PR-action

- Be public, and see who else agreed with my opinion

I did not find the first alternative attractive.
The second sounded like it could easily be seen as the in-crowd is 
conspiring to silence dissent by conspiracy theorists.

So by Hobson's choice, I ended up with the third one.

I'm happy to see that there are names on my petition that I don't recognize 
at all - it gives me some confidence that my exasperation with Jefsey's 
behaviour was not just something peculiar to my viewpoint or that of my 
friends.


But once next week's gone by, I'm happy to pass the token to the IESG, and 
worry no more about it.


 Harald



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: quick comments over Harald's use of RFC 3683

2005-09-30 Thread Thomas Gal
I believe I made quite a similar set of points off list to JFC soon after
Harald proposed his 3683. I definitely agree that it appears there is a
fundamental divergence between the mindset and protocols of this
orgnaization and his ways. I guess it boild down to should we stop trying
to pound this square peg into that round hole? This doesn't appear to be
working!

-Tom 

 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On 
 Behalf Of Ole Jacobsen
 Sent: Friday, September 30, 2005 7:47 AM
 To: JFC (Jefsey) Morfin
 Cc: ietf@ietf.org; [EMAIL PROTECTED]
 Subject: Re: quick comments over Harald's use of RFC 3683
 
 
 JFC,
 
 Since I have engaged in debate with you on another list, 
 maybe I can offer some constructive criticism to perhaps make 
 you understand why people react the way they do, up to and 
 including this proposed action.
 I have cc'd the IETF and IESG since I others may agree or 
 disagree with me and offer feedback to you privately or publically.
 
 1. Your postings are Long, Rambling and Frequent (LRF). I 
 have a certain sympathy for people whose native language is 
 not English (like myself) when they post on these lists. 
 However, this usually results in fewer, not more words, a la 
 We meet lunch 11 cafe? In your case--and unlike in the 
 digital picture case--more words/pixels does not contribute 
 to the clarity of the image, quite the opposite in fact. 
 Rambling refers to your tendency to make references to 
 everything under the sun while discussing a given topic. 
 Frequent just adds to the irritation. It's not like anyone on 
 this list gets too little mail.
 
 2. Your posting appears to come from a position where the 
 IETF members
 collectively are just clueless, have not seen the light or 
 found their way to your particular techno-religion. Some call 
 this preaching, and in this case the choir is not appreciative.
 
 3. Some of your postings can be read as personal attacks. 
 While some may call this your debating style, there are 
 clearly instances when you cross the line.  This really isn't 
 a good way to make friends with a large group of people.
 
 4. Some of your arguments appear to be technical in nature, 
 but are incomprehensible even to our most respected experts. 
 It is of course POSSIBLE that they are wrong and you are 
 right, but if you are unable to explain your position even to 
 them after many rounds, does it not seem like you are wasting 
 your, their and our time?
 
 Thanks for listening.
 
 Ole
 
 
 Ole J. Jacobsen
 Editor and Publisher,  The Internet Protocol Journal Academic 
 Research and Technology Initiatives, Cisco Systems
 Tel: +1 408-527-8972   GSM: +1 415-370-4628
 E-mail: [EMAIL PROTECTED]  URL: http://www.cisco.com/ipj
 
 
 
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www1.ietf.org/mailman/listinfo/ietf
 


smime.p7s
Description: S/MIME cryptographic signature
___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Petition to the IESG for a PR-action against Jefsey Morfin posted

2005-09-30 Thread Dave Crocker
I confess that I'm uneasy about Harald's action.  It has too much the 
air of an unpopularity contest -- every one who doesn't like Jefsey's

should sign on to kick him off the mailing list.


Oh.

Right.

Good point!

As I understand the rules of behavior, they impose some objective criteria. 
Whether one has violated those criteria well might be a judgment call, but 
assessing facts by polling public opinion is problematic for exactly the 
reason Steve raises:  it is usually confounded by affective factors, such as 
(dis)liking.


Harald is asserting some facts about a particular person's posting behavior.

It should not require subtle thinking or otherwise involve much precision to 
evaluate Harald's petition.


If the fact of a person's violating the rules is legitimately debatable -- in 
other words, if it might reasonably be considered a close call -- then they 
probably have not violated the rules (or, at least, not violated them enough.)


The IETF sargeant at arms should just do an evaluation of the person's 
history, relative to the petition, and publish their assessment.



d/

--

 Dave Crocker
 Brandenburg InternetWorking
 +1.408.246.8253
 dcrocker  a t ...
 WE'VE MOVED to:  www.bbiw.net

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Petition to the IESG for a PR-action against Jefsey Morfin posted

2005-09-30 Thread Randy Presuhn
Hi -

 From: Anthony G. Atkielski [EMAIL PROTECTED]
 To: ietf@ietf.org
 Sent: Friday, September 30, 2005 11:00 AM
 Subject: Re: Petition to the IESG for a PR-action against Jefsey Morfinposted

 If the IESG has the time to compile blacklists and go on witch hunts,
 perhaps it doesn't have enough work to justify its existence.
...

At the WG level, disruptive members cause an enormous increase in the
effort required to get anything done.  Our desire to ensure that minority
viewpoints are heard puts us in a difficult bind when only ones expressing
those viewpoints are individuals who also choose to behave badly.

Invoking RFC 3934 at the WG level is not something that any WG chair
would undertake lightly.  I've gotten a lot of criticism for not using it more.
I'm sure the IESG is fully aware of the gravity of invoking RFC 3683.
The fact that it hasn't been used before speaks for itself.  However,
the reason the procedures exist at all is out of the recognition that a
very few people are so abusive of our processes and culture that we
need to be able to cut them off so that we can get real work done.
If their technical arguments have real merit, they will reach us by other
avenues.

It would be so much simpler if everyone could be counted on to
recognize (easy) and ignore (hard) the bad actors.

Randy




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: Petition to the IESG for a PR-action against JefseyMorfin posted

2005-09-30 Thread Thomas Gal
 (this should not go on [EMAIL PROTECTED], but for lack of a better list... 
 please disregard if it bothers you)
 Harald Tveit Alvestrand wrote:
 
  Sure there is - create your own page, write your petition text, and 
  ask people to sign up there. I'll even share the PHP code 
 with you if 
  you want it!
 
 This is not what I call a symmetrical means to express 
 disapproval : 
 for the average reader, it take a *lot* more work to defend 
 than to attack.
 So I take your answer is there is no symmetrical way and it 
 is a lot harder to express disapproval than approval. This is 
 what I call a slanted process, and I would deem it 
 inappropriate in any oranization that prides itself on fair 
 and balanced processes.

Acutally I think it's probably Harald being able to just concern himself
with spearheading his own issues for once after many years of service to the
IETF which likely prevented him from taking sides on many issues. I
certainly think that if someone feels passionately about preserving
someone's rights to post to the list because they're input is that valuable
they will take that course. This is not an IESG or administrative action in
any way. It's the motion of one person to the organization. NOBODY IS IN ANY
WAY LIMITING YOU FROM TAKING ANY ACTION! Not to mention the fact that there
is quite a few levels of appeals built into this process just like any
other.

 Note that the whole issue of list ban is treading on first 
 amendment grounds in a way that could end up in court.
 

Are you saying spammers have write to send us all emails we don't feel are
valid every day? I distinctly recall complaining about an organization that
was spamming many WG lists with conference postsings, and I didn't notice
any vehment opposition on the grounds of free speech popping up.

Quote from RFC which I guess you didn't read:

   Q: Is this censorship?

   A: Only if you believe in anarchy.

  What is important is that the rules surrounding PR-actions exhibit
  the same properties used by the rest of the consensus-based
  process.


  I have taken on the role of arguing *for* banning Jefsey from the 
  IETF. I'm not neutral in any way, shape or form. It's the IESG's 
  business to say whether or not the requirements of the RFC 
 are fulfiled.
 
 This is what I call partial. Being partial is perfectly OK. 
 It's just that I don't think the process should rely on 
 partiality. I even think it should exclude partiality as much 
 as possible. The way to do that here is to allow people to 
 express their opinion in an unslanted way.
 Your page would be a perfect tool if it wasn't slanted
 

His page is for him. It's not for the IETF. The reason we have rough
consensus is specifically because nobody expects everyone to be impartial
and perfect.

  The IESG decides based on evidence presented to it. One of 
 the pieces 
  of evidence is that the people (10 so far) who have signed the 
  petition believe that Jefsey Morfin is being abusive of the 
  consensus-driven process (that's a quote from RFC 3683). 
 Others may 
  want to present other relevant evidence.
 
 Presenting slanted evidence is hardly a positive action. You 
 will always find a few people to ban a controversial poster. 
 It will always be harder to find people on the defending 
 side, because the individual interest in defending a 
 (controversial) person is always low and will generally not 
 justify defensive actions.
 That process will inevitably result in banning people even 
 though a (possibly silent) majority doesn't approve it. This 
 is not what I would call consensus-based decision.
 

If nobody cares enough to mount the effortthat seems like some good
evidence to me. It might be worth noting that this process just like any
other requires rough consensus, so I'm not really sure what you're talking
about. What, out of curiostiy, is better then evidence to present? Should we
take a poll on who likes whom? Do we have any statistics on how many people
have been banned from the list? You say inevitable but haven't really backed
it up with any facts.

  I'm acting as advocate in this case. I'm not the jury.
 
 Or rather prosecutor ?
 
  PS: I recommend reading both RFC 3683 and a selection of Jefsey's 
  messages before making up your mind about the case
 
 I haven't, and I'm not even sure I care.
 I'm worried about the process, and about the number of times 
 it seems to be invoked.
 Banning should be exceptional. Now we are presented with two 
 dubious (read non obvious, possibly requiring very careful 
 inspection to arrive to a conclusion) cases in the space of a 
 few days, and it appears that the process itself is hardly 
 symmetrical and lacks clear consensus safeguards.
 In a balanced world, this would spell doom for RFC3683.
 

I'm not glad sombody who didn't even choose to read the relavant documents
is criticizing the process. I am glad to see this much discussion, which
easily alays my fears of a bad choice 

Re: Petition to the IESG for a PR-action against Jefsey Morfin posted

2005-09-30 Thread Michael Thomas

Harald Tveit Alvestrand wrote:

It doesn't make me feel good either. But the alternatives I saw were:

- Don't do anything, and let Jefsey continue doing damage
- Make a solo proposal (or one with its supporters gathered privately) 
to the IESG for a PR-action

- Be public, and see who else agreed with my opinion


what about:

- killfile the person and encourage others to do the same?

Is Usenet really that distant of a memory? And the dynamics
would probably work the right way too: on Usenet, there can
be an amusement factor associated with the abuse bottom's
torment which makes for a sustained feedback loop. But this
is a professional organization, not an electronic cocktail
party so I'd expect convergence more often than the feedback
loop.

This leaves the chairs who would have to deal with the person,
but one would assume that it would eventually get lonely doing
write-only posts and eventually go away. Only if that didn't
work should the posting death penalty be contemplated, IMO.

Mike, with no opinion on the specific case

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Petition to the IESG for a PR-action against Jefsey Morfin posted

2005-09-30 Thread Harald Tveit Alvestrand



--On fredag, september 30, 2005 12:07:04 -0700 Michael Thomas 
[EMAIL PROTECTED] wrote:



Harald Tveit Alvestrand wrote:

It doesn't make me feel good either. But the alternatives I saw were:

- Don't do anything, and let Jefsey continue doing damage
- Make a solo proposal (or one with its supporters gathered privately)
to the IESG for a PR-action
- Be public, and see who else agreed with my opinion


what about:

- killfile the person and encourage others to do the same?



Tried that. He's still yelling, and people regularly yell back at him.
See petition text, effects.


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Petition to the IESG for a PR-action against Jefsey Morfin posted

2005-09-30 Thread Melinda Shore
On 9/30/05 3:07 PM, Michael Thomas [EMAIL PROTECTED] wrote:
 what about:
 
 - killfile the person and encourage others to do the same?

Unfortunately that no longer works all that well on Usenet,
either.  The participant pool grows to the point where there's
always somebody new, or somebody who thinks that the problem
person has a point and who wants to discuss it, or someone
who thinks the problem person doesn't have a point but has
some ill-defined right to be heard, and so on.  Additionally,
there has to be some process for identifying problem persons.
That can work well in some small, close-knit online
communities where there's a very large set of shared values,
but it doesn't work all that well here.

Also, note that the IETF intends to make decisions by a
modified consensus process and that process is actually
pretty fragile.  It's reasonable to provide mechanisms to
protect the process, and I think it's a lot healthier if
those mechanisms are transparent and as objective as might
be possible under the circumstances.

Mind you, I just freakin' hate this.  But I don't think the
process itself as described in 3683 is at all unreasonable.

Melinda

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Petition to the IESG for a PR-action against Jefsey Morfin posted

2005-09-30 Thread Marshall Eubanks
On Fri, 30 Sep 2005 14:00:51 -0400
 Steven M. Bellovin [EMAIL PROTECTED] wrote:
 In message [EMAIL PROTECTED], Margaret Wasserman writes:
 
 Harald is attempting to assemble information that he will use to 
 propose a PR-action (a Posting Rights action), as described in RFC 
 3683.  Once he has assembled this information, he will presumably use 
 the information to persuade a member of the IESG (an AD) to sponsor 
 this action.  That AD would then be in charge of running a fair and 
 open process to decide whether or not Jefsey Morphin's posting rights 
 should be revoked.
 
 
 I confess that I'm uneasy about Harald's action.  It has too much the 
 air of an unpopularity contest -- every one who doesn't like Jefsey's
 should sign on to kick him off the mailing list.  
 
   --Steven M. Bellovin, http://www.cs.columbia.edu/~smb
 
 


Hello;

I think it should make you uneasy. Just wait until someone on the other end of 
this puts up a
similar petition and gets a few thousands signatories after posting an 
inflammatory diary to the
right blog or mailing list.

FWIW, I have read through the various emails on this (including the emails to 
the
IETF list from M Morphin), and I do not support Harald's action.

OTOH, I have changed my mind on the other case based on Mr. Anderson's recent 
emails, and 
do support David Kessens's recent action.

Regards
Marshall Eubanks


 
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www1.ietf.org/mailman/listinfo/ietf


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: delegating (portions of) ietf list disciplinary process

2005-09-30 Thread Theodore Ts'o
On Thu, Sep 29, 2005 at 06:00:18PM -0700, Nick Staff wrote:
  2) Unless discussion of the decisions of the netiquette 
  committee, during the committee is considering a request, and 
  after the committee has rendered a decision, is ruled out of 
  scope, it's not going to help the very long discussions such 
  as this one which plague the IETF list.
  In the worst case, we can assume that the mailing list abuser 
  will immediately appeal any decision of the netiquette 
  committee, which means that after inventing this entire 
  mechanism, it may not have any effect other than prolonging the agony.
 
 I know personally, if I feel a process is fair, then even if I hate the
 decision I can accept it and move on.  That's another reason why I think it
 should be an unmanipulated membership.

That may be true for you, OK.  But that's irrelevant.  What about
someone who is mentally disturbed, or someone who is determined to
make a nuisance of himself?  How long could someone who is genuinely
determined to carry out a DOS attack on the IETF should be allowed to
do so?

I am not necessarily making any claims about anybody in parparticular,
although I do have some private opinions on this matter.  The question
is should we design a process which is open to abuse in this manner?
It seems like designing a protocol with a known security hole and
assuming that all of the participants won't violate societal norms an
exploit said security hole.  If this is considered irresponsible when
designing a protocol, should it be considered irresponsible when
designing organizational policies?

- Ted

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Reexamining premises (was Re: UN plans to take over our job!)

2005-09-30 Thread Steven M. Bellovin
In message [EMAIL PROTECTED], Michael Mealling writes:
 entire discussion by smart people deleted for brevity

Might I suggest all participants in this discussion figure out what you
really want to use DNS for if you were to assume it didn't exist in the
first place. Imagine going back in time to 1986 and explaining to
everyone at the IETF the way things would develop and then, after
they've stopped laughing, imagine what kind of system would have
resulted. My personal suspicion is that two things would be very different:

There wouldn't be one monolithic namespace/protocol/system. At least two
systems would exist: one for hiding IP network layer topology from apps
and another for describing and naming services for end users.

The system that faced the users would be inherently trademark friendly
and wouln't be hierarchical. The output of such a system wouldn't be an
IP address but instead a complex record that described a compound object
called a 'service'. It might be what people today call peer to peer
(although I have yet to find a good definition of what that means) but
that might not be an issue since the names wouldn't be hierarchical.

What I find humorous is that this community's default position seems to
be to attempt to play politics with those who are professionals at it
rather than solving the problems with technology which is what you'd
think we're good at

There are several crucial attributes that are hard to replicate that 
way.  One is uniqueness: whenever I do a query for a name, I get back 
exactly one answer, and it's the same answer everyone else should get.  
This is the problem with alternate roots -- depending on where you 
are, you can get a different answer.  It's also what differentiates it 
from a search engine -- my applications don't know how to make choices.

Beyond that, the mapping should be under control of the appropriate 
party.  I don't want the moral equivalent to Google-bombing to be 
able to divert, say, my incoming mail.

Finally, you need locality: people within an organization must be able 
to create their own names.

It may be that some of these requiremets are fundamentally at odds with 
the notion of full decentralization. 

--Steven M. Bellovin, http://www.cs.columbia.edu/~smb



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Reexamining premises (was Re: UN plans to take over our job!)

2005-09-30 Thread Michael Mealling

Steven M. Bellovin wrote:

There are several crucial attributes that are hard to replicate that 
way.  One is uniqueness: whenever I do a query for a name, I get back 
exactly one answer, and it's the same answer everyone else should get.
 



You're making assumptions that its one system. No other medium requires 
uniqueness for the names _people_ use. You and I are perfectly capable 
of understanding that there might be two Steven Bellovins in the world. 
Its the email routing system that requires uniqueness. There is no 
reason why the addresses that system uses need to be remotely 
understandable by humans. The identifier I use to look you up and be 
able to differentiate you from someone else would be run completely 
differently from the addressing system used to route a message through a 
store and forward network.


This is the problem with alternate roots -- depending on where you 
are, you can get a different answer.  It's also what differentiates it 
from a search engine -- my applications don't know how to make choices.
 



And conflating all of that into one system is the problem. Take those 
things that humans use and separate them from those things that 
computers and networks need to get things done. Don't burden people with 
the uniqueness requirement when that's not the way they expect the world 
to work and don't burden the network with having to differentiate badly 
between service behaviors given nothing but an IP address and a port 
number.


Beyond that, the mapping should be under control of the appropriate 
party.  I don't want the moral equivalent to Google-bombing to be 
able to divert, say, my incoming mail.
 



Again, you're conflating two different services that should be... Which 
is my point. Look at the problem from a purely requirements point of 
view and ignore what's been done to date.


Finally, you need locality: people within an organization must be able 
to create their own names.
 



Yep.

It may be that some of these requiremets are fundamentally at odds with 
the notion of full decentralization. 



If you try and shove it all in one system, sure The addressing 
requirements of IP addresses and SMTP addresses are different and 
probably fundamentally at odds with each other. Does that mean you 
still force both to use something that doesn't satisfy either system? No


Reexamine the premises

-MM

--
Michael Mealling  Masten Space Systems, Inc.
VP Business Development   473 Sapena Ct.
Office: +1-678-581-9656Suite 23
Cell: +1-678-640-6884 Santa Clara, CA 95054
http://masten-space.com/



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: UN

2005-09-30 Thread Hallam-Baker, Phillip

 Behalf Of Brian E Carpenter
 
 Although what WSIS may or may not decide is undoubtedly of 
 interest to the Internet community, I really think it is a 
 distraction here and now until there are concrete questions 
 for us to discuss. Our community's route to the WSIS 
 discussions is through the ISOC - where basic membership is 
 free, by the way.

The time to have discussions is before the concrete proposals are put on
the table. Once there is a plan on the table it is usually too late.

The Internet has affected the entire global economy. It should not be a
surprise then that control of the Internet is a global political issue.


There are three viable defense strategies. One is to be strong enough to
defeat any enemy that might threaten you, the second is to make an
alliance to achieve that end, the third is to establish a situation
where occupation is simply not worthwhile. At the moment the IETF
appears to be relying entirely on the second option. That relies on the
powerful ally being willing and able to continue support indefinitely.
It would be better to consider making use of the third strategy in
addition.

Defense is important but it should be the last resort of diplomacy. The
actual issues most of the countries that are raising the governance
issue are concerned about are of equal concern to the IETF community, at
least in the abstract. Nobody in the IETF is opposed to global Internet
access.

One way to preserve the current institutions in place would be to set
out a set of basic principles that would be considered binding. For
example every country has an absolute right to connect to the Internet. 

One important consequence of this would be that DNS root zone
allocations must not be withheld as a means of imposing a sanction. This
is a serious concern to certain countries even though attempting to do
so would be improbable.

The other more practical consequence is consideration of what will
happen when the IPv4 address space is finally exhausted. I suggest
people read Jarred Diamond's Collapse for ideas on what might happen
when the last IPv4 address block is cut. I suspect it would be similar
to what happened on Easter Island when the tribes that had cut down all
their own large trees found they needed wood. It is likely to be ugly,
and hypothesizing an instantaneous migration to IPv6 does not make the
problem go away. A statement to the effect that the US will be in the
same boat as everyone else when IPv4 space runs out would go a long way
to alleviate concerns here. 

And yes I know that people have been predicting the end of IPv4 address
space for years. I bet people who were worried about deforrestation on
Easter Island were also told 'people have been predicting that we will
run out of trees some day and they have always been wrong in the past'.
We are bound to run out of IPv4 addresses sooner or later.

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Reexamining premises (was Re: UN plans to take over our job!)

2005-09-30 Thread Harald Tveit Alvestrand



--On fredag, september 30, 2005 16:36:13 -0400 Michael Mealling 
[EMAIL PROTECTED] wrote:



There is no reason why the addresses that system uses need to be remotely
understandable by humans. The identifier I use to look you up and be able
to differentiate you from someone else would be run completely
differently from the addressing system used to route a message through a
store and forward network.


X.400 tried that. So did X.25.

I think one of the less-appreciated reasons the Internet succeedd was that 
its unique identifiers were *memorable*.



   Harald



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Reexamining premises (was Re: UN plans to take over our job!)

2005-09-30 Thread Steven M. Bellovin
In message [EMAIL PROTECTED], Michael Mealling writes:
Steven M. Bellovin wrote:

Reexamine the premises


I am -- these are my premises.  I lived far too long in the uucp world 
to enjoy non-unique names; they led to nothing but trouble.

Some of the other requirements are security requirements, and that's 
what I do for a living. 

I agree that the current DNS has serious problems, most notably in the 
trademark sphere.  That doesn't mean that its other premises are wrong; 
there are other navigational systems that yield unique results besides 
treees.

--Steven M. Bellovin, http://www.cs.columbia.edu/~smb



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Reexamining premises (was Re: UN plans to take over our job!)

2005-09-30 Thread Michael Mealling

Steven M. Bellovin wrote:


In message [EMAIL PROTECTED], Michael Mealling writes:
 


Steven M. Bellovin wrote:
   


Reexamine the premises
   



I am -- these are my premises.  I lived far too long in the uucp world 
to enjoy non-unique names; they led to nothing but trouble.
 



Again you're talking about mail routing and addressing mechanisms when 
the people that use DNS in their web browser are looking for a smart 
search interface that understands better what they're after and why. Why 
do those two applications have to use the same addressing scheme? Many 
of the political problems with DNS have nothing to do with routing email 
and have everything to do with the fact that its what your grandmother 
is using as an interface.


Some of the other requirements are security requirements, and that's 
what I do for a living. 
 



Sure security requires a level of exactness that you shouldn't 
burden the user with or else he won't use the system


I agree that the current DNS has serious problems, most notably in the 
trademark sphere.  That doesn't mean that its other premises are wrong; 
there are other navigational systems that yield unique results besides 
treees.




And what I'm suggesting is that uniqueness is a requirement of networks 
and system, not people. The issues the UN has with the way DNS is run 
have to do with the fact that you're trying to apply a requirement of 
the network to society and that creates problems. IMHO, we should look 
at building a system that works the way people use identifiers and 
identity and then get that to work with the existing network we have.


-MM

--
Michael Mealling  Masten Space Systems, Inc.
VP Business Development   473 Sapena Ct.
Office: +1-678-581-9656Suite 23
Cell: +1-678-640-6884 Santa Clara, CA 95054
http://masten-space.com/



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: delegating (portions of) ietf list disciplinary process

2005-09-30 Thread Gray, Eric
Ted,

One way to deal with the fact that having a fair
and impartial selection process might occasionally get
you a bad egg is to have an equally fair mechanism for
impeaching a member of the selected group.  If I am
recalling things correctly, isn't that how the same
issue is dealt with in the NomCom process?

--
Eric

-- -Original Message-
-- From: [EMAIL PROTECTED] 
-- [mailto:[EMAIL PROTECTED] Behalf Of
-- Theodore Ts'o
-- Sent: Friday, September 30, 2005 4:00 PM
-- To: Nick Staff
-- Cc: ietf@ietf.org
-- Subject: Re: delegating (portions of) ietf list disciplinary process
-- 
-- 
-- On Thu, Sep 29, 2005 at 06:00:18PM -0700, Nick Staff wrote:
--   2) Unless discussion of the decisions of the netiquette 
--   committee, during the committee is considering a request, and 
--   after the committee has rendered a decision, is ruled out of 
--   scope, it's not going to help the very long discussions such 
--   as this one which plague the IETF list.
--   In the worst case, we can assume that the mailing list abuser 
--   will immediately appeal any decision of the netiquette 
--   committee, which means that after inventing this entire 
--   mechanism, it may not have any effect other than 
-- prolonging the agony.
--  
--  I know personally, if I feel a process is fair, then even 
-- if I hate the
--  decision I can accept it and move on.  That's another 
-- reason why I think it
--  should be an unmanipulated membership.
-- 
-- That may be true for you, OK.  But that's irrelevant.  What about
-- someone who is mentally disturbed, or someone who is determined to
-- make a nuisance of himself?  How long could someone who is genuinely
-- determined to carry out a DOS attack on the IETF should be 
-- allowed to
-- do so?
-- 
-- I am not necessarily making any claims about anybody in 
-- parparticular,
-- although I do have some private opinions on this matter.  
-- The question
-- is should we design a process which is open to abuse in this manner?
-- It seems like designing a protocol with a known security hole and
-- assuming that all of the participants won't violate 
-- societal norms an
-- exploit said security hole.  If this is considered 
-- irresponsible when
-- designing a protocol, should it be considered irresponsible when
-- designing organizational policies?
-- 
-- - Ted
-- 
-- ___
-- Ietf mailing list
-- Ietf@ietf.org
-- https://www1.ietf.org/mailman/listinfo/ietf
-- 

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: UN plans to take over our job!

2005-09-30 Thread Hallam-Baker, Phillip
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On 
 Behalf Of Stephane Bortzmeyer
 
 On Thu, Sep 29, 2005 at 07:31:17AM -0400,  Will McAfee 
 [EMAIL PROTECTED] wrote  a message of 40 lines which said:
 
  http://www.theregister.co.uk/2005/09/28/wsis_geneva/
 
 There is no discussion here of a plan to take over IETF job 
 (when you say our job, I assume, from the mailing list it 
 is posted on, that you refer to IETFers).
 
 The root DNS zone or the IP address allocation (the real 
 subjects of the discussion at the WSIS) are not managed by 
 IETF so we have nothing to win or lose here.

That is not quite true. I have had discussions with parties who are
fully aware of the difference between ICANN and the IETF and it is clear
they want to take over both.



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Petition to the IESG for a PR-action against Jefsey Morfin posted

2005-09-30 Thread Anthony G. Atkielski
Melinda Shore writes:

 Unfortunately that no longer works all that well on Usenet,
 either.  The participant pool grows to the point where there's
 always somebody new, or somebody who thinks that the problem
 person has a point and who wants to discuss it, or someone
 who thinks the problem person doesn't have a point but has
 some ill-defined right to be heard, and so on.

You say it as though these were bad things.

 That can work well in some small, close-knit online
 communities where there's a very large set of shared values,
 but it doesn't work all that well here.

That is, small communities where everyone has the same opinion and no
deviations are tolerated.

 Mind you, I just freakin' hate this.  But I don't think the
 process itself as described in 3683 is at all unreasonable.

You'll hate it even more when they come looking for you instead.


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Petition to the IESG for a PR-action against Jefsey Morfin posted

2005-09-30 Thread Anthony G. Atkielski
Randy Presuhn writes:

 At the WG level, disruptive members cause an enormous increase in the
 effort required to get anything done.

How hard can it be to delete messages?

 Our desire to ensure that minority viewpoints are heard puts us in a
 difficult bind when only ones expressing those viewpoints are
 individuals who also choose to behave badly.

You can just ignore people who behave badly.  Why must they be
silenced for everyone just because you don't want to hear them?

 Invoking RFC 3934 at the WG level is not something that any WG chair
 would undertake lightly.

I don't even understand why this is an RFC.  What does it have to do
with the technical functioning of the Internet?  What next?  An RFC
establishing an official religion?

 I'm sure the IESG is fully aware of the gravity of invoking RFC 3683.

I doubt that.  If it were that aware, no such RFC would exist in the
first place.

 However, the reason the procedures exist at all is out of the
 recognition that a very few people are so abusive of our processes
 and culture that we need to be able to cut them off so that we can
 get real work done.

Translation: Everyone reaches a point where he prefers to censor
others rather than tolerate them.

 If their technical arguments have real merit, they will reach us by other
 avenues.

If other avenues work, you don't need mailing lists, do you?

 It would be so much simpler if everyone could be counted on to
 recognize (easy) and ignore (hard) the bad actors.

If people don't want to ignore them, why is it your duty to do their
thinking for them?


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: Reexamining premises (was Re: UN plans to take over our job!)

2005-09-30 Thread Hallam-Baker, Phillip
  From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On 

 There are several crucial attributes that are hard to 
 replicate that way.  One is uniqueness: whenever I do a query 
 for a name, I get back exactly one answer, and it's the same 
 answer everyone else should get.  
 This is the problem with alternate roots -- depending on 
 where you are, you can get a different answer.  It's also 
 what differentiates it from a search engine -- my 
 applications don't know how to make choices.

Alternate roots are bogus. The only case where they work is where people
do not want to connect to the rest of the world. I have a private zone
set up in my house on .local for testing. I am sure there are similar
military nets.

I have no idea why anyone would prefer (say) .gprs over .gprs.arpa or
the like.

Fragmentation of the root is a real threat, but only if people do try to
do something silly (e.g. Kyle's mom gets congress to exclude .ca).


 Beyond that, the mapping should be under control of the 
 appropriate party.  I don't want the moral equivalent to 
 Google-bombing to be able to divert, say, my incoming mail.

I don't think that this is what Michael was suggesting. His point as I
understand it is that DNS is designed to resolve a name to a machine
rather than a name,service pair to a machine.

Subsequently we have developed mechanisms such as MX and SRV that try to
change this but people continue to insist on the original architecture
as the only legitimate approach. Witness all the shouting that has gon
on around attempts to store policy information in the DNS.

Today a DNS name is a conceptual relationship to a collection of
services. 


 Finally, you need locality: people within an organization 
 must be able to create their own names.

Arbitrary registration of top level domains would not have prevented
local delegation. The problem with monolithic DNS is that it forces
hierarchy where none exists.

There is a distinction between commercial, educational and non-profit
enterprises but it is not a very important one. It is certainly not
important enough for them to require separate name spaces. Different
TLDs for different countries is also kinda bogus.

If we were redesigning the DNS today the root would contain as much
information people cared to put in it. We would work out some other
scheme for load balancing etc. The .edu/.com scheme really reflects the
NSF funding criteria of the day.


However the fact remains that we are not redesigning DNS from scratch
and it has largely been fixed already - if we choose to recognize the
fact.


One point made by Michael I think people should really take account of:

What I find humorous is that this community's default position 
seems to be to attempt to play politics with those who are
professionals 
at it rather than solving the problems with technology which is what 
you'd think we're good at

This is international power politics at the highest level. The real
issue here is not governance of the Internet, that is just a convenient
pretext.

There is a diplomatic battle going on here that threatens to become a
real war. Diplomats prefer to avoid wars so they invented 'protocol'
which at certain times mean that the participants go off and find
something they can fight over that allows them to demonstrate the stakes
and their positions with less risk of actual fighting. 

This is of course the main reason why most people would prefer to avoid
that type of involvement.


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Reexamining premises (was Re: UN plans to take over our job!)

2005-09-30 Thread Anthony G. Atkielski
Michael Mealling writes:

 The system that faced the users would be inherently trademark friendly
 and wouln't be hierarchical.

There are lots of users of the Internet besides trademark holders.  I
don't see why this latter group deserves special consideration.

 The output of such a system wouldn't be an IP address but instead a
 complex record that described a compound object called a 'service'.

I always get nervous when I hear talk like this.  I can picture the
5000-page committee-designed specification already.


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Reexamining premises (was Re: UN plans to take over our job!)

2005-09-30 Thread Michael Mealling

Hallam-Baker, Phillip wrote:

Beyond that, the mapping should be under control of the 
appropriate party.  I don't want the moral equivalent to 
Google-bombing to be able to divert, say, my incoming mail.
   



I don't think that this is what Michael was suggesting. His point as I
understand it is that DNS is designed to resolve a name to a machine
rather than a name,service pair to a machine.
 



Sort of. What I was trying to get at was that DNS is designed to resolve 
an identifier to a machine for consumption by computer programs, not as 
a human factors component of a user facing system capable of helping 
humans get things done that humans care about. Its the difference 
between forcing my grandmother to learn SQL to do a search and giving 
her Ask Jeeves.


To get specific for a moment, my suggestion here is that the IETF take a 
look at what the W3C and the general web community is doing around 
navigation, tagging (see Technorati, del.icio.us, flickr), advances in 
NLP that Google is working on, etc. Perhaps the solution is to tell the 
world that DNS isn't really meant for your grandmother or your favorite 
polititicain and instead we're going to do something at the web layer 
that's more in tune with how people are actually using the Internet, not 
how mail gets routed


And maybe that work doesn't belong here

-MM

--
Michael Mealling  Masten Space Systems, Inc.
VP Business Development   473 Sapena Ct.
Office: +1-678-581-9656Suite 23
Cell: +1-678-640-6884 Santa Clara, CA 95054
http://masten-space.com/



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Reexamining premises (was Re: UN plans to take over our job!)

2005-09-30 Thread Michael Mealling

Anthony G. Atkielski wrote:


Michael Mealling writes:
 


Again, you're conflating two different services that should be... Which
is my point. Look at the problem from a purely requirements point of
view and ignore what's been done to date.
   



Look at the problem from an implementation point of view and remain
realistic as to what is possible if one wants any semblance of order
and performance.
 



I have. As have others. See the following:
draft-daigle-iris-slsreg-00.txt
draft-hollenbeck-epp-sls-00.txt

All very deployable and rather easy to build and setup...


Reexamine the premises
   



Don't fix what isn't broken.
 



Well, given the origin of this thread, there are large numbers of users 
who consider the current system to be broken. And they have money and 
power so they're going to find a solution. The question is whether this 
organization is going to be involved in that answer or not. You can 
either sit back and feel smug about thinking your solution is right or 
you can address the perceived problems of the users and provide them 
with technical solutions to it


-MM

--
Michael Mealling  Masten Space Systems, Inc.
VP Business Development   473 Sapena Ct.
Office: +1-678-581-9656Suite 23
Cell: +1-678-640-6884 Santa Clara, CA 95054
http://masten-space.com/



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Reexamining premises (was Re: UN plans to take over our job!)

2005-09-30 Thread Michael Mealling

Anthony G. Atkielski wrote:


Michael Mealling writes:
 


The system that faced the users would be inherently trademark friendly
and wouln't be hierarchical.
   



There are lots of users of the Internet besides trademark holders.  I
don't see why this latter group deserves special consideration.
 



Because, particular codifications of it in the law aside, it represents 
a pretty good description of how human beings cognitively use names and 
words. It has many centuries of operational experience and it apparently 
works for everything humans need it to. But for some reason those of us 
who designed the Internet seem to think we're above all of that and can 
dictate a system to the end users that's dissonate with how they 
actually think and view the world.



The output of such a system wouldn't be an IP address but instead a
complex record that described a compound object called a 'service'.
   



I always get nervous when I hear talk like this.  I can picture the
5000-page committee-designed specification already.



Well, I didn't want to get into specifics but from what I've seen a URI 
with a service identifier tag seems to be fine for everyone that has 
looked a the problem So you shouldn't be nervous, the web seems to 
be working just fine


-MM


--
Michael Mealling  Masten Space Systems, Inc.
VP Business Development   473 Sapena Ct.
Office: +1-678-581-9656Suite 23
Cell: +1-678-640-6884 Santa Clara, CA 95054
http://masten-space.com/



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Reexamining premises (was Re: UN plans to take over our job!)

2005-09-30 Thread John C Klensin
David,

Two minor points of calibration.  I've got (strong) opinions
about some of this, but am going to try to write this note as
neutrally as possible, just explaining where things stand.

--On Friday, 30 September, 2005 14:34 -0700 Dave Singer
[EMAIL PROTECTED] wrote:

...
 a) Design of the protocols and specifications;  the IETF does
 that, and I don't think anyone is thinking of taking that
 away.  So The UN is taking on the IETF's job is a
 non-suggestion non-starter.

Without getting into a discussion of how legitimate the claims
are or how likely any decisions that might be made would mean
anything, there are definitely forces within the WSIS process
that believe that the IETF has outlived its usefulness, that the
development of Internet protocols and technical standards has
become too important to be left to a bunch of undisciplined
volunteer engineers (that is pretty close to a quote) and needs
to be turned over to a body in which decision-making rests with
governments, etc.  That body would presumably, but not
necessarily, be the ITU which is part of the UN system.

...
 I, for one, would be much happier in a world
 where I know who has the authority to decide whether you
 really are a company with that name -- with the answer being,
 the authorities in the identified area.  So, adding
 non-geographic TLDs to my mind, is a mistake;  I'd prefer
 fewer of them.  Deprecate .com in favor of .co.us (or
 .co.hm or wherever else you want to be).  And if Tuvalu
 wants to continue to sell its name to first-come-first-served,
 it may;  I will soon learn to give .tv names the same (low)
 level of trust I give .com.
 
 If this were the agreement, the question of who operates the
 root DNSs, routers, and the like would be almost as
 uncontroversial as to who designs the protocols, in my opinion.

Ultimately someone has to operate the keyboard that puts lines/
records into what ultimately becomes the root zone file.  And
someone has to supervise that person/ entity. When someone comes
along and says (to use your example), the nameservers for .hm
should be X, Y, and Z, a determination has to be made as to
whether that request is legitimate and authorized wrt either the
current administration of .HM or the government responsible for
Heard Island and the McDonald Islands.  Note that statement
about legitimacy and authority actually involves several choices
which might need to be made.

Now, for better or worse, that evaluation process, particularly
for ccTLDs, has been the source of an immense amount of
controversy.  Those who get most excited about the status quo
don't acknowledge that ICANN is a legitimate, international,
multi-stakeholder, private-sector organization but, instead,
refer to it simply as the US Government Contractor.   They
point out that the US Government has asserted responsibility
for, and control of, the root zone and that it clearly has the
ability to overrule ICANN in determinations about root zone
entries.  They then proceed to say that the determinations as to
the legitimacy of requests to change the records for a given
ccTLD should not be in the hands of any one country, and say it
in a way that makes it very clear that the statement implies
especially a country they don't like, don't trust, and which
has a reputation for throwing its weight around.

So that situation is, in practice, anything but uncontroversial.

john


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Reexamining premises (was Re: UN plans to take over our job!)

2005-09-30 Thread Anthony G. Atkielski
Michael Mealling writes:

 You're making assumptions that its one system. No other medium requires
 uniqueness for the names _people_ use.

Any medium that does not require it tends to be extremely inefficient
and error-prone.

 You and I are perfectly capable of understanding that there might
 be two Steven Bellovins in the world.

When there are twenty million John Smiths in the world, the problem
becomes impossible to manage.

 And conflating all of that into one system is the problem. Take those
 things that humans use and separate them from those things that 
 computers and networks need to get things done.

That's what the DNS does.  But the greater the distance separating the
two, the more complex, slow, and error-prone the system will be.  You
cannot allow human users to work in a disorderly way and expect to get
an orderly result at the machine level.  The system cannot think on
behalf of the people using it.

 Don't burden people with the uniqueness requirement when that's
 not the way they expect the world to work ...

They don't seem to have a problem with that burden when it comes to
using telephones.

 ... and don't burden the network with having to differentiate badly
 between service behaviors given nothing but an IP address and a port
 number.

What's bad about the differentiation?

 Again, you're conflating two different services that should be... Which
 is my point. Look at the problem from a purely requirements point of
 view and ignore what's been done to date.

Look at the problem from an implementation point of view and remain
realistic as to what is possible if one wants any semblance of order
and performance.

 Reexamine the premises

Don't fix what isn't broken.






___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Reexamining premises (was Re: UN plans to take over our job!)

2005-09-30 Thread Anthony G. Atkielski
Hallam-Baker, Phillip writes:

 Alternate roots are bogus. The only case where they work is where people
 do not want to connect to the rest of the world.

That's exactly what a lot of national governments would like to do.

 Fragmentation of the root is a real threat, but only if people do
 try to do something silly (e.g. Kyle's mom gets congress to exclude
 .ca).

That's exactly what a lot of national governments would like to do.

 Subsequently we have developed mechanisms such as MX and SRV that
 try to change this but people continue to insist on the original
 architecture as the only legitimate approach. Witness all the
 shouting that has gon on around attempts to store policy information
 in the DNS.

When every change must be propagated to a billion machines, a
conservative approach is best.

 Arbitrary registration of top level domains would not have prevented
 local delegation. The problem with monolithic DNS is that it forces
 hierarchy where none exists.

But it does exist, just as it does for the telephone network.

 If we were redesigning the DNS today the root would contain as much
 information people cared to put in it.

If we were redesigning it today, it would never actually be up and
running.  Instead, it would be continually revised in endless volumes
of specifications written by people with nothing better to do in life,
and nobody would implement more than a fraction of the spec, and
they'd always be several versions behind, and their implementations
would never be quite correct, and nothing would ever work together
very smoothly at all.

The reason the Internet is successful is that it was designed before
the bureaucrats took over.  The reason X.400 failed is that it was
designed after the bureaucrats took over.




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Reexamining premises (was Re: UN plans to take over our job!)

2005-09-30 Thread Anthony G. Atkielski
Michael Mealling writes:

 Because, particular codifications of it in the law aside, it represents
 a pretty good description of how human beings cognitively use names and
 words.

No, it simply represents the way trademark holders force others to do
their bidding.  IP law is already enough of a pox on society as it is,
there's no reason to make it worse by encoding it in the world's only
global computer network.

 It has many centuries of operational experience and it apparently
 works for everything humans need it to.

Centuries of experience for trademarks?  I seem to recall it being
much younger than that.  And abuse of such concepts has increased
exponentially over the past few decades.

 But for some reason those of us who designed the Internet seem to
 think we're above all of that and can dictate a system to the end
 users that's dissonate with how they actually think and view the
 world.

Except that 99.999% of all Internet users do _not_ think in terms of
trademark law.  Only a handful of extremely wealthy corporations think
in that way.

 Well, I didn't want to get into specifics but from what I've seen a URI
 with a service identifier tag seems to be fine for everyone that has
 looked a the problem So you shouldn't be nervous, the web seems to
 be working just fine

What do URIs not have now that they need?


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Reexamining premises (was Re: UN plans to take over our job!)

2005-09-30 Thread Anthony G. Atkielski
Michael Mealling writes:

 All very deployable and rather easy to build and setup...

So is the current system.  Why does it have to change?

 Well, given the origin of this thread, there are large numbers of
 users who consider the current system to be broken.

More specifically, there are certain entities that feel they don't
have enough control over the system.  They don't want a system in
which anyone can do anything, even if they don't approve of it
personally.  Freedom frightens them.

 And they have money and power so they're going to find a solution.

Translation: They have money and power so they are going to eliminate
freedom.

 The question is whether this organization is going to be involved in
 that answer or not. You can either sit back and feel smug about
 thinking your solution is right or you can address the perceived
 problems of the users and provide them with technical solutions to
 it

I don't hear too many _users_ complaining about anything.  It's mainly
corporations and governments who want to control every bit that passes
over the Net.


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Reexamining premises (was Re: UN plans to take over our job!)

2005-09-30 Thread Anthony G. Atkielski
Michael Mealling writes:

 To get specific for a moment, my suggestion here is that the IETF take a
 look at what the W3C and the general web community is doing around 
 navigation, tagging (see Technorati, del.icio.us, flickr), advances in
 NLP that Google is working on, etc. Perhaps the solution is to tell the
 world that DNS isn't really meant for your grandmother or your favorite
 polititicain and instead we're going to do something at the web layer
 that's more in tune with how people are actually using the Internet, not
 how mail gets routed

Do it with telephones first, as a proof of concept.  If there's still
a usable telephone network after that, then perhaps it might be worthy
of consideration for the Internet.


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Reexamining premises (was Re: UN plans to take over our job!)

2005-09-30 Thread Michael Mealling

Anthony G. Atkielski wrote:


Michael Mealling writes:

 


To get specific for a moment, my suggestion here is that the IETF take a
look at what the W3C and the general web community is doing around 
navigation, tagging (see Technorati, del.icio.us, flickr), advances in

NLP that Google is working on, etc. Perhaps the solution is to tell the
world that DNS isn't really meant for your grandmother or your favorite
polititicain and instead we're going to do something at the web layer
that's more in tune with how people are actually using the Internet, not
how mail gets routed
   



Do it with telephones first, as a proof of concept.  If there's still
a usable telephone network after that, then perhaps it might be worthy
of consideration for the Internet.
 



Being one of the co-authors of the ENUM spec, I've actually paid 
attention to how that's all working out. Have you checked into how Skype 
and VOIP in general are working internationally lately? Not an E.164 
phone number anywhere in the entire thing. Its all identifiers that look 
like AOL screen names and peering agreements. And it seems to be working 
out just fine


-MM

--
Michael Mealling  Masten Space Systems, Inc.
VP Business Development   473 Sapena Ct.
Office: +1-678-581-9656Suite 23
Cell: +1-678-640-6884 Santa Clara, CA 95054
http://masten-space.com/



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Reexamining premises (was Re: UN plans to take over our job!)

2005-09-30 Thread Michael Mealling

Anthony G. Atkielski wrote:


Michael Mealling writes:
 


Well, I didn't want to get into specifics but from what I've seen a URI
with a service identifier tag seems to be fine for everyone that has
looked a the problem So you shouldn't be nervous, the web seems to
be working just fine
   



What do URIs not have now that they need?
 


As the result of a service lookup they only need something that identifies the 
class and subclass of the service the URI is an identifier for...

See the various specs that use NAPTR records for some examples of how the 
Service field is used...

-MM


--
Michael Mealling  Masten Space Systems, Inc.
VP Business Development   473 Sapena Ct.
Office: +1-678-581-9656Suite 23
Cell: +1-678-640-6884 Santa Clara, CA 95054
http://masten-space.com/



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Reexamining premises (was Re: UN plans to take over our job!)

2005-09-30 Thread Bob Braden

  * 
  * X.400 tried that. So did X.25.
  * 
  * I think one of the less-appreciated reasons the Internet succeedd was that 
  * its unique identifiers were *memorable*.
  * 
  * 
  * Harald
  * 
  * 

And unlike X.500, the DNS was *conceptually SIMPLE*.

Historical note: in the early/mid 1980s, the IAB and its US government
funders were very concerned with the name lookup problem.  They
realized that the DNS was designed for host name lookup.  The
government tasked the IAB with developing a yellow pages service to
complement the white pages of the DNS.  But this effort got wrapped
entirely around the complexity of X.500, a top-down standard with
little/no running code, and died.  This will all be found in early IAB
meeting minutes.

Bob Braden

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Reexamining premises (was Re: UN plans to take over our job!)

2005-09-30 Thread Anthony G. Atkielski
Michael Mealling writes:

 As the result of a service lookup they only need something that
 identifies the class and subclass of the service the URI is an
 identifier for...

What's wrong with http at the front, and/or a port number at the
back?


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Reexamining premises (was Re: UN plans to take over our job!)

2005-09-30 Thread Anthony G. Atkielski
Michael Mealling writes:

 Have you checked into how Skype and VOIP in general are working
 internationally lately?

No.  I already have a telephone.

 Not an E.164 phone number anywhere in the entire thing. Its all identifiers 
 that look
 like AOL screen names and peering agreements. And it seems to be working
 out just fine

Okay, now make it work for the existing telephone system.


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Reexamining premises (was Re: UN plans to take over our job!)

2005-09-30 Thread Michael Mealling

Anthony G. Atkielski wrote:


Michael Mealling writes:

 


As the result of a service lookup they only need something that
identifies the class and subclass of the service the URI is an
identifier for...
   



What's wrong with http at the front, and/or a port number at the
back?
 



Those are network concepts. The service I'm talking about has to do 
with the task the user is actually attempting to accomplish.


http://foo.com:1235/bla.php

Tells me nothing about whether I can use that for the I want the 
current weather report service or if its a DAV entry point for doing 
collaborative document management


That's my last one on this thread. I'm not in this business anymore

-MM

--
Michael Mealling  Masten Space Systems, Inc.
VP Business Development   473 Sapena Ct.
Office: +1-678-581-9656Suite 23
Cell: +1-678-640-6884 Santa Clara, CA 95054
http://masten-space.com/



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Petition to the IESG for a PR-action against Jefsey Morfinposted

2005-09-30 Thread Randy Presuhn
Hi -

 From: Anthony G. Atkielski [EMAIL PROTECTED]
 To: ietf@ietf.org
 Sent: Friday, September 30, 2005 2:52 PM
 Subject: Re: Petition to the IESG for a PR-action against Jefsey Morfinposted


 Randy Presuhn writes:

  At the WG level, disruptive members cause an enormous increase in the
  effort required to get anything done.

 How hard can it be to delete messages?

  Our desire to ensure that minority viewpoints are heard puts us in a
  difficult bind when only ones expressing those viewpoints are
  individuals who also choose to behave badly.

 You can just ignore people who behave badly.  Why must they be
 silenced for everyone just because you don't want to hear them?

  Invoking RFC 3934 at the WG level is not something that any WG chair
  would undertake lightly.

 I don't even understand why this is an RFC.  What does it have to do
 with the technical functioning of the Internet?  What next?  An RFC
 establishing an official religion?

  I'm sure the IESG is fully aware of the gravity of invoking RFC 3683.

 I doubt that.  If it were that aware, no such RFC would exist in the
 first place.

  However, the reason the procedures exist at all is out of the
  recognition that a very few people are so abusive of our processes
  and culture that we need to be able to cut them off so that we can
  get real work done.

 Translation: Everyone reaches a point where he prefers to censor
 others rather than tolerate them.

  If their technical arguments have real merit, they will reach us by other
  avenues.

 If other avenues work, you don't need mailing lists, do you?

  It would be so much simpler if everyone could be counted on to
  recognize (easy) and ignore (hard) the bad actors.

 If people don't want to ignore them, why is it your duty to do their
 thinking for them?
...

The context of my response was Anthony's earlier posting which mused:
 If the IESG has the time to compile blacklists and go on witch hunts,
 perhaps it doesn't have enough work to justify its existence.

My answer to Anthony's questions is that I've experienced
one of these onslaughts while serving as a WG co-chair.  In that position,
one does NOT have the luxury of killfiles, and can NOT simply ignore
their technical arguments, particularly when the postings are filled with
threats of appeals and other invocations of time-and-resource consuming
process mechanisms.  When the bad behaviour triggers bad behaviour
in other WG members and distracts the WG from its deliverables, we
all suffer, but *especially* the ADs and WG chairs.  We have far too much
to do as it is.  Dealing with trivial-issue DoS attacks, psuedo-technical 
postings
that must be scanned in hope of somehow finding a plausible concern,
and constant threats of appeal *dramatically* increases the workload.

Randy




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Reexamining premises (was Re: UN plans to take over our job!)

2005-09-30 Thread Noel Chiappa
 From: John C Klensin [EMAIL PROTECTED]

 there are definitely forces within the WSIS process that believe that
 the IETF has outlived its usefulness, that the development of Internet
 protocols and technical standards has become too important to be left
 to a bunch of undisciplined volunteer engineers (that is pretty close
 to a quote)

Far be it from me to defend the IETF (of which I don't have that high an
opinion these days), but the historical irony here is a bit too rich for me to
pass up.

Those with very long memories will remember when the Internet Working Group
(the predecessor to the IETF) was told, by another international body, to
roll up their their toy academic network and take it home (again, pretty
close to a quote, but I'm going from memory here; perhaps someone else can
correct my undoubtly-failing memory).

I don't know what the IETF will-be/is-being replaced by, but one thing I
think you can bet on it *not* being replaced by is some standards body
blessed by a bunch of international bureacrats acting at the behest of their
governments.

Been there, done that.

Noel

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: UN plans to take over our job!

2005-09-30 Thread Noel Chiappa
 From: Stephane Bortzmeyer [EMAIL PROTECTED]

 IP address allocation (the real subjects of the discussion at the WSIS)
 are not managed by IETF so we have nothing to win or lose here.

Actually, we do, at least in the case of IP addresses. If some WSIS-blessed
bureacracy decides to make IP addresses portable (like phone numbers in a
number of jurisdictions), the technical people will be in deep do-do. (And of
course that issue is 100% the same in IPv4/6, since the semantics of IPv4/6
addresses are basically the same, as are the routing [path-selection]
mechanisms in both.)

Noel

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: Reexamining premises (was Re: UN plans to take over our job!)

2005-09-30 Thread Thomas Gal
 
 Michael Mealling writes:
 
  Because, particular codifications of it in the law aside, it 
  represents a pretty good description of how human beings 
 cognitively 
  use names and words.
 
 No, it simply represents the way trademark holders force 
 others to do their bidding.  IP law is already enough of a 
 pox on society as it is, there's no reason to make it worse 
 by encoding it in the world's only global computer network.
 
  It has many centuries of operational experience and it apparently 
  works for everything humans need it to.
 
 Centuries of experience for trademarks?  I seem to recall it 
 being much younger than that.  And abuse of such concepts has 
 increased exponentially over the past few decades.


Perhaps he's referring to the fact that civilizations have dealt with
couterfiting and fraudulence for centuries. Any sort of identity notion at
the highest level is really just a trademark. We've just added things like
social security nubmers, places of birth etc. to our structure for naming
people. I'd really be quite happy if I was never again to mistype one
character of a URL only to end up at some site that is piggybacking on the
few hundred people a day who make a typographical error. All of the issues
with fake sites exploiting multilingual character sets and other issues in
the infrastructure that allow phising attacks etc. all involve a notion of
trademark or unique identity in one way or another.
 
  But for some reason those of us who designed the Internet seem to 
  think we're above all of that and can dictate a system to the end 
  users that's dissonate with how they actually think and view the 
  world.
 
 Except that 99.999% of all Internet users do _not_ think in 
 terms of trademark law.  Only a handful of extremely wealthy 
 corporations think in that way.
 
  Well, I didn't want to get into specifics but from what I've seen a 
  URI with a service identifier tag seems to be fine for 
 everyone that 
  has looked a the problem So you shouldn't be nervous, the web 
  seems to be working just fine
 
 What do URIs not have now that they need?
 
 

Now that everyone can have a SIP address for everything.nothing at all!
Seriously though I'm sure we could come up with lots of one off corner
cases, but all in all considering the encumberance of technology evolution
I'd say we're doing pretty good.

-Tom


smime.p7s
Description: S/MIME cryptographic signature
___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: Reexamining premises (was Re: UN plans to take over our job!)

2005-09-30 Thread Thomas Gal
 Michael Mealling writes:
 
  All very deployable and rather easy to build and setup...
 
 So is the current system.  Why does it have to change?
 
  Well, given the origin of this thread, there are large numbers of 
  users who consider the current system to be broken.
 
 More specifically, there are certain entities that feel they 
 don't have enough control over the system.  They don't want a 
 system in which anyone can do anything, even if they don't 
 approve of it personally.  Freedom frightens them.
 

Well certainly the network controls in place in china are a good example of
this. HOWEVER I'd say really it all boild down to power.

  And they have money and power so they're going to find a solution.
 
 Translation: They have money and power so they are going to 
 eliminate freedom.
 
  The question is whether this organization is going to be 
 involved in 
  that answer or not. You can either sit back and feel smug about 
  thinking your solution is right or you can address the perceived 
  problems of the users and provide them with technical solutions to 
  it
 
 I don't hear too many _users_ complaining about anything.  
 It's mainly corporations and governments who want to control 
 every bit that passes over the Net.
 

YES! Not to mention the plethora of engineers and geeks who know too much
about what's going on and CAN complain. I'd say as more of our knowledge
pervades society more people could understand the issues that bother some
people.

-Tom


smime.p7s
Description: S/MIME cryptographic signature
___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: delegating (portions of) ietf list disciplinary process

2005-09-30 Thread Nick Staff
 From: Theodore Ts'o [mailto:[EMAIL PROTECTED] 
 
 On Thu, Sep 29, 2005 at 06:00:18PM -0700, Nick Staff wrote:
   2) Unless discussion of the decisions of the netiquette 
 committee, 
   during the committee is considering a request, and after the 
   committee has rendered a decision, is ruled out of scope, 
 it's not 
   going to help the very long discussions such as this one which 
   plague the IETF list.
   In the worst case, we can assume that the mailing list 
 abuser will 
   immediately appeal any decision of the netiquette 
 committee, which 
   means that after inventing this entire mechanism, it may not have 
   any effect other than prolonging the agony.
  
  I know personally, if I feel a process is fair, then even if I hate 
  the decision I can accept it and move on.  That's another 
 reason why I 
  think it should be an unmanipulated membership.
 
 That may be true for you, OK.  But that's irrelevant.  What 
 about someone who is mentally disturbed, or someone who is 
 determined to make a nuisance of himself?  How long could 
 someone who is genuinely determined to carry out a DOS attack 
 on the IETF should be allowed to do so?
 
 I am not necessarily making any claims about anybody in 
 parparticular, although I do have some private opinions on 
 this matter.  The question is should we design a process 
 which is open to abuse in this manner?
 It seems like designing a protocol with a known security hole 
 and assuming that all of the participants won't violate 
 societal norms an exploit said security hole.  If this is 
 considered irresponsible when designing a protocol, should it 
 be considered irresponsible when designing organizational policies?
 
   - Ted
Absolutely I agree Ted.  I was just trying to express how it would effect me
as that's the only position I can (sometimes) speak authoritatively on.
Ultimately I don't see what you're suggesting that has any addition controls
- whether it's a committee or a single person the same appeal process can be
used and the same controls put in place.  If you are referring to one of the
committee members being wacko I think I provided sufficient control for that
(as nothing requires unanimous vote and voting can be forced by majority).
If it's a nut job list participant then I guess I could call some old
friends in South Central Los Angeles to chop off their fingers but then
there's always speech recognition...I guess my question to you is please
tell me exactly what your concern is (if you want to do this off-list so we
don't annoy everyone that's cool with me) and I promise I will address them
and try to work with you to find an agreeable solution.

Best,

Nick


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Reexamining premises (was Re: UN plans to take over our job!)

2005-09-30 Thread John C Klensin


--On Friday, 30 September, 2005 19:00 -0400 Noel Chiappa
[EMAIL PROTECTED] wrote:

  From: John C Klensin [EMAIL PROTECTED]
 
  there are definitely forces within the WSIS process that
 believe that  the IETF has outlived its usefulness, that
 the development of Internet  protocols and technical
 standards has become too important to be left  to a bunch
 of undisciplined volunteer engineers (that is pretty close
  to a quote)
 
 Far be it from me to defend the IETF (of which I don't have
 that high an opinion these days), but the historical irony
 here is a bit too rich for me to pass up.
 
 Those with very long memories will remember when the Internet
 Working Group (the predecessor to the IETF) was told, by
 another international body, to roll up their their toy
 academic network and take it home (again, pretty close to a
 quote, but I'm going from memory here; perhaps someone else can
 correct my undoubtly-failing memory).
 
 I don't know what the IETF will-be/is-being replaced by, but
 one thing I think you can bet on it *not* being replaced by is
 some standards body blessed by a bunch of international
 bureacrats acting at the behest of their governments.
 
 Been there, done that.

As I tried to indicate in my earlier note, I was trying to write
it in a very neutral fashion, just describing the forces at
work, rather than my opinion of them or their plausibility.

I do have that long a memory.  Writing the note that way was
hard.  

For those who do not know the history, are curious, or who might
find themselves in the position of advising those who are part
of these discussions, Appendix C to Marshall Rose's _The
Internet Message: Closing the Book with Electronic Mail_,
Prentice-Hall, 1993 makes extremely illuminating and
entertaining reading.   With a dozen year's hindsight, I'd go so
far as to suggest that Marshall's observations about OSI and the
process that produced it were too optimistic.

 john



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Reexamining premises (was Re: UN plans to take over our job!)

2005-09-30 Thread David Kessens

Harald,

On Fri, Sep 30, 2005 at 10:59:47PM +0200, Harald Tveit Alvestrand wrote:
 
 --On fredag, september 30, 2005 16:36:13 -0400 Michael Mealling 
 [EMAIL PROTECTED] wrote:
 
 There is no reason why the addresses that system uses need to be remotely
 understandable by humans. The identifier I use to look you up and be able
 to differentiate you from someone else would be run completely
 differently from the addressing system used to route a message through a
 store and forward network.
 
 X.400 tried that. So did X.25.
 
 I think one of the less-appreciated reasons the Internet succeedd was that 
 its unique identifiers were *memorable*.

And the use of a very simple characterset for these identifiers helped
a lot too.

David Kessens
---

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf