Home   News   Forums   Log in    Get personal advice    My area     Help    
|
Go to:
All forums
  Voting in IETF

KOM2002 (meta)  Voting in IETF

Command at: All forums

Create FAQ table info Help

Max text field length: Selection: Languages:
Voting in IETF
From: KOM Administrator
Date: Wed, 13 Dec 2023 17:17:04 +0100
Language: English

 
meta
Network Working Group Jacob Palme
Internet Draft
Stockholm Stockholm University
draft-palme-voting-00.txt University/KTH Date: May 2022




Voting in IETF

Status of this Memo


This document is an Internet-Draft and is in full
conformance with all provisions of Section 10 of RFC2026.

Internet-Drafts are working documents of the Internet
Engineering Task Force (IETF), its areas, and its working groups.
Note that other groups may also distribute working documents as
Internet-Drafts.

Internet-Drafts are draft documents valid for a maximum of
six months and may be updated, replaced, or obsoleted by other
documents at any time. It is inappropriate to use
Internet-Drafts as reference material or to cite them other than as
"work in progress."

The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt

The list of Internet-Draft Shadow Directories can be
accessed at http://www.ietf.org/shadow.html.

Copyright (C) The Internet Society 2002. All Rights Reserved.


Abstract

This memo discusses whether voting is useful or is not
useful in IETF work. The main conclusion is that
conventional decisive votings are usually not suitable for
IETF work, but that specially designed voting methods
could be an aid to IETF.


Mailing list

There is not yet any mailing list particular to this
topic.
To write

Further discussion of this memo can take place in the
mailing list LANGTRANS@SU.SE.

Comments on less important details may also be sent to
the editor, Jacob Palme�.

To subscribe

To subscribe to this mailing list, send a message to
LISTSERV@SU.SE
which contains the text
SUB[SCRIBE] LANGTRANS�
address)>

To unsubscribe

To unsubscribe from this list, send a message to
LISTSERV@SU.SE
which contains the text
UNS[UBSCRIBE] LANGTRANS

To access mailing list archives

The archives are available for browsing from
http://salut.nu/forum/uno/6/1/ Use the browsing command
"All messages" to get everything written on a single web page.


Table of Contents
1.1 Abstract
1.2 Mailing list
Table of Contents
2 Language Support in Existing Standards
3 Multi-Language Scenario
4 The Content-Translation-Of Header Field
5 The Content-Translator Header Field
6 Use of The Multipart/Alternative MIME Content
Type
7 The Translation-Request Header
8 Examples
8.1 Separate Original and Translated Messages
8.2 Sending a Message to a Translator Agent
from a Translation-Aware Mailer
8.3 Sending a Message to a Translator Agent
from a Non-Translation-Aware Mailer
8.4 Resending of the Message in 8.2 After
Translation
9 For Further Study
10 Security Considerations
11 Copyright and Disclaimer
12 Acknowledgments
13 References
14 Author's Address
Appendix A: A Discussion of Alternative Ways of
Handling Translation in E-Mail
Appendix B: An Investigation of Handling of
Multipart/Alternative in some Common Mailers in
November 2000 and November 2001


1 The Humming Method for Voting in IETF

An often cited IETF credo is "No Voting". In spite of
this, everyone who has been active in IETF standards work
knows that voting does occur fairly often, IETF has even
its own famous voting method, the humming method. With
this method, people hum instead of putting up their hands.
This means that people who are very sure of their opinion
can hum loader than those not so sure. The total hum of
all participants will thus count hums by those who are
very sure of their opinion higher than hums of those who
are not so sure. This does of course not work perfectly,
but is interesting because it attempts to overcome one
shortcoming of conventional voting.


2 Why is Conventional Voting not always Suitable in
IETF Work

Conventional voting usually involves specifying two or
more alternatives, and then asking how many people support
each alternative. If there are more than two alternatives,
the alternatives are sorted in some way so that each vote
only compares two alternatives. The alternative which gets
most votes is then the decision taken.

This conventional voting method has many disadvantages for
IETF work:

a) In standards work, it is better to think more
before a decision is made. Traditional voting has a risk
of making decisions too fast, not having considered all
options.

b) In standards work, each person is not equal. The
opinions of people who are known to have good technical
knowledge and sound opinions is counted higher than the
opinions of people who are known to often take extreme,
ill-considered views.

c) The goal of IETF decisions is "rough consensus"
which can be defined as "finding a solution which a large
majority of those who are known to have good technical
knowledge supports". Consider the following situation:

Solution A Solution B
----------------------------------
Very good 60 % 40 %
Good 0 % 60 %
Bad 0 % 0 %
Very bad 40 % 0 %

In the case described above, a conventional voting would
select Choice A, even though there is obviously rough
consensus for Solution B, but not rough consensus for
Solution A.


3 Why Voting may Sometimes be Useful in IETF

Most of the work in IETF is done through mailing list
communication between face-to-face meetings. This memo
only discusses voting in such e-mailed lists. Voting at
face-to-face meetings is a separate issue.

IETF has shown that technical standards work can be
progressed well through mailing list work. One large
advantage of mailing list work is that a decision is
reached gradually over many days. An expert can always
think about the issue and propose a new argument or a new
problem the next day. In face-to-face meetings, not making
a decision means that the decision is delayed until the
next face-to-face meeting, and this is a factor which can
force face-to-face meetings to make premature decisions
without fully considering the options and choices.

It is, however, a well-known fact, that progress in IETF
mailing lists is sometimes slow. There is, sometimes, a
tendency for the same arguments repeated over and over
again, without reaching a consensus. Sometimes, the result
is a vague standard which does not clarify clearly how the
designed protocol should work in the controversial case.
And such vagueness in standards is not good! Vague
standards imply the risk of different implementers
interpreting the standard in different ways, which might
cause interoperability problems.

The reason why work in mailing lists is slow is not fully
known, but one cause may be the lack of so-called
backchannels. Backchannels, such as body language, is a
way of showing the opinions in a group without having to
actually talk. In a mailing list, the only way to have
your view heard is to write a message. You could of course
only write a message saying "I agree" but often convention
requires you to explain why, even if the explanation is
only a repetition of what others have already written. If
you stop contributing to a discussion, because you feel
that your opinion and the arguments for it has already
been stated, then this may be interpreted by others as if
you have given up. Experts therefore feel a need to state
their opinion again, even if it is only a repetition of
what has been already said.

One extreme example of problems with decisions in mailing
lists is the issue of the "Reply-To" e-mail header in the
DRUMS IETF working group. This discussion caused thousands
of messages written during many months, and in spite of
this, no consensus was reached, and the final result was
just the kind of vagueness which should be avoided in good
standards.

(The problem with "Reply-To" is that it can recommend both
an address for reaching only the author of the replied-to
message, and an address for reaching a group, such as all
who got the replied-to message. The final result of the
DRUMS work, RFC2822, does not specify clearly which of
these alternatives is meant.)


4 What Kind of Voting Could be Suitable for IETF?


Considering the points made above, here are some
requirements on voting for use in IETF:

a) Voting should not be secret. The names of who voted
how should be displayed clearly in the results.

b) Voting should not be decisive. Voting should be
used to show the opinions of the experts in a working
group, in order to help their work along. But the actual
decisions should be taken by humans, not by a computerized
voting algorithm. Possibly "voting" is the wrong word,
because for many people it implies decisive voting. Maybe
the word "query" would be better than voting.

c) The voting procedure should give a nuanced view of
the opinions among the experts. Often a procedure where a
number of alternatives are listed, and each expert rates
each alternative on a scale from "very bad" to "very good"
might be suitable. In special cases, a voting form
suitable to the special case might be designed.

d) All reasonable alternatives, supported by some
competent experts, should be included in the voting
procedure. The voting should not be conducted in a way
which lets some competent experts feel that their view is
unfairly treated.

e) It is often good to have the voting continuous. By
a continuous voting is meant a voting procedure where
participants can, at any time, change their vote, and the
voting report will always show the latest, current, views.
Sometimes a breakpoint may be needed in order to get work
done, but even in such a case, it might be of value to see
if some experts have changed their opinion after the
breakpoint. If continuous voting is performed in parallel
with mailing list discussions, then the continuous vote
report will show how the views among the experts changes,
and will show when so many experts agree on a solution
that work should better continue on other issues.

f) For security issues, see chapter 6 below.


5 Implementation Issues

As in most technical work, there is no single possible
slution. One main choice is whether to use e-mail or a web
page to conduct the voting. The ideal solution should
perhaps allow both choices, so that every expert can
choose to vote either by e-mail or by the web page.

A voting system has two main phases:

- Definition if the vote form,
- The carrying out of the voting
- The result reporting.

In the definition phase, there should be built-in support
for the common kind of vote where a number of solutions is
listed, and each experts rates the solutions on a scale
from "very bad" to "very good". But also other formats, in
principle any customized html form may be used.

In the carrying out phase, experts should be able to vote
or change their vote at any time, and the result report
should also in most cases be visible at any time when
someone wants to check it, i.e. not wait until the end of
the voting time before displaying the result.

the result should be shown in a way which clearly shows
the names of the expert who gave their input. A suitable
format may be something like this example:

+----------+-------------+----------+-----------+----------+-----------+
| Where ç | | | | |
! Should | Very bad | Bad |Acceptable | Good | Very good |
| we meet ‹ | | | | |
+----------+-------------+----------+-----------+----------+-----------+
| London | John Smith | Pete Nice| | Mary ! Stephen |
| | Andre Soun | | | Strong | Nicter |
+----------+-------------+----------+-----------+----------+-----------+
| Paris |Mary Strong | Pete Nixe| | Mary ! John |
| | | | | Strong | Smith |
+----------+-------------+----------+-----------+----------+-----------+
| New York | Eliza Doo | Pete Nice| | | |
| | Andre Soun | | | | |
+----------+-------------+----------+-----------+----------+-----------+
| San Jose + | Andre | Stephen | Mary | Stephen |
| | | Soun | Nicter | Strong | Nicter |
+----------+-------------+----------+-----------+----------+-----------+

For security design issues, see chapter 6 below.


6 Security Considerations

There has been a lot of debate regarding the security of
Internet voting. The general consensus among security
experts is that Internet voting is so insecure, that it
should not be used. This debate, however, is based on
secret voting in large communities on political issues.
Security is much less of a problem in small communities
where the vote of each individual is not secret. Social
control, i.e. observation of what happens, will easily
show when something is wrong.

In IETF work, it may be enough with rather simple security
measures, such as that each expert (=member of the IETF
working group mailing list) is sent an individual e-mail
message, containing the URL of the voting page and the
loginid and password for this particular expert.

Security experts will surely say that there are lots of
risks with this method. However, note that the number of
active people in an IETF working group is usually less
than 100 experts, and that the result report (see chapter
5 above) shows how each expert has voted. If anyone tries
to falsify the result, the experts can immediately see
that their opinion is represented wrongly. A very advanced
cracker might give each expert a different view of the
result page, but this would soon be found out in the
mailing list.

Note that ordinary e-mail mailing lists are also not very
secure. A clever cracking can falsify the messages, but
this will not happen in practice because people will
immediately note that something is wrong.

The main security problems with voting is with secret
voting, which is neither needed nor desirable in technical
standards development.


7 A test implementation

With support from Terena, my university department has
developed an implementation of a voting system designed
according to the criteria explained above. Explanation and
instructions can be found at�http://cmc.dsv.su.se/query/
and a test query can be found at�http://cmc.dsv.su.se/test-
query/. This test-query is not as secure as described in
chapter 6 above, since a common password is used for all
voters. It was done in this way to avoid having to send an
individual login-id and password to all readers of this
document. Thus, the test-query can show most of the
functionality, but will have lower security.


8 Copyright and Disclaimer

The IETF takes no position regarding the validity
or scope of any intellectual property or other
rights that might be claimed to pertain to the
implementation or use of the technology described
in this document or the extent to which any
license under such rights might or might not be
available; neither does it represent that it has
made any effort to identify any such rights.
Information on the IETF's procedures with respect
to rights in standards-track and standards-related
documentation can be found in BCP-11. Copies of
claims of rights made available for publication
and any assurances of licenses to be made
available, or the result of an attempt made to
obtain a general license or permission for the use
of such proprietary rights by implementors or
users of this specification can be obtained from
the IETF Secretariat."

The IETF invites any interested party to bring to
its attention any copyrights, patents or patent
applications, or other proprietary rights which
may cover technology that may be required to
practice this standard. Please address the
information to the IETF Executive Director.

Copyright (C) The Internet Society (2000, 2001,
2002). All Rights Reserved.

This document and translations of it may be copied
and furnished to others, and derivative works that
comment on or otherwise explain it or assist in
its implementation may be prepared, copied,
published and distributed, in whole or in part,
without restriction of any kind, provided that the
above copyright notice and this paragraph are
included on all such copies and derivative works.
However, this document itself may not be modified
in any way, such as by removing the copyright
notice or references to the Internet Society or
other Internet organizations, except as needed for
the purpose of developing Internet standards in
which case the procedures for copyrights defined
in the Internet Standards process must be
followed, or as required to translate it into
languages other than English.

The limited permissions granted above are
perpetual and will not be revoked by the Internet
Society or its successors or assigns.


9 Acknowledgments

Suggestions during the development of this memo has been
given by Harald Alvestrand, Bill Jansson, Larry Masinter,
Keith Moore and Henry Spencer.

10 References

P. Resnick: "Internet Message Format" STD 11, RFC 2822,
April 2001,

S. Harris: "The Tao of IETF - A Novice Guide to the Internet
Engineering Task Force", RFC 3160, August 2001, Informational.

S. Harris: "IETF Guidelines for Conduct", RFC 3184, October 2001.
Best Current Practice.

M.R. Horton, R. Adams: "Standard for an
interchange of USENET messages", RFC official
1036, December 1987. IETF standard,
but in reality a de-facto standard for Usenet
News.

N. Freed & N. Borenstein: Draft
"Multipurpose Internet Mail Standard,
Extensions (MIME) Part One: Format of elective
Internet Message Bodies." RFC 2045.
November 1996.

[5] N. Freed & N. Borenstein: Draft
"Multipurpose Internet Mail Standard,
Extensions (MIME) Part Two: Media elective
Types." RFC 2046. November 1996.

[6] H. Alvestrand: "Tags for the Proposed
Identification of Languages", RFC standard,
1766, February 1995. elective.

[7] R. Fielding, J. Gettys, J. Mogul, H. Draft
Frystyk, T. Berners-Lee: Hypertext standard
Transfer Protocol -- HTTP/1.1, RFC
2616, June 1999.

[8] J. Palme: The Auto-Submitted, Work in
Supersedes and Expires Headers in progress
E-mail and Netnews, draft-ietf-
mailext-new-fields-14.txt, November
1998.

[9] J. Palme: The multipart/choices Work in
Content-Type. draft-palme-multipart- progress
choices-00.txt, December 2000.

[10] R. Troost, S. Dorner, K. Moore: Proposed
Communicating Presentation standard
Information in Internet Messages: the
Content-Disposition Header field, RFC
2183, August 1997.


11 Author's Address

Jacob Palme Phone: +46-763182595
Stockholm University
Skeppargatan 73 E-mail: jacobpalme@gmail.com
S-115 30 Stockholm,
Sweden

Appendix A:

Examples of two e-mail messages which only show agreement,
and which would not be needed with a voting facility:

---

From: "Bart Schaefer"
Date: Tue, 11 Nov 1997 13:17:38 -0800
Comments: In reply to Robert Elz
"Re: No comments in Message-ID/In-Reply-
To/References" (Nov 12, 7:23am)
To: Detailed Revision/Update of Message Standards

Subject: Re: No comments in Message-ID/In-Reply-
To/References
MIME-Version: 1.0
Status: U

I agree completely with Robert Elz's remarks in
<5814.879279791@munnari.OZ.AU>.

--
Bart Schaefer
Zanshin
http://www.well.com/user/barts
http://www.zanshin.com

---

To: Detailed Revision/Update of Message Standards

Subject: Re: No comments in Message-ID/In-Reply-
To/References
Mime-Version: 1.0
Date: Tue, 11 Nov 1997 13:28:50 -0800
From: John Beck
Status: U

schaefer> I agree completely with Robert Elz's remarks in
schaefer> <5814.879279791@munnari.OZ.AU>.

As do I.

-- John Beck, Internet Engineering group, SunSoft



You are not logged in
Today's date: Wed, 20 Nov 2024 06:44:12 +0100
KOM 2002