1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
1480
1481
1482
1483
1484
1485
1486
1487
1488
1489
1490
1491
1492
1493
1494
1495
1496
1497
1498
1499
1500
1501
1502
1503
1504
1505
1506
1507
1508
1509
1510
1511
1512
1513
1514
1515
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
1534
1535
1536
1537
1538
1539
1540
1541
1542
1543
1544
1545
1546
1547
1548
1549
1550
1551
1552
1553
1554
1555
1556
1557
1558
1559
1560
1561
1562
1563
1564
1565
1566
1567
1568
1569
1570
1571
1572
1573
1574
1575
1576
1577
1578
1579
1580
1581
1582
1583
1584
1585
1586
1587
1588
1589
1590
1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603
1604
1605
1606
1607
1608
1609
1610
1611
1612
1613
1614
1615
1616
1617
1618
1619
1620
1621
1622
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
1666
1667
1668
1669
1670
1671
1672
1673
1674
1675
1676
1677
1678
1679
1680
1681
1682
1683
1684
1685
1686
1687
1688
1689
1690
1691
1692
1693
1694
1695
1696
1697
1698
1699
1700
1701
1702
1703
1704
1705
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
1716
1717
1718
1719
1720
1721
1722
1723
1724
1725
1726
1727
1728
1729
1730
1731
1732
1733
1734
1735
1736
1737
1738
1739
1740
1741
1742
1743
1744
1745
1746
1747
1748
1749
1750
1751
1752
1753
1754
1755
1756
1757
1758
1759
1760
1761
1762
1763
1764
1765
1766
1767
1768
1769
1770
1771
1772
1773
1774
1775
1776
1777
1778
1779
1780
1781
1782
1783
1784
1785
1786
1787
1788
1789
1790
1791
1792
1793
1794
1795
1796
1797
1798
1799
1800
1801
1802
1803
1804
1805
1806
1807
1808
1809
1810
1811
1812
1813
1814
1815
1816
1817
1818
1819
1820
1821
1822
1823
1824
1825
1826
1827
1828
1829
1830
1831
1832
1833
1834
1835
1836
1837
1838
1839
1840
1841
1842
1843
1844
1845
1846
1847
1848
1849
1850
1851
1852
1853
1854
1855
1856
1857
1858
1859
1860
1861
1862
1863
1864
1865
1866
1867
1868
1869
1870
1871
1872
1873
1874
1875
1876
1877
1878
1879
1880
1881
1882
1883
1884
1885
1886
1887
1888
1889
1890
1891
1892
1893
1894
1895
1896
1897
1898
1899
1900
1901
1902
1903
1904
1905
1906
1907
1908
1909
1910
1911
1912
1913
1914
1915
1916
1917
1918
1919
1920
1921
1922
1923
1924
1925
1926
1927
1928
1929
1930
1931
1932
1933
1934
1935
1936
1937
1938
1939
1940
1941
1942
1943
1944
1945
1946
1947
1948
1949
1950
1951
1952
1953
1954
1955
1956
1957
1958
1959
1960
1961
1962
1963
1964
1965
1966
1967
1968
1969
1970
1971
1972
1973
1974
1975
1976
1977
1978
1979
1980
1981
1982
1983
1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
2026
2027
2028
2029
2030
2031
2032
2033
2034
2035
2036
2037
2038
2039
2040
2041
2042
2043
2044
2045
2046
2047
2048
2049
2050
2051
2052
2053
2054
2055
2056
2057
2058
2059
2060
2061
2062
2063
2064
2065
2066
2067
2068
2069
2070
2071
2072
2073
2074
2075
2076
2077
2078
2079
2080
2081
2082
2083
2084
2085
2086
2087
2088
2089
2090
2091
2092
2093
2094
2095
2096
2097
2098
2099
2100
2101
2102
2103
2104
2105
2106
2107
2108
2109
2110
2111
2112
2113
2114
2115
2116
2117
2118
2119
2120
2121
2122
2123
2124
2125
2126
2127
2128
2129
2130
2131
2132
2133
2134
2135
2136
2137
2138
2139
2140
2141
2142
2143
2144
2145
2146
2147
2148
2149
2150
2151
2152
2153
2154
2155
2156
2157
2158
2159
2160
2161
2162
2163
2164
2165
2166
2167
2168
2169
2170
2171
2172
2173
2174
2175
2176
2177
2178
2179
2180
2181
2182
2183
2184
2185
2186
2187
2188
|
Independent Submission C. Huitema
Request for Comments: 8963 Private Octopus Inc.
Category: Informational January 2021
ISSN: 2070-1721
Evaluation of a Sample of RFCs Produced in 2018
Abstract
This document presents the author's effort to understand the delays
involved in publishing an idea in the IETF or through the Independent
Stream, from the first individual draft to the publication of the
RFC. We analyze a set of randomly chosen RFCs approved in 2018,
looking for history and delays. We also use two randomly chosen sets
of RFCs published in 2008 and 1998 for comparing delays seen in 2018
to those observed 10 or 20 years ago. The average RFC in the 2018
sample was produced in 3 years and 4 months, of which 2 years and 10
months were spent in the working group, 3 to 4 months for IETF
consensus and IESG review, and 3 to 4 months in RFC production. The
main variation in RFC production delays comes from the AUTH48 phase.
We also measure the number of citations of the chosen RFC using
Semantic Scholar, and compare citation counts with what we know about
deployment. We show that citation counts indicate academic interest,
but correlate only loosely with deployment or usage of the
specifications. Counting web references could complement that.
Status of This Memo
This document is not an Internet Standards Track specification; it is
published for informational purposes.
This is a contribution to the RFC Series, independently of any other
RFC stream. The RFC Editor has chosen to publish this document at
its discretion and makes no statement about its value for
implementation or deployment. Documents approved for publication by
the RFC Editor are not candidates for any level of Internet Standard;
see Section 2 of RFC 7841.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
https://www.rfc-editor.org/info/rfc8963.
Copyright Notice
Copyright (c) 2021 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document.
Table of Contents
1. Introduction
2. Methodology
2.1. Defining the Important Milestones
2.2. Selecting a Random Sample of RFCs
2.3. Conventions Used in This Document
3. Analysis of 20 Selected RFCs
3.1. RFC 8411
3.2. RFC 8456
3.3. RFC 8446
3.4. RFC 8355
3.5. RFC 8441
3.6. RFC 8324
3.7. RFC 8377
3.8. RFC 8498
3.9. RFC 8479
3.10. RFC 8453
3.11. RFC 8429
3.12. RFC 8312
3.13. RFC 8492
3.14. RFC 8378
3.15. RFC 8361
3.16. RFC 8472
3.17. RFC 8471
3.18. RFC 8466
3.19. RFC 8362
3.20. RFC 8468
4. Analysis of Process and Delays
4.1. Delays from First Draft to RFC
4.2. Working Group Processing Time
4.3. Preparation and Publication Delays
4.4. Copy Editing
4.5. Independent Stream
5. Citation Counts
5.1. Citation Numbers
5.2. Comparison to 1998 and 2008
5.3. Citations versus Deployments
5.4. Citations versus Web References
6. Observations and Next Steps
7. Security Considerations
8. IANA Considerations
9. Informative References
Acknowledgements
Author's Address
1. Introduction
As stated on the organization's web site, "The IETF is a large open
international community of network designers, operators, vendors, and
researchers concerned with the evolution of the Internet architecture
and the smooth operation of the Internet." The specifications
produced by the IETF are published in the RFC series, along with
documents from the IAB, IRTF, and Independent streams (as per RFC
8729). In this memo, the author attempts to understand the delays
involved in publishing an idea in the IETF or through the Independent
Stream, from the first individual draft to the publication of the
RFC. This is an individual effort, and the author's conclusions
presented here are personal. There was no attempt to seek IETF
consensus.
The IETF keeps records of documents and process actions in the IETF
Datatracker [TRKR]. The IETF Datatracker provides information about
RFCs and drafts, from which we can infer statistics about the
production system. We can measure how long it takes to drive a
proposition from initial draft to final publication, and how these
delays can be split between working group discussions, IETF reviews,
IESG assessment, RFC Editor delays and final reviews by the authors
-- or, for Independent Stream RFCs, draft production, reviews by the
Independent Submissions Editor, conflict reviews, RFC Editor delays
and final reviews. Tracker data is available for all RFCs, not just
IETF Stream RFCs.
Just measuring production delays may be misleading. If the IETF or
the other streams simply rubber-stamped draft proposals and published
them, the delays would be short but the quality and impact might
suffer. We hope that most of the RFCs that are published are useful,
but we need a way to measure that usefulness. We try to do that by
measuring the number of references of the published RFCs in Semantic
Scholar [SSCH], and also by asking the authors of each RFC in the
sample whether the protocols and technologies defined in the RFCs
were implemented and used on the Internet. The citations measured by
the Semantic Scholar include citations in other RFCs and in Internet-
Drafts. We also measure the number of references on the web, which
provides some results but would be hard to automate.
In order to limit the resources required for this study, we selected
at random 20 RFCs published in 2018, as explained in Section 2.2.
The statistical sampling picked both IETF Stream and Independent
Stream documents. For comparison purposes, we also selected at
random 20 RFCs published in 1998 and 20 published in 2008. Limiting
the sample to 20 out of 209 RFCs published in 2018 allows for in-
depth analysis of each RFC, but readers should be reminded that the
this is a small sample. The sample is too small to apply general
statistical techniques and quantify specific ratios, and discussions
of correlation techniques would be inappropriate. Instead, the
purpose is to identify trends, spot issues, and document future work.
The information gathered for every RFC in the sample is presented in
Section 3. In Section 4, we analyze the production process and the
sources of delays, comparing the 2018 sample to the selected samples
for 1998 and 2018. In Section 5.1, we present citation counts for
the RFCs in the samples, and analyze whether citation counts could be
used to evaluate the quality of RFCs.
The measurement of delays could be automated by processing dates and
events recorded in the Datatracker. The measurement of published
RFCs could be complemented by statistics on abandoned drafts, which
would measure the efficiency of the IETF triaging process. More
instrumentation would help understanding how large delays happen
during working group processes. These potential next steps are
developed in Section 6.
2. Methodology
The study reported here started with a simple idea: take a sample of
RFCs, and perform an in-depth analysis of the path from the first
presentation of the idea to its publication, while also trying to
access the success of the resulting specification. This requires
defining the key milestones that we want to track, and drawing a
random sample using an unbiased process.
2.1. Defining the Important Milestones
The IETF Datatracker records a list of events for each document
processed by IETF working groups. This has a high granularity, and
also a high variability. Most documents start life as an individual
draft, are adopted by a working group, undergo a Working Group Last
Call, are submitted to the IESG, undergo an IETF Last Call and an
IESG review, get eventually approved by the IESG, and are processed
for publication by the RFC Editor, but there are exceptions. Some
documents are first submitted to one working group and then moved to
another. Some documents are published through the Independent
Stream, and are submitted to the Independent Submissions Editor
instead of the IESG.
In order to simplify tabulation, we break the period from the
submission of the first draft to the publication of the RFC into
three big components:
* The working group processing time, from the first draft to the
start of the IETF last call;
* The IETF processing time, which lasts from the beginning of the
IETF last call to the approval by the IESG, including the reviews
by various directorates;
* The RFC production, from approval by the IESG to publication,
including the AUTH48 reviews.
For submissions to the Independent Stream, we don't have a working
group. We consider instead the progression of the individual draft
until the adoption by the Independent Submissions Editor (ISE) as the
equivalent of the "Working Group" period, and the delay from adoption
by the ISE until submission to the RFC Editor as the equivalent of
the IETF processing time.
We measure the starting point of the process using the date of
submission of the first draft listed on that RFC page in the IETF
Datatracker. In most cases, this first draft is an individual draft
that then resubmitted as a working group draft, or maybe resubmitted
with a new name as the draft was searching for a home in an IETF
working group, or before deciding for submission on the Independent
Stream.
The IETF Datatracker entries for RFCs and drafts do not _always_ list
working group events like Working Group Last Call. The only
intermediate event that we list between the first draft and the
submission to the IESG is the working group adoption, for which we
use the date of submission of version 00 of the draft eventually
published as RFC. We also use that date (of submission of version
00) for drafts submitted to the Independent Stream.
2.2. Selecting a Random Sample of RFCs
Basic production mechanisms could be evaluated by processing data
from the IETF Datatracker, but subjective data requires manual
assessment of results, which can be time-consuming. Since our
resources are limited, we will only perform this analysis for a small
sample of RFCs, selected at random from the list of RFCs approved in
2018. Specifically, we will pick 20 RFC numbers at random between:
* RFC 8307, published in January 2018, and
* RFC 8511, published December 2018.
The list of 20 selected RFCs is: RFC 8411, RFC 8456, RFC 8446, RFC
8355, RFC 8441, RFC 8324, RFC 8377, RFC 8498, RFC 8479, RFC 8453, RFC
8429, RFC 8312, RFC 8492 , RFC 8378, RFC 8361, RFC 8472, RFC 8471,
RFC 8466, RFC 8362, and RFC 8468.
When evaluating delays and impact, we will compare the year 2018 to
2008 and 1998, 10 and 20 years ago. To drive this comparison, we
pick 20 RFCs at random among those published in 2008, and another 20
among those published in 1998.
The list of the 20 randomly selected RFCs from 2008 is: RFC 5227, RFC
5174, RFC 5172, RFC 5354, RFC 5195, RFC 5236, RFC 5348, RFC 5281, RFC
5186, RFC 5326, RFC 5277, RFC 5373, RFC 5404, RFC 5329, RFC 5283, RFC
5358, RFC 5142, RFC 5271, RFC 5349, and RFC 5301.
The list of the 20 randomly selected RFCs from 1998 is: RFC 2431, RFC
2381, RFC 2387, RFC 2348, RFC 2391, RFC 2267, RFC 2312, RFC 2448, RFC
2374, RFC 2398, RFC 2283, RFC 2382, RFC 2289, RFC 2282, RFC 2404, RFC
2449, RFC 2317, RFC 2394, RFC 2297, and RFC 2323.
2.3. Conventions Used in This Document
The following abbreviations are used in the tables:
BCP Best Current Practice
Exp Experimental
Info Informational
PS Proposed Standard
DS Draft Standard [This maturity level was retired by RFC 6410.]
In addition, Status is as defined in RFC 2026, and Stream is as
defined in RFC 8729.
3. Analysis of 20 Selected RFCs
We review each of the RFCs listed in Section 2.2 for the year 2018,
trying both to answer the known questions and to gather insight for
further analyses. In many cases, the analysis of the data is
complemented by direct feedback from the RFC authors.
3.1. RFC 8411
"IANA Registration for the Cryptographic Algorithm Object Identifier
Range" [RFC8411]:
Status (Length): Informational (5 pages)
Overview: 4 individual drafts
First draft: 2017-05-08
Last Call start: 2017-10-09
IESG eval. start: 2017-12-28
IESG approved: 2018-02-26 (draft 03)
AUTH48 start: 2018-04-20
AUTH48 complete: 2018-07-17
Published: 2018-08-06
IANA action: create table
This RFC was published from the individual draft, which was not
resubmitted as a working group draft.
The draft underwent minor copy editing before publication.
Some but not all of the long delay in AUTH48 is due to clustering
with [RFC8410]. MISSREF state concluded on 2018-05-09 and the
document re-entered AUTH48 at once. AUTH48 lasted over two months
after that. (For state definitions, see <https://www.rfc-
editor.org/about/queue/#state_def>.)
The time after AUTH48 and before publication (3 weeks) partly
overlaps with travel for IETF 102 and is partly due to coordinating
the cluster.
3.2. RFC 8456
"Benchmarking Methodology for Software-Defined Networking (SDN)
Controller Performance" [RFC8456]:
Status (Length): Informational (64 pages)
Overview: 2 individual drafts; 9 WG drafts
First draft: 2015-03-23
WG adoption: 2015-10-18
Last Call start: 2018-01-19
IESG eval. start: 2018-02-27
IESG approved: 2018-05-25
AUTH48 start: 2018-08-31
AUTH48 complete: 2018-10-16
Published: 2018-10-30
The draft underwent extensive copy editing, covering use of articles,
syntax, and word choice. The changes are enough to cause pagination
differences. The "diff" tool marks pretty much every page as
changed. Some diagrams see change in protocol elements like message
names.
According to the author, the experience of producing this document
mirrors a typical one in the Benchmarking Methodologies Working Group
(BMWG). There were multiple authors in multiple time zones, which
slowed down the AUTH48 process somewhat, although the AUTH48 delay of
46 days is only a bit longer than the average draft.
The RFC was part of cluster with [RFC8455].
BMWG publishes Informational RFCs centered around benchmarking, and
the methodologies in RFC 8456 have been implemented in benchmarking
products.
3.3. RFC 8446
"The Transport Layer Security (TLS) Protocol Version 1.3" [RFC8446],
as the title indicates, defines the new version of the TLS protocol.
From the IETF Datatracker, we extract the following:
Status (Length): Proposed Standard (160 pages)
Overview: 29 WG drafts
First draft: 2014-04-17
Last Call start: 2018-02-15
IESG eval. start: 2018-03-02
IESG approved: 2018-03-21 (draft 28)
AUTH48 start: 2018-06-14
AUTH48 complete: 2018-08-10
Published: 2018-08-10
This draft started as a WG effort.
The RFC was a major effort in the IETF. Working group participants
developed and tested several implementations. Researchers analyzed
the specifications and performed formal verifications. Deployment
tests outlined issues that caused extra work when the specification
was almost ready. This complexity largely explains the time spent in
the working group.
Comparing the final draft to the published version, we find
relatively light copy editing. It includes explaining acronyms on
first use, clarifying some definitions standardizing punctuation and
capitalization, and spelling out some numbers in text. This
generally fall in the category of "style", although some of the
clarifications go into message definitions. However, that simple
analysis does not explain why the AUTH48 phase took almost two
months.
This document's AUTH48 process was part of the "GitHub experiment",
which tried to use GitHub pull requests to track the AUTH48 changes
and review comments. The RFC Production Center (RPC) staff had to
learn using GitHub for that process, and this required more work than
the usual RFC. The author and AD thoroughly reviewed each proposed
edit, accepting some and rejecting some. The concern there was that
any change in a complex specification might affect a protocol that
was extensively reviewed in the working group, but of course these
reviews added time to the AUTH48 delays.
There are 21 implementations listed in the Wiki of the TLS 1.3
project [TLS13IMP]. It has been deployed on major browsers, and is
already used in a large fraction of TLS connections.
3.4. RFC 8355
"Resiliency Use Cases in Source Packet Routing in Networking (SPRING)
Networks" [RFC8355] is an Informational RFC. It originated from an
informational use-case draft; it was mostly used for the BOF creating
the WG, and then to drive initial work and evolutions from the WG.
Status (Length): Informational (13 pages)
Overview: 2 individual drafts; 13 WG drafts
First draft: 2014-01-31
WG adoption: 2014-05-13
Last Call start: 2017-04-20
IESG eval. start: 2017-05-04 (draft 09)
IESG approved: 2017-12-19 (draft 12)
AUTH48 start: 2018-03-12
AUTH48 complete: 2018-03-27
Published: 2018-03-28
Minor set of copy edits, mostly for style.
No implementation of the RFC itself, but the technology behind it
(such as Segment Routing Architecture [RFC8402] and TI-LFA [TI-LFA])
is widely implemented and deployment is ongoing.
According to participants in the discussion, the process of adoption
of the source packet routing standards was very contentious. The
establishment of consensus at both the working group level and the
IETF level was difficult and time-consuming.
3.5. RFC 8441
"Bootstrapping WebSockets with HTTP/2" [RFC8441]
Status (Length): Proposed Standard (8 pages)
Overview: 3 individual drafts; 8 WG drafts; Updates RFC
6455
First draft: 2017-10-15
WG adoption: 2017-12-19
Last Call start: 2018-05-07 (draft 05)
IESG eval. start: 2018-05-29 (draft 06)
IESG approved: 2018-06-18 (draft 07)
AUTH48 start: 2018-08-13
AUTH48 complete: 2018-09-15
Published: 2018-09-18
IANA action: table entries
This RFC defines the support of WebSockets in HTTP/2, which is
different from the mechanism defined for HTTP/1.1 in [RFC6455]. The
process was relatively straightforward, involving the usual type of
discussions, some on details and some on important points.
Comparing the final draft and published RFC shows a minor set of copy
edits, mostly for style. However, the author recalls a painful
process. The RFC includes many charts and graphs that were very
difficult to format correctly in the author's production process that
involved conversions from markdown to XML, and then from XML to text.
The author had to get substantial help from the RFC Editor.
There are several implementations, including Firefox and Chrome,
making RFC 8441 a very successful specification.
3.6. RFC 8324
"DNS Privacy, Authorization, Special Uses, Encoding, Characters,
Matching, and Root Structure: Time for Another Look?" [RFC8324].
This is an opinion piece on DNS development, published on the
Independent Stream.
Status (Length): Informational (29 pages)
Overview: 5 individual drafts; Independent Stream
First draft: 2017-06-02
ISE review start: 2017-07-10 (draft 03)
IETF conflict review start: 2017-10-29
Approved: 2017-12-18 (draft 04)
AUTH48 start: 2018-01-29 (draft 05)
AUTH48 complete: 2018-02-26
Published: 2018-02-27
This RFC took only 9 months from first draft to publication, which is
the shortest in the 2018 sample set. In part, this is because the
text was privately circulated and reviewed by the ISE's selected
experts before the first draft was published. The nature of the
document is another reason for the short delay. It is an opinion
piece and does not require the same type of consensus building and
reviews as a protocol specification.
Comparing the final draft and the published version shows only minor
copy edits, mostly for style. According to the author, this is
because he knows how to write in RFC style with the result that his
documents often need a minimum of editing. He also makes sure that
the document on which the RFC Production Center starts working
already has changes discussed and approved during Last Call and IESG
review incorporated, rather than expecting the Production Center to
operate off of notes about changes to be made.
3.7. RFC 8377
"Transparent Interconnection of Lots of Links (TRILL): Multi-
Topology" [RFC8377]
Status (Length): Proposed Standard (20 pages)
Overview: 3 individual drafts; 7 WG drafts; Updates RFCs
6325 and 7177
First draft: 2013-09-03
WG adoption: 2015-09-01
Last Call start: 2018-02-19 (draft 05)
IESG eval. start: 2018-03-06 (draft 05)
IESG approved: 2018-03-12 (draft 06)
AUTH48 start: 2018-04-20 (draft 06)
AUTH48 complete: 2018-07-31
Published: 2018-07-31
IANA action: table entries
Minor set of copy edits, mostly for style, also clarity.
3.8. RFC 8498
"A P-Served-User Header Field Parameter for an Originating Call
Diversion (CDIV) Session Case in the Session Initiation Protocol
(SIP)" [RFC8498].
Status (Length): Informational (15 pages)
Overview: 5 individual drafts; 9 WG drafts
First draft: 2016-03-21
WG adoption: 2017-05-15
Last Call start: 2018-10-12 (draft 05)
IESG eval. start: 2018-11-28 (draft 07)
IESG approved: 2018-12-11 (draft 08)
AUTH48 start: 2019-01-28
AUTH48 complete: 2019-02-13
Published: 2019-02-14
IANA action: table rows added.
Copy edits for style, but also clarification of ambiguous sentences.
3.9. RFC 8479
"Storing Validation Parameters in PKCS#8" [RFC8479]
Status (Length): Informational (8 pages)
Overview: 5 individual drafts; Independent Stream
First draft: 2017-08-08
ISE review start: 2018-12-10 (draft 00)
IETF conflict review start: 2018-03-29
Approved: 2018-08-20 (draft 03)
AUTH48 start: 2018-09-20 (draft 04)
AUTH48 complete: 2018-09-25
Published: 2018-09-26
The goal of the draft was to document what the gnutls implementation
was using for storing provably generated RSA keys. This is a short
RFC that was published relatively quickly, although discussion
between the author, the Independent Submissions Editor, and the IESG
lasted several months. In the initial conflict review, the IESG
asked the ISE to not publish this document before IETF working groups
had an opportunity to pick up the work. The author met that
requirement by a presentation to the SECDISPATCH WG during IETF 102.
Since no WG was interested in picking up the work, the document
progressed on the Independent Stream.
Very minor set of copy edits, moving some references from normative
to informative.
The author is not aware of other implementations than gnutls relying
on this RFC.
3.10. RFC 8453
"Framework for Abstraction and Control of TE Networks (ACTN)"
[RFC8453]
Status (Length): Informational (42 pages)
Overview: 3 individual drafts; 16 WG drafts
First draft: 2015-06-15
WG adoption: 2016-07-15
Out of WG: 2018-01-26 (draft 11)
Expert review requested: 2018-02-13
Last Call start: 2018-04-16 (draft 13)
IESG eval. start: 2018-05-16 (draft 14)
IESG approved: 2018-06-01 (draft 15)
AUTH48 start: 2018-08-13
AUTH48 complete: 2018-08-20
Published: 2018-08-23
IANA action: table rows added.
Minor copy editing.
3.11. RFC 8429
"Deprecate Triple-DES (3DES) and RC4 in Kerberos" [RFC8429]
Status (Length): BCP (10 pages)
Overview: 6 WG drafts
First draft: 2017-05-01
Last Call start: 2017-07-16 (draft 03)
IESG eval. start: 2017-08-18 (draft 04)
IESG approved: 2018-05-25 (draft 05)
AUTH48 start: 2018-07-24
AUTH48 complete: 2018-10-31
Published: 2018-10-31
IANA action: table rows added.
This draft started as a working group effort.
This RFC recommends deprecating two encryption algorithms that are
now considered obsolete and possibly broken. The document was sent
back to the WG after the first Last Call, edited, and then there was
a second Last Call. The delay from first draft to Working Group Last
Call was relatively short, but the number may be misleading. The
initial draft was a replacement of a similar draft in the KITTEN
Working Group, which stagnated for some time before the CURDLE
Working Group took up the work. The deprecation of RC4 was somewhat
contentious, but the WG had already debated this prior to the
production of this draft, and the draft was not delayed by this
debate.
Most of the 280 days between IETF LC and IESG approval were because
the IESG had to talk about whether this document should obsolete RFC
4757 or move it to Historic status, and no one was really actively
pushing that discussion for a while.
The 99 days in AUTH48 are mostly because one of the authors was a
sitting AD, and those duties ended up taking precedence over
reviewing this document.
Minor copy editing, for style.
The implementation of the draft would be the actual removal of
support for 3DES and RC4 in major implementations. This is
happening, but very slowly.
3.12. RFC 8312
"CUBIC for Fast Long-Distance Networks" [RFC8312]
Status (Length): Informational (18 pages)
Overview: 2 individual drafts; 8 WG drafts
First draft: 2014-09-01
WG adoption: 2015-06-08
Last Call start: 2017-09-18 (draft 06)
IESG eval. start: 2017-10-04
IESG approved: 2017-11-14 (draft 07)
AUTH48 start: 2018-01-08
AUTH48 complete: 2018-02-07
Published: 2018-02-07
IANA action: table rows added.
Minor copy editing, for style.
The TCP congestion control algorithm Cubic was first defined in 2005,
was implemented in Linux soon after, and was implemented in major
OSes after that. After some debates from 2015 to 2015, the TCPM
Working Group adopted the draft, with a goal of documenting Cubic in
the RFC Series. According to the authors, this was not a high-
priority effort, as Cubic was already implemented in multiple OSes
and documented in research papers. At some point, only one of the
authors was actively working on the draft. This may explain why
another two years was spent progressing the draft after adoption by
the WG.
The RFC publication may or may not have triggered further
implementations. On the other hand, several OSes picked up bug fixes
from the draft and the RFC.
3.13. RFC 8492
"Secure Password Ciphersuites for Transport Layer Security (TLS)"
[RFC8492]
Status (Length): Informational (40 pages)
Overview: 10 individual drafts; 8 WG drafts; Independent
Stream
First draft: 2012-09-07
Targeted to ISE: 2016-08-05
ISE review start: 2017-05-10 (draft 01)
IETF conflict review start: 2017-09-04
Approved: 2017-10-29 (draft 02)
AUTH48 start: 2018-10-19 (draft 05)
AUTH48 complete: 2019-02-19
Published: 2019-02-21
IANA action: table rows added.
This RFC has a complex history. The first individual draft was
submitted to the TLS Working Group on September 7, 2012. It
progressed there, and was adopted by the WG after 3 revisions. There
were then 8 revisions in the TLS WG, until the WG decided to not
progress it. The draft was parked in 2013 by the WG chairs after
failing to get consensus in WG Last Call. The AD finally pulled the
plug in 2016, and the draft was then resubmitted to the ISE.
At that point, the author was busy and was treating this RFC with a
low priority because, in his words, it would not be a "real RFC".
There were problems with the draft that only came up late. In
particular, it had to wait for a change in registry policy that only
came about with the publication of TLS 1.3, which caused the draft to
be published after RFC 8446, and also required adding references to
TLS 1.3. The author also got a very late comment while in AUTH48
that caused some rewriting. Finally, there was some IANA issue with
the extension registry where a similar extension was added by someone
else. The draft was changed to just use it.
Changes in AUTH48 include adding a reference to TLS 1.3, copy editing
for style, some added requirements, added paragraphs, and changes in
algorithms specification.
3.14. RFC 8378
"Signal-Free Locator/ID Separation Protocol (LISP) Multicast"
[RFC8378] is an Experimental RFC, defining how to implement Multicast
in the LISP architecture.
Status (Length): Experimental (21 pages)
Overview: 5 individual drafts; 10 WG drafts
First draft: 2014-02-28
WG adoption: 2015-12-21
Last Call start: 2018-02-13 (draft 07)
IESG eval. start: 2018-02-28 (draft 08)
IESG approved: 2018-03-12 (draft 09)
AUTH48 start: 2018-04-23
AUTH48 complete: 2018-05-02
Published: 2018-05-02
Preparing the RFC took more than 4 years. According to the authors,
they were not aggressively pushing it and just let the working group
process decide to pace it. They also did implementations during that
time.
Minor copy editing, for style.
The RFC was implemented by lispers.net and Cisco, and it was used in
doing IPv6 multicast over IPv4 unicast/multicast at the Olympics in
PyeungChang. The plan is to work on a Proposed Standard once the
experiment concludes.
3.15. RFC 8361
"Transparent Interconnection of Lots of Links (TRILL): Centralized
Replication for Active-Active Broadcast, Unknown Unicast, and
Multicast (BUM) Traffic" [RFC8361]
Status (Length): Proposed Standard (17 pages)
Overview: 3 individual drafts; 14 WG drafts
First draft: 2013-11-12
WG adoption: 2014-12-16
Last Call start: 2017-11-28 (draft 10)
IESG eval. start: 2017-12-18 (draft 11)
IESG approved: 2018-01-29 (draft 13)
AUTH48 start: 2018-03-09
AUTH48 complete: 2018-04-09
Published: 2018-04-12
According to the authors, the long delays in producing this RFC were
due to a slow uptake of the technology in the industry.
Minor copy editing, for style.
There was at least one partial implementation.
3.16. RFC 8472
"Transport Layer Security (TLS) Extension for Token Binding Protocol
Negotiation" [RFC8472]
Status (Length): Proposed Standard (8 pages)
Overview: 1 individual draft; 15 WG drafts
First draft: 2015-05-29
WG adoption: 2015-09-11
Last Call start: 2017-11-13 (draft 10)
IESG eval. start: 2018-03-19
IESG approved: 2018-07-20 (draft 14)
AUTH48 start: 2018-09-17
AUTH48 complete: 2018-09-25
Published: 2018-10-08
This is a pretty simple document, but it took over 3 years from
individual draft to RFC. According to the authors,the biggest
setbacks occurred at the start: it took a while to find a home for
this draft. It was presented in the TLS WG (because it's a TLS
extension) and UTA WG (because it has to do with applications using
TLS). Then the ADs determined that a new WG was needed, so the
authors had to work through the WG creation process, including
running a BOF.
Minor copy editing, for style, with the addition of a reference to
TLS 1.3.
Perhaps partially due to the delays, some of the implementers lost
interest in supporting this RFC.
3.17. RFC 8471
"The Token Binding Protocol Version 1.0" [RFC8471]
Status (Length): Proposed Standard (18 pages)
Overview: 1 individual draft; 19 WG drafts
First draft: 2014-10-13
WG adoption: 2015-03-15
Last Call start: 2017-11-13 (draft 16)
IESG eval. start: 2018-03-19
IESG approved: 2018-07-20 (draft 19)
AUTH48 start: 2018-09-17
AUTH48 complete: 2018-09-25
Published: 2018-10-08
This document presents a Token Binding Protocol for TLS. We can
notice a period of 5 months before adoption of the draft by the WG.
That explains in part the overall time of almost 4 years from first
draft to publication.
Minor copy editing, for style.
The web references indicate adoption in multiple development
projects.
3.18. RFC 8466
"A YANG Data Model for Layer 2 Virtual Private Network (L2VPN)
Service Delivery" [RFC8466]
Status (Length): Proposed Standard (158 pages)
Overview: 5 individual drafts; 11 WG drafts
First draft: 2016-09-01
WG adoption: 2017-02-26
Last Call start: 2018-02-21 (draft 07)
IESG eval. start: 2018-03-14 (draft 08)
IESG approved: 2018-06-25 (draft 10)
AUTH48 start: 2018-09-17
AUTH48 complete: 2018-10-09
Published: 2018-10-12
Copy editing for style and clarity, with also corrections to the YANG
model.
3.19. RFC 8362
"OSPFv3 Link State Advertisement (LSA) Extensibility" [RFC8362] is a
major extension to the OSPF protocol. It makes OSPFv3 fully
extensible.
Status (Length): Proposed Standard (33 pages)
Overview: 4 individual drafts; 24 WG drafts
First draft: 2013-02-17
WG adoption: 2013-10-15
Last Call start: 2017-12-19 (draft 19)
IESG eval. start: 2018-01-18 (draft 20)
IESG approved: 2018-01-29 (draft 23)
AUTH48 start: 2018-03-19
AUTH48 complete: 2018-03-30
Published: 2018-04-03
The specification was first submitted as an individual draft in the
IPv6 WG, then moved to the OSPF WG. The long delay of producing this
RFC is due to the complexity of the problem, and the need to wait for
implementations. It is a very important change to OSPF that makes
OSPFv3 fully extensible. Since it was a non-backward compatible
change, the developers started out with some very complex migration
scenarios but ended up with either legacy or extended OSPFv3 LSAs
within an OSPFv3 routing domain. The initial attempts to have a
hybrid mode of operation with both legacy and extended LSAs also
delayed implementation due to the complexity.
Copy editing for style and clarity.
This specification either was or will be implemented by all the
router vendors.
3.20. RFC 8468
"IPv4, IPv6, and IPv4-IPv6 Coexistence: Updates for the IP
Performance Metrics (IPPM) Framework" [RFC8468].
Status (Length): Informational (15 pages)
Overview: 3 individual drafts; 7 WG drafts
First draft: 2015-08-06
WG adoption: 2016-07-04
Last Call start: 2018-04-11 (draft 04)
IESG eval. start: 2018-05-24 (draft 05)
IESG approved: 2018-07-10 (draft 06)
AUTH48 start: 2018-09-13
AUTH48 complete: 2018-11-05
Published: 2018-11-14
RFC 8468 was somehow special in that there was not a technical reason
or interest that triggered it, but rather a formal requirement.
While writing RFC 7312, the IP Performance Metrics (IPPM) Working
Group realized that RFC 2330, the IP Performance Metrics Framework
supported IPv4 only and explicitly excluded support for IPv6.
Nevertheless, people used the metrics that were defined on top of RFC
2330 (and, therefore, IPv4 only) for IPv6, too. Although the IPPM WG
agreed that the work was needed, the interest of IPPM attendees in
progressing (and reading/reviewing) the IPv6 draft was limited.
Resolving the IPv6 technical part was straightforward, but
subsequently some people asked for a broader scope (topics like
header compression, 6LoWPAN, etc.), and it took some time to figure
out and later on convince people that these topics are out of scope.
The group also had to resolve contentious topics, for example, how to
measure the processing of IPv6 extension headers, which is sometimes
nonstandard.
The time in AUTH48 state for this document was longer than average.
According to the authors, the main reasons include:
* Workload and travel caused by busy work periods of all coauthors
* Time zone difference between coauthors and editor (at least US,
Europe, and India, not considering travel)
* RFC Production Center proposed and committed some unacceptable
modifications that needed to be reverted
* Lengthy discussions on a new document title (required high effort
and took a long time, in particular reaching consensus between
coauthors and editor was time-consuming and involved the AD)
* RFC Production Center correctly identified some nits (obsoleted
personal websites of coauthors) and coauthors attempting to fix
them.
The differences between the final draft and the published RFC show
copy editing for style and clarity, but do not account for the back
and forth between authors and editors mentioned by the authors.
4. Analysis of Process and Delays
We examine the 20 RFCs in the sample, measuring various
characteristics such as delay and citation counts, in an attempt to
identify patterns in the IETF processes.
4.1. Delays from First Draft to RFC
We look at the distribution of delays between the submission of the
first draft and the publication of the RFC, using the three
milestones defined in Section 2.1: processing time in the working
group, IETF processing time, and RFC production time. The following
table shows the number of days in each phase for the 20 RFCs in the
sample:
+======+============+=======+=========+======+======+======+
| RFC | Status | Pages | Overall | WG | IETF | Edit |
+======+============+=======+=========+======+======+======+
| 8411 | Info | 5 | 455 | 154 | 140 | 161 |
+------+------------+-------+---------+------+------+------+
| 8456 | Info | 64 | 1317 | 1033 | 126 | 158 |
+------+------------+-------+---------+------+------+------+
| 8446 | PS | 160 | 1576 | 1400 | 34 | 142 |
+------+------------+-------+---------+------+------+------+
| 8355 | Info | 13 | 1517 | 1175 | 243 | 99 |
+------+------------+-------+---------+------+------+------+
| 8441 | PS | 8 | 327 | 204 | 31 | 92 |
+------+------------+-------+---------+------+------+------+
| 8324 | Info (ISE) | 29 | 270 | 38 | 161 | 71 |
+------+------------+-------+---------+------+------+------+
| 8377 | PS | 8 | 1792 | 1630 | 21 | 141 |
+------+------------+-------+---------+------+------+------+
| 8498 | Info | 15 | 1059 | 935 | 59 | 65 |
+------+------------+-------+---------+------+------+------+
| 8479 | Info (ISE) | 8 | 414 | 233 | 144 | 37 |
+------+------------+-------+---------+------+------+------+
| 8453 | Info | 42 | 1165 | 1036 | 46 | 83 |
+------+------------+-------+---------+------+------+------+
| 8429 | BCP | 10 | 548 | 76 | 313 | 159 |
+------+------------+-------+---------+------+------+------+
| 8312 | Info | 18 | 1214 | 1113 | 16 | 85 |
+------+------------+-------+---------+------+------+------+
| 8492 | Info (ISE) | 40 | 2358 | 1706 | 172 | 480 |
+------+------------+-------+---------+------+------+------+
| 8378 | Exp | 21 | 1524 | 1446 | 27 | 51 |
+------+------------+-------+---------+------+------+------+
| 8361 | PS | 17 | 1612 | 1477 | 62 | 73 |
+------+------------+-------+---------+------+------+------+
| 8472 | PS | 8 | 1228 | 899 | 249 | 80 |
+------+------------+-------+---------+------+------+------+
| 8471 | PS | 18 | 1228 | 899 | 249 | 80 |
+------+------------+-------+---------+------+------+------+
| 8466 | PS | 158 | 771 | 538 | 124 | 109 |
+------+------------+-------+---------+------+------+------+
| 8362 | PS | 33 | 1871 | 1766 | 41 | 64 |
+------+------------+-------+---------+------+------+------+
| 8468 | Info | 15 | 1196 | 979 | 90 | 127 |
+------+------------+-------+---------+------+------+------+
| average | 35 | 1172 | 948 | 117 | 118 |
+-------------------+-------+---------+------+------+------+
| average (not ISE) | 36 | 1200 | 999 | 110 | 104 |
+-------------------+-------+---------+------+------+------+
Table 1
The average delay from first draft to publication is about 3 years
and 3 months, but this varies widely. Excluding the RFCs from the
Independent Stream, the average delay from start to finish is 3 years
and 4 months, of which on average 2 years and 9 months are spent
getting consensus in the working group, and 3 to 4 months each for
IETF consensus and for RFC production.
The longest delay is found for [RFC8492], 6.5 years from start to
finish. This is however a very special case -- a draft that was
prepared for the TLS Working Group and failed to reach consensus.
After that, it was resubmitted to the ISE, and incurred atypical
production delays.
On average, we see that 80% of the delay is incurred in WG
processing, 10% in IETF review, and 10% for edition and publication.
For IETF Stream RFCs, it appears that the delays for Informational
documents are slightly shorter than those for protocol
specifications, maybe six months shorter on average. However, there
are lots of differences between individual documents. The delays
range from less than a year to more than 5 years for protocol
specifications, and from a year and 3 months to a bit more than 4
years for Informational documents.
We can compare the delays in the 2018 samples to those observed 10
years ago and 20 years before:
+============+============+=======+=======+
| RFC (2008) | Status | Pages | Delay |
+============+============+=======+=======+
| 5326 | Exp | 54 | 1584 |
+------------+------------+-------+-------+
| 5348 | PS | 58 | 823 |
+------------+------------+-------+-------+
| 5281 | Info | 51 | 1308 |
+------------+------------+-------+-------+
| 5354 | Exp | 23 | 2315 |
+------------+------------+-------+-------+
| 5227 | PS | 21 | 2434 |
+------------+------------+-------+-------+
| 5329 | PS | 12 | 1980 |
+------------+------------+-------+-------+
| 5277 | PS | 35 | 912 |
+------------+------------+-------+-------+
| 5236 | Info (ISE) | 26 | 1947 |
+------------+------------+-------+-------+
| 5358 | BCP | 7 | 884 |
+------------+------------+-------+-------+
| 5271 | Info | 22 | 1066 |
+------------+------------+-------+-------+
| 5195 | PS | 10 | 974 |
+------------+------------+-------+-------+
| 5283 | PS | 12 | 1096 |
+------------+------------+-------+-------+
| 5186 | Info | 6 | 2253 |
+------------+------------+-------+-------+
| 5142 | PS | 13 | 1005 |
+------------+------------+-------+-------+
| 5373 | PS | 24 | 1249 |
+------------+------------+-------+-------+
| 5404 | PS | 27 | 214 |
+------------+------------+-------+-------+
| 5172 | PS | 7 | 305 |
+------------+------------+-------+-------+
| 5349 | Info | 10 | 1096 |
+------------+------------+-------+-------+
| 5301 | PS | 6 | 396 |
+------------+------------+-------+-------+
| 5174 | Info | 8 | 427 |
+------------+------------+-------+-------+
Table 2
+============+============+=======+=========+
| RFC (1998) | Status | Pages | Delay |
+============+============+=======+=========+
| 2289 | PS | 25 | 396 |
+------------+------------+-------+---------+
| 2267 | Info | 10 | unknown |
+------------+------------+-------+---------+
| 2317 | BCP | 10 | 485 |
+------------+------------+-------+---------+
| 2404 | PS | 7 | 488 |
+------------+------------+-------+---------+
| 2374 | PS | 12 | 289 |
+------------+------------+-------+---------+
| 2449 | PS | 19 | 273 |
+------------+------------+-------+---------+
| 2283 | PS | 9 | 153 |
+------------+------------+-------+---------+
| 2394 | Info | 6 | 365 |
+------------+------------+-------+---------+
| 2348 | DS | 5 | 699 |
+------------+------------+-------+---------+
| 2382 | Info | 30 | 396 |
+------------+------------+-------+---------+
| 2297 | Info (ISE) | 109 | 28 |
+------------+------------+-------+---------+
| 2381 | PS | 43 | 699 |
+------------+------------+-------+---------+
| 2312 | Info | 20 | 365 |
+------------+------------+-------+---------+
| 2387 | PS | 10 | 122 |
+------------+------------+-------+---------+
| 2398 | Info | 15 | 396 |
+------------+------------+-------+---------+
| 2391 | PS | 10 | 122 |
+------------+------------+-------+---------+
| 2431 | PS | 10 | 457 |
+------------+------------+-------+---------+
| 2282 | Info | 14 | 215 |
+------------+------------+-------+---------+
| 2323 | Info (ISE) | 5 | unknown |
+------------+------------+-------+---------+
| 2448 | Info (ISE) | 7 | 92 |
+------------+------------+-------+---------+
Table 3
We can compare the median delay, and the delays observed by the
fastest and slowest quartiles in the three years:
+======+=============+========+=============+
| Year | Fastest 25% | Median | Slowest 25% |
+======+=============+========+=============+
| 2018 | 715 | 1221 | 1537 |
+------+-------------+--------+-------------+
| 2008 | 869 | 1081 | 1675 |
+------+-------------+--------+-------------+
| 1998 | 169 | 365 | 442 |
+------+-------------+--------+-------------+
Table 4
The IETF takes three to four times more to produce an RFC in 2018
than it did in 1998, but about the same time as it did in 2008. We
can get a rough estimate of how this translates in terms of "level of
attention" per RFC by comparing the number of participants in the
IETF meetings of 2018, 2008, and 1998 [IETFCOUNT] to the number of
RFCs published these years [RFCYEAR].
+======+=========+========+========+======+=========+============+
| Year | Number | Spring | Summer | Fall | Average | Attendees/ |
| | of RFCs | P. | P. | P. | P. | RFC |
+======+=========+========+========+======+=========+============+
| 2018 | 208 | 1235 | 1078 | 879 | 1064 | 5.1 |
+------+---------+--------+--------+------+---------+------------+
| 2008 | 290 | 1128 | 1181 | 962 | 1090 | 3.8 |
+------+---------+--------+--------+------+---------+------------+
| 1998 | 234 | 1775 | 2106 | 1705 | 1862 | 8.0 |
+------+---------+--------+--------+------+---------+------------+
Table 5
The last column in the table provides the ratio of average number of
participants to the number of RFCs published. If the IETF were a
centralized organization, and if all participants and documents were
equivalent, this ratio would be the number of participants dedicated
to produce an RFC on a given year. This is of course a completely
abstract figure because none of the hypotheses above are true, but it
still gives a vague indication of the "level of attention" applied to
documents. We see that this ratio has increased from 2008 to 2018,
as the number of participants was about the same for these two years
but the number of published RFCs decreased. However, this ratio was
much higher in 1998. The IETF had many more participants, and there
were probably many more eyes available to review any given draft. If
we applied the ratios of 1998, the IETF would be producing 119
documents in 2018 instead of 208.
4.2. Working Group Processing Time
The largest part of the delays is spent in the working groups, before
the draft is submitted to the IESG for IETF review. As mentioned in
Section 2.1, the only intermediate milestone that we can extract from
the IETF Datatracker is the date at which the document was adopted by
the working group, or targeted for independent submission. The
breakdown of the delays for the documents in our sample is:
+======+============+======+================+================+
| RFC | Status | WG | Until adoption | After adoption |
+======+============+======+================+================+
| 8411 | Info | 154 | 0 | 154 |
+------+------------+------+----------------+----------------+
| 8456 | Info | 1033 | 209 | 824 |
+------+------------+------+----------------+----------------+
| 8446 | PS | 1400 | 0 | 1400 |
+------+------------+------+----------------+----------------+
| 8355 | Info | 1175 | 102 | 1073 |
+------+------------+------+----------------+----------------+
| 8441 | PS | 204 | 65 | 139 |
+------+------------+------+----------------+----------------+
| 8324 | Info (ISE) | 38 | 0 | 38 |
+------+------------+------+----------------+----------------+
| 8377 | PS | 1630 | 728 | 902 |
+------+------------+------+----------------+----------------+
| 8498 | Info | 935 | 420 | 515 |
+------+------------+------+----------------+----------------+
| 8479 | Info (ISE) | 233 | 0 | 233 |
+------+------------+------+----------------+----------------+
| 8453 | Info | 1036 | 396 | 640 |
+------+------------+------+----------------+----------------+
| 8429 | BCP | 76 | 0 | 76 |
+------+------------+------+----------------+----------------+
| 8312 | Info | 1113 | 280 | 833 |
+------+------------+------+----------------+----------------+
| 8492 | Info (ISE) | 1706 | 1428 | 278 |
+------+------------+------+----------------+----------------+
| 8378 | Exp | 1446 | 661 | 785 |
+------+------------+------+----------------+----------------+
| 8361 | PS | 1477 | 399 | 1078 |
+------+------------+------+----------------+----------------+
| 8472 | PS | 899 | 105 | 794 |
+------+------------+------+----------------+----------------+
| 8471 | PS | 1127 | 153 | 794 |
+------+------------+------+----------------+----------------+
| 8466 | PS | 538 | 178 | 360 |
+------+------------+------+----------------+----------------+
| 8362 | PS | 1766 | 240 | 1526 |
+------+------------+------+----------------+----------------+
| 8468 | Info | 979 | 333 | 646 |
+------+------------+------+----------------+----------------+
| Average | 948 | 285 | 663 |
+-------------------+------+----------------+----------------+
Table 6
The time before working group adoption averages to a bit more than 9
months, compared to 1 year and almost 10 months for processing time
after adoption. We see that RFC 8492 stands out, with long delays
spent attempting publication through a working group before
submission to the Independent Submissions Editor. If we remove RFC
8492 from the list, the average time until adoption drops to just
over 7 months, and becomes just 25% of the total processing time in
the WG.
There are a few documents that started immediately as working group
efforts, or were immediately targeted for publication in the
Independent Stream. Those documents tend to see short processing
times, with the exception of RFC 8446 on which the TLS Working Group
spent a long time working.
4.3. Preparation and Publication Delays
The preparation and publication delays include three components:
* the delay from submission to the RFC Editor to beginning of
AUTH48, during which the document is prepared (referred to as "RFC
edit" below);
* the AUTH48 delay, during which authors review and eventually
approve the changes proposed by the editors (referred to as
"AUTH48" below);
* the publication delay, from final agreement by authors and editors
to actual publication (referred to as "RFC Pub" below).
The breakdown of the publication delays for each RFC is shown in the
following table.
+=======+========+=======+==========+========+=========+=========+
| RFC | Status | Pages | RFC edit | AUTH48 | RFC Pub | Edit |
| | | | | | | (total) |
+=======+========+=======+==========+========+=========+=========+
| 8411 | Info | 5 | 53 | 88 | 20 | 161 |
+-------+--------+-------+----------+--------+---------+---------+
| 8456 | Info | 64 | 98 | 46 | 14 | 158 |
+-------+--------+-------+----------+--------+---------+---------+
| 8446 | PS | 160 | 85 | 57 | 0 | 142 |
+-------+--------+-------+----------+--------+---------+---------+
| 8355 | Info | 13 | 83 | 15 | 1 | 99 |
+-------+--------+-------+----------+--------+---------+---------+
| 8441 | PS | 8 | 56 | 33 | 3 | 92 |
+-------+--------+-------+----------+--------+---------+---------+
| 8324 | Info | 29 | 42 | 28 | 1 | 71 |
| | (ISE) | | | | | |
+-------+--------+-------+----------+--------+---------+---------+
| 8377 | PS | 8 | 39 | 102 | 0 | 141 |
+-------+--------+-------+----------+--------+---------+---------+
| 8498 | Info | 15 | 48 | 16 | 1 | 65 |
+-------+--------+-------+----------+--------+---------+---------+
| 8479 | Info | 8 | 31 | 5 | 1 | 37 |
| | (ISE) | | | | | |
+-------+--------+-------+----------+--------+---------+---------+
| 8453 | Info | 42 | 73 | 7 | 3 | 83 |
+-------+--------+-------+----------+--------+---------+---------+
| 8429 | BCP | 10 | 60 | 99 | 0 | 159 |
+-------+--------+-------+----------+--------+---------+---------+
| 8312 | Info | 18 | 55 | 28 | 2 | 85 |
+-------+--------+-------+----------+--------+---------+---------+
| 8492 | Info | 40 | 355 | 123 | 2 | 480 |
| | (ISE) | | | | | |
+-------+--------+-------+----------+--------+---------+---------+
| 8378 | Exp | 21 | 42 | 9 | 0 | 51 |
+-------+--------+-------+----------+--------+---------+---------+
| 8361 | PS | 17 | 39 | 31 | 3 | 73 |
+-------+--------+-------+----------+--------+---------+---------+
| 8472 | PS | 8 | 59 | 8 | 13 | 80 |
+-------+--------+-------+----------+--------+---------+---------+
| 8471 | PS | 18 | 59 | 8 | 13 | 80 |
+-------+--------+-------+----------+--------+---------+---------+
| 8466 | PS | 158 | 84 | 22 | 3 | 109 |
+-------+--------+-------+----------+--------+---------+---------+
| 8362 | PS | 33 | 49 | 11 | 4 | 64 |
+-------+--------+-------+----------+--------+---------+---------+
| 8468 | Info | 15 | 65 | 53 | 9 | 127 |
+-------+--------+-------+----------+--------+---------+---------+
| Average | | 74 | 39 | 5 | 118 |
+----------------+-------+----------+--------+---------+---------+
| Average | | 59 | 35 | 5 | 99 |
| (without 8492) | | | | | |
+----------------+-------+----------+--------+---------+---------+
Table 7
On average, the total delay appears to be about four months, but the
average is skewed by the extreme values encountered for [RFC8492].
If we exclude that RFC from the computations, the average delay drops
to a just a bit more than 3 months: about 2 months for the
preparation, a bit more than one month for the AUTH48 phase, and 5
days for the publishing.
Of course, these delays vary from RFC to RFC. To try explain the
causes of the delay, we compute the correlation factor between the
observed delays and several plausible explanation factors:
* the number of pages in the document,
* the amount of copy editing, as discussed in Section 4.4,
* whether or not IANA actions were required,
* the number of authors,
* the number of draft revisions,
* the working group delay.
We find the following values:
+===================+==========+========+=============+
| Correlation | RFC edit | AUTH48 | Edit(total) |
+===================+==========+========+=============+
| Number of pages | 0.50 | -0.04 | 0.21 |
+-------------------+----------+--------+-------------+
| Copy-Edit | 0.42 | 0.24 | 0.45 |
+-------------------+----------+--------+-------------+
| IANA | -0.14 | -0.21 | 0.12 |
+-------------------+----------+--------+-------------+
| Number of authors | 0.39 | -0.07 | 0.18 |
+-------------------+----------+--------+-------------+
| Number of drafts | 0.18 | -0.33 | -0.19 |
+-------------------+----------+--------+-------------+
| WG delay | 0.03 | -0.16 | -0.15 |
+-------------------+----------+--------+-------------+
Table 8
We see some plausible explanations for the production delay. It will
be somewhat longer for longer documents or for documents that require
a lot of copy editing (see Section 4.4). Somewhat surprisingly, it
also tends to increase with the number of authors. It does not
appear significantly correlated with the presence or absence of IANA
action.
The analysis of RFC 8324 in Section 3.6 explains its short editing
delays by the experience of the author. This makes sense: if a
document needs less editing, the editing delays would be shorter.
This is partially confirmed by the relation between the amount of
copy editing and the publication delay.
We see fewer plausible explanations for the AUTH48 delays. These
delays vary much more than the preparation delay, with a standard
deviation of 20 days for AUTH48 versus 10 days for the preparation
delay. In theory, AUTH48 is just a final verification: the authors
receive the document prepared by the RFC production center, and just
have to give their approval, or maybe request a last minute
correction. The name indicates that this is expected to last just
two days, but in average it lasts more than a month.
We often hypothesize that the number of authors influences the AUTH48
delay, or that authors who have spent a long time working on the
document in the working group somehow get demotivated and spend even
longer to answer questions during AUTH48. This may happen sometimes,
but our statistics don't show that - if anything, the numerical
results point in the opposite direction.
After asking the authors of the RFCs in the sample why the AUTH48
phase took a long time, we got three explanations:
1. Some RFCs have multiple authors in multiple time zones. This
slows down the coordination required for approving changes.
2. Some authors found some of the proposed changes unnecessary or
undesirable, and asked that they be reversed. This required long
exchanges between authors and editors.
3. Some authors were not giving high priority to AUTH48 responses.
As mentioned above, we were not able to verify these hypotheses by
looking at the data. The author's experience with this document
suggests another potential delay for the Independent Stream RFC:
processing delay by the Independent Submissions Editor, discussed in
Section 4.5.
4.4. Copy Editing
We can assess the amount of copy editing applied to each published
RFC by comparing the text of the draft approved for publication and
the text of the RFC. We do expect differences in the "boilerplate"
and in the IANA section, but we will also see differences due to copy
editing. Assessing the amount of copy editing is subjective, and we
do it using a scale of 1 to 4:
1: Minor editing
2: Editing for style, such as capitalization, hyphens, "that" versus
"which", and expanding all acronyms at least once.
3: Editing for clarity in addition to style, such as rewriting
ambiguous sentences and clarifying use of internal references.
For YANG models, that may include model corrections suggested by
the verifier.
4: Extensive editing.
The following table shows that about half of the RFCs required
editing for style, and the other half at least some editing for
clarity.
+======+============+===========+
| RFC | Status | Copy Edit |
+======+============+===========+
| 8411 | Info | 2 |
+------+------------+-----------+
| 8456 | Info | 4 |
+------+------------+-----------+
| 8446 | PS | 3 |
+------+------------+-----------+
| 8355 | Info | 2 |
+------+------------+-----------+
| 8441 | PS | 2 |
+------+------------+-----------+
| 8324 | Info (ISE) | 2 |
+------+------------+-----------+
| 8377 | PS | 3 |
+------+------------+-----------+
| 8498 | Info | 3 |
+------+------------+-----------+
| 8479 | Info (ISE) | 1 |
+------+------------+-----------+
| 8453 | Info | 2 |
+------+------------+-----------+
| 8429 | BCP | 2 |
+------+------------+-----------+
| 8312 | Info | 2 |
+------+------------+-----------+
| 8492 | Info (ISE) | 3 |
+------+------------+-----------+
| 8378 | Exp | 2 |
+------+------------+-----------+
| 8361 | PS | 2 |
+------+------------+-----------+
| 8472 | PS | 2 |
+------+------------+-----------+
| 8471 | PS | 2 |
+------+------------+-----------+
| 8466 | PS | 3 |
+------+------------+-----------+
| 8362 | PS | 3 |
+------+------------+-----------+
| 8468 | Info | 3 |
+------+------------+-----------+
Table 9
This method of assessment does not take into account the number of
changes proposed by the editors and eventually rejected by the
authors, since these changes are not present in either the final
draft or the published RFC. It might be possible to get an
evaluation of these "phantom changes" from the RFC Production Center.
4.5. Independent Stream
Out of 20 randomly selected RFCs, 3 were published through the
Independent Stream. One is an independent opinion, another a
description of a non-IETF protocol format, and the third was
[RFC8492], which is a special case. Apart from this special case,
the publication delays were significantly shorter for the Independent
Stream than for the IETF Stream.
The authors of these 3 RFCs are regular IETF contributors. This
observation motivated a secondary analysis of all the RFCs published
in the Independent Stream in 2018. There are 14 such RFCs: 8507,
8494, 8493, 8492, 8483, 8479, 8433, 8409, 8374, 8369, 8367, 8351,
8328, and 8324. (RFCs 8367 and 8369 were published on 1 April 2018.)
The majority of the documents were published by regular IETF
participants, but two of them were not. One describes "The BagIt
File Packaging Format (V1.0)" [RFC8493], and the other the "Yeti DNS
Testbed" [RFC8483]. They document a data format and a system
developed outside the IETF and illustrate the outreach function of
the Independent Stream. In both cases, the authors include one
experienced IETF participant, who presumably helped outsiders
navigate the publication process.
The present document experienced some publication delays due to the
Independent Submissions Editor. The ISE is a bottleneck and is a
volunteer resource. Although the ISE as a lone person operating as a
volunteer is still roughly adequate resource for the job, the
delivery will necessarily be best effort with delays caused by spikes
in ISE load, work commitments, and other life events. These delays
may not be fundamentally critical to RFC delivery, but they are
capable of introducing a significant percentage delay into what might
otherwise be a smooth process.
5. Citation Counts
In this exploration, we want to examine whether citation counts
provide a meaningful assessment of the popularity of RFCs. We obtain
the citation counts through the Semantic Scholar API, using queries
of the form: <https://api.semanticscholar.org/v1/paper/10.17487/
rfc8446?include_unknown_references=true>
In these queries, the RFC is uniquely identified by its DOI
reference, which is composed of the RFC Series prefix 10.17487 and
the RFC identifier. The queries return a series of properties,
including a list of citations for the RFC. Based on that list of
citations, we compute three numbers:
* The total number of citations
* The number of citations in the year of publication and the year
after that
* For the RFC published in 1998 or 2008 that we use for comparison,
the number of citations in the years 2018 and 2019.
All the numbers were retrieved on October 6, 2019.
5.1. Citation Numbers
As measured on October 6, 2019, the citation counts for the RFC in
our sample set were:
+============+============+=======+===========+
| RFC (2018) | Status | Total | 2018-2019 |
+============+============+=======+===========+
| 8411 | Info | 1 | 0 |
+------------+------------+-------+-----------+
| 8456 | Info | 1 | 1 |
+------------+------------+-------+-----------+
| 8446 | PS | 418 | 204 |
+------------+------------+-------+-----------+
| 8355 | Info | 3 | 3 |
+------------+------------+-------+-----------+
| 8441 | PS | 1 | 1 |
+------------+------------+-------+-----------+
| 8324 | Info (ISE) | 0 | 0 |
+------------+------------+-------+-----------+
| 8377 | PS | 0 | 0 |
+------------+------------+-------+-----------+
| 8498 | Info | 0 | 0 |
+------------+------------+-------+-----------+
| 8479 | Info (ISE) | 0 | 0 |
+------------+------------+-------+-----------+
| 8453 | Info | 3 | 3 |
+------------+------------+-------+-----------+
| 8429 | BCP | 0 | 0 |
+------------+------------+-------+-----------+
| 8312 | Info | 25 | 16 |
+------------+------------+-------+-----------+
| 8492 | Info (ISE) | 4 | 4 |
+------------+------------+-------+-----------+
| 8378 | Exp | 1 | 1 |
+------------+------------+-------+-----------+
| 8361 | PS | 0 | 0 |
+------------+------------+-------+-----------+
| 8472 | PS | 1 | 1 |
+------------+------------+-------+-----------+
| 8471 | PS | 1 | 1 |
+------------+------------+-------+-----------+
| 8466 | PS | 0 | 0 |
+------------+------------+-------+-----------+
| 8362 | PS | 1 | 1 |
+------------+------------+-------+-----------+
| 8468 | Info | 1 | 1 |
+------------+------------+-------+-----------+
Table 10
The results indicate that [RFC8446] is by far the most cited of the
20 RFC in our sample. This is not surprising, since TLS is a key
Internet Protocol. The TLS 1.3 protocol was also the subject of
extensive studies by researchers, and thus was mentioned in a number
of published papers. Surprisingly, the Semantic Scholar mentions a
number of citations that predate the publication date. These are
probably citations of the various draft versions of the protocol.
The next most cited RFC in the sample is [RFC8312] which describes
the Cubic congestion control algorithm for TCP. That protocol was
also the target of a large number of academic publications. The
other RFCs in the sample only have a small number of citations.
There is probably a small bias when measuring citations at a fixed
date. An RFC published in January 2018 would have more time to
accrue citations than one published in December. That may be true to
some extent, as the second most cited RFC in the set was published in
January. However, the effect has to be limited. The most cited RFC
was published in August, and the second most cited was published in
2019. (That RFC got an RFC number in 2018, but publication was
slowed by long AUTH48 delays.)
5.2. Comparison to 1998 and 2008
In order to get a baseline, we can look at the number of references
for the RFCs published in 2008 and 1998. However, we need to take
time into account. Documents published a long time ago are expected
to have accrued more references. We try to address this by looking
at three counts for each document: the overall number of references
over the document's lifetime, the number of references obtained in
the year following publication, and the number of references observed
since 2018:
+============+============+=======+===========+===========+
| RFC (2008) | Status | Total | 2008-2009 | 2018-2019 |
+============+============+=======+===========+===========+
| 5326 | Exp | 138 | 14 | 15 |
+------------+------------+-------+-----------+-----------+
| 5348 | PS | 14 | 3 | 0 |
+------------+------------+-------+-----------+-----------+
| 5281 | Info | 69 | 15 | 7 |
+------------+------------+-------+-----------+-----------+
| 5354 | Exp | 17 | 13 | 0 |
+------------+------------+-------+-----------+-----------+
| 5227 | PS | 19 | 1 | 2 |
+------------+------------+-------+-----------+-----------+
| 5329 | PS | 24 | 6 | 1 |
+------------+------------+-------+-----------+-----------+
| 5277 | PS | 32 | 3 | 2 |
+------------+------------+-------+-----------+-----------+
| 5236 | Info (ISE) | 25 | 5 | 4 |
+------------+------------+-------+-----------+-----------+
| 5358 | BCP | 21 | 2 | 0 |
+------------+------------+-------+-----------+-----------+
| 5271 | Info | 7 | 2 | 0 |
+------------+------------+-------+-----------+-----------+
| 5195 | PS | 7 | 4 | 2 |
+------------+------------+-------+-----------+-----------+
| 5283 | PS | 8 | 1 | 0 |
+------------+------------+-------+-----------+-----------+
| 5186 | Info | 14 | 4 | 2 |
+------------+------------+-------+-----------+-----------+
| 5142 | PS | 8 | 4 | 0 |
+------------+------------+-------+-----------+-----------+
| 5373 | PS | 5 | 2 | 0 |
+------------+------------+-------+-----------+-----------+
| 5404 | PS | 1 | 1 | 0 |
+------------+------------+-------+-----------+-----------+
| 5172 | PS | 2 | 0 | 0 |
+------------+------------+-------+-----------+-----------+
| 5349 | Info | 8 | 0 | 2 |
+------------+------------+-------+-----------+-----------+
| 5301 | PS | 5 | 1 | 0 |
+------------+------------+-------+-----------+-----------+
| 5174 | Info | 0 | 0 | 0 |
+------------+------------+-------+-----------+-----------+
Table 11
+============+============+=======+===========+===========+
| RFC (1998) | Status | Total | 1998-1999 | 2018-2019 |
+============+============+=======+===========+===========+
| 2289 | PS | 2 | 0 | 1 |
+------------+------------+-------+-----------+-----------+
| 2267 | Info | 982 | 5 | 61 |
+------------+------------+-------+-----------+-----------+
| 2317 | BCP | 9 | 1 | 2 |
+------------+------------+-------+-----------+-----------+
| 2404 | PS | 137 | 6 | 1 |
+------------+------------+-------+-----------+-----------+
| 2374 | PS | 42 | 4 | 0 |
+------------+------------+-------+-----------+-----------+
| 2449 | PS | 7 | 2 | 0 |
+------------+------------+-------+-----------+-----------+
| 2283 | PS | 17 | 3 | 2 |
+------------+------------+-------+-----------+-----------+
| 2394 | Info | 13 | 2 | 1 |
+------------+------------+-------+-----------+-----------+
| 2348 | DS | 5 | 0 | 0 |
+------------+------------+-------+-----------+-----------+
| 2382 | Info | 17 | 12 | 0 |
+------------+------------+-------+-----------+-----------+
| 2297 | Info (ISE) | 36 | 11 | 0 |
+------------+------------+-------+-----------+-----------+
| 2381 | PS | 39 | 12 | 0 |
+------------+------------+-------+-----------+-----------+
| 2312 | Info | 14 | 3 | 0 |
+------------+------------+-------+-----------+-----------+
| 2387 | PS | 4 | 1 | 0 |
+------------+------------+-------+-----------+-----------+
| 2398 | Info | 17 | 0 | 1 |
+------------+------------+-------+-----------+-----------+
| 2391 | PS | 31 | 3 | 0 |
+------------+------------+-------+-----------+-----------+
| 2431 | PS | 3 | 0 | 0 |
+------------+------------+-------+-----------+-----------+
| 2282 | Info | 8 | 0 | 0 |
+------------+------------+-------+-----------+-----------+
| 2323 | Info (ISE) | 1 | 0 | 0 |
+------------+------------+-------+-----------+-----------+
| 2448 | Info (ISE) | 0 | 0 | 0 |
+------------+------------+-------+-----------+-----------+
Table 12
We can compare the median number of citations and the numbers of
citations for the least and most popular quartiles in the three
years:
+============================+===========+========+============+
| References | Lower 25% | Median | Higher 25% |
+============================+===========+========+============+
| RFC (2018) | 0 | 1 | 3 |
+----------------------------+-----------+--------+------------+
| RFC (2008) | 6.5 | 11 | 21.75 |
+----------------------------+-----------+--------+------------+
| RFC (2008), until 2009 | 1 | 2.5 | 4.5 |
+----------------------------+-----------+--------+------------+
| RFC (2008), 2018 and after | 0 | 0 | 2 |
+----------------------------+-----------+--------+------------+
| RFC (1998) | 4.75 | 13.5 | 32.25 |
+----------------------------+-----------+--------+------------+
| RFC (1998), until 1999 | 0 | 2 | 4.25 |
+----------------------------+-----------+--------+------------+
| RFC (1998), 2018 and after | 0 | 0 | 1 |
+----------------------------+-----------+--------+------------+
Table 13
The total numbers show new documents with fewer citations than the
older ones. This can be explained to some degree by the passage of
time. If we restrict the analysis to the number of citations accrued
in the year of publishing and the year after that, we still see about
the same distribution for the three samples.
We also see that the number of references to RFCs fades over time.
Only the most popular of the RFC produced in 1998 are still cited in
2019.
5.3. Citations versus Deployments
The following table shows side by side the number of citations as
measured in Section 5.1 and the estimation of deployment as indicated
in Section 3.
+============+============+===========+============+
| RFC (2018) | Status | Citations | Deployment |
+============+============+===========+============+
| 8411 | Info | 1 | medium |
+------------+------------+-----------+------------+
| 8456 | Info | 1 | medium |
+------------+------------+-----------+------------+
| 8446 | PS | 418 | high |
+------------+------------+-----------+------------+
| 8355 | Info | 3 | medium |
+------------+------------+-----------+------------+
| 8441 | PS | 1 | high |
+------------+------------+-----------+------------+
| 8324 | Info (ISE) | 0 | N/A |
+------------+------------+-----------+------------+
| 8377 | PS | 0 | unknown |
+------------+------------+-----------+------------+
| 8498 | Info | 0 | unknown |
+------------+------------+-----------+------------+
| 8479 | Info (ISE) | 0 | one |
+------------+------------+-----------+------------+
| 8453 | Info | 3 | unknown |
+------------+------------+-----------+------------+
| 8429 | BCP | 0 | some |
+------------+------------+-----------+------------+
| 8312 | Info | 25 | high |
+------------+------------+-----------+------------+
| 8492 | Info (ISE) | 4 | one |
+------------+------------+-----------+------------+
| 8378 | Exp | 1 | some |
+------------+------------+-----------+------------+
| 8361 | PS | 0 | one |
+------------+------------+-----------+------------+
| 8472 | PS | 1 | medium |
+------------+------------+-----------+------------+
| 8471 | PS | 1 | medium |
+------------+------------+-----------+------------+
| 8466 | PS | 0 | unknown |
+------------+------------+-----------+------------+
| 8362 | PS | 1 | medium |
+------------+------------+-----------+------------+
| 8468 | Info | 1 | some |
+------------+------------+-----------+------------+
Table 14
From looking at these results, it is fairly obvious that citation
counts cannot be used as proxies for the "value" of an RFC. In our
sample, the two RFCs that have high citation counts were both widely
deployed, and can certainly be described as successful, but we also
see many RFCs that saw significant deployment without garnering a
high level of citations.
Citation counts are driven by academic interest, but are only loosely
correlated with actual deployment. We saw that [RFC8446] was widely
cited in part because the standardization process involved many
researchers, and that the high citation count of [RFC8312] is largely
due to the academic interest in evaluating congestion control
protocols. If we look at previous years, the most cited RFC in the
2008 sample is [RFC5326], an experimental RFC defining security
extensions to an experimental delay tolerant transport protocol.
This protocol does not carry a significant proportion of Internet
traffic, but has been the object of a fair number of academic
studies.
The citation process tends to privilege the first expression of a
concept. We see that with the most cited RFC in the 1998 set is
[RFC2267], an informational RFC defining Network Ingress Filtering
that was obsoleted in May 2000 by [RFC2827]. It is still cited
frequently in 2018 and 2019, regardless of its formal status in the
RFC Series. We see the same effect at work with [RFC8441], which
garners very few citations although it updates [RFC6455] that has a
large number of citations. The same goes for [RFC8468], which is
sparsely cited while the [RFC2330] is widely cited. Just counting
citations will not indicate whether developers still use an old
specification or have adopted the revised RFC.
5.4. Citations versus Web References
Web references might be another indicator of the popularity of an
RFC. In order to evaluate these references, we list here the number
of results returned by searches on Google and Bing, looking for the
search term "RFCnnnn" (e.g., "RFC8411"), and copying the number of
results returned by the search engines. The table below presents the
results of these searches, performed on April 4, 2020.
+============+============+===========+========+=======+
| RFC (2018) | Status | Citations | Google | Bing |
+============+============+===========+========+=======+
| 8411 | Info | 1 | 301 | 94 |
+------------+------------+-----------+--------+-------+
| 8456 | Info | 1 | 266 | 8456 |
+------------+------------+-----------+--------+-------+
| 8446 | PS | 418 | 25900 | 47800 |
+------------+------------+-----------+--------+-------+
| 8355 | Info | 3 | 521 | 114 |
+------------+------------+-----------+--------+-------+
| 8441 | PS | 1 | 2430 | 59500 |
+------------+------------+-----------+--------+-------+
| 8324 | Info (ISE) | 0 | 393 | 138 |
+------------+------------+-----------+--------+-------+
| 8377 | PS | 0 | 264 | 10900 |
+------------+------------+-----------+--------+-------+
| 8498 | Info | 0 | 335 | 10100 |
+------------+------------+-----------+--------+-------+
| 8479 | Info (ISE) | 0 | 564 | 11000 |
+------------+------------+-----------+--------+-------+
| 8453 | Info | 3 | 817 | 11400 |
+------------+------------+-----------+--------+-------+
| 8429 | BCP | 0 | 391 | 41600 |
+------------+------------+-----------+--------+-------+
| 8312 | Info | 25 | 1620 | 2820 |
+------------+------------+-----------+--------+-------+
| 8492 | Info (ISE) | 4 | 323 | 9400 |
+------------+------------+-----------+--------+-------+
| 8378 | Exp | 1 | 418 | 11600 |
+------------+------------+-----------+--------+-------+
| 8361 | PS | 0 | 499 | 92 |
+------------+------------+-----------+--------+-------+
| 8472 | PS | 1 | 496 | 169 |
+------------+------------+-----------+--------+-------+
| 8471 | PS | 1 | 1510 | 11600 |
+------------+------------+-----------+--------+-------+
| 8466 | PS | 0 | 766 | 173 |
+------------+------------+-----------+--------+-------+
| 8362 | PS | 1 | 67 | 147 |
+------------+------------+-----------+--------+-------+
| 8468 | Info | 1 | 453 | 127 |
+------------+------------+-----------+--------+-------+
Table 15
The result counts from Bing are sometimes surprising. Why would RFC
8441 gather 59,500 web references? Looking at the results in detail,
we find a mix of data. Some of them are logs of development projects
implementing Web Sockets, which is exactly what we are looking for,
but others appear spurious. For example, a shop selling rugby
jerseys is listed because its phone number ends with "8441". Other
pages were listed because street numbers or product numbers matched
the RFC number. The same type of collision may explain the large
reference counts on Bing for RFCs 8377, 8498, 8479, 8453, 8429, 8378,
and 8471. The result counts on Bing do not appear to provide a good
metric.
On Google, all RFCs garner at least a 250 references, largely because
the whole RFC catalog is replicated on a large number of web servers.
Deviations from that baseline are largely correlated with the number
of citations in the Semantic Scholar, with a couple of exception: RFC
8441 and RFC 8471 garner more references than the low citation counts
would predict. Looking at the results, we find many references in
development databases explaining how these protocols are implemented
in various code bases and open source projects. This means that
counting Google results would give some indication about an RFC's
popularity, complementing the citation counts.
There are some practical problems in using the counts of Google
results. Google searches are personalized, the results depend on the
source of the queries, and the counts may vary as well. The search
results depend on the search algorithm, and there is no guarantee
that counts will not change when the algorithm changes. On the other
hand, the results do indicate that some of the RFCs in our sample are
being used by developers or in deployments.
6. Observations and Next Steps
The author's goal was to get a personal understanding of the "chain
of production" of the RFCs, and in particular to look at the various
causes of delays in the process. As shown in Section 4, the average
RFC was produced in 3 years and 4 months, which is similar to what
was found in the 2008 sample, but more than three times larger than
the delays for the 1998 sample.
The working group process appears to be the main source of delays.
Efforts to diminish delays should probably focus there, instead of on
the IETF and IESG reviews or the RFC production. For the RFC
production phase, most of the variability originates in the AUTH48
process, which is influenced by a variety of factors such as number
of authors or level of engagement of these authors.
Most of the delay is spent in the working group, but the IETF
Datatracker does not hold much information about what happens inside
the working groups. For example, events like Working Group Last
Calls were not recorded in the history of the selected drafts
available in the Datatracker. Such information would have been
interesting. Of course, requiring that information would create an
administrative burden, so there is clearly a trade-off between
requiring more work from working group chairs and providing better
data for process analysis. (It appears that this information can be
available in the Datatracker for more recent drafts, if the WG chairs
use the Datatracker properly.)
The Independent Stream operates as expected. The majority of the
authors of the Independent Stream RFCs appear to be in IETF insiders,
but there is significant amount of engagement by outside parties.
The analysis of citations in Section 5.1 shows that citation numbers
are a very poor indication of the "value" of an RFC. Citation
numbers measure the engagement of academic researchers with specific
topics, but have little correlation with the level of adoption and
deployment of a specific RFC. The result counts of Google searches
do capture references outside academia, such as logs of development
projects. This might be informative, but it is not clear that the
counts would not change over time due to algorithm changes or
personalization.
This document analyses a small sample of RFCs "in depth". This
allowed gathering of detailed feedback on the process and the
deployments. On the other hand, much of the data on delays is
available from the IETF Datatracker. It may be worth considering
adding an automated reporting of delay metrics in the IETF
Datatracker.
This document only considers the RFCs that were published in a given
year. This approach can be criticized as introducing a form of
"survivor bias". There are many drafts proposed to the IETF, and
only a fraction of them end up being published as RFCs. On one hand,
this is expected, because part of the process is to triage between
ideas that can gather consensus and those that don't. On the other
hand, we don't know whether that triage is too drastic and has
discouraged progress on good ideas.
One way to evaluate the triage process would be to look at
publication attempts that were abandoned -- for example, drafts that
expired without progressing or being replaced. The sampling
methodology could also be used for that purpose. Pick maybe 20
drafts at random, among those abandoned in a target year, and
investigate why they were abandoned. Was it because better solutions
emerged in the working group? Or maybe because the authors
discovered a flaw in their proposal? Or was it because some
factional struggle blocked a good idea? Was the idea pursued in a
different venue? Hopefully, someone will try this kind of
investigation.
7. Security Considerations
This document does not specify any protocol.
We might want to analyze whether security issues were discovered
after publication of specific standards.
8. IANA Considerations
This document has no IANA actions.
Preliminary analysis does not indicate that IANA is causing any
particular delay in the RFC publication process.
9. Informative References
[IETFCOUNT]
IETF, "Past IETF Meetings",
<https://www.ietf.org/how/meetings/past/>.
[RFC2267] Ferguson, P. and D. Senie, "Network Ingress Filtering:
Defeating Denial of Service Attacks which employ IP Source
Address Spoofing", RFC 2267, DOI 10.17487/RFC2267, January
1998, <https://www.rfc-editor.org/info/rfc2267>.
[RFC2330] Paxson, V., Almes, G., Mahdavi, J., and M. Mathis,
"Framework for IP Performance Metrics", RFC 2330,
DOI 10.17487/RFC2330, May 1998,
<https://www.rfc-editor.org/info/rfc2330>.
[RFC2827] Ferguson, P. and D. Senie, "Network Ingress Filtering:
Defeating Denial of Service Attacks which employ IP Source
Address Spoofing", BCP 38, RFC 2827, DOI 10.17487/RFC2827,
May 2000, <https://www.rfc-editor.org/info/rfc2827>.
[RFC5326] Ramadas, M., Burleigh, S., and S. Farrell, "Licklider
Transmission Protocol - Specification", RFC 5326,
DOI 10.17487/RFC5326, September 2008,
<https://www.rfc-editor.org/info/rfc5326>.
[RFC6455] Fette, I. and A. Melnikov, "The WebSocket Protocol",
RFC 6455, DOI 10.17487/RFC6455, December 2011,
<https://www.rfc-editor.org/info/rfc6455>.
[RFC8312] Rhee, I., Xu, L., Ha, S., Zimmermann, A., Eggert, L., and
R. Scheffenegger, "CUBIC for Fast Long-Distance Networks",
RFC 8312, DOI 10.17487/RFC8312, February 2018,
<https://www.rfc-editor.org/info/rfc8312>.
[RFC8324] Klensin, J., "DNS Privacy, Authorization, Special Uses,
Encoding, Characters, Matching, and Root Structure: Time
for Another Look?", RFC 8324, DOI 10.17487/RFC8324,
February 2018, <https://www.rfc-editor.org/info/rfc8324>.
[RFC8355] Filsfils, C., Ed., Previdi, S., Ed., Decraene, B., and R.
Shakir, "Resiliency Use Cases in Source Packet Routing in
Networking (SPRING) Networks", RFC 8355,
DOI 10.17487/RFC8355, March 2018,
<https://www.rfc-editor.org/info/rfc8355>.
[RFC8361] Hao, W., Li, Y., Durrani, M., Gupta, S., and A. Qu,
"Transparent Interconnection of Lots of Links (TRILL):
Centralized Replication for Active-Active Broadcast,
Unknown Unicast, and Multicast (BUM) Traffic", RFC 8361,
DOI 10.17487/RFC8361, April 2018,
<https://www.rfc-editor.org/info/rfc8361>.
[RFC8362] Lindem, A., Roy, A., Goethals, D., Reddy Vallem, V., and
F. Baker, "OSPFv3 Link State Advertisement (LSA)
Extensibility", RFC 8362, DOI 10.17487/RFC8362, April
2018, <https://www.rfc-editor.org/info/rfc8362>.
[RFC8377] Eastlake 3rd, D., Zhang, M., and A. Banerjee, "Transparent
Interconnection of Lots of Links (TRILL): Multi-Topology",
RFC 8377, DOI 10.17487/RFC8377, July 2018,
<https://www.rfc-editor.org/info/rfc8377>.
[RFC8378] Moreno, V. and D. Farinacci, "Signal-Free Locator/ID
Separation Protocol (LISP) Multicast", RFC 8378,
DOI 10.17487/RFC8378, May 2018,
<https://www.rfc-editor.org/info/rfc8378>.
[RFC8402] Filsfils, C., Ed., Previdi, S., Ed., Ginsberg, L.,
Decraene, B., Litkowski, S., and R. Shakir, "Segment
Routing Architecture", RFC 8402, DOI 10.17487/RFC8402,
July 2018, <https://www.rfc-editor.org/info/rfc8402>.
[RFC8410] Josefsson, S. and J. Schaad, "Algorithm Identifiers for
Ed25519, Ed448, X25519, and X448 for Use in the Internet
X.509 Public Key Infrastructure", RFC 8410,
DOI 10.17487/RFC8410, August 2018,
<https://www.rfc-editor.org/info/rfc8410>.
[RFC8411] Schaad, J. and R. Andrews, "IANA Registration for the
Cryptographic Algorithm Object Identifier Range",
RFC 8411, DOI 10.17487/RFC8411, August 2018,
<https://www.rfc-editor.org/info/rfc8411>.
[RFC8429] Kaduk, B. and M. Short, "Deprecate Triple-DES (3DES) and
RC4 in Kerberos", BCP 218, RFC 8429, DOI 10.17487/RFC8429,
October 2018, <https://www.rfc-editor.org/info/rfc8429>.
[RFC8441] McManus, P., "Bootstrapping WebSockets with HTTP/2",
RFC 8441, DOI 10.17487/RFC8441, September 2018,
<https://www.rfc-editor.org/info/rfc8441>.
[RFC8446] Rescorla, E., "The Transport Layer Security (TLS) Protocol
Version 1.3", RFC 8446, DOI 10.17487/RFC8446, August 2018,
<https://www.rfc-editor.org/info/rfc8446>.
[RFC8453] Ceccarelli, D., Ed. and Y. Lee, Ed., "Framework for
Abstraction and Control of TE Networks (ACTN)", RFC 8453,
DOI 10.17487/RFC8453, August 2018,
<https://www.rfc-editor.org/info/rfc8453>.
[RFC8455] Bhuvaneswaran, V., Basil, A., Tassinari, M., Manral, V.,
and S. Banks, "Terminology for Benchmarking Software-
Defined Networking (SDN) Controller Performance",
RFC 8455, DOI 10.17487/RFC8455, October 2018,
<https://www.rfc-editor.org/info/rfc8455>.
[RFC8456] Bhuvaneswaran, V., Basil, A., Tassinari, M., Manral, V.,
and S. Banks, "Benchmarking Methodology for Software-
Defined Networking (SDN) Controller Performance",
RFC 8456, DOI 10.17487/RFC8456, October 2018,
<https://www.rfc-editor.org/info/rfc8456>.
[RFC8466] Wen, B., Fioccola, G., Ed., Xie, C., and L. Jalil, "A YANG
Data Model for Layer 2 Virtual Private Network (L2VPN)
Service Delivery", RFC 8466, DOI 10.17487/RFC8466, October
2018, <https://www.rfc-editor.org/info/rfc8466>.
[RFC8468] Morton, A., Fabini, J., Elkins, N., Ackermann, M., and V.
Hegde, "IPv4, IPv6, and IPv4-IPv6 Coexistence: Updates for
the IP Performance Metrics (IPPM) Framework", RFC 8468,
DOI 10.17487/RFC8468, November 2018,
<https://www.rfc-editor.org/info/rfc8468>.
[RFC8471] Popov, A., Ed., Nystroem, M., Balfanz, D., and J. Hodges,
"The Token Binding Protocol Version 1.0", RFC 8471,
DOI 10.17487/RFC8471, October 2018,
<https://www.rfc-editor.org/info/rfc8471>.
[RFC8472] Popov, A., Ed., Nystroem, M., and D. Balfanz, "Transport
Layer Security (TLS) Extension for Token Binding Protocol
Negotiation", RFC 8472, DOI 10.17487/RFC8472, October
2018, <https://www.rfc-editor.org/info/rfc8472>.
[RFC8479] Mavrogiannopoulos, N., "Storing Validation Parameters in
PKCS#8", RFC 8479, DOI 10.17487/RFC8479, September 2018,
<https://www.rfc-editor.org/info/rfc8479>.
[RFC8483] Song, L., Ed., Liu, D., Vixie, P., Kato, A., and S. Kerr,
"Yeti DNS Testbed", RFC 8483, DOI 10.17487/RFC8483,
October 2018, <https://www.rfc-editor.org/info/rfc8483>.
[RFC8492] Harkins, D., Ed., "Secure Password Ciphersuites for
Transport Layer Security (TLS)", RFC 8492,
DOI 10.17487/RFC8492, February 2019,
<https://www.rfc-editor.org/info/rfc8492>.
[RFC8493] Kunze, J., Littman, J., Madden, E., Scancella, J., and C.
Adams, "The BagIt File Packaging Format (V1.0)", RFC 8493,
DOI 10.17487/RFC8493, October 2018,
<https://www.rfc-editor.org/info/rfc8493>.
[RFC8498] Mohali, M., "A P-Served-User Header Field Parameter for an
Originating Call Diversion (CDIV) Session Case in the
Session Initiation Protocol (SIP)", RFC 8498,
DOI 10.17487/RFC8498, February 2019,
<https://www.rfc-editor.org/info/rfc8498>.
[RFCYEAR] RFC Editor, "Number of RFC Published per YEAR",
<https://www.rfc-editor.org/rfcs-per-year/>.
[SSCH] Allen Institute for AI, "Semantic Scholar | AI-Powered
Research Tool", <https://www.semanticscholar.org/>.
[TI-LFA] Litkowski, S., Bashandy, A., Filsfils, C., Decraene, B.,
and D. Voyer, "Topology Independent Fast Reroute using
Segment Routing", Work in Progress, Internet-Draft, draft-
ietf-rtgwg-segment-routing-ti-lfa-05, 15 November 2020,
<https://tools.ietf.org/html/draft-ietf-rtgwg-segment-
routing-ti-lfa-05>.
[TLS13IMP] TLS WG, "TLS 1.3 Implementations", commit dcb7890, 14
October 2019, <https://github.com/tlswg/tlswg-
wiki/blob/master/IMPLEMENTATIONS.md>.
[TRKR] IETF, "IETF Datatracker", <https://datatracker.ietf.org/>.
Acknowledgements
Many thanks to the authors of the selected RFCs who were willing to
provide feedback on the process: Michael Ackermann, Zafar Ali, Sarah
Banks, Bruno Decraene, Lars Eggert, Nalini Elkins, Joachim Fabini,
Dino Farinacci, Clarence Filsfils, Sujay Gupta, Dan Harkins, Vinayak
Hegde, Benjamin Kaduk, John Klensin, Acee Lindem, Nikos
Mavrogiannopoulos, Patrick McManus, Victor Moreno, Al Morton, Andrei
Popov, Eric Rescorla, Michiko Short, Bhuvaneswaran Vengainathan, Lao
Weiguo, and Li Yizhou. Many thanks to Adrian Farrel for his useful
advice, to Stephen Farrell and Colin Perkins for their guidance on
the use of citations, and to Dave Crocker for a comprehensive review.
Thanks also to Alice Russo and the RFC Editor team for their work
improving this document and checking the accuracy of the data.
Author's Address
Christian Huitema
Private Octopus Inc.
427 Golfcourse Rd
Friday Harbor, WA 98250
United States of America
Email: huitema@huitema.net
|