RFC 8963 | RFC Evaluation 2018 | January 2021 |
Huitema | Informational | [Page] |
This document presents the author's effort to understand the delays involvedin publishing an idea in the IETF or through the Independent Stream, from thefirst individual draft to the publication of the RFC.We analyze a set of randomly chosen RFCs approved in 2018, looking for historyand delays. We also use two randomly chosen sets of RFCs published in 2008 and 1998for comparing delays seen in 2018 to those observed 10 or 20 years ago. The average RFC in the 2018 sample was produced in 3 years and 4 months,of which 2 years and 10 months were spent in the working group,3 to 4 months for IETF consensus and IESG review, and 3 to 4 months in RFCproduction. The main variation in RFC production delays comes fromthe AUTH48 phase.¶
We also measure the number of citations of the chosen RFC using SemanticScholar, and compare citation counts with what we know about deployment.We show that citation counts indicate academic interest, butcorrelate only loosely with deployment or usage of the specifications.Counting web references could complement that.¶
This document is not an Internet Standards Track specification; it is published for informational purposes.¶
This is a contribution to the RFC Series, independently of any other RFC stream. The RFC Editor has chosen to publish this document at its discretion and makes no statement about its value for implementation or deployment. Documents approved for publication by the RFC Editor are not candidates for any level of Internet Standard; see Section 2 of RFC 7841.¶
Information about the current status of this document, any errata, and how to provide feedback on it may be obtained athttps://www.rfc-editor.org/info/rfc8963.¶
Copyright (c) 2021 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document.¶
As stated on the organization's web site, "The IETF is a large open internationalcommunity of network designers, operators, vendors, and researchers concerned withthe evolution of the Internet architecture and the smooth operation of the Internet." The specifications produced by the IETF are published in the RFC series, along with documents from the IAB, IRTF, and Independent streams (as per RFC 8729). In this memo, the author attempts to understand the delays involvedin publishing an idea in the IETF or through the Independent Stream, from the firstindividual draft to the publication of the RFC. This isan individual effort, and the author's conclusions presented here are personal.There was no attempt to seek IETF consensus.¶
The IETF keeps records of documents and process actionsin the IETF Datatracker[TRKR]. The IETF Datatracker provides information about RFCs and drafts, from which we caninfer statistics about the production system. We can measure howlong it takes to drive a proposition from initial draft to final publication,and how these delays can be split between working group discussions, IETF reviews,IESG assessment, RFC Editor delays and final reviews by the authors -- or, forIndependent Stream RFCs, draft production, reviews by the Independent Submissions Editor,conflict reviews, RFC Editor delays and final reviews. Tracker data is available for all RFCs, not just IETF Stream RFCs.¶
Just measuring production delays may be misleading. If the IETF or the other streams simply rubber-stampeddraft proposals and published them, the delays would be short but the quality andimpact might suffer. We hope that most of the RFCs that are published are useful,but we need a way to measure that usefulness. We try to do that by measuring thenumber of references of the published RFCs in Semantic Scholar[SSCH], andalso by asking the authors of each RFC in the samplewhether the protocols and technologies defined in the RFCs were implemented and used onthe Internet. The citations measured by the Semantic Scholar include citations inother RFCs and in Internet-Drafts. We also measure the number ofreferences on the web, which provides some results but would be hard to automate.¶
In order to limit the resources required for this study, we selected at random 20RFCs published in 2018, as explained inSection 2.2. The statisticalsampling picked both IETF Stream and Independent Stream documents.For comparison purposes,we also selected at random 20 RFCs published in 1998 and 20 published in 2008.Limiting the sample to 20 out of 209 RFCs published in 2018 allows for in-depthanalysis of each RFC, but readers should be reminded that the this is a small sample.The sample is too small to apply general statistical techniques andquantify specific ratios, and discussions of correlation techniques would be inappropriate.Instead, the purpose is to identify trends, spot issues, and document futurework.¶
The information gathered for every RFC in the sample is presented inSection 3. InSection 4, we analyze the production processand the sources of delays, comparing the 2018 sample to the selected samples for 1998and 2018. InSection 5.1, we present citation counts for the RFCs in the samples,and analyze whether citation counts could be used to evaluate the quality of RFCs.¶
The measurement of delays could be automated by processing dates andevents recorded in the Datatracker. The measurement of publishedRFCs could be complemented by statistics on abandoned drafts, whichwould measure the efficiency of the IETF triaging process. More instrumentation wouldhelp understanding how large delays happen during working group processes.These potential next steps are developed inSection 6.¶
The study reported here started with a simple idea: take a sample of RFCs, andperform an in-depth analysis of the path from the first presentation of the ideato its publication, while also trying to access the success of the resultingspecification. This requires defining the key milestones that we want to track,and drawing a random sample using an unbiased process.¶
The IETF Datatracker records a list of events for each document processed by IETFworking groups. This has a high granularity, and also a high variability. Most documentsstart life as an individual draft, are adopted by a working group, undergo aWorking Group Last Call, are submitted to the IESG, undergo an IETF Last Calland an IESG review, get eventually approved by the IESG, and are processedfor publication by the RFC Editor, but there are exceptions. Some documentsare first submitted to one working group and then moved to another. Some documentsare published through the Independent Stream, and are submitted to theIndependent Submissions Editor instead of the IESG.¶
In order to simplify tabulation, we break the period from the submission of the firstdraft to the publication of the RFC into three big components:¶
For submissions to the Independent Stream, we don't have a working group.We consider instead the progression of the individual draft until theadoption by the Independent Submissions Editor (ISE) as the equivalent of the "Working Group" period, and the delay from adoption by the ISE until submission to the RFC Editoras the equivalent of the IETF processing time.¶
We measure the starting point of the process using the date of submissionof the first draft listed on that RFC page in the IETF Datatracker. In mostcases, this first draft is an individual draft that then resubmitted as aworking group draft, or maybe resubmitted with a new name as the draft wassearching for a home in an IETF working group, or before deciding forsubmission on the Independent Stream.¶
The IETF Datatracker entries for RFCs and drafts do notalways list working group events like Working Group Last Call. The only intermediate event that we listbetween the first draft and the submission to the IESG is the working groupadoption, for which we use the date of submission of version 00 of thedraft eventually published as RFC. We also use that date (of submission of version 00) for draftssubmitted to the Independent Stream.¶
Basic production mechanisms could be evaluated by processing data fromthe IETF Datatracker, but subjective data requires manual assessment of results,which can be time-consuming. Since our resources are limited, we will onlyperform this analysis for a small sample of RFCs, selected at randomfrom the list of RFCs approved in 2018. Specifically, we will pick20 RFC numbers at random between:¶
The list of 20 selected RFCs is: RFC 8411, RFC 8456, RFC 8446, RFC 8355, RFC 8441, RFC 8324, RFC 8377, RFC 8498, RFC 8479, RFC 8453, RFC 8429, RFC 8312, RFC 8492 , RFC 8378, RFC 8361, RFC 8472, RFC 8471, RFC 8466, RFC 8362, and RFC 8468.¶
When evaluating delays and impact, we will compare the year 2018 to 2008 and1998, 10 and 20 years ago. To drive this comparison, we pick 20 RFCs at randomamong those published in 2008, and another 20 among those published in 1998.¶
The list of the 20 randomly selected RFCs from 2008 is: RFC 5227, RFC 5174, RFC 5172, RFC 5354,RFC 5195, RFC 5236, RFC 5348, RFC 5281, RFC 5186, RFC 5326, RFC 5277, RFC 5373, RFC 5404,RFC 5329, RFC 5283, RFC 5358, RFC 5142, RFC 5271, RFC 5349, and RFC 5301.¶
The list of the 20 randomly selected RFCs from 1998 is: RFC 2431, RFC 2381, RFC 2387, RFC 2348,RFC 2391, RFC 2267, RFC 2312, RFC 2448, RFC 2374, RFC 2398, RFC 2283, RFC 2382, RFC 2289,RFC 2282, RFC 2404, RFC 2449, RFC 2317, RFC 2394, RFC 2297, and RFC 2323.¶
The following abbreviations are used in the tables:¶
In addition, Status is as defined in RFC 2026, and Stream is as defined in RFC 8729.¶
We review each of the RFCs listed inSection 2.2 for the year 2018, trying both to answer the known questions and to gather insight for further analyses.In many cases, the analysis of the data is complemented by direct feedbackfrom the RFC authors.¶
"IANA Registration for the Cryptographic Algorithm Object Identifier Range"[RFC8411]:¶
This RFC was published from the individual draft, which was not resubmittedas a working group draft.¶
The draft underwent minor copy editing before publication.¶
Some but not all of the long delay in AUTH48 is due to clustering with[RFC8410].MISSREF state concluded on 2018-05-09 and the document re-entered AUTH48 atonce. AUTH48 lasted over two months after that. (For state definitions, see<https://www.rfc-editor.org/about/queue/#state_def>.)¶
The time after AUTH48 and before publication (3 weeks) partlyoverlaps with travel for IETF 102 and is partly due to coordinating thecluster.¶
"Benchmarking Methodology for Software-Defined Networking (SDN) Controller Performance"[RFC8456]:¶
The draft underwent extensive copy editing, covering use of articles, syntax, and word choice. The changes are enough to cause pagination differences. The "diff" tool marks prettymuch every page as changed. Some diagrams see change in protocol elements like message names.¶
According to the author, the experience of producing this document mirrors a typical one in theBenchmarking Methodologies Working Group (BMWG). There were multiple authors in multiple timezones, which slowed down the AUTH48 process somewhat, although the AUTH48 delay of 46 days is onlya bit longer than the average draft.¶
The RFC was part of cluster with[RFC8455].¶
BMWG publishes Informational RFCs centered around benchmarking,and the methodologies in RFC 8456 have been implemented in benchmarking products.¶
"The Transport Layer Security (TLS) Protocol Version 1.3"[RFC8446], as the titleindicates, defines the new version of the TLS protocol. From the IETF Datatracker, we extractthe following:¶
This draft started as a WG effort.¶
The RFC was a major effort in the IETF. Working group participants developed and testedseveral implementations. Researchers analyzed the specifications and performed formal verifications. Deployment tests outlined issues that caused extra workwhen the specification was almost ready. This complexity largely explains thetime spent in the working group.¶
Comparing the final draft to the published version, we find relatively light copyediting. It includes explaining acronyms on first use, clarifying some definitions standardizing punctuation and capitalization, and spelling out some numbers in text.This generally fall in the category of "style", although some of the clarificationsgo into message definitions. However, that simple analysis does not explain whythe AUTH48 phase took almost two months.¶
This document's AUTH48 process was part of the "GitHub experiment", which tried touse GitHub pull requests to track the AUTH48 changes and review comments. TheRFC Production Center (RPC) staff had to learn using GitHub for that process, and this required more workthan the usual RFC. The author and AD thoroughly reviewed each proposed edit, accepting some and rejecting some. The concern there was thatany change in a complex specification might affect a protocol that was extensivelyreviewed in the working group, but of course these reviews added time to theAUTH48 delays.¶
There are 21 implementations listedin the Wiki of the TLS 1.3 project[TLS13IMP]. It has been deployed on major browsers, andis already used in a large fraction of TLS connections.¶
"Resiliency Use Cases in Source Packet Routing in Networking (SPRING) Networks"[RFC8355] is an Informational RFC.It originated from an informational use-case draft; it was mostly used for the BOF creating the WG, and then todrive initial work and evolutions from the WG.¶
Minor set of copy edits, mostly for style.¶
No implementation of the RFC itself, but the technology behind it (such asSegment Routing Architecture[RFC8402] and TI-LFA[TI-LFA]) is widely implementedand deployment is ongoing.¶
According to participants in the discussion, the process of adoption of the source packet routingstandards was very contentious. The establishment of consensus at both the working group leveland the IETF level was difficult and time-consuming.¶
"Bootstrapping WebSockets with HTTP/2"[RFC8441]¶
This RFC defines the support of WebSockets in HTTP/2, which is differentfrom the mechanism defined for HTTP/1.1 in[RFC6455]. The process wasrelatively straightforward, involving the usual type of discussions, someon details and some on important points.¶
Comparing the final draft and published RFC shows a minor set of copy edits,mostly for style. However, the author recalls a painful process. The RFCincludes many charts and graphs that were very difficult to formatcorrectly in the author's production process that involved conversionsfrom markdown to XML, and then from XML to text. The author had toget substantial help from the RFC Editor.¶
There are several implementations, including Firefox and Chrome,making RFC 8441 a very successful specification.¶
"DNS Privacy, Authorization, Special Uses, Encoding, Characters, Matching, and Root Structure:Time for Another Look?"[RFC8324]. This is an opinion piece on DNS development,published on the Independent Stream.¶
This RFC took only 9 months from first draft to publication, which is the shortest inthe 2018 sample set. In part, this is because the text was privately circulatedand reviewed by the ISE's selected experts before the first draft was published.The nature of the document isanother reason for the short delay. It is an opinion piece and does not requirethe same type of consensus building and reviews as a protocol specification.¶
Comparing the final draft and the published version shows only minor copy edits, mostlyfor style. According to the author, this is because he knows how to write in RFCstyle with the result that his documents often need a minimum of editing. He alsomakes sure that the document on which theRFC Production Center starts working already has changes discussedand approved during Last Call and IESG review incorporated,rather than expecting the Production Center to operate off ofnotes about changes to be made.¶
"Transparent Interconnection of Lots of Links (TRILL): Multi-Topology"[RFC8377]¶
Minor set of copy edits, mostly for style, also clarity.¶
"A P-Served-User Header Field Parameter for an Originating Call Diversion (CDIV)Session Case in the Session Initiation Protocol (SIP)"[RFC8498].¶
Copy edits for style, but also clarification of ambiguous sentences.¶
"Storing Validation Parameters in PKCS#8"[RFC8479]¶
The goal of the draft was to document what thegnutls implementation was using for storing provably generated RSA keys.This is a short RFC that was published relatively quickly, althoughdiscussion between the author, the Independent Submissions Editor, and theIESG lasted several months. In the initial conflict review, the IESG askedthe ISE to not publish this document before IETF working groups hadan opportunity to pick up the work. The author met that requirement bya presentation to the SECDISPATCH WG during IETF 102. Since no WG wasinterested in picking up the work, the document progressed on theIndependent Stream.¶
Very minor set of copy edits, moving some references from normative to informative.¶
The author is not aware of other implementations than gnutls relying on this RFC.¶
"Framework for Abstraction and Control of TE Networks (ACTN)"[RFC8453]¶
Minor copy editing.¶
"Deprecate Triple-DES (3DES) and RC4 in Kerberos"[RFC8429]¶
This draft started as a working group effort.¶
This RFC recommends deprecating two encryption algorithms that are now consideredobsolete and possibly broken. The document was sent back to the WG after the first Last Call,edited, and then there was a second Last Call. The delay from first draft to Working GroupLast Call was relatively short, but the number may be misleading. The initial draft was areplacement of a similar draft in the KITTEN Working Group, which stagnated for some timebefore the CURDLE Working Group took up the work. The deprecation of RC4 was somewhat contentious, but the WG had already debated thisprior to the production of this draft, and the draft was not delayed by this debate.¶
Most of the 280 days between IETF LC and IESG approval werebecause the IESG had to talk about whether this document should obsolete RFC 4757 ormove it to Historic status, and no one was really actively pushing thatdiscussion for a while.¶
The 99 days in AUTH48 are mostly because one of the authors was a sitting AD, and thoseduties ended up taking precedence over reviewing this document.¶
Minor copy editing, for style.¶
The implementation of the draft would be the actual removal of support for 3DES and RC4in major implementations. This is happening, but very slowly.¶
"CUBIC for Fast Long-Distance Networks"[RFC8312]¶
Minor copy editing, for style.¶
The TCP congestion control algorithm Cubic was first defined in 2005, was implementedin Linux soon after, and was implemented in major OSes after that. After some debatesfrom 2015 to 2015, the TCPM Working Group adopted the draft, with a goal ofdocumenting Cubic in the RFC Series. According to the authors, this was nota high-priority effort, as Cubic was already implemented in multiple OSesand documented in research papers. At some point, only one of the authorswas actively working on the draft. This may explain why another two years was spentprogressing the draft after adoption by the WG.¶
The RFC publication may or may not have triggered further implementations. Onthe other hand, several OSes picked up bug fixes from the draft and the RFC.¶
"Secure Password Ciphersuites for Transport Layer Security (TLS)"[RFC8492]¶
This RFC has a complex history. The first individual draft was submitted to theTLS Working Group on September 7, 2012. It progressed there, and was adoptedby the WG after 3 revisions. There were then 8 revisions in the TLS WG,until the WG decided to not progress it. The draft was parked in 2013 bythe WG chairs after failing to get consensus in WG Last Call. The AD finallypulled the plug in 2016, and the draft was then resubmitted to the ISE.¶
At that point, the author was busy and was treating this RFC with a low priority because, in his words, it would not be a "real RFC".There were problems with the draft that only came up late. In particular,it had to wait for a change in registry policy that only came about withthe publication of TLS 1.3, which caused the draft to be publishedafter RFC 8446, and also required adding references to TLS 1.3.The author also got a very late comment while in AUTH48 that caused some rewriting. Finally, there was some IANA issue with the extensionregistry where a similar extension was added by someone else. The draftwas changed to just use it.¶
Changes in AUTH48 include adding a reference to TLS 1.3, copy editing for style,some added requirements, added paragraphs, and changes in algorithms specification.¶
"Signal-Free Locator/ID Separation Protocol (LISP) Multicast"[RFC8378] isan Experimental RFC, defining how to implement Multicast in the LISParchitecture.¶
Preparing the RFC took more than 4 years. According to the authors, they werenot aggressively pushing it and just let the working group process decide to paceit. They also did implementations during that time.¶
Minor copy editing, for style.¶
The RFC was implemented by lispers.net and Cisco,and it was used in doing IPv6 multicast over IPv4 unicast/multicast at the Olympicsin PyeungChang. The plan is to work on a Proposed Standard once theexperiment concludes.¶
"Transparent Interconnection of Lots of Links (TRILL):Centralized Replication for Active-Active Broadcast,Unknown Unicast, and Multicast (BUM) Traffic"[RFC8361]¶
According to the authors, the long delays in producing this RFC weredue to a slow uptake of the technology in the industry.¶
Minor copy editing, for style.¶
There was at least one partial implementation.¶
"Transport Layer Security (TLS) Extension for Token Binding Protocol Negotiation"[RFC8472]¶
This is a pretty simple document, but it took over 3 years from individual draft to RFC. According tothe authors,the biggest setbacks occurred at the start: it took a while to find a home for this draft.It was presented in the TLS WG (because it's a TLS extension) and UTA WG (because it has to do withapplications using TLS). Then the ADs determined that a new WG was needed, so the authors had to workthrough the WG creation process, including running a BOF.¶
Minor copy editing, for style, with the addition of a reference to TLS 1.3.¶
Perhaps partially due to the delays, some of the implementers lost interest in supporting this RFC.¶
"The Token Binding Protocol Version 1.0"[RFC8471]¶
This document presents a Token Binding Protocol for TLS. We can notice a period of 5 months before adoption of the draft by the WG. That explains in part the overall time of almost 4 years from first draft to publication.¶
Minor copy editing, for style.¶
The web references indicate adoption in multiple development projects.¶
"A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery"[RFC8466]¶
Copy editing for style and clarity, with also corrections to the YANG model.¶
"OSPFv3 Link State Advertisement (LSA) Extensibility"[RFC8362] is a major extension to theOSPF protocol. It makes OSPFv3 fully extensible.¶
The specification was first submitted as an individual draft in the IPv6 WG, then moved to the OSPF WG.The long delay of producing this RFC is due to the complexity of the problem,and the need to wait for implementations. It is a very important change to OSPFthat makes OSPFv3 fully extensible. Since it was a non-backward compatible change,the developers started out with some very complex migration scenarios but ended upwith either legacy or extended OSPFv3 LSAs within an OSPFv3 routing domain. The initial attemptsto have a hybrid mode of operation with both legacy and extended LSAs also delayed implementationdue to the complexity.¶
Copy editing for style and clarity.¶
This specification either was or will be implemented by all the router vendors.¶
"IPv4, IPv6, and IPv4-IPv6 Coexistence: Updates for the IPPerformance Metrics (IPPM) Framework"[RFC8468].¶
RFC 8468 was somehow special in thatthere was not a technical reason or interest that triggered it, butrather a formal requirement.While writing RFC 7312, the IP PerformanceMetrics (IPPM) Working Group realized that RFC 2330, the IP PerformanceMetrics Framework supported IPv4 onlyand explicitly excluded support for IPv6. Nevertheless, people usedthe metrics that were defined on top of RFC 2330 (and, therefore, IPv4only) for IPv6, too. Although the IPPM WG agreed that the work was needed, theinterest of IPPM attendees in progressing (and reading/reviewing) theIPv6 draft was limited. Resolving the IPv6 technical part wasstraightforward, but subsequently some people asked for a broader scope(topics like header compression, 6LoWPAN, etc.), and it took some time tofigure out and later on convince people that these topics are out of scope.The group also had to resolve contentious topics, for example, how tomeasure the processing of IPv6 extension headers, which is sometimes nonstandard.¶
The time in AUTH48 state for this document was longer than average. According to the authors,the main reasons include:¶
The differences between the final draft and the published RFC show copy editing for styleand clarity, but do not account for the back and forth between authors and editorsmentioned by the authors.¶
We examine the 20 RFCs in the sample, measuring various characteristics suchas delay and citation counts, in an attempt to identify patterns in theIETF processes.¶
We look at the distribution of delays between the submission of the firstdraft and the publication of the RFC, using the three milestones definedinSection 2.1: processing time in the working group, IETF processing time,and RFC production time. The following tableshows the number of days in each phase for the 20 RFCs in the sample:¶
RFC | Status | Pages | Overall | WG | IETF | Edit |
---|---|---|---|---|---|---|
8411 | Info | 5 | 455 | 154 | 140 | 161 |
8456 | Info | 64 | 1317 | 1033 | 126 | 158 |
8446 | PS | 160 | 1576 | 1400 | 34 | 142 |
8355 | Info | 13 | 1517 | 1175 | 243 | 99 |
8441 | PS | 8 | 327 | 204 | 31 | 92 |
8324 | Info (ISE) | 29 | 270 | 38 | 161 | 71 |
8377 | PS | 8 | 1792 | 1630 | 21 | 141 |
8498 | Info | 15 | 1059 | 935 | 59 | 65 |
8479 | Info (ISE) | 8 | 414 | 233 | 144 | 37 |
8453 | Info | 42 | 1165 | 1036 | 46 | 83 |
8429 | BCP | 10 | 548 | 76 | 313 | 159 |
8312 | Info | 18 | 1214 | 1113 | 16 | 85 |
8492 | Info (ISE) | 40 | 2358 | 1706 | 172 | 480 |
8378 | Exp | 21 | 1524 | 1446 | 27 | 51 |
8361 | PS | 17 | 1612 | 1477 | 62 | 73 |
8472 | PS | 8 | 1228 | 899 | 249 | 80 |
8471 | PS | 18 | 1228 | 899 | 249 | 80 |
8466 | PS | 158 | 771 | 538 | 124 | 109 |
8362 | PS | 33 | 1871 | 1766 | 41 | 64 |
8468 | Info | 15 | 1196 | 979 | 90 | 127 |
average | 35 | 1172 | 948 | 117 | 118 | |
average (not ISE) | 36 | 1200 | 999 | 110 | 104 |
The average delay from first draft to publication is about 3 years and 3 months, but thisvaries widely. Excluding the RFCs from the Independent Stream, the averagedelay from start to finish is 3 years and 4 months, of which on average2 years and 9 months are spent getting consensus in the working group,and 3 to 4 months each for IETF consensus and for RFC production.¶
The longest delay is found for[RFC8492], 6.5 years from start to finish.This is however a very special case -- a draft that was prepared forthe TLS Working Group and failed to reach consensus. After that, it wasresubmitted to the ISE, and incurred atypical production delays.¶
On average, we see that 80% of the delay is incurred in WG processing,10% in IETF review, and 10% for edition and publication.¶
For IETF Stream RFCs, it appears that the delays for Informational documentsare slightly shorter than those for protocol specifications, maybe six monthsshorter on average. However, there are lots of differences betweenindividual documents. The delays range from less than a year to more than 5 years forprotocol specifications, and from a year and 3 months to a bit more than 4 years forInformational documents.¶
We can compare the delays in the 2018 samples to those observed 10 years ago and 20 yearsbefore:¶
RFC (2008) | Status | Pages | Delay |
---|---|---|---|
5326 | Exp | 54 | 1584 |
5348 | PS | 58 | 823 |
5281 | Info | 51 | 1308 |
5354 | Exp | 23 | 2315 |
5227 | PS | 21 | 2434 |
5329 | PS | 12 | 1980 |
5277 | PS | 35 | 912 |
5236 | Info (ISE) | 26 | 1947 |
5358 | BCP | 7 | 884 |
5271 | Info | 22 | 1066 |
5195 | PS | 10 | 974 |
5283 | PS | 12 | 1096 |
5186 | Info | 6 | 2253 |
5142 | PS | 13 | 1005 |
5373 | PS | 24 | 1249 |
5404 | PS | 27 | 214 |
5172 | PS | 7 | 305 |
5349 | Info | 10 | 1096 |
5301 | PS | 6 | 396 |
5174 | Info | 8 | 427 |
RFC (1998) | Status | Pages | Delay |
---|---|---|---|
2289 | PS | 25 | 396 |
2267 | Info | 10 | unknown |
2317 | BCP | 10 | 485 |
2404 | PS | 7 | 488 |
2374 | PS | 12 | 289 |
2449 | PS | 19 | 273 |
2283 | PS | 9 | 153 |
2394 | Info | 6 | 365 |
2348 | DS | 5 | 699 |
2382 | Info | 30 | 396 |
2297 | Info (ISE) | 109 | 28 |
2381 | PS | 43 | 699 |
2312 | Info | 20 | 365 |
2387 | PS | 10 | 122 |
2398 | Info | 15 | 396 |
2391 | PS | 10 | 122 |
2431 | PS | 10 | 457 |
2282 | Info | 14 | 215 |
2323 | Info (ISE) | 5 | unknown |
2448 | Info (ISE) | 7 | 92 |
We can compare the median delay, and the delays observed by the fastest andslowest quartiles in the three years:¶
Year | Fastest 25% | Median | Slowest 25% |
---|---|---|---|
2018 | 715 | 1221 | 1537 |
2008 | 869 | 1081 | 1675 |
1998 | 169 | 365 | 442 |
The IETF takes three to four times more to produce an RFC in 2018than it did in 1998, but about the same time as it did in 2008.We can get a rough estimate of how this translates in terms of"level of attention" per RFC by comparing the number of participantsin the IETF meetings of 2018, 2008, and 1998[IETFCOUNT] to the number of RFCspublished these years[RFCYEAR].¶
Year | Number of RFCs | Spring P. | Summer P. | Fall P. | Average P. | Attendees/RFC |
---|---|---|---|---|---|---|
2018 | 208 | 1235 | 1078 | 879 | 1064 | 5.1 |
2008 | 290 | 1128 | 1181 | 962 | 1090 | 3.8 |
1998 | 234 | 1775 | 2106 | 1705 | 1862 | 8.0 |
The last column in the table provides the ratio of average numberof participants to the number of RFCs published. If the IETF were a centralizedorganization, and if all participants and documents were equivalent, thisratio would be the number of participants dedicated to produce an RFCon a given year. This is of course a completely abstract figure becausenone of the hypotheses above are true, but it still gives a vagueindication of the "level of attention" applied to documents. We seethat this ratio has increased from 2008 to 2018, as the number ofparticipants was about the same for these two years but the number ofpublished RFCs decreased. However, this ratio was much higher in 1998.The IETF had many more participants, and there were probablymany more eyes available to review any given draft. If we applied theratios of 1998, the IETF would be producing 119 documents in 2018instead of 208.¶
The largest part of the delays is spent in the working groups, beforethe draft is submitted to the IESG for IETF review. As mentioned inSection 2.1, the only intermediate milestone that we can extractfrom the IETF Datatracker is the date at which the document wasadopted by the working group, or targeted for independent submission.The breakdown of the delays for the documents in our sample is:¶
RFC | Status | WG | Until adoption | After adoption |
---|---|---|---|---|
8411 | Info | 154 | 0 | 154 |
8456 | Info | 1033 | 209 | 824 |
8446 | PS | 1400 | 0 | 1400 |
8355 | Info | 1175 | 102 | 1073 |
8441 | PS | 204 | 65 | 139 |
8324 | Info (ISE) | 38 | 0 | 38 |
8377 | PS | 1630 | 728 | 902 |
8498 | Info | 935 | 420 | 515 |
8479 | Info (ISE) | 233 | 0 | 233 |
8453 | Info | 1036 | 396 | 640 |
8429 | BCP | 76 | 0 | 76 |
8312 | Info | 1113 | 280 | 833 |
8492 | Info (ISE) | 1706 | 1428 | 278 |
8378 | Exp | 1446 | 661 | 785 |
8361 | PS | 1477 | 399 | 1078 |
8472 | PS | 899 | 105 | 794 |
8471 | PS | 1127 | 153 | 794 |
8466 | PS | 538 | 178 | 360 |
8362 | PS | 1766 | 240 | 1526 |
8468 | Info | 979 | 333 | 646 |
Average | 948 | 285 | 663 |
The time before working group adoption averages to a bit more than 9 months,compared to 1 year and almost 10 months for processing time after adoption.We see that RFC 8492 stands out, with long delays spent attempting publication througha working group before submission to the Independent Submissions Editor. If we remove RFC8492 from the list, the average time until adoption drops to just over 7 months,and becomes just 25% of the total processing time in the WG.¶
There are a fewdocuments that started immediately as working group efforts, or were immediately targetedfor publication in the Independent Stream. Those documents tend to see short processing times,with the exception of RFC 8446 on which the TLS Working Group spent a long time working.¶
The preparation and publication delays include three components:¶
The breakdown of the publication delays for each RFC is shown in thefollowing table.¶
RFC | Status | Pages | RFC edit | AUTH48 | RFC Pub | Edit (total) |
---|---|---|---|---|---|---|
8411 | Info | 5 | 53 | 88 | 20 | 161 |
8456 | Info | 64 | 98 | 46 | 14 | 158 |
8446 | PS | 160 | 85 | 57 | 0 | 142 |
8355 | Info | 13 | 83 | 15 | 1 | 99 |
8441 | PS | 8 | 56 | 33 | 3 | 92 |
8324 | Info (ISE) | 29 | 42 | 28 | 1 | 71 |
8377 | PS | 8 | 39 | 102 | 0 | 141 |
8498 | Info | 15 | 48 | 16 | 1 | 65 |
8479 | Info (ISE) | 8 | 31 | 5 | 1 | 37 |
8453 | Info | 42 | 73 | 7 | 3 | 83 |
8429 | BCP | 10 | 60 | 99 | 0 | 159 |
8312 | Info | 18 | 55 | 28 | 2 | 85 |
8492 | Info (ISE) | 40 | 355 | 123 | 2 | 480 |
8378 | Exp | 21 | 42 | 9 | 0 | 51 |
8361 | PS | 17 | 39 | 31 | 3 | 73 |
8472 | PS | 8 | 59 | 8 | 13 | 80 |
8471 | PS | 18 | 59 | 8 | 13 | 80 |
8466 | PS | 158 | 84 | 22 | 3 | 109 |
8362 | PS | 33 | 49 | 11 | 4 | 64 |
8468 | Info | 15 | 65 | 53 | 9 | 127 |
Average | 74 | 39 | 5 | 118 | ||
Average (without 8492) | 59 | 35 | 5 | 99 |
On average, the total delay appears to be about four months, but theaverage is skewed by the extreme values encountered for[RFC8492]. If weexclude that RFC from the computations, the average delay drops to a just a bitmore than 3 months: about 2 months for the preparation, a bit more than onemonth for the AUTH48 phase, and 5 days for the publishing.¶
Of course, these delays vary from RFC to RFC. To try explain the causes of thedelay, we compute the correlation factor between the observed delays and severalplausible explanation factors:¶
We find the following values:¶
Correlation | RFC edit | AUTH48 | Edit(total) |
---|---|---|---|
Number of pages | 0.50 | -0.04 | 0.21 |
Copy-Edit | 0.42 | 0.24 | 0.45 |
IANA | -0.14 | -0.21 | 0.12 |
Number of authors | 0.39 | -0.07 | 0.18 |
Number of drafts | 0.18 | -0.33 | -0.19 |
WG delay | 0.03 | -0.16 | -0.15 |
We see some plausible explanations for the production delay. It will be somewhat longer forlonger documents or for documents that require a lot of copy editing (seeSection 4.4).Somewhat surprisingly, it also tends to increase with the number of authors. It doesnot appear significantly correlated with the presence or absence of IANA action.¶
The analysis of RFC 8324 inSection 3.6 explains its shortediting delays by the experience of the author. This makes sense: if a documentneeds less editing, the editing delays would be shorter. This is partiallyconfirmed by the relation between the amount of copy editing and thepublication delay.¶
We see fewer plausible explanations for the AUTH48 delays. These delaysvary much more than the preparationdelay, with a standard deviation of 20 days for AUTH48 versus 10 days forthe preparation delay. In theory, AUTH48 is just a finalverification: the authors receive the document prepared by the RFC production center,and just have to give their approval, or maybe request a last minutecorrection. The name indicates that this is expected to last just two days, butin average it lasts more than a month.¶
We often hypothesize that thenumber of authors influences the AUTH48 delay, or that authors who have spenta long time working on the document in the working group somehow get demotivatedand spend even longer to answer questions during AUTH48. This may happensometimes, but our statistics don't show that - if anything, the numericalresults point in the opposite direction.¶
After asking the authors of the RFCs in the sample why the AUTH48 phase tooka long time, we got three explanations:¶
As mentioned above, we were not able to verify these hypotheses by looking atthe data. The author's experience with this document suggests another potentialdelay for the Independent Stream RFC: processing delay by the IndependentSubmissions Editor, discussed inSection 4.5.¶
We can assess the amount of copy editing applied to each published RFC bycomparing the text of the draft approved for publication and the text of theRFC. We do expect differences in the "boilerplate" and in the IANA section,but we will also see differences due to copy editing. Assessing the amountof copy editing is subjective, and we do it using a scale of 1 to 4:¶
The following table shows that about half of the RFCs requiredediting for style, and the other half at least some editing for clarity.¶
RFC | Status | Copy Edit |
---|---|---|
8411 | Info | 2 |
8456 | Info | 4 |
8446 | PS | 3 |
8355 | Info | 2 |
8441 | PS | 2 |
8324 | Info (ISE) | 2 |
8377 | PS | 3 |
8498 | Info | 3 |
8479 | Info (ISE) | 1 |
8453 | Info | 2 |
8429 | BCP | 2 |
8312 | Info | 2 |
8492 | Info (ISE) | 3 |
8378 | Exp | 2 |
8361 | PS | 2 |
8472 | PS | 2 |
8471 | PS | 2 |
8466 | PS | 3 |
8362 | PS | 3 |
8468 | Info | 3 |
This method of assessment does not take into accountthe number of changes proposed by the editors and eventually rejectedby the authors, since these changes are not present in either thefinal draft or the published RFC. It might be possible to getan evaluation of these "phantom changes" from the RFC Production Center.¶
Out of 20 randomly selected RFCs, 3 were published through the Independent Stream.One is an independent opinion, another a description of a non-IETF protocolformat, and the third was[RFC8492], which is a special case. Apart fromthis special case, the publication delays were significantly shorter for the Independent Stream than for the IETF Stream.¶
The authors of these 3 RFCs are regular IETF contributors. Thisobservation motivated a secondary analysis of all the RFCspublished in the Independent Stream in 2018. There are 14 such RFCs:8507, 8494, 8493, 8492, 8483, 8479, 8433, 8409, 8374, 8369, 8367, 8351,8328, and 8324. (RFCs 8367 and 8369 werepublished on 1 April 2018.) The majority ofthe documents were published by regular IETF participants, buttwo of them were not. One describes "The BagIt File Packaging Format (V1.0)"[RFC8493], and the other the "Yeti DNS Testbed"[RFC8483]. Theydocument a data format and a system developed outside the IETF and illustratethe outreach function of the Independent Stream. In both cases, theauthors include one experienced IETF participant, who presumably helpedoutsiders navigate the publication process.¶
The present document experienced some publication delays due to the Independent Submissions Editor.The ISE is a bottleneck and is a volunteer resource. Although the ISE as a lone personoperating as a volunteer is still roughly adequate resource for thejob, the delivery will necessarily be best effort with delays causedby spikes in ISE load, work commitments, and other life events. Thesedelays may not be fundamentally critical to RFC delivery, but theyare capable of introducing a significant percentage delay into whatmight otherwise be a smooth process.¶
In this exploration, we want to examine whether citation counts provide ameaningful assessment of the popularity of RFCs. We obtain the citationcounts through the Semantic Scholar API, using queries of the form:<https://api.semanticscholar.org/v1/paper/10.17487/rfc8446?include_unknown_references=true>¶
In these queries, the RFC is uniquely identified by its DOI reference,which is composed of the RFC Series prefix 10.17487 and the RFC identifier.The queries return a series of properties, including a list of citationsfor the RFC. Based on that list of citations, we compute three numbers:¶
All the numbers were retrieved on October 6, 2019.¶
As measured on October 6, 2019, the citation counts for the RFC inour sample set were:¶
RFC (2018) | Status | Total | 2018-2019 |
---|---|---|---|
8411 | Info | 1 | 0 |
8456 | Info | 1 | 1 |
8446 | PS | 418 | 204 |
8355 | Info | 3 | 3 |
8441 | PS | 1 | 1 |
8324 | Info (ISE) | 0 | 0 |
8377 | PS | 0 | 0 |
8498 | Info | 0 | 0 |
8479 | Info (ISE) | 0 | 0 |
8453 | Info | 3 | 3 |
8429 | BCP | 0 | 0 |
8312 | Info | 25 | 16 |
8492 | Info (ISE) | 4 | 4 |
8378 | Exp | 1 | 1 |
8361 | PS | 0 | 0 |
8472 | PS | 1 | 1 |
8471 | PS | 1 | 1 |
8466 | PS | 0 | 0 |
8362 | PS | 1 | 1 |
8468 | Info | 1 | 1 |
The results indicate that[RFC8446] is by far the most cited of the 20RFC in our sample. This is not surprising, since TLS is a key Internet Protocol.The TLS 1.3 protocol was also the subject of extensive studies by researchers,and thus was mentioned in a number of published papers. Surprisingly, the Semantic Scholar mentions a number of citations that predatethe publication date. These are probably citations of the various draftversions of the protocol.¶
The next most cited RFC in the sample is[RFC8312] which describes theCubic congestion control algorithm for TCP. That protocol was also thetarget of a large number of academic publications. The other RFCs in thesample only have a small number of citations.¶
There is probably a small bias when measuring citations at a fixed date.An RFC published in January 2018 would have more time to accrue citations thanone published in December. That may be true to some extent, as the second mostcited RFC in the set was published in January. However, the effect has to belimited. The most cited RFC was published in August, and the second most citedwas published in 2019. (That RFC got an RFC number in 2018, but publicationwas slowed by long AUTH48 delays.)¶
In order to get a baseline, we can look at the number of references for theRFCs published in 2008 and 1998. However, we need to take time into account.Documents published a long time ago are expected to have accrued more references.We try to address this by looking at three counts for each document: theoverall number of references over the document's lifetime, the number ofreferences obtained in the year following publication, and the number ofreferences observed since 2018:¶
RFC (2008) | Status | Total | 2008-2009 | 2018-2019 |
---|---|---|---|---|
5326 | Exp | 138 | 14 | 15 |
5348 | PS | 14 | 3 | 0 |
5281 | Info | 69 | 15 | 7 |
5354 | Exp | 17 | 13 | 0 |
5227 | PS | 19 | 1 | 2 |
5329 | PS | 24 | 6 | 1 |
5277 | PS | 32 | 3 | 2 |
5236 | Info (ISE) | 25 | 5 | 4 |
5358 | BCP | 21 | 2 | 0 |
5271 | Info | 7 | 2 | 0 |
5195 | PS | 7 | 4 | 2 |
5283 | PS | 8 | 1 | 0 |
5186 | Info | 14 | 4 | 2 |
5142 | PS | 8 | 4 | 0 |
5373 | PS | 5 | 2 | 0 |
5404 | PS | 1 | 1 | 0 |
5172 | PS | 2 | 0 | 0 |
5349 | Info | 8 | 0 | 2 |
5301 | PS | 5 | 1 | 0 |
5174 | Info | 0 | 0 | 0 |
RFC (1998) | Status | Total | 1998-1999 | 2018-2019 |
---|---|---|---|---|
2289 | PS | 2 | 0 | 1 |
2267 | Info | 982 | 5 | 61 |
2317 | BCP | 9 | 1 | 2 |
2404 | PS | 137 | 6 | 1 |
2374 | PS | 42 | 4 | 0 |
2449 | PS | 7 | 2 | 0 |
2283 | PS | 17 | 3 | 2 |
2394 | Info | 13 | 2 | 1 |
2348 | DS | 5 | 0 | 0 |
2382 | Info | 17 | 12 | 0 |
2297 | Info (ISE) | 36 | 11 | 0 |
2381 | PS | 39 | 12 | 0 |
2312 | Info | 14 | 3 | 0 |
2387 | PS | 4 | 1 | 0 |
2398 | Info | 17 | 0 | 1 |
2391 | PS | 31 | 3 | 0 |
2431 | PS | 3 | 0 | 0 |
2282 | Info | 8 | 0 | 0 |
2323 | Info (ISE) | 1 | 0 | 0 |
2448 | Info (ISE) | 0 | 0 | 0 |
We can compare the median number of citations and the numbers of citationsfor the least and most popular quartiles in the three years:¶
References | Lower 25% | Median | Higher 25% |
---|---|---|---|
RFC (2018) | 0 | 1 | 3 |
RFC (2008) | 6.5 | 11 | 21.75 |
RFC (2008), until 2009 | 1 | 2.5 | 4.5 |
RFC (2008), 2018 and after | 0 | 0 | 2 |
RFC (1998) | 4.75 | 13.5 | 32.25 |
RFC (1998), until 1999 | 0 | 2 | 4.25 |
RFC (1998), 2018 and after | 0 | 0 | 1 |
The total numbers show new documents with fewer citations than the older ones.This can be explained to some degree by the passage of time. If werestrict the analysis to the number of citations accrued in the year ofpublishing and the year after that, we still see about the same distributionfor the three samples.¶
We also see that the number of references to RFCs fades over time. Only themost popular of the RFC produced in 1998 are still cited in 2019.¶
The following table showsside by side the number of citations as measured inSection 5.1 andthe estimation of deployment as indicated inSection 3.¶
RFC (2018) | Status | Citations | Deployment |
---|---|---|---|
8411 | Info | 1 | medium |
8456 | Info | 1 | medium |
8446 | PS | 418 | high |
8355 | Info | 3 | medium |
8441 | PS | 1 | high |
8324 | Info (ISE) | 0 | N/A |
8377 | PS | 0 | unknown |
8498 | Info | 0 | unknown |
8479 | Info (ISE) | 0 | one |
8453 | Info | 3 | unknown |
8429 | BCP | 0 | some |
8312 | Info | 25 | high |
8492 | Info (ISE) | 4 | one |
8378 | Exp | 1 | some |
8361 | PS | 0 | one |
8472 | PS | 1 | medium |
8471 | PS | 1 | medium |
8466 | PS | 0 | unknown |
8362 | PS | 1 | medium |
8468 | Info | 1 | some |
From looking at these results, it is fairly obvious that citation countscannot be used as proxies for the "value" of an RFC. In our sample, the twoRFCs that have high citation counts were both widely deployed, and can certainly be described as successful, but we also see many RFCs that saw significant deploymentwithout garnering a high level of citations.¶
Citation counts are driven by academic interest,but are only loosely correlated with actual deployment. We saw that[RFC8446]was widely cited in part because the standardization process involved manyresearchers, and that the high citation count of[RFC8312] islargely due to the academic interest in evaluating congestion control protocols.If we look at previous years, the most cited RFC in the 2008 sample is[RFC5326], anexperimental RFC defining security extensions to anexperimental delay tolerant transport protocol. This protocol does notcarry a significant proportion of Internet traffic, but has been the objectof a fair number of academic studies.¶
The citation process tends to privilege the first expression of a concept.We see that with the most cited RFC in the 1998 set is[RFC2267], an informationalRFC defining Network Ingress Filtering that was obsoleted in May2000 by[RFC2827]. It is still cited frequently in 2018 and2019, regardless of its formal status inthe RFC Series. We see the same effect at work with[RFC8441], whichgarners very few citations although it updates[RFC6455] that hasa large number of citations. The same goes for[RFC8468], which issparsely cited while the[RFC2330] is widely cited. Just counting citationswill not indicate whether developers still use an old specification orhave adopted the revised RFC.¶
Web references might be another indicator of the popularity of an RFC.In order to evaluate these references, we list here the number of resultsreturned by searches on Google and Bing, looking for the search term "RFCnnnn"(e.g., "RFC8411"), and copying the number of results returned by thesearch engines. The table below presents the results of these searches,performed on April 4, 2020.¶
RFC (2018) | Status | Citations | Bing | |
---|---|---|---|---|
8411 | Info | 1 | 301 | 94 |
8456 | Info | 1 | 266 | 8456 |
8446 | PS | 418 | 25900 | 47800 |
8355 | Info | 3 | 521 | 114 |
8441 | PS | 1 | 2430 | 59500 |
8324 | Info (ISE) | 0 | 393 | 138 |
8377 | PS | 0 | 264 | 10900 |
8498 | Info | 0 | 335 | 10100 |
8479 | Info (ISE) | 0 | 564 | 11000 |
8453 | Info | 3 | 817 | 11400 |
8429 | BCP | 0 | 391 | 41600 |
8312 | Info | 25 | 1620 | 2820 |
8492 | Info (ISE) | 4 | 323 | 9400 |
8378 | Exp | 1 | 418 | 11600 |
8361 | PS | 0 | 499 | 92 |
8472 | PS | 1 | 496 | 169 |
8471 | PS | 1 | 1510 | 11600 |
8466 | PS | 0 | 766 | 173 |
8362 | PS | 1 | 67 | 147 |
8468 | Info | 1 | 453 | 127 |
The result counts from Bing are sometimes surprising. Why would RFC 8441 gather59,500 web references? Looking at the results in detail, we find a mix of data.Some of them are logs of development projects implementing Web Sockets, whichis exactly what we are looking for, but others appear spurious. For example,a shop selling rugby jerseys is listed because its phone number ends with "8441".Other pages were listed because street numbers or product numbers matched theRFC number.The same type of collision may explain the large reference counts on Bing forRFCs 8377, 8498, 8479, 8453, 8429, 8378, and 8471. The result counts on Bingdo not appear to provide a good metric.¶
On Google, all RFCs garner at least a 250 references, largely because the wholeRFC catalog is replicated on a large number of web servers. Deviations from thatbaseline are largely correlated with the number of citations in the SemanticScholar, with a couple of exception: RFC 8441 and RFC 8471 garner morereferences than the low citation counts would predict. Looking at theresults, we find many references in development databases explaininghow these protocols are implemented in various code bases and open sourceprojects. This means that counting Google results would give some indicationabout an RFC's popularity, complementing the citation counts.¶
There are some practical problems in using the counts of Googleresults. Google searches are personalized, the results dependon the source of the queries, and the counts may vary as well. Thesearch results depend on the search algorithm, and there is no guaranteethat counts will not change when the algorithm changes. On the otherhand, the results do indicate that some of the RFCs in our sampleare being used by developers or in deployments.¶
The author's goal was to get a personal understanding of the "chainof production" of the RFCs, and in particular to look at the variouscauses of delays in the process. As shown inSection 4, the average RFC was produced in 3 years and 4 months, which is similar to what was found in the2008 sample, but more than three times larger than the delays for the1998 sample.¶
The working group process appears to be the main source of delays. Efforts to diminish delays should probably focus there, instead of on theIETF and IESG reviews or the RFC production. For the RFC productionphase, most of the variability originates in the AUTH48 process,which is influenced by a variety of factors such as number ofauthors or level of engagement of these authors.¶
Most of the delay is spent in the working group, but the IETFDatatracker does not hold much information about what happens insidethe working groups. For example, events like Working Group Last Callswere not recorded in the history of the selected drafts available in theDatatracker. Such information would have been interesting. Of course,requiring that information would create an administrative burden, sothere is clearly a trade-off between requiring more work from workinggroup chairs and providing better data for process analysis. (It appearsthat this information can be available in the Datatracker for more recentdrafts, if the WG chairs use the Datatracker properly.)¶
The Independent Stream operates as expected. The majorityof the authors of the Independent Stream RFCs appear to be in IETF insiders,but there is significant amount of engagement by outside parties.¶
The analysis of citations inSection 5.1 shows that citationnumbers are a very poor indication of the "value" of an RFC. Citationnumbers measure the engagement of academic researchers with specifictopics, but have little correlation with the level of adoption anddeployment of a specific RFC. The result counts of Google searchesdo capture references outside academia, such as logs of developmentprojects. This might be informative, but it is not clear that the countswould not change over time due to algorithm changes or personalization.¶
This document analyses a small sample of RFCs "in depth". This allowedgathering of detailed feedback on the process and the deployments. Onthe other hand, much of the data on delays is available from theIETF Datatracker. It may be worth considering adding an automatedreporting of delay metrics in the IETF Datatracker.¶
This document only considers the RFCs that were published in a givenyear. This approach can be criticized as introducing a form of"survivor bias". There are many drafts proposed to the IETF, and onlya fraction of them end up being published as RFCs. On one hand, this is expected,because part of the process is to triage between ideas that can gatherconsensus and those that don't. On the other hand, we don't knowwhether that triage is too drastic and has discouraged progress on goodideas.¶
One way to evaluate the triage process would be to look at publication attempts that were abandoned -- forexample, drafts that expired without progressing or being replaced. The samplingmethodology could also be used for that purpose. Pick maybe 20 drafts at random,among those abandoned in a target year, and investigate why they were abandoned.Was it because better solutions emerged in the working group? Or maybe becausethe authors discovered a flaw in their proposal? Or was it because some factionalstruggle blocked a good idea? Was the idea pursued in a different venue?Hopefully, someone will try this kind of investigation.¶
This document does not specify any protocol.¶
We might want to analyze whether security issues were discovered afterpublication of specific standards.¶
This document has no IANA actions.¶
Preliminary analysis does not indicate that IANA is causing any particulardelay in the RFC publication process.¶
Many thanks to the authors of the selected RFCs who were willing toprovide feedback on the process:Michael Ackermann,Zafar Ali,Sarah Banks,Bruno Decraene,Lars Eggert,Nalini Elkins,Joachim Fabini,Dino Farinacci,Clarence Filsfils,Sujay Gupta,Dan Harkins,Vinayak Hegde,Benjamin Kaduk,John Klensin,Acee Lindem,Nikos Mavrogiannopoulos,Patrick McManus,Victor Moreno,Al Morton,Andrei Popov,Eric Rescorla,Michiko Short,Bhuvaneswaran Vengainathan,Lao Weiguo, andLi Yizhou. Many thanks toAdrian Farrel for his useful advice, toStephen Farrell andColin Perkins for their guidance on the use of citations, and toDave Crocker for a comprehensivereview. Thanks also toAlice Russo and the RFC Editor team for their work improving this document and checking the accuracy of the data.¶