Skip to main content

Narrative Minutes interim-2025-iesg-18: Thu 14:00
narrative-minutes-interim-2025-iesg-18-202509181400-00

Meeting Narrative Minutes Internet Engineering Steering Group (iesg) IETF
Date and time 2025-09-18 14:00
Title Narrative Minutes interim-2025-iesg-18: Thu 14:00
State Active
Other versions plain text
Last updated 2025-10-09

narrative-minutes-interim-2025-iesg-18-202509181400-00
INTERNET ENGINEERING STEERING GROUP (IESG)
Narrative minutes for the 2025-09-18 IESG Teleconference

These are not an official record of the meeting.
Narrative Scribe: Liz Flynn, Secretariat

1. Administrivia
1.1 Roll call

ATTENDEES
---------------------------------
Mike Bishop (Akamai) / Web and Internet Transport Area
Mohamed Boucadair (Orange) / Operations and Management Area
Morgan Condie (AMS) / IETF Secretariat
Deb Cooley (Independent) / Security Area
Roman Danyliw (CERT/SEI) / IETF Chair, General Area
Gorry Fairhurst (Univ. of Aberdeen) / Web and Internet Transport Area
Liz Flynn (AMS) / IETF Secretariat
Jim Guichard (Futurewei Technologies) / Routing Area
Erik Kline (Aalyria Technologies) / Internet Area
Mahesh Jethanandani (Arrcus) / Operations and Management Area
Jean Mahoney (AMS) / RFC Editor Liaison
Cindy Morgan (AMS) / IETF Secretariat
Andy Newton (ICANN) / Applications and Real-Time Area
Tommy Pauly (Apple) / IAB Chair
Orie Steele (mesur.io) / Applications and Real-Time Area
Ketan Talaulikar (Cisco) / Routing Area
Sabrina Tanamal (ICANN) / IANA Liaison
Gunter Van de Velde (Nokia) / Routing Area

REGRETS
---------------------------------
Matthew Bocci (Nokia) / IAB Liaison
Jay Daley / IETF Executive Director
Éric Vyncke (Cisco) / Internet Area
Paul Wouters (Aiven) /  Security Area

OBSERVERS
---------------------------------
Donald Eastlake
Sandy Ginoza
Vratko Polák
Ben Schwartz
Greg Wood

1.2 Bash the agenda

Mahesh: Can we take the BFD documents first so I can drop off after?

Roman: Of course; we'll do those right after the action items.

1.3 Approval of the minutes of past telechats

Liz: Does anyone have an objection to the minutes from the September 7
teleconference being approved? I'm hearing no objections, so they are approved
and will be posted in the Datatracker. Does anyone have an objection to the
narrative minutes from the September 7 teleconference being approved? I'm
hearing no objections, so they are approved and will be posted in the
Datatracker.

1.4 List of remaining action items from last telechat

   * DESIGNATED EXPERTS NEEDED

     o Paul Wouters to find designated experts for RFC 9770 (Notification
       of Revoked Access Tokens in the Authentication and Authorization
       for Constrained Environments (ACE) Framework) [IANA #1421561].

Liz: We'll mark this in progress for Paul.

     o Orie Steele to find designated experts for RFC 9795 (Personal
       Assertion Token (PASSporT) Extension for Rich Call Data)[IANA
       #1423169].

Orie: In progress.

     o Deb Cooley to find designated experts for RFC 9788 (Header
       Protection for Cryptographically Protected Email) [IANA #1428133].

Liz: We have a couple of names to approve for this one in the management items
section, so this one is provisionally done.

   * OPEN ACTION ITEMS

     o Roman Danyliw to take a look at Datatracker documentation of
       document states and update as needed.

Roman: Half the request is in. Making the changes on the WG states is done and
that will go into production; there is still a little revision to be made on
the IESG states because of the difference between Waiting for AD Go-Ahead and
AD Writeup so we need to polish that text. In progress.

     o Paul Wouters to propose a sentence to add to the "IESG Statement on
       Clarifying the Use of BCP 14 Key Words" regarding normative
       language in diagrams.

Liz: We'll mark this in progress for Paul.

     o Mahesh Jethanandani and Ketan Talaulikar to work with Dhruv Dhody
       and Suresh Krishnan to look into potential retreat locations in
       Asia.

Ketan: Still in progress.

     o IESG to draft a response to "Appeal to the forwarding of draft-
       ietf-lsr-igp-ureach-prefix-announce."

Liz: This went out so we will mark it done.

     o IESG to review & update the Non-WG List spreadsheet.

Cindy: Several people had sent out mail to lists saying if there was no
objection by X date we'll close it, and that X date for most is later this
month.

Mike: I think the last one is October 1st.

     o Éric Vyncke and Mike Bishop to schedule AMAs for people considering
       accepting nominations for IESG positions (one in Madrid, one remote
       after Madrid).

Mike: These are scheduled, so we can close it.

     o Roman Danyliw and Mahesh Jethanandani to draft update to "Guidance
       on Area Director Sponsoring of Documents" statement.

Roman: This one and the next are in progress.

     o Roman Danyliw to check with the Trust about whether the IESG
       Statement on Copyright is overtaken by RFC8721 Section 4.3.

     o Paul Wouters to suggest next steps on "IESG Statement on Maximizing
       Encrypted Access To  IETF Information."

Liz: We'll mark this in progress for Paul.

     o Med Boucadair and Mahesh Jethanandani to review "IESG Statement on
       Proposed Status for IETF Documents Reserving Resources for Example
       Purposes" and propose what needs to be updated.

Mahesh: In progress.

     o Roman Danyliw, Andy Newton, Cindy Morgan, Paul Wouters to work on an
       IESG statement about submitting appeals.

Liz: We'll talk about this later in the agenda, so this is in progress.

     o Andy Newton and Roman Danyliw to work on re-chartering dispatch to
       cover multiple areas.

Roman: In progress.

     o Ketan Talaulikar, Mahesh Jethanandani, and Roman Danyliw to work on
       an announcement regarding Datatracker state change for WG adoption.

Ketan: In progress.

     o Cindy Morgan to follow up with the Tools Team about the difference
       between "Waiting for Writeup" and "Waiting for AD Go-Ahead."

Cindy: I had a conversation with Robert about this and I've sent the details to
Roman, so we can mark this done.

2. Protocol actions
2.1 WG submissions
2.1.1 New items

 o draft-ietf-netconf-port-numbers-07  - IETF stream
   Updates to NETCONF Transport Port Numbers (Proposed Standard)
   Token: Mahesh Jethanandani

Liz: We have no Discusses, so unless there's an objection now this one is
approved.

Mahesh: I think it's pretty much ready to go but put it in AD Followup please.

 o draft-ietf-lamps-rfc5272bis-08  - IETF stream
   Certificate Management over CMS (CMC) (Proposed Standard)
   Token: Deb Cooley

Liz: We have no Discusses, so unless there's an objection now this one is
approved.

Deb: Revised I-D Needed, please.

 o draft-ietf-lamps-rfc5273bis-08  - IETF stream
   Certificate Management over CMS (CMC): Transport Protocols
   (Proposed Standard)
   Token: Deb Cooley

Liz: We have no Discusses, so unless there's an objection now this one is
approved.

Deb: I don't really have anything to say with this. We got a thorough review
from Ben Kaduk and an HTTP directorate review as well, which is going to drive
some change. They may have to go back to the wg to double check the HTTP
changes the HTTP directorate guy wanted, so I think Revised I-D Needed is
probably where we need to leave this.

 o draft-ietf-lamps-rfc5274bis-08  - IETF stream
   Certificate Management Messages over CMS (CMC): Compliance
   Requirements (Proposed Standard)
   Token: Deb Cooley

Liz: We have no Discusses, so unless there's an objection now this one is
approved.

Deb: Can we put it in AD Followup, please? Also a question, when I progress
these three together is there anything I need to do to make sure they go en
masse?

Liz: If you push the buttons at the same time we'll get the tickets at the same
time. If you want to be sure you can just send us a note about it. This
document does have a downref; do you want to add 9579 to the downref registry?

Deb: 9579 currently has a bis draft in the RFC Editor's queue, and this will
eventually get updated to reference the bis RFC and we'll add that to the
downref registry but not 9579.

Liz: Great, so this is Approved, Announcement to be Sent::AD Followup.

 o draft-ietf-scitt-architecture-20  - IETF stream
   An Architecture for Trustworthy and Transparent Digital Supply
   Chains (Proposed Standard)
   Token: Deb Cooley

Liz: We have no Discusses, so unless there's an objection now this one is
approved.

Deb: AD Followup, please.

 o draft-ietf-httpbis-optimistic-upgrade-05  - IETF stream
   Security Considerations for Optimistic Protocol Transitions in
   HTTP/1.1 (Proposed Standard)
   Token: Mike Bishop

Liz: We have no Discusses, so unless there's an objection now this one is
approved.

Mike: Let's do AD Followup; I want to check a few of the comments.

Deb: [An author] Ben is on the call.

Mike: Thanks. Ben, is there anything you want to add?

Ben Schwartz: Let me know when I should cut a new version.

Mike: Whenever you're ready!

 o draft-ietf-tsvwg-usr-exp-14  - IETF stream
   User Ports and Port Identifiers for Experiments (Proposed Standard)
   Token: Gorry Fairhurst

Liz: We do have a few Discusses in the tracker; do we want to discuss these now?

Gorry: I think so. I think we need to work with Joe to revise this. I'd love to
know what Deb thinks about port based security so I know which way to prod him.
Do you have thoughts now, Deb, or would you rather discuss this afterwards?

Deb: I'd rather discuss it afterwards once I gather my thoughts.

Gorry: That's okay. What about Ketan? You didn't particularly like the idea of
a registry at all.

Ketan: The registry for the experimental parts. I was not fully convinced about
the PExIDs but I'll leave that to Mike. It's 4 billion; having a registry for
that, I don't know if we have an IANA registry for experimental allocations
which are expected to be short lived and in closed conditions. My concern is
that having a registry makes it official and well known and things could just
stick or stay there. Not having a registry is a good incentive to move on after
the experiment and if it's successful go on and get the ports. If the firewalls
are open for the user port but now we have PExIDs and firewalls are not able to
look at it, some other PExIDs or other traffic can also get in, right? I'll
leave that to Deb. My concern is I'm just not comfortable having an
experimental [registry] thing. And one other thing which was a small simple
thing to fix is the layout of the registry. Maybe the reference was wrong
there, but that should be simple to fix.

Gorry: I think the layout is easy. The bigger question comes to security when
you start opening up ports and then you multiplex on them, and whether that is
a thing we want to put guidance around or whether there are things we don't
want to have. I guess that's a useful point to clear before we look at the
other things. Is there anything other people think is the first thing we should
look at? Mike, did you want to say something?

Mike: Yes. I feel like this document is about ¾ of the way to 2 different
designs and hasn't picked one yet. Either you have a shim protocol for demuxing
experiments that you can register an identifier for and you can expect a
package or an OS to implement, so and so. You can define that shim protocol;
whether or not it's useful is a separate question. You can define it, someone
can build it, and then you can run your experiments over that. Or you can do
what a lot of protocols do today and embed a magic number that I randomly
generated a 32 bit or a 64 bit thing I'm going to throw my packets at a place I
know to check. If I get a packet that doesn't look like that, it's not mine,
I'm going to ignore it. I feel like this draft builds the registry, describes
how you could demux on it, and then says you'll stick that identifier somewhere
in the packet at the beginning of your connection. If I were going to build
that in the OS, I can't implement that. I can't find it somewhere in the
handshake. It's all SHOULDs, not MUSTs. If you're defining a protocol you need
to be specific enough that it can be implemented. If you're not doing that,
then it's just guidance and you probably don't even need the registry.

Gorry: That boils down to why the IANA ports team gave this over to TSVWG as
something they wanted to do. I think we could push back a little bit and find
out what their detailed requirements were that came up with this solution and
that would be helpful input into this discussion. I get what you're saying,
Mike.

Mike: To be clear, I think I would ballot NoObj to either of those designs, but
this isn't either one.

Gorry: Okay. Does anyone else want to say anything at this stage? Okay, then we
need to discuss with the editor and possibly include the ports team because
it's an IANA registry change and it's a bit complicated.

Liz: This document is staying in IESG Evaluation. What substate would you like?

Gorry: Let's go for AD Followup and try to get answers to some of these
questions first and then move it to Revised I-D Needed later.

2.1.2 Returning items

 NONE

2.2 Individual submissions
2.2.1 New items

 NONE

2.2.2 Returning items

 NONE

2.3 Status changes
2.3.1 New items

 NONE

2.3.2 Returning items

 NONE

3. Document actions
3.1 WG submissions
3.1.1 New items

 o draft-ietf-bmwg-mlrsearch-14  - IETF stream
   Multiple Loss Ratio Search (Informational)
   Token: Mohamed Boucadair

Liz: There are no Discusses in the tracker, so unless there's an objection now,
this one is approved.

Med: Revised I-D, please.

Liz: So this one is Approved, Announcement to be Sent::Revised I-D Needed.

 o draft-ietf-bfd-optimizing-authentication-33  - IETF stream
   Optimizing BFD Authentication (Experimental)
   Token: Ketan Talaulikar

Ketan: A clarification on the Discuss from Éric; it's about whether this
experimental document updates the base BFD RFC which is Standards track. The
answer is no; there have been some updates made by the authors to clarify this,
but perhaps more is needed. This experimental document is introducing new
authentication types, and each type defines its own format. There is some
language that might have given an impression this updates, but that's not the
case, so I'll work with the authors to clarify.

Mike: Suggest you address mine and Roman's abstain as part of this?

Ketan: Yes. Next to Gorry's Discuss about use of the word optimizing and the
idea that that gives an impression it's better authentication. There are some
alternate proposals; we could call it perhaps lightweight BFD authentication.
One other key part is this brings the ability to alternate between use of the
regular message digest authentication for less regular packets, that are
control packets let's say and a lightweight CSPRNG based one for packets which
are identical, more like an echo request and reply which go at a faster rate.
We could consider calling it lightweight authentication or CSPRNG based BFD
authentication. We have some options and we can discuss now or on email.

Gorry: All those sound like things we could do by email. Any of those would be
okay for me.

Ketan: Deb has a few points. The authors are ready to change 'strong' to
something else. Except for the simple and null authentication, the others are
like message digests over the entire BFD packet, whereas the less CPU intensive
one is pseudo random number based. I wonder if we can work out those
terminologies offline.

Deb: Certainly. Message digest authentication is not a bad idea.

Ketan: Before we move on to the abstains, Mahesh, as a co-author would you like
to add anything?

Mahesh: We've gone back and forth on how to describe the method currently
described as optimized. We're open to the idea of naming it whatever the
security ADs feel is the right way to describe the mechanism.

Ketan: I think we'll need more time to work through these but at the high
level, we can work on terminologies. The key difference is the lightweight
mechanism that's pseudo-random based. Moving on to the abstains, I believe the
interpretation was there was no known implementation or planned implementation
and that was the main reason for the abstain.

Mike: Correct. That's what the shepherd writeup says for all three.

Ketan: I'd read that as no current plans. We don't know, there may be a need
to; the state of deployments right now is that there is [practically] no
authentication used in BFD at all. There may be a need for this in the future.
Since the WG has spent efforts and they realize that without implementation
there's no proof in the pudding, that's why it's experimental.

Mahesh: These documents were always meant to be PS all the way until WG last
call. At that time since there was a lack of implementation, the agreement was
to make it experimental and make sure it was easier to implement in the future.
A lot of vendors don't want to implement an experimental draft. The idea was
that if it's published as an RFC, even if it's experimental, vendors would be
more open to running it as an experiment. It's not that there's no interest in
implementation.

Roman: PS documents don't have implementations sometimes. What I'm more
confused by is if no one plans to implement it, why publish it at all? That's
what I am reading literally from the shepherds report.

Mahesh: It's not like no one wants to, it's just they feel hesitant to
implement something that is experimental. I don't think it's true there's
absolutely no interest. We have vendors saying they'll take a look at it once
it's published as an RFC.

Deb: So the shepherd's writeup is incorrect?

Mahesh: I think it's unfortunate to be described as no interest; that's not
fully true.

Mike: 'We'll take a look' isn't that great as well.

Ketan: Whether vendors prioritize implementation is market driven. All of these
have some implications. And especially on the silicon as well in many cases.
Personally I believe it's good to document it. If there is any attack on BFD,
suddenly there will be a market [for this]. Since a lot of WG time and
engineering has been done, I think it's fair to document this as experimental.

Roman: Wearing my security hat, that's an interesting setup, because it says we
don't have the feature, we're waiting for an attack that will happen, and we
were just talking about silicon. So with silicon, the delay to implement this
feature to get this in the wild to mitigate attacks, we're now talking years.
I'm a little unpersuaded by this argument if the delay is going to be years
away.

Ketan: I believe that's the accurate state of affairs.

Deb: Are there implementations of 5880?

Ketan: Oh yes.

Deb: What authentication method have they chosen?

Mahesh: The ones that silicon vendors have decided to implement have been with
no authentication.

Ketan: When we say implementation there are two kinds; one that we can do in
software and any authentications can be done straight away. That would work to
a certain scale. To go to a higher scale with a faster interval, those use the
silicon and those don't have any authentication as far as I know.

Deb: It sounds like there have been software implementations but no hardware
implementations?

Mahesh: In software, only at the very slowest speeds. It's not fast enough.

Deb: Even if we approve these experimental drafts, you still can't run this
stuff in software, can you?

Mahesh: The authentication requirement kicks in only for control packets that
are transitioning the state of the BFD session. Those have a much higher
interval, I believe up to a minute. Strong authentication can still be done
there. The optimizing part is to say for the remaining packets that do not
affect the session other than to keep the state, it doesn't need to be
authenticated that way; it can use a less computationally intensive method.

Ketan: Right, one that is message digest based with the CSPRNG based assumption
that the CSPRNG ones can have certain properties or characteristics that have
possibility of being used in silicon. But that detail is in the other draft,
not this one.

Deb: But your hashes are all in software, you can't afford to do them very
fast. Therefore, if you do them just on the control package, you think that
might work. The question is what are the options for less intensive? I made a
comment about that on the other draft.

Mahesh: There's also the question of key management Deb brought up.

Deb: Don't look at this one yet, I need to go back and read 5880 to find out
where those keys come from. I thought they were in your discriminator and my
discriminator and apparently that's not correct. That's fine.

Mike: I think I'd found they were supposed to be out-of-band configured by the
administrator?

Ketan: Yes.

Mike: So it's effectively just a PSK.

Deb: Or a password. In the other draft the example given is just an ASCII
string. Which looks a lot like a password.

Liz: This document will stay in IESG Evaluation; which substate would you like?
I'm guessing Revised I-D Needed?

Ketan: Yes.

 o draft-ietf-bfd-secure-sequence-numbers-25  - IETF stream
   Meticulous Keyed ISAAC for BFD Optimized Authentication
   (Experimental)
   Token: Ketan Talaulikar

Liz: We also have a couple of Discusses on this one.

Ketan: There is a proposal from the authors to use ISAAC. Is that okay or do we
want to look at other CSPRNGs? I think that's a longer conversation we should
probably have offline. Unless Deb or Mahesh wants to discuss it here.

Deb: It's sort of the optimized draft plus, right? There are more issues with
key management, more issues with how to do implementations, more issues with
statements of the fact it's a robust algorithm, things like that. If you
downscale how much security you're getting from this, and just accurately
document how things are handled and put in a statement saying just because
we're using this algorithm here doesn't mean you're going to use it anywhere
else and that sort of thing, then I think the actual security requirements here
are very minimal. That just needs to be stated properly. And again you have the
same problem; nobody's using this, nobody's even attempted to implement it. Who
knows what you're going to find out once you attempt to implement it. My other
comment is, a lot of times AES is a standard cell in the library of lots of
CPUs. Why can't you run AES in a stream mode in hardware and just generate
random numbers the same way you're doing for the ISAAC thing? Chuck them into a
table and use it the same way. But the base algorithm is actually something
that's had actual evaluation for decades.

Ketan: That's maybe a little difficult to answer. I think we can have this
discussion on email, that may be better.

Mahesh: BFD is implemented on all sizes of routers; single RU boxes all the way
to line cards. It becomes a bit of a challenge in those situations where you
don't have any help in hardware to generate streams, even an AES stream.

Deb: I guess it just depends on what they've got from a hardware point of view.
But I will just say AES has been in standard cell libraries literally since the
mid 2000s.

Mike: Also even if the answer is many of them don't have AES in hardware, I'd
be willing to bet they don't have ISAAC either.

Ketan: That's a fair question. I think we need to get some answers and more
details.

Deb: I think the claim is that ISAAC runs fast enough in software that it
doesn't need to be in hardware, and that's because it's RC4 based. If you're
doing this sort of thing in the background anyway, how fast does it really need
to be? ISAAC doesn't run in real time, it runs in the background generating a
page of values.

Mahesh: I think that's a fair statement and I'll take it back with the authors.

Deb: One more thing. SipHash has been proposed. I don't feel it's necessary to
drop one unevaluated algorithm for another. As far as I know it hasn't been
rigorously tested.

Mahesh: Since Ketan has stepped away, I think we can also put this one in
Revised I-D Needed.

Liz: This one is IESG Evaluation::Revised I-D Needed.

 o draft-ietf-bfd-stability-19  - IETF stream
   BFD Stability (Experimental)
   Token: Ketan Talaulikar

Liz: There are no Discusses on this one, so unless there's an objection now,
this one is approved.

Ketan: I think this probably still needs updates from the comments. Can you put
it in AD Followup, please.

Liz: This one is Approved, Announcement to be Sent:: AD Followup.

3.1.2 Returning items

 NONE

3.2 Individual submissions via AD
3.2.1 New items

 NONE

3.2.2 Returning items

 NONE

3.3 Status changes
3.3.1 New items

 NONE

3.3.2 Returning items

 NONE

3.4 IRTF and Independent Submission stream documents
3.4.1 New items

 NONE

3.4.2 Returning items

 NONE

3.4.3 For action

 o conflict-review-lim-apv-00
   IETF conflict review for draft-lim-apv
     draft-lim-apv-07
     Advanced Professional Video (ISE: Informational)
   Token: Roman Danyliw

Liz: Do we have a volunteer to do this conflict review?

Roman: This is a codec video processing thing, so I'm thinking maybe ART could
take it?

Andy: Sure, I can take it.

Gorry: AVTCORE had a presentation on this, but I think it's more ART.

4. Working Group actions
4.1 WG creation
4.1.1 Proposed for IETF review

 NONE

4.1.2 Proposed for approval

 NONE

4.2 WG rechartering
4.2.1 Under evaluation for IETF review

 o CBOR Object Signing and Encryption (cose)

Liz: There are no blocking comments here; are there any objections for sending
this to external review? [Silence] Okay, so this is approved for external
review but since Paul isn't here, we'll check with him to make sure it's ready
before we send the announcement.

4.2.2 Proposed for approval

 NONE

5. IAB news we can use

Deb: There are a bunch of comments the IAB is sending out; one is on ICANN's
root server system advisory committee discussion. There's also a WSIS+20 draft
they're also commenting on. And a bunch of liaison discussions.

6. Management issues

6.1 [IANA #1427994] Management Item: Acceptance of media type registration from
prostep ivip

Liz: We had this on the agenda last time and we agreed to bring it back today
after having some more time to look into it. Has anyone had a chance to do that?

Andy: I looked at it. They're a standards body. I'd say we go ahead and approve
this.

Roman: I concur.

Liz: Any objections to approving this media type registration? [Silence] This
is approved and we'll send the official note to IANA.

6.2 [IANA #1428290] Management Item: Renaming IP address registries

Liz: This is the new proposed naming from IANA. Are we ready to approve?

Andy: Is this the updated one?

Cindy: Yes, this is the updated version that was sent around yesterday.

Sabrina: These are the new names.

Ketan: Looks good to me, thank you.

Erik K: I missed the discussion last time; can I ask why IANA is being dropped
from the title? Is that happening for all such registries?

Sabrina: Yes, along with the word registry. We're trying to remove those to
make it more consistent.

Roman: Or else you have the official name being something-something registry
registry.

Erik K: Okay. I see. That makes sense.

Liz: I'm not hearing any objections or questions. I think this is approved, and
we'll send a note to IANA.

6.3 [IANA #1429248] renewing early allocation(s) for
draft-ietf-sidrops-aspa-profile

Liz: This is a request for a renewal from one of Med's documents. Med, do you
have anything you want to let us know about?

Med: Nothing specific other than this document is likely to be in WG last call
soon, so I think it's worth extending.

Liz: Any objections to approving this renewal? [Silence] Okay, this is approved
and we'll send an official note to IANA.

6.4 [IANA #1428133] Designated experts for RFC 9788 (Header Protection for
Cryptographically Protected Email) (Deb Cooley)

Liz: Deb has found Daniel Kahn Gillmor and Bernie Hoeneisen as DEs for this
registry. Are there any objections to approving them? [Silence] Great, so they
are approved and we'll send the official note to IANA.

6.5  [IANA #1429703] Designated experts for RFC 9820 (Authentication Service
Based on the Extensible Authentication Protocol (EAP) for Use with the
Constrained Application Protocol (CoAP)) - (Paul Wouters)

Liz: This is a new action item for Paul, so we'll put this on the list for him.

6.6 Executive Session: Appeals and statement on appeal norms

The topic was discussed in an executive session with IESG, IAB Chair, and
Secretariat present.

7. Any Other Business (WG News, New Proposals, etc.)

Deb: EODIR met yesterday to talk about preparing some information about GitHub
for various communities. They have three things they're going to start with;
how a WG chair would organize a workspace, how to use Martin Thomson's
template, and how to make a pull request from a reviewer's point of view.
They'd probably love help with this, if you know of anyone who'd be interested
in working on it.

Andy: We have a couple of RFCs on how to use GitHub that are informational; how
is this different?

Roman: They're trying to give a click by click tutorial.

Deb: Education, yes. For all sorts of different people and what sorts of levels
of Github guidance do people need. An author needs one thing, but a reviewer
needs another thing. An opportunity to provide click by click instructions on
how to do things is the goal.

Roman: Imagine a circumstance where you're providing feedback and the WG says
give us a pull request. If you're not familiar with the process, especially if
you're not coming from an element of a day job where you have this in your
workflow like you're a policymaker or a civil society rep.

Deb: This is a result of feedback they've received online and from the WG
chairs lunch in Madrid.

Liz: Reminder that WG scheduling closes tomorrow.