Re: I-D Action: draft-kucherawy-nomcom-procexp-00.txt

John C Klensin <john-ietf@jck.com> Sun, 10 April 2016 16:59 UTC

Return-Path: <john-ietf@jck.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BD3CE12D60B for <ietf@ietfa.amsl.com>; Sun, 10 Apr 2016 09:59:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.896
X-Spam-Level:
X-Spam-Status: No, score=-2.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.996] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m9Ohg2t8PZ8U for <ietf@ietfa.amsl.com>; Sun, 10 Apr 2016 09:59:37 -0700 (PDT)
Received: from bsa2.jck.com (bsa2.jck.com [70.88.254.51]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CE7A412D558 for <ietf@ietf.org>; Sun, 10 Apr 2016 09:59:37 -0700 (PDT)
Received: from [198.252.137.10] (helo=JcK-HP8200.jck.com) by bsa2.jck.com with esmtp (Exim 4.82 (FreeBSD)) (envelope-from <john-ietf@jck.com>) id 1apIi0-000F1h-IY; Sun, 10 Apr 2016 12:59:36 -0400
Date: Sun, 10 Apr 2016 12:59:31 -0400
From: John C Klensin <john-ietf@jck.com>
To: "Murray S. Kucherawy" <superuser@gmail.com>
Subject: Re: I-D Action: draft-kucherawy-nomcom-procexp-00.txt
Message-ID: <7FBF15BB56B5908D0A908194@JcK-HP8200.jck.com>
In-Reply-To: <47541D4081FC9856A5390378@JcK-HP8200.jck.com>
References: <20160408185636.23101.86017.idtracker@ietfa.amsl.com> <570882CE.9010501@gmail.com> <13214.1460236486@obiwan.sandelman.ca> <CAL0qLwYKbB3_PQcUAUDqJwnddc4oywffVD+sVusOK2xiBYu4PA@mail.gmail.com> <5709CE36.3040605@gmail.com> <CAL0qLwbROnW8pKKtd=7hkHHyP=xA-_eNoBuoKqPpaGjjpgUH+Q@mail.gmail.com> <47541D4081FC9856A5390378@JcK-HP8200.jck.com>
X-Mailer: Mulberry/4.0.8 (Win32)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
X-SA-Exim-Connect-IP: 198.252.137.10
X-SA-Exim-Mail-From: john-ietf@jck.com
X-SA-Exim-Scanned: No (on bsa2.jck.com); SAEximRunCond expanded to false
Archived-At: <http://mailarchive.ietf.org/arch/msg/ietf/0qsfQx8wGqZh4_orwKDsErng0k8>
Cc: IETF discussion list <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 10 Apr 2016 16:59:38 -0000

Murray,

One more thought about the challenge process.  Without
performing the experiment, we can only guess at how many
challenges there would be and that might make a difference.
However, I wonder whether, instead of adding "didn't attend
enough meetings and isn't appropriate" on to the challenge
criteria for post-selection challenges, it might be better to
create a different category and allow challenges on that basis
to people entering the selection pool.

In other words, 

(1) The pool is announced (as today) with the "fewer meetings"
people identified (as you now suggest).

(2) There is a brief period for community challenges to those
who have not attended three of five meetings, paralleling the
period in which the Secretariat checks to be sure those who have
claimed three of five meetings really did attend.

(3) Once we get past step 2, the pool is the pool and, while any
one selected can be challenged under the rules of RFC 7437,
challenges based on meeting attendance are no longer allowed.

I'm not sure, and I'm a tad concerned about DoS attacks (see
above), but it seems to me that might be a little bit cleaner.
It would also have the property that potentially-controversial
challenges based on unsuitability would occur much earlier in
the process, before the random draw is made, and that might be
an advantage.

     john