Re: I-D Action: draft-kucherawy-nomcom-procexp-00.txt

John C Klensin <john-ietf@jck.com> Sun, 10 April 2016 16:43 UTC

Return-Path: <john-ietf@jck.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E20E412D601 for <ietf@ietfa.amsl.com>; Sun, 10 Apr 2016 09:43:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.896
X-Spam-Level:
X-Spam-Status: No, score=-2.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.996] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EMw6VdcFfLpd for <ietf@ietfa.amsl.com>; Sun, 10 Apr 2016 09:43:33 -0700 (PDT)
Received: from bsa2.jck.com (bsa2.jck.com [70.88.254.51]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 780E012D5FB for <ietf@ietf.org>; Sun, 10 Apr 2016 09:43:32 -0700 (PDT)
Received: from [198.252.137.10] (helo=JcK-HP8200.jck.com) by bsa2.jck.com with esmtp (Exim 4.82 (FreeBSD)) (envelope-from <john-ietf@jck.com>) id 1apISO-000F02-UH; Sun, 10 Apr 2016 12:43:28 -0400
Date: Sun, 10 Apr 2016 12:43:23 -0400
From: John C Klensin <john-ietf@jck.com>
To: "Murray S. Kucherawy" <superuser@gmail.com>, Brian E Carpenter <brian.e.carpenter@gmail.com>
Subject: Re: I-D Action: draft-kucherawy-nomcom-procexp-00.txt
Message-ID: <47541D4081FC9856A5390378@JcK-HP8200.jck.com>
In-Reply-To: <CAL0qLwbROnW8pKKtd=7hkHHyP=xA-_eNoBuoKqPpaGjjpgUH+Q@mail.gmail.com>
References: <20160408185636.23101.86017.idtracker@ietfa.amsl.com> <570882CE.9010501@gmail.com> <13214.1460236486@obiwan.sandelman.ca> <CAL0qLwYKbB3_PQcUAUDqJwnddc4oywffVD+sVusOK2xiBYu4PA@mail.gmail.com> <5709CE36.3040605@gmail.com> <CAL0qLwbROnW8pKKtd=7hkHHyP=xA-_eNoBuoKqPpaGjjpgUH+Q@mail.gmail.com>
X-Mailer: Mulberry/4.0.8 (Win32)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
X-SA-Exim-Connect-IP: 198.252.137.10
X-SA-Exim-Mail-From: john-ietf@jck.com
X-SA-Exim-Scanned: No (on bsa2.jck.com); SAEximRunCond expanded to false
Archived-At: <http://mailarchive.ietf.org/arch/msg/ietf/dPcKLsx1F_dlUKoGU-EOIiVq23I>
Cc: Michael Richardson <mcr+ietf@sandelman.ca>, IETF discussion list <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 10 Apr 2016 16:43:35 -0000


--On Saturday, April 09, 2016 21:46 -0700 "Murray S. Kucherawy"
<superuser@gmail.com> wrote:

> On Sat, Apr 9, 2016 at 8:53 PM, Brian E Carpenter <
> brian.e.carpenter@gmail.com> wrote:
> 
>> 
>> Regardless, I would think we would want challenges that said
>> things like "Brian Carpenter really hasn't been active enough
>> in the last couple of years to be able to evaluate the
>> candidates" rather than vaguely suggest that he is isn't
>> suitable.

> Does bullet 3 in Section 2 need to say more than it does now
> on that topic?

Murray, I don't know if my concern aligns with Brian's or not,
but I would think that there needs to be some impediment to
secret challenges that are based on innuendo, especially so
because there has traditionally been no appeal model for
challenges (and you don't add one).  On the other hand,
encouraging public slander is not a good idea either.  Perhaps
the text in Section 2 might be improved by: (i) Making it a bit
more clear that, while less that the historical attendance level
is grounds for a challenge, the assumption is that anyone who
applies is qualified and that any challenge has to contain
sufficient information of substance to overcome that
assumptions.  I think that is your intent, but the text is a
little bit less clear and more discretionary.  (ii) Adding a
rule that, if someone is challenged and the Nomcom chair upholds
the challenge and disqualifies the Nomcom applicant, the
challenge and associated correspondence may be made public at
the request of the applicant.  Perhaps the risk of public
disclosure would be sufficient to reduce concerns about possible
abuses

    john