| rfc9389.original | rfc9389.txt | |||
|---|---|---|---|---|
| ELEGY M. Duke | Internet Engineering Task Force (IETF) M. Duke | |||
| Internet-Draft Google LLC | Request for Comments: 9389 Google LLC | |||
| Obsoletes: 8788, 8989 (if approved) 2 February 2023 | BCP: 10 April 2023 | |||
| Updates: 8713 (if approved) | Obsoletes: 8788, 8989 | |||
| Intended status: Best Current Practice | Updates: 8713 | |||
| Expires: 6 August 2023 | Category: Best Current Practice | |||
| ISSN: 2070-1721 | ||||
| Nominating Committee Eligibility | Nominating Committee Eligibility | |||
| draft-ietf-elegy-rfc8989bis-05 | ||||
| Abstract | Abstract | |||
| The IETF Nominating Committee (NomCom) appoints candidates to several | The IETF Nominating Committee (NomCom) appoints candidates to several | |||
| IETF leadership committees. RFC8713 provides criteria for NomCom | IETF leadership committees. RFC 8713 provides criteria for NomCom | |||
| membership that attempt to ensure that NomCom volunteers are members | membership that attempt to ensure NomCom volunteers are members of | |||
| of the loosely defined IETF community, by requiring in-person | the loosely defined IETF community, by requiring in-person attendance | |||
| attendance in three of the past five in- person meetings. In 2020 | in three of the past five in-person meetings. In 2020 and 2021, the | |||
| and 2021, the IETF had six consecutive fully online plenary meetings | IETF had six consecutive fully online plenary meetings that drove | |||
| that drove rapid advancement in remote meeting technologies and | rapid advancement in remote meeting technologies and procedures, | |||
| procedures, including an experiment that included remote attendance | including an experiment that included remote attendance for NomCom | |||
| for NomCom eligibility. This document updates RFC8713 by defining a | eligibility. This document updates RFC 8713 by defining a new set of | |||
| new set of eligibility criteria from first principles, with | eligibility criteria from first principles, with consideration to the | |||
| consideration to the increased salience of remote attendance. | increased salience of remote attendance. This document obsoletes | |||
| RFCs 8788 and 8989. | ||||
| Discussion Venues | ||||
| This note is to be removed before publishing as an RFC. | ||||
| Source for this draft and an issue tracker can be found at | ||||
| https://github.com/ietf-wg-elegy/rfc8989bis. | ||||
| Status of This Memo | Status of This Memo | |||
| This Internet-Draft is submitted in full conformance with the | This memo documents an Internet Best Current Practice. | |||
| provisions of BCP 78 and BCP 79. | ||||
| Internet-Drafts are working documents of the Internet Engineering | ||||
| Task Force (IETF). Note that other groups may also distribute | ||||
| working documents as Internet-Drafts. The list of current Internet- | ||||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | ||||
| Internet-Drafts are draft documents valid for a maximum of six months | This document is a product of the Internet Engineering Task Force | |||
| and may be updated, replaced, or obsoleted by other documents at any | (IETF). It represents the consensus of the IETF community. It has | |||
| time. It is inappropriate to use Internet-Drafts as reference | received public review and has been approved for publication by the | |||
| material or to cite them other than as "work in progress." | Internet Engineering Steering Group (IESG). Further information on | |||
| BCPs is available in Section 2 of RFC 7841. | ||||
| This Internet-Draft will expire on 6 August 2023. | Information about the current status of this document, any errata, | |||
| and how to provide feedback on it may be obtained at | ||||
| https://www.rfc-editor.org/info/rfc9389. | ||||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2023 IETF Trust and the persons identified as the | Copyright (c) 2023 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents (https://trustee.ietf.org/ | Provisions Relating to IETF Documents | |||
| license-info) in effect on the date of publication of this document. | (https://trustee.ietf.org/license-info) in effect on the date of | |||
| Please review these documents carefully, as they describe your rights | publication of this document. Please review these documents | |||
| and restrictions with respect to this document. Code Components | carefully, as they describe your rights and restrictions with respect | |||
| extracted from this document must include Revised BSD License text as | to this document. Code Components extracted from this document must | |||
| described in Section 4.e of the Trust Legal Provisions and are | include Revised BSD License text as described in Section 4.e of the | |||
| provided without warranty as described in the Revised BSD License. | Trust Legal Provisions and are provided without warranty as described | |||
| in the Revised BSD License. | ||||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | 1. Introduction | |||
| 2. NomCom Principles . . . . . . . . . . . . . . . . . . . . . . 3 | 2. NomCom Principles | |||
| 3. Criteria . . . . . . . . . . . . . . . . . . . . . . . . . . 4 | 3. Criteria | |||
| 4. Security Considerations . . . . . . . . . . . . . . . . . . . 5 | 4. Security Considerations | |||
| 4.1. NomCom Capture . . . . . . . . . . . . . . . . . . . . . 5 | 4.1. NomCom Capture | |||
| 4.1.1. A Surge of Volunteers . . . . . . . . . . . . . . . . 5 | 4.1.1. A Surge of Volunteers | |||
| 4.1.2. The Two-Per-Organization Limit . . . . . . . . . . . 6 | 4.1.2. The Two-per-Organization Limit | |||
| 4.1.3. One Year of Participation . . . . . . . . . . . . . . 6 | 4.1.3. One Year of Participation | |||
| 4.2. Disruptive Candidates . . . . . . . . . . . . . . . . . . 6 | 4.2. Disruptive Candidates | |||
| 4.3. Additional Remedies . . . . . . . . . . . . . . . . . . . 7 | 4.3. Additional Remedies | |||
| 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 7 | 5. IANA Considerations | |||
| 6. References . . . . . . . . . . . . . . . . . . . . . . . . . 7 | 6. References | |||
| 6.1. Normative References . . . . . . . . . . . . . . . . . . 7 | 6.1. Normative References | |||
| 6.2. Informative References . . . . . . . . . . . . . . . . . 7 | 6.2. Informative References | |||
| Appendix A. NomCom Capture Calculations . . . . . . . . . . . . 8 | Appendix A. NomCom Capture Calculations | |||
| A.1. No per-organization limit . . . . . . . . . . . . . . . . 8 | A.1. No per-Organization Limit | |||
| A.2. Two per Organization . . . . . . . . . . . . . . . . . . 9 | A.2. Two per Organization | |||
| Appendix B. Change Log . . . . . . . . . . . . . . . . . . . . . 10 | Acknowledgments | |||
| B.1. Since draft-duke-elegy-rfc8989bis-00 . . . . . . . . . . 10 | Author's Address | |||
| B.2. Since draft-duke-gendispatch-rfc8989bis-00 . . . . . . . 10 | ||||
| Appendix C. Acknowledgments . . . . . . . . . . . . . . . . . . 10 | ||||
| Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 10 | ||||
| 1. Introduction | 1. Introduction | |||
| [RFC8713] defines the process for the selection of the Internet | [RFC8713] defines the process for the selection of the Internet | |||
| Architecture Board (IAB), Internet Engineering Steering Group (IESG), | Architecture Board (IAB), Internet Engineering Steering Group (IESG), | |||
| IETF Trust, and one IETF LLC Director. A key actor in the process is | IETF Trust, and the IETF LLC Directors. A key actor in the process | |||
| the Nominating Committee (NomCom), which nominates a single candidate | is the Nominating Committee (NomCom), which nominates a single | |||
| for each open position, subject to confirmation by other bodies. | candidate for each open position. Nominations are subject to | |||
| confirmation by other bodies. | ||||
| NomCom voting members are volunteers that have met certain | NomCom voting members are randomly selected from a pool of volunteers | |||
| eligibility requirements. The actual NomCom is selected at random | that have met certain eligibility requirements. Thus, it is | |||
| from the pool of eligible volunteers. Thus, it is important that | important that members of the pool be IETF participants likely to | |||
| members of the pool be IETF participants likely to have knowledge of | have knowledge of IETF processes and practices. There are | |||
| IETF processes and practices. There are restrictions to ensure that | restrictions to ensure that no more than two volunteers with the same | |||
| no more than two volunteers with the same primary affiliation are | primary affiliation are chosen. | |||
| chosen. | ||||
| Section 4.14 of [RFC8713] requires that volunteers must have attended | Section 4.14 of [RFC8713] requires volunteers to have attended three | |||
| three of the previous five meetings. In practice, this has meant | of the previous five meetings. In practice, this meant that the | |||
| that the volunteer picked up their registration badge at an in-person | volunteer picked up their registration badge at an in-person meeting. | |||
| meeting. Current members of the Internet Society Board of Trustees | Current members of the Internet Society Board of Trustees and bodies | |||
| and bodies for which the NomCom nominates members are ineligible. | for which the NomCom nominates members are ineligible. | |||
| [RFC8989] specified an experiment in the wake of six consecutive | [RFC8989] specified an experiment in the wake of six consecutive | |||
| fully online meetings from 2020 to 2021, where the historic | fully online meetings from 2020 to 2021, because the historic | |||
| interpretation of the requirement would have resulted in no eligible | interpretation of the requirement would have resulted in no eligible | |||
| volunteers. It extended the attendance requirement to define meeting | volunteers. It extended the meeting attendance requirement to | |||
| attendance as including logging in to at least one session of a | include logging in to at least one session of a fully online IETF | |||
| fully-online IETF meeting. | meeting. | |||
| RFC8989 also created two other tracks to obtain eligibility: (1) | [RFC8989] also created two other tracks to obtain eligibility: (1) | |||
| serving as a working group chair or secretary in the past three | serving as a working group chair or secretary in the past three | |||
| years, and (2) author or editor of an IETF Stream RFC in the past | years, and (2) being an author or editor of an IETF Stream RFC in the | |||
| five years, including internet-drafts in the RFC Editor queue. | past five years, which includes Internet-Drafts in the RFC Editor | |||
| queue. | ||||
| This document discusses some of the first principles that inform the | This document discusses some of the first principles that inform the | |||
| design of NomCom eligibility, and makes recommendations on how the | design of NomCom eligibility, and makes recommendations on how the | |||
| process of qualification based on attendance should work. | process of attendance-based qualification should work. | |||
| This document replaces the attendance criteria in the first two | This document replaces the attendance criteria in the first two | |||
| paragraphs of Section 4.14 of [RFC8713] with criteria based on those | paragraphs of Section 4.14 of [RFC8713] with the criteria described | |||
| in [RFC8989], and obsoletes RFC8989 to make it clear that that | in [RFC8989], and it obsoletes RFC 8989 to clarify that the document | |||
| document has been superseded. All other text in [RFC8713], including | has been superseded. All other text in [RFC8713], including the | |||
| the other paragraphs of Section 4.14, remains unchanged. | other paragraphs of Section 4.14, remains unchanged. | |||
| [RFC8788] established procedures for the 2020-2021 NomCom. While, by | ||||
| definition, [RFC8788] does not apply to future NomComs, this document | ||||
| formally obsoletes it. | ||||
| 2. NomCom Principles | 2. NomCom Principles | |||
| The NomCom is intended to be composed of randomly selected members of | The NomCom is intended to be composed of randomly selected members of | |||
| "the community." For many years, in-person attendance was a | "the community." For many years, in-person attendance was a | |||
| reasonable proxy for the commitment associated with being a member. | reasonable proxy for the commitment associated with being a member. | |||
| Two days of travel and an attendance fee is a relatively large | Two days of travel and an attendance fee is a relatively large | |||
| expenditure of time and money. Additionally, in-person attendance is | expenditure of time and money. Additionally, in-person attendance is | |||
| thought to increase personal familiarity with candidates for | thought to increase personal familiarity with candidates for | |||
| leadership positions and with the spirit of the IETF, although there | leadership positions and with the spirit of the IETF, although there | |||
| is no mechanism to ensure any interactions. | is no mechanism to ensure any interaction. | |||
| A basic principle is that the community should govern itself, so | A basic principle of the IETF is that the community should govern | |||
| volunteers must have a demonstrated commitment to the IETF. Limiting | itself, so volunteers must have a demonstrated commitment to the | |||
| the number of volunteers sponsored by any one organization avoids the | IETF. Limiting the number of volunteers sponsored by any one | |||
| potential for mischief that disrupts IETF operations or works against | organization avoids the potential for mischief that disrupts IETF | |||
| the interests of the community as a whole. | operations or works against the interests of the community as a | |||
| whole. | ||||
| However, attitudes to business travel evolve, and remote meeting | A requirement for in-person attendance has always excluded some from | |||
| technology continues to improve, to the extent that many longstanding | qualifying for the NomCom. However, as attitudes to business travel | |||
| community members choose to participate remotely. A requirement for | evolve and remote meeting technology continues to improve, many | |||
| in-person attendance has always excluded some from qualification from | longstanding community members are choosing to participate remotely | |||
| the NomCom, due to cost or personal reasons. Further, the NomCom has | (due to cost or personal reasons). In addition, the NomCom has | |||
| completed two cycles using entirely online tools. | completed two cycles using entirely online tools. | |||
| Counting remote attendance lowers the barriers to entry. As the IETF | Expanding the attendance requirement to include remote attendance | |||
| has historically provided a fee-free remote participation option, via | lowers the barriers to entry. As the IETF has historically provided | |||
| waiver or otherwise, the only required investment is to log on once | a fee-free remote participation option, via waiver or otherwise, the | |||
| per meeting at a specific time (sometimes a locally inconvenient | only required investment is to log on once per meeting at a specific | |||
| hour). While this document does not formally impose a requirement | time (sometimes a locally inconvenient hour). While this document | |||
| for the NomCom to function entirely remotely, including remote-only | does not formally impose a requirement for the NomCom to function | |||
| attendees in the pool is likely to effectively require a remote | entirely remotely, including remote-only attendees in the pool is | |||
| component to NomCom operations. | likely to effectively require a remote component to NomCom | |||
| operations. | ||||
| Finally, overly restrictive criteria work against getting a broad | Finally, overly restrictive criteria work against getting a broad | |||
| talent pool. | talent pool. | |||
| 3. Criteria | 3. Criteria | |||
| The following text replaces the first two paragraphs of Section 4.14 | The following text replaces the first two paragraphs of Section 4.14 | |||
| of [RFC8713]: | of [RFC8713]: | |||
| Members of the IETF community must satisfy the conditions in one of | | Members of the IETF community must satisfy the conditions in one | |||
| three paths in order to volunteer. Any one of the paths is | | of three paths in order to volunteer. Any one of the paths is | |||
| sufficient, unless the person is otherwise disqualified under | | sufficient, unless the person is otherwise disqualified under | |||
| Section 4.15 of [RFC8713]. | | Section 4.15 of [RFC8713]. | |||
| | | ||||
| Path 1: The person has registered for and attended three out of the | | Path 1: The person has registered for and attended three out of | |||
| last five IETF meetings, either in-person or online. In-person | | the last five IETF meetings, either in-person or online. | |||
| attendance is as determined by the record keeping of the Secretariat. | | In-person attendance is as determined by the record | |||
| Online attendance is based on being a registered person who logged in | | keeping of the Secretariat. Online attendance is based | |||
| for at least one session of an IETF meeting. | | on being a registered person who logged in for at least | |||
| | one session of an IETF meeting. | ||||
| Path 2: The person has been a Working Group Chair or Secretary within | | | |||
| the three years prior to the day the call for NomCom volunteers is | | Path 2: The person has been a Working Group Chair or Secretary | |||
| sent to the community. | | within the three years prior to the day the call for | |||
| | NomCom volunteers is sent to the community. | ||||
| Path 3: The person has been a listed author or editor on the front | | | |||
| page of at least two IETF Stream RFCs within the last five years | | Path 3: The person has been a listed author or editor on the | |||
| prior to the day the call for NomCom volunteers is sent to the | | front page of at least two IETF Stream RFCs within the | |||
| community. An Internet-Draft that has been approved by the IESG and | | last five years prior to the day the call for NomCom | |||
| is in the RFC Editor queue counts the same as a published RFC, with | | volunteers is sent to the community. An Internet-Draft | |||
| the relevant date being the date the draft was added to the RFC | | that has been approved by the IESG and is in the RFC | |||
| Editor queue. For avoidance of doubt, the five-year timer extends | | Editor queue counts the same as a published RFC, with the | |||
| back to the date five years before the date when the call for NomCom | | relevant date being the date the draft was added to the | |||
| volunteers is sent to the community. | | RFC Editor queue. For avoidance of doubt, the five-year | |||
| | timer extends back to the date five years before the date | ||||
| | when the call for NomCom volunteers is sent to the | ||||
| | community. | ||||
| 4. Security Considerations | 4. Security Considerations | |||
| 4.1. NomCom Capture | 4.1. NomCom Capture | |||
| The most potent threat associated with NomCom eligibility is that an | The most potent threat associated with NomCom eligibility is that an | |||
| organization or group of coordinating organizations could attempt to | organization or group of coordinating organizations could attempt to | |||
| obtain a majority of NomCom positions, in order to select an IETF | obtain a majority of NomCom positions, in order to select an IETF | |||
| leadership in support of an agenda that might be self-serving and | leadership in support of an agenda that might be self-serving and | |||
| against the interests of the community as a whole. | against the interests of the community as a whole. | |||
| skipping to change at page 5, line 36 ¶ | skipping to change at line 223 ¶ | |||
| Whatever the merits of admitting remote attendees, it reduces the | Whatever the merits of admitting remote attendees, it reduces the | |||
| minimum cost of creating a NomCom-eligible volunteer from three in- | minimum cost of creating a NomCom-eligible volunteer from three in- | |||
| person trips of around five days each over the course of at least | person trips of around five days each over the course of at least | |||
| eight months, to zero financial cost and the time required to log in | eight months, to zero financial cost and the time required to log in | |||
| three times over at least eight months. Some organizations might not | three times over at least eight months. Some organizations might not | |||
| be deterred in either case, while others might. | be deterred in either case, while others might. | |||
| 4.1.1. A Surge of Volunteers | 4.1.1. A Surge of Volunteers | |||
| A large number of legitimate volunteers makes it quite difficult to | A large number of legitimate volunteers makes it quite difficult to | |||
| control six of ten NomCom slots. Setting aside limitations on the | control a majority of NomCom slots. Setting aside limitations on the | |||
| number of selections from any organization, basic probability shows | number of selections from any organization, basic probability shows | |||
| that to have even a 50% chance of controlling six or more NomCom | that to have even a 50% chance of controlling six or more NomCom | |||
| positions, an attacker needs roughly 60% of the volunteer pool. For | positions, an attacker needs roughly 60% of the volunteer pool. For | |||
| example, if there are 300 "legitimate" volunteers, an attacker must | example, if there are 300 "legitimate" volunteers, an attacker must | |||
| produce 365 volunteers to exceed a 50% chance of NomCom capture (see | produce 365 volunteers to exceed a 50% chance of NomCom capture (see | |||
| Appendix A). | Appendix A). | |||
| A sudden surge in the number of volunteers, particularly of people | A sudden surge in the number of volunteers, particularly of people | |||
| that no one recognizes as a part of the community, is an early- | that no one recognizes as a part of the community, is an early- | |||
| warning sign. Anyone with concerns about the integrity of the | warning sign of an attempt at capture. Anyone with concerns about | |||
| process should bring those concerns to the IESG to further | the integrity of the process should bring those concerns to the IESG | |||
| investigate,and where needed take action as defined in RFC 8713 | to investigate. Where needed, the confirming bodies can take action | |||
| Section 3.7.3 to invalidate such candidates. | to invalidate such candidates as defined in Section 3.7.3 of | |||
| [RFC8713]. | ||||
| While loosening eligibility criteria lowers the cost to an attacker | While loosening eligibility criteria lowers the cost to an attacker | |||
| of producing eligible volunteers, it also increases the number of | of producing eligible volunteers, it also increases the number of | |||
| legitimate volunteers that increases the difficulty of an attack. | legitimate volunteers which increases the difficulty of an attack. | |||
| 4.1.2. The Two-Per-Organization Limit | 4.1.2. The Two-per-Organization Limit | |||
| The two-per-organization limit in [RFC8713] complicates such an | The two-per-organization limit described in Section 4.17 of [RFC8713] | |||
| attack. To circumvent it, an organization must either (1) coordinate | complicates such a capture attack. To circumvent it, an organization | |||
| with at least two like-minded organizations to produce a NomCom | would have to do one or more of the following: | |||
| majority, (2) incentivize members of other organizations (possibly | ||||
| through a funding agreement) to support its agenda, or (3) propose | 1. coordinate with at least two like-minded organizations to produce | |||
| candidates with false affiliations. | a NomCom majority, | |||
| 2. incentivize members of other organizations (possibly through a | ||||
| funding agreement) to support its agenda, and/or | ||||
| 3. propose candidates with false affiliations. | ||||
| While the IETF does not routinely confirm the affiliation of | While the IETF does not routinely confirm the affiliation of | |||
| volunteers, as part of an investigation it could eliminate volunteers | volunteers, as part of an investigation it could eliminate volunteers | |||
| who have misrepresented said affiliation. Publishing the list of | who have misrepresented said affiliation. Publishing the list of | |||
| volunteers and affiliations also gives the community an opportunity | volunteers and affiliations also gives the community an opportunity | |||
| to review the truth of such claims. | to review the truth of such claims. | |||
| Assuming that 300 legitimate volunteers are all from different | Assuming that 300 legitimate volunteers are all from different | |||
| organizations, three conspiring organizations would need 771 | organizations, three conspiring organizations would need 771 | |||
| volunteers (257 per organization) for a 50% chance of NomCom capture | volunteers (257 per organization) for a 50% chance of NomCom capture | |||
| skipping to change at page 6, line 43 ¶ | skipping to change at line 282 ¶ | |||
| process, an attack requires a surge in attendees over the course of a | process, an attack requires a surge in attendees over the course of a | |||
| year. Such a surge might trigger a community challenge to the list | year. Such a surge might trigger a community challenge to the list | |||
| of eligible volunteers, and/or a leadership investigation to detect | of eligible volunteers, and/or a leadership investigation to detect | |||
| suspicious behavior (e.g., logging in to a single session and then | suspicious behavior (e.g., logging in to a single session and then | |||
| immediately logging out). In the event of abuse of process, the | immediately logging out). In the event of abuse of process, the | |||
| leadership would then have months to adjust policy in response before | leadership would then have months to adjust policy in response before | |||
| the NomCom cycle begins, and/or disqualify candidates. | the NomCom cycle begins, and/or disqualify candidates. | |||
| 4.2. Disruptive Candidates | 4.2. Disruptive Candidates | |||
| Note that the counting remote participation towards NomCom | Note that counting remote participation towards NomCom eligibility | |||
| eligibility allows for a single individual to mount an attack that | allows for a single individual to mount an attack that previously | |||
| previously required coordination. By registering for remote | required coordination. By registering for remote attendance to IETF | |||
| attendance to IETF meetings using a number of different identities | meetings using a number of different identities over a year, an | |||
| over a year, an individual can make each of those identities NomCom | individual can make each of those identities NomCom eligible and then | |||
| eligible and then serve under any one of them that is selected for | serve under any one of them that is selected for the NomCom. Once | |||
| the NomCom. Once selected, an individual could seek to disrupt the | selected, an individual could seek to disrupt the process or prevent | |||
| process or prevent the timely conclusion of its work. Less severely, | the timely conclusion of its work. Less severely, an attacker could | |||
| an attacker could simply improve their chances of being selected for | simply improve their chances of being selected for NomCom. | |||
| NomCom. | ||||
| This attack is much harder to detect or prevent than equivalent | This attack is much harder to detect or prevent than equivalent | |||
| attacks were previously, as it does not require coordination among | attacks were previously, as it does not require coordination among | |||
| multiple attendees. While the attacker cannot be sure of fee waivers | multiple attendees. While the attacker cannot be sure of fee waivers | |||
| for some or all of the different identities, the lower cost for | for some or all of the different identities, the lower cost for | |||
| remote participation also makes this attack more feasible than it | remote participation also makes this attack more feasible than it | |||
| would have been under prior rules. | would have been under prior rules. | |||
| However, the voting member recall procedure in Section 5.7 of | However, the voting member recall procedure in Section 5.7 of | |||
| [RFC8713] exists to allow removal and replacement of disruptive | [RFC8713] exists to allow removal and replacement of disruptive | |||
| skipping to change at page 7, line 42 ¶ | skipping to change at line 329 ¶ | |||
| 6. References | 6. References | |||
| 6.1. Normative References | 6.1. Normative References | |||
| [RFC8713] Kucherawy, M., Ed., Hinden, R., Ed., and J. Livingood, | [RFC8713] Kucherawy, M., Ed., Hinden, R., Ed., and J. Livingood, | |||
| Ed., "IAB, IESG, IETF Trust, and IETF LLC Selection, | Ed., "IAB, IESG, IETF Trust, and IETF LLC Selection, | |||
| Confirmation, and Recall Process: Operation of the IETF | Confirmation, and Recall Process: Operation of the IETF | |||
| Nominating and Recall Committees", BCP 10, RFC 8713, | Nominating and Recall Committees", BCP 10, RFC 8713, | |||
| DOI 10.17487/RFC8713, February 2020, | DOI 10.17487/RFC8713, February 2020, | |||
| <https://www.rfc-editor.org/rfc/rfc8713>. | <https://www.rfc-editor.org/info/rfc8713>. | |||
| 6.2. Informative References | 6.2. Informative References | |||
| [RFC8788] Leiba, B., "Eligibility for the 2020-2021 Nominating | ||||
| Committee", BCP 10, RFC 8788, DOI 10.17487/RFC8788, May | ||||
| 2020, <https://www.rfc-editor.org/info/rfc8788>. | ||||
| [RFC8989] Carpenter, B. and S. Farrell, "Additional Criteria for | [RFC8989] Carpenter, B. and S. Farrell, "Additional Criteria for | |||
| Nominating Committee Eligibility", RFC 8989, | Nominating Committee Eligibility", RFC 8989, | |||
| DOI 10.17487/RFC8989, February 2021, | DOI 10.17487/RFC8989, February 2021, | |||
| <https://www.rfc-editor.org/rfc/rfc8989>. | <https://www.rfc-editor.org/info/rfc8989>. | |||
| Appendix A. NomCom Capture Calculations | Appendix A. NomCom Capture Calculations | |||
| Section 4 offers some mathematical results for the probability of | Section 4 offers some mathematical results for the probability of | |||
| NomCom capture. This appendix shows the work. | NomCom capture. This appendix shows the work. | |||
| Note that the number of combinations of b items chosen from a | Note that the number of combinations of b items chosen from a | |||
| population of a item is often expressed as | population of a items is often expressed as | |||
| ⎛a⎞ a! | ⎛a⎞ a! | |||
| ⎜ ⎟ = ──────── | ⎜ ⎟ = ──────── | |||
| ⎝b⎠ (a-b)!b! | ⎝b⎠ (a-b)!b! | |||
| Figure 1 | Figure 1 | |||
| A.1. No per-organization limit | A.1. No per-Organization Limit | |||
| The first computation assumes there is no limit of two per | Appendix A.1 assumes there is no limitation on the number of | |||
| organization, or equivalently, no organization produces more than two | volunteers from a given organization. Appendix A.2 assumes that no | |||
| volunteers. | single organization produces more than two volunteers. | |||
| Let L be the number of "legitimate" volunteers (i.e. those not allied | Let L be the number of "legitimate" volunteers (i.e., those not | |||
| with an attacker" and A be the number of attacking volunteers. Then | allied with an attacker) and A be the number of attacking volunteers. | |||
| there are | Then there are the following ways to select a NomCom: | |||
| ⎛L+A⎞ | ⎛L+A⎞ | |||
| ⎜ ⎟ | ⎜ ⎟ | |||
| ⎝ 10⎠ | ⎝ 10⎠ | |||
| ways to select a NomCom. The number of outcomes where attackers | The number of outcomes where attackers capture the NomCom is: | |||
| capture the NomCom is | ||||
| 10 | 10 | |||
| ⎯⎯ | —— | |||
| ╲ ⎡⎛A⎞ ⎛ L ⎞⎤ | ╲ ⎡⎛A⎞ ⎛ L ⎞⎤ | |||
| ╱ ⎢⎜ ⎟ ⎜ ⎟⎥ | ╱ ⎢⎜ ⎟ ⎜ ⎟⎥ | |||
| ⎺⎺ ⎣⎝i⎠ ⎝10-i⎠⎦ | —— ⎣⎝i⎠ ⎝10-i⎠⎦ | |||
| i=6 | i=6 | |||
| Figure 2 | Figure 2 | |||
| and the probability of capture is therefore | Therefore, the probability of capture is | |||
| 10 ⎛A⎞ ⎛ L ⎞ | 10 ⎛A⎞ ⎛ L ⎞ | |||
| ⎯⎯ ⎜ ⎟ ⎜ ⎟ | —— ⎜ ⎟ ⎜ ⎟ | |||
| ╲ ⎝i⎠ ⎝10-i⎠ | ╲ ⎝i⎠ ⎝10-i⎠ | |||
| ╱ ────────── | ╱ ────────── | |||
| ⎺⎺ ⎛L + A⎞ | —— ⎛L + A⎞ | |||
| i=6 ⎜ ⎟ | i=6 ⎜ ⎟ | |||
| ⎝ 10 ⎠ | ⎝ 10 ⎠ | |||
| Figure 3 | Figure 3 | |||
| For L = 300, this probability crosses 50% at A = 365. | For L = 300, this probability crosses 50% at A = 365. | |||
| A.2. Two per Organization | A.2. Two per Organization | |||
| Assume that the population of L is drawn from L different | Assume that the population of L is drawn from L different | |||
| organizations (this assumption is unfavorable to the attacker). | organizations (this assumption is unfavorable to the attacker). | |||
| Assume also that there are three conspiring organizations. Then no | Assume also that there are three conspiring organizations. Then no | |||
| more than 6 members can be drawn from A. | more than 6 members can be drawn from A. | |||
| Let B be the number of nominees per attacking organization, so that A | Let B be the number of nominees per attacking organization, so that A | |||
| = 3B. | = 3B. | |||
| The number of combinations to pick exactly N attackers, N <= 6, is | The number of combinations to pick exactly N attackers, N <= 6, is | |||
| min(N,2)⎡ min(2,N-i) ⎤ | min(N,2)⎡ min(2,N-i) ⎤ | |||
| ⎯⎯ ⎢ ⎯⎯ ⎥ | —— ⎢ —— ⎥ | |||
| ⎛ L ⎞ ╲ ⎢⎛B⎞ ╲ ⎛⎛B⎞ ⎛ B ⎞⎞⎥ | ⎛ L ⎞ ╲ ⎢⎛B⎞ ╲ ⎛⎛B⎞ ⎛ B ⎞⎞⎥ | |||
| C(N) = ⎜ ⎟ ╱ ⎢⎜ ⎟ ╱ ⎜⎜ ⎟ ⎜ ⎟⎟⎥ | C(N) = ⎜ ⎟ ╱ ⎢⎜ ⎟ ╱ ⎜⎜ ⎟ ⎜ ⎟⎟⎥ | |||
| ⎝10 - N⎠ ⎺⎺ ⎢⎝i⎠ ⎺⎺ ⎝⎝j⎠ ⎝min(2, N-i-j)⎠⎠⎥ | ⎝10 - N⎠ —— ⎢⎝i⎠ —— ⎝⎝j⎠ ⎝min(2, N-i-j)⎠⎠⎥ | |||
| i=0 ⎣ j=0 ⎦ | i=0 ⎣ j=0 ⎦ | |||
| Figure 4 | Figure 4 | |||
| And the probability of capture is | And the probability of capture is | |||
| C(6) | C(6) | |||
| ─────── | ─────── | |||
| 6 | 6 | |||
| ⎯⎯ | —— | |||
| ╲ | ╲ | |||
| ╱ C(i) | ╱ C(i) | |||
| ⎺⎺ | —— | |||
| i=0 | i=0 | |||
| Figure 5 | Figure 5 | |||
| For L = 300, the A required to exceed a 50% probability of capture is | For L = 300, the A required to exceed a 50% probability of capture is | |||
| 771. | 771. | |||
| Appendix B. Change Log | Acknowledgments | |||
| *RFC Editor's Note:* Please remove this section prior to | ||||
| publication of a final version of this document. | ||||
| B.1. Since draft-duke-elegy-rfc8989bis-00 | ||||
| * Added more security considerations | ||||
| * Editorial improvements | ||||
| B.2. Since draft-duke-gendispatch-rfc8989bis-00 | ||||
| * Matched normative section to RFC8989 | ||||
| * Added security considerations and appendix | ||||
| Appendix C. Acknowledgments | ||||
| Brian Carpenter and Stephen Farrell wrote RFC8989, which provides the | Brian Carpenter and Stephen Farrell wrote RFC 8989, which provides | |||
| core of this document. | the core of this document. | |||
| Luc André Burdet, Brian Carpenter, and Donald Eastlake provided | Luc André Burdet, Brian Carpenter, and Donald Eastlake provided | |||
| useful editorial suggestions. | useful editorial suggestions. | |||
| Author's Address | Author's Address | |||
| Martin Duke | Martin Duke | |||
| Google LLC | Google LLC | |||
| Email: martin.h.duke@gmail.com | Email: martin.h.duke@gmail.com | |||
| End of changes. 47 change blocks. | ||||
| 199 lines changed or deleted | 190 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. | ||||