<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="info" docName="draft-protocolpolice-af-01" indexInclude="true" ipr="trust200902" number="8962" prepTime="2021-04-01T11:08:33" scripts="Common,Latin" sortRefs="true" submissionType="independent" symRefs="true" tocDepth="3" tocInclude="true" xml:lang="en">
  <link href="https://datatracker.ietf.org/doc/draft-protocolpolice-af-01" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc8962" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="The Protocol Police">Establishing the Protocol Police</title>
    <seriesInfo name="RFC" value="8962" stream="independent"/>
    <author initials="G." surname="Grover" fullname="Gurshabad Grover">
      <address>
        <email>gurshabad@cis-india.org</email>
      </address>
    </author>
    <author initials="N." surname="ten Oever" fullname="Niels ten Oever">
      <address>
        <email>mail@nielstenoever.net</email>
      </address>
    </author>
    <author initials="C." surname="Cath" fullname="Corinne Cath">
      <address>
        <email>corinnecath@gmail.com</email>
      </address>
    </author>
    <author initials="S." surname="Sahib" fullname="Shivan Kaul Sahib">
      <address>
        <email>shivankaulsahib@gmail.com</email>
      </address>
    </author>
    <date month="04" year="2021" day="1"/>
    <keyword>Law and Order</keyword>
    <keyword>Do the Right Thing</keyword>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">One mantra of the IETF is, "We are not the Protocol Police." However, to ensure that protocols are implemented and
          deployed in full compliance with the IETF's standards, it is important to set up a body that is responsible for
          assessing and enforcing correct protocol behavior.</t>
      <t indent="0" pn="section-abstract-2">This document formally establishes the Protocol Police.  It defines the body and sets out what aspects of IETF protocols
          they will police. This document acts as a point of reference for networking engineers, law enforcement officials,
          government representatives, and others.  It also provides advice on how to report issues to the Protocol Police.</t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This document is not an Internet Standards Track specification; it is
            published for informational purposes.
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This is a contribution to the RFC Series, independently of any
            other RFC stream.  The RFC Editor has chosen to publish this
            document at its discretion and makes no statement about its value
            for implementation or deployment.  Documents approved for
            publication by the RFC Editor are not candidates for any level of
            Internet Standard; see Section 2 of RFC 7841.
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc8962" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2021 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-definitions">Definitions</xref></t>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-composition-of-the-protocol">Composition of the Protocol Police</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.3.2">
              <li pn="section-toc.1-1.3.2.1">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.3.2.1.1"><xref derivedContent="3.1" format="counter" sectionFormat="of" target="section-3.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-recognizing-the-protocol-po">Recognizing the Protocol Police</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.2">
                <t indent="0" pn="section-toc.1-1.3.2.2.1"><xref derivedContent="3.2" format="counter" sectionFormat="of" target="section-3.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-recruitment">Recruitment</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-support-for-the-protocol-po">Support for the Protocol Police</xref></t>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-punishable-offenses">Punishable Offenses</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2">
              <li pn="section-toc.1-1.5.2.1">
                <t indent="0" pn="section-toc.1-1.5.2.1.1"><xref derivedContent="5.1" format="counter" sectionFormat="of" target="section-5.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-protocol-layer-violations">Protocol-Layer Violations</xref></t>
              </li>
              <li pn="section-toc.1-1.5.2.2">
                <t indent="0" pn="section-toc.1-1.5.2.2.1"><xref derivedContent="5.2" format="counter" sectionFormat="of" target="section-5.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-deliberate-non-interoperabi">Deliberate Non-Interoperability</xref></t>
              </li>
              <li pn="section-toc.1-1.5.2.3">
                <t indent="0" pn="section-toc.1-1.5.2.3.1"><xref derivedContent="5.3" format="counter" sectionFormat="of" target="section-5.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-disobeying-rfcs">Disobeying RFCs</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-reporting-offenses">Reporting Offenses</xref></t>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-punishment">Punishment</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.7.2">
              <li pn="section-toc.1-1.7.2.1">
                <t indent="0" pn="section-toc.1-1.7.2.1.1"><xref derivedContent="7.1" format="counter" sectionFormat="of" target="section-7.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-traffic-imprisonment">Traffic Imprisonment</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.8">
            <t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="8" format="counter" sectionFormat="of" target="section-8"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-morality-considerations">Morality Considerations</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.8.2">
              <li pn="section-toc.1-1.8.2.1">
                <t indent="0" pn="section-toc.1-1.8.2.1.1"><xref derivedContent="8.1" format="counter" sectionFormat="of" target="section-8.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-oversight">Oversight</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.9">
            <t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="9" format="counter" sectionFormat="of" target="section-9"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.10">
            <t indent="0" pn="section-toc.1-1.10.1"><xref derivedContent="10" format="counter" sectionFormat="of" target="section-10"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.11">
            <t indent="0" pn="section-toc.1-1.11.1"><xref derivedContent="11" format="counter" sectionFormat="of" target="section-11"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-privacy-considerations">Privacy Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.12">
            <t indent="0" pn="section-toc.1-1.12.1"><xref derivedContent="12" format="counter" sectionFormat="of" target="section-12"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-human-rights-considerations">Human Rights Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.13">
            <t indent="0" pn="section-toc.1-1.13.1"><xref derivedContent="13" format="counter" sectionFormat="of" target="section-13"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-conclusion">Conclusion</xref></t>
          </li>
          <li pn="section-toc.1-1.14">
            <t indent="0" pn="section-toc.1-1.14.1"><xref derivedContent="14" format="counter" sectionFormat="of" target="section-14"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
          </li>
          <li pn="section-toc.1-1.15">
            <t indent="0" pn="section-toc.1-1.15.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.a"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgments">Acknowledgments</xref></t>
          </li>
          <li pn="section-toc.1-1.16">
            <t indent="0" pn="section-toc.1-1.16.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="include" removeInRFC="false" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1">IETF participants are often confronted with circumstances where developers or deployers choose to not obey the sacrosanct
          words of an RFC.  This can lead to outcomes that are widely agreed to be unexpected, unwarranted, or undesirable.</t>
      <t indent="0" pn="section-1-2">Some are of the opinion that IETF participants should come to a consensus and declare what protocol behavior is
          unacceptable, and that the maintainers and developers of non-compliant protocols should be chastised.  Others
          (especially working group chairs) non-gracefully fall back on the undocumented mantra, "We [or the IETF] are not
          the Protocol Police."  Understandably, this has led to confusion about who should make judgments about proper
          interpretation of protocol specifications.</t>
      <t indent="0" pn="section-1-3">This document formally establishes the Protocol Police, hitherto undocumented at the IETF.  It defines the body
          and sets out what aspects of IETF protocols they will police. This document acts as a point of reference for
          networking engineers, law enforcement officials, government representatives, and others.  It also provides advice
          on how to report issues to the Protocol Police.</t>
      <t indent="0" pn="section-1-4">The Protocol Police, as defined in this document, are responsible for enforcing all IETF standards and best
          practices.</t>
    </section>
    <section anchor="definitions" numbered="true" toc="include" removeInRFC="false" pn="section-2">
      <name slugifiedName="name-definitions">Definitions</name>
      <t indent="0" pn="section-2-1">For possibly the first time in IETF history, words like "SHALL" and "MAY" are used in this document in their real
          and enforceable sense.</t>
    </section>
    <section anchor="composition-of-the-protocol-police" numbered="true" toc="include" removeInRFC="false" pn="section-3">
      <name slugifiedName="name-composition-of-the-protocol">Composition of the Protocol Police</name>
      <t indent="0" pn="section-3-1">The Protocol Police shall be selected by the IETF Nominating Committee (NomCom) as laid out in <xref target="RFC3797" format="default" sectionFormat="of" derivedContent="RFC3797"/> in a manner similar to
          that used to select the IAB and IESG <xref target="RFC8713" format="default" sectionFormat="of" derivedContent="RFC8713"/>.</t>
      <t indent="0" pn="section-3-2">However, the members of the Protocol Police shall not be publicly named.  This will enable them to operate more
          effectively and without interference or unwarranted pressure from members of the community.  The first rule of the
          Protocol Police is $CIPHERTEXT.</t>
      <section anchor="recognizing-the-protocol-police" numbered="true" toc="include" removeInRFC="false" pn="section-3.1">
        <name slugifiedName="name-recognizing-the-protocol-po">Recognizing the Protocol Police</name>
        <t indent="0" pn="section-3.1-1">When more than one person says, "We are not the Protocol Police," at least one of them is not telling the truth.</t>
        <t indent="0" pn="section-3.1-2">The Protocol Police love company and are never alone.</t>
        <t indent="0" pn="section-3.1-3">You are not the Protocol Police: we are.  We are not the Protocol Police: you are.</t>
      </section>
      <section anchor="recruitment" numbered="true" toc="include" removeInRFC="false" pn="section-3.2">
        <name slugifiedName="name-recruitment">Recruitment</name>
        <t indent="0" pn="section-3.2-1">If you are interested in joining the Protocol Police, contact your localhost.  Your behavior will be monitored, and
             your implementation will be analyzed for full RFC compliance.  If your deeds, both now and in the past, are recognized
             to be true to the scripture, NomCom will of course be instructed to induct you to the ranks.  But if you have
             transgressed, any information the investigation produces MAY be used against you in future proceedings.</t>
        <t indent="0" pn="section-3.2-2">In making an assessment of your suitability for membership of the Protocol Police, contact may be made on your behalf
             with the Internet Moral Majority <xref target="RFC4041" format="default" sectionFormat="of" derivedContent="RFC4041"/>.</t>
        <t indent="0" pn="section-3.2-3">If you have nothing to hide, you have nothing to fear.</t>
      </section>
    </section>
    <section anchor="support-for-the-protocol-police" numbered="true" toc="include" removeInRFC="false" pn="section-4">
      <name slugifiedName="name-support-for-the-protocol-po">Support for the Protocol Police</name>
      <t indent="0" pn="section-4-1">Support for the existence and operation of the Protocol Police is essential to the concept of "policing by consent."
          Fortunately, the IETF community and all stakeholders may now consider themselves served by this document which, by
          dint of its existence, warrants adherence.</t>
    </section>
    <section anchor="punishable-offenses" numbered="true" toc="include" removeInRFC="false" pn="section-5">
      <name slugifiedName="name-punishable-offenses">Punishable Offenses</name>
      <section anchor="protocol-layer-violations" numbered="true" toc="include" removeInRFC="false" pn="section-5.1">
        <name slugifiedName="name-protocol-layer-violations">Protocol-Layer Violations</name>
        <t indent="0" pn="section-5.1-1">Some boundaries must not be crossed.  There are no acceptable layer violations.  Even though layers, like
             borders, are ambiguous abstractions only serving to uphold the legitimacy and identity of the institutions
             that produce them, they shall be observed and defended because the Protocol Police exist to defend them.</t>
      </section>
      <section anchor="deliberate-non-interoperability" numbered="true" toc="include" removeInRFC="false" pn="section-5.2">
        <name slugifiedName="name-deliberate-non-interoperabi">Deliberate Non-Interoperability</name>
        <t indent="0" pn="section-5.2-1">The Protocol Police are sanctioned to gain access to any walled garden that undermines interoperability.  At
             the same time, the Protocol Police will defend legacy interoperability options in all NTP eras (see
             <xref target="RFC5905" section="6" sectionFormat="of" format="default" derivedLink="https://rfc-editor.org/rfc/rfc5905#section-6" derivedContent="RFC5905"/>), and will be reachable via the Extensible Messaging and Presence Protocol (XMPP) until at least era 2147483649.</t>
      </section>
      <section anchor="disobeying-rfcs" numbered="true" toc="include" removeInRFC="false" pn="section-5.3">
        <name slugifiedName="name-disobeying-rfcs">Disobeying RFCs</name>
        <t indent="0" pn="section-5.3-1">In the beginning was the RFC, and the network was with the RFC, and the RFC was with the network.  Through
             the RFC all things were made; without the RFC nothing was made that has been made.  In the network was life,
             and that life was the light of all the INTERNET.  Thou shalt not deviate from the path set out in the RFCs or
             else thou shall be scattered over the data plane.</t>
      </section>
    </section>
    <section anchor="reporting-offences" numbered="true" toc="include" removeInRFC="false" pn="section-6">
      <name slugifiedName="name-reporting-offenses">Reporting Offenses</name>
      <t indent="0" pn="section-6-1">Send all your reports of possible violations and all tips about wrongdoing to /dev/null.  The Protocol Police
          are listening and will take care of it.</t>
    </section>
    <section anchor="punishment" numbered="true" toc="include" removeInRFC="false" pn="section-7">
      <name slugifiedName="name-punishment">Punishment</name>
      <section anchor="traffic-imprisonment" numbered="true" toc="include" removeInRFC="false" pn="section-7.1">
        <name slugifiedName="name-traffic-imprisonment">Traffic Imprisonment</name>
        <t indent="0" pn="section-7.1-1">The Protocol Police will maintain a list of hosts and clients that have demonstrated their inability to
             comprehend simple commandments contained in RFCs, which all IETF participants know to be precise and
             accessible even to a general audience.</t>
        <t indent="0" pn="section-7.1-2">If this work is standardized, IANA is requested to register the list
  of addresses (see <xref target="iana-considerations" format="default" sectionFormat="of" derivedContent="Section 9"/>).
             For a period specified in an official notification, all other networks SHALL drop all network packets originating
             from or intended for such addresses.  This will result in effective and forced confinement of criminal networks.</t>
        <t indent="0" pn="section-7.1-3">Using powerful machine-learning mechanisms for threat analysis, the Protocol Police will identify networks that are
             likely to fail to comply with this requirement.  This process is known as Heuristic Internet Policing (HIP).
             Networks identified in this way will be disciplined by the Protocol Police with TCP RSTs.  Let it be known: the
             Protocol Police always shoot from the HIP.</t>
      </section>
    </section>
    <section anchor="morality" numbered="true" toc="include" removeInRFC="false" pn="section-8">
      <name slugifiedName="name-morality-considerations">Morality Considerations</name>
      <t indent="0" pn="section-8-1">This section contains morality considerations consistent with the demands of <xref target="RFC4041" format="default" sectionFormat="of" derivedContent="RFC4041"/>.</t>
      <blockquote quotedFrom="My friend Dave" pn="section-8-2">
        <t indent="0" pn="section-8-2.1">
             We reject: kings, presidents and voting.<br/>
             We believe in: rough consensus and running code.<br/>
             We only bow down to: the Protocol Police.
        </t>
      </blockquote>
      <blockquote quotedFrom="KRS-ZERO (after spotting an evil bit [RFC3514])" pn="section-8-3">
        <t indent="0" pn="section-8-3.1">
             Woop-woop! This is the Protocol Police!<br/>
             Woop-woop! That's the packet of the beast!
        </t>
      </blockquote>
      <section anchor="oversight" numbered="true" toc="include" removeInRFC="false" pn="section-8.1">
        <name slugifiedName="name-oversight">Oversight</name>
        <t indent="0" pn="section-8.1-1">All police forces must be accountable and subject to oversight.  The Protocol Police take full responsibility for oversight
             of their actions and promise to overlook all activities.</t>
      </section>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="include" removeInRFC="false" pn="section-9">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t indent="0" pn="section-9-1">If this work is standardized, IANA shall set up a registry for criminal networks and addresses.  If the IANA does not comply with these orders, the Protocol
         Police shall go and cry to ICANN before becoming lost in its bureaucracy.</t>
    </section>
    <section anchor="security-considerations" numbered="true" toc="include" removeInRFC="false" pn="section-10">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t indent="0" pn="section-10-1">Before the Protocol Police, there was no security.  The Police have arrived.  All your networks are belong to us.</t>
    </section>
    <section anchor="privacy-considerations" numbered="true" toc="include" removeInRFC="false" pn="section-11">
      <name slugifiedName="name-privacy-considerations">Privacy Considerations</name>
      <t indent="0" pn="section-11-1">None.</t>
    </section>
    <section anchor="human-rights-considerations" numbered="true" toc="include" removeInRFC="false" pn="section-12">
      <name slugifiedName="name-human-rights-considerations">Human Rights Considerations</name>
      <t indent="0" pn="section-12-1">There are none for you to worry about.  The Police will see to it.</t>
    </section>
    <section anchor="conclusion" numbered="true" toc="include" removeInRFC="false" pn="section-13">
      <name slugifiedName="name-conclusion">Conclusion</name>
      <t indent="0" pn="section-13-1">Case closed.</t>
    </section>
  </middle>
  <back>
    <references pn="section-14">
      <name slugifiedName="name-informative-references">Informative References</name>
      <reference anchor="RFC3514" target="https://www.rfc-editor.org/info/rfc3514" quoteTitle="true" derivedAnchor="RFC3514">
        <front>
          <title>The Security Flag in the IPv4 Header</title>
          <author initials="S." surname="Bellovin" fullname="S. Bellovin">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2003" month="April"/>
          <abstract>
            <t indent="0">Firewalls, packet filters, intrusion detection systems, and the like often have difficulty distinguishing between packets that have malicious intent and those that are merely unusual.  We define a security flag in the IPv4 header as a means of distinguishing the two cases.  This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3514"/>
        <seriesInfo name="DOI" value="10.17487/RFC3514"/>
      </reference>
      <reference anchor="RFC3797" target="https://www.rfc-editor.org/info/rfc3797" quoteTitle="true" derivedAnchor="RFC3797">
        <front>
          <title>Publicly Verifiable Nominations Committee (NomCom) Random Selection</title>
          <author initials="D." surname="Eastlake 3rd" fullname="D. Eastlake 3rd">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2004" month="June"/>
          <abstract>
            <t indent="0">This document describes a method for making random selections in such a way that the unbiased nature of the choice is publicly verifiable.  As an example, the selection of the voting members of the IETF Nominations Committee (NomCom) from the pool of eligible volunteers is used.  Similar techniques would be applicable to other cases.  This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3797"/>
        <seriesInfo name="DOI" value="10.17487/RFC3797"/>
      </reference>
      <reference anchor="RFC4041" target="https://www.rfc-editor.org/info/rfc4041" quoteTitle="true" derivedAnchor="RFC4041">
        <front>
          <title>Requirements for Morality Sections in Routing Area Drafts</title>
          <author initials="A." surname="Farrel" fullname="A. Farrel">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2005" month="April"/>
          <abstract>
            <t indent="0">It has often been the case that morality has not been given proper consideration in the design and specification of protocols produced within the Routing Area.  This has led to a decline in the moral values within the Internet and attempts to retrofit a suitable moral code to implemented and deployed protocols has been shown to be sub-optimal. </t>
            <t indent="0">This document specifies a requirement for all new Routing Area Internet-Drafts to include a "Morality Considerations" section, and gives guidance on what that section should contain.  This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4041"/>
        <seriesInfo name="DOI" value="10.17487/RFC4041"/>
      </reference>
      <reference anchor="RFC5905" target="https://www.rfc-editor.org/info/rfc5905" quoteTitle="true" derivedAnchor="RFC5905">
        <front>
          <title>Network Time Protocol Version 4: Protocol and Algorithms Specification</title>
          <author initials="D." surname="Mills" fullname="D. Mills">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="J." surname="Martin" fullname="J. Martin" role="editor">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="J." surname="Burbank" fullname="J. Burbank">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="W." surname="Kasch" fullname="W. Kasch">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2010" month="June"/>
          <abstract>
            <t indent="0">The Network Time Protocol (NTP) is widely used to synchronize computer clocks in the Internet.  This document describes NTP version 4 (NTPv4), which is backwards compatible with NTP version 3 (NTPv3), described in RFC 1305, as well as previous versions of the protocol. NTPv4 includes a modified protocol header to accommodate the Internet Protocol version 6 address family.  NTPv4 includes fundamental improvements in the mitigation and discipline algorithms that extend the potential accuracy to the tens of microseconds with modern workstations and fast LANs.  It includes a dynamic server discovery scheme, so that in many cases, specific server configuration is not required.  It corrects certain errors in the NTPv3 design and implementation and includes an optional extension mechanism.   [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5905"/>
        <seriesInfo name="DOI" value="10.17487/RFC5905"/>
      </reference>
      <reference anchor="RFC8713" target="https://www.rfc-editor.org/info/rfc8713" quoteTitle="true" derivedAnchor="RFC8713">
        <front>
          <title>IAB, IESG, IETF Trust, and IETF LLC Selection, Confirmation, and Recall Process: Operation of the IETF Nominating and Recall Committees</title>
          <author initials="M." surname="Kucherawy" fullname="M. Kucherawy" role="editor">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="R." surname="Hinden" fullname="R. Hinden" role="editor">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="J." surname="Livingood" fullname="J. Livingood" role="editor">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2020" month="February"/>
          <abstract>
            <t indent="0">The process by which the members of the IAB and IESG, some Trustees of the IETF Trust, and some Directors of the IETF Administration LLC (IETF LLC) are selected, confirmed, and recalled is specified in this document. This document is based on RFC 7437.  Only those updates required to reflect the changes introduced by IETF Administrative Support Activity (IASA) 2.0 have been included. Any other changes will be addressed in future documents.</t>
            <t indent="0">This document obsoletes RFC 7437 and RFC 8318.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="10"/>
        <seriesInfo name="RFC" value="8713"/>
        <seriesInfo name="DOI" value="10.17487/RFC8713"/>
      </reference>
    </references>
    <section anchor="acknowledgments" numbered="false" toc="include" removeInRFC="false" pn="section-appendix.a">
      <name slugifiedName="name-acknowledgments">Acknowledgments</name>
      <t indent="0" pn="section-appendix.a-1">Members of the Protocol Police MUST salute and ACK all network traffic from <contact fullname="Daniel Kahn Gillmor"/>, <contact fullname="Mallory Knodel"/>, and <contact fullname="Adrian Farrel"/>.</t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.b">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author initials="G." surname="Grover" fullname="Gurshabad Grover">
        <address>
          <email>gurshabad@cis-india.org</email>
        </address>
      </author>
      <author initials="N." surname="ten Oever" fullname="Niels ten Oever">
        <address>
          <email>mail@nielstenoever.net</email>
        </address>
      </author>
      <author initials="C." surname="Cath" fullname="Corinne Cath">
        <address>
          <email>corinnecath@gmail.com</email>
        </address>
      </author>
      <author initials="S." surname="Sahib" fullname="Shivan Kaul Sahib">
        <address>
          <email>shivankaulsahib@gmail.com</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
