<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="info" docName="draft-dont-write-bugs-00" indexInclude="true" ipr="trust200902" number="9225" prepTime="2022-04-01T09:30:52" scripts="Common,Latin" sortRefs="true" submissionType="independent" symRefs="true" tocDepth="3" tocInclude="true" xml:lang="en">
  <link href="https://datatracker.ietf.org/doc/draft-dont-write-bugs-00" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc9225" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="Don't Do Bugs">Software Defects Considered Harmful</title>
    <seriesInfo name="RFC" value="9225" stream="independent"/>
    <author fullname="Job Snijders" initials="J." surname="Snijders">
      <organization showOnFrontPage="true">Fastly</organization>
      <address>
        <postal>
          <street/>
          <code/>
          <city>Amsterdam</city>
          <country>Netherlands</country>
        </postal>
        <email>job@fastly.com</email>
      </address>
    </author>
    <author fullname="Chris Morrow" initials="C." surname="Morrow">
      <organization showOnFrontPage="true">Google</organization>
      <address>
        <postal>
          <street/>
          <code/>
          <city>Reston</city>
          <region>Virginia</region>
          <country>United States of America</country>
        </postal>
        <email>morrowc@ops-netman.net</email>
      </address>
    </author>
    <author fullname="Remco van Mook" initials="R." surname="van Mook">
      <organization showOnFrontPage="true">Asteroid</organization>
      <address>
        <postal>
          <street/>
          <code/>
          <city>Deventer</city>
          <country>Netherlands</country>
        </postal>
        <email>remco@asteroidhq.com</email>
      </address>
    </author>
    <date month="04" year="2022" day="01"/>
    <keyword>software</keyword>
    <keyword>defects</keyword>
    <keyword>bugs</keyword>
    <keyword>harmful</keyword>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">
        This document discourages the practice of introducing software defects in general and in network protocol implementations specifically. 
        Software defects are one of the largest cost drivers for the networking industry.
        This document is intended to clarify the best current practice in this regard.
      </t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This document is not an Internet Standards Track specification; it is
            published for informational purposes.
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This is a contribution to the RFC Series, independently of any
            other RFC stream.  The RFC Editor has chosen to publish this
            document at its discretion and makes no statement about its value
            for implementation or deployment.  Documents approved for
            publication by the RFC Editor are not candidates for any level of
            Internet Standard; see Section 2 of RFC 7841.
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc9225" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2022 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-requirements-language">Requirements Language</xref></t>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-examples-of-high-impact-sof">Examples of High-Impact Software Defects</xref></t>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-best-current-practises">Best Current Practises</xref></t>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.7.2">
              <li pn="section-toc.1-1.7.2.1">
                <t indent="0" pn="section-toc.1-1.7.2.1.1"><xref derivedContent="7.1" format="counter" sectionFormat="of" target="section-7.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.7.2.2">
                <t indent="0" pn="section-toc.1-1.7.2.2.1"><xref derivedContent="7.2" format="counter" sectionFormat="of" target="section-7.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.8">
            <t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="Appendix A" format="default" sectionFormat="of" target="section-appendix.a"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-future-research">Future Research</xref></t>
          </li>
          <li pn="section-toc.1-1.9">
            <t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgements">Acknowledgements</xref></t>
          </li>
          <li pn="section-toc.1-1.10">
            <t indent="0" pn="section-toc.1-1.10.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.c"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section anchor="intro" numbered="true" removeInRFC="false" toc="include" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1">
	Software defects (informally known as "bugs") have been the cause and effect of innumerable system degradations and failures over the years.
        Bugs are errors, flaws, or faults in a computer program that cause the program to produce an incorrect or unexpected result.
      </t>
      <t indent="0" pn="section-1-2">
          (Please note: unexpected results caused by bugs are not a valid substitute for high-quality random number generators, though high-quality random number generators are generally not considered to be bugs.)
      </t>
      <t indent="0" pn="section-1-3">
        Endeavoring to reduce the number of degradations in the future, implementers <bcp14>MUST NOT</bcp14> introduce bugs when writing software.
        This document outlines why bugs are considered harmful and proposes a set of recommendations.
      </t>
    </section>
    <section numbered="true" removeInRFC="false" toc="include" pn="section-2">
      <name slugifiedName="name-requirements-language">Requirements Language</name>
      <t indent="0" pn="section-2-1">
    The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>", "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> when, and only when, they appear in all capitals, as shown here. 
      </t>
    </section>
    <section numbered="true" removeInRFC="false" toc="include" pn="section-3">
      <name slugifiedName="name-examples-of-high-impact-sof">Examples of High-Impact Software Defects</name>
      <t indent="0" pn="section-3-1">
        In June 1996, the European Space Agency <xref target="ARIANE" format="default" sectionFormat="of" derivedContent="ARIANE"/> launched an unmanned rocket -- costing several billion dollars in development -- only to see it go <xref target="KABOOM" format="default" sectionFormat="of" derivedContent="KABOOM"/> 40 seconds after takeoff.
        A software exception had occurred during the execution of a data conversion from 64-bit floating point to 16-bit signed integer value.
	The floating point number that was converted had a value greater than what could be represented by a 16-bit signed integer.
	The vehicle probably would not have disintegrated if the defect had not been written into the software. 
      </t>
      <t indent="0" pn="section-3-2">
	As an example of the detrimental effects of bugs in physically hard to reach systems: the <xref target="NASA" format="default" sectionFormat="of" derivedContent="NASA"/> Deep Impact spacecraft <xref target="DEEPIMPACT" format="default" sectionFormat="of" derivedContent="DEEPIMPACT"/> was rendered inoperable due to a fault in the fault-protection software, which in turn triggered endless computer reboots.
	Mission control was unable to recover the system from this error condition because no engineers were available on-site.
	The commute was deemed infeasible due to a lack of reasonably priced commercial transport options in that region of the solar system.
      </t>
      <t indent="0" pn="section-3-3">
        In 1983, the Soviet Union's Early Warning Satellite System <xref target="Serpukhov" format="default" sectionFormat="of" derivedContent="Serpukhov"/> announced it had detected a possible missile launch originating in the US; fortunately, a human operator recognized this as a likely system failure.
        Indeed, a retrospective analysis suggested the software had misclassified reflections from cloud cover as missile launch blooms.
        With this bug, the software held the potential to trigger a cascading sequence of events that could've led to the start of a planetary-scale war.
        Seemingly innocuous software defects can have outsized impact, and sometimes it pays off to simply do nothing and wait. 
      </t>
      <t indent="0" pn="section-3-4">
        The US Department of Commerce's National Institute of Standards and Technology <xref target="NIST" format="default" sectionFormat="of" derivedContent="NIST"/> commissioned a study to develop a deeper understanding of the prevalence of software defects and their cost to society.
        The study estimated about 0.6 percent of the gross domestic product is squandered due to programming bugs.
        Each person works approximately one hour a week to compensate for this debt -- an hour that could've been spent in leisure -- in addition to any time spent on the direct consequences of buggy software.
      </t>
      <t indent="0" pn="section-3-5">
        The universal deployment of IP networks on <xref target="RFC1149" format="default" sectionFormat="of" derivedContent="RFC1149">Avian Carriers</xref> is facing a multi-decade delay.
        After operators discovered that birds are not real (now <xref target="confirmed" format="default" sectionFormat="of" derivedContent="confirmed"/> by the US Government), work began to first understand the many <xref target="quirks" format="default" sectionFormat="of" derivedContent="quirks"/> of the drones' firmware before proceeding with wider-scale deployment.
        No clear timelines exist at this point in time.
      </t>
      <t indent="0" pn="section-3-6">
        For more examples, consult the RISKS Digest <xref target="RISKS" format="default" sectionFormat="of" derivedContent="RISKS"/>: it documents a multitude of examples of defects in technological infrastructure and their risk to society.
        Unsupervised study of the Digest archive may induce a sense of panic.
      </t>
    </section>
    <section anchor="bcp" numbered="true" removeInRFC="false" toc="include" pn="section-4">
      <name slugifiedName="name-best-current-practises">Best Current Practises</name>
      <ol indent="adaptive" spacing="normal" start="1" type="1" pn="section-4-1">
          <li pn="section-4-1.1" derivedCounter="1.">Authors <bcp14>MUST NOT</bcp14> implement bugs.</li>
        <li pn="section-4-1.2" derivedCounter="2.">If bugs are introduced in code, they <bcp14>MUST</bcp14> be clearly documented.</li>
        <li pn="section-4-1.3" derivedCounter="3.">When implementing specifications that are broken by design, it is <bcp14>RECOMMENDED</bcp14> to aggregate multiple smaller bugs into one larger bug.
              This will be easier to document: rather than having a lot of hard-to-track inconsequential bugs, there will be only a few easy-to-recognise significant bugs.</li>
        <li pn="section-4-1.4" derivedCounter="4.">The aphorism "It's not a bug, it's a feature" is considered rude.</li>
        <li pn="section-4-1.5" derivedCounter="5.">Assume all external input is the result of (a series of) bugs. (Especially in machine-to-machine applications such as implementations of network protocols.)</li>
        <li pn="section-4-1.6" derivedCounter="6.">In fact, assume all internal inputs also are the result of bugs.</li>
      </ol>
    </section>
    <section anchor="security" numbered="true" removeInRFC="false" toc="include" pn="section-5">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t indent="0" pn="section-5-1">
        With the production of fewer bugs, there will necessarily be fewer security impacts.
        To improve the collective security posture, a thorough review of ALL existing software to find any remaining bugs is <bcp14>RECOMMENDED</bcp14>.
      </t>
      <t indent="0" pn="section-5-2">
        As it is assumed that there is an even distribution of bugs through all software, it is safe to consider any piece of software to be bug free once a certain number of bugs have been found.
      </t>
      <t indent="0" pn="section-5-3">
        Some philosophers argue in defense of an obviously wrong contrary view that bugs introduce a certain amount of unpredictable variance in behaviour, which in turn could serve to increase security.
        Such heretics might even go one step further and celebrate the existence of bugs, shielding issues from public scrutiny.
        However, it <xref target="ostensibly" format="default" sectionFormat="of" derivedContent="ostensibly"/> is in society's best interest to fully disclose any and all bugs as soon as they are discovered.
      </t>
    </section>
    <section anchor="iana" numbered="true" removeInRFC="false" toc="include" pn="section-6">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t indent="0" pn="section-6-1">
	IANA is assumed to operate flawlessly.
      </t>
    </section>
  </middle>
  <back>
    <references pn="section-7">
      <name slugifiedName="name-references">References</name>
      <references pn="section-7.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" quoteTitle="true" derivedAnchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t indent="0">In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" quoteTitle="true" derivedAnchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author initials="B." surname="Leiba" fullname="B. Leiba">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="May"/>
            <abstract>
              <t indent="0">RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references pn="section-7.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="ARIANE" target="https://www-users.cse.umn.edu/~arnold/disasters/ariane.html" quoteTitle="true" derivedAnchor="ARIANE">
          <front>
            <title>The Explosion of the Ariane 5</title>
            <author initials="D. N." surname="Arnold"/>
            <date year="2000" month="August"/>
          </front>
        </reference>
        <reference anchor="confirmed" target="https://twitter.com/USCPSC/status/1478794691634155523" quoteTitle="true" derivedAnchor="confirmed">
          <front>
            <title>Birds are real.</title>
            <author>
              <organization showOnFrontPage="true">US Consumer Product Safety Commission (@USCPSC)</organization>
            </author>
            <date year="2022" month="January" day="5"/>
          </front>
          <refcontent>Twitter</refcontent>
        </reference>
        <reference anchor="DEEPIMPACT" target="https://mm.icann.org/pipermail/tz/2013-September/020357.html" quoteTitle="true" derivedAnchor="DEEPIMPACT">
          <front>
            <title>Subject: Re: [tz] Deep Impact: wrong time zone?</title>
            <author initials="M" surname="Wallace"/>
            <date year="2013" month="September" day="23"/>
          </front>
          <refcontent>message to the tz@iana.org mailing list</refcontent>
        </reference>
        <reference anchor="incomplete" target="https://plato.stanford.edu/entries/goedel-incompleteness/" quoteTitle="true" derivedAnchor="incomplete">
          <front>
            <title>Gödel's Incompleteness Theorems</title>
            <author initials="P" surname="Raatikainen"/>
            <date year="2013" month="November"/>
          </front>
          <refcontent>Stanford Encyclopedia of Philosophy</refcontent>
        </reference>
        <reference anchor="IRTF" target="https://www.irtf.org/" quoteTitle="true" derivedAnchor="IRTF">
          <front>
            <title>Internet Research Task Force</title>
            <author>
              <organization showOnFrontPage="true">IRTF</organization>
            </author>
          </front>
        </reference>
        <reference anchor="KABOOM" target="https://theconversation.com/kapow-zap-splat-how-comics-make-sound-on-the-page-160455" quoteTitle="true" derivedAnchor="KABOOM">
          <front>
            <title>Kapow! Zap! Splat! How comics make sound on the page</title>
            <author initials="V. A." surname="Jure"/>
            <date year="2021" month="June" day="10"/>
          </front>
          <refcontent>The Conversation</refcontent>
        </reference>
        <reference anchor="NASA" target="https://www.nasa.gov/mission_pages/deepimpact/media/deepimpact20130920.html" quoteTitle="true" derivedAnchor="NASA">
          <front>
            <title>NASA's Deep Space Comet Hunter Mission Comes to an End</title>
            <author>
              <organization showOnFrontPage="true">NASA</organization>
            </author>
            <date year="2013" month="September"/>
          </front>
        </reference>
        <reference anchor="NIST" target="https://web.archive.org/web/20090610052743/http://www.nist.gov/public_affairs/releases/n02-10.htm" quoteTitle="true" derivedAnchor="NIST">
          <front>
            <title>Software Errors Cost U.S. Economy $59.5 Billion Annually</title>
            <author>
              <organization showOnFrontPage="true">NIST</organization>
            </author>
            <date year="2002" month="June"/>
          </front>
          <refcontent>Wayback Machine archive</refcontent>
        </reference>
        <reference anchor="ostensibly" target="http://dx.doi.org/10.2139/ssrn.531782" quoteTitle="true" derivedAnchor="ostensibly">
          <front>
            <title>A Model for When Disclosure Helps Security: What Is Different About Computer and Network Security?</title>
            <author initials="P" surname="Swire"/>
            <date year="2004" month="August"/>
          </front>
          <refcontent>3 Journal on Telecommunications and High Technology Law 163</refcontent>
        </reference>
        <reference anchor="quirks" target="https://www.wired.com/2015/01/whats-birds-bob-heads-walk/" quoteTitle="true" derivedAnchor="quirks">
          <front>
            <title>What's Up With That: Birds Bob Their Heads When They Walk</title>
            <author initials="N." surname="Stockton"/>
            <date year="2015" month="January"/>
          </front>
          <refcontent>WIRED</refcontent>
        </reference>
        <reference anchor="RFC1149" target="https://www.rfc-editor.org/info/rfc1149" quoteTitle="true" derivedAnchor="RFC1149">
          <front>
            <title>Standard for the transmission of IP datagrams on avian carriers</title>
            <author initials="D." surname="Waitzman" fullname="D. Waitzman">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1990" month="April"/>
            <abstract>
              <t indent="0">This memo describes an experimental method for the encapsulation of IP datagrams in avian carriers.  This specification is primarily useful in Metropolitan Area Networks.  This is an experimental, not recommended standard.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1149"/>
          <seriesInfo name="DOI" value="10.17487/RFC1149"/>
        </reference>
        <reference anchor="RISKS" target="https://catless.ncl.ac.uk/Risks/" quoteTitle="true" derivedAnchor="RISKS">
          <front>
            <title>The RISKS Digest</title>
            <author>
              <organization showOnFrontPage="true">ACM Committee on Computers and Public Policy</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="Serpukhov" target="https://www.wired.com/2007/09/dayintech-0926-2/" quoteTitle="true" derivedAnchor="Serpukhov">
          <front>
            <title>Sept. 26, 1983: The Man Who Saved the World by Doing ... Nothing</title>
            <author initials="T" surname="Long"/>
            <date year="2007" month="September"/>
          </front>
          <refcontent>WIRED</refcontent>
        </reference>
      </references>
    </references>
    <section numbered="true" removeInRFC="false" toc="include" pn="section-appendix.a">
      <name slugifiedName="name-future-research">Future Research</name>
      <t indent="0" pn="section-appendix.a-1">
         The existence of this very document of course begs the question: what are software defects, truly?
         Do bugs happen for a purpose?
         Is what we perceive as the concept of bugs an indication for a wider issue in the natural world?
         Do mistakes happen in other domains?
         Are they evidence of a superior software architect?
      </t>
      <t indent="0" pn="section-appendix.a-2">
         An interdisciplinary approach to understand mistakes might be an area of further study for the <xref target="IRTF" format="default" sectionFormat="of" derivedContent="IRTF"/>.
         It may very well turn out that mistakes are provably detrimental in all domains; however, the authors do not feel qualified to make any statements in this regard.
         Once made aware of the above thesis, research-oriented interest groups could perhaps take on the task of disproving Goedel's <xref target="incomplete" format="default" sectionFormat="of" derivedContent="incomplete">incompleteness theorem</xref>, and in doing so, put an end to all bugs.
      </t>
    </section>
    <section anchor="acknowledgements" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.b">
      <name slugifiedName="name-acknowledgements">Acknowledgements</name>
      <t indent="0" pn="section-appendix.b-1">
          The authors wish to thank <contact fullname="Bert Hubert"/>, <contact fullname="Peter van Dijk"/>, and <contact fullname="Saku Ytti"/> for pointing out the many errors Job introduced during the preparation of this document.
      </t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.c">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author fullname="Job Snijders" initials="J." surname="Snijders">
        <organization showOnFrontPage="true">Fastly</organization>
        <address>
          <postal>
            <street/>
            <code/>
            <city>Amsterdam</city>
            <country>Netherlands</country>
          </postal>
          <email>job@fastly.com</email>
        </address>
      </author>
      <author fullname="Chris Morrow" initials="C." surname="Morrow">
        <organization showOnFrontPage="true">Google</organization>
        <address>
          <postal>
            <street/>
            <code/>
            <city>Reston</city>
            <region>Virginia</region>
            <country>United States of America</country>
          </postal>
          <email>morrowc@ops-netman.net</email>
        </address>
      </author>
      <author fullname="Remco van Mook" initials="R." surname="van Mook">
        <organization showOnFrontPage="true">Asteroid</organization>
        <address>
          <postal>
            <street/>
            <code/>
            <city>Deventer</city>
            <country>Netherlands</country>
          </postal>
          <email>remco@asteroidhq.com</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
