Internet DRAFT - draft-klensin-chair-empowerment

draft-klensin-chair-empowerment







Network Working Group                                         J. Klensin
Internet-Draft                                              May 22, 2006
Expires: November 23, 2006


    Enabling the IESG Chair to Resolve Personality or Other Problems
                draft-klensin-chair-empowerment-00.txt

Status of this Memo

   By submitting this Internet-Draft, each author represents that any
   applicable patent or other IPR claims of which he or she is aware
   have been or will be disclosed, and any of which he or she becomes
   aware will be disclosed, in accordance with Section 6 of BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on November 23, 2006.

Copyright Notice

   Copyright (C) The Internet Society (2006).

Abstract

   From time to time, there have been complaints about internal
   conflicts within the IESG that have retarded projects.  Some IETF
   Chairs have expressed frustration about not being able to resolve the
   problems and several members of the community have expressed
   frustration that the Chairs cannot do so.  The recall process has not
   been effective in either dealing with or deterring these problems.
   This document proposes, as a process experiment, an alternate model
   whose intent is to give the Chair some leverage on solving any such
   problems that may arise in the future.



Klensin                 Expires November 23, 2006               [Page 1]

Internet-Draft              Chair Empowerment                   May 2006


Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . . . 3
   2.  Mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
   3.  Protection Against Abuse  . . . . . . . . . . . . . . . . . . . 3
   4.  Experimental Evaluation . . . . . . . . . . . . . . . . . . . . 4
   5.  Some Questions and Answers  . . . . . . . . . . . . . . . . . . 4
   6.  Security Considerations . . . . . . . . . . . . . . . . . . . . 5
   7.  IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 5
   8.  Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . 5
   9.  References  . . . . . . . . . . . . . . . . . . . . . . . . . . 5
     9.1.  Normative References  . . . . . . . . . . . . . . . . . . . 5
     9.2.  Informative References  . . . . . . . . . . . . . . . . . . 5
   Author's Address  . . . . . . . . . . . . . . . . . . . . . . . . . 6
   Intellectual Property and Copyright Statements  . . . . . . . . . . 7




































Klensin                 Expires November 23, 2006               [Page 2]

Internet-Draft              Chair Empowerment                   May 2006


1.  Introduction

   From time to time, there have been complaints about internal
   conflicts within the IESG that have retarded projects.  Some IETF
   Chairs have expressed frustration about not being able to resolve the
   problems and several members of the community have expressed
   frustration that the Chairs cannot do so.  The recall process has not
   been effective in either dealing with or deterring these problems.
   This document proposes, as a process experiment, an alternate model
   whose intent is to give the Chair some leverage on solving any such
   problems that may arise in the future.

   The difficulty with any mechanism that gives a Chair authority to
   discipline or remove a member of the body is how one prevents abuse.
   The model used here does not give the Chair that authority but rather
   permits the Chair to identify a difficulty so severe that an
   independent body, the Nomcom, must deal with it, either by removing
   and replacing the member involved or by removing and replacing the
   Chair.


2.  Mechanism

   The IETF Chair may, at any time, present the Nomcom Chair with a
   complaint against an IESG member.  This sets the following process in
   motion.

   1.  The Nomcom reviews the complaint and, just as it does when making
       normal selections, solicits and evaluates input from the
       community.  The evaluation is not only of the complaint but of
       the general behavior of the subject IESG member and of the IETF
       Chair.

   2.  When this evaluation is complete, the Nomcom announces a vacancy
       in either the subject IESG member's position or in the position
       of IETF Chair and then proceeds to fill that vacancy according to
       normal rules then in effect.


3.  Protection Against Abuse

   The reader should note that the procedure outlined above is a "him
   (or her) or me" procedure, not a "Chair gets to fire people" one.  It
   gives the Chair authority and responsibility to diagnose and resolve
   personality conflicts and behavior that is preventing the IESG from
   getting work done.  The complaint to the Nomcom effectively creates a
   vacancy: by initiating it, the IETF Chair puts his or her own
   position on the line.  Presumably an IETF Chair who abuses the



Klensin                 Expires November 23, 2006               [Page 3]

Internet-Draft              Chair Empowerment                   May 2006


   mechanism will be removed instead of the subject AD.  The conflict
   will be resolved in any event.

   Note that this procedure has no impact on the recall procedure: it
   remains available to the community as specified in other documents.


4.  Experimental Evaluation

   As with the conventional recall procedure, if a mechanism of this
   type is ever used, there is already a problem within the IETF that
   fairly drastic mechanisms must be used to resolve it.  Like the
   recall procedure, this mechanism serves its purpose best when it acts
   to deter bad behavior, rather than being used as a last-resort
   remedy.  On the other hand, the recall mechanism is so drastic and
   time-consuming that it has not been used even when personality and
   stylistic conflicts have developed that have essentially paralyzed
   the IESG, with the individuals involved having no real incentives to
   figure out how to work together.  The availability of this procedure
   is expected to give individuals strong incentives to work around
   problems and work effectively together.

   The consequence of this model is that there will probably be no way
   to evaluate the procedure other than subjectively.  Certainly one
   would not expect it to be used twice in a fairly short period of
   time.  If it is used, the community will be able to evaluate the
   consequences of using it.  If it is not used, the community may be
   able to evaluate whether its existence staved off ongoing bad
   behavior or whether its existence as a standby mechanism caused harm.


5.  Some Questions and Answers

   Preliminary discussions leading up to this specification identified a
   number of questions that were asked repeatedly.  This section
   identifies those questions and responses, in question and answer
   form.

   Q: Why can only the Chair initiate this procedure?  Wouldn't it be
      better to let any IESG member initiate it?
   A: Part of the intent is to give the Chair a tool to manage an out-
      of-control IESG and the responsibility (presumably enforced only
      by the Nomcom or the recall procedure) to do so.  If different
      IESG members were able to use it on each other, there is too much
      risk of abuse or repeated invocations,






Klensin                 Expires November 23, 2006               [Page 4]

Internet-Draft              Chair Empowerment                   May 2006


   Q: Why isn't this mechanism available to the IAB Chair, or other
      group leaders, as well?
   A: It seemed less necessary and hence better to limit the scope of
      the experiment.  The model is easily extended to other groups and
      positions if the community decides it is desirable to do so.

   Q: Couldn't an IETF Chair use this procedure to systematically
      eliminate IESG members with whom he or she did not get along?"
   A: Only if the Nomcom permitted it.  Logic and an understanding of
      human nature suggests that a Nomcom would respond to an IETF Chair
      who apparently was taking an "everyone here is a problem other
      than me" position by replacing that person, immediately
      eliminating the problem and sending a message to the selected
      successor,


6.  Security Considerations

   This document specifies an IETF procedure.  It has no specific
   security implications.


7.  IANA Considerations

   This document requires no actions by the IANA.


8.  Acknowledgments

   [[anchor8: ...  To be supplied ...]]


9.  References

9.1.  Normative References

   [RFC2026]  Bradner, S., "The Internet Standards Process -- Revision
              3", BCP 9, RFC 2026, October 1996.

9.2.  Informative References











Klensin                 Expires November 23, 2006               [Page 5]

Internet-Draft              Chair Empowerment                   May 2006


Author's Address

   John C Klensin
   1770 Massachusetts Ave, #322
   Cambridge, MA  02140
   USA

   Phone: +1 617 491 5735
   Email: john-ietf@jck.com










































Klensin                 Expires November 23, 2006               [Page 6]

Internet-Draft              Chair Empowerment                   May 2006


Intellectual Property Statement

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at
   ietf-ipr@ietf.org.


Disclaimer of Validity

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.


Copyright Statement

   Copyright (C) The Internet Society (2006).  This document is subject
   to the rights, licenses and restrictions contained in BCP 78, and
   except as set forth therein, the authors retain all their rights.


Acknowledgment

   Funding for the RFC Editor function is currently provided by the
   Internet Society.




Klensin                 Expires November 23, 2006               [Page 7]