I am hoping to get this done in time for IETF 59, but with current workload here at the IETF, I am going to aim for 60.
Something else to add to the list: make software available for popular OS's that help the NOC team document the problems. For example, it would be grand if I could tell you which MAC just hijacked my network connection and turned it into a peer-to-peer connection. The software should be available for Win2K and later, as well as OS X. I suspect that the software is already available for Linux and BSD; all you need is instructions on which commands to use to get the data that is valuable to the NOC.
--Paul Hoffman, Director --Internet Mail Consortium