Re: Requirements for Open IESG Positions

2007-07-24 Thread Sam Hartman
 Soininen == Soininen Jonne (NSN FI/Espoo) [EMAIL PROTECTED] writes:

Soininen Hi, I just happened to read this mail today. I don't
Soininen remember seeing such a mail during previous nomcom
Soininen rounds (they might have come, but I just didn't notice
Soininen them). I think this is a very good overview of the
Soininen requirements needed for the IESG positions and gives a
Soininen nice background to think about the people who would fit
Soininen the positions.

Soininen However, I think one of the areas is described a bit too
Soininen much in detail and perhaps give a wrong impression about
Soininen the job. The following extract is from the Security
Soininen Area:

 Specific expertise required for a Security AD includes strong
 knowledge of IETF security protocols.  To complement Tim Polk,
 the person selected as Security AD should have a working
 understanding of Kerberos, GSS-API, SASL, and how these relate
 to security protocols and to their use in applications and
 other security protocols.  A basic understanding of IPsec, IKE,
 TLS, PKI would also be useful.

Soininen I'm sure this is an oversight, but I think it is
Soininen generally not according the IETF process to specific
Soininen technologies and hard coding the division of work in
Soininen an area. To my understanding, the Ads in an area are
Soininen free to divide the work between themselves as they wish
Soininen according their strengths. So, if the a possible new
Soininen security AD would not be interested to look at these
Soininen technologies, perhaps Tim would look at them - according
Soininen the new division of work in the area.

I tend to agree that this is not an ideal practice, but it has been
going on for many years.  The set of technologies listed there are
things that I'm mostly doing these days with particular emphasis on
things Tim doesn't have as much experience with.  Last year, the
description focused on areas Russ had the most experience in.

It's kind of complicated to fix.  If you stuck two security ads in
with my experience or with Tim's experience it would not be ideal.


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Requirements for Open IESG Positions

2007-07-24 Thread Russ Housley

Done.

At 06:29 PM 7/23/2007, Brian E Carpenter wrote:

Also these descriptions have evolved from year to year
(there is a version in the IESG wiki too, at
http://www3.tools.ietf.org/group/iesg/trac/wiki/AreasDescription,
maybe the IESG should bring it up to date...)



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: Requirements for Open IESG Positions

2007-07-24 Thread Narayanan, Vidya
Some additional comments on the topic: 

In particular, taking the security area requirements as an example, the
description provided talks about expertise needed based on the current
ongoing work in the security area.  While this is one part, we want ADs
that can bring in/ evaluate new work which may or may not be related to
any of the ongoing work in the area.  Especially in the security area,
such relation to other work is very hard to predict.  

Personally, I don't think it is a requirement for an AD to have a deep
understanding of all the protocols produced by the area; rather, for the
security area, for example, I think it is important that the ADs are
capable of analyzing threat models and evaulating the security
implications of work happening in other areas, or have a sufficient
security background to grasp issues raised by experts of a certain
protocol, etc.  I think it is much less important that the AD has a
top-to-bottom understanding of TLS or Kerberos or IKEv2 or any one thing
in particular.  

I provided this input last year as well and I think it is very important
for us to select an area generalist as an AD over a specialist in a
particular set of protocols. 

Vidya 


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: Requirements for Open IESG Positions

2007-07-24 Thread Russ Housley
One important thing needs to be considered in the Security and OM 
Areas.  There are two ADs, and they are expected to have somewhat 
different skill sets.  For contrast, here are the requirements that 
were provided to NomCom2006 for these positions.


Russ

---
Operations  Management Area:

The primary technical areas covered by the Operations  Management
area include: Network Management, AAA, and various operational
issues facing the Internet such as DNS operations, IPv6 operations,
Routing operations.

Unlike most IETF areas, the Operations  Management area is logically
divided into two separate functions: Network Management and Operations.
David Kessens is currently responsible for the Operations portion
of the OPS area, so specific expertise required for the open
position would include a strong understanding of Internet operations,
as well as the ability to step into Network Management issues
when necessary.

The Operations AD is largely responsible for soliciting operator
feedback and input regarding IETF work.  This is a challenging task
that requires strong contacts in the operations community and a great
deal of persistence.

Another important role of the Operations AD is to identify potential
or actual operational issues regarding IETF protocols and documents in
all areas, and to work with the other areas to resolve those issues.
This requires a strong understanding of how new and updated protocols
may affect operations, and the ability to gather information from the
operations community and translate that information into suggestions
for protocol architecture and design within the IETF.  It also
requires a strong cross-area understanding of IETF protocol
architecture and technologies.

The Operations portion of the OPS area intersects most often with the
Routing, Internet and Security areas.  So, cross-area expertise in any
of those areas would be particularly useful.

---
Security Area:

The WGs within the Security Area are primarily focused on security
protocols.  They provide one or more of the security services:
integrity, authentication, non-repudiation, confidentiality, and
access control.  Since many of the security mechanisms needed to
provide these security services are cryptographic, key management is
also vital.

Security ADs are expected to ensure that all IETF specifications are
reviewed for adequate security coverage.  They also manage a set of
security resources that are available to most IETF areas and WGs.

Specific expertise required for a Security AD would include a
strong knowledge of IETF security protocols, particularly IPsec, IKE,
and TLS, and a good working knowledge of security protocols and
mechanisms that have been developed inside and outside the IETF, most
notably including PKI.

Also, a Security AD should understand how to weigh the security
requirements of a protocol against operational and implementation
requirements.  We must be pragmatic; otherwise people will not
implement and deploy the secure protocols that the IETF standardizes.

The Security Area intersects with all other IETF areas, and its ADs
are expected to read and understand the security implications of
documents in all areas.  So, broad knowledge of IETF technologies and
the ability to assimilate new information quickly are imperative for a
Security AD.

At 02:44 PM 7/24/2007, Narayanan, Vidya wrote:

Some additional comments on the topic:

In particular, taking the security area requirements as an example, the
description provided talks about expertise needed based on the current
ongoing work in the security area.  While this is one part, we want ADs
that can bring in/ evaluate new work which may or may not be related to
any of the ongoing work in the area.  Especially in the security area,
such relation to other work is very hard to predict.

Personally, I don't think it is a requirement for an AD to have a deep
understanding of all the protocols produced by the area; rather, for the
security area, for example, I think it is important that the ADs are
capable of analyzing threat models and evaulating the security
implications of work happening in other areas, or have a sufficient
security background to grasp issues raised by experts of a certain
protocol, etc.  I think it is much less important that the AD has a
top-to-bottom understanding of TLS or Kerberos or IKEv2 or any one thing
in particular.

I provided this input last year as well and I think it is very important
for us to select an area generalist as an AD over a specialist in a
particular set of protocols.

Vidya


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Requirements for Open IESG Positions

2007-07-24 Thread Jari Arkko
Sam, Jonne,

Its important to find the right balance between getting
someone who fits exactly the current situation and getting
someone who is the best candidate in a more long term
view.

The ADs in an area need to have an excellent understanding
of the technology the area deals with. Typically, no one
covers everything that we work in an area, so you end
up wanting to have a pair that complements each other.

Having said that, when a new BOF proposal comes in,
you may learn that you suddenly need some new expertise.
We also don't know how long the other AD in the
pair continues to be in that position. Typically at least a year
(given the cycles are on alternating years), but resignations
and movements to other positions have been known to happen.
And the two ADs can change how they divide the area
between themselves. And there are different approaches
to managing an area. Generalist vs.  specialist, for instance.
And you can use experts, directorates,  etc. to help you in
topics that you are not sufficiently good expert in.

(I also thought that the SEC requirements were a bit
too specific this year.)

Jari


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Requirements for Open IESG Positions

2007-07-24 Thread Sam Hartman
 Jari == Jari Arkko [EMAIL PROTECTED] writes:

Jari (I also thought that the SEC requirements were a bit too
Jari specific this year.)

They are no more specific this year than they have been in the past.
The only change is that they were at least specific in a direction
that would actually compliment the sitting AD.

I personally have never liked the way the security AD requirements
were stated.


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Requirements for Open IESG Positions

2007-07-24 Thread Jari Arkko
Sam,

 They are no more specific this year than they have been in the past.
   

Ok -- I did not re-read the ones from past years. Just reacting on
the current text.

 The only change is that they were at least specific in a direction
 that would actually compliment the sitting AD.
   

That's fine.

 I personally have never liked the way the security AD requirements
 were stated.
   
Hmm. Ok. Perhaps we should consider stating them in
a better way then?

Jari


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Requirements for Open IESG Positions

2007-07-24 Thread Soininen Jonne (NSN FI/Espoo)
Hi,

I agree with Vidya. To be honest, I really thought this was an oversight and
not intentional. 

If the Security area has a similar split as the OM area, I think this
really should be discussed. To my understanding, we don't have such split
documented to any other area and I think this kind of hard split should be
discussed. Perhaps the split is right and I just wasn't aware of it.
However, it seems other people were unaware of the split as well.

BTW, are the explicit technologies Kerberos, GSS-API, and SASL representing
the other half of the area. I'm asking, because I'm not a security expert
and not active in the security area.

Cheers,

Jonne.
On 7/25/07 1:12 AM, ext Narayanan, Vidya [EMAIL PROTECTED] wrote:

 I thought the requirements were too specific for the SEC area last year
 as well :) I do realize that the text has been largely reused from last
 year, but, I think we need to revisit some of these specific
 descriptions.  
 
 We cannot expect the Nomcom to be familiar enough with all areas to use
 their judgment in addition to the requirements received.  I think we
 need to get better at providing the requirements so that the Nomcom will
 really know what they are looking for in candidates.
 
 At the moment, I really think the SEC area requirements are misleading
 to the Nomcom and can use a revision.
 
 Vidya 
 
 -Original Message-
 From: Russ Housley [mailto:[EMAIL PROTECTED]
 Sent: Tuesday, July 24, 2007 2:01 PM
 To: Narayanan, Vidya
 Cc: ietf@ietf.org
 Subject: RE: Requirements for Open IESG Positions
 
 One important thing needs to be considered in the Security
 and OM Areas.  There are two ADs, and they are expected to
 have somewhat different skill sets.  For contrast, here are
 the requirements that were provided to NomCom2006 for these positions.
 
 Russ
 
 ---
 Operations  Management Area:
 
 The primary technical areas covered by the Operations 
 Management area include: Network Management, AAA, and various
 operational issues facing the Internet such as DNS
 operations, IPv6 operations, Routing operations.
 
 Unlike most IETF areas, the Operations  Management area is
 logically divided into two separate functions: Network
 Management and Operations.
 David Kessens is currently responsible for the Operations
 portion of the OPS area, so specific expertise required for
 the open position would include a strong understanding of
 Internet operations, as well as the ability to step into
 Network Management issues when necessary.
 
 The Operations AD is largely responsible for soliciting
 operator feedback and input regarding IETF work.  This is a
 challenging task that requires strong contacts in the
 operations community and a great deal of persistence.
 
 Another important role of the Operations AD is to identify
 potential or actual operational issues regarding IETF
 protocols and documents in all areas, and to work with the
 other areas to resolve those issues.
 This requires a strong understanding of how new and updated
 protocols may affect operations, and the ability to gather
 information from the operations community and translate that
 information into suggestions for protocol architecture and
 design within the IETF.  It also requires a strong cross-area
 understanding of IETF protocol architecture and technologies.
 
 The Operations portion of the OPS area intersects most often
 with the Routing, Internet and Security areas.  So,
 cross-area expertise in any of those areas would be
 particularly useful.
 
 ---
 Security Area:
 
 The WGs within the Security Area are primarily focused on
 security protocols.  They provide one or more of the security
 services:
 integrity, authentication, non-repudiation, confidentiality,
 and access control.  Since many of the security mechanisms
 needed to provide these security services are cryptographic,
 key management is also vital.
 
 Security ADs are expected to ensure that all IETF
 specifications are reviewed for adequate security coverage.
 They also manage a set of security resources that are
 available to most IETF areas and WGs.
 
 Specific expertise required for a Security AD would include a
 strong knowledge of IETF security protocols, particularly
 IPsec, IKE, and TLS, and a good working knowledge of security
 protocols and mechanisms that have been developed inside and
 outside the IETF, most notably including PKI.
 
 Also, a Security AD should understand how to weigh the
 security requirements of a protocol against operational and
 implementation requirements.  We must be pragmatic; otherwise
 people will not implement and deploy the secure protocols
 that the IETF standardizes.
 
 The Security Area intersects with all other IETF areas, and
 its ADs are expected to read and understand the security
 implications of documents in all areas.  So, broad knowledge
 of IETF technologies and the ability to assimilate new
 information

Re: Requirements for Open IESG Positions

2007-07-23 Thread Soininen Jonne (NSN FI/Espoo)
Hi,

I just happened to read this mail today. I don't remember seeing such a mail
during previous nomcom rounds (they might have come, but I just didn't
notice them). I think this is a very good overview of the requirements
needed for the IESG positions and gives a nice background to think about the
people who would fit the positions.

However, I think one of the areas is described a bit too much in detail and
perhaps give a wrong impression about the job. The following extract is from
the Security Area:

 Specific expertise required for a Security AD includes strong knowledge
 of IETF security protocols.  To complement Tim Polk, the person selected
 as Security AD should have a working understanding of Kerberos, GSS-API,
 SASL, and how these relate to security protocols and to their use in
 applications and other security protocols.  A basic understanding of
 IPsec, IKE, TLS, PKI would also be useful.

I'm sure this is an oversight, but I think it is generally not according the
IETF process to specific technologies and hard coding the division of work
in an area. To my understanding, the Ads in an area are free to divide the
work between themselves as they wish according their strengths. So, if the a
possible new security AD would not be interested to look at these
technologies, perhaps Tim would look at them - according the new division of
work in the area.

In addition, I think it is a bit shaky to mention the current AD in this
context even when the person is not up. Theoretically (I don't know if this
has ever happened outside the creation of the RAI area), that AD could be
moved to the IAB or another position in the IESG. So, it is not 100% sure
that Tim would be continuing as the other security AD though probable.

However, thanks for this clarification I think it is very useful.

Cheers,

Jonne.



On 7/20/07 9:12 AM, ext Lakshminath Dondeti [EMAIL PROTECTED] wrote:

 RFC 3777 says the following about the qualifications required for open
 IESG/IAB positions:
 
   The IESG and IAB are responsible for providing summary of the
   expertise desired of the candidates selected for their
   respective open positions to the Executive Director.  The
   summaries are provided to the nominating committee for its
   consideration.
 
2. The nominating committee selects candidates based on its
   understanding of the IETF community's consensus of the
   qualifications required and advises each confirming body of its
   respective candidates.
 
 The following is the information provided by the IESG to the nomcom.
 The nomcom is now accepting the community's input on the qualifications
 required for the open IESG positions.  Please send your notes, either as
 commentary on the following or independent notes to [EMAIL PROTECTED]
 
 Thank you.
 
 best regards,
 Lakshminath
 
 
 
 This note describes the expertise desired in the candidates selected to
 fill the positions of the IESG members whose terms will expire during the
 first IETF Meeting in 2008.
 
 Under the Nominations Committee (NomCom) procedures defined in RFC 3777,
 the IESG is responsible for providing a summary of the expertise desired
 of the candidates selected for open IESG positions. This information is
 included below, and is suitable for publication to the community, along
 with the NomCom request for nominations.
 
 We realize that this is a long list of demanding qualifications, and that
 no one person will be able meet all of the requirements for a specific
 position.  We trust that the NomCom will weigh all of these
 qualifications and choose IESG members who represent the best possible
 balance of these qualifications.
 
 
 GENERIC REQUIREMENTS
 
 IESG members are the managers of the IETF standards process. They they
 must understand the way the IETF works, be good at working with other
 people, be able to inspire and encourage other people to work together as
 volunteers, and have sound technical judgment about IETF technology and
 its relationship to technology developed elsewhere.
 
 Area Directors (ADs) select and directly manage the Working Group (WG)
 chairs, so IESG members should possess sufficient interpersonal and
 management skills to manage 15 to 30 part-time people.  Most ADs are also
 responsible for one or more directorate or review teams.  The ability to
 identify good leaders and technical experts, and then recruit them for
 IETF work is important. Having been a WG chair helps understand the WG
 chair role, and it will help when trying to resolve problems and issues
 that a WG chair may have.
 
 In addition, all IESG members should have strong technical expertise that
 crosses two or three IETF areas.  Ideally, an IESG member would have made
 significant technical contributions in more than one IETF area,
 preferably authoring documents and/or chairing WGs in more than one area.
 (ADs are expected to personally review every Internet-Draft that they
 

Re: Requirements for Open IESG Positions

2007-07-23 Thread Brian E Carpenter

Jonne,

On 2007-07-24 01:10, Soininen Jonne (NSN FI/Espoo) wrote:

Hi,

I just happened to read this mail today. I don't remember seeing such a mail
during previous nomcom rounds (they might have come, but I just didn't
notice them).


You didn't notice them :-)
Also these descriptions have evolved from year to year
(there is a version in the IESG wiki too, at
http://www3.tools.ietf.org/group/iesg/trac/wiki/AreasDescription,
maybe the IESG should bring it up to date...)



I think this is a very good overview of the requirements
needed for the IESG positions and gives a nice background to think about the
people who would fit the positions.

However, I think one of the areas is described a bit too much in detail and
perhaps give a wrong impression about the job. The following extract is from
the Security Area:


Specific expertise required for a Security AD includes strong knowledge
of IETF security protocols.  To complement Tim Polk, the person selected
as Security AD should have a working understanding of Kerberos, GSS-API,
SASL, and how these relate to security protocols and to their use in
applications and other security protocols.  A basic understanding of
IPsec, IKE, TLS, PKI would also be useful.


I'm sure this is an oversight, but I think it is generally not according the
IETF process to specific technologies and hard coding the division of work
in an area. To my understanding, the Ads in an area are free to divide the
work between themselves as they wish according their strengths. So, if the a
possible new security AD would not be interested to look at these
technologies, perhaps Tim would look at them - according the new division of
work in the area.


If you look at the description for the OM area you will also surely find it
very specific to half the area. I think it's realistic to do this. I don't
object to it.


In addition, I think it is a bit shaky to mention the current AD in this
context even when the person is not up. 


My personal taste would also be not to mention the co-AD by name.


Theoretically (I don't know if this
has ever happened outside the creation of the RAI area), that AD could be
moved to the IAB or another position in the IESG. So, it is not 100% sure
that Tim would be continuing as the other security AD though probable.


True, but that would then invoke the mid-term replacement process
for the person being moved - and it *has* happened.

   Brian

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Requirements for Open IESG Positions

2007-07-23 Thread Soininen Jonne (NSN FI/Espoo)
Hi Brian,


On 7/24/07 2:29 AM, ext Brian E Carpenter [EMAIL PROTECTED]
wrote:

 Jonne,
 
 On 2007-07-24 01:10, Soininen Jonne (NSN FI/Espoo) wrote:
 Hi,
 
 I just happened to read this mail today. I don't remember seeing such a mail
 during previous nomcom rounds (they might have come, but I just didn't
 notice them).
 
 You didn't notice them :-)
 Also these descriptions have evolved from year to year
 (there is a version in the IESG wiki too, at
 http://www3.tools.ietf.org/group/iesg/trac/wiki/AreasDescription,
 maybe the IESG should bring it up to date...)

You mean there is e-mail in my inbox I haven't read? ;)
 
 
 I think this is a very good overview of the requirements
 needed for the IESG positions and gives a nice background to think about the
 people who would fit the positions.
 
 However, I think one of the areas is described a bit too much in detail and
 perhaps give a wrong impression about the job. The following extract is from
 the Security Area:
 
 Specific expertise required for a Security AD includes strong knowledge
 of IETF security protocols.  To complement Tim Polk, the person selected
 as Security AD should have a working understanding of Kerberos, GSS-API,
 SASL, and how these relate to security protocols and to their use in
 applications and other security protocols.  A basic understanding of
 IPsec, IKE, TLS, PKI would also be useful.
 
 I'm sure this is an oversight, but I think it is generally not according the
 IETF process to specific technologies and hard coding the division of work
 in an area. To my understanding, the Ads in an area are free to divide the
 work between themselves as they wish according their strengths. So, if the a
 possible new security AD would not be interested to look at these
 technologies, perhaps Tim would look at them - according the new division of
 work in the area.
 
 If you look at the description for the OM area you will also surely find it
 very specific to half the area. I think it's realistic to do this. I don't
 object to it.

I think the OM area(s) is a bit different. Here there are three specific
technologies mentioned whereas in OM area there are two quite different
areas. There is perhaps not a such a clear division of task (like there
isn't in other areas either).

However, like I said this is most probably just an oversight.

 
 In addition, I think it is a bit shaky to mention the current AD in this
 context even when the person is not up.
 
 My personal taste would also be not to mention the co-AD by name.
 
 Theoretically (I don't know if this
 has ever happened outside the creation of the RAI area), that AD could be
 moved to the IAB or another position in the IESG. So, it is not 100% sure
 that Tim would be continuing as the other security AD though probable.
 
 True, but that would then invoke the mid-term replacement process
 for the person being moved - and it *has* happened.

Cheers,

Jonne.

 
 Brian

-- 
Jonne Soininen
Nokia Siemens Networks

Tel: +358 40 527 46 34
E-mail: [EMAIL PROTECTED]



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Requirements for Open IESG Positions

2007-07-20 Thread Lakshminath Dondeti

RFC 3777 says the following about the qualifications required for open
IESG/IAB positions:

 The IESG and IAB are responsible for providing summary of the
 expertise desired of the candidates selected for their
 respective open positions to the Executive Director.  The
 summaries are provided to the nominating committee for its
 consideration.

  2. The nominating committee selects candidates based on its
 understanding of the IETF community's consensus of the
 qualifications required and advises each confirming body of its
 respective candidates.

The following is the information provided by the IESG to the nomcom.
The nomcom is now accepting the community's input on the qualifications
required for the open IESG positions.  Please send your notes, either as
commentary on the following or independent notes to [EMAIL PROTECTED]

Thank you.

best regards,
Lakshminath



This note describes the expertise desired in the candidates selected to
fill the positions of the IESG members whose terms will expire during the
first IETF Meeting in 2008.

Under the Nominations Committee (NomCom) procedures defined in RFC 3777,
the IESG is responsible for providing a summary of the expertise desired
of the candidates selected for open IESG positions. This information is
included below, and is suitable for publication to the community, along
with the NomCom request for nominations.

We realize that this is a long list of demanding qualifications, and that
no one person will be able meet all of the requirements for a specific
position.  We trust that the NomCom will weigh all of these
qualifications and choose IESG members who represent the best possible
balance of these qualifications.


GENERIC REQUIREMENTS

IESG members are the managers of the IETF standards process. They they
must understand the way the IETF works, be good at working with other
people, be able to inspire and encourage other people to work together as
volunteers, and have sound technical judgment about IETF technology and
its relationship to technology developed elsewhere.

Area Directors (ADs) select and directly manage the Working Group (WG)
chairs, so IESG members should possess sufficient interpersonal and
management skills to manage 15 to 30 part-time people.  Most ADs are also
responsible for one or more directorate or review teams.  The ability to
identify good leaders and technical experts, and then recruit them for
IETF work is important. Having been a WG chair helps understand the WG
chair role, and it will help when trying to resolve problems and issues
that a WG chair may have.

In addition, all IESG members should have strong technical expertise that
crosses two or three IETF areas.  Ideally, an IESG member would have made
significant technical contributions in more than one IETF area,
preferably authoring documents and/or chairing WGs in more than one area.
(ADs are expected to personally review every Internet-Draft that they
sponsor.  For other Internet-Drafts, ADs must be satisified that adequate
review has taken place.)

It is very helpful for an IESG member to have a good working knowledge of
the IETF document process and WG creation and chartering process. This
knowledge is most likely to be found in experienced IETF WG chairs, but
may also be found in authors of multiple documents.

IESG members must also have strong verbal and written communications
skills.  They must have a proven track record of leading and contributing
to the consensus of diverse groups.

IESG members must deal with many technical topics, so a strong technical
background is required, but an IESG members should also have strong
management and communication skills. An IESG member should guide WGs to
follow their charters and nurture new talent to fulfil IETF leadership
roles in the future.


A FEW COMMENTS ON THE IESG ROLE

Serving on the IESG requires a substantial time commitment.  The basic
IESG activities consume between 25 and 40 hours per week (varying by area
and by month, with the most time required immediately before IETF
meetings).  Most IESG members also participate in additional IETF
leadership activities, further increasing the time commitment for those
individuals.  Even if they do not occupy formal liaison positions, ADs
may also need to interact with external bodies such as other standards
development organizations (SDOs), which may require travel. It is also
imperative that IESG members attend all IETF meetings (typically arriving
one or two days early) and attend one, and sometimes two, IESG retreats
per year.

Because of the large time and travel commitments, employer support for a
full two year term is essential. Because of personal impact, including
awkwardly timed conference calls, an IESG member's family must also be
supportive.


APPLICATIONS AREA

The Applications Area has historically focused on three clusters of
protocols. The first cluster contains application protocols 

Re: [Fwd: Requirements for Open IESG Positions]

2005-11-19 Thread Alexey Melnikov

Ralph Droms wrote:


The Applications Area most often intersects with, and sometimes swaps
working groups or work items with, the Security Area (for
application-level security, or applications where security is an
important aspect) and the Transport Area (for issues with congestion
in applications), so cross-area expertise in either of these areas
would be particularly useful.

Presumably requirements for different areas should be symmetrical: RAI 
and Transport both intersect with Application Area, so Application 
should mentioned RAI as well.




 




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


[Fwd: Requirements for Open IESG Positions]

2005-11-11 Thread Ralph Droms

Under the Nominations Committee procedures defined in RFC 3777,
the IESG is responsible for providing a summary of the expertise
desired of the candidates selected for open IESG positions. This
information is included below, and is suitable for publication
to the community, along with the Nomination Committee's request for
nominations.

We realize that this is a long list of demanding qualifications, and
that no one person will be able meet all of the requirements for a
specific position.  We trust that the NomCom will weigh all of these
qualifications and choose IESG members who represent the best possible
balance of these qualifications.

Generic Requirements:

IESG members are the managers of the IETF standards process. This
means that they must understand the way the IETF works, be good at
working with other people, be able to inspire and encourage other
people to work together on a volunteer basis, and have sound technical
judgment about IETF technology and its relationship to technology
developed elsewhere.

ADs select and directly manage the WG chairs, so IESG members should
possess sufficient interpersonal and management skills to manage
~15-30 part-time people.  Most ADs are also responsible for one or
more directorates or review teams.  So the ability to identify good
leaders and technical experts and recruit them for IETF work is
required. Having been a WG chair helps in understanding the WG chair
role, and will help in resolving problems and issues that a WG chair
may have.

In addition, all IESG members should have strong technical expertise
that crosses two or three IETF areas.  Ideally, an IESG member would
have made significant technical contributions in more than one IETF
area, preferably authoring documents and/or chairing WGs in more than
one area.

IESG members are expected to make sure that every document coming
before the IESG is properly reviewed.  Although IESG members may
delegate the actual review to individuals or review teams, the IESG
members will need to understand and represent the reviewers'
objections or comments. So the ability and willingness to read and
understand complex information quickly is another important attribute
in an IESG member. (Note that this does not mean that every AD
must review every draft personally - but they must be satisified
that adequate review has taken place.)

It is helpful for an IESG member to have a good working knowledge of
the IETF document process and WG creation and chartering process.
This knowledge is most likely to be found in experienced IETF WG
chairs, but may also be found in authors of multiple documents.

IESG members must also have strong verbal and written communications
skills and a proven track record of leading and contributing to the
consensus of diverse groups.

A few comments on the IESG role:

Serving on the IESG requires a substantial time commitment.  The basic
IESG activities consume between 25 and 40 hours per week (varying by
area and by month, with the most time required immediately before IETF
meetings).  Most IESG members also participate in additional IETF
leadership activities, further increasing the time commitment for
those individuals.  Even if they do not occupy formal liaison
positions, ADs may also need to interact with external bodies such
as other standards organizations, which may require travel. It is
also imperative that IESG members attend all IETF meetings and up
to two additional IESG retreats per year.

Because of the large time and travel commitments, employer support for
a full two year stint is essential for an IESG member. Because of
personal impact including awkwardly timed conference calls, an IESG
member's family must also be supportive.

---
Applications Area:

The Applications Area focuses on applications that run across the
Internet and require some sort of standardized infrastructure to be
effective.  This includes, but is not limited to: E-Mail, Web protocols,
Directory services, printing services and NetNews.

The Applications area often discusses whether something is properly
the realm of the IETF or belongs to other organizations.  Because of
this, and Applications AD needs to be willing and able to relate to a
wide range of non-IETF organizations.  An Applications AD also needs
to be someone that we can trust to make these critical decisions about
the scope of the IETF's work.

Because of the breadth of the Applications area, an Application AD
will have to deal with a large set of Internet applications protocols,
including many with which he or she may not have direct experience.
So, an Applications AD needs to be good at evaluating new approaches
to new problems and assessing the expertise of the people who bring
them to the IETF

Because the set of people in the Applications Area changes with the
protocols currently under development, the ability to clearly explain
how the IETF works, and to help new WGs work well within the IETF