<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" ipr="trust200902" number="9948" docName="draft-alvestrand-protocol-police-00" category="info" updates="" obsoletes="" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" xml:lang="en" prepTime="2026-04-01T12:59:32" indexInclude="true" scripts="Common,Latin" tocDepth="3">
  <link href="https://datatracker.ietf.org/doc/draft-alvestrand-protocol-police-00" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc9948" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="IPP Schedule of Punishments">Internet Protocol Police (IPP) - Schedule of Punishments</title>
    <seriesInfo name="RFC" value="9948" stream="independent"/>
    <author fullname="Graham Reuben Beard" initials="G.R." surname="Beard">
      <organization showOnFrontPage="true">Internet Protocol Police</organization>
      <address>
        <email>greybeard@stupid.domain.name</email>
      </address>
    </author>
    <author fullname="Oldham F. Art" initials="O.F." surname="Art">
      <organization showOnFrontPage="true">Internet Protocol Police</organization>
      <address>
        <email>oldfart@stupid.domain.name</email>
      </address>
    </author>
    <author fullname="Harald T. Alvestrand" initials="H" surname="Alvestrand" role="editor">
      <organization showOnFrontPage="true">Google</organization>
      <address>
        <email>harald@alvestrand.no</email>
      </address>
    </author>
    <date month="04" year="2026" day="1"/>
    <keyword>internet protocol police</keyword>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">The Internet Protocol Police (IPP) is in charge of punishing willful infractions of the
Collected Wisdom of the IETF community.
      This document sets out the schedule of punishments for such infractions.</t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This document is not an Internet Standards Track specification; it is
            published for informational purposes.
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This is a contribution to the RFC Series, independently of any
            other RFC stream.  The RFC Editor has chosen to publish this
            document at its discretion and makes no statement about its value
            for implementation or deployment.  Documents approved for
            publication by the RFC Editor are not candidates for any level of
            Internet Standard; see Section 2 of RFC 7841.
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc9948" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2026 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-conventions-and-definitions">Conventions and Definitions</xref></t>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-schedule-of-punishments">Schedule of Punishments</xref></t>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-percussive-persuasion-durin">Percussive Persuasion During Protocol Development</xref></t>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-recidivism-studies">Recidivism Studies</xref></t>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.8">
            <t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="8" format="counter" sectionFormat="of" target="section-8"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.8.2">
              <li pn="section-toc.1-1.8.2.1">
                <t indent="0" pn="section-toc.1-1.8.2.1.1"><xref derivedContent="8.1" format="counter" sectionFormat="of" target="section-8.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.8.2.2">
                <t indent="0" pn="section-toc.1-1.8.2.2.1"><xref derivedContent="8.2" format="counter" sectionFormat="of" target="section-8.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.9">
            <t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.a"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgments">Acknowledgments</xref></t>
          </li>
          <li pn="section-toc.1-1.10">
            <t indent="0" pn="section-toc.1-1.10.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" removeInRFC="false" toc="include" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1">The Internet Protocol Police (IPP) <xref target="RFC8962" format="default" sectionFormat="of" derivedContent="RFC8962"/> has long served
as an unifying force for maintaining the Internet Architectural Principles and
the Rules of Sanity. The IPP has a harsh schedule for punishing infractions
of these Principles and Rules. The schedule has served the IETF community
well being applied in an informal manner, but the community has complained
that the punishments are served indiscriminately and unaccountably. Therefore,
this document publishes the schedule for the enlightenment of everyone in the
IETF community, especially newcomers.
</t>
    </section>
    <section anchor="conventions-and-definitions" numbered="true" removeInRFC="false" toc="include" pn="section-2">
      <name slugifiedName="name-conventions-and-definitions">Conventions and Definitions</name>
      <t indent="0" pn="section-2-1">
    The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>",
    "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>",
    "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>",
    "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
    "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be
    interpreted as described in BCP 14 <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> when, and only when, they appear in all capitals, as
    shown here.
      </t>
      <t indent="0" pn="section-2-2">In addition, the key words defined in <xref target="RFC6919" format="default" sectionFormat="of" derivedContent="RFC6919"/> MIGHT apply.</t>
    </section>
    <section anchor="schedule-of-punishments" numbered="true" removeInRFC="false" toc="include" pn="section-3">
      <name slugifiedName="name-schedule-of-punishments">Schedule of Punishments</name>
      <t indent="0" pn="section-3-1">These punishments are meted out after due consideration of infractions of the Principles and Rules.
Due to the time required to reach consensus in the IPP about the need for these punishments,
the punishments are usually applied late in the process, frequently as previous flawed efforts
      are brought up as examples to follow for new work.</t>
      <dl newline="true" spacing="normal" indent="3" pn="section-3-2">
        <dt pn="section-3-2.1"><strong>The Raised Eyebrow</strong></dt>
        <dd pn="section-3-2.2">This is a punishment for lesser infractions, such as bad grammar, dangling participles, and
inconsistent terminology.</dd>
        <dt pn="section-3-2.3"><strong>The Frown</strong></dt>
        <dd pn="section-3-2.4">This punishment is reserved for more dire infractions, such as using a codepoint from an
IANA-managed namespace without registering it, state tables that have dead ends, or
ABNF to describe syntax that cannot be parsed by any parsing technology known
in the year 1993.</dd>
        <dt pn="section-3-2.5"><strong>The Shaking of the Head</strong></dt>
        <dd pn="section-3-2.6">This punishment is reserved for infractions involving complexity swept under the carpet,
such as invoking the case-fold operation without a Unicode considerations section or
marking critical parts as "implementation defined".</dd>
        <dt pn="section-3-2.7"><strong>The Finger Wag</strong></dt>
        <dd pn="section-3-2.8">This punishment is reserved for the infractions described in <xref target="RFC4041" format="default" sectionFormat="of" derivedContent="RFC4041"/>.</dd>
        <dt pn="section-3-2.9"><strong>The Head-in-Hand Gesture</strong></dt>
        <dd pn="section-3-2.10">This mythical punishment has been rumored to have been invoked by the first greybeard
to fully understand the implications of HTML/HTTP. However, the gravity of the gesture
      has precluded its application to more common cases.</dd>
      </dl>
    </section>
    <section anchor="percussive-persuasion-during-protocol-development" numbered="true" removeInRFC="false" toc="include" pn="section-4">
      <name slugifiedName="name-percussive-persuasion-durin">Percussive Persuasion During Protocol Development</name>
      <t indent="0" pn="section-4-1">While a protocol is being developed, random greybeards may perform actions resembling the
punishments defined in <xref target="schedule-of-punishments" format="default" sectionFormat="of" derivedContent="Section 3"/> while attempting to steer misguided
younglings onto the Path of Wisdom.
However, such guidance is more commonly applied in the form of verbal utterances, a sampling
of which are described in the following subsections. Newcomers to the process are well advised to take careful notice
when these occur during protocol development; however, these utterances are <em>not</em>, by themselves,
punishments.</t>
      <t indent="0" pn="section-4-2">Despite rumors, the percussive application of a wet noodle has never been considered
an appropriate part of persuasive measures.</t>
      <section anchor="this-part-needs-elaboration" toc="exclude" numbered="true" removeInRFC="false" pn="section-4.1">
        <name slugifiedName="name-this-part-needs-elaboration">"This part needs elaboration."</name>
        <t indent="0" pn="section-4.1-1">This guidance needs no elaboration.</t>
      </section>
      <section anchor="you-may-have-failed-to-consider-" toc="exclude" numbered="true" removeInRFC="false" pn="section-4.2">
        <name slugifiedName="name-you-may-have-failed-to-cons">"You may have failed to consider ..."</name>
        <t indent="0" pn="section-4.2-1">I see a way to attack your protocol, and you have no defense against it.</t>
      </section>
      <section anchor="the-threat-model-seems-underdeveloped" toc="exclude" numbered="true" removeInRFC="false" pn="section-4.3">
        <name slugifiedName="name-the-threat-model-seems-unde">"The threat model seems underdeveloped."</name>
        <t indent="0" pn="section-4.3-1">If you explain the whole thing again, perhaps you will understand why it's
totally unworkable without me having to understand it.</t>
      </section>
      <section anchor="this-may-work-in-the-lab-but-" toc="exclude" numbered="true" removeInRFC="false" pn="section-4.4">
        <name slugifiedName="name-this-may-work-in-the-lab-bu">"This may work in the lab, but ..."</name>
        <t indent="0" pn="section-4.4-1">Operational considerations are either missing or hopelessly naive.</t>
      </section>
      <section anchor="you-have-not-thought-this-through" toc="exclude" numbered="true" removeInRFC="false" pn="section-4.5">
        <name slugifiedName="name-you-have-not-thought-this-t">"You have not thought this through."</name>
        <t indent="0" pn="section-4.5-1">Go home and start over.</t>
      </section>
    </section>
    <section anchor="recidivism-studies" numbered="true" removeInRFC="false" toc="include" pn="section-5">
      <name slugifiedName="name-recidivism-studies">Recidivism Studies</name>
      <t indent="0" pn="section-5-1">The study of repeat offenders has some methodological difficulties, such as the tendency
of excitable individuals to abandon the IETF upon repeated percussive persuasion, but recidivism is
      believed to compare reasonably with that of the US prison system (66%) <xref target="RECIDIVISM" format="default" sectionFormat="of" derivedContent="RECIDIVISM"/>.</t>
      <t indent="0" pn="section-5-2">One contributing factor to this relatively low observed incidence may be the educative value of footguns;
once people have realized that the hole in their foot is in fact the result of ignoring percussive persuasion, they
may be more inclined to heed advice in later iterations.</t>
    </section>
    <section anchor="security-considerations" numbered="true" removeInRFC="false" toc="include" pn="section-6">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t indent="0" pn="section-6-1">Due to the nature of this memo, it establishes an Epimenides 
Paradox Field <xref target="EPIMENIDES" format="default" sectionFormat="of" derivedContent="EPIMENIDES"/> for its subject matter, thereby
preventing any harm to the Internet from being caused by its publication.</t>
    </section>
    <section anchor="iana-considerations" numbered="true" removeInRFC="false" toc="include" pn="section-7">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t indent="0" pn="section-7-1">This document has no IANA actions.
      </t>
      <t indent="0" pn="section-7-2">Unfortunately, IANA procedures do not include excursions into the imaginary
plane, so the possibility of consulting the IPP before assigning controversial numbers
is precluded. However, the IPP enjoys positive relationships with multiple
designated experts <xref target="RFC8126" format="default" sectionFormat="of" derivedContent="RFC8126"/>, so the situation is not unsalvageable.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references" pn="section-8">
      <name slugifiedName="name-references">References</name>
      <references anchor="sec-normative-references" pn="section-8.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" quoteTitle="true" derivedAnchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t indent="0">In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC6919" target="https://www.rfc-editor.org/info/rfc6919" quoteTitle="true" derivedAnchor="RFC6919">
          <front>
            <title>Further Key Words for Use in RFCs to Indicate Requirement Levels</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="April" year="2013"/>
            <abstract>
              <t indent="0">RFC 2119 defines a standard set of key words for describing requirements of a specification. Many IETF documents have found that these words cannot accurately capture the nuanced requirements of their specification. This document defines additional key words that can be used to address alternative requirements scenarios. Authors who follow these guidelines should incorporate this phrase near the beginning of their document:</t>
              <t indent="0">The key words "MUST (BUT WE KNOW YOU WON\'T)", "SHOULD CONSIDER", "REALLY SHOULD NOT", "OUGHT TO", "WOULD PROBABLY", "MAY WISH TO", "COULD", "POSSIBLE", and "MIGHT" in this document are to be interpreted as described in RFC 6919.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6919"/>
          <seriesInfo name="DOI" value="10.17487/RFC6919"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" quoteTitle="true" derivedAnchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t indent="0">RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8962" target="https://www.rfc-editor.org/info/rfc8962" quoteTitle="true" derivedAnchor="RFC8962">
          <front>
            <title>Establishing the Protocol Police</title>
            <author fullname="G. Grover" initials="G." surname="Grover"/>
            <author fullname="N. ten Oever" initials="N." surname="ten Oever"/>
            <author fullname="C. Cath" initials="C." surname="Cath"/>
            <author fullname="S. Sahib" initials="S." surname="Sahib"/>
            <date month="April" year="2021"/>
            <abstract>
              <t indent="0">One mantra of the IETF is, "We are not the Protocol Police." However, to ensure that protocols are implemented and deployed in full compliance with the IETF's standards, it is important to set up a body that is responsible for assessing and enforcing correct protocol behavior.</t>
              <t indent="0">This document formally establishes the Protocol Police. It defines the body and sets out what aspects of IETF protocols they will police. This document acts as a point of reference for networking engineers, law enforcement officials, government representatives, and others. It also provides advice on how to report issues to the Protocol Police.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8962"/>
          <seriesInfo name="DOI" value="10.17487/RFC8962"/>
        </reference>
      </references>
      <references anchor="sec-informative-references" pn="section-8.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="EPIMENIDES" quoteTitle="true" derivedAnchor="EPIMENIDES">
          <front>
            <title>Mathematical Logic as Based on the Theory of Types</title>
            <author initials="B." surname="Russell" fullname="Bertrand Russell">
	  </author>
            <date year="1908" month="July"/>
          </front>
          <refcontent>American Journal of Mathematics, Volume 30, Number 3, pages 222-262</refcontent>
        </reference>
        <reference anchor="RECIDIVISM" target="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=5029176" quoteTitle="true" derivedAnchor="RECIDIVISM">
          <front>
            <title>Does the United States Have High Recidivism Rates? New Data Raise Questions About Prevailing Beliefs</title>
            <author initials="B." surname="Latzer" fullname="Barry Latzer">
              <organization showOnFrontPage="true">City University of New York - John Jay College of Criminal Justice</organization>
            </author>
            <date year="2024" month="November" day="15"/>
          </front>
          <seriesInfo name="DOI" value="10.2139/ssrn.5029176"/>
        </reference>
        <reference anchor="RFC4041" target="https://www.rfc-editor.org/info/rfc4041" quoteTitle="true" derivedAnchor="RFC4041">
          <front>
            <title>Requirements for Morality Sections in Routing Area Drafts</title>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="April" year="2005"/>
            <abstract>
              <t indent="0">It has often been the case that morality has not been given proper consideration in the design and specification of protocols produced within the Routing Area. This has led to a decline in the moral values within the Internet and attempts to retrofit a suitable moral code to implemented and deployed protocols has been shown to be sub-optimal.</t>
              <t indent="0">This document specifies a requirement for all new Routing Area Internet-Drafts to include a "Morality Considerations" section, and gives guidance on what that section should contain. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4041"/>
          <seriesInfo name="DOI" value="10.17487/RFC4041"/>
        </reference>
        <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126" quoteTitle="true" derivedAnchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t indent="0">Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t indent="0">To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t indent="0">This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments" removeInRFC="false" toc="include" pn="section-appendix.a">
      <name slugifiedName="name-acknowledgments">Acknowledgments</name>
      <t indent="0" pn="section-appendix.a-1">The development of this document was greatly facilitated by a comfortable keyboard and
a bout of insomnia. However, a few contributing individuals, listed here in alphabetical order,
deserve to be called out:</t>
      <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-appendix.a-2">
        <li pn="section-appendix.a-2.1">
          <t indent="0" pn="section-appendix.a-2.1.1"><contact fullname="Aaron Falk"/></t>
        </li>
        <li pn="section-appendix.a-2.2">
          <t indent="0" pn="section-appendix.a-2.2.1"><contact fullname="Adrian Farrel"/></t>
        </li>
        <li pn="section-appendix.a-2.3">
          <t indent="0" pn="section-appendix.a-2.3.1"><contact fullname="John Klensin"/></t>
        </li>
        <li pn="section-appendix.a-2.4">
          <t indent="0" pn="section-appendix.a-2.4.1"><contact fullname="Craig Partridge"/></t>
        </li>
        <li pn="section-appendix.a-2.5">
          <t indent="0" pn="section-appendix.a-2.5.1"><contact fullname="Martin Thomson"/></t>
        </li>
      </ul>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.b">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author fullname="Graham Reuben Beard" initials="G.R." surname="Beard">
        <organization showOnFrontPage="true">Internet Protocol Police</organization>
        <address>
          <email>greybeard@stupid.domain.name</email>
        </address>
      </author>
      <author fullname="Oldham F. Art" initials="O.F." surname="Art">
        <organization showOnFrontPage="true">Internet Protocol Police</organization>
        <address>
          <email>oldfart@stupid.domain.name</email>
        </address>
      </author>
      <author fullname="Harald T. Alvestrand" initials="H" surname="Alvestrand" role="editor">
        <organization showOnFrontPage="true">Google</organization>
        <address>
          <email>harald@alvestrand.no</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
