<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-interop-mimi-discovery-requirements-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="Discovery Requirements">MIMI Discovery Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-interop-mimi-discovery-requirements-00"/>
    <author fullname="Giles Hogben">
      <organization>Google</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>gih@google.com</email>
      </address>
    </author>
    <author fullname="Femi Olumofin">
      <organization>Google</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>fgolu@google.com</email>
      </address>
    </author>
    <author fullname="Jon Peterson">
      <organization>TransUnion</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>jon.peterson@transunion.com</email>
      </address>
    </author>
    <author fullname="Jonathan Rosenberg">
      <organization>Five9</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>jdrosen@jdrosen.net</email>
      </address>
    </author>
    <date year="2024" month="July" day="06"/>
    <area>ART</area>
    <workgroup>More Instant Messaging Interoperability (mimi)</workgroup>
    <keyword>user discovery</keyword>
    <abstract>
      <?line 55?>

<t>This document defines requirements for the discovery problem within the More Instant Messaging Interoperability (MIMI) working group. Discovery is essential for interoperability, allowing message senders to locate recipients across diverse platforms using globally unique, cross-service identifiers (e.g., email addresses, phone numbers). The core challenge involves reliably mapping these identifiers to messaging service providers and determining the reachability of a recipient's identifier across multiple providers.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://datatracker.ietf.org/doc/draft-interop-mimi-discovery-requirements/"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-interop-mimi-discovery-requirements/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        mimi Working Group mailing list (<eref target="mailto:mimi@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/mimi/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/mimi/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 60?>

<section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>Glossary of terms:</t>
      <ol spacing="normal" type="1"><li>
          <t>A <strong>Service Specific Identifier (SSI)</strong> is a unique identifier for a user within the context of a single messaging service provider. It is not globally unique across services. A fully-qualified SSI includes the messaging service provider's unique identifier, making it globally unique. Note that existence of an unqualified SSI on two or more services does not guarantee that the associated accounts belong to the same user. Thus, linking SSIs across services requires other verified data to establish a match. An example of a service specific identifier is a user's X/Twitter handle.</t>
        </li>
        <li>
          <t>A <strong>Cross-Service Identifier (CSI)</strong> is a globally unique identifier for a user that can be used to identify the user across multiple services. For example, a user's E.164 phone number, email address, or other service independent identifiers are CSIs, since they can be used to identify the user across multiple different services.</t>
        </li>
        <li>
          <t>A <strong>Messaging Service Provider (MSP)</strong> provides messaging, voice, video and other forms of real-time communications services to end users. Examples of messaging service providers are WhatsApp, Messages, iMessage, Wire, Matrix, Signal etc. A user is reachable using one or more CSIs and may have at least one SSI internal to the MSP platform.</t>
        </li>
        <li>
          <t>A <strong>Cross-Service Identifier Provider (CSIP)</strong> is an entity that issues, manages, and verifies CSIs. Examples are traditional telecom providers, email providers, and other platforms capable of issuing user-controlled identifiers.</t>
        </li>
        <li>
          <t>A <strong>Discovery Provider (DP)</strong> is an entity that facilitates the discovery reachability as outlined in this requirements document. This involves creating, managing, and leveraging authoritative mappings of CSIs to the MSPs where users can be reached. We expect that a DP may be operated by or affiliated with an MSP or a third party.</t>
        </li>
      </ol>
    </section>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>MIMI discovery seeks to enable users to easily connect and communicate across different messaging platforms, even if they don't know which specific platform the other person uses. Currently, users often need to ask contacts what service they are on out-of-band, or try multiple services, which creates friction. Specifically, discovery helps a user on one messaging service (Alice on Service A) to find another user on a potentially different or same service (Bob on Service B) in a provider-neutral manner.</t>
      <t>Discovery is necessary because the identifiers we commonly have for contacts (phone numbers, email addresses, etc.) do not necessarily tell us which messaging service they are using. Someone with the email alice@gmail.com might use iMessage, Signal, or another service entirely. Thus, the core problem is how to take one of these cross-service identifiers and learn the messaging service provider that the user is using, and how to communicate with them on that service.</t>
      <section anchor="problem-statement">
        <name>Problem Statement</name>
        <t>The discovery problem involves:</t>
        <ol spacing="normal" type="1"><li>
            <t>Asserting verifiable mappings between CSIs and MSPs, and</t>
          </li>
          <li>
            <t>Performing lookups on the mappings to determine the MSPs where a user's CSI can be reached for messaging.</t>
          </li>
        </ol>
        <t>Discovered mappings must be verifiable to ensure they are accurate. Crucially, discovery must prioritize user privacy, allowing individuals to control their discoverability, and it must integrate well with end-to-end encryption and other MIMI protocols.</t>
        <t>Note that mapping lookup is distinct from the retrieval of the user's SSI and cryptographic keys. Retrieval of the SSI and keys typically occurs as part of the messaging process and can easily be done after the MSP for the message recipient has been located through discovery. For example, an MSP might store a mapping of CSIs to SSIs and cryptographic keys. The client would then retrieve this data just before Alice sends a message to Bob, following the successful discovery that Bob is reachable through the MSP.</t>
        <t>The rest of this document describes a series of requirements for the discovery problem.</t>
      </section>
    </section>
    <section anchor="prior-efforts">
      <name>Prior Efforts</name>
      <t>Discovery services are far from new on the Internet. The whois protocol <xref target="RFC3912"/>, largely focused on mapping domain names to associated services. It was one of the earliest discovery services deployed on the Internet. DNS SRV records, specified in <xref target="RFC2782"/>, allow a similar process - given a domain name, a user can discover available services, such as VoIP based on the Session Initiation Protocol (SIP) <xref target="RFC3261"/> <xref target="RFC3263"/>. SRV records were adapted specifically for messaging in <xref target="RFC3861"/>. However, both whois and DNS SRV records rely on domain names as lookup keys, making them unsuitable for identifiers like mobile phone numbers, which don't have inherent domain associations.</t>
      <t>ENUM <xref target="RFC6117"/> addressed this limitation. It used DNS to lookup phone numbers by reversing the digits and adding the "e164.arpa" suffix. This allowed delegation of portions of the namespace to telco providers who owned specific number prefixes. While technically straightforward, public deployment of ENUM was hampered by challenges in establishing authority for prefixes. However, private ENUM <xref target="RFC6116"/> services have become relatively common, facilitating functions like MMS routing within messaging.</t>
      <t>Another attempt was ViPR (Verification Involving PSTN Reachability) <xref target="I-D.rosenberg-dispatch-vipr-overview"/> <xref target="I-D.petithuguenin-vipr-pvp"/>. ViPR utilized a peer-to-peer network based on RELOAD (Resource Location and Discovery) <xref target="RFC6940"/> to operate between enterprises. It addressed the authority problem by authorizing records based on proof of forward routability but faced the same network effects issue as ENUM. ViPR attempted to address incentive problems by focusing on enterprises seeking cost savings by bypassing the phone network. Ultimately, network effects challenges (among other protocol-unrelated issues) prevented widespread deployment.</t>
      <t>Discovery and lookup services are now commonplace on the Internet but are largely scoped within large providers such as Facebook, Twitter, WhatsApp, and others.</t>
      <t>The MIMI discovery service requires a solution that spans providers.</t>
    </section>
    <section anchor="architectural-models">
      <name>Architectural Models</name>
      <t>To ensure completeness and to address implementation considerations for MIMI DP, we present several potential architectural models. The working group observed these requirements are similar among these models and opted to maintain architectural neutrality for the discovery protocol. However, we will outline requirements for the roles of DPs, how they interact with each other, MSPs in a federated model, and how DPs accommodate queries from both MSPs and users.</t>
      <section anchor="centralized-dp-monolithic-service">
        <name>Centralized DP (Monolithic Service)</name>
        <t>A globally accessible, authoritative database (potentially sharded/replicated) stores all authenticated CSI mappings. This monolithic service, implemented across synchronized global nodes, handles all CSI queries from messaging platforms and acts as the single source of truth for mapping data, even if certain mappings may be restricted in specific regions due to geopolitical considerations.</t>
        <section anchor="advantages">
          <name>Advantages</name>
          <ul spacing="normal">
            <li>
              <t>Standardization and uniform control over mapping creation, updates, and data formats.</t>
            </li>
            <li>
              <t>Promotes fair and unbiased CSI mapping discovery.</t>
            </li>
            <li>
              <t>Single source of truth for mapping simplifies data management and ensures consistency.</t>
            </li>
            <li>
              <t>Sharding/replication can address geographical distribution and performance needs.</t>
            </li>
          </ul>
        </section>
        <section anchor="drawbacks">
          <name>Drawbacks</name>
          <ul spacing="normal">
            <li>
              <t>Centralization of sensitive user data raises privacy risks.</t>
            </li>
            <li>
              <t>May conflict with data localization regulations.</t>
            </li>
            <li>
              <t>Single point of failure vulnerability from outages affecting the entire system.</t>
            </li>
            <li>
              <t>Potential difficulty with immediate global updates for rapidly changing mappings.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="hierarchical-dps-discovery-resolvers">
        <name>Hierarchical DPs (Discovery Resolvers)</name>
        <t>A global root Discovery Provider (DP) directs mapping requests to authoritative DPs based on CSI structure (e.g., country codes for E.164 phone numbers) or sharding mechanisms. The root DP, similar to hierarchical DNS, acts as a directory service, holding pointers to authoritative DPs rather than mappings themselves. Alternatives to hierarchical resolution, like the LoST protocol <xref target="RFC5222"/>, or distributed hash tables (DHTs), can achieve similar outcomes.</t>
        <section anchor="advantages-1">
          <name>Advantages</name>
          <ul spacing="normal">
            <li>
              <t>Scalability from distributed load and mapping management across multiple DPs.</t>
            </li>
            <li>
              <t>Flexibility that allows different DPs to specialize in specific CSI ranges for regions.</t>
            </li>
            <li>
              <t>Better alignment with data localization requirements.</t>
            </li>
          </ul>
        </section>
        <section anchor="drawbacks-1">
          <name>Drawbacks</name>
          <ul spacing="normal">
            <li>
              <t>Requires coordination and maintenance of hierarchy.</t>
            </li>
            <li>
              <t>Root DP failure could disrupt the entire system.</t>
            </li>
            <li>
              <t>Potential delays due to additional hops in the discovery process.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="federated-dps-distributed-peer-service">
        <name>Federated DPs (Distributed Peer Service)</name>
        <t>In a federated model, multiple independent DPs collaborate to provide CSI mapping discovery. Each DP holds a subset of mappings and pointers to other DPs, with no central authority dictating mapping locations. Discovering all mappings for a CSI may involve querying multiple DPs. DPs can exchange CSI information or recursively query each other. The specifics of DP federation are determined by business agreements, not technical requirements. A variation of this model involves messaging platforms acting as their own DPs, managing mappings for their users.</t>
        <section anchor="advantages-2">
          <name>Advantages</name>
          <ul spacing="normal">
            <li>
              <t>Decentralization ensures there is no single point of control or failure. The system can continue functioning even if some DPs are unavailable.</t>
            </li>
            <li>
              <t>Mappings can be distributed according to local regulations.</t>
            </li>
          </ul>
        </section>
        <section anchor="drawbacks-2">
          <name>Drawbacks</name>
          <ul spacing="normal">
            <li>
              <t>Discovery process may involve querying multiple DPs, increasing network load.</t>
            </li>
            <li>
              <t>Potential for bias as DPs may prioritize their own mappings, leading to uneven results.</t>
            </li>
            <li>
              <t>Requires robust mechanisms to prevent CSI impersonation and ensure trust between DPs.</t>
            </li>
            <li>
              <t>Pairwise relationships in a federated DP model could create a barrier to entry for smaller MSP/DPs, similar to the trust requirements in the DKIM <xref target="RFC6376"/> and DMARC <xref target="RFC8616"/> ecosystems.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="additional-considerations-on-architectural-models">
        <name>Additional Considerations on Architectural Models</name>
        <section anchor="telephone-number-csis">
          <name>Telephone Number CSIs</name>
          <t>Telephone number portability is complex due to its reliance on real-time queries to proprietary and legacy systems. Overall, the authenticated mappings proposed for MIMI may necessitate additional platform measures to assess mapping freshness and ensure up-to-date reachability responses.</t>
        </section>
        <section anchor="bias-mitigation">
          <name>Bias Mitigation</name>
          <t>Bias occurs when a DP prioritizes mappings to its affiliated MSP without consideration of what is best for end users. Mitigating bias is essential to ensure fair and equitable discovery of authenticated mappings across different services. The working group has decided to defer such mitigation to policies and regulations, excluding it from the discovery protocol.</t>
        </section>
      </section>
    </section>
    <section anchor="summary-of-requirements">
      <name>Summary of Requirements</name>
      <table>
        <thead>
          <tr>
            <th align="left">#</th>
            <th align="left">Requirement</th>
            <th align="left">Mandatory</th>
            <th align="left">Optional</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left"> </td>
            <td align="left">
              <strong>Authenticating Mappings</strong></td>
            <td align="left"> </td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">1</td>
            <td align="left">DP <bcp14>MUST</bcp14> verify user's CSI possession through proof-of-possession challenges through a CSIP, certificate authority or designated parties</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">2</td>
            <td align="left">MSP <bcp14>MUST</bcp14> confirm CSI reachability on its service</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">3</td>
            <td align="left">Client, MSP, and DP <bcp14>MUST</bcp14> jointly compute a verifiable mapping representation of CSI-to-MSP</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">4</td>
            <td align="left">DP <bcp14>MUST NOT</bcp14> be able to create a verifiable mapping without CSI holder and MSP involvement</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">5</td>
            <td align="left">DP <bcp14>MUST NOT</bcp14> be able to falsely claim user completed proof-of-possession</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">6</td>
            <td align="left">Other users <bcp14>MUST</bcp14> be able to verify CSI holder's participation in mapping creation</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">7</td>
            <td align="left">Authenticated mappings <bcp14>MUST</bcp14> include a preference index to allow recipients to control their preferred contact method</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left"> </td>
            <td align="left">
              <strong>Discovery Protocol</strong></td>
            <td align="left"> </td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">8</td>
            <td align="left">Discovery <bcp14>MUST</bcp14> support any globally unique CSI with backing source of truth (CISP for telephone), ownership proof, and cross-service usability</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">9</td>
            <td align="left">Discovery <bcp14>MUST</bcp14> accommodate zero, one, or multiple MSPs in results</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">10</td>
            <td align="left">Discovery requests <bcp14>MUST</bcp14> support federation, MSP filter, and DP list query parameters</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">11</td>
            <td align="left">DP <bcp14>MUST</bcp14> disclose default behavior and comply with agreed-upon federation default</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">12</td>
            <td align="left">DP <bcp14>MAY</bcp14> rate-limit non-default queries given their higher processing costs</td>
            <td align="left"> </td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">13</td>
            <td align="left">DP <bcp14>MAY</bcp14> rate-limit requests sent to low-throughput DP endpoints</td>
            <td align="left"> </td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">14</td>
            <td align="left">DP <bcp14>MUST</bcp14> protect at least the querier's identity or the target CSI in requests</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">15</td>
            <td align="left">The protocol <bcp14>MUST</bcp14> define both verbose and compact response formats, where verbose responses include detailed mapping information and metadata, while compact responses provide a simple indication of CSI reachability on returned MSPs</td>
            <td align="left"> </td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left"> </td>
            <td align="left">
              <strong>Operational</strong></td>
            <td align="left"> </td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">16</td>
            <td align="left">Discovery service <bcp14>MUST</bcp14> remove mappings made outdated by CSI re-assignment to a new user within reasonable time</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">17</td>
            <td align="left">Older mappings generally take precedence over newer ones for the same CSI unless explicitly invalidated by the original CSI holder or superseded by a stricter proof of possession verification</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">18</td>
            <td align="left">DPs <bcp14>MUST</bcp14> implement conflict resolution protocol for new mapping registration attempts</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">19</td>
            <td align="left">Users <bcp14>SHOULD</bcp14> be provided with mechanisms to invalidate existing mappings for their CSIs (e.g., in the event of losing control of a phone number)</td>
            <td align="left"> </td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">20</td>
            <td align="left">New CSI mappings <bcp14>SHOULD</bcp14> be discoverable within some standardized maximum time limit (e.g., 24 hours)</td>
            <td align="left"> </td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left"> </td>
            <td align="left">
              <strong>Security</strong></td>
            <td align="left"> </td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">21</td>
            <td align="left">Discovery service <bcp14>MUST</bcp14> leverage contractual and technical means prevent malicious MSPs from falsely claiming CSI association</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">22</td>
            <td align="left">Discovery service <bcp14>MUST</bcp14> incorporate anti-DDoS, anti-enumeration and anti-spam mechanisms</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">23</td>
            <td align="left">All communication between clients, DPs, and MSPs <bcp14>MUST</bcp14> be encrypted in transit and authenticated</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="authenticating-mappings-requirements">
      <name>Authenticating Mappings Requirements</name>
      <t>A Discovery Provider aggregates mappings between CSIs and platforms from trusted sources. To prevent impersonation attacks where platforms or users simply claim to own a CSI, the user must solve a proof of possession challenge for the CSI before a DP can establish reachability mapping involving the CSI. Suitable approaches include SMS one-time-code or voice call verification to prove possession of phone number, email link verification for emails, OAuth sign-in for Twitter and YouTube identifiers. A potential architecture for generating credentials from proof-of-possession checks is shown in <xref target="I-D.draft-peterson-mimi-idprover"/>. A platform performing discovery should be able to verify that the target user established the reachability mapping.</t>
      <section anchor="functional-requirements">
        <name>Functional Requirements</name>
        <t>At least, a user's client, MSP, and DP <bcp14>MUST</bcp14> participate in a consensus protocol to establish a CSI-to-MSP mapping with the following requirements:</t>
        <ol spacing="normal" type="1"><li>
            <t>The DP <bcp14>MUST</bcp14> verify the user's possession of the CSI through some proof-of-possession challenge.</t>
          </li>
          <li>
            <t>The MSP <bcp14>MUST</bcp14> confirm that the CSI is reachable on its service.</t>
          </li>
          <li>
            <t>The client, MSP and DP <bcp14>MUST</bcp14> jointly compute a publicly verifiable representation of the mapping (e.g., using a threshold signature).</t>
          </li>
        </ol>
      </section>
      <section anchor="privacy-and-security-requirements">
        <name>Privacy and Security Requirements</name>
        <ol spacing="normal" type="1"><li>
            <t>A DP <bcp14>MUST NOT</bcp14> be able to create a verifiable mapping without the involvement of the user holding the CSI and MSP.</t>
          </li>
          <li>
            <t>The DP <bcp14>MUST NOT</bcp14> be able to falsely claim that a user completed the proof-of-possession challenge.</t>
          </li>
          <li>
            <t>Other users <bcp14>MUST</bcp14> be able to verify that the CSI holder (and not an imposter) participated in creating the mapping.</t>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="preferences">
      <name>Preferences</name>
      <t>The discovery process involves the preferences of multiple stakeholders:</t>
      <ol spacing="normal" type="1"><li>
          <t>the querier seeking reachability information,</t>
        </li>
        <li>
          <t>the user with the mapped identity, and</t>
        </li>
        <li>
          <t>DPs (and by extension, the collaborating MSPs).</t>
        </li>
      </ol>
      <t>The authors suggest the following:</t>
      <ul spacing="normal">
        <li>
          <t>Implementations shouldn't dictate a one-size-fits-all approach for expressing and meeting these preferences, but should rather implement basic building blocks for each of these parties to express their preferences.</t>
        </li>
        <li>
          <t>DPs should clearly communicate their preference handling practices to promote transparency and trust.</t>
        </li>
        <li>
          <t>The discovery requirements consider detailed preferences and capabilities out of scope, leaving them to individual implementations.</t>
        </li>
        <li>
          <t>Given that the sender initiates discovery requests and already has options on which app, MSP, and DP to query, we will only provide a basic recipient preference specification as a requirement below.</t>
        </li>
      </ul>
      <section anchor="basic-recipients-preference-requirement">
        <name>Basic Recipient's Preference Requirement</name>
        <t>Requirement: Authenticated mappings <bcp14>MUST</bcp14> include a preference index to allow recipients to control their preferred contact method.</t>
        <t>For example, Alice could set the preference index for mappings on three MSPs: WhatsApp (1), Messages (2), and Telegram (3). Bob, upon retrieving these mappings, would automatically know that Alice prefers to be contacted via WhatsApp.</t>
      </section>
      <section anchor="recipients-critical-user-journeys-implementations">
        <name>Recipient's Critical User Journeys (implementations)</name>
        <t>Here are some Critical User Journeys (CUJs) that are the most important to discovery recipients.</t>
        <t>In the CUJs below, Bob is the recipient, and Alice is the sender or user performing discovery:</t>
        <ol spacing="normal" type="1"><li>
            <t>Sender mapping preferences: Bob only wants to be found by Alice and other users on WhatsApp, not his other messaging apps.</t>
          </li>
          <li>
            <t>Same-app preferences: Bob prefers that Alice can find him on the same messaging service that she is using. In other words, Bob does not want cross-app discovery and messaging.</t>
          </li>
          <li>
            <t>No-random mapping preferences: Bob does not want to go through multiple apps to find a message from Alice when discovery returns one of 10 mappings that Bob has established with discovery providers.</t>
          </li>
          <li>
            <t>No-duplication preferences: Bob does not want Alice's messages to be broadcasted to all or a subset of his apps based on the result of discovery.</t>
          </li>
          <li>
            <t>Per-sender preferences: Bob wants to control which app messages from Alice go to and do the same for other users (e.g., Carol's messages may go to a different app than Alice's).</t>
          </li>
          <li>
            <t>Closed group preferences: Bob only wants his soccer parents to discover and contact him on WhatsApp, not his Wire app. That is, a group of senders has the same mapping results based on Bob's preferences.</t>
          </li>
          <li>
            <t>Open-ended group preferences: Bob wants his business contacts to discover and reach him on Wire, not WhatsApp. That is, an open-ended list of senders (i.e., including leads) are provided with a designated mapping.</t>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="discovery-protocol-requirements">
      <name>Discovery Protocol Requirements</name>
      <section anchor="identifier-types">
        <name>Identifier Types</name>
        <t>Discovery <bcp14>MUST</bcp14> support any globally unique cross-service identifier with the following characteristics:</t>
        <ol spacing="normal" type="1"><li>
            <t>Backing source of truth: Authoritative issuing entities exist for issuing the CSI to users (e.g., CSIP for telephone numbers).</t>
          </li>
          <li>
            <t>Ownership proof mechanism: The user issued a CSI must be able to demonstrate or pass a proof of possession challenge from a remote prover.</t>
          </li>
          <li>
            <t>Versatility: CSIs must be deployable and usable across multiple services</t>
          </li>
        </ol>
        <t>Phone numbers and email addresses are examples of suitable and supported identifiers.</t>
      </section>
      <section anchor="discovery-response-requirements">
        <name>Discovery Response Requirements</name>
        <section anchor="cardinalities">
          <name>Cardinalities</name>
          <t>The discovery protocol must accommodate scenarios with varying numbers of MSPs in the discovery results:</t>
          <ol spacing="normal" type="1"><li>
              <t>Zero MSPs: The system should indicate a no-match condition if users and their associated Identifiers (e.g., CSIs) are not discoverable on any MSP. This enables the originating user to recognize that the CSI is not reachable via the discovery system.</t>
            </li>
            <li>
              <t>One MSP: The system should function efficiently when a CSI is associated with a single MSP.</t>
            </li>
            <li>
              <t>Multiple MSPs: The system should accommodate users with multiple MSPs.</t>
            </li>
          </ol>
        </section>
        <section anchor="response-format">
          <name>Response format</name>
          <t>An MSP or client app may request responses that are verbose or compact. A verbose response may include all unique lists of mappings discovered with metadata for the client to verify each mapping, and metadata about the list or count of DPs where that mapping was found. A compact response may be as simple as a bit string with each set bit representing that the CSI is found in the MSP assigned to that bit position. The protocol <bcp14>MUST</bcp14> define specific formats for both response types.</t>
        </section>
      </section>
      <section anchor="discovery-request-requirement">
        <name>Discovery Request Requirement</name>
        <section anchor="requests">
          <name>Requests</name>
          <t>Discovery requests must include the CSI and may include additional query parameters to guide the search process. The query parameters below <bcp14>MUST</bcp14> be supported.</t>
          <section anchor="federation">
            <name>Federation</name>
            <t>Indicate if the DP should answer queries using its own database or federate the request to other DPs and aggregate their answers in a fair and transparent manner. In a federated model, a DP that chooses not to federate may be limited in the queries it can answer. Certainly, a DP can incorporate mappings that either reference another DP's mapping or materialize those mappings into its own local database.</t>
          </section>
          <section anchor="msp-filter">
            <name>MSP filter</name>
            <t>Useful for scoping the response of interest to one or more MSPs (e.g., query for CSI mapping to WhatsApp only).</t>
          </section>
          <section anchor="dp-list">
            <name>DP list</name>
            <t>A list of DPs may accompany each query to guide a DP on query federation decisions. These sub-options for DP list must be supported:</t>
            <ul spacing="normal">
              <li>
                <t>DP-preferred federation: signals for the DP to forward the query to its preferred subset of DPs.</t>
              </li>
              <li>
                <t>Client-selected federation: instructs the DP to forward the query to a specific list of DPs provided by the client.</t>
              </li>
              <li>
                <t>All DPs: mandates the DP to forward the query to all DPs within the ecosystem, utilizing a publicly accessible registry (described below).</t>
              </li>
            </ul>
          </section>
        </section>
        <section anchor="default-behavior-disclosure">
          <name>Default behavior disclosure</name>
          <t>A DP must externally disclose its default behavior which should be consistent with local regulatory requirements (e.g., do not federate by default for performance, privacy or regulatory reasons). For example, in the absence of a context parameter, the DP disclosed it will utilize its local database to fulfill requests.</t>
          <t>A DP must follow some preferred default behavior that is agreed at the federation level.</t>
        </section>
        <section anchor="client-rate-limit">
          <name>Client rate limit</name>
          <t>Again, forking discovery requests consume ecosystem resources, and could facilitate attacks. Hence a DP may rate-limit non-default queries. Specifically, a client may be limited to a few queries daily when federated to the entire ecosystem DPs.</t>
        </section>
        <section anchor="server-rate-limit">
          <name>Server rate limit</name>
          <t>DPs may optionally rate-limit requests directed at DP endpoints with low query processing throughput for discovery responsiveness.</t>
        </section>
        <section anchor="rate-limiting-context">
          <name>Rate-limiting context</name>
          <t>A DP must provide sufficient context to the federation of DPs on a fork tree to assist them in rate-limiting requests from specific clients in a privacy-friendly manner.</t>
        </section>
      </section>
      <section anchor="privacy-requirements">
        <name>Privacy Requirements</name>
        <section anchor="requirement">
          <name>Requirement</name>
          <t>A DP must protect at least one end of the social graph during a request. In other words, the DP must protect either the querier's identity or the CSI of interest in requests.</t>
          <t>Possible implementation approaches when Alice is discovering Bob's reachability:</t>
          <ol spacing="normal" type="1"><li>
              <t>Querier identity protection: IP blinding (e.g., Private Relay) can help to conceal Alice's identity or IP address so the DP may learn the query target only.</t>
            </li>
            <li>
              <t>Query content protection: Techniques like Private Information Retrieval (PIR) or Private Set Membership (PSM) can conceal the target CSI, so the DP may learn the querier only.</t>
            </li>
          </ol>
          <t>The messaging social graph of a user shows all the other users that the user has communicated with over time.The discovery social graph of a user shows all the users for whom discovery has been attempted. The discovery social graph is significantly larger than the messaging social graph, even though there may be some overlap between the two. To clarify, a user's address book defines their potential social network. MIMI discovery, when applied comprehensively using the address book, reveals that network on various services. In contrast, the messaging social graph only includes contacts actively messaged within a specific period, which is inherently a subset of the user's wider contact network. Since discovery can query for users the initiator hasn't yet messaged, the discovery social graph is naturally larger.</t>
        </section>
      </section>
    </section>
    <section anchor="operational-requirements">
      <name>Operational Requirements</name>
      <t>The discovery service must support a decentralized architecture with multiple DPs, enabling federation based on user preferences, geopolitical boundaries, and DP-specific policies.</t>
      <t>Some additional considerations:</t>
      <ol spacing="normal" type="1"><li>
          <t>Federation mechanisms: Protocols or standards for DPs to communicate and exchange mapping data must be defined. This includes how requests are routed and how DPs locate potentially relevant mappings stored elsewhere.</t>
        </li>
        <li>
          <t>Data sovereignty: Regulations such as GDPR have a direct impact on where user data can reside. Solutions must be designed to respect data locality and follow jurisdictional laws.</t>
        </li>
      </ol>
      <section anchor="registry">
        <name>Registry</name>
        <t>It is likely that reachability mappings on some services will not be shared publicly for privacy reasons. Thus DPs may federate: for example, a discovery client may send a request to one DP, which will then need to consult a second DP in order to complete the request. Some sort of policies will need to govern the relationships between DPs and the terms under which they federate. Such a policy is outside MIMI's purview.</t>
        <t>Metadata and service configurations about federation membership of interoperable DPs may be hosted on a registry managed by the federation. Each DP's record may include a unique identifier, discovery endpoints, and other configuration metadata.</t>
      </section>
      <section anchor="csi-release-timeliness">
        <name>CSI Release Timeliness</name>
        <t>The discovery service must strive to remove outdated mappings (resulting from users ending service with a CSIP) within a reasonable timeframe, but this timeframe must acknowledge the limitations of existing legacy systems and the potential for identifier reuse.</t>
        <section anchor="mapping-prioritization-requirement">
          <name>Mapping Prioritization Requirement</name>
          <t>Whenever a new mapping is attempted for an existing CSI, the one established earlier should generally take precedence. This precedence <bcp14>SHOULD</bcp14> be overridden ONLY in the following cases:</t>
          <ol spacing="normal" type="1"><li>
              <t>The original CSI holder explicitly signals the mapping is no longer valid.</t>
            </li>
            <li>
              <t>A new user of the CSI establishes a mapping and successfully completes a stricter proof of possession verification process.</t>
            </li>
          </ol>
        </section>
        <section anchor="conflict-resolution-protocol-requirement">
          <name>Conflict Resolution Protocol Requirement</name>
          <ol spacing="normal" type="1"><li>
              <t>DPs <bcp14>MUST</bcp14> implement a conflict resolution protocol when a new mapping creation attempt is made for a CSI that already has mappings within the DP's service.</t>
            </li>
            <li>
              <t>This protocol <bcp14>SHOULD</bcp14> include a privacy-preserving notification to the holder of any existing mappings (without revealing the new user's identity).</t>
            </li>
            <li>
              <t>If the conflict cannot be automatically resolved, the DP <bcp14>MAY</bcp14> escalate to a manual review process that involves additional verification steps for the new user.</t>
            </li>
          </ol>
        </section>
        <section anchor="invalidate-capability-requirement">
          <name>Invalidate Capability Requirement</name>
          <ol spacing="normal" type="1"><li>
              <t>Mechanisms <bcp14>SHOULD</bcp14> be provided to enable users to signal that a CSI they previously used is no longer under their control. This could include:
              </t>
              <ul spacing="normal">
                <li>
                  <t>Collaborations with CSIP to receive re-assignment notifications.</t>
                </li>
                <li>
                  <t>User-initiated invalidation requests.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Invalidate signals <bcp14>SHOULD</bcp14> trigger updates to discovery mappings to minimize conflicts.</t>
            </li>
          </ol>
        </section>
      </section>
      <section anchor="csi-claim-timeliness">
        <name>CSI Claim Timeliness</name>
        <t>Upon a user obtaining service for a new CSI (e.g., phone number or email address) from a CSIP, the discovery service must enable immediate discoverability when the user associates the CSI with a MSP. The MSP <bcp14>MUST</bcp14> implement a mechanism to validate the user's control over the claimed CSI (as usual).</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="blackhole-prevention">
        <name>Blackhole Prevention</name>
        <t>The discovery service must be designed to prevent malicious MSPs from falsely claiming association with a CSI to prevent messages intended for the legitimate user from being delivered. This includes:</t>
        <ul spacing="normal">
          <li>
            <t>Preventing message interception: Malicious MSPs <bcp14>MUST NOT</bcp14> be able to redirect messages by associating themselves with a CSI they do not control.</t>
          </li>
          <li>
            <t>Ensuring accurate discoverability: Malicious MSPs <bcp14>MUST NOT</bcp14> be able to make a non-user appear discoverable, leading to misdirected messages or false impressions of service adoption.</t>
          </li>
        </ul>
      </section>
      <section anchor="ddos-enumeration-and-spam-prevention-and-mitigation">
        <name>DDoS, Enumeration and Spam Prevention and Mitigation</name>
        <t>The discovery service <bcp14>MUST</bcp14> put in place robust mechanisms to prevent and mitigate DDoS, large-scale CSI scraping and spamming by malicious providers (MSPs, DPs). This requirement includes:</t>
        <ul spacing="normal">
          <li>
            <t>Anti-DDoS, anti-enumeration and anti-spam defenses: The system design must effectively thwart attempts to DDoS attack, enumerate CSIs (especially phone numbers), and prevent the creation of spam target lists. Techniques may include restrictions on bulk queries, obfuscation, or differential access levels based on MSP reputation and relationships.</t>
          </li>
          <li>
            <t>Flexible rate limiting: DPs must be able to enforce rate limits on discovery requests, with mechanisms to determine appropriate limits based on individual MSP behavior, business relationships, and potential risks.</t>
          </li>
        </ul>
      </section>
      <section anchor="encryption-and-authentication">
        <name>Encryption and Authentication</name>
        <t>All information exchanged between clients, DPs, and MSPs <bcp14>MUST</bcp14> be encrypted in transit and authenticated.</t>
      </section>
      <section anchor="notes">
        <name>Notes</name>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="RFC3912">
        <front>
          <title>WHOIS Protocol Specification</title>
          <author fullname="L. Daigle" initials="L." surname="Daigle"/>
          <date month="September" year="2004"/>
          <abstract>
            <t>This document updates the specification of the WHOIS protocol, thereby obsoleting RFC 954. The update is intended to remove the material from RFC 954 that does not have to do with the on-the-wire protocol, and is no longer applicable in today's Internet. This document does not attempt to change or update the protocol per se, or document other uses of the protocol that have come into existence since the publication of RFC 954. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3912"/>
        <seriesInfo name="DOI" value="10.17487/RFC3912"/>
      </reference>
      <reference anchor="RFC2782">
        <front>
          <title>A DNS RR for specifying the location of services (DNS SRV)</title>
          <author fullname="A. Gulbrandsen" initials="A." surname="Gulbrandsen"/>
          <author fullname="P. Vixie" initials="P." surname="Vixie"/>
          <author fullname="L. Esibov" initials="L." surname="Esibov"/>
          <date month="February" year="2000"/>
          <abstract>
            <t>This document describes a DNS RR which specifies the location of the server(s) for a specific protocol and domain. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2782"/>
        <seriesInfo name="DOI" value="10.17487/RFC2782"/>
      </reference>
      <reference anchor="RFC3261">
        <front>
          <title>SIP: Session Initiation Protocol</title>
          <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <author fullname="G. Camarillo" initials="G." surname="Camarillo"/>
          <author fullname="A. Johnston" initials="A." surname="Johnston"/>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <author fullname="R. Sparks" initials="R." surname="Sparks"/>
          <author fullname="M. Handley" initials="M." surname="Handley"/>
          <author fullname="E. Schooler" initials="E." surname="Schooler"/>
          <date month="June" year="2002"/>
          <abstract>
            <t>This document describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants. These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3261"/>
        <seriesInfo name="DOI" value="10.17487/RFC3261"/>
      </reference>
      <reference anchor="RFC3263">
        <front>
          <title>Session Initiation Protocol (SIP): Locating SIP Servers</title>
          <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <date month="June" year="2002"/>
          <abstract>
            <t>The Session Initiation Protocol (SIP) uses DNS procedures to allow a client to resolve a SIP Uniform Resource Identifier (URI) into the IP address, port, and transport protocol of the next hop to contact. It also uses DNS to allow a server to send a response to a backup client if the primary client has failed. This document describes those DNS procedures in detail. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3263"/>
        <seriesInfo name="DOI" value="10.17487/RFC3263"/>
      </reference>
      <reference anchor="RFC3861">
        <front>
          <title>Address Resolution for Instant Messaging and Presence</title>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <date month="August" year="2004"/>
          <abstract>
            <t>Presence and instant messaging are defined in RFC 2778. The Common Profiles for Presence and Instant Messaging define two Universal Resource Identifier (URI) schemes: 'im' for INSTANT INBOXes and 'pres' for PRESENTITIES. This document provides guidance for locating the resources associated with URIs that employ these schemes. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3861"/>
        <seriesInfo name="DOI" value="10.17487/RFC3861"/>
      </reference>
      <reference anchor="RFC6117">
        <front>
          <title>IANA Registration of Enumservices: Guide, Template, and IANA Considerations</title>
          <author fullname="B. Hoeneisen" initials="B." surname="Hoeneisen"/>
          <author fullname="A. Mayrhofer" initials="A." surname="Mayrhofer"/>
          <author fullname="J. Livingood" initials="J." surname="Livingood"/>
          <date month="March" year="2011"/>
          <abstract>
            <t>This document specifies a revision of the IANA Registration Guidelines for Enumservices, describes corresponding registration procedures, and provides a guideline for creating Enumservice Specifications. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6117"/>
        <seriesInfo name="DOI" value="10.17487/RFC6117"/>
      </reference>
      <reference anchor="RFC6116">
        <front>
          <title>The E.164 to Uniform Resource Identifiers (URI) Dynamic Delegation Discovery System (DDDS) Application (ENUM)</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <author fullname="L. Conroy" initials="L." surname="Conroy"/>
          <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
          <date month="March" year="2011"/>
          <abstract>
            <t>This document discusses the use of the Domain Name System (DNS) for storage of data associated with E.164 numbers, and for resolving those numbers into URIs that can be used (for example) in telephony call setup. This document also describes how the DNS can be used to identify the services associated with an E.164 number. This document obsoletes RFC 3761. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6116"/>
        <seriesInfo name="DOI" value="10.17487/RFC6116"/>
      </reference>
      <reference anchor="I-D.rosenberg-dispatch-vipr-overview">
        <front>
          <title>Verification Involving PSTN Reachability: Requirements and Architecture Overview</title>
          <author fullname="Jonathan Rosenberg" initials="J." surname="Rosenberg">
            <organization>jdrosen.net</organization>
          </author>
          <author fullname="Cullen Fluffy Jennings" initials="C. F." surname="Jennings">
            <organization>Cisco</organization>
          </author>
          <author fullname="Marc Petit-Huguenin" initials="M." surname="Petit-Huguenin">
            <organization>Stonyfish</organization>
          </author>
          <date day="25" month="October" year="2010"/>
          <abstract>
            <t>The Session Initiation Protocol (SIP) has seen widespread deployment
within individual domains, typically supporting voice and video
communications.  Though it was designed from the outset to support
inter-domain federation over the public Internet, such federation has
not materialized.  The primary reasons for this are the complexities
of inter-domain phone number routing and concerns over security.
This document reviews this problem space, outlines requirements, and
then describes a new model and technique for inter-domain federation
with SIP, called Verification Involving PSTN Reachability (ViPR).
ViPR addresses the problems that have prevented inter-domain
federation over the Internet.  It provides fully distributed inter-
domain routing for phone numbers, authorized mappings from phone
numbers to domains, a new technique for automated VoIP anti-spam, and
privacy of number ownership, all while preserving the trapezoidal
model of SIP.

Legal

This documents and the information contained therein are provided on
an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE
REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE
IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL
WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY
WARRANTY THAT THE USE OF THE INFORMATION THEREIN WILL NOT INFRINGE
ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE.
            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-rosenberg-dispatch-vipr-overview-04"/>
      </reference>
      <reference anchor="I-D.petithuguenin-vipr-pvp">
        <front>
          <title>The Public Switched Telephone Network (PSTN) Validation Protocol (PVP)</title>
          <author fullname="Marc Petit-Huguenin" initials="M." surname="Petit-Huguenin">
            <organization>Unaffiliated</organization>
          </author>
          <author fullname="Jonathan Rosenberg" initials="J." surname="Rosenberg">
            <organization>jdrosen.net</organization>
          </author>
          <author fullname="Cullen Fluffy Jennings" initials="C. F." surname="Jennings">
            <organization>Cisco</organization>
          </author>
          <date day="12" month="March" year="2012"/>
          <abstract>
            <t>   One of the main challenges in inter-domain federation of Session
   Initiation Protocol (SIP) calls is that many domains continue to
   utilize phone numbers, and not email-style SIP URI.  Consequently, a
   mechanism is needed that enables secure mappings from phone numbers
   to domains.  The main technical challenge in doing this securely is
   to verify that the domain in question truly is the "owner" of the
   phone number.  This specification defines the PSTN Validation
   Protocol (PVP), which can be used by a domain to verify this
   ownership by means of a forward routability check in the PSTN.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-petithuguenin-vipr-pvp-04"/>
      </reference>
      <reference anchor="RFC6940">
        <front>
          <title>REsource LOcation And Discovery (RELOAD) Base Protocol</title>
          <author fullname="C. Jennings" initials="C." surname="Jennings"/>
          <author fullname="B. Lowekamp" initials="B." role="editor" surname="Lowekamp"/>
          <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
          <author fullname="S. Baset" initials="S." surname="Baset"/>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <date month="January" year="2014"/>
          <abstract>
            <t>This specification defines REsource LOcation And Discovery (RELOAD), a peer-to-peer (P2P) signaling protocol for use on the Internet. A P2P signaling protocol provides its clients with an abstract storage and messaging service between a set of cooperating peers that form the overlay network. RELOAD is designed to support a P2P Session Initiation Protocol (P2PSIP) network, but can be utilized by other applications with similar requirements by defining new usages that specify the Kinds of data that need to be stored for a particular application. RELOAD defines a security model based on a certificate enrollment service that provides unique identities. NAT traversal is a fundamental service of the protocol. RELOAD also allows access from "client" nodes that do not need to route traffic or store data for others.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6940"/>
        <seriesInfo name="DOI" value="10.17487/RFC6940"/>
      </reference>
      <reference anchor="RFC5222">
        <front>
          <title>LoST: A Location-to-Service Translation Protocol</title>
          <author fullname="T. Hardie" initials="T." surname="Hardie"/>
          <author fullname="A. Newton" initials="A." surname="Newton"/>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <date month="August" year="2008"/>
          <abstract>
            <t>This document describes an XML-based protocol for mapping service identifiers and geodetic or civic location information to service contact URIs. In particular, it can be used to determine the location-appropriate Public Safety Answering Point (PSAP) for emergency services. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5222"/>
        <seriesInfo name="DOI" value="10.17487/RFC5222"/>
      </reference>
      <reference anchor="RFC6376">
        <front>
          <title>DomainKeys Identified Mail (DKIM) Signatures</title>
          <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
          <author fullname="T. Hansen" initials="T." role="editor" surname="Hansen"/>
          <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
          <date month="September" year="2011"/>
          <abstract>
            <t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message. This can be an author's organization, an operational relay, or one of their agents. DKIM separates the question of the identity of the Signer of the message from the purported author of the message. Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key. Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t>
            <t>This memo obsoletes RFC 4871 and RFC 5672. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="76"/>
        <seriesInfo name="RFC" value="6376"/>
        <seriesInfo name="DOI" value="10.17487/RFC6376"/>
      </reference>
      <reference anchor="RFC8616">
        <front>
          <title>Email Authentication for Internationalized Mail</title>
          <author fullname="J. Levine" initials="J." surname="Levine"/>
          <date month="June" year="2019"/>
          <abstract>
            <t>Sender Policy Framework (SPF) (RFC 7208), DomainKeys Identified Mail (DKIM) (RFC 6376), and Domain-based Message Authentication, Reporting, and Conformance (DMARC) (RFC 7489) enable a domain owner to publish email authentication and policy information in the DNS. In internationalized email, domain names can occur both as U-labels and A-labels. This specification updates the SPF, DKIM, and DMARC specifications to clarify which form of internationalized domain names to use in those specifications.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8616"/>
        <seriesInfo name="DOI" value="10.17487/RFC8616"/>
      </reference>
      <reference anchor="I-D.draft-peterson-mimi-idprover">
        <front>
          <title>An Identitifier Proof-of-Possession Mechanism</title>
          <author fullname="Jon Peterson" initials="J." surname="Peterson">
            <organization>TransUnion</organization>
          </author>
          <date day="4" month="March" year="2024"/>
          <abstract>
            <t>   This document specifies a means for a third-party service to prove
   and attest the association of a communications platform with a
   particular user's telephone number.  This capability supports secure
   enrollment for users of messaging platforms or similar real-time
   communication applications, for cases where users assert telephone
   numbers as communication identifiers, and interoperating platforms
   need to verify that identifiers are being properly attested.  This
   general approach can potentially work with other forms of Service
   Independent Identifiers (SIIs) in the More Instant Messaging
   Interoperability (MIMI) framework.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-peterson-mimi-idprover-00"/>
      </reference>
    </references>
    <?line 409?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to acknowledge and express our appreciation for the thoughtful feedback and constructive discussions that took place during the MIMI interim meetings focused on the discovery problem.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA8V963IbR5bmfzxFrfTDpAKATMkt24zZGdOkbLPHlNgkZY93
YmKiUJUAqlWoKteFFLrtd9ln2Seb851LZhYASu6Y3dgOd4gEqjJPnjz3G2ez
2aQv+tKdJk+uLq8uk4uiy+p7126TG/frULRu46q+ezJJF4vW3dNTjz2Qpb1b
1e32NOn6fDLJ66xKN7Rs3qbLflZUvWvrZrYpNsUstyVmbbTE7PPPJ92w2BRd
V9RVv23o5cvXd99NqmGzcO3pJKcdTidZXXWu6obuNOnbwU0IppeTtHXpaXJ2
czd5qNv3q7YeGhyobl1yWXV9WvXJleu6dFVUK/qEYXFtuijKot8mR4Dq+Mnk
vdvS6/npJJklQ+faxAM6uXfVQJsnia6NN+g3gfJn2hMLf4/v6NNNWpTyyDeF
65fzul3Rp2mbrU+Tdd833enz53gGnxT3bm4PPccHzxdt/dC553j9Ob1W0qm7
PrxIWEj7Ns3euza8SNh+/ocR/XwyAUry/0zLuiLwt66bdJu07f/z16GmzU6T
qp40xWny732dTZOubvvWLTv6abvBD/8xmaRDv65bIIogTJLlUJZy298XpeuS
H+rVwlX8lRNkrIr1N6u6XpVuntUb/obgTqvib2lPt00v8pf8RVYPVQ9CelcV
vcuT2x4oSOplcrZxbZGl+9t+5zZF8rYcNvWyGO27XNXl8P9y5z/XVXLtCOdd
Pdr4r3U1b/Tzb+i+iGIr2u4RGO7wwDs88N+AI+3XaZXc1MQexC+rETR5i4+/
0X/nlesPQPEdEePXfxCASVW3G3rvnrni5rvzFycnX59OJkW1DF9MJrPZLEkX
HQi2n0zu1kWXEK0OoMMkd3RZtGpMmwm9nfRrF1gvadp6UbpN8lD066LiL/8w
Y0OkHScPyp/Mu/NIxBE09DLtW6Ql71zsrDBN0rKsH/DyhrdxCT2e060mfZ2U
NYQewZ8VTcHQpxnhl45Ip287lzTEvEBHR+KEASjrBS24TYgWfh3cNOHHZyRq
7ovMJUUOUJYFlj9y89V8KveXpHneAlDiwWZNPJuISOyO58kdoSMDOrI1rewq
grCo7uvynhFbFumCttukTYP9CXfdeBs6xcbjz+AgjN8XfEiSEnRNhJNNUekC
tGpKeymGiSLSgIDPumhxQ8ZmKPuiKaNl50oYmyLPifMmT5M73qEu69UWVOIS
EsW4trwjKf7u9u7JVP5N3rzln29e/+Xd5c3rC/x8+8PZjz/6Hyb6xO0Pb9/9
eBF+Cm+ev726ev3mQl6mT5PRR5MnV2e/0Dc4+ZO313eXb9+c/fgkYcKLiZc0
DpC3cEIzTevAJ2k3yV2XtcWCfqF3vj2//j//++SL5O9//x/KIr//rr98dfLl
F/TLw9pVsltd0U3Jr4Tm7YTuzKUgSdBgkqVN0aclUUDaJd26fqiStWsdofLZ
vwMz/3Ga/NMia06++Gf9AAcefWg4G33IONv/ZO9lQeKBjw5s47E5+nwH02N4
z34Z/W54jz78p38pSVgks5Ov/uWfiXy+L4m00pYJEOTZkbA5mSdnybNnt0rF
tw2R5bLIkstAkke3t5fHz56B8VNlwphiIQJSUf2RtCGLo3cfeqF18DHR8uNM
M08ue6xf1f0uvxtH6Csd4IUE385+HdISIJCkvb2kK8/KgeiId398J+K2vSNM
iddZ1hV7u8+TN6Tdac20T9yHoutdRYvhUBU9MYaAlFr/UJN6SDaQLQYwkb/T
kw0pqaze6XoANO26OitSZoOMFUhH7EEmxgqMgic60lSMXYitgUiZrpSBpS27
XeSYWiCtQ++2CUlUgQ8GEFYkq4iEW9Gt6VZI4WRrQmdFJ0s3EDZyWYqxzkgh
umshgY7R+G/P7+i+iY4S0qAkkuaemM5ZQBtJxZR0HlHS7j0fJinGVEbYXjAW
chxCn9wyfvipXakZiOU7WkqPNw2wv56fvPpipBZ2tMYU1yg49IqGVFgDPUaC
LNYGEGp0Lph6BYgDcugfhzgvlksSTbR2gN0jNGhrQ+q1kjNp69troFTpuwuk
P03ua3qU/qHPa5GWfCBRrnTXpJTKWV9swK2bDV1DxjZNRE6gGHoPEBM8rwWP
/O5HFSBh5Ge6t+6saaZqakANF/rjNPmZaJS+IZu8+DBNbotVRbaE6zMcl9FT
dKYyS6d2AO7KeOucaZ8g26RbIr97YqQ+KV3a9fyYyAMiTSyrfER48qbFHyDV
gGDa69qIlliFHui3QpbkdA041yat5ICASFmuYxgjnLHua9O8AIoBlisdoT2g
zSgw+iDcWTCKSKcxUugOsD8wA4zNIHDbmqyZPKbOcNJgwIWjXTxysGWawVJh
83VsV47sGFKq9dBDxeRe14/sUlP8EF30nbexMlqmZxJl1PFPOGvpaBOhKnGW
AAOZhWaLMeXx3YdL7aD+W+GqzviOwXT5PPnZEfeTIOvlYGlycc00Q8+wxQrB
u9iCrtLlkk7FH0CNASUgGZZEdLI2Txry9rZzWF6XQHU+ZLjKyYRDAAFFnXPv
lXOUetVmJPIsSNzRRVUACAcOfOeCGWyCILCYv32iEXKqk2IpUiavq8/65H1V
PxASimwdZLa9wVhSEmK3CuAQWZ4PLfYoyVgX+OolqbakciKv0u49a3ByQIDf
1Esl2Re0TEvR5c/q5WxBJ2F5Sc7PvgieKmh853T3S/KEgLe5tzWgBKYRAteu
bEzP8DbVIYV+dFbiH/reuPfsGKCTe0S6tJIz2xJp0pAaZ5eFbiCgmIBm/eoX
/bZexEt+e8ympOfJWeUGYuISdFuRSp5MRn4R3asTC2vhspQ2Z/THyuJBZC2b
rSy3oOo8po9GjsoBRwYi8piunc0J2w1ERdKkpNMqrvex5a+NZSnhvt44bMWk
DiB1K+D0mxV+htNNzsZq3QOLkewWac0Xbmi2XXBO8p+2Zqr05meZO0o4Iiuc
uTd970SkL9XDetytE9GQttUnbLtgVpkO4dOKbNF9Y46zw2/YdIuoHEz+FHKS
gWY/HmJMvKx9J9vkmprTdFUtpJuqAhYCXoAtXP/giNO8BoMIYwj55WvXgm3x
dlnX7wdihFqPbSvQIcy7dLtC0Bs4tPyOLGRK87iDcWGk6/Kw+GYgFUovRaCz
JOuGNiIiMlUHyE6SI+2QFbsMzIs0bQH5XfxNb4N+v0+zODhAjFrQvZEN3cnN
sALDLkWIIoaYAuGK7HNeG7p91fIVgu75HslOmfX1DOYK2ejttoGQiTQoS2m6
sb7O6hJ6MRj25ukLxkE3tDvdIAnpZVtv1IEnW8XdE+sLwRqiYWqwJMeONQHV
EAfCEyche7P7jj2MrxEGFdmX1EBnB3UKFWMPR+K/rcHpsg9UtSgSuqYcHJQu
e9d6G8diQRZ68XEGkjcgP6I9CcGQoF+39bBah5vbNZdFBYoQ6PqaCcyQFWni
W6PlQ0jgWEvJADzUQ4ldCQRFp9MAAbyTvwrpLbGNyHZEjaAI7Ci0FcnnKR3R
SIgdpCEDdsgnjEiQ7xXCfGRI2oEVV3NhaBKuivRxoE1CEp24RIVTk/mPhN3Y
SLgGAySvl/RU38WKwlvXYKVl2gqRVe7BWJ1DcpXrBXkP65rgMsrVQMjLr09e
/P47OYNpuyKBS6Bk7GvQCnZBeU1inFQ66bdOdLp3NYOLQW73A8w4L4iJuFq6
LcJIvg8wOUBlvZVtxoBevLlNbm9+ArUhADU1S0QsQ43kfPkVw8wCgKMCG4Tz
PXnPklUB6yaNQTenjQnfQErSe2QCFiMzg+hgDR76qb68ThZpF8C8dZwdIXBJ
HrGLA9ku6DyCdW9IffHqxIea6JeXv/8+j09F0gYskKcNIzEyX8bCNRz55VdY
cZ78UD/AtJ0mCxJGeqNgmB20Ifi4BdSju6MzqWQCR/lgBSuugSRz0TMmOBQb
ac2yIA27qUl+umTHrhArQaxHtkKKai0GkW5stAJvkIj59Zt3V3qiVycnXxKO
zCbJhWtKuso+FbPushe3F2fjeC+DPoIAJncLhHTGxHmxKnrBCS1tnz5x5KbP
07ZJn9D1koH+QT0JJiGENciJWsmNEvk2xGnsvyopM/qaNGPJQRZSVkdOKl1C
Uj9U0UUqdPSMo53AHT+vgbzeZetK7xlBeYhDQvZD2pLZ2wwLklXKGSw4aHPG
F/hqTZKUFSwd2Mea4QiFQEzs7Agdhf092bDyJHU1vohXdBGeN/keF3ApIdFK
9pvY24C1OQ0uHfZbDlUmmGIiubq6TUgw8lcawguGwmRyplZe2pMZ1IjA+Km4
vkmOfmIrQaIGxF2wgrDG9e3dG1J+wVNkBrucXcxby7Mgy9Yg/jS7L5p2Bqa+
L9yDcB+ebBy5o+thNbiqqOSh5r4BL/HWBGxJpkUO29yRXU6aH/+SFO2RuAj8
f/P6x7dnF8nRjevqoSVS+LFWeJn/TMaZCHj19RefExBEL+oeeoPNScS66FRs
xhzgohs0o5BuXD/8G3BiHO4Bo+eIUug/JSW+AfOsFwM74bo4uyh2Mke+C3wF
Dj5ANoAmFCt6Q+rDCYAIjEIo3HsrnNmPFYaEVeKjsfeKj7OaVECX3ovRShBt
GxIKxpjKzQLSPHlHPt+GkAUzcBfOiOyP0g0Cm+qOqgSeDRWTKzQFx1OOwQD3
gAmeOKlh+jXNIw4beV3sG4iIGelV+MRC++QKi58YayzGMJ4zBUrrNer6E/nz
p5GwMN3yHS21oN2micY+p1Ggy9uanRoWe4EBcVd8jJZUYF0OTIzifTRp1Y0y
Pk+TM6S7SQL1A9zOq5okHhkTd94mpzOSrUa+rRmI8c3jK2BMCB5FAFhYg3wQ
NVK9cD2FX0po7iT+CLO7DB4zJ+EDDBuGQW2TOEmY1AscUYi2c2NbCbg2hS9k
IA/JaoI7o1yooJ7V0Ghj9b1NTO5ZXkxOkdB8gIdH7oHGqA7bbuRxiGV3ATeM
nUR4ORw9JJ9cfQsSZXK1U/G2OCiwdLlGkPgQwc2kpTiaT9SH8ovk10HsR7bz
2ALgRVIfWWV385zgwvEg1S6uk6OruqpLkGNm4YhjksUhbJ6y2Vss2FIfRctg
TkPOJEdx1KNbk5Rx+fOWGIn93/xYjHpWp7wEnhXXAP6jOYWqczcBHqXkaaAw
zl9IKmJbZWRmV3wOAZaYMYeFJnkC2Q4bjPByINol5gCESCpxSM0jqSSHlm8J
ajG+zOqls4coWUaeOAgp+LcS+4PJjziUmKfeAGjdilkjH9hkWLm6wZGh+3e4
h6+MuDO/T4lUSbhNZogTVDnhWEsD5H6rgsNw5tyy9WqwShgU2nloQCga8WVv
SAoCaJ8ZbNVNzaGztGh11UXBeiS6psiLAyyfxlSHy5NQNe8oUWzJ07ITDfnS
ybk57yULg4rodU9GLFnINjehQ0hTBzBlh4zwvBg8PhqJb6RIlCDYaIi8aNOH
RZq9Bx49I3jDDrVLBZO2VBgBXLLDoK80rJCQ9nrP2LpKOcS6JOCUe/lx+Lx+
SbrnobSL9Mhq6kLMN8JzCdl6P5RVqItgKoWOhipLWbuZOpS4F5E+4WnDV+Zl
J2KNRTaUtAADU2w2LocXZryhV89XQ3gr8pJNxYpZwbMgS4gfyK5nkQjUQsgc
xXVlHWJQbRcJCRJudZ88EvgnyFpW0EYPEI/EFuIrjuQJtvJ2C0iOLnWAUHZW
caGlL/RvrkfZz7CRYke4VemH+B2nLLqNqhKB9XrqtQSBsR4d+M3t1EuDVMGv
g16F9C55ab5IDbrvn4Q4eC2xwkguwJnqHIJ48+Ss5MwRXuj2oGid6eypGM+4
/x/r27tdD/1PL16wt1u3gQsIg+u0WyfssOH6frjrjqfCPrQ+4iF2eiI0mPJ0
88kBSUOQjMgy3qGs01xzY3KxMWPvZB0JHyDX70r3odD1JE8C/yrORQBxhAqW
lKyjRnITNNGmbOMxGYsYxcrfOs4Q0yuriiF4lCODbj4gEm7MZMrqGuQTBCzb
Cq5KNS1vd8Wy6kZIyvNzxvEnwlU7NP0nGZeM0q1XBXBKNXG3rpsu0SqHkf0B
dSyM+p23DIxL/e1cw0sJ+vzyoCHh7yfOOWMpIi+6+Jodk957s4+ogeQ1zBY6
P/iCrc2BDDSWcJ7uWSZH7CK2OdtCfFNVnWQijiMXJyfRKo5kiJxq6jgUirFf
W5ZhK0nqC6hbi5mzDbDlpWKalMMi1PmBZaEc0ZfJQSuAzBA2FTeXl4nsNJEp
RqBq4BmimXbo2n0Ynf3zBfwhtqJXrRNKnHKexfv/YypNzpL7tC28kurFSKIL
DInOg0aN6A0xaUihoyqJEW650DHK5KFgJ+6IgguXjdWl6e2eEwJcU2N2k1dw
3hppjTcUX8wHjHg8UlRE/BYrAGBmVnUIMrCVi4xS5aNxon8VeE0/xKIJRrFI
fy0ELMeqeI/vL3b569O0M4XD2yJETl+YMwqZOGZvoBZGFO4BJ8G6UcoiXI1d
xhQpKIN9qBgVhGfamQWdl1DkYyOQHdSbMCp7tELFG8nEBhlm6ZVWIuASb1DR
fE0230PRWUyH0LQumj0HBFltpjwRcZJrpScWaduimoFzOFDQOHa3gUfewgl5
zgiLNC6EmsAx8pZU3F3866UPP738EuEnDqJcnd2cW4HeK45KuawWWlKBeBbE
5/nYCyUUHHZxQQp3rnRiQryR0BxnHCbhY4vY1a0PnRSd+sQfTHYjsMhVnZXE
AULZizkgIkrp+l2fWkzBrWBW2imSt+wUl1Mf7Qm+kmdXrFF3mmpj1xpUJWla
rqaI1YjP0G+IVoVjOUYvRC5idUkfr71nr2QyNIh25VJEG1Vj0LMNyvyNj74F
dV/RdhIgnfDvmmpCxaQUQwSa75I4xcjR2FASgTwQFAKZJWNPCOLkQYphiHSJ
bnD2qGbIAKDTMLuNqodDatG7NqA6iWcH3YqytMMY36uZCJmN/fAE8l85KYRc
ogy5WyJ1jcjOxmOJSYF8vgxkAXgi+TSFNiqHXCsFfWrwQBBigtDN7bDZaLVl
3PUxmfyWPE1+iz+j367gO7I5+1vytlEa+W3y22w2w//D/347/DM9miT07rNn
ZwFVgNTk8bNn9O1vWDI5oX/p6rnglRO92zhtTCTcacLE8mUcq0SpR/RdFNez
x1i7kwUPr1viwnFgFIaw61A8gCtEphM4/i35oFC9ABZuFSx4cAUxB1uWo9rp
iknTYmnh9Zf07znnGTlGI660nfKv0HwSDW8Gloz7uXnaR0NgnrBpd/AaoAob
fRFhD/W5pOMsT+7l7oHVjXtwIhhkrrX0v+kzpQTb50+P77NMy46D+2VabDQ9
pnHA/OBlhVVfgb58bUwny0dLKz0EKD+TrDRxRCN4CeEUH8CI1v+S/j07zKy8
lZbpck2NY6bV0soPLP84NRj1BuzVBchbSKlo1QzJT0JsHoEgbDBye5krIw74
Crj1DzBg3dBAjdClbPdKU4ENNodhl3DsZCeucnR+aal3003k1yG91EJfy51M
NUcel7kMnRF2gP/rfeDiaOLfXFtPkbFl39KbPhaXVJskWu/k89GC3s8fHTuY
xlMpIyhKDm8rF5VkxamRTdSQbrhJJ94jlikQiCUpQojYlIAh+lqn90XdWs1b
U2o0hE3tfDaQ4oqNc3svWv+Frn/2Cxx4N+OMI9m21cweNmUuSWShlnWx0lwD
62DNa3RMBx9k4ZcHF/ZI4pA4W6sPM5VzJEHwBik5NqhHq8XCAdqAC/2sNBXK
QqBsfdOHCEY2u5BzUBOxCgBEOIBEgFrzkQbBNncESVyZLngBxBuewR9mF1hI
caq1Qvastxs8b5JfRAZ9YN2R48VONz0ggdYHzpDubuWTGJLlV0/WooUiWPfE
euvIAKzE1ug8pyo3v22UNtKYjU9ejSjbmIrRQpq1jitHNymBQwI4t5pPgWGG
rJbGJiCAuA4jbmaAK1FLJSfbjNF9QNa9ZUnud1m5iu3ErRS4kbTKiKzZ8Lzn
9OQDFyS6kIDg5B5gGaoSlp77gLhqAW1FeoH8Og8wl3K2BbmIaRmrEZj0A3wK
l8uDaaLR7TZkGSNlcB9nbaPjsFC8Njltkf0QTA2hr0CBOAUwFnToCv6ekoqk
I0c0DOH2jjWPtsIsfJ5NC2/HnlPAgfRfPOIfs2OgwUh1VsTjoqOTKBLOV6cX
TQ6x+3AcMfALyMo3dKA4ARKBGsrSSmcUwt5w54P/zDcfis2wEYIRgaKwvfiC
bm1ALDTsqSR+i3AG8UJE3y9OHqdvrZWWThukqgbEaJAA9OEK8iw4nyiY2KC4
s6iHThiMzdeRIQEk4dhR8Udsnr14HBYSHHXbSFgqJaE2u7ioEazFj46Q7IMu
XJpLH3ZNuokvOtoG8vgMvVtxS4L3iqWSjGTYhVZNymHMitHKP61HR39oIdmM
sf9g23GC9bC5vGOynx0Ko6crUl8rjt4/Xt8ZAj/iMMC5RtEJWxDwU0J0YCcy
0PeIgqi0DsvUZrqxZDUjsOdqFjHBp6EGlsslOTMgVcx7wiB0QJpAAgloGR57
iByG821DI6kd9IOVfugCc3J+1I2jR9oaFahBv9xe3UIGsg8+Q8oAZ+JmlQRV
NmMBpWFOFwONIxzo3UFn1PhldkbxHRHLW9x0AmE/K+Qb61/CNf1SD3fDYlR3
jAjfwSS44EpEfa92cC6P6S0fdpgcrrOwTkQpEkOtizShW+OzdKEXOZ+6RcXL
WQgWNKE+OCosWHPUZ9+K9/XQalswSfi71OqSQzeqYWwN/dHpd7hBLZqooyp7
zPUKzoOTqJWfRRC0yE5jWuR2xd4TQxtqP+MAlVRewzba8WujSt0x/Rilm+/K
Qvyjfu7ctthzUj2a2XaLC07H3qpfIULWJ9xUKS+jjyKPct9PjerDTdFIcQ9a
VxBDIkMhEdebqPfYytslcwoATPfs3DO3Dv03fF3ufoic26h02ifrDG8qy+eT
F+OL/Kjrq009Ox5wv/7kVb6c/xEveHSxam0dAVCkBUgskgAmdwIWRETlrHus
wym+GokKXXu3tzvQT5BJxZamD+Qg/nnO3Pj+GhiYApOSf+Re+DKuEXNHZvwU
aPZ34bkLkPoGMq26B644jYWDk3XpPvRIx9eV9XdYSorVJ2njYzQX3PmiOFRP
rVZO/R/PvwTzLLkcVSh1KslQlio5JtAXNEVHZtVsSaw041IVVSki3j+AG4Ta
2TVxhvduhLwpl3ypqNQccDByF2lXZPREIUS5KGvIal6fc0rWpGJhK0gs2XgU
l+CdELYHwnSvDK0rWolpnSe770hpjNT6Iz+U+aD0hrsUYMnQ1ijCEBsPVgT2
GRPQKGZvYdrgzsWkJL0EjZAGF7cPzJ9cB8e5DtPnGzHDrVdjp6qMT/u9utzK
LTLtgd7hcmvX7UDIbi0bZSUq+7YcmK0bnw+Q6uSUe0cjbUJQcAAiKuxCF1Xw
NOUOQ79DhF5fqy2WVcfzF0L4FR3XDyIVv+VFbqLhDIFhY+k4mUS/nP5/CXkR
wKN2DWmakAwQ8rxj6aE7RhVA2lrUOgkenfpSxuTo5Dj07SZHL47lEpB3WbVk
uR+9JB7nVgyO3GgzR2C7kDOTlg8SBDXkjtRQc78iE4tALDB2OhlCz0invS9S
D5JcTnwt560WZsGbTP5cI3awJWB3yPN4MvmBq/aR5oeOf+y983d/Jq9MFIr0
OiUb1MBCxrc8MwU5g4iQ7cIg7S7F5cQaQkxTaz4RC0ufFTTKqfU75RU16g/a
dyLdb+VBU7ERL58m0rWIoFqqFLSApB1EYMt+oRNKGz6rqHQV+gzpa3kgZK1p
s4418m1Kpjr9tr+vv71wofAYuA1zXWys8JbDHIf6ElH3una+WW+eEC4FjAfp
JMEmfoQCDqghVECTj+qAo6L1lxjcMCOxmaO08DGcjZdFxV/tDUKvaIGD0Fjq
m5HYzpfzcjYtJg0EsnxTzcnncZmRtiVB5MWGuJTFxJaA1QB/wSfJh1Bt94lj
MEyfWe2BM3JYkMrMs7Sz6vCylN7mUBTCjRU47Kh5RuLJ+D4qMPwTdyrOlHj3
APJkaILMi/QAVYQ/YF0GFOTRzIuln8AgBKuG7XlKC8bHQ45VV4gSgdiLS7wU
HWT0vpon5yXnZyUf+DEWAi66OstwOuhdOU7oP6qCMFYi32cmDDkAHLBnOUEK
d0krpZd+JNLaaluZQXwYTYL4/iYIvM+6sZHxJZmwjavQ8fj4kcJpfHmL7zbe
PRDbiv44PKEBR/EiODpGhfYI25pzA9GJjoq54zCcJUtROEGyNW13Q31pnBE0
KzmBlbyfvdlxTUgbRNMa7raNG/XYfTKl81i38SFPkyxoWGVkWXekOtTa/vZw
KkhMgVBxaDMa2KCGncVRTGnW0q+8K1rvUPrt5U5OKYywgkx+O04vhXjaKZuF
2gPdDdwlw/FMbe41Lyd3G9KQPYft0HeUotDgU1EisG3K0fVerhNt8CRufyJY
0p4djVOJftl20rkhwSAuDJAfHxnZMplcj1rFuChg3AfPlOSiYSS+Bw4P663v
zcF4+nQ0p1GTIrtU9RQCBhWGYhbve2hCjHy2OCvXZa5K26LuhIDuU6lMslMQ
kJag63dMduZ0oan/5dpabbGoHEv9CM2gwI6s6hkP7wEvS0EJqrKEeNg9YLsx
avi83B+Shis61laZfhzX5kjtlr1xKf2XSRZdnIFgJ0sm9NTc3LSqpG5qHArB
2iEcAotufHyrvAQ5V2yHHjq61aChqQilGRwk0RoW3Sg6rIoWLXrjmALR51Wc
KD20SXybgkpJR8TvaWnNzTilNjnzs0K005k1XerdnSgx5g1MS7/VraXPuKJw
Jymn9W7qQGDGg4gvyNxuVMlpOA1pFMnR+biughaiGyzu9f3pKK9HEsLCNyLc
W6nw1j4ZDUmPeufRFMgWJ06xl3rUtou0s3Qgu2CLoudMlcX3GCAYIwvOwGqU
S0TkmKzEtrXBhoiicRZPTBt+GEuQACukJ/XRrKkvYdbkqNQFIpXqYce40gPy
Qy525BEKaYiDOzmQcNfZBXKZcdxrdMmhRGwv3w4LdSj05c4hJO0Lj/mMe2+w
M+LDW140Ch37QmWUh12aeJHhMvC4jTGqDllLy69LZBFhTUSxfa8Rakm1HlHt
RsFQXFQsXr9lTUxM8fJW0mh1YCHk0duwleRwsTQnKWRM2LquOzWFYbAbOEp9
nIhznmzsPIXMFxMwyESUliG0Mvr0R5zfGtvyruCzBS/bRqJcXH8W6vjY54b9
IKXzZB9ETjJ6zWqPT6mKNazaPYWKjAm5rRh1wIWcWW0TKgO5Yi4UyrkN99HU
LNZAKv6FUrBKXDxOL/ggAKzhYwNAS0AmZ97as6JZFpsN9AWzr6zrCZVRSIJb
t4tLPLKik4rxO44ZkB8ysyAQwLKiE7MiPO1y4PDiehbCImHZU4lylyG9LoEj
67HtPY8oysMiwQ/SylspJiMTsXQcjoh3KSppgek+tUcaJEyMOG8Ga1pfZDN2
RerzAgpqwwWB7tM7yAvx7EVffTvVPmlJBfhcQugctHz9NjkKIzhZZhxbNfZu
CY8W9wytm3BugO8HMWEMW+PhSlr8A/TuFQDpmCqfsPLdZdoZMioKr3dDmkq7
Ov/I8zch0Tbi/vnQYzb1/WHSlhJWRVEHItWjCJriLyVKsDGPfpClF6pTuxE7
Kc+l4YCkdqXz0ceMzNc3lEs8ZfpgPokwKN6GpaGMKPfwp3PntHAqUa0Y8RXK
Akq9O6FgLmsS4Tc5W5FowwAVqYs9EJfFhQybiIa47INz1Vq/JhaZnxBneep5
8oMIQBux9vEyrd3xX6nZJzvCmnlo6R68uM7Twoy/oAq0cl3beQLsF95kQ8sN
BHXAhQmwWqtty+3BAjDpMxNcj6q+lF4fTOmGGrOoTmxZt2NjH0Ia0XLrFSKL
wW9qVSpEbhFlWICbB2Cw8etpUo8dXb/KFx55hlsmPeqcVpYXkoLZcHnZaFN/
WPbuvMTSYgsbgcaMNFvSLVQ5z0fWEWhRLnHfm4oNpNGZxqVxUFOoGtcMIdvy
ZcKNpEk+SDORgbkfIlSGHC2tmvnjNXfQfbHCjArv6GDXtUrJnUb6qKSB6dAH
dO2mAa5EbOL8m/h4f9EMnQdFAWa9gsk1JRy9kMi91tEfN+hHO2ZzBAPyNLqW
OUKTRfzi09FK1pHb1R5BRO5hkJqqECkNgLZnN+wv/ClTWNWPgLvjwiJgRzof
DbLLqDowjLw6ur684Y5Pe+zWYew4u8OIWRxd314dW6sRH2NcBDn9KNwFl9EB
ZPbQo8ByTDkswNlJRcmFNJ6zDxuFFccz4xCNixJ16ktxiAzVKvNxOOAPbSbb
LFn5SaumzTm0eVx+bMc8+cj6iEiSccMikx1gHlKhjaz9o0jQZngk5GXyVesN
YlY22KlMG1+4xLfwUHNhUkZbkKcYlXkYTWEIhp9Fr2kqXyqj2/vxIOM5GFP1
3JumLJyUqbZu7Srt5Bv8kJF4rynPC+JJcbgv6+tCNSOiLkM8H/qy0po4FKg8
jhgJ9/qx0T4sivwrQ6IRZj8UJLLlyMQo6twGKfFoUxmgVG5HIfWo/OSBc7EW
NPa4ueWZweHKwRDBNjcSdZZMrZlEkSDfut5DON2NquzQDdd9sIYTmuHJIlFJ
7Vhu79CghkilkswiqrDfo3kVo+KocdiEC/U4gMQdTUFV+di2jgeMMvWjwQsL
+PopdL+lgmfhHrRVhw6EiZax8zye1yCyN7i7UfHhqQ8xc22dFXKaF9LtTo3k
gKS1pcZjJ6KAJ/gi91NvlcLWnOe1/HfreOKPy0djQ/SvI8RzO1pyQNDwGRxG
ntpBQJSde5B59iS3LwBBxxEgkhIIwt6E1iU/wOb7i+sbHZislg2UGyiSE+82
SFfOA1okDiQsYmColP7GYd0QcoFhg7Wixu5ecnJq1/6VdHiXF1ZOVqYPnaV0
xQGZTGQCPDRLqZU3hyrT2LaRilsb98OmNxwCiLR1CtR4V0fmaemICDH6ZTip
91/NiDzVahI/KjziyWCZIscRLBFzsHmCDosChgWlAH6ULhvUZc9TBBGuhT4r
0L+cS+zUypbioInMZ+U/IiOBeG1Ik5PqwisAZzm6uDc06iC1aLCM+08GTtcJ
pD3G3NjhUa8JApGtuImSaBM3z8IbqaeBB3TRpV35IGHlJwlKKdxqsK5OiR8u
Y3bzit/sLfmLISIhTCOta85PsvnqXVOZX+B95bCq73BnQwutxeNI2qFJ/+FW
vSUfz9kencPHQ3VADxmLZIU5uHN3ZAyUnE/bLeIay0uyhu6dcAi3I/gGBE/O
R5IBkHbPeqMi34kNaItpSJtHkQd1tNOasGx5XuKCI7coL7DPLFuBwovS5Sun
kV2b2ceBZF9dP+589RTUjFqno4RZ6wYLVFn1tMy+RFepWYVRlPRn4g7HOcdR
5wCcWj++jGcFVAEmX9TMfkKUN5dpla1FFB5tv1BZHPVjhJp+3Ftb5PRx8vbN
j79YFCDK/9GNRyWmh3owoq4Ni0DFRZnSho8/64A/yoCGBpbZZ6HbJCpJDefr
onmrktqyUadaJArB0f1D/R7xnIqnaMaW3o6b0NtxKOHKZz/QG5J+vDtEUzTx
NfuWQZsmWGhrThgPoRNIQm2Y55UoxsVM7+tqX/j71Z31duPSK3FfOanQcq0S
qYxRmTmWtZaaJWfA9jtOjqy0VcxRM1XtGiMn7JizTpdLLZJULJFKVU01rolq
ZXxP7n1Z9KO5DnNeZNQHz2caODYGOexrRSUgZAWjkf0zunVi5SbERA1aJYLL
0GJzbhWB273bvwrdGgc6dw6Muxc+sBJduVi35WYHGOxs6vPQv4g1REGJP6G1
I3qzmeZA+T7x17OSGVGvLz2FEGMhyUlzSUk6iN5xh1d85Ritg1VQBzazWsU8
NBzZWBoJBryYx3gyHldMEPetGHyd5TSqFIu76vEXoTaIEBpBdEG1nHNFc6xY
3jWsCEU+LJCViHWCMEylvUoaLRiNRbDmB/Okji17L23a/eN6S+8yDKvaGcct
nO29Zp987bwQU42lOeSoaD4WHt4I56ykITdymkZj0yRQTkjSwWdHKZJRxBPH
UjPii9jHIyakrLMk9UfMjagFN9vwX274iObeMXD/oSaquIEqaO7RMla8xMOL
ctV4rJXJ6pFhmoJamRno2McgwuAE745jwQkRO1YV/ugaW1mZayR6czWG/FBt
PS0tLoEHD82EdhitBpYpWaNzyZ+iYBPcmJYgeo3JDowOnRa/S0R/CKYN9HjK
EWQhNfkDX3G9wmgyywZuhkZs/TF4zk3ZcSCvFa0odSN642kuQWDN8nLz2uud
vrVbtKwF4pF+hTBd4xFakhaYgSOLMoj0o/NhOBksizqFgz32GTSBMFaXYUqc
GQQEFJPcYhuRZphbeiR/XeDiWv7q3fjvs4wJ6OwP9+1hcAZqGUZFFMIsKj1k
ON69OHIPmGnvW0HpsNhEswaIDMg2zlo4dcQYKrtHJU9ipRuiWBaYKYGbBGAa
POTaiHkcroy9Ahv9aNXmi6F8b8mFKYnZ5dBl2gfPsXstKOQWMLa+JMUS1eZB
tLWOLjkga+SQhQlrSLj5BAR6IMT32SnLcoinZvGjDOh+smZ6qGE2/G0IDlM3
bREt42GO6vkBvuWXpqFMcHQERb53AXTaIrjl9fiPLcTtlGAL5DPj9nGLnOT/
d1s6ubfmKf+xto7/Qs/Zm7M9PTD+S5qwLMny4CfTzCZQ4U8sYsoDt4Z6j0kC
Y38/FWJ0+f98wvLkye+Tn53WuMswwHrkZkmoSNpE6oGFF2rBQ28iu+Ycme05
qU+uPTa3+lJJMvNIV7r8QQWXRKwRgBWJovkRLoVBpJXlfrGxVpgu/uMAY53v
/1zBfwGaHkh80ngAAA==

-->

</rfc>
