<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-mimi-discovery-requirements-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="Discovery Requirements">MIMI Discovery Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-mimi-discovery-requirements-00"/>
    <author fullname="Giles Hogben">
      <organization>Google</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>gih@google.com</email>
      </address>
    </author>
    <author fullname="Femi Olumofin">
      <organization>Google</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>fgolu@google.com</email>
      </address>
    </author>
    <author fullname="Jon Peterson">
      <organization>TransUnion</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>jon.peterson@transunion.com</email>
      </address>
    </author>
    <author fullname="Jonathan Rosenberg">
      <organization>FIve9</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>jdrosen@jdrosen.net</email>
      </address>
    </author>
    <date year="2024" month="July" day="04"/>
    <area>ART</area>
    <workgroup>More Instant Messaging Interoperability (mimi)</workgroup>
    <keyword>user discovery</keyword>
    <abstract>
      <?line 55?>

<t>This document defines requirements for the discovery problem within the More Instant Messaging Interoperability (MIMI) working group. Discovery is essential for interoperability, allowing message senders to locate recipients across diverse platforms using globally unique, cross-service identifiers (e.g., email addresses, phone numbers). The core challenge involves reliably mapping these identifiers to messaging service providers and determining the reachability of a recipient's identifier across multiple providers.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://datatracker.ietf.org/doc/draft-mimi-discovery-requirements/"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-mimi-discovery-requirements/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        mimi Working Group mailing list (<eref target="mailto:mimi@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/mimi/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/mimi/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 60?>

<section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>Glossary of terms:</t>
      <ol spacing="normal" type="1"><li>
          <t>A <strong>Service Specific Identifier (SSI)</strong> is a unique identifier for a user within the context of a single messaging service provider. It is not globally unique across services. A fully-qualified SSI includes the messaging service provider's unique identifier, making it globally unique. Note that existence of an unqualified SSI on two or more services does not guarantee that the associated accounts belong to the same user. Thus, linking SSIs across services requires other verified data to establish a match. An example of a service specific identifier is a user's X/Twitter handle.</t>
        </li>
        <li>
          <t>A <strong>Cross-Service Identifier (CSI)</strong> is a globally unique identifier for a user that can be used to identify the user across multiple services. For example, a user's E.164 phone number, email address, or other service independent identifiers are CSIs, since they can be used to identify the user across multiple different services.</t>
        </li>
        <li>
          <t>A <strong>Messaging Service Provider (MSP)</strong> provides messaging, voice, video and other forms of real-time communications services to end users. Examples of messaging service providers are WhatsApp, Messages, iMessage, Wire, Matrix, Signal etc. A user is reachable using one or more CSIs and may have at least one SSI internal to the MSP platform.</t>
        </li>
        <li>
          <t>A <strong>Cross-Service Identifier Provider (CSIP)</strong> is an entity that issues, manages, and verifies CSIs. Examples are traditional telecom providers, email providers, and other platforms capable of issuing user-controlled identifiers.</t>
        </li>
        <li>
          <t>A <strong>Discovery Provider (DP)</strong> is an entity that facilitates the discovery reachability as outlined in this requirements document. This involves creating, managing, and leveraging authoritative mappings of CSIs to the MSPs where users can be reached. We expect that a DP may be operated by or affiliated with an MSP or a third party.</t>
        </li>
      </ol>
    </section>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>MIMI discovery seeks to enable users to easily connect and communicate across different messaging platforms, even if they don't know which specific platform the other person uses. Currently, users often need to ask contacts what service they are on out-of-band, or try multiple services, which creates friction. Specifically, discovery helps a user on one messaging service (Alice on Service A) to find another user on a potentially different or same service (Bob on Service B) in a provider-neutral manner.</t>
      <t>Discovery is necessary because the identifiers we commonly have for contacts (phone numbers, email addresses, etc.) do not necessarily tell us which messaging service they are using. Someone with the email alice@gmail.com might use iMessage, Signal, or another service entirely. Thus, the core problem is how to take one of these cross-service identifiers and learn the messaging service provider that the user is using, and how to communicate with them on that service.</t>
      <section anchor="problem-statement">
        <name>Problem Statement</name>
        <t>The discovery problem involves:</t>
        <ol spacing="normal" type="1"><li>
            <t>Asserting verifiable mappings between CSIs and MSPs, and</t>
          </li>
          <li>
            <t>Performing lookups on the mappings to determine the MSPs where a user's CSI can be reached for messaging.</t>
          </li>
        </ol>
        <t>Discovered mappings must be verifiable to ensure they are accurate. Crucially, discovery must prioritize user privacy, allowing individuals to control their discoverability, and it must integrate well with end-to-end encryption and other MIMI protocols.</t>
        <t>Note that mapping lookup is distinct from the retrieval of the user's SSI and cryptographic keys. Retrieval of the SSI and keys typically occurs as part of the messaging process and can easily be done after the MSP for the message recipient has been located through discovery. For example, an MSP might store a mapping of CSIs to SSIs and cryptographic keys. The client would then retrieve this data just before Alice sends a message to Bob, following the successful discovery that Bob is reachable through the MSP.</t>
        <t>The rest of this document describes a series of requirements for the discovery problem.</t>
      </section>
    </section>
    <section anchor="prior-efforts">
      <name>Prior Efforts</name>
      <t>Discovery services are far from new on the Internet. The whois protocol <xref target="RFC3912"/>, largely focused on mapping domain names to associated services. It was one of the earliest discovery services deployed on the Internet. DNS SRV records, specified in <xref target="RFC2782"/>, allow a similar process - given a domain name, a user can discover available services, such as VoIP based on the Session Initiation Protocol (SIP) <xref target="RFC3261"/> <xref target="RFC3263"/>. SRV records were adapted specifically for messaging in <xref target="RFC3861"/>. However, both whois and DNS SRV records rely on domain names as lookup keys, making them unsuitable for identifiers like mobile phone numbers, which don't have inherent domain associations.</t>
      <t>ENUM <xref target="RFC6117"/> addressed this limitation. It used DNS to lookup phone numbers by reversing the digits and adding the "e164.arpa" suffix. This allowed delegation of portions of the namespace to telco providers who owned specific number prefixes. While technically straightforward, public deployment of ENUM was hampered by challenges in establishing authority for prefixes. However, private ENUM <xref target="RFC6116"/> services have become relatively common, facilitating functions like MMS routing within messaging.</t>
      <t>Another attempt was ViPR (Verification Involving PSTN Reachability) <xref target="I-D.rosenberg-dispatch-vipr-overview"/> <xref target="I-D.petithuguenin-vipr-pvp"/>. ViPR utilized a peer-to-peer network based on RELOAD (Resource Location and Discovery) <xref target="RFC6940"/> to operate between enterprises. It addressed the authority problem by authorizing records based on proof of forward routability but faced the same network effects issue as ENUM. ViPR attempted to address incentive problems by focusing on enterprises seeking cost savings by bypassing the phone network. Ultimately, network effects challenges (among other protocol-unrelated issues) prevented widespread deployment.</t>
      <t>Discovery and lookup services are now commonplace on the Internet but are largely scoped within large providers such as Facebook, Twitter, WhatsApp, and others.</t>
      <t>The MIMI discovery service requires a solution that spans providers.</t>
    </section>
    <section anchor="architectural-models">
      <name>Architectural Models</name>
      <t>To ensure completeness and to address implementation considerations for MIMI DP, we present several potential architectural models. The working group observed these requirements are similar among these models and opted to maintain architectural neutrality for the discovery protocol. However, we will outline requirements for the roles of DPs, how they interact with each other, MSPs in a federated model, and how DPs accommodate queries from both MSPs and users.</t>
      <section anchor="centralized-dp-monolithic-service">
        <name>Centralized DP (Monolithic Service)</name>
        <t>A globally accessible, authoritative database (potentially sharded/replicated) stores all authenticated CSI mappings. This monolithic service, implemented across synchronized global nodes, handles all CSI queries from messaging platforms and acts as the single source of truth for mapping data, even if certain mappings may be restricted in specific regions due to geopolitical considerations.</t>
        <section anchor="advantages">
          <name>Advantages</name>
          <ul spacing="normal">
            <li>
              <t>Standardization and uniform control over mapping creation, updates, and data formats.</t>
            </li>
            <li>
              <t>Promotes fair and unbiased CSI mapping discovery.</t>
            </li>
            <li>
              <t>Single source of truth for mapping simplifies data management and ensures consistency.</t>
            </li>
            <li>
              <t>Sharding/replication can address geographical distribution and performance needs.</t>
            </li>
          </ul>
        </section>
        <section anchor="drawbacks">
          <name>Drawbacks</name>
          <ul spacing="normal">
            <li>
              <t>Centralization of sensitive user data raises privacy risks.</t>
            </li>
            <li>
              <t>May conflict with data localization regulations.</t>
            </li>
            <li>
              <t>Single point of failure vulnerability from outages affecting the entire system.</t>
            </li>
            <li>
              <t>Potential difficulty with immediate global updates for rapidly changing mappings.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="hierarchical-dps-discovery-resolvers">
        <name>Hierarchical DPs (Discovery Resolvers)</name>
        <t>A global root Discovery Provider (DP) directs mapping requests to authoritative DPs based on CSI structure (e.g., country codes for E.164 phone numbers) or sharding mechanisms. The root DP, similar to hierarchical DNS, acts as a directory service, holding pointers to authoritative DPs rather than mappings themselves. Alternatives to hierarchical resolution, like the LoST protocol <xref target="RFC5222"/>, or distributed hash tables (DHTs), can achieve similar outcomes.</t>
        <section anchor="advantages-1">
          <name>Advantages</name>
          <ul spacing="normal">
            <li>
              <t>Scalability from distributed load and mapping management across multiple DPs.</t>
            </li>
            <li>
              <t>Flexibility that allows different DPs to specialize in specific CSI ranges for regions.</t>
            </li>
            <li>
              <t>Better alignment with data localization requirements.</t>
            </li>
          </ul>
        </section>
        <section anchor="drawbacks-1">
          <name>Drawbacks</name>
          <ul spacing="normal">
            <li>
              <t>Requires coordination and maintenance of hierarchy.</t>
            </li>
            <li>
              <t>Root DP failure could disrupt the entire system.</t>
            </li>
            <li>
              <t>Potential delays due to additional hops in the discovery process.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="federated-dps-distributed-peer-service">
        <name>Federated DPs (Distributed Peer Service)</name>
        <t>In a federated model, multiple independent DPs collaborate to provide CSI mapping discovery. Each DP holds a subset of mappings and pointers to other DPs, with no central authority dictating mapping locations. Discovering all mappings for a CSI may involve querying multiple DPs. DPs can exchange CSI information or recursively query each other. The specifics of DP federation are determined by business agreements, not technical requirements. A variation of this model involves messaging platforms acting as their own DPs, managing mappings for their users.</t>
        <section anchor="advantages-2">
          <name>Advantages</name>
          <ul spacing="normal">
            <li>
              <t>Decentralization ensures there is no single point of control or failure. The system can continue functioning even if some DPs are unavailable.</t>
            </li>
            <li>
              <t>Mappings can be distributed according to local regulations.</t>
            </li>
          </ul>
        </section>
        <section anchor="drawbacks-2">
          <name>Drawbacks</name>
          <ul spacing="normal">
            <li>
              <t>Discovery process may involve querying multiple DPs, increasing network load.</t>
            </li>
            <li>
              <t>Potential for bias as DPs may prioritize their own mappings, leading to uneven results.</t>
            </li>
            <li>
              <t>Requires robust mechanisms to prevent CSI impersonation and ensure trust between DPs.</t>
            </li>
            <li>
              <t>Pairwise relationships in a federated DP model could create a barrier to entry for smaller MSP/DPs, similar to the trust requirements in the DKIM <xref target="RFC6376"/> and DMARC <xref target="RFC8616"/> ecosystems.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="additional-considerations-on-architectural-models">
        <name>Additional Considerations on Architectural Models</name>
        <section anchor="telephone-number-csis">
          <name>Telephone Number CSIs</name>
          <t>Telephone number portability is complex due to its reliance on real-time queries to proprietary and legacy systems. Overall, the authenticated mappings proposed for MIMI may necessitate additional platform measures to assess mapping freshness and ensure up-to-date reachability responses.</t>
        </section>
        <section anchor="bias-mitigation">
          <name>Bias Mitigation</name>
          <t>Bias occurs when a DP prioritizes mappings to its affiliated MSP without consideration of what is best for end users. Mitigating bias is essential to ensure fair and equitable discovery of authenticated mappings across different services. The working group has decided to defer such mitigation to policies and regulations, excluding it from the discovery protocol.</t>
        </section>
      </section>
    </section>
    <section anchor="summary-of-requirements">
      <name>Summary of Requirements</name>
      <table>
        <thead>
          <tr>
            <th align="left">#</th>
            <th align="left">Requirement</th>
            <th align="left">Mandatory</th>
            <th align="left">Optional</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left"> </td>
            <td align="left">
              <strong>Authenticating Mappings</strong></td>
            <td align="left"> </td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">1</td>
            <td align="left">DP <bcp14>MUST</bcp14> verify user's CSI possession through proof-of-possession challenges through a CSIP, certificate authority or designated parties</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">2</td>
            <td align="left">MSP <bcp14>MUST</bcp14> confirm CSI reachability on its service</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">3</td>
            <td align="left">Client, MSP, and DP <bcp14>MUST</bcp14> jointly compute a verifiable mapping representation of CSI-to-MSP</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">4</td>
            <td align="left">DP <bcp14>MUST NOT</bcp14> be able to create a verifiable mapping without CSI holder and MSP involvement</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">5</td>
            <td align="left">DP <bcp14>MUST NOT</bcp14> be able to falsely claim user completed proof-of-possession</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">6</td>
            <td align="left">Other users <bcp14>MUST</bcp14> be able to verify CSI holder's participation in mapping creation</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">7</td>
            <td align="left">Authenticated mappings <bcp14>MUST</bcp14> include a preference index to allow recipients to control their preferred contact method</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left"> </td>
            <td align="left">
              <strong>Discovery Protocol</strong></td>
            <td align="left"> </td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">8</td>
            <td align="left">Discovery <bcp14>MUST</bcp14> support any globally unique CSI with backing source of truth (CISP for telephone), ownership proof, and cross-service usability</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">9</td>
            <td align="left">Discovery <bcp14>MUST</bcp14> accommodate zero, one, or multiple MSPs in results</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">10</td>
            <td align="left">Discovery requests <bcp14>MUST</bcp14> support federation, MSP filter, and DP list query parameters</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">11</td>
            <td align="left">DP <bcp14>MUST</bcp14> disclose default behavior and comply with agreed-upon federation default</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">12</td>
            <td align="left">DP <bcp14>MAY</bcp14> rate-limit non-default queries given their higher processing costs</td>
            <td align="left"> </td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">13</td>
            <td align="left">DP <bcp14>MAY</bcp14> rate-limit requests sent to low-throughput DP endpoints</td>
            <td align="left"> </td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">14</td>
            <td align="left">DP <bcp14>MUST</bcp14> protect at least the querier's identity or the target CSI in requests</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">15</td>
            <td align="left">The protocol <bcp14>MUST</bcp14> define both verbose and compact response formats, where verbose responses include detailed mapping information and metadata, while compact responses provide a simple indication of CSI reachability on returned MSPs</td>
            <td align="left"> </td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left"> </td>
            <td align="left">
              <strong>Operational</strong></td>
            <td align="left"> </td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">16</td>
            <td align="left">Discovery service <bcp14>MUST</bcp14> remove mappings made outdated by CSI re-assignment to a new user within reasonable time</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">17</td>
            <td align="left">Older mappings generally take precedence over newer ones for the same CSI unless explicitly invalidated by the original CSI holder or superseded by a stricter proof of possession verification</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">18</td>
            <td align="left">DPs <bcp14>MUST</bcp14> implement conflict resolution protocol for new mapping registration attempts</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">19</td>
            <td align="left">Users <bcp14>SHOULD</bcp14> be provided with mechanisms to invalidate existing mappings for their CSIs (e.g., in the event of losing control of a phone number)</td>
            <td align="left"> </td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">20</td>
            <td align="left">New CSI mappings <bcp14>SHOULD</bcp14> be discoverable within some standardized maximum time limit (e.g., 24 hours)</td>
            <td align="left"> </td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left"> </td>
            <td align="left">
              <strong>Security</strong></td>
            <td align="left"> </td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">21</td>
            <td align="left">Discovery service <bcp14>MUST</bcp14> leverage contractual and technical means prevent malicious MSPs from falsely claiming CSI association</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">22</td>
            <td align="left">Discovery service <bcp14>MUST</bcp14> incorporate anti-DDoS, anti-enumeration and anti-spam mechanisms</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">23</td>
            <td align="left">All communication between clients, DPs, and MSPs <bcp14>MUST</bcp14> be encrypted in transit and authenticated</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="authenticating-mappings-requirements">
      <name>Authenticating Mappings Requirements</name>
      <t>A Discovery Provider aggregates mappings between CSIs and platforms from trusted sources. To prevent impersonation attacks where platforms or users simply claim to own a CSI, the user must solve a proof of possession challenge for the CSI before a DP can establish reachability mapping involving the CSI. Suitable approaches include SMS one-time-code or voice call verification to prove possession of phone number, email link verification for emails, OAuth sign-in for Twitter and YouTube identifiers. A potential architecture for generating credentials from proof-of-possession checks is shown in <xref target="I-D.draft-peterson-mimi-idprover"/>. A platform performing discovery should be able to verify that the target user established the reachability mapping.</t>
      <section anchor="functional-requirements">
        <name>Functional Requirements</name>
        <t>At least, a user's client, MSP, and DP <bcp14>MUST</bcp14> participate in a consensus protocol to establish a CSI-to-MSP mapping with the following requirements:</t>
        <ol spacing="normal" type="1"><li>
            <t>The DP <bcp14>MUST</bcp14> verify the user's possession of the CSI through some proof-of-possession challenge.</t>
          </li>
          <li>
            <t>The MSP <bcp14>MUST</bcp14> confirm that the CSI is reachable on its service.</t>
          </li>
          <li>
            <t>The client, MSP and DP <bcp14>MUST</bcp14> jointly compute a publicly verifiable representation of the mapping (e.g., using a threshold signature).</t>
          </li>
        </ol>
      </section>
      <section anchor="privacy-and-security-requirements">
        <name>Privacy and Security Requirements</name>
        <ol spacing="normal" type="1"><li>
            <t>A DP <bcp14>MUST NOT</bcp14> be able to create a verifiable mapping without the involvement of the user holding the CSI and MSP.</t>
          </li>
          <li>
            <t>The DP <bcp14>MUST NOT</bcp14> be able to falsely claim that a user completed the proof-of-possession challenge.</t>
          </li>
          <li>
            <t>Other users <bcp14>MUST</bcp14> be able to verify that the CSI holder (and not an imposter) participated in creating the mapping.</t>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="preferences">
      <name>Preferences</name>
      <t>The discovery process involves the preferences of multiple stakeholders:</t>
      <ol spacing="normal" type="1"><li>
          <t>the querier seeking reachability information,</t>
        </li>
        <li>
          <t>the user with the mapped identity, and</t>
        </li>
        <li>
          <t>DPs (and by extension, the collaborating MSPs).</t>
        </li>
      </ol>
      <t>The authors suggest the following:</t>
      <ul spacing="normal">
        <li>
          <t>Implementations shouldn't dictate a one-size-fits-all approach for expressing and meeting these preferences, but should rather implement basic building blocks for each of these parties to express their preferences.</t>
        </li>
        <li>
          <t>DPs should clearly communicate their preference handling practices to promote transparency and trust.</t>
        </li>
        <li>
          <t>The discovery requirements consider detailed preferences and capabilities out of scope, leaving them to individual implementations.</t>
        </li>
        <li>
          <t>Given that the sender initiates discovery requests and already has options on which app, MSP, and DP to query, we will only provide a basic recipient preference specification as a requirement below.</t>
        </li>
      </ul>
      <section anchor="basic-recipients-preference-requirement">
        <name>Basic Recipient's Preference Requirement</name>
        <t>Requirement: Authenticated mappings <bcp14>MUST</bcp14> include a preference index to allow recipients to control their preferred contact method.</t>
        <t>For example, Alice could set the preference index for mappings on three MSPs: WhatsApp (1), Messages (2), and Telegram (3). Bob, upon retrieving these mappings, would automatically know that Alice prefers to be contacted via WhatsApp.</t>
      </section>
      <section anchor="recipients-critical-user-journeys-implementations">
        <name>Recipient's Critical User Journeys (implementations)</name>
        <t>Here are some Critical User Journeys (CUJs) that are the most important to discovery recipients.</t>
        <t>In the CUJs below, Bob is the recipient, and Alice is the sender or user performing discovery:</t>
        <ol spacing="normal" type="1"><li>
            <t>Sender mapping preferences: Bob only wants to be found by Alice and other users on WhatsApp, not his other messaging apps.</t>
          </li>
          <li>
            <t>Same-app preferences: Bob prefers that Alice can find him on the same messaging service that she is using. In other words, Bob does not want cross-app discovery and messaging.</t>
          </li>
          <li>
            <t>No-random mapping preferences: Bob does not want to go through multiple apps to find a message from Alice when discovery returns one of 10 mappings that Bob has established with discovery providers.</t>
          </li>
          <li>
            <t>No-duplication preferences: Bob does not want Alice's messages to be broadcasted to all or a subset of his apps based on the result of discovery.</t>
          </li>
          <li>
            <t>Per-sender preferences: Bob wants to control which app messages from Alice go to and do the same for other users (e.g., Carol's messages may go to a different app than Alice's).</t>
          </li>
          <li>
            <t>Closed group preferences: Bob only wants his soccer parents to discover and contact him on WhatsApp, not his Wire app. That is, a group of senders has the same mapping results based on Bob's preferences.</t>
          </li>
          <li>
            <t>Open-ended group preferences: Bob wants his business contacts to discover and reach him on Wire, not WhatsApp. That is, an open-ended list of senders (i.e., including leads) are provided with a designated mapping.</t>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="discovery-protocol-requirements">
      <name>Discovery Protocol Requirements</name>
      <section anchor="identifier-types">
        <name>Identifier Types</name>
        <t>Discovery <bcp14>MUST</bcp14> support any globally unique cross-service identifier with the following characteristics:</t>
        <ol spacing="normal" type="1"><li>
            <t>Backing source of truth: Authoritative issuing entities exist for issuing the CSI to users (e.g., CSIP for telephone numbers).</t>
          </li>
          <li>
            <t>Ownership proof mechanism: The user issued a CSI must be able to demonstrate or pass a proof of possession challenge from a remote prover.</t>
          </li>
          <li>
            <t>Versatility: CSIs must be deployable and usable across multiple services</t>
          </li>
        </ol>
        <t>Phone numbers and email addresses are examples of suitable and supported identifiers.</t>
      </section>
      <section anchor="discovery-response-requirements">
        <name>Discovery Response Requirements</name>
        <section anchor="cardinalities">
          <name>Cardinalities</name>
          <t>The discovery protocol must accommodate scenarios with varying numbers of MSPs in the discovery results:</t>
          <ol spacing="normal" type="1"><li>
              <t>Zero MSPs: The system should indicate a no-match condition if users and their associated Identifiers (e.g., CSIs) are not discoverable on any MSP. This enables the originating user to recognize that the CSI is not reachable via the discovery system.</t>
            </li>
            <li>
              <t>One MSP: The system should function efficiently when a CSI is associated with a single MSP.</t>
            </li>
            <li>
              <t>Multiple MSPs: The system should accommodate users with multiple MSPs.</t>
            </li>
          </ol>
        </section>
        <section anchor="response-format">
          <name>Response format</name>
          <t>An MSP or client app may request responses that are verbose or compact. A verbose response may include all unique lists of mappings discovered with metadata for the client to verify each mapping, and metadata about the list or count of DPs where that mapping was found. A compact response may be as simple as a bit string with each set bit representing that the CSI is found in the MSP assigned to that bit position. The protocol <bcp14>MUST</bcp14> define specific formats for both response types.</t>
        </section>
      </section>
      <section anchor="discovery-request-requirement">
        <name>Discovery Request Requirement</name>
        <section anchor="requests">
          <name>Requests</name>
          <t>Discovery requests must include the CSI and may include additional query parameters to guide the search process. The query parameters below <bcp14>MUST</bcp14> be supported.</t>
          <section anchor="federation">
            <name>Federation</name>
            <t>Indicate if the DP should answer queries using its own database or federate the request to other DPs and aggregate their answers in a fair and transparent manner. In a federated model, a DP that chooses not to federate may be limited in the queries it can answer. Certainly, a DP can incorporate mappings that either reference another DP's mapping or materialize those mappings into its own local database.</t>
          </section>
          <section anchor="msp-filter">
            <name>MSP filter</name>
            <t>Useful for scoping the response of interest to one or more MSPs (e.g., query for CSI mapping to WhatsApp only).</t>
          </section>
          <section anchor="dp-list">
            <name>DP list</name>
            <t>A list of DPs may accompany each query to guide a DP on query federation decisions. These sub-options for DP list must be supported:</t>
            <ul spacing="normal">
              <li>
                <t>DP-preferred federation: signals for the DP to forward the query to its preferred subset of DPs.</t>
              </li>
              <li>
                <t>Client-selected federation: instructs the DP to forward the query to a specific list of DPs provided by the client.</t>
              </li>
              <li>
                <t>All DPs: mandates the DP to forward the query to all DPs within the ecosystem, utilizing a publicly accessible registry (described below).</t>
              </li>
            </ul>
          </section>
        </section>
        <section anchor="default-behavior-disclosure">
          <name>Default behavior disclosure</name>
          <t>A DP must externally disclose its default behavior which should be consistent with local regulatory requirements (e.g., do not federate by default for performance, privacy or regulatory reasons). For example, in the absence of a context parameter, the DP disclosed it will utilize its local database to fulfill requests.</t>
          <t>A DP must follow some preferred default behavior that is agreed at the federation level.</t>
        </section>
        <section anchor="client-rate-limit">
          <name>Client rate limit</name>
          <t>Again, forking discovery requests consume ecosystem resources, and could facilitate attacks. Hence a DP may rate-limit non-default queries. Specifically, a client may be limited to a few queries daily when federated to the entire ecosystem DPs.</t>
        </section>
        <section anchor="server-rate-limit">
          <name>Server rate limit</name>
          <t>DPs may optionally rate-limit requests directed at DP endpoints with low query processing throughput for discovery responsiveness.</t>
        </section>
        <section anchor="rate-limiting-context">
          <name>Rate-limiting context</name>
          <t>A DP must provide sufficient context to the federation of DPs on a fork tree to assist them in rate-limiting requests from specific clients in a privacy-friendly manner.</t>
        </section>
      </section>
      <section anchor="privacy-requirements">
        <name>Privacy Requirements</name>
        <section anchor="requirement">
          <name>Requirement</name>
          <t>A DP must protect at least one end of the social graph during a request. In other words, the DP must protect either the querier's identity or the CSI of interest in requests.</t>
          <t>Possible implementation approaches when Alice is discovering Bob's reachability:</t>
          <ol spacing="normal" type="1"><li>
              <t>Querier identity protection: IP blinding (e.g., Private Relay) can help to conceal Alice's identity or IP address so the DP may learn the query target only.</t>
            </li>
            <li>
              <t>Query content protection: Techniques like Private Information Retrieval (PIR) or Private Set Membership (PSM) can conceal the target CSI, so the DP may learn the querier only.</t>
            </li>
          </ol>
          <t>The messaging social graph of a user shows all the other users that the user has communicated with over time.The discovery social graph of a user shows all the users for whom discovery has been attempted. The discovery social graph is significantly larger than the messaging social graph, even though there may be some overlap between the two. To clarify, a user's address book defines their potential social network. MIMI discovery, when applied comprehensively using the address book, reveals that network on various services. In contrast, the messaging social graph only includes contacts actively messaged within a specific period, which is inherently a subset of the user's wider contact network. Since discovery can query for users the initiator hasn't yet messaged, the discovery social graph is naturally larger.</t>
        </section>
      </section>
    </section>
    <section anchor="operational-requirements">
      <name>Operational Requirements</name>
      <t>The discovery service must support a decentralized architecture with multiple DPs, enabling federation based on user preferences, geopolitical boundaries, and DP-specific policies.</t>
      <t>Some additional considerations:</t>
      <ol spacing="normal" type="1"><li>
          <t>Federation mechanisms: Protocols or standards for DPs to communicate and exchange mapping data must be defined. This includes how requests are routed and how DPs locate potentially relevant mappings stored elsewhere.</t>
        </li>
        <li>
          <t>Data sovereignty: Regulations such as GDPR have a direct impact on where user data can reside. Solutions must be designed to respect data locality and follow jurisdictional laws.</t>
        </li>
      </ol>
      <section anchor="registry">
        <name>Registry</name>
        <t>It is likely that reachability mappings on some services will not be shared publicly for privacy reasons. Thus DPs may federate: for example, a discovery client may send a request to one DP, which will then need to consult a second DP in order to complete the request. Some sort of policies will need to govern the relationships between DPs and the terms under which they federate. Such a policy is outside MIMI's purview.</t>
        <t>Metadata and service configurations about federation membership of interoperable DPs may be hosted on a registry managed by the federation. Each DP's record may include a unique identifier, discovery endpoints, and other configuration metadata.</t>
      </section>
      <section anchor="csi-release-timeliness">
        <name>CSI Release Timeliness</name>
        <t>The discovery service must strive to remove outdated mappings (resulting from users ending service with a CSIP) within a reasonable timeframe, but this timeframe must acknowledge the limitations of existing legacy systems and the potential for identifier reuse.</t>
        <section anchor="mapping-prioritization-requirement">
          <name>Mapping Prioritization Requirement</name>
          <t>Whenever a new mapping is attempted for an existing CSI, the one established earlier should generally take precedence. This precedence <bcp14>SHOULD</bcp14> be overridden ONLY in the following cases:</t>
          <ol spacing="normal" type="1"><li>
              <t>The original CSI holder explicitly signals the mapping is no longer valid.</t>
            </li>
            <li>
              <t>A new user of the CSI establishes a mapping and successfully completes a stricter proof of possession verification process.</t>
            </li>
          </ol>
        </section>
        <section anchor="conflict-resolution-protocol-requirement">
          <name>Conflict Resolution Protocol Requirement</name>
          <ol spacing="normal" type="1"><li>
              <t>DPs <bcp14>MUST</bcp14> implement a conflict resolution protocol when a new mapping creation attempt is made for a CSI that already has mappings within the DP's service.</t>
            </li>
            <li>
              <t>This protocol <bcp14>SHOULD</bcp14> include a privacy-preserving notification to the holder of any existing mappings (without revealing the new user's identity).</t>
            </li>
            <li>
              <t>If the conflict cannot be automatically resolved, the DP <bcp14>MAY</bcp14> escalate to a manual review process that involves additional verification steps for the new user.</t>
            </li>
          </ol>
        </section>
        <section anchor="invalidate-capability-requirement">
          <name>Invalidate Capability Requirement</name>
          <ol spacing="normal" type="1"><li>
              <t>Mechanisms <bcp14>SHOULD</bcp14> be provided to enable users to signal that a CSI they previously used is no longer under their control. This could include:
              </t>
              <ul spacing="normal">
                <li>
                  <t>Collaborations with CSIP to receive re-assignment notifications.</t>
                </li>
                <li>
                  <t>User-initiated invalidation requests.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Invalidate signals <bcp14>SHOULD</bcp14> trigger updates to discovery mappings to minimize conflicts.</t>
            </li>
          </ol>
        </section>
      </section>
      <section anchor="csi-claim-timeliness">
        <name>CSI Claim Timeliness</name>
        <t>Upon a user obtaining service for a new CSI (e.g., phone number or email address) from a CSIP, the discovery service must enable immediate discoverability when the user associates the CSI with a MSP. The MSP <bcp14>MUST</bcp14> implement a mechanism to validate the user's control over the claimed CSI (as usual).</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="blackhole-prevention">
        <name>Blackhole Prevention</name>
        <t>The discovery service must be designed to prevent malicious MSPs from falsely claiming association with a CSI to prevent messages intended for the legitimate user from being delivered. This includes:</t>
        <ul spacing="normal">
          <li>
            <t>Preventing message interception: Malicious MSPs <bcp14>MUST NOT</bcp14> be able to redirect messages by associating themselves with a CSI they do not control.</t>
          </li>
          <li>
            <t>Ensuring accurate discoverability: Malicious MSPs <bcp14>MUST NOT</bcp14> be able to make a non-user appear discoverable, leading to misdirected messages or false impressions of service adoption.</t>
          </li>
        </ul>
      </section>
      <section anchor="ddos-enumeration-and-spam-prevention-and-mitigation">
        <name>DDoS, Enumeration and Spam Prevention and Mitigation</name>
        <t>The discovery service <bcp14>MUST</bcp14> put in place robust mechanisms to prevent and mitigate DDoS, large-scale CSI scraping and spamming by malicious providers (MSPs, DPs). This requirement includes:</t>
        <ul spacing="normal">
          <li>
            <t>Anti-DDoS, anti-enumeration and anti-spam defenses: The system design must effectively thwart attempts to DDoS attack, enumerate CSIs (especially phone numbers), and prevent the creation of spam target lists. Techniques may include restrictions on bulk queries, obfuscation, or differential access levels based on MSP reputation and relationships.</t>
          </li>
          <li>
            <t>Flexible rate limiting: DPs must be able to enforce rate limits on discovery requests, with mechanisms to determine appropriate limits based on individual MSP behavior, business relationships, and potential risks.</t>
          </li>
        </ul>
      </section>
      <section anchor="encryption-and-authentication">
        <name>Encryption and Authentication</name>
        <t>All information exchanged between clients, DPs, and MSPs <bcp14>MUST</bcp14> be encrypted in transit and authenticated.</t>
      </section>
      <section anchor="notes">
        <name>Notes</name>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="RFC3912">
        <front>
          <title>WHOIS Protocol Specification</title>
          <author fullname="L. Daigle" initials="L." surname="Daigle"/>
          <date month="September" year="2004"/>
          <abstract>
            <t>This document updates the specification of the WHOIS protocol, thereby obsoleting RFC 954. The update is intended to remove the material from RFC 954 that does not have to do with the on-the-wire protocol, and is no longer applicable in today's Internet. This document does not attempt to change or update the protocol per se, or document other uses of the protocol that have come into existence since the publication of RFC 954. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3912"/>
        <seriesInfo name="DOI" value="10.17487/RFC3912"/>
      </reference>
      <reference anchor="RFC2782">
        <front>
          <title>A DNS RR for specifying the location of services (DNS SRV)</title>
          <author fullname="A. Gulbrandsen" initials="A." surname="Gulbrandsen"/>
          <author fullname="P. Vixie" initials="P." surname="Vixie"/>
          <author fullname="L. Esibov" initials="L." surname="Esibov"/>
          <date month="February" year="2000"/>
          <abstract>
            <t>This document describes a DNS RR which specifies the location of the server(s) for a specific protocol and domain. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2782"/>
        <seriesInfo name="DOI" value="10.17487/RFC2782"/>
      </reference>
      <reference anchor="RFC3261">
        <front>
          <title>SIP: Session Initiation Protocol</title>
          <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <author fullname="G. Camarillo" initials="G." surname="Camarillo"/>
          <author fullname="A. Johnston" initials="A." surname="Johnston"/>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <author fullname="R. Sparks" initials="R." surname="Sparks"/>
          <author fullname="M. Handley" initials="M." surname="Handley"/>
          <author fullname="E. Schooler" initials="E." surname="Schooler"/>
          <date month="June" year="2002"/>
          <abstract>
            <t>This document describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants. These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3261"/>
        <seriesInfo name="DOI" value="10.17487/RFC3261"/>
      </reference>
      <reference anchor="RFC3263">
        <front>
          <title>Session Initiation Protocol (SIP): Locating SIP Servers</title>
          <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <date month="June" year="2002"/>
          <abstract>
            <t>The Session Initiation Protocol (SIP) uses DNS procedures to allow a client to resolve a SIP Uniform Resource Identifier (URI) into the IP address, port, and transport protocol of the next hop to contact. It also uses DNS to allow a server to send a response to a backup client if the primary client has failed. This document describes those DNS procedures in detail. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3263"/>
        <seriesInfo name="DOI" value="10.17487/RFC3263"/>
      </reference>
      <reference anchor="RFC3861">
        <front>
          <title>Address Resolution for Instant Messaging and Presence</title>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <date month="August" year="2004"/>
          <abstract>
            <t>Presence and instant messaging are defined in RFC 2778. The Common Profiles for Presence and Instant Messaging define two Universal Resource Identifier (URI) schemes: 'im' for INSTANT INBOXes and 'pres' for PRESENTITIES. This document provides guidance for locating the resources associated with URIs that employ these schemes. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3861"/>
        <seriesInfo name="DOI" value="10.17487/RFC3861"/>
      </reference>
      <reference anchor="RFC6117">
        <front>
          <title>IANA Registration of Enumservices: Guide, Template, and IANA Considerations</title>
          <author fullname="B. Hoeneisen" initials="B." surname="Hoeneisen"/>
          <author fullname="A. Mayrhofer" initials="A." surname="Mayrhofer"/>
          <author fullname="J. Livingood" initials="J." surname="Livingood"/>
          <date month="March" year="2011"/>
          <abstract>
            <t>This document specifies a revision of the IANA Registration Guidelines for Enumservices, describes corresponding registration procedures, and provides a guideline for creating Enumservice Specifications. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6117"/>
        <seriesInfo name="DOI" value="10.17487/RFC6117"/>
      </reference>
      <reference anchor="RFC6116">
        <front>
          <title>The E.164 to Uniform Resource Identifiers (URI) Dynamic Delegation Discovery System (DDDS) Application (ENUM)</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <author fullname="L. Conroy" initials="L." surname="Conroy"/>
          <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
          <date month="March" year="2011"/>
          <abstract>
            <t>This document discusses the use of the Domain Name System (DNS) for storage of data associated with E.164 numbers, and for resolving those numbers into URIs that can be used (for example) in telephony call setup. This document also describes how the DNS can be used to identify the services associated with an E.164 number. This document obsoletes RFC 3761. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6116"/>
        <seriesInfo name="DOI" value="10.17487/RFC6116"/>
      </reference>
      <reference anchor="I-D.rosenberg-dispatch-vipr-overview">
        <front>
          <title>Verification Involving PSTN Reachability: Requirements and Architecture Overview</title>
          <author fullname="Jonathan Rosenberg" initials="J." surname="Rosenberg">
            <organization>jdrosen.net</organization>
          </author>
          <author fullname="Cullen Fluffy Jennings" initials="C. F." surname="Jennings">
            <organization>Cisco</organization>
          </author>
          <author fullname="Marc Petit-Huguenin" initials="M." surname="Petit-Huguenin">
            <organization>Stonyfish</organization>
          </author>
          <date day="25" month="October" year="2010"/>
          <abstract>
            <t>The Session Initiation Protocol (SIP) has seen widespread deployment
within individual domains, typically supporting voice and video
communications.  Though it was designed from the outset to support
inter-domain federation over the public Internet, such federation has
not materialized.  The primary reasons for this are the complexities
of inter-domain phone number routing and concerns over security.
This document reviews this problem space, outlines requirements, and
then describes a new model and technique for inter-domain federation
with SIP, called Verification Involving PSTN Reachability (ViPR).
ViPR addresses the problems that have prevented inter-domain
federation over the Internet.  It provides fully distributed inter-
domain routing for phone numbers, authorized mappings from phone
numbers to domains, a new technique for automated VoIP anti-spam, and
privacy of number ownership, all while preserving the trapezoidal
model of SIP.

Legal

This documents and the information contained therein are provided on
an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE
REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE
IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL
WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY
WARRANTY THAT THE USE OF THE INFORMATION THEREIN WILL NOT INFRINGE
ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE.
            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-rosenberg-dispatch-vipr-overview-04"/>
      </reference>
      <reference anchor="I-D.petithuguenin-vipr-pvp">
        <front>
          <title>The Public Switched Telephone Network (PSTN) Validation Protocol (PVP)</title>
          <author fullname="Marc Petit-Huguenin" initials="M." surname="Petit-Huguenin">
            <organization>Unaffiliated</organization>
          </author>
          <author fullname="Jonathan Rosenberg" initials="J." surname="Rosenberg">
            <organization>jdrosen.net</organization>
          </author>
          <author fullname="Cullen Fluffy Jennings" initials="C. F." surname="Jennings">
            <organization>Cisco</organization>
          </author>
          <date day="12" month="March" year="2012"/>
          <abstract>
            <t>   One of the main challenges in inter-domain federation of Session
   Initiation Protocol (SIP) calls is that many domains continue to
   utilize phone numbers, and not email-style SIP URI.  Consequently, a
   mechanism is needed that enables secure mappings from phone numbers
   to domains.  The main technical challenge in doing this securely is
   to verify that the domain in question truly is the "owner" of the
   phone number.  This specification defines the PSTN Validation
   Protocol (PVP), which can be used by a domain to verify this
   ownership by means of a forward routability check in the PSTN.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-petithuguenin-vipr-pvp-04"/>
      </reference>
      <reference anchor="RFC6940">
        <front>
          <title>REsource LOcation And Discovery (RELOAD) Base Protocol</title>
          <author fullname="C. Jennings" initials="C." surname="Jennings"/>
          <author fullname="B. Lowekamp" initials="B." role="editor" surname="Lowekamp"/>
          <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
          <author fullname="S. Baset" initials="S." surname="Baset"/>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <date month="January" year="2014"/>
          <abstract>
            <t>This specification defines REsource LOcation And Discovery (RELOAD), a peer-to-peer (P2P) signaling protocol for use on the Internet. A P2P signaling protocol provides its clients with an abstract storage and messaging service between a set of cooperating peers that form the overlay network. RELOAD is designed to support a P2P Session Initiation Protocol (P2PSIP) network, but can be utilized by other applications with similar requirements by defining new usages that specify the Kinds of data that need to be stored for a particular application. RELOAD defines a security model based on a certificate enrollment service that provides unique identities. NAT traversal is a fundamental service of the protocol. RELOAD also allows access from "client" nodes that do not need to route traffic or store data for others.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6940"/>
        <seriesInfo name="DOI" value="10.17487/RFC6940"/>
      </reference>
      <reference anchor="RFC5222">
        <front>
          <title>LoST: A Location-to-Service Translation Protocol</title>
          <author fullname="T. Hardie" initials="T." surname="Hardie"/>
          <author fullname="A. Newton" initials="A." surname="Newton"/>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <date month="August" year="2008"/>
          <abstract>
            <t>This document describes an XML-based protocol for mapping service identifiers and geodetic or civic location information to service contact URIs. In particular, it can be used to determine the location-appropriate Public Safety Answering Point (PSAP) for emergency services. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5222"/>
        <seriesInfo name="DOI" value="10.17487/RFC5222"/>
      </reference>
      <reference anchor="RFC6376">
        <front>
          <title>DomainKeys Identified Mail (DKIM) Signatures</title>
          <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
          <author fullname="T. Hansen" initials="T." role="editor" surname="Hansen"/>
          <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
          <date month="September" year="2011"/>
          <abstract>
            <t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message. This can be an author's organization, an operational relay, or one of their agents. DKIM separates the question of the identity of the Signer of the message from the purported author of the message. Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key. Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t>
            <t>This memo obsoletes RFC 4871 and RFC 5672. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="76"/>
        <seriesInfo name="RFC" value="6376"/>
        <seriesInfo name="DOI" value="10.17487/RFC6376"/>
      </reference>
      <reference anchor="RFC8616">
        <front>
          <title>Email Authentication for Internationalized Mail</title>
          <author fullname="J. Levine" initials="J." surname="Levine"/>
          <date month="June" year="2019"/>
          <abstract>
            <t>Sender Policy Framework (SPF) (RFC 7208), DomainKeys Identified Mail (DKIM) (RFC 6376), and Domain-based Message Authentication, Reporting, and Conformance (DMARC) (RFC 7489) enable a domain owner to publish email authentication and policy information in the DNS. In internationalized email, domain names can occur both as U-labels and A-labels. This specification updates the SPF, DKIM, and DMARC specifications to clarify which form of internationalized domain names to use in those specifications.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8616"/>
        <seriesInfo name="DOI" value="10.17487/RFC8616"/>
      </reference>
      <reference anchor="I-D.draft-peterson-mimi-idprover">
        <front>
          <title>An Identitifier Proof-of-Possession Mechanism</title>
          <author fullname="Jon Peterson" initials="J." surname="Peterson">
            <organization>TransUnion</organization>
          </author>
          <date day="4" month="March" year="2024"/>
          <abstract>
            <t>   This document specifies a means for a third-party service to prove
   and attest the association of a communications platform with a
   particular user's telephone number.  This capability supports secure
   enrollment for users of messaging platforms or similar real-time
   communication applications, for cases where users assert telephone
   numbers as communication identifiers, and interoperating platforms
   need to verify that identifiers are being properly attested.  This
   general approach can potentially work with other forms of Service
   Independent Identifiers (SIIs) in the More Instant Messaging
   Interoperability (MIMI) framework.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-peterson-mimi-idprover-00"/>
      </reference>
    </references>
    <?line 409?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to acknowledge and express our appreciation for the thoughtful feedback and constructive discussions that took place during the MIMI interim meetings focused on the discovery problem.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA8V963IbR5bmfzxFrfTDpAKATMkt24zZGdOkbLPHlNgkZY93
YmKiUJUAqlWoKteFFLrtd9ln2Seb851LZhYASu6Y3dgOd4gEqjJPnjz3G2ez
2aQv+tKdJk+uLq8uk4uiy+p7126TG/frULRu46q+ezJJF4vW3dNTjz2Qpb1b
1e32NOn6fDLJ66xKN7Rs3qbLfrYpNsUst1dnbfTq7PPPJ92w2BRdV9RVv23o
pcvXd99NqmGzcO3pJKeVTydZXXWu6obuNOnbwU0IlpeTtHXpaXJ2czd5qNv3
q7YeGhykbl1yWXV9WvXJleu6dFVUK/qkd23duDZdFGXRb5MjQHX8ZPLeben1
/HSSzJKhc23iAZ3cu2qgzZNE18Yb9JtA+TPtiYW/x3f06SYtSnnkm8L1y3nd
rujTtM3Wp8m675vu9PlzPINPins3t4ee44Pni7Z+6NxzvP6cXivp1F0fXiQs
pH2bZu9dG14kLD//JIKfTyZARf6faVlXBPbWdZNuk7b9f/461LTJaVLVk6Y4
Tf69r7Np0tVt37plRz9tN/jhPyaTdOjXdQsEEWRJshzKUm73+6J0XfJDvVq4
ir9ygoRVsf5mVder0s2zesPfELxpVfwt7emW6UX+kr/I6qHqQTjvqqJ3eXLb
4+hJvUzONq4tsnR/2+/cpkjelsOmXhajfZeruhz+X+7857pKrh0RUlePNv5r
Xc0b/fwbuiei1Iq2ewSGOzzwDg/8N+BI+3VaJTc1sQXxyWoETd7i42/033nl
+gNQfHd5777+gwBMqrrd0Hv3zA03352/ODn5+nQyKapl+GIymc1mSbroQKj9
ZHK3LrqEaHQAHSa5o8uiVWPaTOjtpF+7wHJJ09aL0m2Sh6JfFxV/+YcZGiLs
OHlQvmSenUcijaChl2nfIi1552JnhWmSlmX9gJc3vI1L6PGcbjXp66SsIeQI
/qxoCoY+zQi/dEQ6fdu5pCGmBTo6EiMMQFkvaMFtQrTw6+CmCT8+IxFzX2Qu
KXKAsiyw/JGbr+ZTub8kzfMWgBIPNmvi2UREYXc8T+4IHRnQka1pZVcRhEV1
X5f3jNiySBe03SZtGuxPuOvG29ApNh5/Bgdh/L7gQ5KUoGsinGyKShegVVPa
SzFMFJEGBHzWRYsbMjZD2RdNGS07V8LYFHlOnDd5mtzxDnVZr7agEpeQCMa1
5R1J73e3d0+m8m/y5i3/fPP6L+8ub15f4OfbH85+/NH/MNEnbn94++7Hi/BT
ePP87dXV6zcX8jJ9mow+mjy5OvuFvsHJn7y9vrt8++bsxycJE15MvKRpgLyF
E5ppWgc+SbtJ7rqsLRb0C73z7fn1//nfJ18kf//7/1AW+f13/eWrky+/oF8e
1q6S3eqKbkp+JTRvJ3RnLgVJggaTLG2KPi2JAtIu6db1Q5WsXesIlc/+HZj5
j9PknxZZc/LFP+sHOPDoQ8PZ6EPG2f4ney8LEg98dGAbj83R5zuYHsN79svo
d8N79OE//UtJwiKZnXz1L/9M5PN9SaSVtkyAIM+OhM3JPDlLnj27VSq+bYgs
l0WWXAaSPLq9vTx+9gyMnyoTxhQLEZCKyo+kDVkavfvQC62Dj4mWH2eaeXLZ
Y/2q7nf53ThCX+kALyT4dvbrkJYAgSTt7SVdeVYOREe8++M7EbftHWFKvM6y
rtjbfZ68Ie1Oa6Z94j4UXe8qWgyHquiJMQSk1PqHmtRDsoFsMYCJ/J2ebEhJ
ZfVO1wOgadfVWZEyG2SsQDpiDzIxVmAUPNGRpmLsQmwNRMp0pQwsbdntIsfU
AmkderdNSKIKfDB8sCJZQyTcim5Nt0IKJ1sTOis6WbqBsJHLUox1RgrRXQsJ
dIzGf3t+R/dNdJSQBiWRNPfEdM4C2kgqpqTziJJ27/kwSTGmMsL2grGQ4xD6
5Jbxw0/tSs1ALN/RUnq8aYD99fzk1RcjtbCjNaa4RsGhVzSkwhroMRJksTaA
UKNzwdQrQByQQ/84xHmxXJJoorUD7B6hQVsbUq+VnElb314DpUrfXSD9aXJf
06P0D31ei7TkA4lypbsmpVTO+mIDbt1s6BoytmkicgLF0HuAmOB5LXjkdz+q
AAkjP9O9dWdNM1VTA2q40B+nyc9Eo/QN2eLFh2lyW6wqsiVcn+G4jJ6iM5VZ
OrUDcFfGW+dM+wTZJt0S+d0TI/VJ6dKu58dEHhBpYlnlI8KTNy3+AKkGBNNe
10a0xCr0QL8VsiRna8C5NmklBwREynIdwxjhjHVfm+YFUAywXOkI7QFtRoHR
B+HOglFEOo2RQneA/YEZYGwGgdvWZM3kMXWGkwYDLhzt4pGDLdMMlgqbr2O7
cmTHkFKthx4qJve6fmSXmuKH6KLvvI2V0TI9kyijjn/CWUtHmwhVibMEGMgs
NFuMKY/vPlxqB/XfCld1xncMpsvnyc+OuJ8EWS8HS5OLa6YZeoYtVgjexRZ0
lS6XdCr+AGoMKAHJsCSik7V50pC3t53D8roEqvMhw1VOJuzyBxR1zr1XzlHq
VZuRyLMgcUcXVQEgHDjwnQtmsAmCwGL+9olGyJlOiqVImbyuPuuT91X9QEgo
snWQ2fYGY0lJiN0qgENkeT602KMkY13gq5ek2pLKibxKu/eswckBAX5TL5Vk
X9AyLUWXP6uXswWdhOUlOT/7IniqoPGd090vyRMC3ube1oASmEYIXLuyMT3D
21SHFPrRWYl/6Hvj3rNjgE7uEenSSs5sS6RJQ2qcXRa6gYBiApr1q1/023oR
L/ntMZuSnidnlRuIiUvQbUUqeTIZ+UV0r04srIXLUtqc0R8riweRtWy2styC
qvOYPho5KgccGYjIY7p2NidsNxAVSZOSTqu43seWvzaWpYT7euOwFZM6gNSt
gNNvVvgZTjc5G6t1DyxGslukNV+4odl2wTnJf9qaqdKbn2XuKOGIrHDm3vS9
E5G+VA/rcbdOREPaVp+w7YJZZTqETyuyRfeNOc4Ov2HTLaJyMPlTyEkGmv14
iDHxsvadbJNrak7TVbWQbqoKWAh4AbZw/YMjTvMaDCKMIeSXr10LtsXbZV2/
H4gRaj22rUCHMO/S7QpBb+DQ8juykCnN4w7GhZGuy8Pim4FUKL0Ugc6SrBva
iIjIVB0gO0mOtENW7DIwL9K0BeR38Te9Dfr9Ps3i4AAxakH3RjZ0JzfDCgy7
FCF6GGIKhCuyz3lt6PZVy1cIuud7JDtl1tczmCtko7fbBkIm0qAspenG+jqr
S+jFYNibpy8YB93Q7nSDJKSXbb1RB55sFXdPrC8Ea4iGqcGSHDvWBFRDHAhP
nITsze479jC+RvhTZF9SA50d1ClUjD0cif+2BqfLPlDVokjomnJwULrsXett
HIsFWejFxxlI3oD8iPYkBEOCft3Ww2odbm7XXBYVKEKg62smMENWpIlvjZYP
IYFjLSUD8FAPJXYlEBSdTgME8E7+KqS3xDYi2xE1giKwo9BWJJ+ndEQjIXaQ
hgzYIZ8wIkG+VwjzkSFpB1ZczYWhSbgq0seBNglJdOISFU5N5j8SdmMj4RoM
kLxe0lN9FysKb12DlZZpK0RWuQdjdQ7JVa4X5D2sa4LLKFcDIS+/Pnnx++/k
DKbtigQugZKxr0Er2AXlNYlxUumk3zrR6d7VDC4Gud0PMOO8ICbiaum2CCP5
PsDkAJX1VrYZA3rx5ja5vfkJ1IYA1NQsEbEMNZLz5VcMMwsAjgpsEMb35D1L
VgWsmzQG3Zw2JnwDKUnvkQFYjMwMooM1eOin+vI6WaRdAPPWcVaEwCV5xC4O
ZLug8wjWvSH1xasTH2qiX17+/vs8PhVJG7BAnjaMxMh8GQvXcOSXX2HFefJD
/QDTdposSBjpjYJhdtCG4OMWUI/ujs6kkgkc5YMVrLgGksxFz5jgUGykNcuC
NOymJvnpkh27QqwEsR7ZCimqtRhEurHRCrxBIubXb95d6YlenZx8STgymyQX
rinpKvtUzLrLXtxenI3jvQz6CAKY3C0Q0hkT58Wq6AUntLR9+sSRmz5P2yZ9
QtdLBvoH9SSYhBDWICdqJTdK5NsQp7H/qqTM6GvSjCUHWUhZHTmpdAlJ/VBF
F6nQ0TOOdgJ3/LwG8nqXrSu9ZwTlIQ4J2Q9pS2ZvMyxIVilnsOCgzRlf4Ks1
SVJWsHRgH2uGIxQCMbGzI3QU9vdkw8qT1NX4Il7RRXje5HtcwKWERCvZb2Jv
A9bmNLh02G85VJlgionk6uo2IcHIX2kILxgKk8mZWnlpT2ZQIwLjp+L6Jjn6
ia0EiRoQd8EKwhrXt3dvSPkFT5EZ7HJ2MW8tz4IsW4P40+y+aNoZmPq+cA/C
fXiyceSOrofV4Kqikoea+wa8xFsTsCWZFjlsc0d2OWl+/EtStEfiIvD/zesf
355dJEc3rquHlkjhx1rhZf4zGWci4NXXX3xOQBC9qHvoDTYnEeuiU7EZc4CL
btCMQrpx/fBvwIlxuAeMniNKof+UlPgGzLNeDOyE6+LsotjJHPku8BU4+ADZ
AJpQrOgNqQ8nACIwCqFw761wZj9WGBJWiY/G3is+zmpSAV16L0YrQbRtSCgY
Yyo3C0jz5B35fBtCFszAXTgjsj9KNwhsqjuqEng2VEyu0BQcTzkGA9wDJnji
pIbp1zSPOGzkdbFvICJmpFfhEwvtkyssfmKssRjDeM4UKK3XqOtP5M+fRsLC
dMt3tNSCdpsmGvucRoEub2t2aljsBQbEXfExWlKBdTkwMYr30aRVN8r4PE3O
kOYmCdQPcDuvapJ4ZEzceZuczki2Gvm2ZiDGN4+vgDEheCT/sbAG+SBqpFrh
egq/lNDcSfwRZncZPGZOvgcYNgyD2iZxkjCpFziiEG3nxrYScG0KX8hAHpLV
BHdGuVBBPauh0cbqe5uY3LO8mJwiofkAD4/cA41RHbbdyOMQy+4Cbhg7ifBy
OHpIPrn6FiTK5Gqn4m1xUGDpco0g8SGCm0lLcTSfqA9lF8mvg9iPbOexBcCL
pD6yyu7mOcGF40GqXVwnR1d1VZcgx8zCEccki0PYPGWzt1iwpT6KlsGchpxJ
juKoR7cmKePy5y0xEvu/+bEY9axOeQk8K64B/EdzClXnbgI8SsnTQGGcv5BU
xLbKyMyu+BwCLDFjDgtN8gSyHTYY4eVAtEvMAQiRVOKQmkdSSQ4t3xLUYnyZ
1UtnD1GyjDxxEFLwbyX2B5MfcSgxT70B0LoVs0Y+sMmwcnWDI0P373APXxlx
Z36fEqmScJvMECeocsKxlgbI/VYFh+HMuWXr1WCVMCi089CAUDTiy96QFATQ
PjPYqpuaQ2dp0eqqi4L1SHRNkRcHWD6NqQ6XJ6Fq3lGi2JKnZSca8qWTc3Pe
SxYGFdHrnoxYspBtbkKHkKYOYMoOGeF5MXh8NBLfSJEoQbDREHnRpg+LNHsP
PHpG8IYdapYKJm2pLAK4ZIdBX2lYISHt9Z6xdZVyiHVJwCn38uPwef2SdM9D
aRfpkdXUhZhvhOcSsvV+KKtQF8FUCh0NVZaydjN1KHEvIn3C04avzMtOxBqL
bChpAQam2GxcDi/MeEOvnq+G8FbkJZuKFbOCZ0GWED+QXc8iEaiFkDmK68g6
xKDaLhISJNzqPnkk8E+QtaygjR4gHoktxFccyRNs5e0WkBxd6gCh7KziQktf
6N9cj7KfYSPFjnCr0g/xO05ZdBtVJQLr9dRrCQJjPTrwm9uplwapgl8HvQrp
XfLSfJEadN8/CXHwWmKFkVyAM9U5BPHmyVnJmSO80O1B0TrT2VMxnnH/P9a3
d7se+p9evGBvt24DFxAG12m3Tthhw/X9cNcdT4V9aH3EQ+z0RGgw5enmkwOS
hiAZkWW8Q1mnuebG5GJjxt7JOhI+QK7fle5DoetJngT+VZyLAOIIFSwpWUeN
5CZook3ZxmMyFjGKlb91nCGmV1YVQ/AoRwbdfEAk3JjJlNU1yCcIWLYVXJVq
Wt7uimXVjZCU5+eM40+Eq3Zo+k8yLhmlW68K4JRq4m5dN12iVQ4j+wPqWBj1
O28ZGJf627mGlxL0+eVBQ8LfT5xzxlJEXnTxNTsmvfdmH1EDyWuYLXR+8AVb
mwMZaCzhPN2zTI7YRWxztoX4pqo6yUQcRy5OTqJVHMkQOdXUcSgUY7+2LMNW
ktQXULcWM2cbYMtLxTQph0Wo8wPLQjmiL5ODVgCZIWwqbi4vE9lpIlOMQNXA
M0Qz7dC1+zA6++cL+ENsRa9aJ5Q45TyL9//HVJqcJfdpW3gl1YuRRBcYEp0H
jRrRG2LSkEJHVRIj3HKhY5TJQ8FO3BEFFy4bq0vT2z0nBLimxuwmr+C8NdIa
byi+mA8Y8XikqIj4LVYAwMys6hBkYCsXGaXKR+NE/yrwmn6IRROMYpH+WghY
jlXxHt9f7PLXp2lnCoe3RYicvjBnFDJxzN5ALYwo3ANOgnWjlEW4GruMKVJQ
BvtQMSoIz7QzCzovocjHRiA7qDdhVPZohYo3kokNMszSK61EwCXeoKL5mmy+
h6KzmA6haV00ew4IstpMeSLiJNdKTyzStkU1A+dwoKBx7G4Dj7yFE/KcERZp
XAg1gWPkLam4u/jXSx9+evklwk8cRLk6uzm3Ar1XHJVyWS20pALxLIjP87EX
Sig47OKCFO5c6cSEeCOhOc44TMLHFrGrWx86KTr1iT+Y7EZgkas6K4kDhLIX
c0BElNL1uz61mIJbway0UyRv2Skupz7aE3wlz65Yo+401cauNahK0rRcTRGr
EZ+h3xCtCsdyjF6IXMTqkj5ee89eyWRoEO3KpYg2qsagZxuU9xsffQvqvqLt
JEA64d811YSKSSmGCDTfJXGKkaOxoSQCeSAoBDJLxp4QxMmDFMMQ6RLd4OxR
zZABQKdhdhtVD4fUondtQHUSzw66FWVphzG+VzMRMhv74Qnkv3JSCLlEGXK3
ROoakZ2NxxKTAvl8GcgC8ETyaQptVA65Vgr61OCBIMQEoZvbYbPRasu4y2My
+S15mvwWf0a/XcF3ZHP2t+RtozTy2+S32WyG/4f//Xb4Z3o0SejdZ8/OAqoA
qcnjZ8/o29+wZHJC/9LVc8ErJ3q3cdqYSLjThInlyzhWiVKP6LsormePsXYn
Cx5et8SF48AoDGHXoXgAV4hMJ3D8W/JBoXoBLNwqWPDgCmIOtixHtdMVk6bF
0sLrL+nfc84zcoxGXGk75V+h+SQa3gwsGfdz87SPhsA8YdPu4DVAFTb6IsIe
6nNJx1me3MvdA6sb9+BEMMhca+l/02dKCbbPnx7fZ5mWHQf3y7TYaHpM44D5
wcsKq74CffnamE6Wj5ZWeghQfiZZaeKIRvASwik+gBGt/yX9e3aYWXkrLdPl
mhrHTKullR9Y/nFqMOoN2KsLkLeQUtGqGZKfhNg8AkHYYOT2MldGHPAVcOsf
YMC6oYEaoUvZ7pWmAhtsDsMu4djJTlzl6PzSUu+mm8ivQ3qphb6WO5lqjjwu
cxk6I+wA/9f7wMXRxL+5tp4iY8u+pTd9LC6pNkm03snnowW9nz86djCNp1JG
UJQc3lYuKsmKUyObqCHdcJNOvEcsUyAQS1KEELEpAUP0tU7vi7q1mrem1GgI
m9r5bCDFFRvn9l60/gtd/+wXOPBuxhlHsm2rmT1sylySyEIt62KluQbWwZrX
6JgOPsjCLw8u7JHEIXG2Vh9mKudIguANUnJsUI9Wi4UDtAEX+llpKpSFQNn6
pg8RjGx2IeegJmIVAIhwAIkAteYjDYJt7giSuDJd8AKINzyDP8wusJDiVGuF
7FlvN3jeJL+IDPrAuiPHi51uekACrQ+cId3dyicxJMuvnqxFC0Ww7on11pEB
WImt0XlOVW5+2yhtpDEbn7waUbYxFaOFNGsdV45uUgKHBHBuNZ8CwwxZLY1N
QABxHUbczABXopZKTrYZo/uArHvLktzvsnIV24lbKXAjaZURWbPhec/pyQcu
SHQhAcHJPcAyVCUsPfcBcdUC2or0Avl1HmAu5WwLchHTMlYjMOkH+BQulwfT
RKPbbcgyRsrgPs7aRsdhoXhtctoi+yGYGkJfgQJxCmAs6NAV/D0lFUlHjmgY
wu0dax5thVn4PJsW3o49p4AD6b94xD9mx0CDkeqsiMdFRydRJJyvTi+aHGL3
4Thi4BeQlW/oQHECJAI1lKWVziiEveHOB/+Zbz4Um2EjBCMCRWF78QXd2oBY
aNhTSfwW4QzihYi+X5w8Tt9aKy2dNkhVDYjRIAHowxXkWXA+UTCxQXFnUQ+d
MBibryNDAkjCsaPij9g8e/E4LCQ46raRsFRKQm12cVEjWIsfHSHZB124NJc+
7Jp0E190tA3k8Rl6t+KWBO8VSyUZybALrZqUw5gVo5V/Wo+O/tBCshlj/8G2
4wTrYXN5x2Q/OxRGT1ekvlYcvX+8vjMEfsRhgHONohO2IOCnhOjATmSg7xEF
UWkdlqnNdGPJakZgz9UsYoJPQw0sl0tyZkCqmPeEQeiANIEEEtAyPPYQOQzn
24ZGUjvoByv90AXm5PyoG0ePtDUqUIN+ub26hQxkH3yGlAHOxM0qCapsxgJK
w5wuBhpHONC7g86o8cvsjOI7Ipa3uOkEwn5WyDfWv4Rr+qUe7obFqO4YEb6D
SXDBlYj6Xu3gXB7TWz7sMDlcZ2GdiFIkhloXaT63xmfpQi9yPnWLipezECxo
Qn1wVFiw5qjPvhXv66HVtmCS8Hep1SWHblTD2Br6o9PvcINaNFFHVfaY6xWc
BydRKz+DIGiRnca0yO2KvSeGNtR+xgEqqbyGbbTj10aVumP6MUo335WF+Ef9
3LltseekejSz7RYXnI69Vb9ChKxPuKlSXkYfRR7lvp8a1YebopHiHrSuIIZE
hkIirjdR77GVt0vmFACY7tm5Z24d+m/4utz9EDm3Uem0T9YZ3lSWzycvxhf5
UddXm3p2POB+/cmrfDn/I17w6GLV2joCoEgLkFgkAUzuBCyIiMpZ91iHU3w1
EhW69m5vd6CfIJOKLU0fyEH885y58f01MDAFJiX/yL3wZVwj5o7M+CnQ7O/C
cxcg9Q1kWnUPXHEaCwcn69J96JGOryvr77CUFKtP0sbHaC6480VxqJ5arZz6
P55/CeZZcjmqUOpUkqEsVXJMoC9oio7MqtmSWGnGpSqqUkS8fwA3CLWza+IM
790IeVMu+VJRqTngYOQu0q7I6IlCiHJR1pDVvD7nlKxJxcJWkFiy8SguwTsh
bA+E6V4ZWle0EtM6T3bfkdIYqfVHfijzQekNdynAkqGtUYQhNh6sCOwzJqBR
zN7CtMGdi0lJegkaIQ0ubh+YP7kOjnMdps83YoZbr8ZOVRmf9nt1uZVbZNoD
vcPl1q7bgZDdWjbKSlT2bTkwWzc+HyDVySn3jkbahKDgAERU2IUuquBpyh2G
focIvb5WWyyrjucvhPArOq4fRCp+y4vcRMMZAsPG0nEyiX45/f8S8iKAR+0a
0jQhGSDkecfSQ3eMKoC0tah1Ejw69aWMydHJcejbTY5eHMslIO+yaslyP3pJ
PM6tGBy50WaOwHYhZyYtHyQIasgdqaHmfkUmFoFYYOx0MoSekU57X6QeJLmc
+FrOWy3MgjeZ/LlG7GBLwO6Q5/Fk8gNX7SPNDx3/2Hvn7/5MXpkoFOl1Sjao
gYWMb3lmCnIGESHbhUHaXYrLiTWEmKbWfCIWlj4raJRT63fKK2rUH7TvRLrf
yoOmYiNePk2kaxFBtVQpaAFJO4jAlv1CJ5Q2fFZR6Sr0GdLX8kDIWtNmHWvk
25RMdfptf19/e+FC4TFwG+a62FjhLYc5DvUlou517Xyz3jwhXAoYD9JJgk38
CAUcUEOogCYf1QFHResvMbhhRmIzR2nhYzgbL4uKv9obhF7RAgehsdQ3I7Gd
L+flbFpMGghk+aaak8/jMiNtS4LIiw1xKYuJLQGrAf6CT5IPodruE8dgmD6z
2gNn5LAglZlnaWfV4WUpvc2hKIQbK3DYUfOMxJPxfVRg+CfuVJwp8e4B5MnQ
BJkX6QGqCH/AugwoyKOZF0s/gUEIVg3b85QWjI+HHKuuECUCsReXeCk6yOh9
NU/OS87PSj7wYywEXHR1luF00LtynNB/VAVhrES+z0wYcgA4YM9yghTuklZK
L/1IpLXVtjKD+DCaBPH9TRB4n3VjI+NLMmEbV6Hj8fEjhdP48hbfbbx7ILYV
/XF4QgOO4kVwdIwK7RG2NecGohMdFXPHYThLlqJwgmRr2u6G+tI4I2hWcgIr
eT97s+OakDaIpjXcbRs36rH7ZErnsW7jQ54mWdCwysiy7kh1qLX97eFUkJgC
oeLQZjSwQQ07i6OY0qylX3lXtN6h9NvLnZxSGGEFmfx2nF4K8bRTNgu1B7ob
uEuG45na3GteTu42pCF7Dtuh7yhFocGnokRg25Sj671cJ9rgSdz+RLCkPTsa
pxL9su2kc0OCQVwYID8+MrJlMrketYpxUcC4D54pyUXDSHwPHB7WW9+bg/H0
6WguoyZFdqnqKQQMKgzFLN730IQY+WxxVq7LXJW2Rd0JAd2nUplkpyAgLUHX
75jszOlCU//LtbXaYlE5lvoRmkGBHVnVMx7eA16WghJUZQnxsHvAdmPU8Hm5
PyQNV3SsrTL9OK7Nkdote+NS+i+TLLo4A8FOlkzoqbm5aVVJ3dQ4FIK1QzgE
Ft34+FZ5CXKu2A49dHSrQUNTEUozOEiiNSy6UXRYFS1a9MYxBaLPqzhRemiT
+DYFlZKOiN/T0pqbcUptcuZnhWinM2u61Ls7UWLMG5iWfqtbS59xReFOUk7r
3dSBwIwHEV+Qud2oktNwGtIokqPzcV0FLUQ3WNzr+9NRXo8khIVvRLi3UuGt
fTIakh71zqMpkC1OnGIv9ahtF2ln6UB2wRZFz5kqi+8xQDBGFpyB1SiXiMgx
WYlta4MNEUXjLJ6YNvwwliABVkhP6qNZU1/CrMlRqQtEKtXDjjGlB+SHXOzI
IxTSEAd3ciDhrrML5DLjuNfokkOJ2F6+HRbqUOjLnUNI2hce8xn33mBnxIe3
vGgUOvaFyigPuzTxIsNl4HEbY1QdspaWX5fIIsKaiGL7XiPUkmo9otqNgqG4
qFi8fsuamJji5a2k0erAQsijt2EryeFiaU5SyJiwdV13agrDYDdwlPo4Eec8
2dh5CpkvJmCQiSgtQ2hl9OmPOL81tuVdwWcLXraNRLm4/izU8bHPDftBSufJ
PoicZPSa1R6fUhVrWLV7ChUZE3JbMeqACzmz2iZUBnLFXCiUcxvuo6lZrIFU
/AulYJW4eJxe8EEAWMPHBoCWgEzOvLVnRbMsNhvoC2ZfWdcTKqOQBLduF5d4
ZEUnFeN3HDMgP2RmQSCAZUUnZkV42uXA4cX1LIRFwrKnEuUuQ3pdAkfWY9t7
HlGUh0WCH6SVt1JMRiZi6TgcEe9SVNIC031qjzRImBhx3gzWtL7IZuyK1OcF
FNSGCwLdp3eQF+LZi776dqp90pIK8LmE0Dlo+fptchRGcLLMOLZq7N0SHi3u
GVo34dwA3w9iwhi2xsOVtPgH6N0rANIxVT5h5bvLtDNkVBRe74Y0lXZ1/pHn
b0KibcT986HHbOr7w6QtJayKog5EqkcRNMVfSpRgYx79IEsvVKd2I3ZSnkvD
AUntSuejjxmZr28ol3jK9MF8EmFQvA1LQxlR7uFP585p4VSiWjHiK5QFlHp3
QsFc1iTCb3K2ItGGASpSF3sgLosLGTYRDXHZB+eqtX5NLDI/Ic7y1PPkBxGA
NmLt42Vau+O/UrNPdoQ189DSPXhxnaeFGX9BFWjlurbzBNgvvMmGlhsI6oAL
E2C1VtuW24MFYNJnJrgeVX0pvT6Y0g01ZlGd2LJux8Y+hDSi5dYrRBaD39Sq
VIjcIsqwADcPwGDj19OkHju6fpUvPPIMt0x61DmtLC8kBbPh8rLRpv6w7N15
iaXFFjYCjRlptqRbqHKej6wj0KJc4r43FRtIozONS+OgplA1rhlCtuXLhBtJ
k3yQZiIDcz9EqAw5Wlo188dr7qD7YoUZFd7Rwa5rlZI7jfRRSQPToQ/o2k0D
XInYxPk38fH+ohk6D4oCzHoFk2tKOHohkXutoz9u0I92zOYIBuRpdC1zhCaL
+MWno5WsI7erPYKI3MMgNVUhUhoAbc9u2F/4U6awqh8Bd8eFRcCOdD4aZJdR
dWAYeXV0fXnDHZ/22K3D2HF2hxGzOLq+vTq2ViM+xrgIcvpRuAsuowPI7KFH
geWYcliAs5OKkgtpPGcfNgorjmfGIRoXJerUl+IQGapV5uNwwB/aTLZZsvKT
Vk2bc2jzuPzYjnnykfURkSTjhkUmO8A8pEIbWftHkaDN8EjIy+Sr1hvErGyw
U5k2vnCJb+Gh5sKkjLYgTzEq8zCawhAMP4te01S+VEa39+NBxnMwpuq5N01Z
OClTbd3aVdrJN/ghI/FeU54XxJPicF/W14VqRkRdhng+9GWlNXEoUHkcMRLu
9WOjfVgU+VeGRCPMfihIZMuRiVHUuQ1S4tGmMkCp3I5C6lH5yQPnYi1o7HFz
yzODw5WDIYJtbiTqLJlaM4kiQb51vYdwuhtV2aEbrvtgDSc0w5NFopLasdze
oUENkUolmUVUYb9H8ypGxVHjsAkX6nEAiTuagqrysW0dDxhl6keDFxbw9VPo
fksFz8I9aKsOHQgTLWPneTyvQWRvcHej4sNTH2Lm2jor5DQvpNudGskBSWtL
jcdORAFP8EXup94qha05z2v579bxxB+Xj8aG6F9HiOd2tOSAoOEzOIw8tYOA
KDv3IPPsSW5fAIKOI0AkJRCEvQmtS36AzfcX1zc6MFktGyg3UCQn3m2QrpwH
tEgcSFjEwFAp/Y3DuiHkAsMGa0WN3b3k5NSu/Svp8C4vrJysTB86S+mKAzKZ
yAR4aJZSK28OVaaxbSMVtzbuh01vOAQQaesUqPGujszT0hERYvTLcFLvv5oR
earVJH5UeMSTwTJFjiNYIuZg8wQdFgUMC0oB/ChdNqjLnqcIIlwLfVagfzmX
2KmVLcVBE5nPyn9ERgLx2pAmJ9WFVwDOcnRxb2jUQWrRYBn3nwycrhNIe4y5
scOjXhMEIltxEyXRJm6ehTdSTwMP6KJLu/JBwspPEpRSuNVgXZ0SP1zG7OYV
v9lb8hdDREKYRlrXnJ9k89W7pjK/wPvKYVXf4c6GFlqLx5G0Q5P+w616Sz6e
sz06h4+H6oAeMhbJCnNw5+7IGCg5n7ZbxDWWl2QN3TvhEG5H8A0InpyPJAMg
7Z71RkW+ExvQFtOQNo8iD+popzVh2fK8xAVHblFeYJ9ZtgKFF6XLV04juzaz
jwPJvrp+3PnqKagZtU5HCbPWDRaosuppmX2JrlKzCqMo6c/EHY5zjqPOATi1
fnwZzwqoAky+qJn9hChvLtMqW4soPNp+obI46scINf24t7bI6ePk7Zsff7Eo
QJT/oxuPSkwP9WBEXRsWgYqLMqUNH3/WAX+UAQ0NLLPPQrdJVJIaztdF81Yl
tWWjTrVIFIKj+4f6PeI5FU/RjC29HTeht+NQwpXPfqA3JP14d4imaOJr9i2D
Nk2w0NacMB5CJ5CE2jDPK1GMi5ne19W+8PerO+vtxqVX4r5yUqHlWiVSGaMy
cyxrLTVLzoDtd5wcWWmrmKNmqto1Rk7YMWedLpdaJKlYIpWqmmpcE9XK+J7c
+7LoR3Md5rzIqA+ezzRwbAxy2NeKSkDICkYj+2d068TKTYiJGrRKBJehxebc
KgK3e7d/Fbo1DnTuHBh3L3xgJbpysW7LzQ4w2NnU56F/EWuIghJ/QmtH9GYz
zYHyfeKvZyUzol5fegohxkKSk+aSknQQveMOr/jKMVoHq6AObGa1inloOLKx
NBIMeDGP8WQ8rpgg7lsx+DrLaVQpFnfV4y9CbRAhNILogmo554rmWLG8a1gR
inxYICsR6wRhmEp7lTRaMBqLYM0P5kkdW/Ze2rT7x/WW3mUYVrUzjls423vN
PvnaeSGmGktzyFHRfCw8vBHOWUlDbuQ0jcamSaCckKSDz45SJKOIJ46lZsQX
sY9HTEhZZ0nqj5gbUQtutuG/3PARzb1j4P5DTVRxA1XQ3KNlrHiJhxflqvFY
K5PVI8M0BbUyM9Cxj0GEwQneHceCEyJ2rCr80TW2sjLXSPTmagz5odp6Wlpc
Ag8emgntMFoNLFOyRueSP0XBJrgxLUH0GpMdGB06LX6XiP4QTBvo8ZQjyEJq
8ge+4nqF0WSWDdwMjdj6Y/Ccm7LjQF4rWlHqRvTG01yCwJrl5ea11zt9a7do
WQvEI/0KYbrGI7QkLTADRxZlEOlH58NwMlgWdQoHe+wzaAJhrC7DlDgzCAgo
JrnFNiLNMLf0SP66wMW1/NW78d9nGRPQ2R/u28PgDNQyjIoohFlUeshwvHtx
5B4w0963gtJhsYlmDRAZkG2ctXDqiDFUdo9KnsRKN0SxLDBTAjcJwDR4yLUR
8zhcGXsFNvrRqs0XQ/nekgtTErPLocu0D55j91pQyC1gbH1JiiWqzYNoax1d
ckDWyCELE9aQcPMJCPRAiO+zU5blEE/N4kcZ0P1kzfRQw2z42xAcpm7aIlrG
wxzV8wN8yy9NQ5ng6AiKfO8C6LRFcMvr8R9biNspwRbIZ8bt4xY5yf/vtnRy
b81T/mNtHf+FnrM3Z3t6YPyXNGFZkuXBT6aZTaDCn1jElAduDfUekwTG/n4q
xOjy//mE5cmT3yc/O61xl2GA9cjNklCRtInUAwsv1IKH3kR2zTky23NSn1x7
bG71pZJk5pGudPmDCi6JWCMAKxJF8yNcCoNIK8v9YmOtMF38xwHGOt//uYL/
AuzzjY/CeAAA

-->

</rfc>
