<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-interop-mimi-discovery-requirements-01" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.0 -->
  <front>
    <title abbrev="Discovery Requirements">MIMI Discovery Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-interop-mimi-discovery-requirements-01"/>
    <author fullname="Giles Hogben">
      <organization>Google</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>gih@google.com</email>
      </address>
    </author>
    <author fullname="Femi Olumofin">
      <organization>Google</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>fgolu@google.com</email>
      </address>
    </author>
    <author fullname="Jon Peterson">
      <organization>TransUnion</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>jon.peterson@transunion.com</email>
      </address>
    </author>
    <author fullname="Jonathan Rosenberg">
      <organization>Five9</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>jdrosen@jdrosen.net</email>
      </address>
    </author>
    <date year="2024" month="September" day="12"/>
    <area>ART</area>
    <workgroup>More Instant Messaging Interoperability (mimi)</workgroup>
    <keyword>user discovery</keyword>
    <abstract>
      <?line 56?>

<t>This document defines requirements for the discovery problem within the More Instant Messaging Interoperability (MIMI) working group. Discovery is essential for interoperability, allowing message senders to locate recipients across diverse platforms using globally unique, cross-service identifiers (e.g., email addresses, phone numbers). The core challenge involves reliably mapping these identifiers to messaging service providers and determining the reachability of a recipient's identifier across multiple providers.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://datatracker.ietf.org/doc/draft-interop-mimi-discovery-requirements/"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-interop-mimi-discovery-requirements/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        mimi Working Group mailing list (<eref target="mailto:mimi@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/mimi/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/mimi/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/femigolu/user-discovery"/>.</t>
    </note>
  </front>
  <middle>
    <?line 61?>

<section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>Glossary of terms:</t>
      <ol spacing="normal" type="1"><li>
          <t>A <strong>Service Specific Identifier (SSI)</strong> is a unique identifier for a user within the context of a single messaging service provider. It is not globally unique across services. A fully-qualified SSI includes the messaging service provider's unique identifier, making it globally unique. Note that existence of an unqualified SSI on two or more services does not guarantee that the associated accounts belong to the same user. Thus, linking SSIs across services requires other verified data to establish a match. An example of a service specific identifier is a user's X/Twitter handle.</t>
        </li>
        <li>
          <t>A <strong>Cross-Service Identifier (CSI)</strong> is a globally unique identifier for a user that can be used to identify the user across multiple services. For example, a user's E.164 phone number, email address, or other service independent identifiers are CSIs, since they can be used to identify the user across multiple different services.</t>
        </li>
        <li>
          <t>A <strong>Messaging Service Provider (MSP)</strong> provides messaging, voice, video and other forms of real-time communications services to end users. Examples of messaging service providers are WhatsApp, Messages, iMessage, Wire, Matrix, Signal etc. A user is reachable using one or more CSIs and may have at least one SSI internal to the MSP platform.</t>
        </li>
        <li>
          <t>A <strong>Cross-Service Identifier Provider (CSIP)</strong> is an entity that issues, manages, and verifies CSIs. Examples are traditional telecom providers, email providers, and other platforms capable of issuing user-controlled identifiers.</t>
        </li>
        <li>
          <t>A <strong>Discovery Provider (DP)</strong> is an entity that facilitates the discovery reachability as outlined in this requirements document. This involves creating, managing, and leveraging authoritative mappings of CSIs to the MSPs where users can be reached. We expect that a DP may be operated by or affiliated with an MSP or a third party.</t>
        </li>
      </ol>
    </section>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>MIMI discovery seeks to enable users to easily connect and communicate across different messaging platforms, even if they don't know which specific platform the other person uses. Currently, users often need to ask contacts what service they are on out-of-band, or try multiple services, which creates friction. Specifically, discovery helps a user on one messaging service (Alice on Service A) to find another user on a potentially different or same service (Bob on Service B) in a provider-neutral manner.</t>
      <t>Discovery is necessary because the identifiers we commonly have for contacts (phone numbers, email addresses, etc.) do not necessarily tell us which messaging service they are using. Someone with the email alice@gmail.com might use iMessage, Signal, or another service entirely. Thus, the core problem is how to take one of these cross-service identifiers and learn the messaging service provider that the user is using, and how to communicate with them on that service.</t>
      <section anchor="problem-statement">
        <name>Problem Statement</name>
        <t>The discovery problem involves:</t>
        <ol spacing="normal" type="1"><li>
            <t>Asserting verifiable mappings between CSIs and MSPs, and</t>
          </li>
          <li>
            <t>Looking up mappings to determine MSPs for which a CSI can be reached for messaging.</t>
          </li>
        </ol>
        <t>Discovered mappings must be verifiable to ensure they are accurate. Crucially, discovery must prioritize user privacy, allowing users to control their discoverability, and it must integrate well with end-to-end encryption and other MIMI protocols.</t>
        <t>Note that mapping lookup is distinct from the retrieval of the user's SSI and cryptographic keys. Retrieval of the SSI and keys typically occurs as part of the messaging process and can easily be done after the MSP for the message recipient has been located through discovery. For example, an MSP might store a mapping of CSIs to SSIs and cryptographic keys. The client would then retrieve this data just before Alice sends a message to Bob, following the successful discovery that Bob is reachable through the MSP.</t>
        <t>The rest of this document describes a series of requirements for the discovery problem.</t>
      </section>
    </section>
    <section anchor="prior-efforts">
      <name>Prior Efforts</name>
      <t>Discovery services are far from new on the Internet. The whois protocol <xref target="RFC3912"/>, largely focused on mapping domain names to associated services. It was one of the earliest discovery services deployed on the Internet. DNS SRV records, specified in <xref target="RFC2782"/>, allow a similar process - given a domain name, a user can discover available services, such as VoIP based on the Session Initiation Protocol (SIP) <xref target="RFC3261"/> <xref target="RFC3263"/>. SRV records were adapted specifically for messaging in <xref target="RFC3861"/>. However, both whois and DNS SRV records rely on domain names as lookup keys, making them unsuitable for identifiers like mobile phone numbers, which don't have inherent domain associations.</t>
      <t>ENUM <xref target="RFC6117"/> addressed this limitation. It used DNS to lookup phone numbers by reversing the digits and adding the "e164.arpa" suffix. This allowed delegation of portions of the namespace to telco providers who owned specific number prefixes. While technically straightforward, public deployment of ENUM was hampered by challenges in establishing authority for prefixes. However, private ENUM <xref target="RFC6116"/> services have become relatively common, facilitating functions like MMS routing within messaging.</t>
      <t>Another attempt was ViPR (Verification Involving PSTN Reachability) <xref target="I-D.rosenberg-dispatch-vipr-overview"/> <xref target="I-D.petithuguenin-vipr-pvp"/>. ViPR utilized a peer-to-peer network based on RELOAD (Resource Location and Discovery) <xref target="RFC6940"/> to operate between enterprises. It addressed the authority problem by authorizing records based on proof of forward routability but faced the same network effects issue as ENUM. ViPR attempted to address incentive problems by focusing on enterprises seeking cost savings by bypassing the phone network. Ultimately, network effects challenges (among other protocol-unrelated issues) prevented widespread deployment.</t>
      <t>Discovery and lookup services are now commonplace on the Internet but are largely scoped within large providers such as Facebook, Twitter, WhatsApp, and others.</t>
      <t>The MIMI discovery service requires a solution that spans providers.</t>
    </section>
    <section anchor="architectural-models">
      <name>Architectural Models</name>
      <t>To ensure completeness and to address implementation considerations for MIMI DP, we present several potential architectural models. The working group observed these requirements are similar among these models and opted to maintain architectural neutrality for the discovery protocol. However, we will outline requirements for the roles of DPs, how they interact with each other, MSPs in a federated model, and how DPs accommodate queries from both MSPs and users.</t>
      <section anchor="centralized-dp-monolithic-service">
        <name>Centralized DP (Monolithic Service)</name>
        <t>A globally accessible, authoritative database (potentially sharded/replicated) stores all authenticated CSI mappings. This monolithic service, implemented across synchronized global nodes, handles all CSI queries from messaging platforms and acts as the single source of truth for mapping data, even if certain mappings may be restricted in specific regions due to geopolitical considerations.</t>
        <section anchor="advantages">
          <name>Advantages</name>
          <ul spacing="normal">
            <li>
              <t>Standardization and uniform control over mapping creation, updates, and data formats.</t>
            </li>
            <li>
              <t>Promotes fair and unbiased CSI mapping discovery.</t>
            </li>
            <li>
              <t>Single source of truth for mapping simplifies data management and ensures consistency.</t>
            </li>
            <li>
              <t>Sharding/replication can address geographical distribution and performance needs.</t>
            </li>
          </ul>
        </section>
        <section anchor="drawbacks">
          <name>Drawbacks</name>
          <ul spacing="normal">
            <li>
              <t>Centralization of sensitive user data raises privacy risks.</t>
            </li>
            <li>
              <t>May conflict with data localization regulations.</t>
            </li>
            <li>
              <t>Single point of failure vulnerability from outages affecting the entire system.</t>
            </li>
            <li>
              <t>Potential difficulty with immediate global updates for rapidly changing mappings.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="hierarchical-dps-discovery-resolvers">
        <name>Hierarchical DPs (Discovery Resolvers)</name>
        <t>A global root Discovery Provider (DP) directs mapping requests to authoritative DPs based on CSI structure (e.g., country codes for E.164 phone numbers) or sharding mechanisms. The root DP, similar to hierarchical DNS, acts as a directory service, holding pointers to authoritative DPs rather than mappings themselves. Alternatives to hierarchical resolution, like the LoST protocol <xref target="RFC5222"/>, or distributed hash tables (DHTs), can achieve similar outcomes.</t>
        <section anchor="advantages-1">
          <name>Advantages</name>
          <ul spacing="normal">
            <li>
              <t>Scalability from distributed load and mapping management across multiple DPs.</t>
            </li>
            <li>
              <t>Flexibility that allows different DPs to specialize in specific CSI ranges for regions.</t>
            </li>
            <li>
              <t>Better alignment with data localization requirements.</t>
            </li>
          </ul>
        </section>
        <section anchor="drawbacks-1">
          <name>Drawbacks</name>
          <ul spacing="normal">
            <li>
              <t>Requires coordination and maintenance of hierarchy.</t>
            </li>
            <li>
              <t>Root DP failure could disrupt the entire system.</t>
            </li>
            <li>
              <t>Potential delays due to additional hops in the discovery process.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="federated-dps-distributed-peer-service">
        <name>Federated DPs (Distributed Peer Service)</name>
        <t>In a federated model, multiple independent DPs collaborate to provide CSI mapping discovery. Each DP holds a subset of mappings and pointers to other DPs, with no central authority dictating mapping locations. Discovering all mappings for a CSI may involve querying multiple DPs. DPs can exchange CSI information or recursively query each other. The specifics of DP federation are determined by business agreements, not technical requirements. A variation of this model involves messaging platforms acting as their own DPs, managing mappings for their users.</t>
        <section anchor="advantages-2">
          <name>Advantages</name>
          <ul spacing="normal">
            <li>
              <t>Decentralization ensures there is no single point of control or failure. The system can continue functioning even if some DPs are unavailable.</t>
            </li>
            <li>
              <t>Mappings can be distributed according to local regulations.</t>
            </li>
          </ul>
        </section>
        <section anchor="drawbacks-2">
          <name>Drawbacks</name>
          <ul spacing="normal">
            <li>
              <t>Discovery process may involve querying multiple DPs, increasing network load.</t>
            </li>
            <li>
              <t>Potential for bias as DPs may prioritize their own mappings, leading to uneven results.</t>
            </li>
            <li>
              <t>Requires robust mechanisms to prevent CSI impersonation and ensure trust between DPs.</t>
            </li>
            <li>
              <t>Pairwise relationships in a federated DP model could create a barrier to entry for smaller MSP/DPs, similar to the trust requirements in the DKIM <xref target="RFC6376"/> and DMARC <xref target="RFC8616"/> ecosystems.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="additional-considerations-on-architectural-models">
        <name>Additional Considerations on Architectural Models</name>
        <section anchor="telephone-number-csis">
          <name>Telephone Number CSIs</name>
          <t>Telephone number portability is complex due to its reliance on real-time queries to proprietary and legacy systems. Overall, the authenticated mappings proposed for MIMI may necessitate additional platform measures to assess mapping freshness and ensure up-to-date reachability responses.</t>
        </section>
        <section anchor="bias-mitigation">
          <name>Bias Mitigation</name>
          <t>Bias occurs when a DP prioritizes mappings to its affiliated MSP without consideration of what is best for end users. Mitigating bias is essential to ensure fair and equitable discovery of authenticated mappings across different services. The working group has decided to defer such mitigation to policies and regulations, excluding it from the discovery protocol.</t>
        </section>
      </section>
    </section>
    <section anchor="summary-of-requirements">
      <name>Summary of Requirements</name>
      <table>
        <thead>
          <tr>
            <th align="left">#</th>
            <th align="left">Requirement</th>
            <th align="left">Mandatory</th>
            <th align="left">Optional</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left"> </td>
            <td align="left">
              <strong>Authenticating Mappings</strong></td>
            <td align="left"> </td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">1</td>
            <td align="left">DP <bcp14>MUST</bcp14> verify user's CSI possession through proof-of-possession challenges through a CSIP, certificate authority or designated parties</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">2</td>
            <td align="left">MSP <bcp14>MUST</bcp14> confirm CSI reachability on its service</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">3</td>
            <td align="left">Client, MSP, and DP must collaborate to generate a verifiable representation of the CSI-to-MSP mapping. This can then be shared with any DP and verifiable by clients</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">4</td>
            <td align="left">DP <bcp14>MUST NOT</bcp14> be able to create a verifiable mapping without CSI holder and MSP involvement</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">5</td>
            <td align="left">DP <bcp14>MUST NOT</bcp14> be able to falsely claim user completed proof-of-possession</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">6</td>
            <td align="left">Other users <bcp14>MUST</bcp14> be able to verify CSI holder's participation in mapping creation</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">7</td>
            <td align="left">Authenticated mappings <bcp14>MUST</bcp14> include a preference tag to enable recipients to control their preferred contact mapping</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left"> </td>
            <td align="left">
              <strong>Discovery Protocol</strong></td>
            <td align="left"> </td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">8</td>
            <td align="left">Discovery <bcp14>MUST</bcp14> support any globally unique CSI with backing source of truth (CISP for telephone), ownership proof, and cross-service usability</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">9</td>
            <td align="left">DP <bcp14>MUST</bcp14> protect at least the querier's identity or the target CSI in requests</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">10</td>
            <td align="left">Discovery requests <bcp14>MUST</bcp14> support federation, MSP filter, and DP list query parameters</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">11</td>
            <td align="left">DP <bcp14>MUST</bcp14> disclose default behavior and comply with agreed-upon federation default</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">12</td>
            <td align="left">DP <bcp14>MAY</bcp14> rate-limit non-default queries given their higher processing costs</td>
            <td align="left"> </td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">13</td>
            <td align="left">DP <bcp14>MAY</bcp14> rate-limit requests sent to low-throughput DP endpoints</td>
            <td align="left"> </td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">14</td>
            <td align="left">Discovery <bcp14>MUST</bcp14> accommodate zero, one, or multiple MSPs in results</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">15</td>
            <td align="left">The protocol <bcp14>MUST</bcp14> define both verbose and compact response formats, where verbose responses include detailed mapping information and metadata, while compact responses provide a simple indication of CSI reachability on returned MSPs</td>
            <td align="left"> </td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left"> </td>
            <td align="left">
              <strong>Operational</strong></td>
            <td align="left"> </td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">16</td>
            <td align="left">Discovery service <bcp14>MUST</bcp14> remove mappings made outdated by CSI re-assignment to a new user within reasonable time</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">17</td>
            <td align="left">Older mappings generally take precedence over newer ones for the same CSI unless explicitly invalidated by the original CSI holder or superseded by a stricter proof of possession verification</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">18</td>
            <td align="left">DP <bcp14>MUST</bcp14> verify if a mapping is the first mapping for a given CSI and, if so, broadcast invalidation requests to other DPs to invalidate any existing mappings for that CSI</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">19</td>
            <td align="left">Users <bcp14>SHOULD</bcp14> be provided with mechanisms to invalidate existing mappings or create a replacement mapping for their CSIs</td>
            <td align="left"> </td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">20</td>
            <td align="left">New CSI mappings <bcp14>SHOULD</bcp14> be discoverable within some standardized maximum time limit (e.g., 24 hours)</td>
            <td align="left"> </td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left"> </td>
            <td align="left">
              <strong>Security</strong></td>
            <td align="left"> </td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">21</td>
            <td align="left">Discovery service <bcp14>MUST</bcp14> leverage contractual and technical means prevent malicious MSPs from falsely claiming CSI association</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">22</td>
            <td align="left">Discovery service <bcp14>MUST</bcp14> incorporate anti-DDoS, anti-enumeration and anti-spam mechanisms</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">23</td>
            <td align="left">All communication between clients, DPs, and MSPs <bcp14>MUST</bcp14> be encrypted in transit and authenticated</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="authenticating-mappings-requirements">
      <name>Authenticating Mappings Requirements</name>
      <t>A Discovery Provider aggregates mappings between CSIs and platforms from trusted sources. To prevent impersonation attacks where platforms or users simply claim to own a CSI, the user must solve a proof of possession challenge for the CSI before a DP can establish reachability mapping involving the CSI. Suitable approaches include SMS one-time-code or voice call verification to prove possession of phone number, email link verification for emails, OAuth sign-in for Twitter and YouTube identifiers. A potential architecture for generating credentials from proof-of-possession checks is shown in <xref target="I-D.draft-peterson-mimi-idprover"/>. A platform performing discovery should be able to verify that the target user established the reachability mapping. Note that once a mapping is created, it can be distributed by any DP, and it should include metadata for clients that receive it to verify its authenticity.</t>
      <section anchor="functional-requirements">
        <name>Functional Requirements</name>
        <t>At least, a user's client, MSP, and DP <bcp14>MUST</bcp14> participate in a consensus protocol to establish a CSI-to-MSP mapping with the following requirements:</t>
        <ol spacing="normal" type="1"><li>
            <t>The DP <bcp14>MUST</bcp14> verify the user's possession of the CSI through some proof-of-possession challenge.</t>
          </li>
          <li>
            <t>The MSP <bcp14>MUST</bcp14> confirm that the CSI is reachable on its service.</t>
          </li>
          <li>
            <t>The client, MSP, and DP must collaborate to generate a verifiable representation of the CSI-to-MSP mapping (e.g., using a threshold signature). The can then be shared with any DP and verifiable by clients.</t>
          </li>
        </ol>
      </section>
      <section anchor="privacy-and-security-requirements">
        <name>Privacy and Security Requirements</name>
        <ol spacing="normal" type="1"><li>
            <t>A DP <bcp14>MUST NOT</bcp14> be able to create a verifiable mapping without the involvement of the user holding the CSI and MSP.</t>
          </li>
          <li>
            <t>The DP <bcp14>MUST NOT</bcp14> be able to falsely claim that a user completed the proof-of-possession challenge.</t>
          </li>
          <li>
            <t>Other users <bcp14>MUST</bcp14> be able to verify that the CSI holder (and not an imposter) participated in creating the mapping.</t>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="preferences">
      <name>Preferences</name>
      <t>The discovery process involves the preferences of multiple stakeholders:</t>
      <ol spacing="normal" type="1"><li>
          <t>the querier seeking reachability information,</t>
        </li>
        <li>
          <t>the user with the mapped identity, and</t>
        </li>
        <li>
          <t>DPs (and by extension, the collaborating MSPs).</t>
        </li>
      </ol>
      <t>The authors suggest the following:</t>
      <ul spacing="normal">
        <li>
          <t>Implementations shouldn't dictate a one-size-fits-all approach for expressing and meeting these preferences, but should rather implement basic building blocks for each of these parties to express their preferences.</t>
        </li>
        <li>
          <t>DPs should clearly communicate their preference handling practices to promote transparency and trust.</t>
        </li>
        <li>
          <t>The discovery requirements consider detailed preferences and capabilities out of scope, leaving them to individual implementations.</t>
        </li>
        <li>
          <t>Given that the sender initiates discovery requests and already has options on which app, MSP, and DP to query, we will only provide a basic recipient preference specification as a requirement below.</t>
        </li>
      </ul>
      <section anchor="basic-recipients-preference-requirement">
        <name>Basic Recipient's Preference Requirement</name>
        <t>Requirement: Authenticated mappings <bcp14>MUST</bcp14> include a preference tag to enable recipients to control their preferred contact mapping.</t>
        <t>The preference tag can be either a string (e.g., "Business", "Personal", "BasketballFriends", "WhatsApp") or a list of strings (e.g., "Business, WhatsApp"). For example, a recipient might want senders from WhatsApp to utilize a specific non-default "WhatsApp" mapping.</t>
        <ol spacing="normal" type="1"><li>
            <t>The default mapping must be designated as "Default" and cannot be a list.</t>
          </li>
          <li>
            <t>Non-default mappings can have one or more tags to signify the recipient's intended purpose for that contact mapping.</t>
          </li>
          <li>
            <t>The total length of tags should be limited within the protocol.</t>
          </li>
          <li>
            <t>If a CSI's set of mappings lacks a default mapping or multiple mappings have the "Default" tag, the recipient can choose any of the mappings for communication.</t>
          </li>
          <li>
            <t>Tie-breaking should occur only once and be re-evaluated solely through explicit user action. This prevents messages from a sender from being scattered across multiple mappings for the recipient.</t>
          </li>
        </ol>
      </section>
      <section anchor="recipients-critical-user-journeys-implementations">
        <name>Recipient's Critical User Journeys (implementations)</name>
        <t>Here are some Critical User Journeys (CUJs) that are the most important to discovery recipients.</t>
        <t>In the CUJs below, Bob is the recipient, and Alice is the sender or user performing discovery:</t>
        <ol spacing="normal" type="1"><li>
            <t>Sender mapping preferences: Bob only wants to be found by Alice and other users on WhatsApp, not his other messaging apps.</t>
          </li>
          <li>
            <t>Same-app preferences: Bob prefers that Alice can find him on the same messaging service that she is using. In other words, Bob does not want cross-app discovery and messaging.</t>
          </li>
          <li>
            <t>No-random mapping preferences: Bob does not want to go through multiple apps to find a message from Alice when discovery returns one of 10 mappings that Bob has established with discovery providers.</t>
          </li>
          <li>
            <t>No-duplication preferences: Bob does not want Alice's messages to be broadcasted to all or a subset of his apps based on the result of discovery.</t>
          </li>
          <li>
            <t>Per-sender preferences: Bob wants to control which app messages from Alice go to and do the same for other users (e.g., Carol's messages may go to a different app than Alice's).</t>
          </li>
          <li>
            <t>Closed group preferences: Bob only wants his soccer parents to discover and contact him on WhatsApp, not his Wire app. That is, a group of senders has the same mapping results based on Bob's preferences.</t>
          </li>
          <li>
            <t>Open-ended group preferences: Bob wants his business contacts to discover and reach him on Wire, not WhatsApp. That is, an open-ended list of senders (i.e., including leads) are provided with a designated mapping.</t>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="discovery-protocol-requirements">
      <name>Discovery Protocol Requirements</name>
      <section anchor="identifier-types">
        <name>Identifier Types</name>
        <t>Discovery <bcp14>MUST</bcp14> support any globally unique cross-service identifier with the following characteristics:</t>
        <ol spacing="normal" type="1"><li>
            <t>Backing source of truth: Authoritative issuing entities exist for issuing the CSI to users (e.g., CSIP for telephone numbers).</t>
          </li>
          <li>
            <t>Ownership proof mechanism: The user issued a CSI must be able to demonstrate or pass a proof of possession challenge from a remote prover.</t>
          </li>
          <li>
            <t>Versatility: CSIs must be deployable and usable across multiple services</t>
          </li>
        </ol>
        <t>Phone numbers and email addresses are examples of suitable and supported identifiers.</t>
      </section>
      <section anchor="discovery-response-requirements">
        <name>Discovery Response Requirements</name>
        <section anchor="cardinalities">
          <name>Cardinalities</name>
          <t>The discovery protocol must accommodate scenarios with varying numbers of MSPs in the discovery results:</t>
          <ol spacing="normal" type="1"><li>
              <t>Zero MSPs: The system should indicate a no-match condition if users and their associated Identifiers (e.g., CSIs) are not discoverable on any MSP. This enables the originating user to recognize that the CSI is not reachable via the discovery system.</t>
            </li>
            <li>
              <t>One MSP: The system should function efficiently when a CSI is associated with a single MSP.</t>
            </li>
            <li>
              <t>Multiple MSPs: The system should accommodate users with multiple MSPs.</t>
            </li>
          </ol>
        </section>
        <section anchor="response-format">
          <name>Response format</name>
          <t>An MSP or client app may request responses that are verbose or compact. A verbose response may include all unique lists of mappings discovered with metadata for the client to verify each mapping, and metadata about the list or count of DPs where that mapping was found. A compact response may be as simple as a bit string with each set bit representing that the CSI is found in the MSP assigned to that bit position. The protocol <bcp14>MUST</bcp14> define specific formats for both response types.</t>
        </section>
      </section>
      <section anchor="discovery-request-requirement">
        <name>Discovery Request Requirement</name>
        <section anchor="requests">
          <name>Requests</name>
          <t>Discovery requests must include the CSI and may include additional query parameters to guide the search process. The query parameters below <bcp14>MUST</bcp14> be supported.</t>
          <section anchor="federation">
            <name>Federation</name>
            <t>Indicate if the DP should answer queries using its own database or federate the request to other DPs and aggregate their answers in a fair and transparent manner. In a federated model, a DP that chooses not to federate may be limited in the queries it can answer. Certainly, a DP can incorporate mappings that either reference another DP's mapping or materialize those mappings into its own local database.</t>
          </section>
          <section anchor="msp-filter">
            <name>MSP filter</name>
            <t>Useful for scoping the response of interest to one or more MSPs (e.g., query for CSI mapping to WhatsApp only).</t>
          </section>
          <section anchor="dp-list">
            <name>DP list</name>
            <t>A list of DPs may accompany each query to guide a DP on query federation decisions. These sub-options for DP list must be supported:</t>
            <ul spacing="normal">
              <li>
                <t>DP-preferred federation: signals for the DP to forward the query to its preferred subset of DPs.</t>
              </li>
              <li>
                <t>Client-selected federation: instructs the DP to forward the query to a specific list of DPs provided by the client.</t>
              </li>
              <li>
                <t>All DPs: mandates the DP to forward the query to all DPs within the ecosystem, utilizing a publicly accessible registry (described below).</t>
              </li>
            </ul>
          </section>
        </section>
        <section anchor="default-behavior-disclosure">
          <name>Default behavior disclosure</name>
          <t>A DP must externally disclose its default behavior which should be consistent with local regulatory requirements (e.g., do not federate by default for performance, privacy or regulatory reasons). For example, in the absence of a context parameter, the DP disclosed it will utilize its local database to fulfill requests.</t>
          <t>A DP must follow some preferred default behavior that is agreed at the federation level.</t>
        </section>
        <section anchor="client-rate-limit">
          <name>Client rate limit</name>
          <t>Again, forking discovery requests consume ecosystem resources, and could facilitate attacks. Hence a DP may rate-limit non-default queries. Specifically, a client may be limited to a few queries daily when federated to the entire ecosystem DPs.</t>
        </section>
        <section anchor="server-rate-limit">
          <name>Server rate limit</name>
          <t>DPs may optionally rate-limit requests directed at DP endpoints with low query processing throughput for discovery responsiveness.</t>
        </section>
        <section anchor="rate-limiting-context">
          <name>Rate-limiting context</name>
          <t>A DP must provide sufficient context to the federation of DPs on a fork tree to assist them in rate-limiting requests from specific clients in a privacy-friendly manner.</t>
        </section>
      </section>
      <section anchor="privacy-requirements">
        <name>Privacy Requirements</name>
        <section anchor="requirement">
          <name>Requirement</name>
          <t>A DP must protect at least one end of the social graph during a request. In other words, the DP must protect either the querier's identity or the CSI of interest in requests.</t>
          <t>Possible implementation approaches when Alice is discovering Bob's reachability:</t>
          <ol spacing="normal" type="1"><li>
              <t>Querier identity protection: IP blinding (e.g., Private Relay) can help to conceal Alice's identity or IP address so the DP may learn the query target only.</t>
            </li>
            <li>
              <t>Query content protection: Techniques like Private Information Retrieval (PIR) or Private Set Membership (PSM) can conceal the target CSI, so the DP may learn the querier only.</t>
            </li>
          </ol>
          <t>The messaging social graph of a user shows all the other users that the user has communicated with over time.The discovery social graph of a user shows all the users for whom discovery has been attempted. The discovery social graph is significantly larger than the messaging social graph, even though there may be some overlap between the two. To clarify, a user's address book defines their potential social network. MIMI discovery, when applied comprehensively using the address book, reveals that network on various services. In contrast, the messaging social graph only includes contacts actively messaged within a specific period, which is inherently a subset of the user's wider contact network. Since discovery can query for users the initiator hasn't yet messaged, the discovery social graph is naturally larger.</t>
        </section>
      </section>
    </section>
    <section anchor="operational-requirements">
      <name>Operational Requirements</name>
      <t>The discovery service must support a decentralized architecture with multiple DPs, enabling federation based on user preferences, geopolitical boundaries, and DP-specific policies.</t>
      <t>Some additional considerations:</t>
      <ol spacing="normal" type="1"><li>
          <t>Federation mechanisms: Protocols or standards for DPs to communicate and exchange mapping data must be defined. This includes how requests are routed and how DPs locate potentially relevant mappings stored elsewhere.</t>
        </li>
        <li>
          <t>Data sovereignty: Regulations such as GDPR have a direct impact on where user data can reside. Solutions must be designed to respect data locality and follow jurisdictional laws.</t>
        </li>
      </ol>
      <section anchor="registry">
        <name>Registry</name>
        <t>It is likely that reachability mappings on some services will not be shared publicly for privacy reasons. Thus DPs may federate: for example, a discovery client may send a request to one DP, which will then need to consult a second DP in order to complete the request. Some sort of policies will need to govern the relationships between DPs and the terms under which they federate. Such a policy is outside MIMI's purview.</t>
        <t>Metadata and service configurations about federation membership of interoperable DPs may be hosted on a registry managed by the federation. Each DP's record may include a unique identifier, discovery endpoints, and other configuration metadata.</t>
      </section>
      <section anchor="csi-release-timeliness">
        <name>CSI Release Timeliness</name>
        <t>The discovery service must strive to remove outdated mappings (resulting from users ending service with a CSIP) within a reasonable timeframe, but this timeframe must acknowledge the limitations of existing legacy systems and the potential for identifier reuse. For example, in scenarios where a number is disconnected and later reassigned, the new user must designate the very first mapping as such. This triggers the DP to broadcast invalidation requests to other DPs, effectively clearing any lingering mappings associated with the reassigned number.</t>
        <section anchor="mapping-prioritization-requirement">
          <name>Mapping Prioritization Requirement</name>
          <t>Whenever a new mapping is attempted for an existing CSI, the one established earlier should generally take precedence. This precedence <bcp14>SHOULD</bcp14> be overridden ONLY in the following cases:</t>
          <ol spacing="normal" type="1"><li>
              <t>The original CSI holder explicitly signals the mapping is no longer valid.</t>
            </li>
            <li>
              <t>A new user of the CSI establishes a mapping and successfully completes a stricter proof of possession verification process.</t>
            </li>
          </ol>
        </section>
        <section anchor="conflict-resolution-protocol-requirement">
          <name>Conflict Resolution Protocol Requirement</name>
          <ol spacing="normal" type="1"><li>
              <t>DPs <bcp14>MUST</bcp14> implement a conflict resolution protocol when a new mapping creation attempt is made for a CSI that already has mappings within the DP's service.</t>
            </li>
            <li>
              <t>This protocol <bcp14>SHOULD</bcp14> include a privacy-preserving notification to the holder of any existing mappings (without revealing the new user's identity).</t>
            </li>
            <li>
              <t>If the conflict cannot be automatically resolved, the DP <bcp14>MAY</bcp14> escalate to a manual review process that involves additional verification steps for the new user.</t>
            </li>
          </ol>
        </section>
        <section anchor="invalidate-capability-requirement">
          <name>Invalidate Capability Requirement</name>
          <ol spacing="normal" type="1"><li>
              <t>Mechanisms <bcp14>SHOULD</bcp14> be provided to enable users to signal that a CSI they previously used is no longer under their control. This could include:
              </t>
              <ul spacing="normal">
                <li>
                  <t>Collaborations with CSIP to receive re-assignment notifications.</t>
                </li>
                <li>
                  <t>User-initiated invalidation requests.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Invalidate signals <bcp14>SHOULD</bcp14> trigger updates to discovery mappings to minimize conflicts.</t>
            </li>
          </ol>
        </section>
      </section>
      <section anchor="csi-claim-timeliness">
        <name>CSI Claim Timeliness</name>
        <t>Upon a user obtaining service for a new CSI (e.g., phone number or email address) from a CSIP, the discovery service must enable immediate discoverability when the user associates the CSI with a MSP. The MSP <bcp14>MUST</bcp14> implement a mechanism to validate the user's control over the claimed CSI (as usual).</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="blackhole-prevention">
        <name>Blackhole Prevention</name>
        <t>The discovery service must be designed to prevent malicious MSPs from falsely claiming association with a CSI to prevent messages intended for the legitimate user from being delivered. This includes:</t>
        <ul spacing="normal">
          <li>
            <t>Preventing message interception: Malicious MSPs <bcp14>MUST NOT</bcp14> be able to redirect messages by associating themselves with a CSI they do not control.</t>
          </li>
          <li>
            <t>Ensuring accurate discoverability: Malicious MSPs <bcp14>MUST NOT</bcp14> be able to make a non-user appear discoverable, leading to misdirected messages or false impressions of service adoption.</t>
          </li>
        </ul>
      </section>
      <section anchor="ddos-enumeration-and-spam-prevention-and-mitigation">
        <name>DDoS, Enumeration and Spam Prevention and Mitigation</name>
        <t>The discovery service <bcp14>MUST</bcp14> put in place robust mechanisms to prevent and mitigate DDoS, large-scale CSI scraping and spamming by malicious providers (MSPs, DPs). This requirement includes:</t>
        <ul spacing="normal">
          <li>
            <t>Anti-DDoS, anti-enumeration and anti-spam defenses: The system design must effectively thwart attempts to DDoS attack, enumerate CSIs (especially phone numbers), and prevent the creation of spam target lists. Techniques may include restrictions on bulk queries, obfuscation, or differential access levels based on MSP reputation and relationships.</t>
          </li>
          <li>
            <t>Flexible rate limiting: DPs must be able to enforce rate limits on discovery requests, with mechanisms to determine appropriate limits based on individual MSP behavior, business relationships, and potential risks.</t>
          </li>
        </ul>
      </section>
      <section anchor="encryption-and-authentication">
        <name>Encryption and Authentication</name>
        <t>All information exchanged between clients, DPs, and MSPs <bcp14>MUST</bcp14> be encrypted in transit and authenticated.</t>
      </section>
      <section anchor="notes">
        <name>Notes</name>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="RFC3912">
        <front>
          <title>WHOIS Protocol Specification</title>
          <author fullname="L. Daigle" initials="L." surname="Daigle"/>
          <date month="September" year="2004"/>
          <abstract>
            <t>This document updates the specification of the WHOIS protocol, thereby obsoleting RFC 954. The update is intended to remove the material from RFC 954 that does not have to do with the on-the-wire protocol, and is no longer applicable in today's Internet. This document does not attempt to change or update the protocol per se, or document other uses of the protocol that have come into existence since the publication of RFC 954. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3912"/>
        <seriesInfo name="DOI" value="10.17487/RFC3912"/>
      </reference>
      <reference anchor="RFC2782">
        <front>
          <title>A DNS RR for specifying the location of services (DNS SRV)</title>
          <author fullname="A. Gulbrandsen" initials="A." surname="Gulbrandsen"/>
          <author fullname="P. Vixie" initials="P." surname="Vixie"/>
          <author fullname="L. Esibov" initials="L." surname="Esibov"/>
          <date month="February" year="2000"/>
          <abstract>
            <t>This document describes a DNS RR which specifies the location of the server(s) for a specific protocol and domain. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2782"/>
        <seriesInfo name="DOI" value="10.17487/RFC2782"/>
      </reference>
      <reference anchor="RFC3261">
        <front>
          <title>SIP: Session Initiation Protocol</title>
          <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <author fullname="G. Camarillo" initials="G." surname="Camarillo"/>
          <author fullname="A. Johnston" initials="A." surname="Johnston"/>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <author fullname="R. Sparks" initials="R." surname="Sparks"/>
          <author fullname="M. Handley" initials="M." surname="Handley"/>
          <author fullname="E. Schooler" initials="E." surname="Schooler"/>
          <date month="June" year="2002"/>
          <abstract>
            <t>This document describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants. These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3261"/>
        <seriesInfo name="DOI" value="10.17487/RFC3261"/>
      </reference>
      <reference anchor="RFC3263">
        <front>
          <title>Session Initiation Protocol (SIP): Locating SIP Servers</title>
          <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <date month="June" year="2002"/>
          <abstract>
            <t>The Session Initiation Protocol (SIP) uses DNS procedures to allow a client to resolve a SIP Uniform Resource Identifier (URI) into the IP address, port, and transport protocol of the next hop to contact. It also uses DNS to allow a server to send a response to a backup client if the primary client has failed. This document describes those DNS procedures in detail. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3263"/>
        <seriesInfo name="DOI" value="10.17487/RFC3263"/>
      </reference>
      <reference anchor="RFC3861">
        <front>
          <title>Address Resolution for Instant Messaging and Presence</title>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <date month="August" year="2004"/>
          <abstract>
            <t>Presence and instant messaging are defined in RFC 2778. The Common Profiles for Presence and Instant Messaging define two Universal Resource Identifier (URI) schemes: 'im' for INSTANT INBOXes and 'pres' for PRESENTITIES. This document provides guidance for locating the resources associated with URIs that employ these schemes. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3861"/>
        <seriesInfo name="DOI" value="10.17487/RFC3861"/>
      </reference>
      <reference anchor="RFC6117">
        <front>
          <title>IANA Registration of Enumservices: Guide, Template, and IANA Considerations</title>
          <author fullname="B. Hoeneisen" initials="B." surname="Hoeneisen"/>
          <author fullname="A. Mayrhofer" initials="A." surname="Mayrhofer"/>
          <author fullname="J. Livingood" initials="J." surname="Livingood"/>
          <date month="March" year="2011"/>
          <abstract>
            <t>This document specifies a revision of the IANA Registration Guidelines for Enumservices, describes corresponding registration procedures, and provides a guideline for creating Enumservice Specifications. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6117"/>
        <seriesInfo name="DOI" value="10.17487/RFC6117"/>
      </reference>
      <reference anchor="RFC6116">
        <front>
          <title>The E.164 to Uniform Resource Identifiers (URI) Dynamic Delegation Discovery System (DDDS) Application (ENUM)</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <author fullname="L. Conroy" initials="L." surname="Conroy"/>
          <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
          <date month="March" year="2011"/>
          <abstract>
            <t>This document discusses the use of the Domain Name System (DNS) for storage of data associated with E.164 numbers, and for resolving those numbers into URIs that can be used (for example) in telephony call setup. This document also describes how the DNS can be used to identify the services associated with an E.164 number. This document obsoletes RFC 3761. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6116"/>
        <seriesInfo name="DOI" value="10.17487/RFC6116"/>
      </reference>
      <reference anchor="I-D.rosenberg-dispatch-vipr-overview">
        <front>
          <title>Verification Involving PSTN Reachability: Requirements and Architecture Overview</title>
          <author fullname="Jonathan Rosenberg" initials="J." surname="Rosenberg">
            <organization>jdrosen.net</organization>
          </author>
          <author fullname="Cullen Fluffy Jennings" initials="C. F." surname="Jennings">
            <organization>Cisco</organization>
          </author>
          <author fullname="Marc Petit-Huguenin" initials="M." surname="Petit-Huguenin">
            <organization>Stonyfish</organization>
          </author>
          <date day="25" month="October" year="2010"/>
          <abstract>
            <t>The Session Initiation Protocol (SIP) has seen widespread deployment
within individual domains, typically supporting voice and video
communications.  Though it was designed from the outset to support
inter-domain federation over the public Internet, such federation has
not materialized.  The primary reasons for this are the complexities
of inter-domain phone number routing and concerns over security.
This document reviews this problem space, outlines requirements, and
then describes a new model and technique for inter-domain federation
with SIP, called Verification Involving PSTN Reachability (ViPR).
ViPR addresses the problems that have prevented inter-domain
federation over the Internet.  It provides fully distributed inter-
domain routing for phone numbers, authorized mappings from phone
numbers to domains, a new technique for automated VoIP anti-spam, and
privacy of number ownership, all while preserving the trapezoidal
model of SIP.

Legal

This documents and the information contained therein are provided on
an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE
REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE
IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL
WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY
WARRANTY THAT THE USE OF THE INFORMATION THEREIN WILL NOT INFRINGE
ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE.
            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-rosenberg-dispatch-vipr-overview-04"/>
      </reference>
      <reference anchor="I-D.petithuguenin-vipr-pvp">
        <front>
          <title>The Public Switched Telephone Network (PSTN) Validation Protocol (PVP)</title>
          <author fullname="Marc Petit-Huguenin" initials="M." surname="Petit-Huguenin">
            <organization>Unaffiliated</organization>
          </author>
          <author fullname="Jonathan Rosenberg" initials="J." surname="Rosenberg">
            <organization>jdrosen.net</organization>
          </author>
          <author fullname="Cullen Fluffy Jennings" initials="C. F." surname="Jennings">
            <organization>Cisco</organization>
          </author>
          <date day="12" month="March" year="2012"/>
          <abstract>
            <t>   One of the main challenges in inter-domain federation of Session
   Initiation Protocol (SIP) calls is that many domains continue to
   utilize phone numbers, and not email-style SIP URI.  Consequently, a
   mechanism is needed that enables secure mappings from phone numbers
   to domains.  The main technical challenge in doing this securely is
   to verify that the domain in question truly is the "owner" of the
   phone number.  This specification defines the PSTN Validation
   Protocol (PVP), which can be used by a domain to verify this
   ownership by means of a forward routability check in the PSTN.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-petithuguenin-vipr-pvp-04"/>
      </reference>
      <reference anchor="RFC6940">
        <front>
          <title>REsource LOcation And Discovery (RELOAD) Base Protocol</title>
          <author fullname="C. Jennings" initials="C." surname="Jennings"/>
          <author fullname="B. Lowekamp" initials="B." role="editor" surname="Lowekamp"/>
          <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
          <author fullname="S. Baset" initials="S." surname="Baset"/>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <date month="January" year="2014"/>
          <abstract>
            <t>This specification defines REsource LOcation And Discovery (RELOAD), a peer-to-peer (P2P) signaling protocol for use on the Internet. A P2P signaling protocol provides its clients with an abstract storage and messaging service between a set of cooperating peers that form the overlay network. RELOAD is designed to support a P2P Session Initiation Protocol (P2PSIP) network, but can be utilized by other applications with similar requirements by defining new usages that specify the Kinds of data that need to be stored for a particular application. RELOAD defines a security model based on a certificate enrollment service that provides unique identities. NAT traversal is a fundamental service of the protocol. RELOAD also allows access from "client" nodes that do not need to route traffic or store data for others.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6940"/>
        <seriesInfo name="DOI" value="10.17487/RFC6940"/>
      </reference>
      <reference anchor="RFC5222">
        <front>
          <title>LoST: A Location-to-Service Translation Protocol</title>
          <author fullname="T. Hardie" initials="T." surname="Hardie"/>
          <author fullname="A. Newton" initials="A." surname="Newton"/>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <date month="August" year="2008"/>
          <abstract>
            <t>This document describes an XML-based protocol for mapping service identifiers and geodetic or civic location information to service contact URIs. In particular, it can be used to determine the location-appropriate Public Safety Answering Point (PSAP) for emergency services. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5222"/>
        <seriesInfo name="DOI" value="10.17487/RFC5222"/>
      </reference>
      <reference anchor="RFC6376">
        <front>
          <title>DomainKeys Identified Mail (DKIM) Signatures</title>
          <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
          <author fullname="T. Hansen" initials="T." role="editor" surname="Hansen"/>
          <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
          <date month="September" year="2011"/>
          <abstract>
            <t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message. This can be an author's organization, an operational relay, or one of their agents. DKIM separates the question of the identity of the Signer of the message from the purported author of the message. Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key. Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t>
            <t>This memo obsoletes RFC 4871 and RFC 5672. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="76"/>
        <seriesInfo name="RFC" value="6376"/>
        <seriesInfo name="DOI" value="10.17487/RFC6376"/>
      </reference>
      <reference anchor="RFC8616">
        <front>
          <title>Email Authentication for Internationalized Mail</title>
          <author fullname="J. Levine" initials="J." surname="Levine"/>
          <date month="June" year="2019"/>
          <abstract>
            <t>Sender Policy Framework (SPF) (RFC 7208), DomainKeys Identified Mail (DKIM) (RFC 6376), and Domain-based Message Authentication, Reporting, and Conformance (DMARC) (RFC 7489) enable a domain owner to publish email authentication and policy information in the DNS. In internationalized email, domain names can occur both as U-labels and A-labels. This specification updates the SPF, DKIM, and DMARC specifications to clarify which form of internationalized domain names to use in those specifications.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8616"/>
        <seriesInfo name="DOI" value="10.17487/RFC8616"/>
      </reference>
      <reference anchor="I-D.draft-peterson-mimi-idprover">
        <front>
          <title>An Identitifier Proof-of-Possession Mechanism</title>
          <author fullname="Jon Peterson" initials="J." surname="Peterson">
            <organization>TransUnion</organization>
          </author>
          <date day="4" month="March" year="2024"/>
          <abstract>
            <t>   This document specifies a means for a third-party service to prove
   and attest the association of a communications platform with a
   particular user's telephone number.  This capability supports secure
   enrollment for users of messaging platforms or similar real-time
   communication applications, for cases where users assert telephone
   numbers as communication identifiers, and interoperating platforms
   need to verify that identifiers are being properly attested.  This
   general approach can potentially work with other forms of Service
   Independent Identifiers (SIIs) in the More Instant Messaging
   Interoperability (MIMI) framework.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-peterson-mimi-idprover-00"/>
      </reference>
    </references>
    <?line 416?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to acknowledge and express our appreciation for the thoughtful feedback and constructive discussions that took place during the MIMI interim meetings focused on the discovery problem.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA8V96XIbR5bufzxFXemHSQcAtZb2wpg7Y5qUbPaIEpuk7PGd
mJgooBJAtQpVcC2k0G2/yzzLPNmc7yy5AKCkvjM3boc7RIJVmSdPnn3DZDIZ
9WVfuZPs0eXF5UV2Xnbz5s612+za/TqUrVu7uu8ejfLZrHV39NRDD8zz3i2b
dnuSlfWiGY2KZl7na1q3aPNFPynr3rXNZrIu1+WksDUmbbTG5A9PR90wW5dd
VzZ1v93Qyxcvb1+N6mE9c+3JqKAtTkbzpu5c3Q3dSbbIq86NCKrno7x1+Ul2
en07um/a98u2GTY4UtO67KLu+rzus0vXdfmyrJf0CQPj2nxWVmW/zY4A1vGj
0Xu3pdeLk1E2yYbOtZmHdHTn6oF2zzJdG2/QbwLmz7QnFv4Bf6NP13lZySPf
la5fTJt2SZ/m7Xx1kq36ftOdPHmCZ/BJeeem9tATfPBk1jb3nXuC159gw7Jf
DTM6rVuXy6YangCygEN6oiLEdH1YmhCV920+f+/asDRdyJPPvosnoxGQVvx7
XjU1HXDrulG3ztv+338dGtrsJKub0aY8yf61b+bjrGvavnWLjn7arvHDv41G
+dCvmhaoJAizbDFUlRDED2XluuzHZjlzNf/JCbqW5eq7ZdMsKzedN2v+C8Gd
1+Vf854Igl7kP/If5s1Q9yC2d3XZuyK76YGCrFlkp2vXlvN8f9tXhL7sbTWs
m0WZ7LsAUv9f7vynps6uHOG8a5KN/9LU041+/h3dFxF1Tds9AMMtHniHB/4b
cOT9Kq+z64Y4iFhqmUBTtPj4O/13Wrv+ABSviFy//UwARnXTrum9O+ab61dn
z54+/fZkNIKA8H8YjSaTSZbPOhBsPxrdrsouI1odQIdZ4eiyaNWYNjN6O+tX
LjBntmmbWeXW2T2xSlnzHz+b9SH2jrN75WDm7mkkBgkaepn2LfOKdy53Vhhn
eVU193h5zdu4jB4v6FazvsmqBoKR4J+Xm5Khz+eEXzoinb7tXLYh5gU6OhI4
DEDVzGjBbUa08Ovgxhk/PiGWvyvnLisLgLIosfyRmy6nY7m/LC+KFoASD25W
xLOZSM3ueJrdEjrmQMd8RSu7miAs67umumPEVmU+o+3W+WaD/Ql3XboNnWLt
8WdwEMbvSj4kSQm6JsLJuqx1AVo1p70Uw0QReUDAF120uCFjPVR9uamiZadK
GOuyKIjzRo+zW96hqZrlFlTiMhLWuLaiIzn/7ub20Vj+zd685Z+vX/753cX1
y3P8fPPj6evX/oeRPnHz49t3r8/DT+HNs7eXly/fnMvL9GmWfDR6dHn6C/0F
J3/09ur24u2b09ePMia8mHhJJwF5Myc0s2kd+CTvRoXr5m05o1/one/Prv7z
P56+yP72t/+lLPL77/rLN0+/fkG/3K9cLbs1Nd2U/Epo3o7ozlwOkgQNZvN8
U/akEunZLutWzX2drVzrCJVf/isw828n2T/M5punL/5RP8CBkw8NZ8mHjLP9
T/ZeFiQe+OjANh6byec7mE7hPf0l+d3wHn34D/9UkbDIJk+/+ad/JPL5oSLS
ylsmQJBnR8Lm6TQ7zb788kap+GZDZLko59lFIMmjm5uL4y+/BOPnyoQxxUIE
5GIcRNKGjJLefeiF1sHHRMsPM800u+ixft30u/xuHKGvdIAXEnw7+XXIK4BA
kvbmgq58Xg1ER7z7wzsRt+0dYUy8zrKu3Nt9mr0h7U5r5n3mPpRd72paDIeq
6YkUAlJq/X1D6iFbQ7YYwET+Tk825KSyeqfrAdC865p5mTMbzFmBdMQeZGIs
wSh4oiNNxdiF2BqIlOlKGVjasttFjqkF0jr0bpuRRBX4YABhRbKKSLiV3Ypu
hRTOfEXorOlk+RrCRi5LMdYZKUR3LSTQMRr/5ckt3TfRUUYalETS1BPTGQto
I6mYks4iStq958MkxZiaE7ZnjIUCh9Ant4wffmpXagZieUVL6fHGAfaX06df
vUjUwo7WGOMaBYde0ZAK20CPkSCLtQGEGp0Lpl4J4oAc+vshLsrFgkQTre1h
9/gMytpweqXUTMr65goYVfLuAuWPs7uGHqV/6PNGhCWfR3QrXTXppGrSl2sw
63pNtzBnkyaiJhAMvQeACZUvBY387kf1HyHkZ7q27nSzGaulAS1c6o/j7Gci
UfoLmeTlh3F2Uy5rMiVcP8dxGTtlZxqzcmoG4KqMtc6Y9Amydb4l6rsjPuqz
yuVdz4+JOCDKxLLKRoQnb1l8BqUGBNNeV0azxCn0QL8VqiS3bMC51nktBwRE
ynEdwxjhjFVfmxclUAywXOUI7QFtRoDRB+HOgk1EKo2RQneA/YEZ9n4gb9uG
jJkiJs5w0mC/haOdP3CwRT6HocLWa2pWJmYM6dRm6KFhCq/qE7PU9D4kF/3N
m1hzWqZnEmXU8U84a+VoE6Eq8ZUAA1mFZoox5fHdh0vtoP1bYarO2I7BdMU0
+9kR85Mc6+VgeXZ+xTRDz7DBCrk724Ku8sWCTsUfQIsBJSAZFkR0srbINuTs
bacwvC6A6mKY4ypHI44SBBR1zr1XzlHqVZORyLMkaUcXVQMgHDjwnQtWsMmB
wGL+9olGyOvOyoUImaKpv+iz93VzT0go56sgsu0NxpKSEHtVAIfI8mxosUdF
trrA1yxIs2W1E3GVd+9ZgZP/AfzmXijJvqBlWoouf9IsJjM6CYtL8n32JfBY
QeM7p7tfkCMEvE29qQEdMI4QuHLVxtQMb1Mf0udHpxX+ob8b954eA3TyjkiV
1nJmWyLPNqTF2WOhGwgoJqBZvfpFv29m8ZLfH7Ml6XlyUruBmLgC3dakkUej
xC2ie3ViYM3cPKfNGf2xrrgXWctWK8staDqP6aPETzngx0BEHtO1szVhu4Go
SJpUdFrF9T62/LWxLCXcN2uHrZjUAaRuBZx+t8TP8LnJ11iuemAxkt0irfnC
Dc22C85J7tPWLJXe3CzzRglHZIQz9+bvnYj0hTpYD3t1Ihrytv6EaResKtMh
fFqRLbpvzHF2+DVbbhGVg8kfQ04y0OzGQ4yJk7XvY5tcU2uarqqFdFNVwELA
C7CZ6+8dcZrXYBBhDCG//Lpp2LYbNuEVgtq8SZV4IBq56RwL7Ug9/rPHUkSj
rgiLrgfSlfROBCOLrG5oI2ohk3SAkCSB0Q7zcpdTeZFNW0JQl39VtNPvd/k8
DgJ4Cag6CuuXIZIYogaEDrLAeVWo72XLtwTS5qsiU2TSNxNYJGSFt9sN5Eik
JFkQ06X0zbypoPqC6W6+fEX4JdzCJyVbnsw1UnZts1YXncwRd0fcLTRptiKs
CRbW2LEhoDaEevjaJEevd9+xh/FnhEJFvGUNENlBY0KL2MORhG8bMLPsA20s
uoIuqACT5Ivetd6MsWiPBVd8JIFECiiMyEuCLCTLV20zLFfhznYNYtFywudd
D17NPbIiZXtj5HoICRxNqRiA+2aosCuBoOh0GgKA//EXIboFthHxjbgQZL0d
hbYiETymIxrxsAs0zIEd8voi4uN7hbxObEU7sOJqKjxL8lORnobSJOjQidNT
OrWKPyewxnbAFUg/e7mgp/ou1gXegAYTLfJWiKx29yJpnATdatcL8u5XDcFl
lKuhjuffPn32++/k7uXtkmQqgTJnb4JWsAsqGpLUpLVJhXWitr0zGRwgcqzv
Yal5WUvE1dJtEUaKfYDJxamarWyTAnr+5ia7uf4J1IYQ09iMDTH+NFbz9TcM
M7M++/1rhPQ9eU+yZQkDJo9BN7eMCd9AyvI7ZANmiSVBdLACD/3UXFxls7wL
YN44TpEQuCSJ2IuB+BZ0HsGAN6Q+++qpDybRL89//30an4qkDVigyDeMxMhC
SaVqOPLzb7DiNPuxuYf1Os5mJIz0RsEwO2hDeHELqJO7ozOpZAJH+XAE66aB
ZHLZMyY42BopxqokJbpuSH66bMd0EPUgBiIbGmW9EptHNzZagcNHxPzyzbtL
PdFXT59+TTgys6MQrqnoKvtcLLeLXhxbnI0jugx6AgGs6hYI6YyJi3JZ9oIT
Wto+feTIEZ/m7SZ/RNdLNvgHdRaYhBC4ID9pKTdK5LshTmMXVUmZ0bfJ5yw5
yAiaN5EfSpeQNfd1dJEKHT3jaCdwx88rIK9381Wt94ywO8QhIfs+b8my3Qwz
klXKGSw4aHPGF/hqRZKUVSsd2EeT4euEUEvszwgdhf092bDaJHWVXsRXdBGe
N/keZ/AaIdEqdo3YoYBBOQ5eG/ZbDPVcMMVEcnl5k5Fg5D9pkC62EE7VkMt7
snQ2IjB+Kq+us6Of2D6QwABxFwwdrHF1c/uGlF9wBpnBLibn09YyKcijbRBh
mtyVm3YCpr4r3b1wH57cuB55vOXg6rKWhzZ3G/ASb03AVmRUFDC/HZnepPnx
L0nRHqmJwP/XL1+/PT3Pjq5d1wwtkcLrRuFl/jMZZyLgq29f/IGAIHpRD9Db
ZE5i0mWnYjPmABfdoNl9dOP64V+BE+NwDxg9R5RC/ykp8Q2Y8zwb2M/WxdkL
sZM5ck/gDnB8AbIBNKFY0RtSN00AROgTQuHOG9rMfqwwJHISH40dVHw8b0gF
dPmd2KUE0XZDQsEYU7lZQJpm78itWxOyYADuwhmR/VG+RuhSPU6VwJOhZnKF
puCQyTEY4A4wwdkmNUy/5kXEYYljxea/iJhEr8LtFdonb1dcwVhjMYbxnClQ
Wm+j3j2RP38aCQvTLa9oqRntNs40ujmOYlne1uzUsNjz/cUj8VFYUoFNNTAx
ioOxyesuyek8zk6R8iYJ1A/wLC8bknhkTNx6a5zOSLYaua9mIMY3jz8BY0Lw
qATAwhrHg6iRGoarMVxPQnMnEUaY3VVwijkRH2BYMwxqm8RpwKyZ4YhCtJ1L
bSXg2hS+kIE8JKsJ7oxyoYJ6VkPJxupem5jcs7yYnCKheQ8njtwDDUMdtt3I
4xDL7hyeFvuB8G84QEhut/oWJMrkasfiY7Hfv3CFBon4EMGTpKU4Xk/UhxqM
7NdB7Ee289gC4EVyHzxlj/KM4MLxINXOr7Kjy6ZuKpDj3CIOxySLQ2A8Z7O3
nLGlngTEYE5DzmRHcWCjW5GUccWTlhiJXdziWIx6Vqe8BJ4V1wCOo7mDqnPX
AR6l5HGgMM5QSLJhW8/JzK75HAIsMWMBC00yAbIdNkjwciCgJeYAhEguoUbN
FKkkh5ZvCWoxvszqpbOHQNicnG0QUvBsJbwHkx+hJjFPvQHQuiWzRjGwybB0
zQZHhu7f4R6+MuLO4i4nUiXhNpogFFAXhGNN/sv91iVH2sy5ZevVYJVIJ7Tz
sAGhaFCXvSFJ+dM+E9iq64ajY3nZ6qqzkvVIdE2RFwdYPo2pDpcn0WjeUQLV
kollJxrypZNzc2ZLFgYV0euejFiykG1uQoeQpg5gzg4Z4Xk2eHyQUuWTIRWC
eKIh8rzN72f5/D3w6BnBG3YoYCqZtKXKCOCSHQZ9pQGFjLTXe8bWZc5R1AUB
p9zLj8Pn9UvSPQ+VXaRH1qYpxXwjPFeQrXdDVYfKB6ZS6Giospy1m6lDCW0R
6ROe1nxlXnYinFjOh4oWYGDK9doV8MKMN/Tq+WoIb2VRsalYMyt4FmQJ8SPZ
9SwSgVoImaO4uqxDmKntIiFBwq3pswdi+wRZywra6AHikdhCfMVEnmArb7eA
5OhSBwhlZzUVWtxC/xZ6lP0cGil2RFSVfojfccqyW6sqEVivxl5LEBir5MBv
bsZeGuQKfhP0KqR3xUvzRWpUaf8kxMErCQdGcgHOVOcQp5tmpxUnh/BCtwdF
60xnj8V4xv2/bm5udz30Pz57xt5u0wYuIAyu8m6VscOG6/vxtjseC/vQ+oiH
2OmJ0GDKHxY0BEhClfEGVZMXmv2Se435eietSOgAtb6q3IdS15NMCNyrONsA
vBEmWFCyikrEJkiizdnEYyoWKYqVv3ecAqZXljVD8CBDBtV8QCJcm8U0bxpQ
T5CvbCq4Ote8u10Vi6proSjPznMOPxGu2mHTf5JvySbdek0An1RTc6tm02Va
xpCYH9DGwqevvGFgTOpv5wpOSlDnFwftCH8/cVIZSxF10cU37Jf03pl9QAtk
L2G10PnBFmxsDmSfsYDzZM8iOeIWMc3ZFOKbqptsLtI48nAKkqziR4bAqSaH
QyUYu7VVFbaSrL2AurWoOJsAW14qpkk5LCKdH1gUyhF9HRyUAsgMUVPxcnmZ
yEwTkWIEqvadIZpph67dx83ZPZ/BHWIjetk6ocQxZ1K8+59SaXaa3eVt6XVU
LzYSXWBIZR60aURtiEVD+hxlR4xwy3amKJOHgpm4IwrO3TzVlqa2e857ctGM
mU1ev3ljpDXeUHwxHzDi8UhZE/FbqACAmVXVIcbARi5yRrUPxon6VeA17RCL
JtjEIvy10q9KNfEe35/v8tenaWcMf7dFhJz+YL4oZGLK3kAtbCjcA06CdaNc
Rbgau4wxkkwG+1AzKgjPtDMLOi+hyMVGHDtoN2FUdmiFiteSaw0yzPIqrQTA
JdygovmKTL77srOQDqFpVW72/A/krZnyRMRJNpWemOVti3oFTt5AP+PY3RoO
eQsf5AkjLFK4EGoCR+Isqbg7/+cLH316/jWiTxxDuTy9PrMKvK84KOXmjdCS
CsTTID7PUieUUHDYwwUp3LrKiQXxRiJzSDiMwqcWr2taHzgpO/WIP5joRliR
qzZriQKEuhZzP0SS0u27PreIglvCqLRDZG/ZJa7GPtYTPCXPrVij6TTDxo41
iErysFwuEWsRn4JfE6kKw3KEXmhcpOqCPl55v16pZNgg1lVIkWxUbkHPblDp
b2z0PYj7kraT8OiIf9dEEyoipdohkHyXxSlFjsWGmgdkgaAPyChJ/SBIk3up
diHKJbLB2aOiIAOATsPcllQHh5Sid2xAdBLNDqoVZWeHMb5XFBHyGvvBCWS/
CtIHhcQYCrdAbhpxnbXHEpMCeXxzkAXgicTTGMqoGgqtBPSJwQMhiBECNzfD
eq3VlHHnx2j0W/Y4+y3+jH67hOfIxuxv2duN0shvo98mkwn+H/732+Gf6dEs
o3e//PI0oAqQmjj+8kv6629YMntK/9LVc0ErJ3i3lsuEeCIS7jRdYtkyjlSi
liP6WxTVs8dYuZP9Dp9bosJxWBRmsOtQHYArRJ4TOP4t+6BQPQMWbhQs+G8l
MQcblkltdM2kaZG08Ppz+veMs4wcoRFHGmIRsmzHbFq6WkK7eZzgJn9WAmCR
Rme7A/zGaVBBpUZDoN44k0k6Dj5NqAzaYt9Q7MWLI/xfST17gPlFdBEo5aWV
LNXuJfh+lYBnRCAHpp1rrVTANKMSle3zx4f34Y4gOJxVXq41z6YBxeLgvYdV
vwKp+jqaTpaPllbSClB+IeltYq6NoDjEZXwkJFr/a/r39DDf81Za0cv1N475
H3mefBkVV0VdBHv1BfISrk0LbDwsAQThqMR/ZgaPmOkb4NY/wIB1wwYaiSlh
t4oV2GAygYXDQZidAM3R2YXl8E3NkYOIPFULzS93MtZke1wSM3TGIwH+b6OL
h3DiwjIrhQR1iwZsfY+B8CkbAQiAq8FSh9BAWPvpH5KT+ycSFASDeyy1CWXF
MXNlzopsQzXdiTLyNff2xHvEogpytiL9Csmdk9lFtLbK78qmtVq5TaUhFjbg
i8lA+jA2+e29aP1nuv7pL4gKuAmnMclirif2sNkIkpkW0lmVS01gsGrXZEnH
NPFBFn5+cGGPJI6zsw18P1HxuRnYVyXdyWZ6stqLfSKLw8t/dW0zRgqfgw3e
GLZAtVqp8bkhEaAhfchCMMzNQxKgpp1mQLbhFgxiJobFJsdaXGnPehPE8yZ5
WOQaBNZNXDh23+kBidjec6p1dyufDZFyAfWJLewoJSh7GqJ1ZErWYrZ0nlOV
m99ulB7ymI2ffpWg2JiK0UJKuomrTNc5gUMCuLD6UIFhgvSYRjlgy3FBR9z3
AKekEcHE5md0H5B1b1mS+11ESUF0cDEcias5kTLbsHec57zn4kUXMhmcJQQs
Q13BaHQfEKAt+4o9JvIQPcBc9tmW5GzmVaxG4BwM8E5cIQ/mmYbJ25CujJTB
XZz+jY7zzb6FUS6i0qFSovmk4rsgdiU+IHx2JnVSY3E2x9msJQdunnPll57E
okYWsfSRCzZf/XlZCnNrxgHPOhcBF0EOifmO1Zm24sx8FlD1e+rYRRvtb4Li
TdPjiJbnc9HM8YlFonAhVWD4Z5Ctb4h84ixMBFGojaucURf75J3PQDDPfSjX
w1qITQSQRmufvaAbHxCQDXsqe9wgqEJ8FPHGs6cP84bWZEtDD/JlAyJFyEL6
oAk5OJzUFA94jSLSshk6rVWEFZ0YIUAMX3+oQImtxGcPw0JCp2k3YuXlpMwm
5+cNIsb40ZGr6EM/XAJMH3abfB3fZ7QN5PcpWsTi1gfvm6spN5Z4g9VpegtI
yw+17h1tqKWkVFI3xrbjLO9hq33Hczg9FMvPl6TulpxCeLiONISfxG+Bi4/K
F7Y+4C6FGMVOfKLvEYtRSR+WaczsY6lsBmTPJTXiCYxDrS0b4ZyekGrpPUES
Gi1NmIEEtBaQHVUOBvrupETiB91i9Se6wJR8MPUm6RESIfNVpJtuLm8gPzkU
MEHeAmfippgMpT6pcNNgq4uBxhEOtAihASt9mX1i/I2I5S1uOoOimJTyF2uT
wjX90gy3wyypb0ac8WAmXnClvoza0IU8prd82G9zuM7SGh6lUg0FN9Lrbv3V
0uxeFnzqFmU3pyFmoUm8JNyM9RB72vcAfN212pRMEv4utcTl0I3G3XUNNF+i
QUS0Qkf0h2KN0F7sivnKYQXQ7t9MDymyV+eM94KqRbKo7KNTcETEuLSUVo/H
2SuNjtLV7LCqmtlRV9n8gHsqprn3ipwE9vzIhmCg7TTn7buloVg/VMfGMTwp
P4fRt6OZo1rmlLiNDc2/Zw3z0VjA1LbYc+Q9DbBDEZfkph69X+EQsv7nfXlT
iFIJhVYehNzIGMokUkFcZv3g/5fuvjULSJIaj5mG3SEYbsT6b0QDuJckcv+j
KnWfF7ULUI01HT1LKeKjwQFtkdqJEfSrT9LE8+nnxAkSClF79AiAIgVDyCc1
Q06Wa49jdmENa/1iUvWuomMkFdgWGOgOdGfMpThOUzVyEP88Z8l8txJMcIFJ
+Shynn3FXCLCIkdnDDT7u/BsCkh9O542OABXnDLEwWcwXHtUPjS1dcsY7bOR
QDbHsVaaSZwNdWrLpVPn3ssBAnmSXSS1YJ1KQxQASzoP5AV12JHtOFkQS064
KEj1puiwD+AqYRX23ZyhvUtwN+biOhW3mm33hUIoJCjn9EQpNDmrGigkXp/T
d9bxYyFCSD7ZOInc8E7IkABfutccfUBa82ptPLvvSBGSdFUgFTf3CYA1KxuY
a7Q1yl3EkIWphH1S+knSIxYSD/5uTEnStbERyuA2goHZkysOOa1kRstaXIqi
JMsOhnRav8en/UHjEMosMjmD3uHCdtftQMjOEVueFWootxwEbzY+9aJtQtyI
GwlagoKjMlEJHVrSgisudxg6SyL0+qp4MR879n1CqBvd6/ciFL/nRa6jQReB
X2PhOBpFv5z8f4kJKpftLKpWhyulOpp95aBTHn2vCWXMxLgSk7rCz3Tu965H
WPAVyY+64AesivTRsTSVcmgMRMJrdnuLhrrTR8d7bezhYqR15z7n3IgMWWHT
0F7mZKaUUuMAvhA+ioAF0CJsqJa2Z3ypifaNRZF+ooBH5/LYI2tggkiHBuBT
shZ6E23orxT45ar2uLmbEC+lKLSBmS/JsBSUg8Bb3wwt0nHB1d+70+dyiL7p
idegrHoRP9ghWLPsOYfK4D4Km01HL6bZxULssS9gxKTVFRW7TvkemuIonX+Y
T8pNDx5dBMk4PaDk5leNhOa2vlUsjmskPut09Ec6ZekmMxIAEnGWk3EqUPha
bOu6kMLICRrWBmkTairofzMALaBkIwqk3YOzIeo8WsWD1XTmJqCk8tXx/nNU
qbehYHQfFb42144tAiMWFWetlmUiWpP9qUHAb0tssiMyj0ejH7lnB1U+sF8f
eu/s3Z+6Y7VxpMeRyK1jbxjZZYnpxcLVpMiUi3jYcKElRL6NrfMsOYSIV+ls
078pdtSZPuhXib1xIw8aAUXq5SSTrmQEv3OVajNQ/SAmhOwX2iC1obuO6tbB
jrhEeSDUrNBmHXPnTU4uMv22v698oH6TbAUK5TbrVbm2qnsOTR7qO0bR+8r5
ZlziplrBuJc2MmziJ6SwHJO0B6ApkiaAqGPlOQTKhDR5gbrih3CWLgtfovGk
7mkSOAiN474TkelZzsvJ9JgyEHz2HXVP/xDXGGpPIrRw7ABLUVxsm1oDwAs+
STGEUttPHINh+iLiQyEHH0DV1pCqEjUTSsK4qwqHTTrnJHeAv0fVxSRRSJ9N
lHj3APJkaMrVWxk70kHwB6zLAJIiGmmz8ANWhGBV/53ltGB8PJRY6ApRHQD2
4vpORQeZyV9Ns7OKyzOkHOBjLARcdCQgcTqYgnKc0HxYBwNBiXyfmTDEBHBA
QHJ9BBSztkksvDJeWWE7M4gvxJWEjb8JAu+LLrV7vyanauPqiei6B44UTuOL
2/w0gd0Dsffij8MTWHAUO1h8jBq9Uba1N1T0REfl1E3HaolxbSAZniRa83Y3
kp7HZkIwLR5n+wnXHV+ZdEE0jOV2u3FJf+0ns7APDRM4FEMhlw5+Arl6HSkO
df++P5y9FeM0VBvbCBb28GD5c45AGjX1Tz7I0uwQ+s3FTho4DKiDSH6bZoRD
GPuEbRodcdAN3CHHaQQ1zcztLtya9GPPsRP0HOYoM/pUcFZ0OhJivdwmplyQ
tP2JYMl79nxPJOgcLEF0bUkMlsuC5McHBjKNRldJmyiXBKVjLpiQXDRryPe/
4mG99b0xN48fJ5NaNY+5S1WPIV9QXiyO2n7IQIiRzxYnYLs5ORdt2XRCQHe5
lCXaKQhIy8X2O04kM7rQ1P9xbcPPncS1mD5oWWhBDXHlhEdzgZWlnAxZMiEe
dljZlYmavS/2RyDiio61Ta5P00mcINlyeEhMO/GbujhpyG6/zN9quLFxWUvR
ZBrkw9oh0HdX5jvHt7JrkLMMrzh0dCtARUMhCrMwl8Yq2HSj6LAqWbTilYNc
RJ+XcU780CbxbQoqJdkXv6eFdddpFnx06kcB6ZQDVnS5d8CjXLY3Ly1jLtY6
Mt5cTryTR9diV3VpMcJFxBdEbpc4GobTkKSMYtt9GMAQwm0s7fX9cZKKJwlh
8USR7a10d2iPnGaCkrkZaAhmgxOn2KsW0JarvLMMPgcFZojIi8McWuxgi8y4
UELjtyIiU7IS09bGlhLqJfEulg0/jCVIgJXmoDxQ6ODdXa1nkKJgVD942DGu
+ID8kItNYhRCGhJyGR2oi9G5JXKZcSA2ueRQILpXFgMDdSj15c4hE+S7DviM
e2+wL+LjrV40Ch37LgUUh16YeJHZUYgBGWPUHQoNrAxGAuUI2CN55PsMUUiu
xchqNgqGkrw8x6EsWWliipe3emarAg1BuN5mKWWHOyU4NyjePTvFInRgrxs4
Sn3mxSvZ2Hk0dyRgkIUo7YJoY/ZZxzitnJryGvgJQSGbeHR+9UWXOPs57Afp
myH7oIsWKmuttgU+pSTesGr3FAqnRuS0YswJV3HPG5s/G8gVY9/Qy2G4j+Im
rIFU/AulYJW4c4Re8GEhGMPHBoBWao1OvbFnFfMsNjdcYgH2lXU9oTIKSXDr
dnEl1rzspF3klmO95IZMLCwJsKw2zKwIT7scyj6/moRIXVj2RJI2VYgfSCjT
+ut7zyOK8rBIcIO07F5KSclErBw3ica7lLW0v3Wf2iMKqMWI81awVuKIbMau
qDg4h4Jaczmw+/QO8kIcm/Kl92MN7ElmS8ZUJF3D3KfVoSvgKAzYZZlxbK0Y
u5V2WoM3tG506jNySFJgliLPTtMaPaB3r05Pp9D5yJrvLNW2sKQjpNkNsivt
6ngzz9+ERNuIZ2eE/tKx7w2VnrSwKuqwut2wqeIvJ0qwIa5+TK0XqmO7ETsp
Z5Y5RG5hVBw9ZWS+vqFa4CnTB9NRhEHxNizBakS5hz8dK6n1jZlqxYivUI1T
6d0JBXP1oQi/0emSRBuGJ0lV/IFMAS5kWEc0xN2OXCKiJadikfkBkFYeMs1+
FAFoExQ/Xk25O90vN/tkR1gzDy3cvRfXRV6a8RdUgbataC9fgP3cm2zot4Og
DrgwAdZorX21PVinKT2mguukOFPp9d6UbigFjco5F02bGvsQ0sjfWKMgWQx+
UykjZXKLKMNSLjz8Zi4RYKVJPXZ0/SpfeKIhbpn0qHPaV1JKUnDNBaHJpv6w
7N15iWUVETrhkBlpsuCEBU8/1wmHUXJ735uKDaTkTGklMtQUekY0mM22fJVx
E3lWDNJJaGDuRwiVIZOlVTN/vMQZui9WmFGdMx3sqlEpuTNEI6okYjr08Vy7
aYArAZs4ISw+3p81ZexBUYBZr2BqVQVHL+SQrnTszzWaUY8lIeKqjQbX5o7Q
ZAG/+HS0knXjd41HEJF7mJOoKkQqcqDt2Q37M3/KFFb3CXC3XM8H7EjXs0F2
ERX0hnF3R1cX15zIssduHL5UgN1hxCyOrm4uj63PkI+R1pyPPwp36VoFmT30
KK4cUw4LcHZSUekkQyfYh42iiulISATjotSx+lIcIUOR2DQNB3zWZrKNTGSU
Pm0bY2qz+PzInmn2kfURkOSEF0HGDjAPqNEm9v5BJOggDFSIyNS71hvErGyw
U5VvfL0g38J9w/WAc9qCPMWogMloCgNw/DdNaObUV6jp9n40UDoDZ6ye+2ZT
lU4qy1u3crW28Q5+wFC815hnhcGw4/uypk4UICPqMsTT3y9qLUVF6dXDiJFo
rx8K76OiSGoxJBpg9mm/yJYjE6NsChuixpOLZXhatU0i6lFh1T1XB1jM2OPm
hieChysHQwTb3EjUWXq/YRJFycbW9R7C8W5UZYduuIyJNZzQDIdYoyr4VG7v
0KCGSKWA0yKqsN+jWTVJTWIaNuH6WA4gcb1zUFU+tK1DQaPakWToygy+fg7d
b8UJk3AP2qhHB8LA2th5Tme1iOwN7m5U83viQ8xc0mr10+aFdLtDYTkgaT3p
8ciZKOAJvij8UGulMIwFChUZreNpX65IRgbpd5/EM3tackDQ7R0cRp7YQ0BU
nbuXb6sguX0OCDqOAJGUQBD2OjQu+uFVP5xfXes8dLVsoNxAkVwKYnOy5Tyg
ReJAwiLmAcvEi24nwS/GFwwbrBVNdeglJad27V9Ih3dFaYWSVX7fWUJXHJDR
SL7fAZql2loR5n5BKNs2Uuhuo77Y9NZ6Aq3L866OzNLT8TBi9MvsYe+/mhF5
ovVNvoIi4slgmSLFESwRc7B5ehaLAoaFiwRtUjYb1FXPeXCEa6HPSgwvKCR2
anV0cdBExi/zV0RJIF7bUeWkuvASwFmKLm4Mj9rHLRosX+aRDZytE0h7jLiy
w6NMmocF81bcQk20iZtn4Y3M08DD+ejSLn2QsPZTRKXIczlYS7fEDxcxu3nF
b/aWfB+QSAjTSKuG05NsvnrXVIaXeF85rOrHW7ChhbkCaSTt0Pd4hFv1lnw8
Rj85h4+H6nAuMhbJCnNw527JGKg4nbZbVZjKS7KG7pxwCHcQ+Z4hT85HkgGQ
Zu9mrSLfiQ1oi2lIm79pIKijnW6iRcuzUmccuUV1gX1m2QrMga9csXQa2bV5
nRxI9r0rad+7p6BNMjchSpi1jkDed6SjhAiLldxa9c1O5iH3Kv4w+6/l84hM
EYXmu6cYfp8p5L8xrtPuoVzEnIpdwvxyadpT4id/TwvRWIcX6gRNWJ9S9LhF
df9SbPzQhb6TfRCm9EFpObn6e9rYIbOB0XdvlnMUSf6ZJIjjtCwjISp5D+Md
uVmqDvfm+y3Yl4pKC2Sab2tRlwe7ykIdj7WZhXYj0HZbFvRx9vbN618sUhLl
SIkrogLzQ61lUTOaRemiwiWdU4IvtsHX0uB6WK+dBjKICtLD+bqoJUDSfzYK
WqpAWbh2f1cbWzzI5zGmVcggsWs/9ulgUprPfm49QKHYNQ+jyMLgqJCN0DRW
fM2+E9qmrZbacRjm5+iIplDR6UkxigOyYPRV9c/8/erOertxwaS4+Jx4abki
ldRq0gGDZa1TcPFAY92R1aOLyW7mvF1j5Kgec2buYqGVzYqlqDpw6Bs4lnM1
hLh/qPD+PlprXYdBWNIIwPPrBo4fQlf5Am8JmlmVd2QjJrdO4m4T4sYGrRLB
RWjyO7M63u3e7V+GRrIDvYMHvvFD+EBvUy/WbbmUDk4Nu0M8FDViDVHi4nNp
eY3NI4ibW/D9gdmEqNfXi0PQs3TiwgJJ23KTS9q4Gl858QCvgkq5iVUYF4fF
J1NYhCfjccWEymM/6y6ppYvnjuA78daIohpBdEH9nnEbQqx8323YWBD5MEPm
JtabwjC1tlFqRCUZHGN9WeZtHluFgwyy6B/W7XqXYZjfztcVCGf7yIJXEZ0X
YqrVNc8etczEwsM7Kpy5NeRGjmUyVlKSCYQkHQx5lCNhRzzB8fzQeJKO4JFa
bJSqEm8jsMOVnMgKfsy42fEB/q72zri1Mxg3yTJW3uWreY01yUApZdawYDYq
LC2ILjgHvuN7cc7IjlWHb51kQ3TuNhLgukwhP9QPQ0uL1+TBQ5OZHUZL+GWI
YHIu+TIe9lKMZwmilxh9w+jQr9HYpaHPgmkNNZ5zkF0oTb7hMC7pSCZXreGJ
aVDbH4PngFUdxzpbUYpSWqM3nhcSJ9dEOLfVvtzpqL1BM20gHukxCuOHHqAl
6X8bOPgqc5o/Oj+L8+WyqFM4OKgxgSIQvurmGKJp9gABxSQ320akGcY6H8n3
q5xfydd+pt9QlRLQ6Wd3FGOyEMo9kjoTYRYVHpFx2a/u8ZUfquz5sNhEEysI
nsg2+q1mR05HMKIdI6kKE0fGEMWiwCwJ3CQA0/gql49M44hu7DjZZFxrEZkN
1XvLv4xJyi6Gbq4TPTi9oSWX3JzKxpdkoaLqRUi21tElB2QlPmuYQImcpM/R
oHFJ3MOdyjWHkPM8fpQB3c9njQ917Icvy+FI/qYto2U8zFETDsC3FNw4FFIm
R1Dkey9Jh9GCW16m30UTN3qDLZDyjYdiWHCp+J9tNud+uMfcT9vxd5Sdvjnd
0wPpVwnDsCTDg5+UWn+cCN8xi9k13LTunUqJHf7tRIjRFf/7EcuTR7+Pfnb6
rS8yK7VJPFGJpklvVzOw8EK1fOia5ugFB697rntwrsDmVoEreXieeE2XP6jg
kqA+YtQiUTSFxNVCCEaz3C/X1r/Wxd+dkqp8/20u/wVyWi7n930AAA==

-->

</rfc>
