<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-interop-mimi-discovery-requirements-03" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="Discovery Requirements">User Discovery Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-interop-mimi-discovery-requirements-03"/>
    <author fullname="Giles Hogben">
      <organization>Google</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>gih@google.com</email>
      </address>
    </author>
    <author fullname="Femi Olumofin">
      <organization>Google</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>fgolu@google.com</email>
      </address>
    </author>
    <author fullname="Jon Peterson">
      <organization>TransUnion</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>jon.peterson@transunion.com</email>
      </address>
    </author>
    <author fullname="Jonathan Rosenberg">
      <organization>Five9</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>jdrosen@jdrosen.net</email>
      </address>
    </author>
    <date year="2025" month="June" day="21"/>
    <area>ART</area>
    <workgroup>More Instant Messaging Interoperability (mimi)</workgroup>
    <keyword>user discovery</keyword>
    <keyword>interoperability</keyword>
    <keyword>messaging</keyword>
    <abstract>
      <?line 58?>

<t>This document defines requirements for the user discovery problem within the More Instant Messaging Interoperability (MIMI) working group. User discovery is essential for interoperability, allowing message senders to locate recipients across diverse platforms using globally unique, cross-service identifiers (e.g., email addresses, phone numbers). The core challenge involves reliably mapping these identifiers to messaging service providers and determining the reachability of a recipient's identifier across multiple providers.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://datatracker.ietf.org/doc/draft-interop-mimi-discovery-requirements/"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-interop-mimi-discovery-requirements/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        mimi Working Group mailing list (<eref target="mailto:mimi@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/mimi/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/mimi/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-mimi/draft-ietf-mimi-user-discovery-reqs/"/>.</t>
    </note>
  </front>
  <middle>
    <?line 63?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>MIMI user discovery enables a message sender to locate messaging service providers on which a particular recipient can be reached. Currently, users often need to ask contacts what service they are on out-of-band or try multiple services, which creates friction. Specifically, discovery helps a user on one messaging service (Alice on Service A) to find another user on a potentially different or the same service (Bob on Service B) without prior knowledge of Bob's provider, and in a provider-neutral manner.</t>
      <t>Discovery is necessary because the identifiers we commonly have for contacts (phone numbers, email addresses, etc.) do not necessarily tell us which messaging service they are using. Someone with the email alice@gmail.com might use iMessage, Signal, or another service entirely. Thus, the core problem is how to take one of these cross-service identifiers and learn the messaging service provider that the user is using and how to communicate with them on that service.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<ol spacing="normal" type="1"><li>
          <t><em>Cross-Service Identifier (CSI)</em>: A globally unique identifier for a user across multiple services (e.g., E.164 phone number, email address).</t>
        </li>
        <li>
          <t><em>Cross-Service Identifier Provider (CSIP)</em>: An entity that issues and manages CSIs (e.g., telecom providers, email providers).</t>
        </li>
        <li>
          <t><em>Messaging Service Provider (MSP)</em>: An entity offering messaging services to end users (e.g., WhatsApp, Signal, iMessage).</t>
        </li>
        <li>
          <t><em>Service Specific Identifier (SSI)</em>: A unique identifier for a user within a single MSP (e.g., a Twitter handle).</t>
        </li>
        <li>
          <t><em>Discovery Provider (DP)</em>: An entity that stores and facilitates the discovery of MSPs for a given CSI. A DP may be operated by an MSP or a third party.</t>
        </li>
        <li>
          <t><em>Verifiable Mapping</em>: A representation of the cryptographic binding of a CSI and the set of MSPs where the CSI is reachable.</t>
        </li>
        <li>
          <t><em>Recipient</em>: A user who possesses a CSI that has been assigned by a CSIP and authorizes verifiable mapping of that CSI to an MSP set.</t>
        </li>
        <li>
          <t><em>Sender</em>: A user who queries a DP to discover the MSPs for a given CSI.</t>
        </li>
      </ol>
    </section>
    <section anchor="user-discovery-problem-statement">
      <name>User Discovery Problem Statement</name>
      <t>User discovery involves two key aspects:</t>
      <ol spacing="normal" type="1"><li>
          <t><em>Authorization</em>: Recipients must be able to authorize verifiable mappings between their CSIs and their chosen MSPs.</t>
        </li>
        <li>
          <t><em>Lookup</em>: Senders must be able to query these mappings to determine where a recipient can be reached.</t>
        </li>
      </ol>
      <t>To authorize verifiable mappings, the recipient must:</t>
      <ul spacing="normal">
        <li>
          <t>Possess a valid, CSIP-issued CSI.</t>
        </li>
        <li>
          <t>Have active accounts with each MSP to be mapped.</t>
        </li>
        <li>
          <t>Associate the CSI with each of those accounts.</t>
        </li>
      </ul>
      <t>Discovered mappings must be verifiable to ensure they are accurate. Crucially, discovery must prioritize user privacy, allowing users to control their discoverability, and it must integrate well with end-to-end encryption and other MIMI protocols.</t>
      <t><strong>Note:</strong> This document focuses on discovering <em>which</em> MSPs a user is on. Retrieving SSIs and cryptographic keys can be a separate, subsequent step.</t>
      <t>The rest of this document describes a series of requirements for the discovery problem.</t>
    </section>
    <section anchor="prior-efforts">
      <name>Prior Efforts</name>
      <t>Discovery services are far from new on the Internet. The whois protocol <xref target="RFC3912"/>, largely focused on mapping domain names to associated services, was one of the earliest discovery services deployed on the Internet. DNS SRV records, specified in <xref target="RFC2782"/>, allow a similar process - given a domain name, a user can discover available services, such as VoIP based on the Session Initiation Protocol (SIP) <xref target="RFC3261"/> <xref target="RFC3263"/>. SRV records were adapted specifically for messaging in <xref target="RFC3861"/>. However, both whois and DNS SRV records rely on domain names as lookup keys, making them unsuitable for identifiers like mobile phone numbers, which don't have inherent domain associations.</t>
      <t>ENUM <xref target="RFC6117"/> addressed this limitation. It used DNS to look up phone numbers by reversing the digits and adding the "e164.arpa" suffix. This allowed delegation of portions of the namespace to telecom providers who owned specific number prefixes. While technically straightforward, public deployment of ENUM was hampered by challenges in establishing authority for prefixes. However, private ENUM <xref target="RFC6116"/> services have become relatively common, facilitating functions like MMS routing within messaging.</t>
      <t>Another attempt was ViPR (Verification Involving PSTN Reachability) <xref target="I-D.rosenberg-dispatch-vipr-overview"/> <xref target="I-D.petithuguenin-vipr-pvp"/>. ViPR utilized a peer-to-peer network based on RELOAD (Resource Location and Discovery) <xref target="RFC6940"/> to operate between enterprises. It addressed the authority problem by authorizing records based on proof of forward routability but faced the same network effects issue as ENUM. ViPR attempted to address incentive problems by focusing on enterprises seeking cost savings by bypassing the phone network. Ultimately, network effects challenges (among other protocol-unrelated issues) prevented widespread deployment.</t>
      <t>Discovery and lookup services are now commonplace on the Internet but are largely scoped within large providers such as Facebook, Twitter, WhatsApp, and others.</t>
      <t>The MIMI discovery service requires a solution that works across providers.</t>
    </section>
    <section anchor="summary-of-requirements">
      <name>Summary of Requirements</name>
      <t>This section provides a summary of the requirements for MIMI user discovery.</t>
      <table>
        <thead>
          <tr>
            <th align="left">#</th>
            <th align="left">Requirement</th>
            <th align="left">Mandatory</th>
            <th align="left">Optional</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left"> </td>
            <td align="left">
              <strong>Recipients</strong></td>
            <td align="left"> </td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">R1</td>
            <td align="left">Only the recipient <bcp14>MUST</bcp14> be able to authorize verifiable mapping of the recipient's CSI to an MSP set</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">R2</td>
            <td align="left">A mapping <bcp14>MUST</bcp14> allow for the inclusion of tags or similar constructs to indicate the recipient's preferences for using each included MSP</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left"> </td>
            <td align="left">
              <strong>Senders</strong></td>
            <td align="left"> </td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">R3</td>
            <td align="left">Senders <bcp14>MUST</bcp14> be able to retrieve all verifiable mappings for a CSI</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">R4</td>
            <td align="left">Senders <bcp14>MUST</bcp14> be able to verify the authenticity of mappings</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left"> </td>
            <td align="left">
              <strong>Discovery Provider</strong></td>
            <td align="left"> </td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">R5</td>
            <td align="left">Discovery <bcp14>MUST</bcp14> support results with zero, one, or multiple mappings</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">R6</td>
            <td align="left">DPs <bcp14>MUST NOT</bcp14> be able to learn both the sender's identity and the recipient's CSI</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">R7</td>
            <td align="left">All data exchanged in the processing of a discovery request <bcp14>MUST</bcp14> be encrypted in transit</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">R8</td>
            <td align="left">DPs <bcp14>SHOULD</bcp14> be protected against enumeration attacks</td>
            <td align="left"> </td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">R9</td>
            <td align="left">DPs <bcp14>MUST</bcp14> provide a way to remove mappings</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">R10</td>
            <td align="left">Only the recipient or the CSIP <bcp14>SHOULD</bcp14> be able to remove mappings</td>
            <td align="left"> </td>
            <td align="left">x</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="recipient-authorization-of-mappings">
      <name>Recipient Authorization of Mappings</name>
      <t><em>R1: Only the recipient <bcp14>MUST</bcp14> be able to authorize verifiable mapping of the recipient's CSI to an MSP set.</em></t>
      <t>This requirement prevents unauthorized mapping and potential impersonation attacks. The integrity of mappings requires the recipient to be the sole party to authorize mappings of the recipient's CSI to the designated MSP set. Allowing any other user besides the recipient to authorize the creation of verifiable mappings could open the recipient to impersonation attacks, where the MSP set will include MSPs where the attacker controls the accounts.</t>
      <t>It is expected that the recipient has active accounts with each MSP in the set and has already linked the CSI with each of those MSP accounts. If a recipient includes MSPs that do not meet these preconditions, the recipient will not be reachable on the incorrect MSPs. While this problem can be resolved if each MSP participates in creating verifiable mappings to confirm the recipient's account exists, mapping creation will be more involved. Hence, this issue is deferred as a post-discovery problem to address.</t>
    </section>
    <section anchor="recipient-preferences-in-mappings">
      <name>Recipient Preferences in Mappings</name>
      <t><em>R2: A mapping <bcp14>MUST</bcp14> allow for the inclusion of tags or similar constructs to indicate the recipient's preferences for using each included MSP.</em></t>
      <t>This requirement allows recipients to guide how senders contact them on different MSPs. For example, a preference tag may be formulated as closed or open-ended strings (e.g., "Business", "Personal", "BasketballFriends", "WhatsApp") or a list (e.g., "Business, WhatsApp"). A recipient might want senders to utilize a specific "Business" mapping for business messaging and a different one for other types of messaging.</t>
      <t>This requirement prioritizes recipient preferences because senders already have flexibility in choosing their MSP (and potentially DP) when initiating requests. Further considerations regarding sender and DP preferences, as well as more complex recipient preferences, are deemed to be implementation issues. See Appendix B: Recipient's Critical User Journeys for some more examples for recipients.</t>
    </section>
    <section anchor="sender-retrieval-of-mappings">
      <name>Sender Retrieval of Mappings</name>
      <t><em>R3: Senders <bcp14>MUST</bcp14> be able to retrieve all verifiable mappings for a CSI.</em></t>
      <t>This requirement ensures senders have complete information for reaching a recipient. When a sender queries for mappings established for a given recipient's CSI, all available verifiable mappings that exist must be returned as a response.</t>
    </section>
    <section anchor="mapping-authenticity-verification">
      <name>Mapping Authenticity Verification</name>
      <t><em>R4: Senders <bcp14>MUST</bcp14> be able to verify the authenticity of mappings.</em></t>
      <t>This requirement enables senders to trust the mapping information. On receipt of the mappings that exist for a recipient's CSI, the sender should have a means to verify the authenticity of the mappings by learning that the recipient authorized that mapping. The verification process may leverage all or parts of the mapping content and may involve network calls to an oracle to help with the verification, provided the oracle query process is consistent with Requirement 6.</t>
    </section>
    <section anchor="support-for-varying-mapping-results">
      <name>Support for Varying Mapping Results</name>
      <t><em>R5: Discovery <bcp14>MUST</bcp14> support results with zero, one, or multiple mappings.</em></t>
      <t>This requirement covers cases where a user has no mappings, has opted out of discovery, or uses multiple MSPs. Regardless of how the verifiable mapping structure is represented (e.g., one CSI to a set of MSPs, or one CSI to one MSP repeated for each MSP), senders must be able to determine the following from a user discovery response for a given CSI:</t>
      <ul spacing="normal">
        <li>
          <t>No mapping exists, e.g., the recipient has not created any mapping.</t>
        </li>
        <li>
          <t>One or more mappings exist, but without listed MSPs, e.g., the recipient has intentionally configured discovery to return no mappings.</t>
        </li>
        <li>
          <t>One mapping exists with one listed MSP.</t>
        </li>
        <li>
          <t>One mapping exists with multiple listed MSPs.</t>
        </li>
        <li>
          <t>Multiple mappings exist, each potentially with a different number of MSPs.</t>
        </li>
      </ul>
      <t>In situations where the recipient who authorized mappings using a CSI, such as an email address, becomes unreachable (e.g., due to the user's death), implementations can rely on the MSPs included in the mapping to resolve non-reachability issues outside user discovery.</t>
    </section>
    <section anchor="protecting-sender-and-recipient-privacy">
      <name>Protecting Sender and Recipient Privacy</name>
      <t><em>R6: DPs <bcp14>MUST NOT</bcp14> be able to learn both the sender's identity and the recipient's CSI.</em></t>
      <t>This requirement prevents the DP from building a complete social graph of users across MSPs. This protects user privacy by limiting the information the DP can gather about relationships between senders and recipients.</t>
      <t>User discovery lookups inherently create a connection point (an edge) on the social graph between the sender and the recipient. To protect the privacy of both parties, the DP must be prevented from learning this connection consisting of the sender's identity and the recipient's CSI/mapping. Specifically, the DP can learn at most one of the following:</t>
      <ol spacing="normal" type="1"><li>
          <t>Identifying information about the sender, such as their source IP address, username, etc.</t>
        </li>
        <li>
          <t>The recipient's CSI and any associated response mappings.</t>
        </li>
      </ol>
      <t>While the DP might be able to infer this edge or connection later if both users communicate through the same MSP, this requirement focuses on preventing the DP from directly learning this during discovery. To understand the importance of this, it's helpful to distinguish between two types of social graphs:</t>
      <ul spacing="normal">
        <li>
          <t>Messaging social graph: Reflects actual communication between users.</t>
        </li>
        <li>
          <t>Discovery social graph: Encompasses all attempted user discovery lookups, which can be significantly larger than the messaging social graph, as it includes searches for users the sender may not ultimately contact.</t>
        </li>
      </ul>
      <t>Protecting user privacy during discovery is crucial because, without it, a sender's entire discovery social graph could be revealed during bulk discovery that requires the lookup of all contacts on the sender's address book, which exposes a much broader range of potential connections than their actual messaging activity. Appendix C Protecting Sender-Recipient Social Graph Edge has some recommendations for implementation.</t>
    </section>
    <section anchor="in-transit-encryption">
      <name>In-Transit Encryption</name>
      <t><em>R7: All data exchanged in the processing of a discovery request <bcp14>MUST</bcp14> be encrypted in transit.</em></t>
      <t>This requirement ensures the confidentiality of discovery requests and responses.</t>
    </section>
    <section anchor="protection-against-enumeration-attacks">
      <name>Protection Against Enumeration Attacks</name>
      <t><em>R8: DPs <bcp14>SHOULD</bcp14> be protected against enumeration attacks.</em></t>
      <t>This requirement ensures there is a security defense against attacks aimed at scraping mapping data. Discovery providers should implement mechanisms to defend against large-scale scraping of mappings from their database, which can be used to compile spam targeting lists.</t>
      <t>One potential implementation approach is to utilize time-bound blind signatures. This method limits the number of user discovery lookups a sender can perform within a given timeframe. Each lookup request must include a unique, unblinded signature that cannot be linked to the sender's identity. To facilitate rate-limiting across different server entities (e.g., DPs and MSPs), this unique signature should be passed along during communication.</t>
    </section>
    <section anchor="mapping-removal">
      <name>Mapping Removal</name>
      <t><em>R9: DPs <bcp14>MUST</bcp14> provide a way to remove mappings.</em></t>
      <t><em>R10: Only the recipient or the CSIP <bcp14>SHOULD</bcp14> be able to remove mappings</em></t>
      <t>These requirements allow recipients to manage their discoverability and remove outdated mappings. Authorization to remove verifiable mappings for a given CSI should be limited to only the recipient who authorized the mapping or the CSIP managing that CSI (for cases where a CSI is no longer assigned to any recipient).</t>
      <t>Recipients can change their minds and decide to make a prior mapping not discoverable; they may want to update mappings or start all over. Thus, a DP should provide a means to remove verifiable mappings. Once removed, a mapping should no longer be returned for senders' requests.</t>
      <t>A recipient that authorized the creation of a verifiable mapping should also be able to authorize its removal from the backend of DPs. Similarly, a CSIP may request the removal of mappings for a CSI that has become unassigned.</t>
      <t>A possible implementation approach is for verifiable mapping authorization to include a bit that the recipient can use to indicate if a mapping is new. When that bit is set, a DP may proactively de-list any existing mapping for that CSI (after asking the user to re-confirm). Note that the CSIP does not need to be aware of or be involved with the de-listing of mappings with such an approach. There are other approaches to ensure mappings are fresh and are not impacted when the same CSI is transferred between two recipients.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Security considerations are addressed throughout the document, particularly in requirements R1, R4, R6, R7, and R8. These requirements focus on preventing unauthorized mapping, ensuring the authenticity of mappings, protecting user privacy, and securing data in transit and at rest.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="RFC3912">
        <front>
          <title>WHOIS Protocol Specification</title>
          <author fullname="L. Daigle" initials="L." surname="Daigle"/>
          <date month="September" year="2004"/>
          <abstract>
            <t>This document updates the specification of the WHOIS protocol, thereby obsoleting RFC 954. The update is intended to remove the material from RFC 954 that does not have to do with the on-the-wire protocol, and is no longer applicable in today's Internet. This document does not attempt to change or update the protocol per se, or document other uses of the protocol that have come into existence since the publication of RFC 954. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3912"/>
        <seriesInfo name="DOI" value="10.17487/RFC3912"/>
      </reference>
      <reference anchor="RFC2782">
        <front>
          <title>A DNS RR for specifying the location of services (DNS SRV)</title>
          <author fullname="A. Gulbrandsen" initials="A." surname="Gulbrandsen"/>
          <author fullname="P. Vixie" initials="P." surname="Vixie"/>
          <author fullname="L. Esibov" initials="L." surname="Esibov"/>
          <date month="February" year="2000"/>
          <abstract>
            <t>This document describes a DNS RR which specifies the location of the server(s) for a specific protocol and domain. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2782"/>
        <seriesInfo name="DOI" value="10.17487/RFC2782"/>
      </reference>
      <reference anchor="RFC3261">
        <front>
          <title>SIP: Session Initiation Protocol</title>
          <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <author fullname="G. Camarillo" initials="G." surname="Camarillo"/>
          <author fullname="A. Johnston" initials="A." surname="Johnston"/>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <author fullname="R. Sparks" initials="R." surname="Sparks"/>
          <author fullname="M. Handley" initials="M." surname="Handley"/>
          <author fullname="E. Schooler" initials="E." surname="Schooler"/>
          <date month="June" year="2002"/>
          <abstract>
            <t>This document describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants. These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3261"/>
        <seriesInfo name="DOI" value="10.17487/RFC3261"/>
      </reference>
      <reference anchor="RFC3263">
        <front>
          <title>Session Initiation Protocol (SIP): Locating SIP Servers</title>
          <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <date month="June" year="2002"/>
          <abstract>
            <t>The Session Initiation Protocol (SIP) uses DNS procedures to allow a client to resolve a SIP Uniform Resource Identifier (URI) into the IP address, port, and transport protocol of the next hop to contact. It also uses DNS to allow a server to send a response to a backup client if the primary client has failed. This document describes those DNS procedures in detail. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3263"/>
        <seriesInfo name="DOI" value="10.17487/RFC3263"/>
      </reference>
      <reference anchor="RFC3861">
        <front>
          <title>Address Resolution for Instant Messaging and Presence</title>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <date month="August" year="2004"/>
          <abstract>
            <t>Presence and instant messaging are defined in RFC 2778. The Common Profiles for Presence and Instant Messaging define two Universal Resource Identifier (URI) schemes: 'im' for INSTANT INBOXes and 'pres' for PRESENTITIES. This document provides guidance for locating the resources associated with URIs that employ these schemes. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3861"/>
        <seriesInfo name="DOI" value="10.17487/RFC3861"/>
      </reference>
      <reference anchor="RFC6117">
        <front>
          <title>IANA Registration of Enumservices: Guide, Template, and IANA Considerations</title>
          <author fullname="B. Hoeneisen" initials="B." surname="Hoeneisen"/>
          <author fullname="A. Mayrhofer" initials="A." surname="Mayrhofer"/>
          <author fullname="J. Livingood" initials="J." surname="Livingood"/>
          <date month="March" year="2011"/>
          <abstract>
            <t>This document specifies a revision of the IANA Registration Guidelines for Enumservices, describes corresponding registration procedures, and provides a guideline for creating Enumservice Specifications. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6117"/>
        <seriesInfo name="DOI" value="10.17487/RFC6117"/>
      </reference>
      <reference anchor="RFC6116">
        <front>
          <title>The E.164 to Uniform Resource Identifiers (URI) Dynamic Delegation Discovery System (DDDS) Application (ENUM)</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <author fullname="L. Conroy" initials="L." surname="Conroy"/>
          <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
          <date month="March" year="2011"/>
          <abstract>
            <t>This document discusses the use of the Domain Name System (DNS) for storage of data associated with E.164 numbers, and for resolving those numbers into URIs that can be used (for example) in telephony call setup. This document also describes how the DNS can be used to identify the services associated with an E.164 number. This document obsoletes RFC 3761. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6116"/>
        <seriesInfo name="DOI" value="10.17487/RFC6116"/>
      </reference>
      <reference anchor="I-D.rosenberg-dispatch-vipr-overview">
        <front>
          <title>Verification Involving PSTN Reachability: Requirements and Architecture Overview</title>
          <author fullname="Jonathan Rosenberg" initials="J." surname="Rosenberg">
            <organization>jdrosen.net</organization>
          </author>
          <author fullname="Cullen Fluffy Jennings" initials="C. F." surname="Jennings">
            <organization>Cisco</organization>
          </author>
          <author fullname="Marc Petit-Huguenin" initials="M." surname="Petit-Huguenin">
            <organization>Stonyfish</organization>
          </author>
          <date day="25" month="October" year="2010"/>
          <abstract>
            <t>The Session Initiation Protocol (SIP) has seen widespread deployment
within individual domains, typically supporting voice and video
communications.  Though it was designed from the outset to support
inter-domain federation over the public Internet, such federation has
not materialized.  The primary reasons for this are the complexities
of inter-domain phone number routing and concerns over security.
This document reviews this problem space, outlines requirements, and
then describes a new model and technique for inter-domain federation
with SIP, called Verification Involving PSTN Reachability (ViPR).
ViPR addresses the problems that have prevented inter-domain
federation over the Internet.  It provides fully distributed inter-
domain routing for phone numbers, authorized mappings from phone
numbers to domains, a new technique for automated VoIP anti-spam, and
privacy of number ownership, all while preserving the trapezoidal
model of SIP.

Legal

This documents and the information contained therein are provided on
an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE
REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE
IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL
WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY
WARRANTY THAT THE USE OF THE INFORMATION THEREIN WILL NOT INFRINGE
ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE.
            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-rosenberg-dispatch-vipr-overview-04"/>
      </reference>
      <reference anchor="I-D.petithuguenin-vipr-pvp">
        <front>
          <title>The Public Switched Telephone Network (PSTN) Validation Protocol (PVP)</title>
          <author fullname="Marc Petit-Huguenin" initials="M." surname="Petit-Huguenin">
            <organization>Unaffiliated</organization>
          </author>
          <author fullname="Jonathan Rosenberg" initials="J." surname="Rosenberg">
            <organization>jdrosen.net</organization>
          </author>
          <author fullname="Cullen Fluffy Jennings" initials="C. F." surname="Jennings">
            <organization>Cisco</organization>
          </author>
          <date day="12" month="March" year="2012"/>
          <abstract>
            <t>   One of the main challenges in inter-domain federation of Session
   Initiation Protocol (SIP) calls is that many domains continue to
   utilize phone numbers, and not email-style SIP URI.  Consequently, a
   mechanism is needed that enables secure mappings from phone numbers
   to domains.  The main technical challenge in doing this securely is
   to verify that the domain in question truly is the "owner" of the
   phone number.  This specification defines the PSTN Validation
   Protocol (PVP), which can be used by a domain to verify this
   ownership by means of a forward routability check in the PSTN.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-petithuguenin-vipr-pvp-04"/>
      </reference>
      <reference anchor="RFC6940">
        <front>
          <title>REsource LOcation And Discovery (RELOAD) Base Protocol</title>
          <author fullname="C. Jennings" initials="C." surname="Jennings"/>
          <author fullname="B. Lowekamp" initials="B." role="editor" surname="Lowekamp"/>
          <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
          <author fullname="S. Baset" initials="S." surname="Baset"/>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <date month="January" year="2014"/>
          <abstract>
            <t>This specification defines REsource LOcation And Discovery (RELOAD), a peer-to-peer (P2P) signaling protocol for use on the Internet. A P2P signaling protocol provides its clients with an abstract storage and messaging service between a set of cooperating peers that form the overlay network. RELOAD is designed to support a P2P Session Initiation Protocol (P2PSIP) network, but can be utilized by other applications with similar requirements by defining new usages that specify the Kinds of data that need to be stored for a particular application. RELOAD defines a security model based on a certificate enrollment service that provides unique identities. NAT traversal is a fundamental service of the protocol. RELOAD also allows access from "client" nodes that do not need to route traffic or store data for others.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6940"/>
        <seriesInfo name="DOI" value="10.17487/RFC6940"/>
      </reference>
      <reference anchor="RFC5222">
        <front>
          <title>LoST: A Location-to-Service Translation Protocol</title>
          <author fullname="T. Hardie" initials="T." surname="Hardie"/>
          <author fullname="A. Newton" initials="A." surname="Newton"/>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <date month="August" year="2008"/>
          <abstract>
            <t>This document describes an XML-based protocol for mapping service identifiers and geodetic or civic location information to service contact URIs. In particular, it can be used to determine the location-appropriate Public Safety Answering Point (PSAP) for emergency services. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5222"/>
        <seriesInfo name="DOI" value="10.17487/RFC5222"/>
      </reference>
      <reference anchor="RFC6376">
        <front>
          <title>DomainKeys Identified Mail (DKIM) Signatures</title>
          <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
          <author fullname="T. Hansen" initials="T." role="editor" surname="Hansen"/>
          <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
          <date month="September" year="2011"/>
          <abstract>
            <t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message. This can be an author's organization, an operational relay, or one of their agents. DKIM separates the question of the identity of the Signer of the message from the purported author of the message. Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key. Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t>
            <t>This memo obsoletes RFC 4871 and RFC 5672. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="76"/>
        <seriesInfo name="RFC" value="6376"/>
        <seriesInfo name="DOI" value="10.17487/RFC6376"/>
      </reference>
      <reference anchor="RFC8616">
        <front>
          <title>Email Authentication for Internationalized Mail</title>
          <author fullname="J. Levine" initials="J." surname="Levine"/>
          <date month="June" year="2019"/>
          <abstract>
            <t>Sender Policy Framework (SPF) (RFC 7208), DomainKeys Identified Mail (DKIM) (RFC 6376), and Domain-based Message Authentication, Reporting, and Conformance (DMARC) (RFC 7489) enable a domain owner to publish email authentication and policy information in the DNS. In internationalized email, domain names can occur both as U-labels and A-labels. This specification updates the SPF, DKIM, and DMARC specifications to clarify which form of internationalized domain names to use in those specifications.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8616"/>
        <seriesInfo name="DOI" value="10.17487/RFC8616"/>
      </reference>
    </references>
    <?line 253?>

<section anchor="architectural-models">
      <name>Architectural Models</name>
      <t>This appendix explores various architectural models for MIMI DP to provide an overview and address practical implementation considerations. The working group observed these requirements are similar among these models and opted to maintain architectural neutrality for the discovery protocol. However, we will outline requirements for the roles of DPs, how they interact with each other, MSPs in a federated model, and how DPs accommodate queries from both MSPs and users.</t>
      <section anchor="centralized-dp-monolithic-service">
        <name>Centralized DP (Monolithic Service)</name>
        <t>A globally accessible, authoritative database (potentially sharded/replicated) stores all authenticated CSI mappings. This monolithic service, implemented across synchronized global nodes, handles all CSI queries from messaging platforms and acts as the single source of truth for mapping data, even if certain mappings may be restricted in specific regions due to geopolitical considerations.</t>
        <section anchor="advantages">
          <name>Advantages</name>
          <ul spacing="normal">
            <li>
              <t>Standardization and uniform control over mapping creation, updates, and data formats.</t>
            </li>
            <li>
              <t>Promotes fair and unbiased CSI mapping discovery.</t>
            </li>
            <li>
              <t>Single source of truth for mapping simplifies data management and ensures consistency.</t>
            </li>
            <li>
              <t>Sharding/replication can address geographical distribution and performance needs.</t>
            </li>
          </ul>
        </section>
        <section anchor="drawbacks">
          <name>Drawbacks</name>
          <ul spacing="normal">
            <li>
              <t>Centralization of sensitive user data raises privacy risks.</t>
            </li>
            <li>
              <t>May conflict with data localization regulations.</t>
            </li>
            <li>
              <t>Single point of failure vulnerability from outages affecting the entire system.</t>
            </li>
            <li>
              <t>Potential difficulty with immediate global updates for rapidly changing mappings.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="hierarchical-dps-discovery-resolvers">
        <name>Hierarchical DPs (Discovery Resolvers)</name>
        <t>A global root Discovery Provider (DP) directs mapping requests to authoritative DPs based on CSI structure (e.g., country codes for E.164 phone numbers) or sharding mechanisms. The root DP, similar to hierarchical DNS, acts as a directory service, holding pointers to authoritative DPs rather than mappings themselves. Alternatives to hierarchical resolution, like the LoST protocol <xref target="RFC5222"/>, or distributed hash tables (DHTs), can achieve similar outcomes.</t>
        <section anchor="advantages-1">
          <name>Advantages</name>
          <ul spacing="normal">
            <li>
              <t>Scalability from distributed load and mapping management across multiple DPs.</t>
            </li>
            <li>
              <t>Flexibility that allows different DPs to specialize in specific CSI ranges for regions.</t>
            </li>
            <li>
              <t>Better alignment with data localization requirements.</t>
            </li>
          </ul>
        </section>
        <section anchor="drawbacks-1">
          <name>Drawbacks</name>
          <ul spacing="normal">
            <li>
              <t>Requires coordination and maintenance of hierarchy.</t>
            </li>
            <li>
              <t>Root DP failure could disrupt the entire system.</t>
            </li>
            <li>
              <t>Potential delays due to additional hops in the discovery process.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="federated-dps-distributed-peer-service">
        <name>Federated DPs (Distributed Peer Service)</name>
        <t>In a federated model, multiple independent DPs collaborate to provide CSI mapping discovery. Each DP holds a subset of mappings and pointers to other DPs, with no central authority dictating mapping locations. Discovering all mappings for a CSI may involve querying multiple DPs. DPs can exchange CSI information or recursively query each other. The specifics of DP federation are determined by business agreements, not technical requirements. A variation of this model involves messaging platforms acting as their own DPs, managing mappings for their users.</t>
        <section anchor="advantages-2">
          <name>Advantages</name>
          <ul spacing="normal">
            <li>
              <t>Decentralization ensures there is no single point of control or failure. The system can continue functioning even if some DPs are unavailable.</t>
            </li>
            <li>
              <t>Mappings can be distributed according to local regulations.</t>
            </li>
          </ul>
        </section>
        <section anchor="drawbacks-2">
          <name>Drawbacks</name>
          <ul spacing="normal">
            <li>
              <t>Discovery process may involve querying multiple DPs, increasing network load.</t>
            </li>
            <li>
              <t>Potential for bias as DPs may prioritize their own mappings, leading to uneven results.</t>
            </li>
            <li>
              <t>Requires robust mechanisms to prevent CSI impersonation and ensure trust between DPs.</t>
            </li>
            <li>
              <t>Pairwise relationships in a federated DP model could create a barrier to entry for smaller MSP/DPs, similar to the trust requirements in the DKIM <xref target="RFC6376"/> and DMARC <xref target="RFC8616"/> ecosystems.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="additional-considerations-on-architectural-models">
        <name>Additional Considerations on Architectural Models</name>
        <section anchor="telephone-number-csis">
          <name>Telephone Number CSIs</name>
          <t>Telephone number portability is complex due to its reliance on real-time queries to proprietary and legacy systems. Overall, the authenticated mappings proposed for MIMI may necessitate additional platform measures to assess mapping freshness and ensure up-to-date reachability responses.</t>
        </section>
        <section anchor="bias-mitigation">
          <name>Bias Mitigation</name>
          <t>Bias occurs when a DP prioritizes mappings to its affiliated MSP without consideration of what is best for end users. Mitigating bias is essential to ensure fair and equitable discovery of authenticated mappings across different services. The working group has decided to defer such mitigation to policies and regulations, excluding it from the discovery protocol.</t>
        </section>
      </section>
    </section>
    <section anchor="recipients-critical-user-journeys">
      <name>Recipient's Critical User Journeys</name>
      <t>Here are some Critical User Journeys (CUJs) that are the most important to discovery recipients.</t>
      <t>In the CUJs below, Bob is the recipient that creates verifiable mappings, and Alice is the sender or user performing discovery:</t>
      <ol spacing="normal" type="1"><li>
          <t>Sender mapping preferences: Bob only wants to be found by Alice and other users on WhatsApp, not his other messaging apps.</t>
        </li>
        <li>
          <t>Same-app preferences: Bob prefers that Alice can find him on the same messaging service that she is using. In other words, Bob does not want cross-app discovery and messaging.</t>
        </li>
        <li>
          <t>No-random mapping preferences: Bob does not want to go through multiple apps to find a message from Alice when discovery returns one of 10 mappings that Bob has established with discovery providers.</t>
        </li>
        <li>
          <t>No-duplication preferences: Bob does not want Alice's messages to be broadcasted to all or a subset of his apps based on the result of discovery.</t>
        </li>
        <li>
          <t>Per-sender preferences: Bob wants to control which app messages from Alice go to and do the same for other users (e.g., Carol's messages may go to a different app than Alice's).</t>
        </li>
        <li>
          <t>Closed group preferences: Bob only wants his soccer parents to discover and contact him on WhatsApp, not his Wire app. That is, a group of senders has the same mapping results based on Bob's preferences.</t>
        </li>
        <li>
          <t>Open-ended group preferences: Bob wants his business contacts to discover and reach him on Wire, not WhatsApp. That is, an open-ended list of senders (i.e., including leads) are provided with a designated mapping.</t>
        </li>
      </ol>
    </section>
    <section anchor="protecting-sender-recipient-social-graph-edge">
      <name>Protecting Sender-Recipient Social Graph Edge</name>
      <t>To protect user privacy, implementations should consider:</t>
      <ol spacing="normal" type="1"><li>
          <t>Sender Identity Protection: This approach focuses on concealing the sender's identity from the Discovery Provider (DP). Techniques like IP blinding (e.g., using a Private Relay) can be employed to achieve this, ensuring the DP only learns the recipient's CSI.</t>
        </li>
        <li>
          <t>Recipient Identity Protection: This approach aims to hide the recipient's CSI from the DP. Methods like Private Information Retrieval (PIR) or Private Set Membership (PSM) allow the sender to perform the lookup without revealing the recipient's information to the DP, effectively limiting the DP's knowledge to the sender's identity.</t>
        </li>
      </ol>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We gratefully acknowledge the valuable feedback and constructive discussions received within the working group, in individual conversations, and during the MIMI interim meetings, as well as IETF 119, 120, and 121.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
