<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.35 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ralston-mimi-terminology-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.3 -->
  <front>
    <title abbrev="MIMI Terminology">MIMI Terminology</title>
    <seriesInfo name="Internet-Draft" value="draft-ralston-mimi-terminology-01"/>
    <author fullname="Travis Ralston">
      <organization>The Matrix.org Foundation C.I.C.</organization>
      <address>
        <email>travisr@matrix.org</email>
      </address>
    </author>
    <date year="2023" month="June" day="09"/>
    <area>Applications and Real-Time</area>
    <workgroup>More Instant Messaging Interoperability</workgroup>
    <keyword>mimi terminology</keyword>
    <keyword>mimi definitions</keyword>
    <keyword>mimi words</keyword>
    <abstract>
      <?line 37?>

<t>This document introduces a set of terminology to use when discussing or describing
concepts within MIMI.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://turt2live.github.io/ietf-mimi-terminology/draft-ralston-mimi-terminology.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ralston-mimi-terminology/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        More Instant Messaging Interoperability Working Group mailing list (<eref target="mailto:mimi@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/mimi/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/mimi/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/turt2live/ietf-mimi-terminology"/>.</t>
    </note>
  </front>
  <middle>
    <?line 42?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The More Instant Messaging Interoperability (MIMI) working group is chartered to
specify the minimal set of mechanisms to make modern instant messaging applications
interoperable. Through prior discussions and upcoming documents, it's become important
to have a shared understanding for what is being discussed specifically.</t>
      <t>This document expands upon MLS's <xref target="I-D.ietf-mls-protocol"/> <xref target="I-D.ietf-mls-architecture"/>
terminology by defining terms specific to MIMI's purpose. Document authors SHOULD prefix
terms from the MLS specification with "MLS" to denote that the term is specifically coming
from the MLS specification. For example, "MLS Group" versus "Group". This document defines
terms which are non-conflicting to help ensure clarity when the MLS prefix is missing, however.</t>
      <t>Documents within the MIMI working group may introduce their own terminology to explain
concepts within their context. Those documents SHOULD NOT override or change the terminology
described in this document or from MLS.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>MIMI defines:</t>
      <t><strong>Messaging Provider</strong> or <strong>Provider</strong>: A service offering instant messaging to <em>users</em>.
Typically a <em>provider</em> will have a <em>server</em> to route <em>events</em> between <em>users</em> (or <em>clients</em>,
specifically).</t>
      <t><strong>User</strong>: A (normally) human operator of a <em>client</em>. <em>Users</em> have a <strong>User ID</strong> to identify
them canonically within the system.</t>
      <t><strong>User Identity</strong>: A mapping of <strong>User ID</strong> to external identifier, such as a phone number.
In some cases, the <em>user identity</em> can be synonymous with the <em>user ID</em>, however the default
assumption if not clarified is that they are different concepts.</t>
      <t><strong>Client</strong>: A user interface for messaging, performing encryption as needed. Presents
<em>chats</em> to the <em>user</em> to interact with. Synonymous with <em>MLS Client</em>. <em>Clients</em> have a
<strong>Client ID</strong> to canonically identify them among a <em>user's</em> other <em>clients</em>. <em>Clients</em>
can additionally be called <strong>Devices</strong> to differentiate them from a named application.</t>
      <t><strong>Chat</strong>: The place where <em>users</em> communicate. This is semantically distinct from an
<em>MLS Group</em>: an <em>MLS Group</em> is responsible for handling <em>client</em> keys while a <em>chat</em> is
simply the user-facing construct for communication, however systems can declare a <em>chat</em>
to be the same as an <em>MLS Group</em> depending on their design. <em>Chats</em> have a <strong>Chat ID</strong> to
canonically identify them within the system. <em>Chats</em> can additionally be called <strong>Rooms</strong>,
<strong>Conversations</strong>, and <strong>Channels</strong>.</t>
      <t>A <em>chat</em> can have any one of many different characterizations/behaviours, called <strong>Chat Types</strong>:</t>
      <ul spacing="normal">
        <li>
          <strong>DM</strong>: A <em>direct message</em> <em>chat</em> between exactly two <em>users</em>. <em>DMs</em> are typically created
when a <em>user</em> searches for another <em>user</em> to message, rather than creating a <em>group chat</em>.
All <em>users</em> in the <em>chat</em> have the same permission capabilities under the <em>access control</em>
semantics. The <em>chat name</em> is that of the opponent <em>user</em> in the <em>DM</em>. <em>DMs</em> are typically
canonical: exactly one <em>chat</em> with the opponent exists at a time.</li>
        <li>
          <strong>Group DM</strong>: A subtype of <em>DMs</em> where there are more than two <em>users</em>. The <em>chat name</em>
consists of the opponent <em>users</em> in the <em>DM</em>. Inherited from <em>DMs</em>, <em>Group DMs</em> are also
canonical: creating a new <em>Group DM</em> with the exact same <em>users</em> ultimately redirects to
the existing <em>chat</em> instead of creating a new one. These may also be called <strong>Ad-hoc Chats</strong>
in some scenarios.</li>
        <li>
          <strong>Group Chat</strong>: A <em>chat</em> which requires an <em>invite</em> to be able to participate, and can have
zero or more <em>users</em>. A <em>user</em>-provided <em>chat name</em> is defined for the <em>chat</em>. Typically,
the creator has <em>admin permissions</em> while other designated <em>users</em> have either <em>admin permissions</em>
or <em>moderator permissions</em>. Most <em>users</em> have default permissions which allow them to send
<em>events</em> to the <em>chat</em>. Unlike <em>(Group) DMs</em>, multiple <em>chats</em> with the same set of <em>users</em>
can exist at the same time, even with the same <em>chat name</em>.</li>
        <li>
          <strong>Public Chat</strong>: A <em>group chat</em> which does not require an <em>invite</em> to participate. Usually
these types of <em>chats</em> are discovered through a directory or website. <em>Chats</em> which require
a request to join, or <em>knock</em>, are considered <em>public chats</em>. Sometimes these will be referred
to as <strong>Public Chatrooms</strong>.</li>
        <li>
          <strong>Auditorium Chat</strong>: Either a <em>group chat</em> or <em>public chat</em> where most <em>users</em> are unable to
send <em>events</em> and cannot be seen as <em>chat members</em> by other <em>users</em>. When an <em>event</em> is sent,
it may appear to be sent by the <em>chat</em> itself rather than the specific <em>user</em> who sent it.
Sometimes these are called <strong>Auditorium Rooms</strong>.</li>
      </ul>
      <t>Depending on the system, a <em>chat's</em> <em>type</em> can be mutable. For example, a <em>user</em> may be permitted
to introduce new <em>users</em> to a <em>group DM</em> to implicitly convert it to a <em>group chat</em>, or they
simply may be unable to implicitly or explicity change the <em>chat type</em>.</t>
      <t><strong>Chat Name</strong>: The title or human-focused textually distinguishing factor for the <em>chat</em>. It
may be automatically generated based on the <em>chat members</em>.</t>
      <t><strong>Chat Avatar</strong>: A picture or graphic associated with the <em>chat</em>, usually in combination with
a <em>chat name</em>. <em>Chat avatars</em> can be automatically generated based on the <em>chat members</em>.</t>
      <t><strong>Chat Member</strong>: A joined <em>user</em> in the <em>chat</em>. Note that this may have implications on the
associated <em>MLS Members</em> in the <em>MLS Group</em> for the <em>user's</em> <em>devices</em>.</t>
      <t><strong>Event</strong>: The container for an encrypted <em>MLS Message</em>, sent over the wire between <em>servers</em>
and <em>clients</em> (through their local <em>servers</em>). <em>Events</em> have an <strong>Event ID</strong> to canonically
identify them at least within the <em>chat</em>.</t>
      <t><strong>Chat Property</strong>: Information stored in the <em>chat</em>, such as the name, topic, avatar, <em>chat members</em>,
etc. This may be in the shape of an <em>event</em>. Note that <em>chat properties</em> are different from
what is needed to construct an <em>MLS Group Context</em>.</t>
      <t><strong>Message</strong>: Synonymous with an <em>MLS Message</em>. <em>Messages</em> have a <strong>Message ID</strong> to canonically
identify them at least within the <em>group</em>. These are essentially what a <em>user</em> would call a
"message", though specifically the unencrypted portion. When encrypted, they are called <em>events</em>.</t>
      <t><strong>Server</strong>: Synonymous with an <em>MLS Delivery Service (DS)</em>. Responsible for routing <em>events</em>
to other <em>servers</em> and local <em>clients</em>. Note that the role of a <em>server</em> can be accomplished
in the same logical place as a <em>client</em> (i.e.: in peer-to-peer environments), however the
default assumption if not clarified is that the <em>client</em> and <em>server</em> are two different
entities.</t>
      <t><strong>Client-Server API</strong>: The interface between a <em>client</em> and <em>server</em>. This may be nothing more
than a function call if the <em>client</em> and <em>server</em> are the same logical entity.</t>
      <t><strong>Server-Server API</strong>: The interface between a <em>server</em> and another <em>server</em>.</t>
      <t><strong>Transport</strong>: The method and format for moving information between entities. For example,
a <em>Client-Server API</em> might describe HTTPS and JSON as its <em>transport</em>. For added clarity,
documents should clarify which API surface they are defining a <em>transport</em> for ("Server-Server
Transport", for example).</t>
      <t><strong>Message Format</strong>: The specific format that <em>clients</em> use within the encrypted body of an
<em>MLS Message</em>. Sometimes this will also be called the <strong>Content Format</strong>.</t>
      <t><strong>Access Control</strong>: The set of algorithms which determine whether an <em>event</em> or <em>MLS Message</em>
is permitted in the <em>chat</em>/<em>group</em>. For instance, this may define whether an <em>MLS Proposal</em>
is accepted or whether the <em>user</em> is able to become a <em>chat member</em>.</t>
      <t><strong>Admin Permissions</strong>: Typically at least the <em>user</em> who created the <em>chat</em>, these permissions
grant the associated <em>users</em> an ability to change the permissions of other <em>users</em> in the <em>chat</em>.
The set of <em>users</em> with these permissions in a <em>chat</em> are called <strong>Admins</strong>. <em>Admin permissions</em>
inherit <em>moderator permissions</em>.</t>
      <t><strong>Moderator Permissions</strong>: These permissions grant the associated <em>users</em> an ability to <em>kick</em>,
<em>ban</em>, or otherwise restrict another <em>user's</em> ability to use the <em>chat</em>. For example, deleting
a spammer's <em>events</em>. The set of <em>users</em> with these permissions in a <em>chat</em> are called <strong>Moderators</strong>.</t>
      <t>Note that with both <em>moderator permissions</em> and <em>admin permissions</em> a system may have finer
granularity, such as a set of <em>users</em> being able to <em>kick</em> but not <em>ban</em>. Documents with these
semantics should clarify this case.</t>
      <t><strong>Invite</strong>: An action taken by a <em>user</em> in a <em>chat</em> to encourage another <em>user</em> to become a
<em>chat member</em> (or joined to the <em>chat</em>). This can be explicit through the <em>server-server API</em>,
or implicit with an <em>invite code</em>.</t>
      <t><strong>Invite Code</strong>: An out-of-band <em>invite</em> for a <em>user</em> to join the <em>chat</em>, such as a text string
shared with the target <em>user</em>. The sharing mechanism can additionally be a URL or QR code.</t>
      <t><strong>Direct Invite</strong>: An invite to a <em>DM</em> or <em>Group DM</em>. These <em>invites</em> might appear in a different
section of the <em>client's</em> UI to denote their semantic difference from a non-<em>DM</em> <em>invite</em>.</t>
      <t><strong>Kick</strong>: An action taken by a <em>user</em> in a <em>chat</em> to remove another <em>user</em>, assuming the sender
has <em>moderator permissions</em>. The affected <em>user</em> can re-join the <em>chat</em> with either another <em>invite</em>
or by simply joining, depending on the <em>chat type</em>.</t>
      <t><strong>Ban</strong>: Similar to <em>kicking</em>, a <em>user</em> is <em>kicked</em> from the room and not allowed to re-join
until <em>unbanned</em> by a <em>moderator</em>. If a <em>user</em> is <em>banned</em>, they are typically not able to
<em>knock</em> to get back into the <em>chat</em> either.</t>
      <t><strong>Knock</strong>: A request from a <em>user</em> (who is not currently a <em>chat member</em>) to participate in the
<em>chat</em>. Upon acceptance, the requesting <em>user</em> may receive an <em>invite</em> or be directly joined to
the <em>chat</em>. Upon rejection, the requesting <em>user</em> can be <em>banned</em> or otherwise declined.</t>
      <t><strong>Status</strong>: Temporarily displayed text or images associated with a <em>user's</em> profile. Instagram
Stories are an example of a <em>user's</em> <em>status</em>.</t>
      <section anchor="diagram-reference">
        <name>Diagram Reference</name>
        <t>In the simplest possible form, interoperable messaging between two end users looks as such:</t>
        <figure anchor="fig-typical-arch">
          <name>Typical, simplified, architecture for interoperability</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="160" width="592" viewBox="0 0 592 160" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
                <path d="M 8,32 L 8,96" fill="none" stroke="black"/>
                <path d="M 48,104 L 48,144" fill="none" stroke="black"/>
                <path d="M 96,32 L 96,96" fill="none" stroke="black"/>
                <path d="M 160,32 L 160,96" fill="none" stroke="black"/>
                <path d="M 264,32 L 264,96" fill="none" stroke="black"/>
                <path d="M 328,32 L 328,96" fill="none" stroke="black"/>
                <path d="M 432,32 L 432,96" fill="none" stroke="black"/>
                <path d="M 496,32 L 496,96" fill="none" stroke="black"/>
                <path d="M 544,104 L 544,144" fill="none" stroke="black"/>
                <path d="M 584,32 L 584,96" fill="none" stroke="black"/>
                <path d="M 8,32 L 96,32" fill="none" stroke="black"/>
                <path d="M 160,32 L 264,32" fill="none" stroke="black"/>
                <path d="M 328,32 L 432,32" fill="none" stroke="black"/>
                <path d="M 496,32 L 584,32" fill="none" stroke="black"/>
                <path d="M 104,64 L 152,64" fill="none" stroke="black"/>
                <path d="M 272,64 L 320,64" fill="none" stroke="black"/>
                <path d="M 440,64 L 488,64" fill="none" stroke="black"/>
                <path d="M 8,96 L 96,96" fill="none" stroke="black"/>
                <path d="M 160,96 L 264,96" fill="none" stroke="black"/>
                <path d="M 328,96 L 432,96" fill="none" stroke="black"/>
                <path d="M 496,96 L 584,96" fill="none" stroke="black"/>
                <path d="M 48,144 L 544,144" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="552,104 540,98.4 540,109.6" fill="black" transform="rotate(270,544,104)"/>
                <polygon class="arrowhead" points="496,64 484,58.4 484,69.6" fill="black" transform="rotate(0,488,64)"/>
                <polygon class="arrowhead" points="448,64 436,58.4 436,69.6" fill="black" transform="rotate(180,440,64)"/>
                <polygon class="arrowhead" points="328,64 316,58.4 316,69.6" fill="black" transform="rotate(0,320,64)"/>
                <polygon class="arrowhead" points="280,64 268,58.4 268,69.6" fill="black" transform="rotate(180,272,64)"/>
                <polygon class="arrowhead" points="160,64 148,58.4 148,69.6" fill="black" transform="rotate(0,152,64)"/>
                <polygon class="arrowhead" points="112,64 100,58.4 100,69.6" fill="black" transform="rotate(180,104,64)"/>
                <polygon class="arrowhead" points="56,104 44,98.4 44,109.6" fill="black" transform="rotate(270,48,104)"/>
                <g class="text">
                  <text x="128" y="52">A</text>
                  <text x="296" y="52">B</text>
                  <text x="464" y="52">C</text>
                  <text x="44" y="68">Client</text>
                  <text x="80" y="68">1</text>
                  <text x="204" y="68">Provider</text>
                  <text x="248" y="68">1</text>
                  <text x="372" y="68">Provider</text>
                  <text x="416" y="68">2</text>
                  <text x="532" y="68">Client</text>
                  <text x="568" y="68">2</text>
                  <text x="296" y="132">D</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
+----------+       +------------+       +------------+       +----------+
|          |   A   |            |   B   |            |   C   |          |
| Client 1 |<----->| Provider 1 |<----->| Provider 2 |<----->| Client 2 |
|          |       |            |       |            |       |          |
+----------+       +------------+       +------------+       +----------+
     ^                                                             ^
     |                              D                              |
     +-------------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
        <t>In this figure, Client 1 is directly connected to Provider 1 over <tt>A</tt>. <tt>A</tt> is a
provider-specific Client-Server API and transport. Similarly, Client 2 is directly
connected to Provider 2 over <tt>C</tt>. <tt>C</tt> is also a provider-specific Client-Server API
and transport.</t>
        <t>Provider 1 and 2 talk to each other with a Server-Server API over a transport. This is <tt>B</tt>
in the figure.</t>
        <t>Clients additionally have an implicit method of communication (<tt>D</tt> in the figure) where
they use a shared Message Format. There is no transport for <tt>D</tt> in this figure: the figure
is denoting that servers/providers are unable to assist with a format conversion due
to the event's content (an MLS message) being encrypted.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Normative References</name>
      <reference anchor="I-D.ietf-mls-protocol">
        <front>
          <title>The Messaging Layer Security (MLS) Protocol</title>
          <author fullname="Richard Barnes" initials="R." surname="Barnes">
            <organization>Cisco</organization>
          </author>
          <author fullname="Benjamin Beurdouche" initials="B." surname="Beurdouche">
            <organization>Inria &amp; Mozilla</organization>
          </author>
          <author fullname="Raphael Robert" initials="R." surname="Robert">
            <organization>Phoenix R&amp;D</organization>
          </author>
          <author fullname="Jon Millican" initials="J." surname="Millican">
            <organization>Meta Platforms</organization>
          </author>
          <author fullname="Emad Omara" initials="E." surname="Omara">
            <organization>Google</organization>
          </author>
          <author fullname="Katriel Cohn-Gordon" initials="K." surname="Cohn-Gordon">
            <organization>University of Oxford</organization>
          </author>
          <date day="27" month="March" year="2023"/>
          <abstract>
            <t>   Messaging applications are increasingly making use of end-to-end
   security mechanisms to ensure that messages are only accessible to
   the communicating endpoints, and not to any servers involved in
   delivering messages.  Establishing keys to provide such protections
   is challenging for group chat settings, in which more than two
   clients need to agree on a key but may not be online at the same
   time.  In this document, we specify a key establishment protocol that
   provides efficient asynchronous group key establishment with forward
   secrecy and post-compromise security for groups in size ranging from
   two to thousands.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-mls-protocol-20"/>
      </reference>
      <reference anchor="I-D.ietf-mls-architecture">
        <front>
          <title>The Messaging Layer Security (MLS) Architecture</title>
          <author fullname="Benjamin Beurdouche" initials="B." surname="Beurdouche">
            <organization>Inria &amp; Mozilla</organization>
          </author>
          <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
            <organization>Mozilla</organization>
          </author>
          <author fullname="Emad Omara" initials="E." surname="Omara">
            <organization>Google</organization>
          </author>
          <author fullname="Srinivas Inguva" initials="S." surname="Inguva">
            <organization>Twitter</organization>
          </author>
          <author fullname="Alan Duric" initials="A." surname="Duric">
            <organization>Wire</organization>
          </author>
          <date day="16" month="December" year="2022"/>
          <abstract>
            <t>   The Messaging Layer Security (MLS) protocol (I-D.ietf-mls-protocol)
   specification has the role of defining a Group Key Agreement
   protocol, including all the cryptographic operations and
   serialization/deserialization functions necessary for scalable and
   secure group messaging.  The MLS protocol is meant to protect against
   eavesdropping, tampering, message forgery, and provide further
   properties such as Forward Secrecy (FS) and Post-Compromise Security
   (PCS) in the case of past or future device compromises.

   This document describes a general secure group messaging
   infrastructure and its security goals.  It provides guidance on
   building a group messaging system and discusses security and privacy
   tradeoffs offered by multiple security mechanisms that are part of
   the MLS protocol (e.g., frequency of public encryption key rotation).

   The document also provides guidance for parts of the infrastructure
   that are not standardized by the MLS Protocol document and left to
   the application or the infrastructure architects to design.

   While the recommendations of this document are not mandatory to
   follow in order to interoperate at the protocol level, they affect
   the overall security guarantees that are achieved by a messaging
   application.  This is especially true in case of active adversaries
   that are able to compromise clients, the delivery service, or the
   authentication service.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-mls-architecture-10"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
