<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-interop-mimi-discovery-requirements-02" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="Discovery Requirements">User Discovery Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-interop-mimi-discovery-requirements-02"/>
    <author fullname="Giles Hogben">
      <organization>Google</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>gih@google.com</email>
      </address>
    </author>
    <author fullname="Femi Olumofin">
      <organization>Google</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>fgolu@google.com</email>
      </address>
    </author>
    <author fullname="Jon Peterson">
      <organization>TransUnion</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>jon.peterson@transunion.com</email>
      </address>
    </author>
    <author fullname="Jonathan Rosenberg">
      <organization>Five9</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>jdrosen@jdrosen.net</email>
      </address>
    </author>
    <date year="2024" month="November" day="28"/>
    <area>ART</area>
    <workgroup>More Instant Messaging Interoperability (mimi)</workgroup>
    <keyword>user discovery</keyword>
    <keyword>interoperability</keyword>
    <keyword>messaging</keyword>
    <abstract>
      <?line 58?>

<t>This document defines requirements for the user discovery problem within the More Instant Messaging Interoperability (MIMI) working group. User discovery is essential for interoperability, allowing message senders to locate recipients across diverse platforms using globally unique, cross-service identifiers (e.g., email addresses, phone numbers). The core challenge involves reliably mapping these identifiers to messaging service providers and determining the reachability of a recipient's identifier across multiple providers.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://datatracker.ietf.org/doc/draft-interop-mimi-discovery-requirements/"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-interop-mimi-discovery-requirements/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        mimi Working Group mailing list (<eref target="mailto:mimi@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/mimi/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/mimi/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/femigolu/user-discovery"/>.</t>
    </note>
  </front>
  <middle>
    <?line 63?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>MIMI user discovery enables a message sender to locate messaging service providers on which a particular recipient can be reached. Currently, users often need to ask contacts what service they are on out-of-band or try multiple services, which creates friction. Specifically, discovery helps a user on one messaging service (Alice on Service A) to find another user on a potentially different or the same service (Bob on Service B) without prior knowledge of Bob's provider, and in a provider-neutral manner.</t>
      <t>Discovery is necessary because the identifiers we commonly have for contacts (phone numbers, email addresses, etc.) do not necessarily tell us which messaging service they are using. Someone with the email alice@gmail.com might use iMessage, Signal, or another service entirely. Thus, the core problem is how to take one of these cross-service identifiers and learn the messaging service provider that the user is using and how to communicate with them on that service.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<ol spacing="normal" type="1"><li>
          <t><em>Cross-Service Identifier (CSI)</em>: A globally unique identifier for a user across multiple services (e.g., E.164 phone number, email address).</t>
        </li>
        <li>
          <t><em>Cross-Service Identifier Provider (CSIP)</em>: An entity that issues and manages CSIs (e.g., telecom providers, email providers).</t>
        </li>
        <li>
          <t><em>Messaging Service Provider (MSP)</em>: An entity offering messaging services to end users (e.g., WhatsApp, Signal, iMessage).</t>
        </li>
        <li>
          <t><em>Service Specific Identifier (SSI)</em>: A unique identifier for a user within a single MSP (e.g., a Twitter handle).</t>
        </li>
        <li>
          <t><em>Discovery Provider (DP)</em>: An entity that stores and facilitates the discovery of MSPs for a given CSI. A DP may be operated by an MSP or a third party.</t>
        </li>
        <li>
          <t><em>Verifiable Mapping</em>: A representation of the cryptographic binding of a CSI and the set of MSPs where the CSI is reachable.</t>
        </li>
        <li>
          <t><em>Recipient</em>: A user who possesses a CSI that has been assigned by a CSIP and authorizes verifiable mapping of that CSI to an MSP set.</t>
        </li>
        <li>
          <t><em>Sender</em>: A user who queries a DP to discover the MSPs for a given CSI.</t>
        </li>
      </ol>
    </section>
    <section anchor="user-discovery-problem-statement">
      <name>User Discovery Problem Statement</name>
      <t>User discovery involves two key aspects:</t>
      <ol spacing="normal" type="1"><li>
          <t><em>Authorization</em>: Recipients must be able to authorize verifiable mappings between their CSIs and their chosen MSPs.</t>
        </li>
        <li>
          <t><em>Lookup</em>: Senders must be able to query these mappings to determine where a recipient can be reached.</t>
        </li>
      </ol>
      <t>To authorize verifiable mappings, the recipient must:</t>
      <ul spacing="normal">
        <li>
          <t>Possess a valid, CSIP-issued CSI.</t>
        </li>
        <li>
          <t>Have active accounts with each MSP to be mapped.</t>
        </li>
        <li>
          <t>Associate the CSI with each of those accounts.</t>
        </li>
      </ul>
      <t>Discovered mappings must be verifiable to ensure they are accurate. Crucially, discovery must prioritize user privacy, allowing users to control their discoverability, and it must integrate well with end-to-end encryption and other MIMI protocols.</t>
      <t><strong>Note:</strong> This document focuses on discovering <em>which</em> MSPs a user is on. Retrieving SSIs and cryptographic keys can be a separate, subsequent step.</t>
      <t>The rest of this document describes a series of requirements for the discovery problem.</t>
    </section>
    <section anchor="prior-efforts">
      <name>Prior Efforts</name>
      <t>Discovery services are far from new on the Internet. The whois protocol <xref target="RFC3912"/>, largely focused on mapping domain names to associated services, was one of the earliest discovery services deployed on the Internet. DNS SRV records, specified in <xref target="RFC2782"/>, allow a similar process - given a domain name, a user can discover available services, such as VoIP based on the Session Initiation Protocol (SIP) <xref target="RFC3261"/> <xref target="RFC3263"/>. SRV records were adapted specifically for messaging in <xref target="RFC3861"/>. However, both whois and DNS SRV records rely on domain names as lookup keys, making them unsuitable for identifiers like mobile phone numbers, which don't have inherent domain associations.</t>
      <t>ENUM <xref target="RFC6117"/> addressed this limitation. It used DNS to look up phone numbers by reversing the digits and adding the "e164.arpa" suffix. This allowed delegation of portions of the namespace to telecom providers who owned specific number prefixes. While technically straightforward, public deployment of ENUM was hampered by challenges in establishing authority for prefixes. However, private ENUM <xref target="RFC6116"/> services have become relatively common, facilitating functions like MMS routing within messaging.</t>
      <t>Another attempt was ViPR (Verification Involving PSTN Reachability) <xref target="I-D.rosenberg-dispatch-vipr-overview"/> <xref target="I-D.petithuguenin-vipr-pvp"/>. ViPR utilized a peer-to-peer network based on RELOAD (Resource Location and Discovery) <xref target="RFC6940"/> to operate between enterprises. It addressed the authority problem by authorizing records based on proof of forward routability but faced the same network effects issue as ENUM. ViPR attempted to address incentive problems by focusing on enterprises seeking cost savings by bypassing the phone network. Ultimately, network effects challenges (among other protocol-unrelated issues) prevented widespread deployment.</t>
      <t>Discovery and lookup services are now commonplace on the Internet but are largely scoped within large providers such as Facebook, Twitter, WhatsApp, and others.</t>
      <t>The MIMI discovery service requires a solution that works across providers.</t>
    </section>
    <section anchor="summary-of-requirements">
      <name>Summary of Requirements</name>
      <t>This section provides a summary of the requirements for MIMI user discovery.</t>
      <table>
        <thead>
          <tr>
            <th align="left">#</th>
            <th align="left">Requirement</th>
            <th align="left">Mandatory</th>
            <th align="left">Optional</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left"> </td>
            <td align="left">
              <strong>Recipients</strong></td>
            <td align="left"> </td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">R1</td>
            <td align="left">Only the recipient <bcp14>MUST</bcp14> be able to authorize verifiable mapping of the recipient's CSI to an MSP set</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">R2</td>
            <td align="left">A mapping <bcp14>MUST</bcp14> allow for the inclusion of tags or similar constructs to indicate the recipient's preferences for using each included MSP</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left"> </td>
            <td align="left">
              <strong>Senders</strong></td>
            <td align="left"> </td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">R3</td>
            <td align="left">Senders <bcp14>MUST</bcp14> be able to retrieve all verifiable mappings for a CSI</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">R4</td>
            <td align="left">Senders <bcp14>MUST</bcp14> be able to verify the authenticity of mappings</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left"> </td>
            <td align="left">
              <strong>Discovery Provider</strong></td>
            <td align="left"> </td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">R5</td>
            <td align="left">Discovery <bcp14>MUST</bcp14> support results with zero, one, or multiple mappings</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">R6</td>
            <td align="left">DPs <bcp14>MUST NOT</bcp14> be able to learn both the sender's identity and the recipient's CSI</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">R7</td>
            <td align="left">All data exchanged in the processing of a discovery request <bcp14>MUST</bcp14> be encrypted in transit</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">R8</td>
            <td align="left">DPs <bcp14>SHOULD</bcp14> be protected against enumeration attacks</td>
            <td align="left"> </td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">R9</td>
            <td align="left">DPs <bcp14>MUST</bcp14> provide a way to remove mappings</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">R10</td>
            <td align="left">Only the recipient or the CSIP <bcp14>SHOULD</bcp14> be able to remove mappings</td>
            <td align="left"> </td>
            <td align="left">x</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="recipient-authorization-of-mappings">
      <name>Recipient Authorization of Mappings</name>
      <t><em>R1: Only the recipient <bcp14>MUST</bcp14> be able to authorize verifiable mapping of the recipient's CSI to an MSP set.</em></t>
      <t>This requirement prevents unauthorized mapping and potential impersonation attacks. The integrity of mappings requires the recipient to be the sole party to authorize mappings of the recipient's CSI to the designated MSP set. Allowing any other user besides the recipient to authorize the creation of verifiable mappings could open the recipient to impersonation attacks, where the MSP set will include MSPs where the attacker controls the accounts.</t>
      <t>It is expected that the recipient has active accounts with each MSP in the set and has already linked the CSI with each of those MSP accounts. If a recipient includes MSPs that do not meet these preconditions, the recipient will not be reachable on the incorrect MSPs. While this problem can be resolved if each MSP participates in creating verifiable mappings to confirm the recipient's account exists, mapping creation will be more involved. Hence, this issue is deferred as a post-discovery problem to address.</t>
    </section>
    <section anchor="recipient-preferences-in-mappings">
      <name>Recipient Preferences in Mappings</name>
      <t><em>R2: A mapping <bcp14>MUST</bcp14> allow for the inclusion of tags or similar constructs to indicate the recipient's preferences for using each included MSP.</em></t>
      <t>This requirement allows recipients to guide how senders contact them on different MSPs. For example, a preference tag may be formulated as closed or open-ended strings (e.g., "Business", "Personal", "BasketballFriends", "WhatsApp") or a list (e.g., "Business, WhatsApp"). A recipient might want senders to utilize a specific "Business" mapping for business messaging and a different one for other types of messaging.</t>
      <t>This requirement prioritizes recipient preferences because senders already have flexibility in choosing their MSP (and potentially DP) when initiating requests. Further considerations regarding sender and DP preferences, as well as more complex recipient preferences, are deemed to be implementation issues. See Appendix B: Recipient's Critical User Journeys for some more examples for recipients.</t>
    </section>
    <section anchor="sender-retrieval-of-mappings">
      <name>Sender Retrieval of Mappings</name>
      <t><em>R3: Senders <bcp14>MUST</bcp14> be able to retrieve all verifiable mappings for a CSI.</em></t>
      <t>This requirement ensures senders have complete information for reaching a recipient. When a sender queries for mappings established for a given recipient's CSI, all available verifiable mappings that exist must be returned as a response.</t>
    </section>
    <section anchor="mapping-authenticity-verification">
      <name>Mapping Authenticity Verification</name>
      <t><em>R4: Senders <bcp14>MUST</bcp14> be able to verify the authenticity of mappings.</em></t>
      <t>This requirement enables senders to trust the mapping information. On receipt of the mappings that exist for a recipient's CSI, the sender should have a means to verify the authenticity of the mappings by learning that the recipient authorized that mapping. The verification process may leverage all or parts of the mapping content and may involve network calls to an oracle to help with the verification, provided the oracle query process is consistent with Requirement 6.</t>
    </section>
    <section anchor="support-for-varying-mapping-results">
      <name>Support for Varying Mapping Results</name>
      <t><em>R5: Discovery <bcp14>MUST</bcp14> support results with zero, one, or multiple mappings.</em></t>
      <t>This requirement covers cases where a user has no mappings, has opted out of discovery, or uses multiple MSPs. Regardless of how the verifiable mapping structure is represented (e.g., one CSI to a set of MSPs, or one CSI to one MSP repeated for each MSP), senders must be able to determine the following from a user discovery response for a given CSI:</t>
      <ul spacing="normal">
        <li>
          <t>No mapping exists, e.g., the recipient has not created any mapping.</t>
        </li>
        <li>
          <t>One or more mappings exist, but without listed MSPs, e.g., the recipient has intentionally configured discovery to return no mappings.</t>
        </li>
        <li>
          <t>One mapping exists with one listed MSP.</t>
        </li>
        <li>
          <t>One mapping exists with multiple listed MSPs.</t>
        </li>
        <li>
          <t>Multiple mappings exist, each potentially with a different number of MSPs.</t>
        </li>
      </ul>
      <t>In situations where the recipient who authorized mappings using a CSI, such as an email address, becomes unreachable (e.g., due to the user's death), implementations can rely on the MSPs included in the mapping to resolve non-reachability issues outside user discovery.</t>
    </section>
    <section anchor="protecting-sender-and-recipient-privacy">
      <name>Protecting Sender and Recipient Privacy</name>
      <t><em>R6: DPs <bcp14>MUST NOT</bcp14> be able to learn both the sender's identity and the recipient's CSI.</em></t>
      <t>This requirement prevents the DP from building a complete social graph of users across MSPs. This protects user privacy by limiting the information the DP can gather about relationships between senders and recipients.</t>
      <t>User discovery lookups inherently create a connection point (an edge) on the social graph between the sender and the recipient. To protect the privacy of both parties, the DP must be prevented from learning this connection consisting of the sender's identity and the recipient's CSI/mapping. Specifically, the DP can learn at most one of the following:</t>
      <ol spacing="normal" type="1"><li>
          <t>Identifying information about the sender, such as their source IP address, username, etc.</t>
        </li>
        <li>
          <t>The recipient's CSI and any associated response mappings.</t>
        </li>
      </ol>
      <t>While the DP might be able to infer this edge or connection later if both users communicate through the same MSP, this requirement focuses on preventing the DP from directly learning this during discovery. To understand the importance of this, it's helpful to distinguish between two types of social graphs:</t>
      <ul spacing="normal">
        <li>
          <t>Messaging social graph: Reflects actual communication between users.</t>
        </li>
        <li>
          <t>Discovery social graph: Encompasses all attempted user discovery lookups, which can be significantly larger than the messaging social graph, as it includes searches for users the sender may not ultimately contact.</t>
        </li>
      </ul>
      <t>Protecting user privacy during discovery is crucial because, without it, a sender's entire discovery social graph could be revealed during bulk discovery that requires the lookup of all contacts on the sender's address book, which exposes a much broader range of potential connections than their actual messaging activity. Appendix C Protecting Sender-Recipient Social Graph Edge has some recommendations for implementation.</t>
    </section>
    <section anchor="in-transit-encryption">
      <name>In-Transit Encryption</name>
      <t><em>R7: All data exchanged in the processing of a discovery request <bcp14>MUST</bcp14> be encrypted in transit.</em></t>
      <t>This requirement ensures the confidentiality of discovery requests and responses.</t>
    </section>
    <section anchor="protection-against-enumeration-attacks">
      <name>Protection Against Enumeration Attacks</name>
      <t><em>R8: DPs <bcp14>SHOULD</bcp14> be protected against enumeration attacks.</em></t>
      <t>This requirement ensures there is a security defense against attacks aimed at scraping mapping data. Discovery providers should implement mechanisms to defend against large-scale scraping of mappings from their database, which can be used to compile spam targeting lists.</t>
      <t>One potential implementation approach is to utilize time-bound blind signatures. This method limits the number of user discovery lookups a sender can perform within a given timeframe. Each lookup request must include a unique, unblinded signature that cannot be linked to the sender's identity. To facilitate rate-limiting across different server entities (e.g., DPs and MSPs), this unique signature should be passed along during communication.</t>
    </section>
    <section anchor="mapping-removal">
      <name>Mapping Removal</name>
      <t><em>R9: DPs <bcp14>MUST</bcp14> provide a way to remove mappings.</em></t>
      <t><em>R10: Only the recipient or the CSIP <bcp14>SHOULD</bcp14> be able to remove mappings</em></t>
      <t>These requirements allow recipients to manage their discoverability and remove outdated mappings. Authorization to remove verifiable mappings for a given CSI should be limited to only the recipient who authorized the mapping or the CSIP managing that CSI (for cases where a CSI is no longer assigned to any recipient).</t>
      <t>Recipients can change their minds and decide to make a prior mapping not discoverable; they may want to update mappings or start all over. Thus, a DP should provide a means to remove verifiable mappings. Once removed, a mapping should no longer be returned for senders' requests.</t>
      <t>A recipient that authorized the creation of a verifiable mapping should also be able to authorize its removal from the backend of DPs. Similarly, a CSIP may request the removal of mappings for a CSI that has become unassigned.</t>
      <t>A possible implementation approach is for verifiable mapping authorization to include a bit that the recipient can use to indicate if a mapping is new. When that bit is set, a DP may proactively de-list any existing mapping for that CSI (after asking the user to re-confirm). Note that the CSIP does not need to be aware of or be involved with the de-listing of mappings with such an approach. There are other approaches to ensure mappings are fresh and are not impacted when the same CSI is transferred between two recipients.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Security considerations are addressed throughout the document, particularly in requirements R1, R4, R6, R7, and R8. These requirements focus on preventing unauthorized mapping, ensuring the authenticity of mappings, protecting user privacy, and securing data in transit and at rest.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="RFC3912">
        <front>
          <title>WHOIS Protocol Specification</title>
          <author fullname="L. Daigle" initials="L." surname="Daigle"/>
          <date month="September" year="2004"/>
          <abstract>
            <t>This document updates the specification of the WHOIS protocol, thereby obsoleting RFC 954. The update is intended to remove the material from RFC 954 that does not have to do with the on-the-wire protocol, and is no longer applicable in today's Internet. This document does not attempt to change or update the protocol per se, or document other uses of the protocol that have come into existence since the publication of RFC 954. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3912"/>
        <seriesInfo name="DOI" value="10.17487/RFC3912"/>
      </reference>
      <reference anchor="RFC2782">
        <front>
          <title>A DNS RR for specifying the location of services (DNS SRV)</title>
          <author fullname="A. Gulbrandsen" initials="A." surname="Gulbrandsen"/>
          <author fullname="P. Vixie" initials="P." surname="Vixie"/>
          <author fullname="L. Esibov" initials="L." surname="Esibov"/>
          <date month="February" year="2000"/>
          <abstract>
            <t>This document describes a DNS RR which specifies the location of the server(s) for a specific protocol and domain. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2782"/>
        <seriesInfo name="DOI" value="10.17487/RFC2782"/>
      </reference>
      <reference anchor="RFC3261">
        <front>
          <title>SIP: Session Initiation Protocol</title>
          <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <author fullname="G. Camarillo" initials="G." surname="Camarillo"/>
          <author fullname="A. Johnston" initials="A." surname="Johnston"/>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <author fullname="R. Sparks" initials="R." surname="Sparks"/>
          <author fullname="M. Handley" initials="M." surname="Handley"/>
          <author fullname="E. Schooler" initials="E." surname="Schooler"/>
          <date month="June" year="2002"/>
          <abstract>
            <t>This document describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants. These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3261"/>
        <seriesInfo name="DOI" value="10.17487/RFC3261"/>
      </reference>
      <reference anchor="RFC3263">
        <front>
          <title>Session Initiation Protocol (SIP): Locating SIP Servers</title>
          <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <date month="June" year="2002"/>
          <abstract>
            <t>The Session Initiation Protocol (SIP) uses DNS procedures to allow a client to resolve a SIP Uniform Resource Identifier (URI) into the IP address, port, and transport protocol of the next hop to contact. It also uses DNS to allow a server to send a response to a backup client if the primary client has failed. This document describes those DNS procedures in detail. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3263"/>
        <seriesInfo name="DOI" value="10.17487/RFC3263"/>
      </reference>
      <reference anchor="RFC3861">
        <front>
          <title>Address Resolution for Instant Messaging and Presence</title>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <date month="August" year="2004"/>
          <abstract>
            <t>Presence and instant messaging are defined in RFC 2778. The Common Profiles for Presence and Instant Messaging define two Universal Resource Identifier (URI) schemes: 'im' for INSTANT INBOXes and 'pres' for PRESENTITIES. This document provides guidance for locating the resources associated with URIs that employ these schemes. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3861"/>
        <seriesInfo name="DOI" value="10.17487/RFC3861"/>
      </reference>
      <reference anchor="RFC6117">
        <front>
          <title>IANA Registration of Enumservices: Guide, Template, and IANA Considerations</title>
          <author fullname="B. Hoeneisen" initials="B." surname="Hoeneisen"/>
          <author fullname="A. Mayrhofer" initials="A." surname="Mayrhofer"/>
          <author fullname="J. Livingood" initials="J." surname="Livingood"/>
          <date month="March" year="2011"/>
          <abstract>
            <t>This document specifies a revision of the IANA Registration Guidelines for Enumservices, describes corresponding registration procedures, and provides a guideline for creating Enumservice Specifications. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6117"/>
        <seriesInfo name="DOI" value="10.17487/RFC6117"/>
      </reference>
      <reference anchor="RFC6116">
        <front>
          <title>The E.164 to Uniform Resource Identifiers (URI) Dynamic Delegation Discovery System (DDDS) Application (ENUM)</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <author fullname="L. Conroy" initials="L." surname="Conroy"/>
          <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
          <date month="March" year="2011"/>
          <abstract>
            <t>This document discusses the use of the Domain Name System (DNS) for storage of data associated with E.164 numbers, and for resolving those numbers into URIs that can be used (for example) in telephony call setup. This document also describes how the DNS can be used to identify the services associated with an E.164 number. This document obsoletes RFC 3761. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6116"/>
        <seriesInfo name="DOI" value="10.17487/RFC6116"/>
      </reference>
      <reference anchor="I-D.rosenberg-dispatch-vipr-overview">
        <front>
          <title>Verification Involving PSTN Reachability: Requirements and Architecture Overview</title>
          <author fullname="Jonathan Rosenberg" initials="J." surname="Rosenberg">
            <organization>jdrosen.net</organization>
          </author>
          <author fullname="Cullen Fluffy Jennings" initials="C. F." surname="Jennings">
            <organization>Cisco</organization>
          </author>
          <author fullname="Marc Petit-Huguenin" initials="M." surname="Petit-Huguenin">
            <organization>Stonyfish</organization>
          </author>
          <date day="25" month="October" year="2010"/>
          <abstract>
            <t>The Session Initiation Protocol (SIP) has seen widespread deployment
within individual domains, typically supporting voice and video
communications.  Though it was designed from the outset to support
inter-domain federation over the public Internet, such federation has
not materialized.  The primary reasons for this are the complexities
of inter-domain phone number routing and concerns over security.
This document reviews this problem space, outlines requirements, and
then describes a new model and technique for inter-domain federation
with SIP, called Verification Involving PSTN Reachability (ViPR).
ViPR addresses the problems that have prevented inter-domain
federation over the Internet.  It provides fully distributed inter-
domain routing for phone numbers, authorized mappings from phone
numbers to domains, a new technique for automated VoIP anti-spam, and
privacy of number ownership, all while preserving the trapezoidal
model of SIP.

Legal

This documents and the information contained therein are provided on
an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE
REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE
IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL
WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY
WARRANTY THAT THE USE OF THE INFORMATION THEREIN WILL NOT INFRINGE
ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE.
            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-rosenberg-dispatch-vipr-overview-04"/>
      </reference>
      <reference anchor="I-D.petithuguenin-vipr-pvp">
        <front>
          <title>The Public Switched Telephone Network (PSTN) Validation Protocol (PVP)</title>
          <author fullname="Marc Petit-Huguenin" initials="M." surname="Petit-Huguenin">
            <organization>Unaffiliated</organization>
          </author>
          <author fullname="Jonathan Rosenberg" initials="J." surname="Rosenberg">
            <organization>jdrosen.net</organization>
          </author>
          <author fullname="Cullen Fluffy Jennings" initials="C. F." surname="Jennings">
            <organization>Cisco</organization>
          </author>
          <date day="12" month="March" year="2012"/>
          <abstract>
            <t>   One of the main challenges in inter-domain federation of Session
   Initiation Protocol (SIP) calls is that many domains continue to
   utilize phone numbers, and not email-style SIP URI.  Consequently, a
   mechanism is needed that enables secure mappings from phone numbers
   to domains.  The main technical challenge in doing this securely is
   to verify that the domain in question truly is the "owner" of the
   phone number.  This specification defines the PSTN Validation
   Protocol (PVP), which can be used by a domain to verify this
   ownership by means of a forward routability check in the PSTN.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-petithuguenin-vipr-pvp-04"/>
      </reference>
      <reference anchor="RFC6940">
        <front>
          <title>REsource LOcation And Discovery (RELOAD) Base Protocol</title>
          <author fullname="C. Jennings" initials="C." surname="Jennings"/>
          <author fullname="B. Lowekamp" initials="B." role="editor" surname="Lowekamp"/>
          <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
          <author fullname="S. Baset" initials="S." surname="Baset"/>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <date month="January" year="2014"/>
          <abstract>
            <t>This specification defines REsource LOcation And Discovery (RELOAD), a peer-to-peer (P2P) signaling protocol for use on the Internet. A P2P signaling protocol provides its clients with an abstract storage and messaging service between a set of cooperating peers that form the overlay network. RELOAD is designed to support a P2P Session Initiation Protocol (P2PSIP) network, but can be utilized by other applications with similar requirements by defining new usages that specify the Kinds of data that need to be stored for a particular application. RELOAD defines a security model based on a certificate enrollment service that provides unique identities. NAT traversal is a fundamental service of the protocol. RELOAD also allows access from "client" nodes that do not need to route traffic or store data for others.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6940"/>
        <seriesInfo name="DOI" value="10.17487/RFC6940"/>
      </reference>
      <reference anchor="RFC5222">
        <front>
          <title>LoST: A Location-to-Service Translation Protocol</title>
          <author fullname="T. Hardie" initials="T." surname="Hardie"/>
          <author fullname="A. Newton" initials="A." surname="Newton"/>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <date month="August" year="2008"/>
          <abstract>
            <t>This document describes an XML-based protocol for mapping service identifiers and geodetic or civic location information to service contact URIs. In particular, it can be used to determine the location-appropriate Public Safety Answering Point (PSAP) for emergency services. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5222"/>
        <seriesInfo name="DOI" value="10.17487/RFC5222"/>
      </reference>
      <reference anchor="RFC6376">
        <front>
          <title>DomainKeys Identified Mail (DKIM) Signatures</title>
          <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
          <author fullname="T. Hansen" initials="T." role="editor" surname="Hansen"/>
          <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
          <date month="September" year="2011"/>
          <abstract>
            <t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message. This can be an author's organization, an operational relay, or one of their agents. DKIM separates the question of the identity of the Signer of the message from the purported author of the message. Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key. Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t>
            <t>This memo obsoletes RFC 4871 and RFC 5672. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="76"/>
        <seriesInfo name="RFC" value="6376"/>
        <seriesInfo name="DOI" value="10.17487/RFC6376"/>
      </reference>
      <reference anchor="RFC8616">
        <front>
          <title>Email Authentication for Internationalized Mail</title>
          <author fullname="J. Levine" initials="J." surname="Levine"/>
          <date month="June" year="2019"/>
          <abstract>
            <t>Sender Policy Framework (SPF) (RFC 7208), DomainKeys Identified Mail (DKIM) (RFC 6376), and Domain-based Message Authentication, Reporting, and Conformance (DMARC) (RFC 7489) enable a domain owner to publish email authentication and policy information in the DNS. In internationalized email, domain names can occur both as U-labels and A-labels. This specification updates the SPF, DKIM, and DMARC specifications to clarify which form of internationalized domain names to use in those specifications.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8616"/>
        <seriesInfo name="DOI" value="10.17487/RFC8616"/>
      </reference>
    </references>
    <?line 253?>

<section anchor="architectural-models">
      <name>Architectural Models</name>
      <t>This appendix explores various architectural models for MIMI DP to provide an overview and address practical implementation considerations. The working group observed these requirements are similar among these models and opted to maintain architectural neutrality for the discovery protocol. However, we will outline requirements for the roles of DPs, how they interact with each other, MSPs in a federated model, and how DPs accommodate queries from both MSPs and users.</t>
      <section anchor="centralized-dp-monolithic-service">
        <name>Centralized DP (Monolithic Service)</name>
        <t>A globally accessible, authoritative database (potentially sharded/replicated) stores all authenticated CSI mappings. This monolithic service, implemented across synchronized global nodes, handles all CSI queries from messaging platforms and acts as the single source of truth for mapping data, even if certain mappings may be restricted in specific regions due to geopolitical considerations.</t>
        <section anchor="advantages">
          <name>Advantages</name>
          <ul spacing="normal">
            <li>
              <t>Standardization and uniform control over mapping creation, updates, and data formats.</t>
            </li>
            <li>
              <t>Promotes fair and unbiased CSI mapping discovery.</t>
            </li>
            <li>
              <t>Single source of truth for mapping simplifies data management and ensures consistency.</t>
            </li>
            <li>
              <t>Sharding/replication can address geographical distribution and performance needs.</t>
            </li>
          </ul>
        </section>
        <section anchor="drawbacks">
          <name>Drawbacks</name>
          <ul spacing="normal">
            <li>
              <t>Centralization of sensitive user data raises privacy risks.</t>
            </li>
            <li>
              <t>May conflict with data localization regulations.</t>
            </li>
            <li>
              <t>Single point of failure vulnerability from outages affecting the entire system.</t>
            </li>
            <li>
              <t>Potential difficulty with immediate global updates for rapidly changing mappings.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="hierarchical-dps-discovery-resolvers">
        <name>Hierarchical DPs (Discovery Resolvers)</name>
        <t>A global root Discovery Provider (DP) directs mapping requests to authoritative DPs based on CSI structure (e.g., country codes for E.164 phone numbers) or sharding mechanisms. The root DP, similar to hierarchical DNS, acts as a directory service, holding pointers to authoritative DPs rather than mappings themselves. Alternatives to hierarchical resolution, like the LoST protocol <xref target="RFC5222"/>, or distributed hash tables (DHTs), can achieve similar outcomes.</t>
        <section anchor="advantages-1">
          <name>Advantages</name>
          <ul spacing="normal">
            <li>
              <t>Scalability from distributed load and mapping management across multiple DPs.</t>
            </li>
            <li>
              <t>Flexibility that allows different DPs to specialize in specific CSI ranges for regions.</t>
            </li>
            <li>
              <t>Better alignment with data localization requirements.</t>
            </li>
          </ul>
        </section>
        <section anchor="drawbacks-1">
          <name>Drawbacks</name>
          <ul spacing="normal">
            <li>
              <t>Requires coordination and maintenance of hierarchy.</t>
            </li>
            <li>
              <t>Root DP failure could disrupt the entire system.</t>
            </li>
            <li>
              <t>Potential delays due to additional hops in the discovery process.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="federated-dps-distributed-peer-service">
        <name>Federated DPs (Distributed Peer Service)</name>
        <t>In a federated model, multiple independent DPs collaborate to provide CSI mapping discovery. Each DP holds a subset of mappings and pointers to other DPs, with no central authority dictating mapping locations. Discovering all mappings for a CSI may involve querying multiple DPs. DPs can exchange CSI information or recursively query each other. The specifics of DP federation are determined by business agreements, not technical requirements. A variation of this model involves messaging platforms acting as their own DPs, managing mappings for their users.</t>
        <section anchor="advantages-2">
          <name>Advantages</name>
          <ul spacing="normal">
            <li>
              <t>Decentralization ensures there is no single point of control or failure. The system can continue functioning even if some DPs are unavailable.</t>
            </li>
            <li>
              <t>Mappings can be distributed according to local regulations.</t>
            </li>
          </ul>
        </section>
        <section anchor="drawbacks-2">
          <name>Drawbacks</name>
          <ul spacing="normal">
            <li>
              <t>Discovery process may involve querying multiple DPs, increasing network load.</t>
            </li>
            <li>
              <t>Potential for bias as DPs may prioritize their own mappings, leading to uneven results.</t>
            </li>
            <li>
              <t>Requires robust mechanisms to prevent CSI impersonation and ensure trust between DPs.</t>
            </li>
            <li>
              <t>Pairwise relationships in a federated DP model could create a barrier to entry for smaller MSP/DPs, similar to the trust requirements in the DKIM <xref target="RFC6376"/> and DMARC <xref target="RFC8616"/> ecosystems.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="additional-considerations-on-architectural-models">
        <name>Additional Considerations on Architectural Models</name>
        <section anchor="telephone-number-csis">
          <name>Telephone Number CSIs</name>
          <t>Telephone number portability is complex due to its reliance on real-time queries to proprietary and legacy systems. Overall, the authenticated mappings proposed for MIMI may necessitate additional platform measures to assess mapping freshness and ensure up-to-date reachability responses.</t>
        </section>
        <section anchor="bias-mitigation">
          <name>Bias Mitigation</name>
          <t>Bias occurs when a DP prioritizes mappings to its affiliated MSP without consideration of what is best for end users. Mitigating bias is essential to ensure fair and equitable discovery of authenticated mappings across different services. The working group has decided to defer such mitigation to policies and regulations, excluding it from the discovery protocol.</t>
        </section>
      </section>
    </section>
    <section anchor="recipients-critical-user-journeys">
      <name>Recipient's Critical User Journeys</name>
      <t>Here are some Critical User Journeys (CUJs) that are the most important to discovery recipients.</t>
      <t>In the CUJs below, Bob is the recipient that creates verifiable mappings, and Alice is the sender or user performing discovery:</t>
      <ol spacing="normal" type="1"><li>
          <t>Sender mapping preferences: Bob only wants to be found by Alice and other users on WhatsApp, not his other messaging apps.</t>
        </li>
        <li>
          <t>Same-app preferences: Bob prefers that Alice can find him on the same messaging service that she is using. In other words, Bob does not want cross-app discovery and messaging.</t>
        </li>
        <li>
          <t>No-random mapping preferences: Bob does not want to go through multiple apps to find a message from Alice when discovery returns one of 10 mappings that Bob has established with discovery providers.</t>
        </li>
        <li>
          <t>No-duplication preferences: Bob does not want Alice's messages to be broadcasted to all or a subset of his apps based on the result of discovery.</t>
        </li>
        <li>
          <t>Per-sender preferences: Bob wants to control which app messages from Alice go to and do the same for other users (e.g., Carol's messages may go to a different app than Alice's).</t>
        </li>
        <li>
          <t>Closed group preferences: Bob only wants his soccer parents to discover and contact him on WhatsApp, not his Wire app. That is, a group of senders has the same mapping results based on Bob's preferences.</t>
        </li>
        <li>
          <t>Open-ended group preferences: Bob wants his business contacts to discover and reach him on Wire, not WhatsApp. That is, an open-ended list of senders (i.e., including leads) are provided with a designated mapping.</t>
        </li>
      </ol>
    </section>
    <section anchor="protecting-sender-recipient-social-graph-edge">
      <name>Protecting Sender-Recipient Social Graph Edge</name>
      <t>To protect user privacy, implementations should consider:</t>
      <ol spacing="normal" type="1"><li>
          <t>Sender Identity Protection: This approach focuses on concealing the sender's identity from the Discovery Provider (DP). Techniques like IP blinding (e.g., using a Private Relay) can be employed to achieve this, ensuring the DP only learns the recipient's CSI.</t>
        </li>
        <li>
          <t>Recipient Identity Protection: This approach aims to hide the recipient's CSI from the DP. Methods like Private Information Retrieval (PIR) or Private Set Membership (PSM) allow the sender to perform the lookup without revealing the recipient's information to the DP, effectively limiting the DP's knowledge to the sender's identity.</t>
        </li>
      </ol>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We gratefully acknowledge the valuable feedback and constructive discussions received within the working group, in individual conversations, and during the MIMI interim meetings, as well as IETF 119, 120, and 121.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA81c63IbyXX+j6eYcH8sqQKgpaSVtIxjLyVKFh1RYkhpt1wu
l2sw0wAmHMzAcyGF9e675FnyZPm+c/o2AKhVEjsVJ1sCgZnu06fP5TuX7slk
MuqKrjQnycHH1jTJWdFm9a1pNsmV+WtfNGZlqq49GKWzWWNu8dR9D2RpZxZ1
szlJimpej0Z5nVXpCuPmTTrvJkXVmaZeT1bFqpjkboxJE40x+ebRqO1nq6Jt
i7rqNmu8fP7qw+tR1a9mpjkZ5ZjiZJTVVWuqtm9PknlatmYEqh6P0sakJ8np
1YfRXd3cLJq6X4PYi7oxyXnVdmnVJRembdNFUS3wjRBjmnRWlEW3SQ5J1tHB
6MZs8Hp+MkomSU92eEr5TbH1Gr9buUFHt6bqQV6S2Mk5JP7SdfwIojjz7/kb
vl2lRamPfF+Ybj6tmwW+TZtseZIsu27dnjx8yGf4TXFrpu6hh/zi4ayp71rz
kK8/5IRFt+xnYIdZFYu67B+S9ElEelKCc20XhgYn065JsxvThKGxYw+/eLMe
jkbkav6XtKwrLHBj2lG7SpvuL3/ta0x2klT1aF2cJH/q6myctHXTNWbe4tNm
xQ9/Ho3SvlvWDXkNCvG/eV+WKjK/L0rTJm/qxcxU+ptRhi2K5feLul6UZprV
K/0JpKdV8VPaQWjwqvyqv2R1X3WUyI9V0Zk8ue7IhqSeJ6cr0xRZumfq1+Bh
8r7sV/W8GM49J2v/wbP/oa6SSwPmt/Vw8n+vq+na/vA9dg7yX2HG++j4wCc+
8on/FS1pt0yr5KqGvkEBF0OK8obff2//nVam20fJa0jvd19KxKiqmxVevIUe
jUa0I9Gfk8kkSWctxbYbjT4sizaBxPaUxiQ32C2MFUtogreTbmm2FDlZN/Ws
NKvkDlpTVPLEF5uJi/OL86PkziqzKPo0+TgcH3RhBFBQpKXQsG02xklalvUd
R1DrYRI8nmNvk65OypqWFCvJinUh60gzcBiLBR+a1iRrKDMZ02JhQkVZzzDg
JoFE/LU340Qen4Co2yIzSZGTlHnB4Q/NdDEd6w4maZ43JBQ6uV5ChxM1s+3R
NPkAnmTkSbbEyKYChUV1W5e3wuKySGeYbpWu15wfDGyH02AV3iwmjg6w/baQ
RcJqYMPAk1VR2QEwaoq5LJshEWlgwNdtNLhjxqovu2JdRsNOrYisijyHCo6+
4vY1dd5nFMTRiFu3LQqmwkqwpnRrI6J9+NxCoKx3yyJb4v01LF+R9bDXgfAk
g/LM7NpMPk1e9k2D70tIAAmh6HemSioDZcCMaXsDrlcd5LvFwGnnpwSHNnAO
hjPWfTep55MZuUgBxzI8M+zz2FGlK8PUVLE5tItcmCbXa1A3h66VpCJwYmnK
NfkgDOIs1b6lH56W/Ae/X9tvTo9IOZQvx7bWoLPxQ4ApcASiBpCWvJjPDVef
WK1sYWTCwC/qWTzsiyNRT6wV7C7wxk1V35Umxw5BOPAwhMLtw1gEqpAJ7VeT
yvSwEyVktKrg4kajs1g9K5NxafhjZrIU9ApBsQTfUf5Xq7oC5cv01oge+705
HOjLHn0yXTY9gnWCD+z8bAXG6kxZgkF2e3YZ7DdaVBvbVa8MpyIzhEg7Fbfh
+wU/0wNA5hfLjoxPCrVesALXxaJKyzHZ7XbGzcJ1Qo03VPQe5HZO3Z1pBI+W
9R13tktvjAgD2K6Kfr914TaUJm3Upt6vOPgZsu0tc+EMGd+305L5MGeigW7t
KwpIF6kFNf6r5GVd3ZIGoEIZ4YyuoJC/6SVMAkxHi523gIMfrz8cjPXf5N17
+Xz16t8+nl+9OuPn6zenb9/6DyP7xPWb9x/fnoVP4c2X7y8uXr0705fxbTL4
anRwcfrHAxXPg/eXH87fvzt9e5CIz4mdF/cba54Z9RTrxtA7pu0oN23WFDMj
0v3i5eV//sfxk+Rvf/unq9cvHx0ff/fLL/aP58fPnuCPu6WpdDaRW/2TEjWC
pca+iI5A/rJ0XXRAzni2TVpwvIL6N2Tngz+RM38+SX4zy9bHT35rv+CCB186
ng2+FJ7tfrPzsjJxz1d7pvHcHHy/xekhvad/HPzt+B59+ZvflQALyeT4+e9+
CxE6nibJg5ci1c78nAd/c/jy+vzoASKLbT8bOyVaB2s7t/2TM8nO976aHj99
MnC4W/bjCPvw6LMkXTo9Im2XQlwlOg3XKfqBAKo3qg0wgLAGbYInPQkwQoZW
wzsyR4H/gjQ8Jg0BCzk6wuQX11tz17TwAdVEqi+QAJ7Vuj1Lx4+gtT1dr4Ot
ctaL8z/h/G5W57YGO3PtduazG2JhXprQxmBDQLYjIE0+4FeoHGx8BdDAab/l
tMFbhOWe7eN028FsKqfnaUb0Iv6Wti34VphOTNpaohaAcRX3YwrKzy6xQ3RD
ieBD6v0MDqASKuVxEN/kAi82oO4pqfsBXJ4Tg2ExisGEC42B5SDuFORtDTbM
9Wbd1YsmXcPlJDM4au6LICzQIJSLNzadp/OO1kC+5RNF68BZSRPxjBRcOYij
7Bc2L2v4e7q/VgAVXxUWLWFkZgZLThHWLyq7Qv5+KbNrFFj8hLduw8IcuJRV
YBQZrnacAbUg5blKCAHbkA4IQ1MIFeAv3nJboVh/31bQkWylPy6tL5QohXZ6
NNoG+g4Sd3e1eJm0hZh27Ym1Kad2ZbIfoPAqQPpV33bcdVkr1+WYsIcHZF93
Rw6C/KJRVbb7hj+zJcMvWdZUDcfbur7p15jw2kYV27ORPxvrzv0k5JMF5caK
QHo/loVr/RWqxxbXuwFIBDgzQSB4qXKC8W+BZPKxCMNErFau28Gn3hB3AW8V
8o8Ej62CAdIgcqBekzOSJL502rZ1VhA2OPkNb4gsgVl+tAgXmjxwwrErWpSY
r7ZvIoSGQXpqLGB902fFNqCWQQS7Aov8ZKEO/r5NszgAVIMoiIfRSmk31Y0T
IkZCXGWioIRFI9CIcFIXWOWTrp7QxppKdJ42QLCAQD+JfmDfuzqrSy78wYN3
QOcnDx4kw0h6jg/UYLztiCCdDwSxPlDtST1wY0hxZTpo2604CSeaQ6sD3Wid
AMEOG1gzUD9O2n7WImDntG1n1lPFazBine7VMMJXLNTKCKLeeGZvvL8T6ot6
X0oc8WqOp7o2Dgi8j+KuzgGT5g2cY2XuFG8aTQNUMDkSF8PAFK1npUVgj787
fvTLL+ME8d8CwNpykUDMW7K8ho9FsIewp9Voz0pqHodtaRuhbYhtUxZkR75L
bW7WZb3ROYZUnr27Tq6vfqDuEfaCz+o9FUda/PjsuRAsgijOccVkI9fFaCWZ
WOOYxnSP3c5zL71RTW+Zp5wNws+2Z1TcJj/UsPKztA1kXhvJ7oJc6IV6qkvH
y0PCGcfRR0+PPcDFH49/+WUarwqyTyXM07VwMAprRQ4CBPFLfvycI06TN/Wd
uSXsmkE17HZK4DBkGxMdG1GDeOOwplLMqwj1GLt7Y1MYK8CQtgcAICck7ROF
RmWBMGpVQ5tNshU8aiiY19XXnYaaRbXUQNlO7ASFEQ0k+dW7jxd2RU+Pj5+B
Ry7wzFVlSmylYoBpci5Roa5Nchr1TQLaByTQHzfkSOuSMXmxKDplCsZ23x4Y
INdp2qzTA+zvfF58mqrtEBkyzOmUZuHBxxp6JkGZlWXh3zrNxJjuQFDx24hE
or209OEZRHSfTDsFYCT/OpMtK7vVzAYy9gW/79IGnmTdzxAbW+UQw4HphWVU
rWW6Woutx5J9aquliEDJsHFFu5RAVP1ap6IU5veSI3Yc9ne4F0+xF149ZStn
XCQtWilZTBCsWYVxQIucb95XmfJK5OTi4jpp6l5+sujVizME4NRG8ymQ62rd
ycJ+KC6vkkMFhpluwbmgE45xef3hHax0SLCJjp1PzqaNy+wyyb9Ou2w5uS3W
zYR6fVuYO1VAPrk2HYsMCxjrotKH1rdrqpNMDWJLeLmcORhjGroi/gsr2jFZ
GkzA1au370/PksMr09Z9A2F4W1t6RQWdmXNW4Ol3T74BEZAYi489FjIaKhct
NwZiHiuBiXbQpTQIOi1cIU+cknvC8BwkBf9vRUl2wCUkZ33HHbODS+bKrcwg
6GFOSNALzQNlwnLF7pDN7imBELaMduHWZ1tEAcVhCOAdLA3yZMTAZDW8QJve
Kh4ERZs18bRVTavPStI0+YjYcwVmEZFs0xmJ/WEKUVxYgOAc2qSvRFzpLCSM
PKICMMOCb+6gqy3+TPNIwwbZNckBqYEc+NUKXkZlf12mmkKMnZZwmM85B4rx
1jKhiL98GxkL515eY6gZZhu7QC4OKj34aS2wEAy040kdhhBgUZe9CKPEHOSb
z77Heeavkut+tUo1tIuroLYs0RpRZ/eOjBxeUFi8hVv2ZKcx0c/JV8nP8Qz4
6wLrShF2bvD5vcC8tEx+Hv08mUz4X/jfz/s/41Hg5J+TByGKa4ECf+b/4aer
Y47L/NEQvkse6AsjlrDKkMLfCeAwzSc35yN8OPVvy1QKTBykg9KUfevC2hQ6
gB8cZmFBuAMG7wRXMcLNXAAQU0A7TsdKkeS4qm8SGcjwOeSNtAW6lE02iop5
9BgfXHC1zZhG4bCRVNu+aE5jT/Ij4sCTz4wog2y8XaP1yGyZxA+6TfRuBiOm
/1t8CE/IfG2/pscm+u5LF2j9ZJp6TEAqaWSf09oz69VTDnlpiWeCLlqAJoUF
bmmugev0ZZ1u47MQ2wITjf+MIgKOsnKdmE8wY7BheWILeBa2+tRG0HJqGhG0
Y6qNjuyrLJMWA1F8btdhU5IzGRuQQ1KyC+AxjGWATOiNxG11XZrdtMLbTzrE
dzErrA0ATXfpRuVjBcr28vD4m/26Z5VAUiaBriBw2wMqJZId9zqeDLIRkuux
L4weXB2f/J+o/PSBNZCR+XPepQV89hP4YFwkw5eRkoLwrWVdOmK9hmUaFG+r
hbftw5Vp3kBksSYiZ3ZtuEI/wv3rEqRsmNMSb+nWSCnV2D6tNklUEkPsKs5g
h5QwqybsjN+ifeYjq/syJxyqdkfay59xlNBztveugCpZq7ed9NPXTONSEkpx
lDM576TG/WmtWuGrOYEU5vw+n7mxektapOzDF0oCiw0wcHVjkdY9+RsO4OlJ
zgfVYreqVpclxNlC3MqYzma91sR/cBSCurczVcIcvjDzdenSIxYMXzd4ttOM
m4tJlpoTEKjpU2Ut04MwNPOwbq0TF2tJE4MJutsQln1brWmhedGsdmTQLh+7
ULSdxKGqL156ZBFMjrGuZzOVOUIY+r+x0quQlUkWOsZGak5StW27yW67RICw
0y3Lchk5ViwpsiuPTv7fuPW9tkeoaeNeC8y06GmvWYh0XRm28OuLkKGWrTLw
GtOaT4gtS0mRBIq4JpfgZ8tGr8AabM7KWgKPRjSZeTtGvl0j+27LEwcvuBYw
nNXFS1Xskp9fpO2N6ViMeg2oUeXygAO+B0daOEAw2+2MFPDxwdFUagY+PSsl
5Ds2wETNKDauI4B1UXmgyu8s2T6z30aZF8kfxIX/ShMjahPZFyfmNY5t93gH
l0GNtmmw566E76h2ZkTL9iUUxAZx1LZlXbugqWi0FDTwMPCBZ5dHUjpNCpuh
kmhRQAS3um+EegonUZWmZfDAAjGjVrykgUSi2cuYUKm2SsIW/4pWIh6CxHza
v66xhEO5ARtyVx3m4ytf4NHwbArYaBJsKOYtPiUvojIDXRV5l8FzSuniDwi5
K+ZiuQstMxNChxVd/TroggY6uhyb48VAQ+Dw+OTvgIP3qqam21u/rbKdyrHO
JL41DHxQqqHvInNhAbTNksG0W+KqQpIedET4vA+4HBeFtvy9JEqjTOdea01X
I/bYVxDAA3LcGlYsZ83eVWGsZaLAMo/o4wQOuPvkfu5+QUxwD1u14ynScdjY
Vh240+eIu1MAQzLDFOvOYaF9K1be7XAtwH02GhC4yD6y3wrI+1cWMphrttEw
QrV3B3FE0FF+te8pNryN82Iuw02zXDKdx7Yv7i5TffDO7dbUYv1lCimn+7Kf
z6wwE9laoFs3aaYbxIaq0LYTUzB2MYFiHPuK1uQccUWrFqbtFJBgmDgL8NQm
ITRkI+9/SJuNOFlL9JWGcRCib0/+HqHeXmGSQVnZYabKlQwF6xLPVXVUC+QX
tYRd7OkChz3AkPmk5OQnVa96JTa1JDvwvDQGLfeGHooSWJwT+mwVHFNZ70e/
42KRuNAtM0c/8iNdAoYw4qfJWIfcjsZeZ7bLqaFsSgLntcP/UkdKt3sOnRXY
rkHb2ug7zzWP7WzXxg7CJkTVDr9cYg0n8zLOe1aRGjXwwdpxxLEk21x7HWGC
IqTPzFSIBkiqSXLYwKSLnoAxLEstPqxdvO+BlOGaVOTI7zD955/1shHRq29c
7GQl7Cpl52LPLgPFgMQWGKw4MLKpgD673jr1EBJFscGyTnbDVN/BplbPpSdh
EAatPWNbEGCsGwILK6V5b1xUSYn5mrA87ZaQu6Hf10qqK075jgaPdW1k5btz
axeIYGOqyaDP1vYJQQyIZXbTj19JaY7JTGkA8sAmhv5S0IaZeXryd0//fD5d
wBeAsETJZn1R5roBHiJI0axMpAbNLdZKu83mqoX5YKO2TjLjcYVe3A3raC7D
HgMOOzO3YZFqKWZGVdIyD3ZoWaxD04bHpVjkAFxtdZNo1rz15T8qmii3LKqq
XE65hjIStSbshj1yMjBYbdQvEuPRAYux+tqt3abQdOVglWyVRKrGBsfsU7JW
L1QDhPWRU1an5Qi1/ivKDX3xxj/03nvYrhwxXmWKjp6Fkahk7s2v7cKxDWOb
LVxjtyyQFbRWYwNbnmKTklNeCoiWwdnfK702H/akhiTsqTZxgd/b/GAYRy5x
oMyV6CvSGZAq/UpMtEjXcxPzlmFkw7yC7JRKdtwy2y2bul8sQ7UK8m6D/liX
ol4Pu6tO3J1i5QVTHeVma5vzXppCgq2gMPUi553bU1gtgIyUUbBt5oAlI4+I
jOZ9aRuzOGUP/B2E9q4OsWEs1q31kKEnMf6VcQ+ivUzOS8CElxFDyDI3vDBL
PUfUAjIY6FVFI5JqIxthvy/j9XtV1nfba96HGUGRWdFhKV1Jy/NOW3Q0qQSH
RZS8ag0PevmUhkD1oM2EofT+vS/0uRwFBCuy2QOTtr1pAjK1dckF0WMPC4pu
7CMn7Jl2jMfFs9jeaEpS4p1bk5bEBTrXrC9vYoxAZD5IydpSIXP2bEx2DfZ1
NTQYrnaqtT7ltvm0rrXVcEXFnTV1StY0rAto/4HLGgfFaf0+FI0TkyhfwYwl
zNI0hNMvdz3gJHi/a2XC74UJr6imBEutlvwpfoalOplXGkIGfnyqR1QmH2wN
4pVv24I3fXbyDyt2fDba1pMAgHe58s5GYjszOHemZq0dYAVs3qktlLyKCiWn
mo3G4p6f/E8qLL9Gt8J/ymzWSx2AWU3aXDemq9SkBVMqbN7NsHHSr+xatMDu
aWQWooKzBq9+ByE13JSiXdnGyTk779xMovOTFl7LhEnisoTYVtvphznZhLBl
RKRrRw9CrOkn2nWKNziuiCJRMLlOuDwoj8QJIswGpWAedJDLg8kwE3g/EDwr
eXBHSxjko4VEKwMjkCsAUpkISHm/CQxZFtK/Ng0dbWi91iCHE88buKNp8opk
WeV3Qmt7G7UmkfrTbH0lVJqITjUkmMkm6V3FoN4PM8Q7hfbshH0kE4/u/Ok6
FxWwLwALkXeL0LhPkaXQEzoeWWdqG88DYVZOKNOpNKPwdOzCmcOBRxpkga5Y
w0tLKMd3J19eO6RKPLg6/mZv9e6/VTQU3WJhZNCYoMn6YXZcDxTsb1O1RkFG
hhPJBft4YrcqkIGI+5ODPjiOGCsbp7td7656Kz6LI6GYIbIKn0riBIdywmuQ
ybDd7xX75io6cd/BLsmeTZiWBwei7m7qgNpsy6cVBNide8y4o8LIGyPFgiLk
I8WpB6aW5p8T6Temv5fUPNV4ncu5RF+gBFaFYeg0h4X33Kku6X63fAuS5BNv
9zOfOT/pi+EDOQfymRYdLXAkznFKUlmDna9Dxnw0iqsMwu6t/YkLnune/I7O
mpZtvb8cTSvVqAZ505rMWMRkC9CcCoVQQstKjCNSJwTBY6oU6RADS+2bNaLD
DNLU11dOHGSNPPtQkLLPGGEOtmd96bZeBCM4K7p92U4KmBxbjOpixTzaKDnk
eGcz4DIAR5LWpM5KBlcvpNnOxJw2kW4Sgi0ZlNgzasHOqUo670QbXOurOgWR
qYktWB5NE/aXB+KF43ltWnsm0lc10js52DqnIM9CqTLkTi1h2z5UfteYLXBZ
8r1UXg6pobn9xZ1BkiZ+P4i0fMPxLTVqk0a1jluYChy5W7oomkGUtQeCo2zB
NA5adionFoe8HJSKRiP/w1YNSQ4VRF2MEsK5INX1wY+jk8al1LQGFvvqeJxc
PcF/T/HfM+2Bu3ouXNk27hL8bYV++1owxso0t9X3VRvGDsVtxx1KhKIyi7Hi
1hvhu+SiO60rn5++O93h2fCMgs0uy5Np5hqj5fQ3tZ6jnPLeDJLT8xjwRZ2b
0g2TOnCPCKKU41u3KYxw38r1G+GllbwUuvP0LJG3pFXiumRdo7SEKGteTyAl
ty1DMNxte5YgvkggqWcCPXLbozB0xQQXtjCubZv6kCVSeh1dpym7xjvpHB+s
x56Jdm3N3fZJCWn/jJqc74w2EUAE5bzk3rMWTV1qpH7G/LFN0m/0ICtL5lH3
BtVx7JKVsEFzk9sjb7KIsT//K0grk25RcXW+cCepPmY89BSKO09IdfsqeQm6
uDyKLrbq8KKu6pIANHNnF49op/0pTsxg1GSPfbuwdGl7SJ4cxtnjdpk2QKEP
G7MuxeLmR/74H5METi9kRTQVwZ0qqA702M7TKLNLpKg4tN1UGVS/knUosZD1
3EgNhYcUdTpOMOBLCGPD/RAil5IRsdmDQk5A2tQWszINqI4LorJ2aDxhFxxK
ZhoRpHA0SnsZqK28UkADS98a0JiFWDKbyl6Yes0lizZsiT+3DFqa3wLV8IDq
aMKDdgiXm9w5QtnfqpBIwp2OkgMn270uY4uJWhUhsTCa6JNED+LSVS23IKRF
Y0edFdL3HW1TnPgGLb/OqZabx+Mdrc6owHjlKoUuMvVlvEwHXmqfgBcjMQ30
YNZ+gGn22BSYxvxYU8x6zw8bWUlWjT7UMfKsSe9mEl5PgiJ4VMXrkgoRbY3e
SG6TSn+5Sw41RXsj3LpItcAD4qz2yuO8DcMPiX3uS7eRnlmamWYHfVqU9LK3
fVmF2ECklD31bD1PpRvd+RSbXWo34NNKtsyHtAzL6O06W74pVgje5Xyf1Q27
9doFgEg7LzeKvSP4Yi3EmwLU0CSStTQyh/FdVlIjadrISMC4AQzccxbYpkZb
Lw8+MxKgqbUnnMqfM5BgxhcsbWxpb8bBv7ldyu4x8Vb6elorP1ECQl2J0no5
9l6CNejBgt9dj701SC35deiDp/XWIopspG0O2F1JoyUPSaRFnQBm1RoehmX/
I3v65YV2hwqpRfWqtXLYhfv/ttZgNz5R9+2jR3JArW6CFhhpFAQq1B6Gw7M3
HxiKi/pgfDabuNVD0KTSttfQgJCBVMYTlHWa21L/2iaHgl5vne0/0xrk66jJ
SAMcbSsLKQXyDZwQQykuamA2KRKStnQdOAunWS+MnE7HK4tq5TsB9ilkcM17
LMKVS7lmdU3pCfZVoIKpXJbebZWYqiuVKK/OmuUFr5p+3f2q3poy3XhPwFNk
9qTCspYa1y78yLSzEKS/9sDAKanfnUseKgru/HwvjvD7w7QRsZ7bAkgXNr6W
c0QRlNvvBTRHhfVTLfQIx8w2D4TwQXrHgrZoyCFQSHYKIDVTaxydSEK8Zs99
uUlLewaqDclHiQvLcl8gGvegSNeIDBXLpC6WJUKbOtbQJap+aaNX37Qa+2nz
SYBpalKcgFp85xgtsiO9abbtQY7T+f6/dNEYlcSxBFP+uN5QSpNTgd3RXQWC
kbCB4Vz9XkyjbsPX6Xh7iTDcp3QGLNOHAkzcMgVnJht6y52EMraw3fJvHow0
Tjcsv0QPNPtTM6CC8LujfdLPYFGVFAgE5DaSRnBdZep+XZu35oFj00RMrMbf
Xk9VDj3xjt6fbevXr8vOmMkH4CqpLrgOJ9rEoXpLx2eRii/hSjSZ4A+7h60J
4WFpUkd7XxntsZP+o2lsoZp6xjTwML1uI1SV4mGLu0dato3NBeTWNF8C8t0V
rTuC6WrzW/EHsyEieWrifNl9ljZNoZkNI/5ZUlwrHqCT5tGHwrDI4dKoKR2D
YMmau7N/PfenRR8/42lR6RK9OL166S7yeSqHSE1WqyxZg3gazOcwMCag2B/p
UhQ+mNIognin6XveHDEK37rztSzT+o4Q35VqTbfm1spCXQQ3LS0nzOT78EMt
KXbfdKk7AWgWBJVuEcl7pjPLcjzMIAzSwzKG9ET7gFuqnHJ5lubtIy/i7AHT
mVZh5US9yrjNWTGvoyYpSEm/5tnUXG/Yi1phBqUs8O4FhfsC0+mB5pH8XfPK
h1azQqm294bu5LhrX05PA7iWhT8a4gqrgziI1uROb+zh8RBt5fP35Ew9ASyl
koDB1YIhneUDGwqdHkAf3D5zD8f3Vj54YnNfcoI5F01e567i1Wj6beW5JKKA
iC8rjCsQevM0pjMqezEBRRfStHtSEIPTBfc2MY9Gb1ymTwzqPa3Ohy8//gHQ
WXGZbeeSnhHXn9DFN8Rshlm8c1VcDoH9Aagb8+45SQIOj95IPcpetrf3LhRy
Qy/PKwaVfFvdd4HdAIJoB8u1K/mrVEct4ieJ3ppXanGgtQnVuZb2Nna+cAeI
vXOwis7I0kHT8eoDUSl8vdbbZK7TlZngr9159QvbBKxT0WfJVYDLYuVr+Myc
7rvojgXYpfG3v00TMFvJuNNbKziJTxhL9UOvniM1Yb8ExYYTBI+Zd54ATefM
idzHs+GwTFXUvmfGe0PyIFxu6G+IFMnV9YohiEWHlRB/gcfxN1ud0pyZahT3
nCug3604T3n/FVaS9yFN8CvLEJq+dqjJOHGQxogsbd0xdO10juGsTYq2w4s6
1DsPqv9T3o51aZqJFd4dgrwYOohkr8fEjnmqIv6R67XmbOogLOGIyOC2sJcp
BoyXR/dgR4hsGOeS2NSy42jKS7Ne6nEbNWWfUyE5vg07b6QZ3BU9w10nvNvG
ngayQr6rTD8yKAIdNKNi21lxsSneeXSgoY0UxCcRtCXb74S76tJTPOUNXO/D
maF7lhRW44G5767ZXpA4Qr8cEK9LcQuLl1HFx5WkXBSt6LCYmunYVq8krgHk
g+1NG392P/dNuOHgpG9b3tdv+rlum1HUwTisOGx3zNoKovO9A8N67poRQ//K
SeIKBVq6i/rkMEQGBOQyV7stjd6x3ZM3AjclIGKySDMgvCGntPeyWVl33cSX
9p6RK0bTRy4mMCt78w9F3+Y9tL9uUKkBPhHBlta9LY9lG2zlpsHA4S9gRVqs
bFIn3z2KR3we1n8J/CKNJHadbjHnURwazhUdXp5fSYbLPXZteBWzZL6A2fH7
9cWR7UiI/CcRh+02ifrJHNjSfjTHkMGNwnE/b20JHttbMjQoHvT/nl3ipXAJ
7b2tJlJ7ytyDeinE304UaZv8Xw7kxvqDX0ajH00id3jxvm0WI6KxecohLXu9
SMiYnOGcszyaOpQqBeSrl7uUWj2g44qmNtoYwDdqpZSKIYjaG1kx2emgmZjg
IDmCviWrUazk1KzFMOH8Gq/lT46Pvxsnx4++0fePHx1PR/8F0ZXLVU9gAAA=

-->

</rfc>
