<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.26 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-extra-jmapaccess-03" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="IMAP JMAPACCESS">The JMAPACCESS Extension for IMAP</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-extra-jmapaccess-03"/>
    <author initials="A." surname="Gulbrandsen" fullname="Arnt Gulbrandsen">
      <organization>ICANN</organization>
      <address>
        <postal>
          <street>6 Rond Point Schumann, Bd. 1</street>
          <city>Brussels</city>
          <code>1040</code>
          <country>Belgium</country>
        </postal>
        <email>arnt@gulbrandsen.priv.no</email>
        <uri>https://icann.org/ua</uri>
      </address>
    </author>
    <author initials="B." surname="Gondwana" fullname="Bron Gondwana">
      <organization>Fastmail</organization>
      <address>
        <postal>
          <street>Level 2, 114 William St.</street>
          <city>Melbourne VIC</city>
          <code>3000</code>
          <country>Australia</country>
        </postal>
        <email>brong@fastmailteam.com</email>
        <uri>https://fastmail.com</uri>
      </address>
    </author>
    <date year="2023" month="March" day="06"/>
    <area>Applications</area>
    <workgroup>EXTRA</workgroup>
    <keyword>IMAP</keyword>
    <keyword>JMAP</keyword>
    <abstract>
      <t>This document defines an IMAP extension to let clients know that the
messages in this IMAP server are also available via JMAP, and how. It is
intended for clients that want to migrate gradually to JMAP.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>A few IMAP client maintainers have asked for ways to use features that
are available in JMAP without having to drop their expensively tested
IMAP code.</t>
      <t>This document provides a server with a way to declare that the
messages in its mailstore are also available via JMAP. For simplicity,
only a complete equivalence is supported (the same set of messages are
available via both IMAP and JMAP).</t>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="details">
      <name>Details</name>
      <t>By advertising the JMAPACCESS capability, the server asserts that if a
mailbox or message has a particular object ID when accessed via either
IMAP or JMAP (see <xref target="RFC3501"/>, <xref target="RFC9051"/> and <xref target="RFC8620"/>), then the
same mailbox or message is accessible via the other protocol, and it
has the same ID.</t>
      <t>The server <bcp14>MUST</bcp14> also advertise the OBJECTID extension, defined by
<xref target="RFC8474"/>. The JMAP session resource that allows access to the same
messages is called "the JMAP server" below.</t>
      <t>This specification does not affect message lifetime: If a client
accesses a message via IMAP and half a second later via JMAP, then the
message may have been deleted.</t>
      <t>When the server processes the client's LOGIN/AUTHENTICATE command and
enters Authenticated state, the server considers the way the client
authenticated. If the IMAP server can infer from the client's
authentication process that its credentials suffice to authenticate
via JMAP, then the server <bcp14>MUST</bcp14> also send an untagged OK response with
a JMAPACCESS response code containing a link to the JMAP server.</t>
      <t>If the credentials might not succeed with the JMAP server, then the
server <bcp14>SHOULD</bcp14> send an untagged OK response with a DEBUGGING response
code with a message to help client developers understand why this
authentication would not work with the JMAP server.</t>
      <t>Servers are encouraged to report the same message flags and other data
via both protocols, as far as possible.</t>
      <t>This specification does not require mailboxes to have the same name in
IMAP and JMAP, even if they share mailbox ID. However, the JMAP
specification regulates that, in the text about the name and role
properties in <xref target="RFC8620"/> section 2.</t>
      <t>Note that all JMAP servers support internationalized email addresses
(see <xref target="RFC6530"/>).  If this IMAP server does not, or the IMAP client
does not issue ENABLE UTF8=ACCEPT (see <xref target="RFC6855"/>), then there is a
possibility that the client receives accurate address fields via JMAP
and downgraded fields via IMAP (see (see <xref target="RFC6857"/> and <xref target="RFC6858"/>
for examples).</t>
    </section>
    <section anchor="the-jmapaccess-and-debugging-response-codes">
      <name>The JMAPACCESS and DEBUGGING Response Codes</name>
      <t>The JMAPACCESS response code is followed by a single link to a JMAP
session resource. The server/mailstore at that location is referenced
as "the JMAP server" in this document.</t>
      <t>The DEBUGGING response code asserts that when used with a status
response, the client may safely forward the string argument to the
client maintainers. The argument <bcp14>MUST NOT</bcp14> contain any message contents
or other personal information.</t>
      <t>The formal syntax in <xref target="RFC9051"/> is extended thus:</t>
      <t>resp-code-jmapaccess = "JMAPACCESS" SP (atom / quoted)</t>
      <t>resp-code-debugging = "DEBUGGING" SP (atom / quoted)</t>
      <t>resp-text-code =/ resp-code-jmapaccess / resp-code-debugging</t>
      <t>The syntax in <xref target="RFC3501"/> is extended similarly (this extension may be
used with IMAP4rev1 as well as IMAP4rev2).</t>
    </section>
    <section anchor="Examples">
      <name>Examples</name>
      <t>Lines sent by the client are preceded by C:, lines sent by the server
by S:. Each example starts with the IMAP banner issued when the client
connects, and generally contains only those capabilities required by
the example, omitting important but irrelevant capabilities such as
STARTTLS.</t>
      <t>Example 1. A client connects, sees that SASL OAUTH is available, and
authenticates in that way.</t>
      <t>S: * OK [CAPABILITY IMAP4rev1 AUTH=OAUTHBEARER SASL-IR] example1<br/>
C: 1 AUTHENCITATE OAUTHBEARER bixhPXVzZ...QEB</t>
      <t>The server processes the command successfully. Since it knows that the
client used Oauth, and that it and its JMAP alter ego use the same
Oauth backend subsystem, the server infers that the (next) access
token is just a usable via JMAP as via IMAP. It issues a JMAPACCESS
response code in its reply:</t>
      <t>S: 1 OK [JMAPACCESS https://example.com/jmap] done</t>
      <t>SASL OAUTH is specified by <xref target="RFC7628"/>, and the argument in this
example is abbreviated from the more realistic length used in RFC7628.</t>
      <t>Example 2. A client connects, sees no SASL method it recognises, and
issues a LOGIN command.</t>
      <t>S: * OK [CAPABILITY IMAP4rev1] example2<br/>
C: 2 LOGIN "arnt" "trondheim"</t>
      <t>The server sees that the password is correct, knows that it and its
JMAP alter ego the same password database, and issues JNAPACCESS
response code:</t>
      <t>S: 2 OK [JMAPACCESS "https://example.com/.s/[jmap]"] done</t>
      <t>The URL is quoted since the ] character must be quoted. The URL uses
the same quoting rules as most other IMAP strings.</t>
      <t>Example 3. A client connects, sees no SASL method it recognises, and
issues a LOGIN command with a correct password.</t>
      <t>S: * OK [CAPABILITY IMAP4rev1] example3<br/>
C: 3 LOGIN "arnt" "trondheim"</t>
      <t>The server operator has decided to disable password use with JMAP, but
allow it for a while with IMAP to cater to older clients. The server
issues a DEBUGGING response code in its reply:</t>
      <t>S: 3 OK [DEBUGGING "Cleartext passwords disabled with JMAP"] done</t>
      <t>The message is quoted since it contains spaces. The message uses the
same quoting rules as most other IMAP strings.</t>
      <t>Example 4. A client connects, sees no SASL method it recognises, and
issues a LOGIN command. Its password is incorrect.</t>
      <t>S: * OK [CAPABILITY IMAP4rev1 AUTH=GSS] example4<br/>
C: 4 LOGIN "arnt" "oslo"</t>
      <t>The server does not enter Authenticated state, so nothing requires it
to issue either JMAPACCESS or DEBUGGING. It replies curtly:</t>
      <t>S: 4 NO done</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>The IANA is requested to add the JMAPACCESS and DEBUGGING response
codes to the IMAP Response Codes registry.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>This extension reveals to clients why they cannot auhenticate to the
JMAP server. One normally does not want to reveal anything about why a
client cannot authenticate, for fear of giving useful information to
an intruder.</t>
      <t>However, in this case the client has already authenticated via
IMAP. By doing so the client already gained access to all of the same
mail. The authors believe that the debugging value of the OK response
far outweighs its security concerns.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC3501">
          <front>
            <title>INTERNET MESSAGE ACCESS PROTOCOL - VERSION 4rev1</title>
            <author fullname="M. Crispin" initials="M." surname="Crispin">
              <organization/>
            </author>
            <date month="March" year="2003"/>
            <abstract>
              <t>The Internet Message Access Protocol, Version 4rev1 (IMAP4rev1) allows a client to access and manipulate electronic mail messages on a server. IMAP4rev1 permits manipulation of mailboxes (remote message folders) in a way that is functionally equivalent to local folders.  IMAP4rev1 also provides the capability for an offline client to resynchronize with the server. IMAP4rev1 includes operations for creating, deleting, and renaming mailboxes, checking for new messages, permanently removing messages, setting and clearing flags, RFC 2822 and RFC 2045 parsing, searching, and selective fetching of message attributes, texts, and portions thereof.  Messages in IMAP4rev1 are accessed by the use of numbers. These numbers are either message sequence numbers or unique identifiers. IMAP4rev1 supports a single server.  A mechanism for accessing configuration information to support multiple IMAP4rev1 servers is discussed in RFC 2244. IMAP4rev1 does not specify a means of posting mail; this function is handled by a mail transfer protocol such as RFC 2821.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3501"/>
          <seriesInfo name="DOI" value="10.17487/RFC3501"/>
        </reference>
        <reference anchor="RFC8474">
          <front>
            <title>IMAP Extension for Object Identifiers</title>
            <author fullname="B. Gondwana" initials="B." role="editor" surname="Gondwana">
              <organization/>
            </author>
            <date month="September" year="2018"/>
            <abstract>
              <t>This document updates RFC 3501 (IMAP4rev1) with persistent identifiers on mailboxes and messages to allow clients to more efficiently reuse cached data when resources have changed location on the server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8474"/>
          <seriesInfo name="DOI" value="10.17487/RFC8474"/>
        </reference>
        <reference anchor="RFC9051">
          <front>
            <title>Internet Message Access Protocol (IMAP) - Version 4rev2</title>
            <author fullname="A. Melnikov" initials="A." role="editor" surname="Melnikov">
              <organization/>
            </author>
            <author fullname="B. Leiba" initials="B." role="editor" surname="Leiba">
              <organization/>
            </author>
            <date month="August" year="2021"/>
            <abstract>
              <t>The Internet Message Access Protocol Version 4rev2 (IMAP4rev2) allows a client to access and manipulate electronic mail messages on a server.  IMAP4rev2 permits manipulation of mailboxes (remote message folders) in a way that is functionally equivalent to local folders.  IMAP4rev2 also provides the capability for an offline client to resynchronize with the server. </t>
              <t>IMAP4rev2 includes operations for creating, deleting, and renaming mailboxes; checking for new messages; removing messages permanently; setting and clearing flags; parsing per RFCs 5322, 2045, and 2231; searching; and selective fetching of message attributes, texts, and portions thereof.  Messages in IMAP4rev2 are accessed by the use of numbers. These numbers are either message sequence numbers or unique identifiers. </t>
              <t>IMAP4rev2 does not specify a means of posting mail; this function is handled by a mail submission protocol such as the one specified in RFC 6409.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9051"/>
          <seriesInfo name="DOI" value="10.17487/RFC9051"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC6530">
          <front>
            <title>Overview and Framework for Internationalized Email</title>
            <author fullname="J. Klensin" initials="J." surname="Klensin">
              <organization/>
            </author>
            <author fullname="Y. Ko" initials="Y." surname="Ko">
              <organization/>
            </author>
            <date month="February" year="2012"/>
            <abstract>
              <t>Full use of electronic mail throughout the world requires that (subject to other constraints) people be able to use close variations on their own names (written correctly in their own languages and scripts) as mailbox names in email addresses.  This document introduces a series of specifications that define mechanisms and protocol extensions needed to fully support internationalized email addresses.  These changes include an SMTP extension and extension of email header syntax to accommodate UTF-8 data.  The document set also includes discussion of key assumptions and issues in deploying fully internationalized email.  This document is a replacement for RFC 4952; it reflects additional issues identified since that document was published.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6530"/>
          <seriesInfo name="DOI" value="10.17487/RFC6530"/>
        </reference>
        <reference anchor="RFC6855">
          <front>
            <title>IMAP Support for UTF-8</title>
            <author fullname="P. Resnick" initials="P." role="editor" surname="Resnick">
              <organization/>
            </author>
            <author fullname="C. Newman" initials="C." role="editor" surname="Newman">
              <organization/>
            </author>
            <author fullname="S. Shen" initials="S." role="editor" surname="Shen">
              <organization/>
            </author>
            <date month="March" year="2013"/>
            <abstract>
              <t>This specification extends the Internet Message Access Protocol (IMAP) to support UTF-8 encoded international characters in user names, mail addresses, and message headers. This specification replaces RFC 5738.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6855"/>
          <seriesInfo name="DOI" value="10.17487/RFC6855"/>
        </reference>
        <reference anchor="RFC6857">
          <front>
            <title>Post-Delivery Message Downgrading for Internationalized Email Messages</title>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara">
              <organization/>
            </author>
            <date month="March" year="2013"/>
            <abstract>
              <t>The Email Address Internationalization (SMTPUTF8) extension to SMTP allows Unicode characters encoded in UTF-8 and outside the ASCII repertoire in mail header fields.  Upgraded POP and IMAP servers support internationalized messages.  If a POP or IMAP client does not support Email Address Internationalization, a POP or IMAP server cannot deliver internationalized messages to the client and cannot remove the message.  To avoid that situation, this document describes a mechanism for converting internationalized messages into the traditional message format.  As part of the conversion process, message elements that require internationalized treatment are recoded or removed, and receivers are able to recognize that they received messages containing such elements, even if they cannot process the internationalized elements.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6857"/>
          <seriesInfo name="DOI" value="10.17487/RFC6857"/>
        </reference>
        <reference anchor="RFC6858">
          <front>
            <title>Simplified POP and IMAP Downgrading for Internationalized Email</title>
            <author fullname="A. Gulbrandsen" initials="A." surname="Gulbrandsen">
              <organization/>
            </author>
            <date month="March" year="2013"/>
            <abstract>
              <t>This document specifies a method for IMAP and POP servers to serve internationalized messages to conventional clients.  The specification is simple, easy to implement, and provides only rudimentary results.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6858"/>
          <seriesInfo name="DOI" value="10.17487/RFC6858"/>
        </reference>
        <reference anchor="RFC7628">
          <front>
            <title>A Set of Simple Authentication and Security Layer (SASL) Mechanisms for OAuth</title>
            <author fullname="W. Mills" initials="W." surname="Mills">
              <organization/>
            </author>
            <author fullname="T. Showalter" initials="T." surname="Showalter">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <date month="August" year="2015"/>
            <abstract>
              <t>OAuth enables a third-party application to obtain limited access to a protected resource, either on behalf of a resource owner by orchestrating an approval interaction or by allowing the third-party application to obtain access on its own behalf.</t>
              <t>This document defines how an application client uses credentials obtained via OAuth over the Simple Authentication and Security Layer (SASL) to access a protected resource at a resource server.  Thereby, it enables schemes defined within the OAuth framework for non-HTTP-based application protocols.</t>
              <t>Clients typically store the user's long-term credential.  This does, however, lead to significant security vulnerabilities, for example, when such a credential leaks.  A significant benefit of OAuth for usage in those clients is that the password is replaced by a shared secret with higher entropy, i.e., the token.  Tokens typically provide limited access rights and can be managed and revoked separately from the user's long-term password.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7628"/>
          <seriesInfo name="DOI" value="10.17487/RFC7628"/>
        </reference>
        <reference anchor="RFC8620">
          <front>
            <title>The JSON Meta Application Protocol (JMAP)</title>
            <author fullname="N. Jenkins" initials="N." surname="Jenkins">
              <organization/>
            </author>
            <author fullname="C. Newman" initials="C." surname="Newman">
              <organization/>
            </author>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document specifies a protocol for clients to efficiently query, fetch, and modify JSON-based data objects, with support for push notification of changes and fast resynchronisation and for out-of- band binary data upload/download.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8620"/>
          <seriesInfo name="DOI" value="10.17487/RFC8620"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
