<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-extra-jmapaccess-01" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.3 -->
  <front>
    <title abbrev="IMAP JMAPACCESS">The JMAPACCESS Extension for IMAP</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-extra-jmapaccess-01"/>
    <author initials="A." surname="Gulbrandsen" fullname="Arnt Gulbrandsen">
      <organization>ICANN</organization>
      <address>
        <postal>
          <street>6 Rond Point Schumann, Bd. 1</street>
          <city>Brussels</city>
          <code>1040</code>
          <country>BE</country>
        </postal>
        <email>arnt@gulbrandsen.priv.no</email>
      </address>
    </author>
    <author initials="B." surname="Gondwana" fullname="Bron Gondwana">
      <organization>Fastmail</organization>
      <address>
        <postal>
          <street>Level 2, 114 William St.</street>
          <city>Melbourne VIC</city>
          <code>3000</code>
          <country>AU</country>
        </postal>
        <email>brong@fastmailteam.com</email>
        <uri>https://fastmail.com</uri>
      </address>
    </author>
    <date year="2023" month="January" day="11"/>
    <area>Applications</area>
    <workgroup>EXTRA</workgroup>
    <keyword>IMAP</keyword>
    <keyword>JMAP</keyword>
    <abstract>
      <t>This document defines an IMAP extension to let clients know that the
messages in this IMAP server are also available via JMAP, and how. It is
intended for clients that want to migrate gradually to JMAP.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>A few IMAP client maintainers have asked for ways to use features that
are available in JMAP without having to drop their expensively tested
IMAP code.</t>
      <t>This document provides a server with a way to declare that the
messages in its mailstore are also available via JMAP. For simplicity,
only a complete equivalence is supported (the same set of messages are
available via both IMAP and JMAP).</t>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="details">
      <name>Details</name>
      <t>By advertising the JMAPACCESS capability, the server asserts that if a
message has a particular object ID when accessed via either IMAP or
JMAP (see <xref target="RFC9051"/> and <xref target="RFC8620"/> respectively), then the same
message is accessible via the other protocol, and it has the same ID.</t>
      <t>The server <bcp14>MUST</bcp14> also advertise the OBJECTID extension, defined by
<xref target="RFC8474"/>. The JMAP session resource that allows access to the same
messages is called "the JMAP server" below.</t>
      <t>This specification does not affect message lifetime: If a client
accesses a message via IMAP and half a second later via JMAP, then the
message may have been deleted.</t>
      <t>The client requests the URL of the JMAP server by issuing ENABLE
JMAPACCESS while in authenticated or selected state.</t>
      <t>When the server issues ENABLED JMAPACCESS, the server considers the
way the client authenticated. If the same authentication would work
with the JMAP server, then the server <bcp14>MUST</bcp14> also send an untagged OK
response with a JMAPACCESS response code containing a link to the JMAP
server.</t>
      <t>If the authentication would not succeed with the JMAP server, then the
server <bcp14>SHOULD</bcp14> send an untagged OK response with human-readable text to
help client developers understand why this authentication would not
work with the JMAP server. In this case, the human-readable text <bcp14>MUST
NOT</bcp14> contain any personal data, or other data that cannot be forwarded
to the client developers.</t>
      <t>Some authentication methods use tokens that change depending on time
or sequence. One-time passwords (see <xref target="RFC2444"/>) and Oauth (see
<xref target="RFC7628"/>) are good examples. In these cases, JMAPACCESS requires
that this server and the JMAP server use the same sequence. To take
Oauth as an example, an access token is equally valid with both
protocols, no matter which server issued it.</t>
      <t>Servers are encouraged to report the same message flags and other data
via both protocols, as far as possible.</t>
      <t>Note that all JMAP servers support internationalized email addresses
(see <xref target="RFC6530"/>).  If this IMAP server does not, or the IMAP client
does not issue ENABLE UTF8=ACCEPT (see <xref target="RFC6855"/>), then there is a
possibility that the client receives accurate address fields via JMAP
and downgraded fields via IMAP (see (see <xref target="RFC6857"/> and <xref target="RFC6858"/>
for examples).</t>
      <t>Open issue: What about MAILBOXID?</t>
    </section>
    <section anchor="the-jmapaccess-response-code">
      <name>The JMAPACCESS Response Code</name>
      <t>The JMAPACCESS response code is followed by a single link to a JMAP
session resource. The server/mailstore at that location is referenced
as "the JMAP server" in this document.</t>
      <t>The formal syntax in <xref target="RFC9051"/> is extended thus:</t>
      <t>resp-code-jmap = "JMAPACCESS" SP string</t>
      <t>resp-text-code =/ resp-code-jmap</t>
      <t>Open issue: This means that the link cannot contain a "]" character.
This seems like a nonissue in practice but difficult as a matter of
protocol hygiene.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>The IANA is requested to add the JMAPACCESS response code to the IMAP
Response Codes registry.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>This extension reveals to clients why they cannot auhenticate to the
JMAP server. One normally does not want to reveal anything about why a
client cannot authenticate, for fear of giving useful information to
an intruder.</t>
      <t>However, in this case the client has already authenticated via
IMAP. By doing so the client already gained access to all of the same
mail. The authors believe that the debugging value of the OK response
far outweighs its security concerns.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC8474" target="https://www.rfc-editor.org/info/rfc8474">
          <front>
            <title>IMAP Extension for Object Identifiers</title>
            <author fullname="B. Gondwana" initials="B." role="editor" surname="Gondwana">
              <organization/>
            </author>
            <date month="September" year="2018"/>
            <abstract>
              <t>This document updates RFC 3501 (IMAP4rev1) with persistent identifiers on mailboxes and messages to allow clients to more efficiently reuse cached data when resources have changed location on the server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8474"/>
          <seriesInfo name="DOI" value="10.17487/RFC8474"/>
        </reference>
        <reference anchor="RFC9051" target="https://www.rfc-editor.org/info/rfc9051">
          <front>
            <title>Internet Message Access Protocol (IMAP) - Version 4rev2</title>
            <author fullname="A. Melnikov" initials="A." role="editor" surname="Melnikov">
              <organization/>
            </author>
            <author fullname="B. Leiba" initials="B." role="editor" surname="Leiba">
              <organization/>
            </author>
            <date month="August" year="2021"/>
            <abstract>
              <t>The Internet Message Access Protocol Version 4rev2 (IMAP4rev2) allows a client to access and manipulate electronic mail messages on a server.  IMAP4rev2 permits manipulation of mailboxes (remote message folders) in a way that is functionally equivalent to local folders.  IMAP4rev2 also provides the capability for an offline client to resynchronize with the server. </t>
              <t>IMAP4rev2 includes operations for creating, deleting, and renaming mailboxes; checking for new messages; removing messages permanently; setting and clearing flags; parsing per RFCs 5322, 2045, and 2231; searching; and selective fetching of message attributes, texts, and portions thereof.  Messages in IMAP4rev2 are accessed by the use of numbers. These numbers are either message sequence numbers or unique identifiers. </t>
              <t>IMAP4rev2 does not specify a means of posting mail; this function is handled by a mail submission protocol such as the one specified in RFC 6409.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9051"/>
          <seriesInfo name="DOI" value="10.17487/RFC9051"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC2444" target="https://www.rfc-editor.org/info/rfc2444">
          <front>
            <title>The One-Time-Password SASL Mechanism</title>
            <author fullname="C. Newman" initials="C." surname="Newman">
              <organization/>
            </author>
            <date month="October" year="1998"/>
            <abstract>
              <t>OTP provides a useful authentication mechanism for situations where there is limited client or server trust.  Currently, OTP is added to protocols in an ad-hoc fashion with heuristic parsing.  This specification defines an OTP SASL mechanism so it can be easily and formally integrated into many application protocols.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2444"/>
          <seriesInfo name="DOI" value="10.17487/RFC2444"/>
        </reference>
        <reference anchor="RFC6530" target="https://www.rfc-editor.org/info/rfc6530">
          <front>
            <title>Overview and Framework for Internationalized Email</title>
            <author fullname="J. Klensin" initials="J." surname="Klensin">
              <organization/>
            </author>
            <author fullname="Y. Ko" initials="Y." surname="Ko">
              <organization/>
            </author>
            <date month="February" year="2012"/>
            <abstract>
              <t>Full use of electronic mail throughout the world requires that (subject to other constraints) people be able to use close variations on their own names (written correctly in their own languages and scripts) as mailbox names in email addresses.  This document introduces a series of specifications that define mechanisms and protocol extensions needed to fully support internationalized email addresses.  These changes include an SMTP extension and extension of email header syntax to accommodate UTF-8 data.  The document set also includes discussion of key assumptions and issues in deploying fully internationalized email.  This document is a replacement for RFC 4952; it reflects additional issues identified since that document was published.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6530"/>
          <seriesInfo name="DOI" value="10.17487/RFC6530"/>
        </reference>
        <reference anchor="RFC6855" target="https://www.rfc-editor.org/info/rfc6855">
          <front>
            <title>IMAP Support for UTF-8</title>
            <author fullname="P. Resnick" initials="P." role="editor" surname="Resnick">
              <organization/>
            </author>
            <author fullname="C. Newman" initials="C." role="editor" surname="Newman">
              <organization/>
            </author>
            <author fullname="S. Shen" initials="S." role="editor" surname="Shen">
              <organization/>
            </author>
            <date month="March" year="2013"/>
            <abstract>
              <t>This specification extends the Internet Message Access Protocol (IMAP) to support UTF-8 encoded international characters in user names, mail addresses, and message headers. This specification replaces RFC 5738.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6855"/>
          <seriesInfo name="DOI" value="10.17487/RFC6855"/>
        </reference>
        <reference anchor="RFC6857" target="https://www.rfc-editor.org/info/rfc6857">
          <front>
            <title>Post-Delivery Message Downgrading for Internationalized Email Messages</title>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara">
              <organization/>
            </author>
            <date month="March" year="2013"/>
            <abstract>
              <t>The Email Address Internationalization (SMTPUTF8) extension to SMTP allows Unicode characters encoded in UTF-8 and outside the ASCII repertoire in mail header fields.  Upgraded POP and IMAP servers support internationalized messages.  If a POP or IMAP client does not support Email Address Internationalization, a POP or IMAP server cannot deliver internationalized messages to the client and cannot remove the message.  To avoid that situation, this document describes a mechanism for converting internationalized messages into the traditional message format.  As part of the conversion process, message elements that require internationalized treatment are recoded or removed, and receivers are able to recognize that they received messages containing such elements, even if they cannot process the internationalized elements.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6857"/>
          <seriesInfo name="DOI" value="10.17487/RFC6857"/>
        </reference>
        <reference anchor="RFC6858" target="https://www.rfc-editor.org/info/rfc6858">
          <front>
            <title>Simplified POP and IMAP Downgrading for Internationalized Email</title>
            <author fullname="A. Gulbrandsen" initials="A." surname="Gulbrandsen">
              <organization/>
            </author>
            <date month="March" year="2013"/>
            <abstract>
              <t>This document specifies a method for IMAP and POP servers to serve internationalized messages to conventional clients.  The specification is simple, easy to implement, and provides only rudimentary results.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6858"/>
          <seriesInfo name="DOI" value="10.17487/RFC6858"/>
        </reference>
        <reference anchor="RFC7628" target="https://www.rfc-editor.org/info/rfc7628">
          <front>
            <title>A Set of Simple Authentication and Security Layer (SASL) Mechanisms for OAuth</title>
            <author fullname="W. Mills" initials="W." surname="Mills">
              <organization/>
            </author>
            <author fullname="T. Showalter" initials="T." surname="Showalter">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <date month="August" year="2015"/>
            <abstract>
              <t>OAuth enables a third-party application to obtain limited access to a protected resource, either on behalf of a resource owner by orchestrating an approval interaction or by allowing the third-party application to obtain access on its own behalf.</t>
              <t>This document defines how an application client uses credentials obtained via OAuth over the Simple Authentication and Security Layer (SASL) to access a protected resource at a resource server.  Thereby, it enables schemes defined within the OAuth framework for non-HTTP-based application protocols.</t>
              <t>Clients typically store the user's long-term credential.  This does, however, lead to significant security vulnerabilities, for example, when such a credential leaks.  A significant benefit of OAuth for usage in those clients is that the password is replaced by a shared secret with higher entropy, i.e., the token.  Tokens typically provide limited access rights and can be managed and revoked separately from the user's long-term password.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7628"/>
          <seriesInfo name="DOI" value="10.17487/RFC7628"/>
        </reference>
        <reference anchor="RFC8620" target="https://www.rfc-editor.org/info/rfc8620">
          <front>
            <title>The JSON Meta Application Protocol (JMAP)</title>
            <author fullname="N. Jenkins" initials="N." surname="Jenkins">
              <organization/>
            </author>
            <author fullname="C. Newman" initials="C." surname="Newman">
              <organization/>
            </author>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document specifies a protocol for clients to efficiently query, fetch, and modify JSON-based data objects, with support for push notification of changes and fast resynchronisation and for out-of- band binary data upload/download.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8620"/>
          <seriesInfo name="DOI" value="10.17487/RFC8620"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
