<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.2 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-extra-jmapaccess-06" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.2 -->
  <front>
    <title abbrev="IMAP JMAPACCESS">The JMAPACCESS Extension for IMAP</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-extra-jmapaccess"/>
    <author initials="A." surname="Gulbrandsen" fullname="Arnt Gulbrandsen">
      <organization>ICANN</organization>
      <address>
        <postal>
          <street>6 Rond Point Schumann, Bd. 1</street>
          <city>Brussels</city>
          <code>1040</code>
          <country>Belgium</country>
        </postal>
        <email>arnt@gulbrandsen.priv.no</email>
        <uri>https://icann.org/ua</uri>
      </address>
    </author>
    <author initials="B." surname="Gondwana" fullname="Bron Gondwana">
      <organization>Fastmail</organization>
      <address>
        <postal>
          <street>Level 2, 114 William St.</street>
          <city>Melbourne VIC</city>
          <code>3000</code>
          <country>Australia</country>
        </postal>
        <email>brong@fastmailteam.com</email>
        <uri>https://fastmail.com</uri>
      </address>
    </author>
    <date year="2023" month="November" day="07"/>
    <area>Applications</area>
    <workgroup>EXTRA</workgroup>
    <keyword>IMAP</keyword>
    <keyword>JMAP</keyword>
    <abstract>
      <?line 51?>

<t>This document defines an IMAP extension to let clients know that the
messages in this IMAP server are also available via JMAP, and how. It is
intended for clients that want to migrate gradually to JMAP or use
JMAP extensions within an IMAP client.</t>
    </abstract>
  </front>
  <middle>
    <?line 58?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>An IMAP server can declare that the messages in its mailstore are also
available via JMAP. For simplicity, only a complete equivalence is
supported (the same set of messages are available via both IMAP and
JMAP).</t>
      <t>This can be useful for clients that have well-tested IMAP code and want to
use one or more JMAP features. For example, JMAP offers a way to be
notified about new incoming mail without having to maintain an open TCP
connection.</t>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="details">
      <name>Details</name>
      <t>By advertising the JMAPACCESS capability, the server asserts that if a
mailbox or message has a particular object ID when accessed via either
IMAP or JMAP (see <xref target="RFC3501"/>, <xref target="RFC9051"/> and <xref target="RFC8620"/>), then the
same mailbox or message is accessible via the other protocol, and it
has the same ID.</t>
      <t>The server <bcp14>MUST</bcp14> also advertise the OBJECTID extension, defined by
<xref target="RFC8474"/>. The JMAP session resource that allows access to the same
messages is called "the JMAP server" below.</t>
      <t>This specification does not affect message lifetime: If a client
accesses a message via IMAP and half a second later via JMAP, then the
message may have been deleted between the two accesses.</t>
      <t>When the server processes the client's LOGIN/AUTHENTICATE command and
enters Authenticated state, the server considers the way the client
authenticated. If the IMAP server can infer from the client's
authentication process that its credentials suffice to authenticate
via JMAP, then the server <bcp14>MUST</bcp14> also send a JMAPACCESS response code
containing a link to the JMAP server.</t>
      <t>Servers are encouraged to report the same message flags and other data
via both protocols, as far as possible.</t>
      <t>This specification does not require mailboxes to have the same name in
IMAP and JMAP, even if they share mailbox ID. However, the JMAP
specification regulates that, in the text about the name and role
properties in <xref target="RFC8620"/> section 2.</t>
      <t>Note that all JMAP servers support internationalized email addresses
(see <xref target="RFC6530"/>).  If this IMAP server does not, or the IMAP client
does not issue ENABLE UTF8=ACCEPT (see <xref target="RFC6855"/>), then there is a
possibility that the client receives accurate address fields via JMAP
and downgraded fields via IMAP (see (see <xref target="RFC6857"/> and <xref target="RFC6858"/>
for examples). Issuing ENABLE UTF8=ACCEPT is a simple way to sidestep
the issue.</t>
    </section>
    <section anchor="the-jmapaccess-response-code">
      <name>The JMAPACCESS Response Code</name>
      <t>The JMAPACCESS response code is followed by a single link to a JMAP
session resource. The server/mailstore at that location is referenced
as "the JMAP server" in this document.</t>
      <t>The formal syntax in <xref target="RFC9051"/> is extended thus:</t>
      <t>resp-code-jmapaccess = "JMAPACCESS" SP (atom / quoted)</t>
      <t>resp-text-code =/ resp-code-jmapaccess</t>
      <t>The syntax in <xref target="RFC3501"/> is extended similarly (this extension may be
used with IMAP4rev1 as well as IMAP4rev2).</t>
    </section>
    <section anchor="Examples">
      <name>Examples</name>
      <t>Lines sent by the client are preceded by C:, lines sent by the server
by S:. Each example starts with the IMAP banner issued by the server
on connection, and generally abbreviates the capability lists to
what's required by the example itself.</t>
      <t>Real connections use longer capability lists, much longer AUTHENTICATE
arguments and of course use TLS. These examples focus on JMAPACCESS,
though.</t>
      <t>Example 1. A client connects, sees that SASL OAUTH is available, and
authenticates in that way.</t>
      <t>S: * OK [CAPABILITY IMAP4rev1 AUTH=OAUTHBEARER SASL-IR] example1<br/>
C: 1 AUTHENTICATE OAUTHBEARER bixhPXVzZ...QEB</t>
      <t>The server processes the command successfully. It knows that the
client used Oauth, and that it and its JMAP alter ego use the same
Oauth backend subsystem. Because of that it infers that the (next)
access token is just as usable via JMAP as via IMAP. It issues a
JMAPACCESS response code in its reply:</t>
      <t>S: 1 OK [JMAPACCESS https://example.com/jmap] done</t>
      <t>SASL OAUTH is specified by <xref target="RFC7628"/>, and the argument in this
example is abbreviated from the more realistic length used in RFC7628.</t>
      <t>Example 2. A client connects, sees no SASL method it recognises, and
issues a LOGIN command.</t>
      <t>S: * OK [CAPABILITY IMAP4rev2] example2<br/>
C: 2 LOGIN "arnt" "trondheim"</t>
      <t>The server sees that the password is accepted, knows that it and its
JMAP alter ego use the same password database, and issues a JMAPACCESS
response code:</t>
      <t>S: * OK [JMAPACCESS "https://example.com/.s/[jmap]"] For JMAP access
S: 2 OK done</t>
      <t>The URL is quoted since the ] character must be quoted. The URL uses
the same quoting rules as most other IMAP strings.</t>
      <t>Example 3. A client connects, sees no SASL method it recognises, and
issues a LOGIN command with a correct password.</t>
      <t>S: * OK [CAPABILITY IMAP4rev1 IMAP4rev2] example3<br/>
C: 3 LOGIN "arnt" "trondheim"</t>
      <t>The server operator has decided to disable password use with JMAP, but
allow it for a while with IMAP to cater to older clients, so the login
succeeds, but there is no JMAPACCESS response code.</t>
      <t>S: 3 OK done</t>
      <t>The message is quoted since it contains spaces. The message uses the
same quoting rules as most other IMAP strings.</t>
      <t>Example 4. A client connects, sees no SASL method it recognises, and
issues a LOGIN command. Its password is incorrect.</t>
      <t>S: * OK [CAPABILITY IMAP4rev2 AUTH=GSS] example4<br/>
C: 4 LOGIN "arnt" "oslo"</t>
      <t>The server does not enter Authenticated state, so nothing requires it
to issue JMAPACCESS. It replies curtly:</t>
      <t>S: 4 NO done</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>This document suggests that servers reveal something to clients about
how/whether their credentials would work for another server. One normally
does not want to reveal anything at all about why a client cannot
authenticate, for fear of giving useful information to an intruder.</t>
      <t>However, in this case the client has already authenticated via IMAP. By
doing so the client already gained access to all of the same mail. The
authors believe that telling the client that it can use JMAP presents no
additional risk.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>The IANA is requested to add the JMAPACCESS response code to the IMAP
Response Codes registry, with this document as reference.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3501">
          <front>
            <title>INTERNET MESSAGE ACCESS PROTOCOL - VERSION 4rev1</title>
            <author fullname="M. Crispin" initials="M." surname="Crispin"/>
            <date month="March" year="2003"/>
            <abstract>
              <t>The Internet Message Access Protocol, Version 4rev1 (IMAP4rev1) allows a client to access and manipulate electronic mail messages on a server. IMAP4rev1 permits manipulation of mailboxes (remote message folders) in a way that is functionally equivalent to local folders. IMAP4rev1 also provides the capability for an offline client to resynchronize with the server. IMAP4rev1 includes operations for creating, deleting, and renaming mailboxes, checking for new messages, permanently removing messages, setting and clearing flags, RFC 2822 and RFC 2045 parsing, searching, and selective fetching of message attributes, texts, and portions thereof. Messages in IMAP4rev1 are accessed by the use of numbers. These numbers are either message sequence numbers or unique identifiers. IMAP4rev1 supports a single server. A mechanism for accessing configuration information to support multiple IMAP4rev1 servers is discussed in RFC 2244. IMAP4rev1 does not specify a means of posting mail; this function is handled by a mail transfer protocol such as RFC 2821. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3501"/>
          <seriesInfo name="DOI" value="10.17487/RFC3501"/>
        </reference>
        <reference anchor="RFC8474">
          <front>
            <title>IMAP Extension for Object Identifiers</title>
            <author fullname="B. Gondwana" initials="B." role="editor" surname="Gondwana"/>
            <date month="September" year="2018"/>
            <abstract>
              <t>This document updates RFC 3501 (IMAP4rev1) with persistent identifiers on mailboxes and messages to allow clients to more efficiently reuse cached data when resources have changed location on the server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8474"/>
          <seriesInfo name="DOI" value="10.17487/RFC8474"/>
        </reference>
        <reference anchor="RFC9051">
          <front>
            <title>Internet Message Access Protocol (IMAP) - Version 4rev2</title>
            <author fullname="A. Melnikov" initials="A." role="editor" surname="Melnikov"/>
            <author fullname="B. Leiba" initials="B." role="editor" surname="Leiba"/>
            <date month="August" year="2021"/>
            <abstract>
              <t>The Internet Message Access Protocol Version 4rev2 (IMAP4rev2) allows a client to access and manipulate electronic mail messages on a server. IMAP4rev2 permits manipulation of mailboxes (remote message folders) in a way that is functionally equivalent to local folders. IMAP4rev2 also provides the capability for an offline client to resynchronize with the server.</t>
              <t>IMAP4rev2 includes operations for creating, deleting, and renaming mailboxes; checking for new messages; removing messages permanently; setting and clearing flags; parsing per RFCs 5322, 2045, and 2231; searching; and selective fetching of message attributes, texts, and portions thereof. Messages in IMAP4rev2 are accessed by the use of numbers. These numbers are either message sequence numbers or unique identifiers.</t>
              <t>IMAP4rev2 does not specify a means of posting mail; this function is handled by a mail submission protocol such as the one specified in RFC 6409.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9051"/>
          <seriesInfo name="DOI" value="10.17487/RFC9051"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6530">
          <front>
            <title>Overview and Framework for Internationalized Email</title>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="Y. Ko" initials="Y." surname="Ko"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>Full use of electronic mail throughout the world requires that (subject to other constraints) people be able to use close variations on their own names (written correctly in their own languages and scripts) as mailbox names in email addresses. This document introduces a series of specifications that define mechanisms and protocol extensions needed to fully support internationalized email addresses. These changes include an SMTP extension and extension of email header syntax to accommodate UTF-8 data. The document set also includes discussion of key assumptions and issues in deploying fully internationalized email. This document is a replacement for RFC 4952; it reflects additional issues identified since that document was published. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6530"/>
          <seriesInfo name="DOI" value="10.17487/RFC6530"/>
        </reference>
        <reference anchor="RFC6855">
          <front>
            <title>IMAP Support for UTF-8</title>
            <author fullname="P. Resnick" initials="P." role="editor" surname="Resnick"/>
            <author fullname="C. Newman" initials="C." role="editor" surname="Newman"/>
            <author fullname="S. Shen" initials="S." role="editor" surname="Shen"/>
            <date month="March" year="2013"/>
            <abstract>
              <t>This specification extends the Internet Message Access Protocol (IMAP) to support UTF-8 encoded international characters in user names, mail addresses, and message headers. This specification replaces RFC 5738.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6855"/>
          <seriesInfo name="DOI" value="10.17487/RFC6855"/>
        </reference>
        <reference anchor="RFC6857">
          <front>
            <title>Post-Delivery Message Downgrading for Internationalized Email Messages</title>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="March" year="2013"/>
            <abstract>
              <t>The Email Address Internationalization (SMTPUTF8) extension to SMTP allows Unicode characters encoded in UTF-8 and outside the ASCII repertoire in mail header fields. Upgraded POP and IMAP servers support internationalized messages. If a POP or IMAP client does not support Email Address Internationalization, a POP or IMAP server cannot deliver internationalized messages to the client and cannot remove the message. To avoid that situation, this document describes a mechanism for converting internationalized messages into the traditional message format. As part of the conversion process, message elements that require internationalized treatment are recoded or removed, and receivers are able to recognize that they received messages containing such elements, even if they cannot process the internationalized elements.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6857"/>
          <seriesInfo name="DOI" value="10.17487/RFC6857"/>
        </reference>
        <reference anchor="RFC6858">
          <front>
            <title>Simplified POP and IMAP Downgrading for Internationalized Email</title>
            <author fullname="A. Gulbrandsen" initials="A." surname="Gulbrandsen"/>
            <date month="March" year="2013"/>
            <abstract>
              <t>This document specifies a method for IMAP and POP servers to serve internationalized messages to conventional clients. The specification is simple, easy to implement, and provides only rudimentary results.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6858"/>
          <seriesInfo name="DOI" value="10.17487/RFC6858"/>
        </reference>
        <reference anchor="RFC7628">
          <front>
            <title>A Set of Simple Authentication and Security Layer (SASL) Mechanisms for OAuth</title>
            <author fullname="W. Mills" initials="W." surname="Mills"/>
            <author fullname="T. Showalter" initials="T." surname="Showalter"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="August" year="2015"/>
            <abstract>
              <t>OAuth enables a third-party application to obtain limited access to a protected resource, either on behalf of a resource owner by orchestrating an approval interaction or by allowing the third-party application to obtain access on its own behalf.</t>
              <t>This document defines how an application client uses credentials obtained via OAuth over the Simple Authentication and Security Layer (SASL) to access a protected resource at a resource server. Thereby, it enables schemes defined within the OAuth framework for non-HTTP-based application protocols.</t>
              <t>Clients typically store the user's long-term credential. This does, however, lead to significant security vulnerabilities, for example, when such a credential leaks. A significant benefit of OAuth for usage in those clients is that the password is replaced by a shared secret with higher entropy, i.e., the token. Tokens typically provide limited access rights and can be managed and revoked separately from the user's long-term password.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7628"/>
          <seriesInfo name="DOI" value="10.17487/RFC7628"/>
        </reference>
        <reference anchor="RFC8620">
          <front>
            <title>The JSON Meta Application Protocol (JMAP)</title>
            <author fullname="N. Jenkins" initials="N." surname="Jenkins"/>
            <author fullname="C. Newman" initials="C." surname="Newman"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document specifies a protocol for clients to efficiently query, fetch, and modify JSON-based data objects, with support for push notification of changes and fast resynchronisation and for out-of- band binary data upload/download.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8620"/>
          <seriesInfo name="DOI" value="10.17487/RFC8620"/>
        </reference>
      </references>
    </references>
    <?line 235?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
