<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-extra-jmapaccess-02" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.3 -->
  <front>
    <title abbrev="IMAP JMAPACCESS">The JMAPACCESS Extension for IMAP</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-extra-jmapaccess-02"/>
    <author initials="A." surname="Gulbrandsen" fullname="Arnt Gulbrandsen">
      <organization>ICANN</organization>
      <address>
        <postal>
          <street>6 Rond Point Schumann, Bd. 1</street>
          <city>Brussels</city>
          <code>1040</code>
          <country>Belgium</country>
        </postal>
        <email>arnt@gulbrandsen.priv.no</email>
        <uri>https://icann.org/ua</uri>
      </address>
    </author>
    <author initials="B." surname="Gondwana" fullname="Bron Gondwana">
      <organization>Fastmail</organization>
      <address>
        <postal>
          <street>Level 2, 114 William St.</street>
          <city>Melbourne VIC</city>
          <code>3000</code>
          <country>Australia</country>
        </postal>
        <email>brong@fastmailteam.com</email>
        <uri>https://fastmail.com</uri>
      </address>
    </author>
    <date year="2023" month="January" day="16"/>
    <area>Applications</area>
    <workgroup>EXTRA</workgroup>
    <keyword>IMAP</keyword>
    <keyword>JMAP</keyword>
    <abstract>
      <t>This document defines an IMAP extension to let clients know that the
messages in this IMAP server are also available via JMAP, and how. It is
intended for clients that want to migrate gradually to JMAP.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>A few IMAP client maintainers have asked for ways to use features that
are available in JMAP without having to drop their expensively tested
IMAP code.</t>
      <t>This document provides a server with a way to declare that the
messages in its mailstore are also available via JMAP. For simplicity,
only a complete equivalence is supported (the same set of messages are
available via both IMAP and JMAP).</t>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="details">
      <name>Details</name>
      <t>By advertising the JMAPACCESS capability, the server asserts that if a
mailbox or message has a particular object ID when accessed via either
IMAP or JMAP (see <xref target="RFC3501"/>, <xref target="RFC9051"/> and <xref target="RFC8620"/>), then the
same mailbox or message is accessible via the other protocol, and it
has the same ID.</t>
      <t>The server <bcp14>MUST</bcp14> also advertise the OBJECTID extension, defined by
<xref target="RFC8474"/>. The JMAP session resource that allows access to the same
messages is called "the JMAP server" below.</t>
      <t>This specification does not affect message lifetime: If a client
accesses a message via IMAP and half a second later via JMAP, then the
message may have been deleted.</t>
      <t>When the server processes the client's LOGIN/AUTHENTICATE command and
enters Authenticated state, the server considers the way the client
authenticated. If the same authentication would work with the JMAP
server, then the server <bcp14>MUST</bcp14> also send an untagged OK response with a
JMAPACCESS response code containing a link to the JMAP server.</t>
      <t>If the authentication would not succeed with the JMAP server, then the
server <bcp14>SHOULD</bcp14> send an untagged OK response with a DEBUGGING response
code and some human-readable text to help client developers understand
why this authentication would not work with the JMAP server.</t>
      <t>Some authentication methods use tokens that change depending on time
or sequence. One-time passwords (see <xref target="RFC2444"/>) and Oauth (see
<xref target="RFC7628"/>) are good examples. In these cases, JMAPACCESS requires
that this server and the JMAP server use the same sequence. To take
Oauth as an example, an access token is equally valid with both
protocols, no matter which server issued it.</t>
      <t>Servers are encouraged to report the same message flags and other data
via both protocols, as far as possible.</t>
      <t>This specification does not require mailboxes to have the same name in
IMAP and JMAP, even if they share mailbox ID. However, the JMAP
specification regulates that, in the text about the name and role
properties in <xref target="RFC8620"/> section 2.</t>
      <t>Note that all JMAP servers support internationalized email addresses
(see <xref target="RFC6530"/>).  If this IMAP server does not, or the IMAP client
does not issue ENABLE UTF8=ACCEPT (see <xref target="RFC6855"/>), then there is a
possibility that the client receives accurate address fields via JMAP
and downgraded fields via IMAP (see (see <xref target="RFC6857"/> and <xref target="RFC6858"/>
for examples).</t>
    </section>
    <section anchor="the-jmapaccess-and-debugging-response-codes">
      <name>The JMAPACCESS and DEBUGGING Response Codes</name>
      <t>The JMAPACCESS response code is followed by a single link to a JMAP
session resource. The server/mailstore at that location is referenced
as "the JMAP server" in this document.</t>
      <t>The DEBUGGING response code asserts that when used with a status
response, the client may safely forward the human-readable text to the
client maintainers. The human-readable text <bcp14>MUST NOT</bcp14> contain any
message contents or other personal information.</t>
      <t>The formal syntax in <xref target="RFC9051"/> is extended thus:</t>
      <t>resp-code-jmap = "JMAPACCESS" SP string / "DEBUGGING"</t>
      <t>resp-text-code =/ resp-code-jmap</t>
      <t>Note that the link cannot contain a "]" character.</t>
      <t>The syntax in <xref target="RFC3501"/> is extended similarly (this extension may be
used with IMAP4rev1 as well as IMAP4rev2).</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>The IANA is requested to add the JMAPACCESS and DEBUGGING response
codes to the IMAP Response Codes registry.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>This extension reveals to clients why they cannot auhenticate to the
JMAP server. One normally does not want to reveal anything about why a
client cannot authenticate, for fear of giving useful information to
an intruder.</t>
      <t>However, in this case the client has already authenticated via
IMAP. By doing so the client already gained access to all of the same
mail. The authors believe that the debugging value of the OK response
far outweighs its security concerns.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC3501" target="https://www.rfc-editor.org/info/rfc3501">
          <front>
            <title>INTERNET MESSAGE ACCESS PROTOCOL - VERSION 4rev1</title>
            <author fullname="M. Crispin" initials="M." surname="Crispin">
              <organization/>
            </author>
            <date month="March" year="2003"/>
            <abstract>
              <t>The Internet Message Access Protocol, Version 4rev1 (IMAP4rev1) allows a client to access and manipulate electronic mail messages on a server. IMAP4rev1 permits manipulation of mailboxes (remote message folders) in a way that is functionally equivalent to local folders.  IMAP4rev1 also provides the capability for an offline client to resynchronize with the server. IMAP4rev1 includes operations for creating, deleting, and renaming mailboxes, checking for new messages, permanently removing messages, setting and clearing flags, RFC 2822 and RFC 2045 parsing, searching, and selective fetching of message attributes, texts, and portions thereof.  Messages in IMAP4rev1 are accessed by the use of numbers. These numbers are either message sequence numbers or unique identifiers. IMAP4rev1 supports a single server.  A mechanism for accessing configuration information to support multiple IMAP4rev1 servers is discussed in RFC 2244. IMAP4rev1 does not specify a means of posting mail; this function is handled by a mail transfer protocol such as RFC 2821.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3501"/>
          <seriesInfo name="DOI" value="10.17487/RFC3501"/>
        </reference>
        <reference anchor="RFC8474" target="https://www.rfc-editor.org/info/rfc8474">
          <front>
            <title>IMAP Extension for Object Identifiers</title>
            <author fullname="B. Gondwana" initials="B." role="editor" surname="Gondwana">
              <organization/>
            </author>
            <date month="September" year="2018"/>
            <abstract>
              <t>This document updates RFC 3501 (IMAP4rev1) with persistent identifiers on mailboxes and messages to allow clients to more efficiently reuse cached data when resources have changed location on the server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8474"/>
          <seriesInfo name="DOI" value="10.17487/RFC8474"/>
        </reference>
        <reference anchor="RFC9051" target="https://www.rfc-editor.org/info/rfc9051">
          <front>
            <title>Internet Message Access Protocol (IMAP) - Version 4rev2</title>
            <author fullname="A. Melnikov" initials="A." role="editor" surname="Melnikov">
              <organization/>
            </author>
            <author fullname="B. Leiba" initials="B." role="editor" surname="Leiba">
              <organization/>
            </author>
            <date month="August" year="2021"/>
            <abstract>
              <t>The Internet Message Access Protocol Version 4rev2 (IMAP4rev2) allows a client to access and manipulate electronic mail messages on a server.  IMAP4rev2 permits manipulation of mailboxes (remote message folders) in a way that is functionally equivalent to local folders.  IMAP4rev2 also provides the capability for an offline client to resynchronize with the server. </t>
              <t>IMAP4rev2 includes operations for creating, deleting, and renaming mailboxes; checking for new messages; removing messages permanently; setting and clearing flags; parsing per RFCs 5322, 2045, and 2231; searching; and selective fetching of message attributes, texts, and portions thereof.  Messages in IMAP4rev2 are accessed by the use of numbers. These numbers are either message sequence numbers or unique identifiers. </t>
              <t>IMAP4rev2 does not specify a means of posting mail; this function is handled by a mail submission protocol such as the one specified in RFC 6409.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9051"/>
          <seriesInfo name="DOI" value="10.17487/RFC9051"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC2444" target="https://www.rfc-editor.org/info/rfc2444">
          <front>
            <title>The One-Time-Password SASL Mechanism</title>
            <author fullname="C. Newman" initials="C." surname="Newman">
              <organization/>
            </author>
            <date month="October" year="1998"/>
            <abstract>
              <t>OTP provides a useful authentication mechanism for situations where there is limited client or server trust.  Currently, OTP is added to protocols in an ad-hoc fashion with heuristic parsing.  This specification defines an OTP SASL mechanism so it can be easily and formally integrated into many application protocols.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2444"/>
          <seriesInfo name="DOI" value="10.17487/RFC2444"/>
        </reference>
        <reference anchor="RFC6530" target="https://www.rfc-editor.org/info/rfc6530">
          <front>
            <title>Overview and Framework for Internationalized Email</title>
            <author fullname="J. Klensin" initials="J." surname="Klensin">
              <organization/>
            </author>
            <author fullname="Y. Ko" initials="Y." surname="Ko">
              <organization/>
            </author>
            <date month="February" year="2012"/>
            <abstract>
              <t>Full use of electronic mail throughout the world requires that (subject to other constraints) people be able to use close variations on their own names (written correctly in their own languages and scripts) as mailbox names in email addresses.  This document introduces a series of specifications that define mechanisms and protocol extensions needed to fully support internationalized email addresses.  These changes include an SMTP extension and extension of email header syntax to accommodate UTF-8 data.  The document set also includes discussion of key assumptions and issues in deploying fully internationalized email.  This document is a replacement for RFC 4952; it reflects additional issues identified since that document was published.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6530"/>
          <seriesInfo name="DOI" value="10.17487/RFC6530"/>
        </reference>
        <reference anchor="RFC6855" target="https://www.rfc-editor.org/info/rfc6855">
          <front>
            <title>IMAP Support for UTF-8</title>
            <author fullname="P. Resnick" initials="P." role="editor" surname="Resnick">
              <organization/>
            </author>
            <author fullname="C. Newman" initials="C." role="editor" surname="Newman">
              <organization/>
            </author>
            <author fullname="S. Shen" initials="S." role="editor" surname="Shen">
              <organization/>
            </author>
            <date month="March" year="2013"/>
            <abstract>
              <t>This specification extends the Internet Message Access Protocol (IMAP) to support UTF-8 encoded international characters in user names, mail addresses, and message headers. This specification replaces RFC 5738.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6855"/>
          <seriesInfo name="DOI" value="10.17487/RFC6855"/>
        </reference>
        <reference anchor="RFC6857" target="https://www.rfc-editor.org/info/rfc6857">
          <front>
            <title>Post-Delivery Message Downgrading for Internationalized Email Messages</title>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara">
              <organization/>
            </author>
            <date month="March" year="2013"/>
            <abstract>
              <t>The Email Address Internationalization (SMTPUTF8) extension to SMTP allows Unicode characters encoded in UTF-8 and outside the ASCII repertoire in mail header fields.  Upgraded POP and IMAP servers support internationalized messages.  If a POP or IMAP client does not support Email Address Internationalization, a POP or IMAP server cannot deliver internationalized messages to the client and cannot remove the message.  To avoid that situation, this document describes a mechanism for converting internationalized messages into the traditional message format.  As part of the conversion process, message elements that require internationalized treatment are recoded or removed, and receivers are able to recognize that they received messages containing such elements, even if they cannot process the internationalized elements.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6857"/>
          <seriesInfo name="DOI" value="10.17487/RFC6857"/>
        </reference>
        <reference anchor="RFC6858" target="https://www.rfc-editor.org/info/rfc6858">
          <front>
            <title>Simplified POP and IMAP Downgrading for Internationalized Email</title>
            <author fullname="A. Gulbrandsen" initials="A." surname="Gulbrandsen">
              <organization/>
            </author>
            <date month="March" year="2013"/>
            <abstract>
              <t>This document specifies a method for IMAP and POP servers to serve internationalized messages to conventional clients.  The specification is simple, easy to implement, and provides only rudimentary results.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6858"/>
          <seriesInfo name="DOI" value="10.17487/RFC6858"/>
        </reference>
        <reference anchor="RFC7628" target="https://www.rfc-editor.org/info/rfc7628">
          <front>
            <title>A Set of Simple Authentication and Security Layer (SASL) Mechanisms for OAuth</title>
            <author fullname="W. Mills" initials="W." surname="Mills">
              <organization/>
            </author>
            <author fullname="T. Showalter" initials="T." surname="Showalter">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <date month="August" year="2015"/>
            <abstract>
              <t>OAuth enables a third-party application to obtain limited access to a protected resource, either on behalf of a resource owner by orchestrating an approval interaction or by allowing the third-party application to obtain access on its own behalf.</t>
              <t>This document defines how an application client uses credentials obtained via OAuth over the Simple Authentication and Security Layer (SASL) to access a protected resource at a resource server.  Thereby, it enables schemes defined within the OAuth framework for non-HTTP-based application protocols.</t>
              <t>Clients typically store the user's long-term credential.  This does, however, lead to significant security vulnerabilities, for example, when such a credential leaks.  A significant benefit of OAuth for usage in those clients is that the password is replaced by a shared secret with higher entropy, i.e., the token.  Tokens typically provide limited access rights and can be managed and revoked separately from the user's long-term password.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7628"/>
          <seriesInfo name="DOI" value="10.17487/RFC7628"/>
        </reference>
        <reference anchor="RFC8620" target="https://www.rfc-editor.org/info/rfc8620">
          <front>
            <title>The JSON Meta Application Protocol (JMAP)</title>
            <author fullname="N. Jenkins" initials="N." surname="Jenkins">
              <organization/>
            </author>
            <author fullname="C. Newman" initials="C." surname="Newman">
              <organization/>
            </author>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document specifies a protocol for clients to efficiently query, fetch, and modify JSON-based data objects, with support for push notification of changes and fast resynchronisation and for out-of- band binary data upload/download.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8620"/>
          <seriesInfo name="DOI" value="10.17487/RFC8620"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
