<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-ietf-jmap-mail-sharing-00" category="std" consensus="true" submissionType="IETF" updates="RFC8621" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="JMAP Mail Sharing">JMAP Mail Sharing</title>

    <author initials="M." surname="De Gennaro" fullname="Mauro De Gennaro">
      <organization abbrev="Stalwart Labs">Stalwart Labs LLC</organization>
      <address>
        <postal>
          <street>1309 Coffeen Avenue, Suite 1200</street>
          <city>Sheridan</city>
          <region>WY</region>
          <code>82801</code>
          <country>USA</country>
        </postal>
        <email>mauro@stalw.art</email>
        <uri>https://stalw.art</uri>
      </address>
    </author>

    <date year="2025" month="November" day="29"/>

    
    <workgroup>JMAP</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 38?>

<t>This document specifies an extension to the JSON Meta Application Protocol (JMAP) for Mail to enable sharing of mailboxes between users. Building upon the JMAP Sharing framework defined in <xref target="RFC9670"/>, this specification extends the Mailbox data type defined in <xref target="RFC8621"/> with properties necessary to configure and manage access permissions for shared mailboxes. The extension introduces a new capability that indicates server support for mailbox sharing and defines the additional properties required to share mailboxes with other principals, including the ability to control which users may access a mailbox and what permissions they possess.</t>



    </abstract>



  </front>

  <middle>


<?line 42?>

<section anchor="introduction"><name>Introduction</name>

<t>JMAP (<xref target="RFC8620"/> — JSON Meta Application Protocol) is a generic protocol for synchronizing data, such as mail, calendars or contacts, between a client and a server. It is optimized for mobile and web environments, and aims to provide a consistent interface to different data types.</t>

<t><xref target="RFC8621"/> defines JMAP for Mail, which provides a data model for accessing, organizing, and managing email messages and mailboxes. The specification enables clients to efficiently synchronize mail data with servers and includes support for mailbox hierarchies, message threading, and various mail operations.</t>

<t><xref target="RFC9670"/> subsequently standardized JMAP Sharing, which defines a framework for sharing data between users in collaborative environments. The specification introduces the Principal data type to represent entities (individuals, teams, or resources) and establishes a consistent model for defining shared access to data through the use of access control properties.</t>

<t>However, <xref target="RFC8621"/> was published prior to the standardization of the JMAP Sharing framework in <xref target="RFC9670"/>, and therefore does not incorporate the sharing model into the Mailbox data type. This creates a gap in the ability to share mailboxes using the standardized JMAP sharing mechanisms.</t>

<t>This document bridges that gap by defining how the Mailbox object defined in <xref target="RFC8621"/> is extended to support the sharing framework established in <xref target="RFC9670"/>. This extension enables users to share their mailboxes with other principals using a consistent sharing model that can be applied uniformly across different JMAP data types. The specification defines the necessary properties, permissions, and capability advertisements to enable interoperable mailbox sharing implementations.</t>

<section anchor="notational-conventions"><name>Notational Conventions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="addition-to-the-capabilities-object"><name>Addition to the Capabilities Object</name>

<t>The capabilities object is returned as part of the JMAP Session object; see <xref section="2" sectionFormat="of" target="RFC8620"/>. This document defines one additional capability URI.</t>

<section anchor="urnietfparamsjmapmailshare"><name>urn:ietf:params:jmap:mail:share</name>

<t>This capability indicates server support for sharing mailboxes as defined in this specification. When a server advertises this capability, it signifies that the Mailbox data type has been extended with the sharing properties defined in <xref section="4" sectionFormat="of" target="RFC9670"/> and that clients may use these properties to configure mailbox sharing with other principals.</t>

<t>The value of this property in the JMAP Session "capabilities" property is an empty object.</t>

<t>The value of this property in an account's "accountCapabilities" property is an empty object.</t>

</section>
</section>
</section>
<section anchor="mailbox-sharing"><name>Mailbox Sharing</name>

<t>According to <xref section="4" sectionFormat="of" target="RFC9670"/>, shareable data types <bcp14>MUST</bcp14> define three specific properties to participate in the JMAP sharing framework: <spanx style="verb">isSubscribed</spanx>, <spanx style="verb">myRights</spanx>, and <spanx style="verb">shareWith</spanx>. These properties enable users to control whether they wish to see shared data, understand what permissions they have, and configure who the data is shared with, respectively.</t>

<t>In addition to these three properties, shareable data types <bcp14>SHOULD</bcp14> define a permission within the rights object that indicates whether a user has the authority to share the object with others. This permission controls access to modifying the <spanx style="verb">shareWith</spanx> property.</t>

<t>The Mailbox object defined in <xref section="2" sectionFormat="of" target="RFC8621"/> already includes the <spanx style="verb">isSubscribed</spanx> and <spanx style="verb">myRights</spanx> properties, as mailbox subscription and access control were integral features of the original mail specification. However, the specification did not include the <spanx style="verb">shareWith</spanx> property or define a permission for sharing rights.</t>

<t>This specification extends the JMAP Mailbox object defined in <xref target="RFC8621"/> to include the <spanx style="verb">shareWith</spanx> property as defined below:</t>

<dl>
  <dt><strong>shareWith</strong>: <spanx style="verb">Id[MailboxRights]|null</spanx> (default: null)</dt>
  <dd>
    <t>This is a map configuring who the mailbox is shared with, or null if it is not shared with anyone. Each key in the map is the id of a Principal with whom the mailbox is shared. The value for each key is the set of access rights that Principal has for the mailbox. The account id for the Principals may be found in the <spanx style="verb">urn:ietf:params:jmap:principals:owner</spanx> capability of the Account to which the mailbox belongs. The Principal to which this mailbox belongs <bcp14>MUST NOT</bcp14> be in the map. The property may only be modified if the user has the mayShare right.</t>
  </dd>
</dl>

<t>This specification also extends the JMAP MailboxRights object defined in <xref section="2" sectionFormat="of" target="RFC8621"/> to include the <spanx style="verb">mayShare</spanx> property as defined below. For servers that also support IMAP <xref target="RFC3501"/>, this property corresponds to the IMAP ACL "a" right as defined in <xref target="RFC4314"/>:</t>

<dl newline="true">
  <dt><strong>mayShare</strong>: <spanx style="verb">Boolean</spanx></dt>
  <dd>
    <t>The user may modify the <spanx style="verb">shareWith</spanx> property for this mailbox. For servers supporting IMAP access to the same data, this corresponds to the IMAP ACL "a" right defined in <xref target="RFC4314"/>, which grants the ability to administer access control lists.</t>
  </dd>
</dl>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>All security considerations described in <xref target="RFC8621"/> and <xref target="RFC9670"/> apply to this specification. Additional considerations specific to mailbox sharing are detailed below.</t>

<section anchor="access-control-enforcement"><name>Access Control Enforcement</name>

<t>Servers implementing this specification <bcp14>MUST</bcp14> strictly enforce access controls when sharing mailboxes. When a user has access to a shared mailbox, the server <bcp14>MUST</bcp14> ensure that the user can only perform operations permitted by their assigned rights. As specified in <xref section="9.5" sectionFormat="of" target="RFC8621"/>, servers <bcp14>MUST</bcp14> treat any data the user does not have permission to access as if it did not exist. This principle extends to shared mailboxes: a user with partial access to an account <bcp14>MUST NOT</bcp14> be able to infer the existence of mailboxes or messages they do not have permission to access.</t>

</section>
<section anchor="interaction-with-imap-acls"><name>Interaction with IMAP ACLs</name>

<t>Servers that provide both JMAP and IMAP <xref target="RFC3501"/> access to the same mail store should carefully consider the interaction between JMAP sharing permissions and IMAP ACLs <xref target="RFC4314"/>. The mapping between JMAP MailboxRights and IMAP ACL rights must be consistent and clearly documented. When a mailbox is shared through either interface, the permissions <bcp14>MUST</bcp14> be properly reflected in the other interface to prevent security vulnerabilities arising from inconsistent access control enforcement.</t>

<t>Particular attention must be paid to the <spanx style="verb">mayShare</spanx> right and IMAP ACL "a" right mapping. Servers <bcp14>MUST</bcp14> ensure that granting the <spanx style="verb">mayShare</spanx> permission through JMAP correctly corresponds to granting the "a" right in IMAP, and vice versa. Any discrepancies in permission semantics between the two protocols could lead to privilege escalation or unintended access.</t>

</section>
<section anchor="unauthorized-sharing"><name>Unauthorized Sharing</name>

<t>As noted in <xref section="6.2" sectionFormat="of" target="RFC9670"/>, sharing data with another user can allow an attacker who gains transitory access to an account to establish persistent access by configuring sharing with an attacker-controlled principal. Servers implementing mailbox sharing <bcp14>SHOULD</bcp14> consider requiring additional authentication or confirmation when sharing permissions are modified, particularly when adding new principals to the <spanx style="verb">shareWith</spanx> map or granting elevated permissions such as <spanx style="verb">mayShare</spanx>.</t>

<t>Servers <bcp14>MAY</bcp14> implement audit logging of sharing configuration changes to enable detection of unauthorized modifications. Administrators <bcp14>SHOULD</bcp14> be provided with tools to monitor and review sharing configurations across accounts.</t>

</section>
<section anchor="information-disclosure-through-error-messages"><name>Information Disclosure Through Error Messages</name>

<t>Servers must be cautious not to leak information about the existence of mailboxes or their sharing status through error messages. When a user attempts to access or modify a mailbox they do not have permission to access, the server <bcp14>SHOULD</bcp14> return the same error response as it would if the mailbox did not exist, rather than indicating that access was denied. This prevents users from enumerating shared mailboxes they do not have access to.</t>

<t>Similarly, when a user attempts to share a mailbox with a principal they do not have permission to share with, error messages should not reveal whether such restrictions exist or details about the target principal.</t>

</section>
<section anchor="resource-exhaustion"><name>Resource Exhaustion</name>

<t>Servers <bcp14>SHOULD</bcp14> implement limits on the number of principals with whom a single mailbox may be shared to prevent resource exhaustion attacks. Servers <bcp14>MAY</bcp14> also implement rate limiting on sharing configuration changes to mitigate denial-of-service attacks through excessive modifications to sharing permissions.</t>

<t>As described in <xref section="6.3" sectionFormat="of" target="RFC9670"/>, servers should be prepared to handle scenarios where users create many sharing-related state changes, which could generate numerous ShareNotification objects. Servers <bcp14>SHOULD</bcp14> implement appropriate resource limits and notification coalescing strategies.</t>

</section>
<section anchor="privilege-escalation"><name>Privilege Escalation</name>

<t>Servers <bcp14>MUST</bcp14> ensure that users cannot escalate their own privileges through manipulation of sharing permissions. For example, a user who has been granted limited access to a mailbox <bcp14>MUST NOT</bcp14> be able to grant themselves additional permissions by modifying the <spanx style="verb">shareWith</spanx> property unless they have been explicitly granted the <spanx style="verb">mayShare</spanx> right.</t>

<t>The owner of a mailbox (the Principal associated with the account containing the mailbox) always has implicit full rights to the mailbox. This ownership <bcp14>MUST NOT</bcp14> be transferable through the sharing mechanism, and the owner <bcp14>MUST NOT</bcp14> appear in the <spanx style="verb">shareWith</spanx> map.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA considerations</name>

<section anchor="jmap-capability-registration-for-mailshare"><name>JMAP Capability Registration for "mail:share"</name>

<t>IANA will register the "mail:share" JMAP Capability as follows:</t>

<t><strong>Capability Name:</strong> urn:ietf:params:jmap:mail:share<br />
<strong>Specification document:</strong> this document<br />
<strong>Intended use:</strong> common<br />
<strong>Change Controller:</strong> IETF<br />
<strong>Security and privacy considerations:</strong> this document, <xref target="security-considerations"></xref></t>

</section>
</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC8620">
  <front>
    <title>The JSON Meta Application Protocol (JMAP)</title>
    <author fullname="N. Jenkins" initials="N." surname="Jenkins"/>
    <author fullname="C. Newman" initials="C." surname="Newman"/>
    <date month="July" year="2019"/>
    <abstract>
      <t>This document specifies a protocol for clients to efficiently query, fetch, and modify JSON-based data objects, with support for push notification of changes and fast resynchronisation and for out-of- band binary data upload/download.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8620"/>
  <seriesInfo name="DOI" value="10.17487/RFC8620"/>
</reference>

<reference anchor="RFC8621">
  <front>
    <title>The JSON Meta Application Protocol (JMAP) for Mail</title>
    <author fullname="N. Jenkins" initials="N." surname="Jenkins"/>
    <author fullname="C. Newman" initials="C." surname="Newman"/>
    <date month="August" year="2019"/>
    <abstract>
      <t>This document specifies a data model for synchronising email data with a server using the JSON Meta Application Protocol (JMAP). Clients can use this to efficiently search, access, organise, and send messages, and to get push notifications for fast resynchronisation when new messages are delivered or a change is made in another client.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8621"/>
  <seriesInfo name="DOI" value="10.17487/RFC8621"/>
</reference>

<reference anchor="RFC9670">
  <front>
    <title>JSON Meta Application Protocol (JMAP) Sharing</title>
    <author fullname="N. Jenkins" initials="N." role="editor" surname="Jenkins"/>
    <date month="November" year="2024"/>
    <abstract>
      <t>This document specifies a data model for sharing data between users using the JSON Meta Application Protocol (JMAP). Future documents can reference this document when defining data types to support a consistent model of sharing.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9670"/>
  <seriesInfo name="DOI" value="10.17487/RFC9670"/>
</reference>

<reference anchor="RFC4314">
  <front>
    <title>IMAP4 Access Control List (ACL) Extension</title>
    <author fullname="A. Melnikov" initials="A." surname="Melnikov"/>
    <date month="December" year="2005"/>
    <abstract>
      <t>The Access Control List (ACL) extension (RFC 2086) of the Internet Message Access Protocol (IMAP) permits mailbox access control lists to be retrieved and manipulated through the IMAP protocol.</t>
      <t>This document is a revision of RFC 2086. It defines several new access control rights and clarifies which rights are required for different IMAP commands. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4314"/>
  <seriesInfo name="DOI" value="10.17487/RFC4314"/>
</reference>

<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC3501">
  <front>
    <title>INTERNET MESSAGE ACCESS PROTOCOL - VERSION 4rev1</title>
    <author fullname="M. Crispin" initials="M." surname="Crispin"/>
    <date month="March" year="2003"/>
    <abstract>
      <t>The Internet Message Access Protocol, Version 4rev1 (IMAP4rev1) allows a client to access and manipulate electronic mail messages on a server. IMAP4rev1 permits manipulation of mailboxes (remote message folders) in a way that is functionally equivalent to local folders. IMAP4rev1 also provides the capability for an offline client to resynchronize with the server. IMAP4rev1 includes operations for creating, deleting, and renaming mailboxes, checking for new messages, permanently removing messages, setting and clearing flags, RFC 2822 and RFC 2045 parsing, searching, and selective fetching of message attributes, texts, and portions thereof. Messages in IMAP4rev1 are accessed by the use of numbers. These numbers are either message sequence numbers or unique identifiers. IMAP4rev1 supports a single server. A mechanism for accessing configuration information to support multiple IMAP4rev1 servers is discussed in RFC 2244. IMAP4rev1 does not specify a means of posting mail; this function is handled by a mail transfer protocol such as RFC 2821. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3501"/>
  <seriesInfo name="DOI" value="10.17487/RFC3501"/>
</reference>




    </references>

</references>


<?line 160?>

<section anchor="changes"><name>Changes</name>

<t>[[This section to be removed by RFC Editor]]</t>

<t><strong>draft-ietf-jmap-mail-sharing-00</strong></t>

<t><list style="symbols">
  <t>Initial version</t>
</list></t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

