<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.11 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-extra-jmapaccess-09" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="IMAP JMAPACCESS">The JMAPACCESS Extension for IMAP</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-extra-jmapaccess-09"/>
    <author initials="A." surname="Gulbrandsen" fullname="Arnt Gulbrandsen">
      <organization>ICANN</organization>
      <address>
        <postal>
          <street>6 Rond Point Schumann, Bd. 1</street>
          <city>Brussels</city>
          <code>1040</code>
          <country>Belgium</country>
        </postal>
        <email>arnt@gulbrandsen.priv.no</email>
        <uri>https://icann.org/ua</uri>
      </address>
    </author>
    <author initials="B." surname="Gondwana" fullname="Bron Gondwana">
      <organization>Fastmail</organization>
      <address>
        <postal>
          <street>Level 2, 114 William St.</street>
          <city>Melbourne VIC</city>
          <code>3000</code>
          <country>Australia</country>
        </postal>
        <email>brong@fastmailteam.com</email>
        <uri>https://fastmail.com</uri>
      </address>
    </author>
    <date year="2024" month="May" day="15"/>
    <area>Applications</area>
    <workgroup>EXTRA</workgroup>
    <keyword>IMAP</keyword>
    <keyword>JMAP</keyword>
    <abstract>
      <?line 51?>

<t>This document defines an IMAP extension to let clients know that the
messages in this IMAP server are also available via JMAP, and how. It is
intended for clients that want to migrate gradually to JMAP or use
JMAP extensions within an IMAP client.</t>
    </abstract>
  </front>
  <middle>
    <?line 58?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>An IMAP server can declare that the messages in its mailstore are also
available via JMAP. For simplicity, only a complete equivalence is
supported (the same set of messages are available via both IMAP and
JMAP).</t>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="details">
      <name>Details</name>
      <t>By advertising the JMAPACCESS capability, the server asserts that if a
mailbox or message has a particular object ID when accessed via either
IMAP or JMAP (see <xref target="RFC3501"/>, <xref target="RFC9051"/> and <xref target="RFC8620"/>), then the
same mailbox or message is accessible via the other protocol, and it
has the same ID.</t>
      <t>The server <bcp14>MUST</bcp14> also advertise the OBJECTID extension, defined by
<xref target="RFC8474"/>. The JMAP session resource that allows access to the same
messages is called "the JMAP server" below.</t>
      <t>This specification does not affect message lifetime: If a client
accesses a message via IMAP and half a second later via JMAP, then the
message may have been deleted between the two accesses.</t>
      <t>When the server processes the client's LOGIN/AUTHENTICATE command and
enters Authenticated state, the server considers the way the client
authenticated. If the IMAP server can infer from the client's
authentication process that its credentials suffice to authenticate
via JMAP, then the server <bcp14>MUST</bcp14> include a JMAPACCESS capability in any
capability list sent after that point. This includes the capability
list that some servers send immediately when authentication succeeds.</t>
      <t>Servers are encouraged to report the same message flags and other data
via both protocols, as far as possible.</t>
      <t>This specification does not require mailboxes to have the same name in
IMAP and JMAP, even if they share mailbox ID. However, the JMAP
specification regulates that, in the text about the name and role
properties in <xref target="RFC8620"/> section 2.</t>
      <t>Note that all JMAP servers support internationalized email addresses
(see <xref target="RFC6530"/>).  If this IMAP server does not, or the IMAP client
does not issue ENABLE UTF8=ACCEPT (see <xref target="RFC6855"/>), then there is a
possibility that the client receives accurate address fields via JMAP
and downgraded fields via IMAP (see (see <xref target="RFC6857"/> and <xref target="RFC6858"/>
for examples). Issuing ENABLE UTF8=ACCEPT is a simple way to sidestep
the issue.</t>
    </section>
    <section anchor="the-getjmapaccess-command-and-the-jmapaccess-response">
      <name>The GETJMAPACCESS command and the JMAPACCESS response</name>
      <t>The GETJMAPACCESS command requests that the server respond with the
session URL for the JMAP server that provides access to the same mail.</t>
      <t>If such a JMAP server is known to this server, the server <bcp14>MUST</bcp14> respond
with an untagged JMAPACCESS response containing the JMAP server's
session resource (a URL) followed by a tagged OK response.</t>
      <t>If such a JMAP server is not known, the server <bcp14>MUST</bcp14> respond with a
tagged BAD response (and <bcp14>MUST NOT</bcp14> include JMAPACCESS in the capability
list).</t>
      <t>The JMAPACCESS response is followed by a single link to a JMAP
session resource. The server/mailstore at that location is referenced
as "the JMAP server" in this document.</t>
      <t>The formal syntax in <xref target="RFC9051"/> is extended thus:</t>
      <t>command-auth =/ "GETJMAPACCESS"</t>
      <t>mailbox-data =/ resp-jmapaccess</t>
      <t>resp-jmapaccess = "JMAPACCESS" SP quoted</t>
      <t>The syntax in <xref target="RFC3501"/> is extended similarly (this extension may be
used with IMAP4rev1 as well as IMAP4rev2).</t>
    </section>
    <section anchor="Examples">
      <name>Examples</name>
      <t>Lines sent by the client are preceded by C:, lines sent by the server
by S:. Each example starts with the IMAP banner issued by the server
on connection, and generally abbreviates the capability lists to
what's required by the example itself.</t>
      <t>Real connections use longer capability lists, much longer AUTHENTICATE
arguments and of course use TLS. These examples focus on JMAPACCESS,
though.</t>
      <t>Example 1. A client connects, sees that SASL OAUTH is available, and
authenticates in that way.</t>
      <t>S: * OK [CAPABILITY IMAP4rev1 AUTH=OAUTHBEARER SASL-IR] example1<br/>
C: 1 AUTHENTICATE OAUTHBEARER bixhPXVzZ...QEB</t>
      <t>The server processes the command successfully. It knows that the
client used Oauth, and that it and its JMAP alter ego use the same
Oauth backend subsystem. Because of that it infers that the (next)
access token is just as usable via JMAP as via IMAP. It includes a
JMAPACCESS capability in its reply (again, real capability lists are
much longer):</t>
      <t>S: 1 OK [CAPABILITY IMAP4rev1 JMAPACCESS] done<br/>
C: 1b GETJMAPACCESS<br/>
S: * JMAPACCESS "https://example.com/jmap"<br/>
S: 1b OK done</t>
      <t>SASL OAUTH is specified by <xref target="RFC7628"/>, and the argument in this
example is abbreviated from the more realistic length used in RFC7628.</t>
      <t>Example 2. A client connects, sees no SASL method it recognises, and
issues a LOGIN command.</t>
      <t>S: * OK [CAPABILITY IMAP4rev2] example2<br/>
C: 2 LOGIN "arnt" "trondheim"</t>
      <t>The server sees that the password is accepted, knows that it and its
JMAP alter ego use the same password database, and issues a JMAPACCESS
capability:</t>
      <t>S: * OK [CAPABILITY IMAP4rev2 JMAPACCESS] done<br/>
S: 2 OK done<br/>
C: 2b JMAPACCESS<br/>
S: * JMAPACCESS "https://example.com/.s/[jmap]"<br/>
S: 2b OK done</t>
      <t>The URL uses the same quoting rules as most other IMAP strings.</t>
      <t>Example 3. A client connects, sees no SASL method it recognises, and
issues a LOGIN command with a correct password.</t>
      <t>S: * OK [CAPABILITY IMAP4rev1 IMAP4rev2] example3<br/>
C: 3 LOGIN "arnt" "trondheim"</t>
      <t>The server operator has decided to disable password use with JMAP, but
allow it for a while with IMAP to cater to older clients, so the login
succeeds, but there is no JMAPACCESS capability.</t>
      <t>S: 3 OK done</t>
      <t>Example 4. A client connects, sees no SASL method it recognises, and
issues a LOGIN command. Its password is incorrect.</t>
      <t>S: * OK [CAPABILITY IMAP4rev2 AUTH=GSS] example4<br/>
C: 4 LOGIN "arnt" "oslo"</t>
      <t>The server does not enter Authenticated state, so nothing requires it
to mention JMAPACCESS. It replies curtly:</t>
      <t>S: 4 NO done</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>The IANA is requested to add the JMAPACCESS capability the IMAP
Capabilities registry, with this document as reference.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>JMAPACCESS reveals to authenticated IMAP clients that they would be
able to authenticate via JMAP using the same credentials, and that the
object IDs match.</t>
      <t>One does not normally reveal anything at all about authentication.
However, in this case information is revealed to an authenticated
client, the revealed URL can usually be found via JMAP autodiscovery,
and an attacker would only need to try the credentials it has with an
autodiscovered JMAP URL (a matter of a second or two). Therefore, it
is believed that this document does not benefit an attacker
noticeably, and its value for migration far outweighs its risk.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3501">
          <front>
            <title>INTERNET MESSAGE ACCESS PROTOCOL - VERSION 4rev1</title>
            <author fullname="M. Crispin" initials="M." surname="Crispin"/>
            <date month="March" year="2003"/>
            <abstract>
              <t>The Internet Message Access Protocol, Version 4rev1 (IMAP4rev1) allows a client to access and manipulate electronic mail messages on a server. IMAP4rev1 permits manipulation of mailboxes (remote message folders) in a way that is functionally equivalent to local folders. IMAP4rev1 also provides the capability for an offline client to resynchronize with the server. IMAP4rev1 includes operations for creating, deleting, and renaming mailboxes, checking for new messages, permanently removing messages, setting and clearing flags, RFC 2822 and RFC 2045 parsing, searching, and selective fetching of message attributes, texts, and portions thereof. Messages in IMAP4rev1 are accessed by the use of numbers. These numbers are either message sequence numbers or unique identifiers. IMAP4rev1 supports a single server. A mechanism for accessing configuration information to support multiple IMAP4rev1 servers is discussed in RFC 2244. IMAP4rev1 does not specify a means of posting mail; this function is handled by a mail transfer protocol such as RFC 2821. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3501"/>
          <seriesInfo name="DOI" value="10.17487/RFC3501"/>
        </reference>
        <reference anchor="RFC8474">
          <front>
            <title>IMAP Extension for Object Identifiers</title>
            <author fullname="B. Gondwana" initials="B." role="editor" surname="Gondwana"/>
            <date month="September" year="2018"/>
            <abstract>
              <t>This document updates RFC 3501 (IMAP4rev1) with persistent identifiers on mailboxes and messages to allow clients to more efficiently reuse cached data when resources have changed location on the server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8474"/>
          <seriesInfo name="DOI" value="10.17487/RFC8474"/>
        </reference>
        <reference anchor="RFC9051">
          <front>
            <title>Internet Message Access Protocol (IMAP) - Version 4rev2</title>
            <author fullname="A. Melnikov" initials="A." role="editor" surname="Melnikov"/>
            <author fullname="B. Leiba" initials="B." role="editor" surname="Leiba"/>
            <date month="August" year="2021"/>
            <abstract>
              <t>The Internet Message Access Protocol Version 4rev2 (IMAP4rev2) allows a client to access and manipulate electronic mail messages on a server. IMAP4rev2 permits manipulation of mailboxes (remote message folders) in a way that is functionally equivalent to local folders. IMAP4rev2 also provides the capability for an offline client to resynchronize with the server.</t>
              <t>IMAP4rev2 includes operations for creating, deleting, and renaming mailboxes; checking for new messages; removing messages permanently; setting and clearing flags; parsing per RFCs 5322, 2045, and 2231; searching; and selective fetching of message attributes, texts, and portions thereof. Messages in IMAP4rev2 are accessed by the use of numbers. These numbers are either message sequence numbers or unique identifiers.</t>
              <t>IMAP4rev2 does not specify a means of posting mail; this function is handled by a mail submission protocol such as the one specified in RFC 6409.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9051"/>
          <seriesInfo name="DOI" value="10.17487/RFC9051"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6530">
          <front>
            <title>Overview and Framework for Internationalized Email</title>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="Y. Ko" initials="Y." surname="Ko"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>Full use of electronic mail throughout the world requires that (subject to other constraints) people be able to use close variations on their own names (written correctly in their own languages and scripts) as mailbox names in email addresses. This document introduces a series of specifications that define mechanisms and protocol extensions needed to fully support internationalized email addresses. These changes include an SMTP extension and extension of email header syntax to accommodate UTF-8 data. The document set also includes discussion of key assumptions and issues in deploying fully internationalized email. This document is a replacement for RFC 4952; it reflects additional issues identified since that document was published. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6530"/>
          <seriesInfo name="DOI" value="10.17487/RFC6530"/>
        </reference>
        <reference anchor="RFC6855">
          <front>
            <title>IMAP Support for UTF-8</title>
            <author fullname="P. Resnick" initials="P." role="editor" surname="Resnick"/>
            <author fullname="C. Newman" initials="C." role="editor" surname="Newman"/>
            <author fullname="S. Shen" initials="S." role="editor" surname="Shen"/>
            <date month="March" year="2013"/>
            <abstract>
              <t>This specification extends the Internet Message Access Protocol (IMAP) to support UTF-8 encoded international characters in user names, mail addresses, and message headers. This specification replaces RFC 5738.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6855"/>
          <seriesInfo name="DOI" value="10.17487/RFC6855"/>
        </reference>
        <reference anchor="RFC6857">
          <front>
            <title>Post-Delivery Message Downgrading for Internationalized Email Messages</title>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="March" year="2013"/>
            <abstract>
              <t>The Email Address Internationalization (SMTPUTF8) extension to SMTP allows Unicode characters encoded in UTF-8 and outside the ASCII repertoire in mail header fields. Upgraded POP and IMAP servers support internationalized messages. If a POP or IMAP client does not support Email Address Internationalization, a POP or IMAP server cannot deliver internationalized messages to the client and cannot remove the message. To avoid that situation, this document describes a mechanism for converting internationalized messages into the traditional message format. As part of the conversion process, message elements that require internationalized treatment are recoded or removed, and receivers are able to recognize that they received messages containing such elements, even if they cannot process the internationalized elements.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6857"/>
          <seriesInfo name="DOI" value="10.17487/RFC6857"/>
        </reference>
        <reference anchor="RFC6858">
          <front>
            <title>Simplified POP and IMAP Downgrading for Internationalized Email</title>
            <author fullname="A. Gulbrandsen" initials="A." surname="Gulbrandsen"/>
            <date month="March" year="2013"/>
            <abstract>
              <t>This document specifies a method for IMAP and POP servers to serve internationalized messages to conventional clients. The specification is simple, easy to implement, and provides only rudimentary results.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6858"/>
          <seriesInfo name="DOI" value="10.17487/RFC6858"/>
        </reference>
        <reference anchor="RFC7628">
          <front>
            <title>A Set of Simple Authentication and Security Layer (SASL) Mechanisms for OAuth</title>
            <author fullname="W. Mills" initials="W." surname="Mills"/>
            <author fullname="T. Showalter" initials="T." surname="Showalter"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="August" year="2015"/>
            <abstract>
              <t>OAuth enables a third-party application to obtain limited access to a protected resource, either on behalf of a resource owner by orchestrating an approval interaction or by allowing the third-party application to obtain access on its own behalf.</t>
              <t>This document defines how an application client uses credentials obtained via OAuth over the Simple Authentication and Security Layer (SASL) to access a protected resource at a resource server. Thereby, it enables schemes defined within the OAuth framework for non-HTTP-based application protocols.</t>
              <t>Clients typically store the user's long-term credential. This does, however, lead to significant security vulnerabilities, for example, when such a credential leaks. A significant benefit of OAuth for usage in those clients is that the password is replaced by a shared secret with higher entropy, i.e., the token. Tokens typically provide limited access rights and can be managed and revoked separately from the user's long-term password.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7628"/>
          <seriesInfo name="DOI" value="10.17487/RFC7628"/>
        </reference>
        <reference anchor="RFC8620">
          <front>
            <title>The JSON Meta Application Protocol (JMAP)</title>
            <author fullname="N. Jenkins" initials="N." surname="Jenkins"/>
            <author fullname="C. Newman" initials="C." surname="Newman"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document specifies a protocol for clients to efficiently query, fetch, and modify JSON-based data objects, with support for push notification of changes and fast resynchronisation and for out-of- band binary data upload/download.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8620"/>
          <seriesInfo name="DOI" value="10.17487/RFC8620"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
