7 Network Working Group Robert Siemborski
8 INTERNET-DRAFT Carnegie Mellon University
9 Intended Category: Standards Track October, 2003
12 IMAP Extension for SASL Initial Client Response
13 <draft-siemborski-imap-sasl-initial-response-00.txt>
17 This document is an Internet-Draft and is in full conformance with
18 all provisions of Section 10 of RFC2026.
20 Internet-Drafts are working documents of the Internet Task Force
21 (IETF), its areas, and its working groups. Note that other groups
22 may also distribute working documents as Internet-Drafts.
24 Internet-Drafts are draft documents valid for a maximum of six
25 months and may be updated, replaced, or obsoleted by other documents
26 at any time. It is inappropriate to use Internet Drafts as
27 reference material or to cite them other than as "work in progress."
29 The list of current Internet-Drafts can be accessed at
30 http://www.ietf.org/ietf/1id-abstracts.txt
32 The list of Internet-Draft Shadow Directories can be accessed at
33 http://www.ietf.org/shadow.html.
35 Distribution of this memo is unlimited.
39 To date, the Internet Message Access Protocol (IMAP) has used a
40 Simple Authentication and Security Layer (SASL) profile which always
41 required at least one complete round trip for an authentication, as
42 it did not support an initial client response argument. This
43 additional round trip at the beginning of the session is
44 undesirable, especially when round trip costs are high.
46 This document defines an extension to IMAP which allows clients and
47 servers to avoid this round trip by allowing an initial client
48 response argument to the IMAP AUTHENTICATE command.
50 1. How to Read This Document
52 The key words "MUST", "MUST NOT", "REQUIRED", "SHOULD", "SHOULD
53 NOT", "RECOMMENDED", and "MAY" in this document are to be
54 interpreted as defined in "Key words for use in RFCs to Indicate
58 Siemborski Expires April, 2004 [Page 1]
64 IMAP Extension for SASL Initial Client Response October, 2003
70 1. How to Read This Document . . . . . . . . . . . . . . . . . . . . 1
71 2. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 3
72 3. Changes to the IMAP AUTHENTICATE Command . . . . . . . . . . . . 3
73 4. Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
74 5. Formal Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 5
75 6. Security Considerations . . . . . . . . . . . . . . . . . . . . . 5
76 7. Intellectual Property Rights . . . . . . . . . . . . . . . . . . 5
77 8. Copyright . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
78 9. References . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
79 10. Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 7
80 11. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . 7
81 12. Changes since -00 . . . . . . . . . . . . . . . . . . . . . . . 8
118 Siemborski Expires April, 2004 [Page 2]
124 IMAP Extension for SASL Initial Client Response October, 2003
127 Requirement Levels" [KEYWORDS]
129 In examples, "C:" and "S:" indicate lines sent by the client and
132 Formal syntax is defined using [ABNF] as modified by [IMAP4].
136 The [SASL] initial client response extension is present in any
137 [IMAP4] server implementation which returns "SASL-IR" as one of the
138 supported capabilities in its CAPABILITY response.
140 Servers which support this extension will accept an optional initial
141 client response with the AUTHENTICATE command for any [SASL]
142 mechanisms which support it. Clients which support this extension
143 SHOULD make use of the initial response whenever they attempt to
144 authenticate using a SASL mechanism which supports it.
146 3. IMAP Changes to the IMAP AUTHENTICATE Command
148 This extension adds an optional second argument to the AUTHENTICATE
149 command that is defined in Section 6.2.2 of [IMAP4]. If this second
150 argument is present, it represents the contents of the "initial
151 client response" defined in section 5.1 of [SASL].
153 As with any other client response, this initial client response MUST
154 be [BASE64] encoded. It also MUST be transmitted outside of a
155 quoted string or literal. To send a zero-length initial response,
156 the client MUST send a single pad character ("="). This indicates
157 that the response is present, but is a zero-length string.
159 When decoding the [BASE64] data in the initial client response,
160 decoding errors MUST be treated as [IMAP4] would handle them in any
161 normal SASL client response. In particular, the server should check
162 for any characters not explicitly allowed by the BASE64 alphabet, as
163 well as any sequence of BASE64 characters that contains the pad
164 character ('=') anywhere other than the end of the string (e.g.
165 "=AAA" and "AAA=BBB" are not allowed).
167 Note: support and use of the initial client response is optional for
168 both clients and servers. Servers which implement this extension
169 MUST support clients which omit the initial client response, and
170 clients which implement this extension MUST NOT send an initial
171 client response to servers which do not advertise the SASL-IR
172 capability. In such a situation, clients MUST fall back to an
173 [IMAP4] compatible mode.
178 Siemborski Expires April, 2004 [Page 3]
184 IMAP Extension for SASL Initial Client Response October, 2003
187 If either the client or the server do not support the SASL-IR
188 capability, a mechanism which uses an initial client response is
189 negotiated using the challenge/response exchange described in
190 [IMAP4], with an initial zero-length server challenge.
195 The following is an example authentication using the [PLAIN] SASL
196 mechanism (under a [TLS] protection layer) and an initial client
199 ... client connects to server and negotiates a TLS protection layer ...
201 S: * CAPABILITY IMAP4 IMAP4rev1 SASL-IR AUTH=PLAIN
202 C: A01 AUTHENTICATE PLAIN dGVzdAB0ZXN0AHRlc3Q=
203 S: A01 OK Success (tls protection)
205 Note that even when a server supports this extension, the following
206 negotiation (which does not use the initial response) is still valid
207 and MUST be supported by the server:
209 ... client connects to server and negotiates a TLS protection layer ...
211 S: * CAPABILITY IMAP4 IMAP4rev1 SASL-IR AUTH=PLAIN
212 C: A01 AUTHENTICATE PLAIN
213 (note that there is a space following the "+" in the following line)
215 C: dGVzdAB0ZXN0AHRlc3Q=
216 S: A01 OK Success (tls protection)
218 The following is an example authentication using the EXTERNAL [SASL]
219 mechanism (under a [TLS] protection layer) and an empty initial
222 ... client connects to server and negotiates a TLS protection layer ...
224 S: * CAPABILITY IMAP4 IMAP4rev1 SASL-IR AUTH=PLAIN AUTH=EXTERNAL
225 C: A01 AUTHENTICATE EXTERNAL =
226 S: A01 OK Success (tls protection)
238 Siemborski Expires April, 2004 [Page 4]
244 IMAP Extension for SASL Initial Client Response October, 2003
247 This is in contrast with the handling of such a situation when an
248 initial response is omitted:
250 ... client connects to server and negotiates a TLS protection layer ...
252 S: * CAPABILITY IMAP4 IMAP4rev1 SASL-IR AUTH=PLAIN AUTH=EXTERNAL
253 C: A01 AUTHENTICATE EXTERNAL
254 (note that there is a space following the "+" in the following line)
257 S: A01 OK Success (tls protection)
262 The following syntax specification uses the Augmented Bakus-Naur
263 Form [ABNF] notation. Non-terminals referenced but not defined
264 below are as defined by [IMAP4].
266 capability =/ "SASL-IR"
268 authenticate = "AUTHENTICATE" SP auth-type [SP (base64 / "=")]
270 ;;redefine AUTHENTICATE command defined in [IMAP4]
273 6. Security Considerations
275 The extension defined in this document is subject to many of the
276 Security Considerations defined in [IMAP4] and [SASL].
278 Server implementations MUST treat the omission of an initial client
279 response from the AUTHENTICATE command as defined by [IMAP4] (as if
280 this extension did not exist).
282 Although [IMAP4] has no express line length limitations, some
283 implementations choose to enforce them anyway. Such implementations
284 MUST be aware that the addition of the initial response parameter to
285 AUTHENTICATE may increase the maximum line length that IMAP parsers
286 may expect to support. Server implementations MUST be able to
287 receive the largest possible initial client response that their
288 supported mechanisms might receive.
290 7. Intellectual Property Rights
292 The IETF takes no position regarding the validity or scope of any
293 intellectual property or other rights that might be claimed to
294 pertain to the implementation or use of the technology described in
298 Siemborski Expires April, 2004 [Page 5]
304 IMAP Extension for SASL Initial Client Response October, 2003
307 this document or the extent to which any license under such rights
308 might or might not be available; neither does it represent that it
309 has made any effort to identify any such rights. Information on the
310 IETF's procedures with respect to rights in standards-track and
311 standards-related documentation can be found in BCP-11. Copies of
312 claims of rights made available for publication and any assurances
313 of licenses to be made available, or the result of an attempt made
314 to obtain a general license or permission for the use of such
315 proprietary rights by implementors or users of this specification
316 can be obtained from the IETF Secretariat.
318 The IETF invites any interested party to bring to its attention any
319 copyrights, patents or patent applications, or other proprietary
320 rights which may cover technology that may be required to practice
321 this standard. Please address the information to the IETF Executive
326 Copyright (C) The Internet Society (2003). All Rights Reserved.
328 This document and translations of it may be copied and furnished to
329 others, and derivative works that comment on or otherwise explain it
330 or assist in its implementation may be prepared, copied, published
331 and distributed, in whole or in part, without restriction of any
332 kind, provided that the above copyright notice and this paragraph
333 are included on all such copies and derivative works. However, this
334 document itself may not be modified in any way, such as by removing
335 the copyright notice or references to the Internet Society or other
336 Internet organizations, except as needed for the purpose of
337 developing Internet standards in which case the procedures for
338 copyrights defined in the Internet Standards process must be
339 followed, or as required to translate it into languages other than
342 This document and the information contained herein is provided on an
343 "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
344 TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
345 BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
346 HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
347 MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
358 Siemborski Expires April, 2004 [Page 6]
364 IMAP Extension for SASL Initial Client Response October, 2003
369 The following documents contain normative definitions or
370 specifications that are necessary for correct understanding of this
373 [ABNF] Crocker, D., "Augmented BNF for Syntax Specifications:
374 ABNF", RFC 2234, November, 1997.
376 [BASE64] Josefsson, S., "The Base16, Base32, and Base64 Data
377 Encodings", RFC 3548, July 2003.
379 [IMAP4] Crispin, M., "INTERNET MESSAGE ACCESS PROTOCOL - VERSION
380 4rev1", RFC 3501, March 2003.
382 [KEYWORDS] Bradner, S., "Key words for use in RFCs to Indicate
383 Requirement Levels", BCP 14, RFC 2119, March 1997.
385 [SASL] Melnikov, A., "Simple Authentication and Security Layer
386 (SASL)", draft-ietf-sasl-rfc2222bis-*.txt, a work in
389 The following references are for informational purposes only:
391 [PLAIN] Newman, C. "Using TLS with IMAP, POP3, and ACAP", RFC 2595,
394 [TLS] Dierks, T. and C. Allen, "The TLS Protocol Version 1.0", RFC
397 10. Author's Address:
400 Carnegie Mellon, Andrew Systems Group
409 The author would like to acknowledge the contributions of Ken
410 Murchison and Mark Crispin, along with the rest of the IMAPEXT
411 Working Group for their assistance in reviewing this document.
413 Alexey Melnikov and Cyrus Daboo also had some early discussions
418 Siemborski Expires April, 2004 [Page 7]
424 IMAP Extension for SASL Initial Client Response October, 2003
427 12. Changes since -00
429 (RFC Editor: Remove this section before publication)
431 - Change capability string to "SASL-IR"
433 - Fix a nit regarding an "=" in the initial response ABNF
435 - Clean up wording of BASE64 decoding requirements to be more in
438 - Add examples of an empty initial client response, and move
439 examples into their own section
441 - Update SASL reference to rfc2222bis
478 Siemborski Expires April, 2004 [Page 8]