Skip to main content

IMAP4 Access Control List (ACL) Extension
draft-ietf-imapext-2086upd-08

Revision differences

Document history

Date Rev. By Action
2012-08-22
08 (System) post-migration administrative database adjustment to the No Objection position for Russ Housley
2005-07-29
08 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2005-07-07
08 Amy Vezza IESG state changed to Approved-announcement sent
2005-07-07
08 Amy Vezza IESG has approved the document
2005-07-07
08 Amy Vezza Closed "Approve" ballot
2005-07-01
08 Scott Hollenbeck State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Scott Hollenbeck
2005-07-01
08 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley
2005-06-28
08 (System) Sub state has been changed to AD Follow up from New Id Needed
2005-06-28
08 (System) New version available: draft-ietf-imapext-2086upd-08.txt
2005-06-24
08 Amy Vezza State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza
2005-06-24
08 (System) Removed from agenda for telechat - 2005-06-23
2005-06-23
08 Mark Townsley [Ballot Position Update] New position, No Objection, has been recorded for Mark Townsley by Mark Townsley
2005-06-23
08 Brian Carpenter [Ballot Position Update] New position, No Objection, has been recorded for Brian Carpenter by Brian Carpenter
2005-06-22
08 David Kessens [Ballot Position Update] New position, No Objection, has been recorded for David Kessens by David Kessens
2005-06-22
08 Jon Peterson [Ballot Position Update] Position for Jon Peterson has been changed to No Objection from Undefined by Jon Peterson
2005-06-22
08 Jon Peterson [Ballot Position Update] Position for Jon Peterson has been changed to Undefined from No Objection by Jon Peterson
2005-06-22
08 Jon Peterson [Ballot Position Update] Position for Jon Peterson has been changed to No Objection from Undefined by Jon Peterson
2005-06-22
08 Jon Peterson
[Ballot comment]
While this entire document concerns access and permissions, it seems to lack any text describing the protocol security requirements of a protocol that …
[Ballot comment]
While this entire document concerns access and permissions, it seems to lack any text describing the protocol security requirements of a protocol that sets such permissions. Section 4 details what rights one must possess in order to modify ACLs, but I don't really see any text that describes the related threats concerning impersonation, replays, eavesdropping and so on in ACL creation. I have no doubt that mechanisms to address such threats exist in core IMAP (like SASL and STARTTLS), but it would be nice if this document explained why implementers should bother to use them.
2005-06-22
08 Jon Peterson
[Ballot comment]
While this entire document concerns access and permissions, it seems to lack any text describing the protocol security requirements of a protocol that …
[Ballot comment]
While this entire document concerns access and permissions, it seems to lack any text describing the protocol security requirements of a protocol that sets such permissions. Section 4 details what rights one must possess in order to modify ACLs, but I don't really see any text that describes the related threats concerning impersonation, replays, eavesdropping and so on in ACL creation. I have no doubt that mechanisms to address such threats exist in core IMAP (like SASL and STARTTLS), but it would be nice if this document explained why implementers should bother to use them.
2005-06-22
08 Jon Peterson [Ballot Position Update] New position, Undefined, has been recorded for Jon Peterson by Jon Peterson
2005-06-22
08 Bill Fenner [Ballot Position Update] New position, No Objection, has been recorded for Bill Fenner by Bill Fenner
2005-06-22
08 Ted Hardie [Ballot Position Update] New position, No Objection, has been recorded for Ted Hardie by Ted Hardie
2005-06-21
08 Sam Hartman
[Ballot comment]
This document says that identifiers used as usernames for the login
and authenticate commands are reserved to correspond to those users.
However the …
[Ballot comment]
This document says that identifiers used as usernames for the login
and authenticate commands are reserved to correspond to those users.
However the authenticate command doesn't really take a username.  I'm
not sure what the right way of saying this in IMAP is, but in SASL it
would be the authorization identity.  But basically the text should be
clarified to make it consistent with how authenticate actually works.
2005-06-21
08 Sam Hartman [Ballot Position Update] Position for Sam Hartman has been changed to No Objection from Discuss by Sam Hartman
2005-06-21
08 Sam Hartman [Ballot Position Update] New position, Discuss, has been recorded for Sam Hartman by Sam Hartman
2005-06-20
08 Russ Housley
[Ballot discuss]
This specification depends on SASLprep, which is defined in RFC 4013.
  The security considerations of RFC 4013 say:
  >
  …
[Ballot discuss]
This specification depends on SASLprep, which is defined in RFC 4013.
  The security considerations of RFC 4013 say:
  >
  > This profile is intended to prepare simple user name and password
  > strings for comparison or use in cryptographic functions (e.g.,
  > message digests).  The preparation algorithm was specifically
  > designed such that its output is canonical, and it is well-formed.
  > However, due to an anomaly [PR29] in the specification of Unicode
  > normalization, canonical equivalence is not guaranteed for a select
  > few character sequences.  These sequences, however, do not appear in
  > well-formed text.  This specification was published despite this
  > known technical problem.  It is expected that this specification will
  > be revised before further progression on the Standards Track (after
  > [Unicode] and/or [StringPrep] specifications have been updated to
  > address this problem).
  >
  The security considerations of this document need to address this point.
  How does this situation impact ACL processing?
2005-06-20
08 Russ Housley [Ballot Position Update] New position, Discuss, has been recorded for Russ Housley by Russ Housley
2005-06-13
08 Scott Hollenbeck [Ballot Position Update] New position, Yes, has been recorded for Scott Hollenbeck
2005-06-13
08 Scott Hollenbeck Ballot has been issued by Scott Hollenbeck
2005-06-13
08 Scott Hollenbeck Created "Approve" ballot
2005-06-13
08 Scott Hollenbeck State Changes to IESG Evaluation from Waiting for AD Go-Ahead::AD Followup by Scott Hollenbeck
2005-06-13
08 Scott Hollenbeck Placed on agenda for telechat - 2005-06-23 by Scott Hollenbeck
2005-06-13
08 (System) Sub state has been changed to AD Follow up from New Id Needed
2005-06-13
07 (System) New version available: draft-ietf-imapext-2086upd-07.txt
2005-06-07
08 Scott Hollenbeck State Changes to Waiting for AD Go-Ahead::Revised ID Needed from Waiting for AD Go-Ahead by Scott Hollenbeck
2005-06-06
08 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2005-06-06
08 Michelle Cotton IANA Last Call Comments:
Upon approval of this document, the IANA will register the RIGHTS= IMAP Capability in the following location:
http://www.iana.org/assignments/imap4-capabilities
2005-05-23
08 Amy Vezza Last call sent
2005-05-23
08 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2005-05-23
08 Scott Hollenbeck Last Call was requested by Scott Hollenbeck
2005-05-23
08 Scott Hollenbeck State Changes to Last Call Requested from AD Evaluation by Scott Hollenbeck
2005-05-23
08 (System) Ballot writeup text was added
2005-05-23
08 (System) Last call text was added
2005-05-23
08 (System) Ballot approval text was added
2005-05-23
08 Scott Hollenbeck
Updated AD evaluation comments based on discussion with the WG:

- The -05 version of the document asked a question about whether or not this …
Updated AD evaluation comments based on discussion with the WG:

- The -05 version of the document asked a question about whether or not this document updates RFC 3501.  The question was removed from -06.  I don't believe it does update 3501, but I'm open to other opinions.

- A Table of Contents is needed.  Other formatting errors found using the ID nits tool [1] should also be corrected.

- Section 3, 7th paragraph: "an ACL may include rights".  Is this "may" supposed to be in lower case letters?  I won't call out any more, but let's consider this an open question for any other 2119 keywords that appear in both upper and lower case letters.  Consistency is a good thing.
2005-05-20
06 (System) New version available: draft-ietf-imapext-2086upd-06.txt
2005-05-17
08 Scott Hollenbeck
AD evaluation comments and questions:

- What does "Updates: <<3501?>>" mean in the first page headers?  Does this document update RFC 3501 or not?

- …
AD evaluation comments and questions:

- What does "Updates: <<3501?>>" mean in the first page headers?  Does this document update RFC 3501 or not?

- Please remove what looks like a reference to RFC 3501 ("IMAP4rev1") from the abstract, or maybe just identify the acronym as "IMAP".

- Editorial nit, Abstract and Section 2: s/the RFC 2086/RFC 2086/

- A Table of Contents is needed.  Other formatting errors found using the ID nits tool [1] should also be corrected.

- Section 3, 6th paragraph, 1st sentence: "An implementation MAY tie rights together or may".  Is this second "may" supposed to be in lower case letters?

- Section 3, 7th paragraph: "A client may determine".  Again, is this "may" supposed to be in lower case letters?  I won't call out any more, but let's consider this an open question for any other 2119 keywords that appear in both upper and lower case letters.  Consistency is a good thing.

Section 4, first paragraph: s/that have an identifier/that has an identifier/

Section 8: two minor ABNF errors:

capability  =/ rights-capa
command-auth =/ setacl / deleteacl / getacl / listrights / myrights

should be:

capability  = rights-capa
command-auth = setacl / deleteacl / getacl / listrights / myrights

(change "=/" to "=")
2005-05-17
08 Scott Hollenbeck State Changes to AD Evaluation from Publication Requested by Scott Hollenbeck
2005-05-17
08 Scott Hollenbeck [Note]: 'Proto shepherd is Lisa Dusseault ' added by Scott Hollenbeck
2005-05-17
08 Scott Hollenbeck Draft Added by Scott Hollenbeck in state Publication Requested
2005-04-27
05 (System) New version available: draft-ietf-imapext-2086upd-05.txt
2005-04-08
04 (System) New version available: draft-ietf-imapext-2086upd-04.txt
2005-02-18
03 (System) New version available: draft-ietf-imapext-2086upd-03.txt
2004-12-02
02 (System) New version available: draft-ietf-imapext-2086upd-02.txt
2004-11-18
01 (System) New version available: draft-ietf-imapext-2086upd-01.txt
2004-09-13
00 (System) New version available: draft-ietf-imapext-2086upd-00.txt