<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-degennaro-jmap-mail-sharing-00" category="std" consensus="true" submissionType="IETF" updates="RFC8621" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="JMAP Mail Sharing">JMAP Mail Sharing</title>

    <author initials="M." surname="De Gennaro" fullname="Mauro De Gennaro">
      <organization abbrev="Stalwart Labs">Stalwart Labs LLC</organization>
      <address>
        <postal>
          <street>1309 Coffeen Avenue, Suite 1200</street>
          <city>Sheridan</city>
          <region>WY</region>
          <code>82801</code>
          <country>USA</country>
        </postal>
        <email>mauro@stalw.art</email>
        <uri>https://stalw.art</uri>
      </address>
    </author>

    <date year="2025" month="November" day="02"/>

    
    <workgroup>JMAP</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 38?>

<t>This document specifies an extension to the JSON Meta Application Protocol (JMAP) for Mail to enable sharing of mailboxes between users. Building upon the JMAP Sharing framework defined in <xref target="RFC9670"/>, this specification extends the Mailbox data type defined in <xref target="RFC8621"/> with properties necessary to configure and manage access permissions for shared mailboxes. The extension introduces a new capability that indicates server support for mailbox sharing and defines the additional properties required to share mailboxes with other principals, including the ability to control which users may access a mailbox and what permissions they possess.</t>



    </abstract>



  </front>

  <middle>


<?line 42?>

<section anchor="introduction"><name>Introduction</name>

<t>JMAP (<xref target="RFC8620"/> — JSON Meta Application Protocol) is a generic protocol for synchronizing data, such as mail, calendars or contacts, between a client and a server. It is optimized for mobile and web environments, and aims to provide a consistent interface to different data types.</t>

<t><xref target="RFC8621"/> defines JMAP for Mail, which provides a data model for accessing, organizing, and managing email messages and mailboxes. The specification enables clients to efficiently synchronize mail data with servers and includes support for mailbox hierarchies, message threading, and various mail operations.</t>

<t><xref target="RFC9670"/> subsequently standardized JMAP Sharing, which defines a framework for sharing data between users in collaborative environments. The specification introduces the Principal data type to represent entities (individuals, teams, or resources) and establishes a consistent model for defining shared access to data through the use of access control properties.</t>

<t>However, <xref target="RFC8621"/> was published prior to the standardization of the JMAP Sharing framework in <xref target="RFC9670"/>, and therefore does not incorporate the sharing model into the Mailbox data type. This creates a gap in the ability to share mailboxes using the standardized JMAP sharing mechanisms.</t>

<t>This document bridges that gap by defining how the Mailbox object defined in <xref target="RFC8621"/> is extended to support the sharing framework established in <xref target="RFC9670"/>. This extension enables users to share their mailboxes with other principals using a consistent sharing model that can be applied uniformly across different JMAP data types. The specification defines the necessary properties, permissions, and capability advertisements to enable interoperable mailbox sharing implementations.</t>

<section anchor="notational-conventions"><name>Notational Conventions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="addition-to-the-capabilities-object"><name>Addition to the Capabilities Object</name>

<t>The capabilities object is returned as part of the JMAP Session object; see <xref section="2" sectionFormat="of" target="RFC8620"/>. This document defines one additional capability URI.</t>

<section anchor="urnietfparamsjmapmailshare"><name>urn:ietf:params:jmap:mail:share</name>

<t>This capability indicates server support for sharing mailboxes as defined in this specification. When a server advertises this capability, it signifies that the Mailbox data type has been extended with the sharing properties defined in <xref section="4" sectionFormat="of" target="RFC9670"/> and that clients may use these properties to configure mailbox sharing with other principals.</t>

<t>The value of this property in the JMAP Session "capabilities" property is an empty object.</t>

<t>The value of this property in an account's "accountCapabilities" property is an empty object.</t>

</section>
</section>
</section>
<section anchor="mailbox-sharing"><name>Mailbox Sharing</name>

<t>According to <xref section="4" sectionFormat="of" target="RFC9670"/>, shareable data types <bcp14>MUST</bcp14> define three specific properties to participate in the JMAP sharing framework: <spanx style="verb">isSubscribed</spanx>, <spanx style="verb">myRights</spanx>, and <spanx style="verb">shareWith</spanx>. These properties enable users to control whether they wish to see shared data, understand what permissions they have, and configure who the data is shared with, respectively.</t>

<t>In addition to these three properties, shareable data types <bcp14>SHOULD</bcp14> define a permission within the rights object that indicates whether a user has the authority to share the object with others. This permission controls access to modifying the <spanx style="verb">shareWith</spanx> property.</t>

<t>The Mailbox object defined in <xref section="2" sectionFormat="of" target="RFC8621"/> already includes the <spanx style="verb">isSubscribed</spanx> and <spanx style="verb">myRights</spanx> properties, as mailbox subscription and access control were integral features of the original mail specification. However, the specification did not include the <spanx style="verb">shareWith</spanx> property or define a permission for sharing rights.</t>

<t>This specification extends the JMAP Mailbox object defined in <xref target="RFC8621"/> to include the <spanx style="verb">shareWith</spanx> property as defined below:</t>

<dl>
  <dt><strong>shareWith</strong>: <spanx style="verb">Id[MailboxRights]|null</spanx> (default: null)</dt>
  <dd>
    <t>This is a map configuring who the mailbox is shared with, or null if it is not shared with anyone. Each key in the map is the id of a Principal with whom the mailbox is shared. The value for each key is the set of access rights that Principal has for the mailbox. The account id for the Principals may be found in the <spanx style="verb">urn:ietf:params:jmap:principals:owner</spanx> capability of the Account to which the mailbox belongs. The Principal to which this mailbox belongs <bcp14>MUST NOT</bcp14> be in the map. The property may only be modified if the user has the mayShare right.</t>
  </dd>
</dl>

<t>This specification also extends the JMAP MailboxRights object defined in <xref section="2" sectionFormat="of" target="RFC8621"/> to include the <spanx style="verb">mayShare</spanx> property as defined below. For servers that also support IMAP <xref target="RFC3501"/>, this property corresponds to the IMAP ACL "a" right as defined in <xref target="RFC4314"/>:</t>

<dl newline="true">
  <dt><strong>mayShare</strong>: <spanx style="verb">Boolean</spanx></dt>
  <dd>
    <t>The user may modify the <spanx style="verb">shareWith</spanx> property for this mailbox. For servers supporting IMAP access to the same data, this corresponds to the IMAP ACL "a" right defined in <xref target="RFC4314"/>, which grants the ability to administer access control lists.</t>
  </dd>
</dl>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>All security considerations described in <xref target="RFC8621"/> and <xref target="RFC9670"/> apply to this specification. Additional considerations specific to mailbox sharing are detailed below.</t>

<section anchor="access-control-enforcement"><name>Access Control Enforcement</name>

<t>Servers implementing this specification <bcp14>MUST</bcp14> strictly enforce access controls when sharing mailboxes. When a user has access to a shared mailbox, the server <bcp14>MUST</bcp14> ensure that the user can only perform operations permitted by their assigned rights. As specified in <xref section="9.5" sectionFormat="of" target="RFC8621"/>, servers <bcp14>MUST</bcp14> treat any data the user does not have permission to access as if it did not exist. This principle extends to shared mailboxes: a user with partial access to an account <bcp14>MUST NOT</bcp14> be able to infer the existence of mailboxes or messages they do not have permission to access.</t>

</section>
<section anchor="interaction-with-imap-acls"><name>Interaction with IMAP ACLs</name>

<t>Servers that provide both JMAP and IMAP <xref target="RFC3501"/> access to the same mail store should carefully consider the interaction between JMAP sharing permissions and IMAP ACLs <xref target="RFC4314"/>. The mapping between JMAP MailboxRights and IMAP ACL rights must be consistent and clearly documented. When a mailbox is shared through either interface, the permissions <bcp14>MUST</bcp14> be properly reflected in the other interface to prevent security vulnerabilities arising from inconsistent access control enforcement.</t>

<t>Particular attention must be paid to the <spanx style="verb">mayShare</spanx> right and IMAP ACL "a" right mapping. Servers <bcp14>MUST</bcp14> ensure that granting the <spanx style="verb">mayShare</spanx> permission through JMAP correctly corresponds to granting the "a" right in IMAP, and vice versa. Any discrepancies in permission semantics between the two protocols could lead to privilege escalation or unintended access.</t>

</section>
<section anchor="unauthorized-sharing"><name>Unauthorized Sharing</name>

<t>As noted in <xref section="6.2" sectionFormat="of" target="RFC9670"/>, sharing data with another user can allow an attacker who gains transitory access to an account to establish persistent access by configuring sharing with an attacker-controlled principal. Servers implementing mailbox sharing <bcp14>SHOULD</bcp14> consider requiring additional authentication or confirmation when sharing permissions are modified, particularly when adding new principals to the <spanx style="verb">shareWith</spanx> map or granting elevated permissions such as <spanx style="verb">mayShare</spanx>.</t>

<t>Servers <bcp14>MAY</bcp14> implement audit logging of sharing configuration changes to enable detection of unauthorized modifications. Administrators <bcp14>SHOULD</bcp14> be provided with tools to monitor and review sharing configurations across accounts.</t>

</section>
<section anchor="information-disclosure-through-error-messages"><name>Information Disclosure Through Error Messages</name>

<t>Servers must be cautious not to leak information about the existence of mailboxes or their sharing status through error messages. When a user attempts to access or modify a mailbox they do not have permission to access, the server <bcp14>SHOULD</bcp14> return the same error response as it would if the mailbox did not exist, rather than indicating that access was denied. This prevents users from enumerating shared mailboxes they do not have access to.</t>

<t>Similarly, when a user attempts to share a mailbox with a principal they do not have permission to share with, error messages should not reveal whether such restrictions exist or details about the target principal.</t>

</section>
<section anchor="resource-exhaustion"><name>Resource Exhaustion</name>

<t>Servers <bcp14>SHOULD</bcp14> implement limits on the number of principals with whom a single mailbox may be shared to prevent resource exhaustion attacks. Servers <bcp14>MAY</bcp14> also implement rate limiting on sharing configuration changes to mitigate denial-of-service attacks through excessive modifications to sharing permissions.</t>

<t>As described in <xref section="6.3" sectionFormat="of" target="RFC9670"/>, servers should be prepared to handle scenarios where users create many sharing-related state changes, which could generate numerous ShareNotification objects. Servers <bcp14>SHOULD</bcp14> implement appropriate resource limits and notification coalescing strategies.</t>

</section>
<section anchor="privilege-escalation"><name>Privilege Escalation</name>

<t>Servers <bcp14>MUST</bcp14> ensure that users cannot escalate their own privileges through manipulation of sharing permissions. For example, a user who has been granted limited access to a mailbox <bcp14>MUST NOT</bcp14> be able to grant themselves additional permissions by modifying the <spanx style="verb">shareWith</spanx> property unless they have been explicitly granted the <spanx style="verb">mayShare</spanx> right.</t>

<t>The owner of a mailbox (the Principal associated with the account containing the mailbox) always has implicit full rights to the mailbox. This ownership <bcp14>MUST NOT</bcp14> be transferable through the sharing mechanism, and the owner <bcp14>MUST NOT</bcp14> appear in the <spanx style="verb">shareWith</spanx> map.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA considerations</name>

<section anchor="jmap-capability-registration-for-mailshare"><name>JMAP Capability Registration for "mail:share"</name>

<t>IANA will register the "mail:share" JMAP Capability as follows:</t>

<t><strong>Capability Name:</strong> urn:ietf:params:jmap:mail:share<br />
<strong>Specification document:</strong> this document<br />
<strong>Intended use:</strong> common<br />
<strong>Change Controller:</strong> IETF<br />
<strong>Security and privacy considerations:</strong> this document, <xref target="security-considerations"></xref></t>

</section>
</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC8620">
  <front>
    <title>The JSON Meta Application Protocol (JMAP)</title>
    <author fullname="N. Jenkins" initials="N." surname="Jenkins"/>
    <author fullname="C. Newman" initials="C." surname="Newman"/>
    <date month="July" year="2019"/>
    <abstract>
      <t>This document specifies a protocol for clients to efficiently query, fetch, and modify JSON-based data objects, with support for push notification of changes and fast resynchronisation and for out-of- band binary data upload/download.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8620"/>
  <seriesInfo name="DOI" value="10.17487/RFC8620"/>
</reference>

<reference anchor="RFC8621">
  <front>
    <title>The JSON Meta Application Protocol (JMAP) for Mail</title>
    <author fullname="N. Jenkins" initials="N." surname="Jenkins"/>
    <author fullname="C. Newman" initials="C." surname="Newman"/>
    <date month="August" year="2019"/>
    <abstract>
      <t>This document specifies a data model for synchronising email data with a server using the JSON Meta Application Protocol (JMAP). Clients can use this to efficiently search, access, organise, and send messages, and to get push notifications for fast resynchronisation when new messages are delivered or a change is made in another client.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8621"/>
  <seriesInfo name="DOI" value="10.17487/RFC8621"/>
</reference>

<reference anchor="RFC9670">
  <front>
    <title>JSON Meta Application Protocol (JMAP) Sharing</title>
    <author fullname="N. Jenkins" initials="N." role="editor" surname="Jenkins"/>
    <date month="November" year="2024"/>
    <abstract>
      <t>This document specifies a data model for sharing data between users using the JSON Meta Application Protocol (JMAP). Future documents can reference this document when defining data types to support a consistent model of sharing.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9670"/>
  <seriesInfo name="DOI" value="10.17487/RFC9670"/>
</reference>

<reference anchor="RFC4314">
  <front>
    <title>IMAP4 Access Control List (ACL) Extension</title>
    <author fullname="A. Melnikov" initials="A." surname="Melnikov"/>
    <date month="December" year="2005"/>
    <abstract>
      <t>The Access Control List (ACL) extension (RFC 2086) of the Internet Message Access Protocol (IMAP) permits mailbox access control lists to be retrieved and manipulated through the IMAP protocol.</t>
      <t>This document is a revision of RFC 2086. It defines several new access control rights and clarifies which rights are required for different IMAP commands. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4314"/>
  <seriesInfo name="DOI" value="10.17487/RFC4314"/>
</reference>

<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC3501">
  <front>
    <title>INTERNET MESSAGE ACCESS PROTOCOL - VERSION 4rev1</title>
    <author fullname="M. Crispin" initials="M." surname="Crispin"/>
    <date month="March" year="2003"/>
    <abstract>
      <t>The Internet Message Access Protocol, Version 4rev1 (IMAP4rev1) allows a client to access and manipulate electronic mail messages on a server. IMAP4rev1 permits manipulation of mailboxes (remote message folders) in a way that is functionally equivalent to local folders. IMAP4rev1 also provides the capability for an offline client to resynchronize with the server. IMAP4rev1 includes operations for creating, deleting, and renaming mailboxes, checking for new messages, permanently removing messages, setting and clearing flags, RFC 2822 and RFC 2045 parsing, searching, and selective fetching of message attributes, texts, and portions thereof. Messages in IMAP4rev1 are accessed by the use of numbers. These numbers are either message sequence numbers or unique identifiers. IMAP4rev1 supports a single server. A mechanism for accessing configuration information to support multiple IMAP4rev1 servers is discussed in RFC 2244. IMAP4rev1 does not specify a means of posting mail; this function is handled by a mail transfer protocol such as RFC 2821. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3501"/>
  <seriesInfo name="DOI" value="10.17487/RFC3501"/>
</reference>




    </references>

</references>


<?line 160?>

<section anchor="changes"><name>Changes</name>

<t>[[This section to be removed by RFC Editor]]</t>

<t><strong>draft-degennaro-jmap-mail-sharing-00</strong></t>

<t><list style="symbols">
  <t>Initial version</t>
</list></t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

