rfc1734.POP3_AUTHentication 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439
  1. <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
  2. "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
  3. <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
  4. <head profile="http://dublincore.org/documents/2008/08/04/dc-html/">
  5. <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
  6. <meta name="robots" content="index,follow" />
  7. <meta name="creator" content="rfcmarkup version 1.111" />
  8. <link rel="schema.DC" href="http://purl.org/dc/elements/1.1/" />
  9. <meta name="DC.Identifier" content="urn:ietf:rfc:1734" />
  10. <meta name="DC.Description.Abstract" content="This document describes the optional AUTH command, for indicating an
  11. authentication mechanism to the server, performing an authentication
  12. protocol exchange, and optionally negotiating a protection mechanism
  13. for subsequent protocol interactions. [STANDARDS-TRACK]" />
  14. <meta name="DC.Creator" content="J. Myers" />
  15. <meta name="DC.Date.Issued" content="December, 1994" />
  16. <meta name="DC.Title" content="POP3 AUTHentication command" />
  17. <link rel="icon" href="/images/rfc.png" type="image/png" />
  18. <link rel="shortcut icon" href="/images/rfc.png" type="image/png" />
  19. <title>RFC 1734 - POP3 AUTHentication command</title>
  20. <style type="text/css">
  21. body {
  22. margin: 0px 8px;
  23. font-size: 1em;
  24. }
  25. h1, h2, h3, h4, h5, h6, .h1, .h2, .h3, .h4, .h5, .h6 {
  26. font-weight: bold;
  27. line-height: 0pt;
  28. display: inline;
  29. white-space: pre;
  30. font-family: monospace;
  31. font-size: 1em;
  32. font-weight: bold;
  33. }
  34. pre {
  35. font-size: 1em;
  36. margin-top: 0px;
  37. margin-bottom: 0px;
  38. }
  39. .pre {
  40. white-space: pre;
  41. font-family: monospace;
  42. }
  43. .header{
  44. font-weight: bold;
  45. }
  46. .newpage {
  47. page-break-before: always;
  48. }
  49. .invisible {
  50. text-decoration: none;
  51. color: white;
  52. }
  53. a.selflink {
  54. color: black;
  55. text-decoration: none;
  56. }
  57. @media print {
  58. body {
  59. font-family: monospace;
  60. font-size: 10.5pt;
  61. }
  62. h1, h2, h3, h4, h5, h6 {
  63. font-size: 1em;
  64. }
  65. a:link, a:visited {
  66. color: inherit;
  67. text-decoration: none;
  68. }
  69. .noprint {
  70. display: none;
  71. }
  72. }
  73. @media screen {
  74. .grey, .grey a:link, .grey a:visited {
  75. color: #777;
  76. }
  77. .docinfo {
  78. background-color: #EEE;
  79. }
  80. .top {
  81. border-top: 7px solid #EEE;
  82. }
  83. .bgwhite { background-color: white; }
  84. .bgred { background-color: #F44; }
  85. .bggrey { background-color: #666; }
  86. .bgbrown { background-color: #840; }
  87. .bgorange { background-color: #FA0; }
  88. .bgyellow { background-color: #EE0; }
  89. .bgmagenta{ background-color: #F4F; }
  90. .bgblue { background-color: #66F; }
  91. .bgcyan { background-color: #4DD; }
  92. .bggreen { background-color: #4F4; }
  93. .legend { font-size: 90%; }
  94. .cplate { font-size: 70%; border: solid grey 1px; }
  95. }
  96. </style>
  97. <!--[if IE]>
  98. <style>
  99. body {
  100. font-size: 13px;
  101. margin: 10px 10px;
  102. }
  103. </style>
  104. <![endif]-->
  105. <script type="text/javascript"><!--
  106. function addHeaderTags() {
  107. var spans = document.getElementsByTagName("span");
  108. for (var i=0; i < spans.length; i++) {
  109. var elem = spans[i];
  110. if (elem) {
  111. var level = elem.getAttribute("class");
  112. if (level == "h1" || level == "h2" || level == "h3" || level == "h4" || level == "h5" || level == "h6") {
  113. elem.innerHTML = "<"+level+">"+elem.innerHTML+"</"+level+">";
  114. }
  115. }
  116. }
  117. }
  118. var legend_html = "Colour legend:<br /> <table> <tr><td>Unknown:</td> <td><span class='cplate bgwhite'>&nbsp;&nbsp;&nbsp;&nbsp;</span></td></tr> <tr><td>Draft:</td> <td><span class='cplate bgred'>&nbsp;&nbsp;&nbsp;&nbsp;</span></td></tr> <tr><td>Informational:</td> <td><span class='cplate bgorange'>&nbsp;&nbsp;&nbsp;&nbsp;</span></td></tr> <tr><td>Experimental:</td> <td><span class='cplate bgyellow'>&nbsp;&nbsp;&nbsp;&nbsp;</span></td></tr> <tr><td>Best Common Practice:</td> <td><span class='cplate bgmagenta'>&nbsp;&nbsp;&nbsp;&nbsp;</span></td></tr> <tr><td>Proposed Standard:</td> <td><span class='cplate bgblue'>&nbsp;&nbsp;&nbsp;&nbsp;</span></td></tr> <tr><td>Draft Standard (old designation):</td> <td><span class='cplate bgcyan'>&nbsp;&nbsp;&nbsp;&nbsp;</span></td></tr> <tr><td>Internet Standard:</td> <td><span class='cplate bggreen'>&nbsp;&nbsp;&nbsp;&nbsp;</span></td></tr> <tr><td>Historic:</td> <td><span class='cplate bggrey'>&nbsp;&nbsp;&nbsp;&nbsp;</span></td></tr> <tr><td>Obsolete:</td> <td><span class='cplate bgbrown'>&nbsp;&nbsp;&nbsp;&nbsp;</span></td></tr> </table>";
  119. function showElem(id) {
  120. var elem = document.getElementById(id);
  121. elem.innerHTML = eval(id+"_html");
  122. elem.style.visibility='visible';
  123. }
  124. function hideElem(id) {
  125. var elem = document.getElementById(id);
  126. elem.style.visibility='hidden';
  127. elem.innerHTML = "";
  128. }
  129. // -->
  130. </script>
  131. </head>
  132. <body onload="addHeaderTags()">
  133. <div style="height: 13px;">
  134. <div onmouseover="this.style.cursor='pointer';"
  135. onclick="showElem('legend');"
  136. onmouseout="hideElem('legend')"
  137. style="height: 6px; position: absolute;"
  138. class="pre noprint docinfo bgbrown"
  139. title="Click for colour legend." > </div>
  140. <div id="legend"
  141. class="docinfo noprint pre legend"
  142. style="position:absolute; top: 4px; left: 4ex; visibility:hidden; background-color: white; padding: 4px 9px 5px 7px; border: solid #345 1px; "
  143. onmouseover="showElem('legend');"
  144. onmouseout="hideElem('legend');">
  145. </div>
  146. </div>
  147. <span class="pre noprint docinfo top">[<a href="../html/" title="Document search and retrieval page">Docs</a>] [<a href="/rfc/rfc1734.txt" title="Plaintext version of this document">txt</a>|<a href="/pdf/rfc1734" title="PDF version of this document">pdf</a>] [<a href="./draft-myers-pop3-auth" title="draft-myers-pop3-auth">draft-myers-pop3-...</a>] [<a href="/rfcdiff?difftype=--hwdiff&amp;url2=rfc1734" title="Inline diff (wdiff)">Diff1</a>] [<a href="/rfcdiff?url2=rfc1734" title="Side-by-side diff">Diff2</a>] </span><br />
  148. <span class="pre noprint docinfo"> </span><br />
  149. <span class="pre noprint docinfo">Obsoleted by: <a href="./rfc5034">5034</a> PROPOSED STANDARD</span><br />
  150. <span class="pre noprint docinfo"> </span><br />
  151. <pre>
  152. Network Working Group J. Myers
  153. Request for Comments: 1734 Carnegie Mellon
  154. Category: Standards Track December 1994
  155. <span class="h1">POP3 AUTHentication command</span>
  156. Status of this Memo
  157. This document specifies an Internet standards track protocol for the
  158. Internet community, and requests discussion and suggestions for
  159. improvements. Please refer to the current edition of the "Internet
  160. Official Protocol Standards" (STD 1) for the standardization state
  161. and status of this protocol. Distribution of this memo is unlimited.
  162. <span class="h2"><a class="selflink" name="section-1" href="#section-1">1</a>. Introduction</span>
  163. This document describes the optional AUTH command, for indicating an
  164. authentication mechanism to the server, performing an authentication
  165. protocol exchange, and optionally negotiating a protection mechanism
  166. for subsequent protocol interactions. The authentication and
  167. protection mechanisms used by the POP3 AUTH command are those used by
  168. IMAP4.
  169. <span class="h2"><a class="selflink" name="section-2" href="#section-2">2</a>. The AUTH command</span>
  170. AUTH mechanism
  171. Arguments:
  172. a string identifying an IMAP4 authentication mechanism,
  173. such as defined by [<a href="#ref-IMAP4-AUTH" title="&quot;IMAP4 Authentication Mechanisms&quot;">IMAP4-AUTH</a>]. Any use of the string
  174. "imap" used in a server authentication identity in the
  175. definition of an authentication mechanism is replaced with
  176. the string "pop".
  177. Restrictions:
  178. may only be given in the AUTHORIZATION state
  179. Discussion:
  180. The AUTH command indicates an authentication mechanism to
  181. the server. If the server supports the requested
  182. authentication mechanism, it performs an authentication
  183. protocol exchange to authenticate and identify the user.
  184. Optionally, it also negotiates a protection mechanism for
  185. subsequent protocol interactions. If the requested
  186. authentication mechanism is not supported, the server
  187. <span class="grey">Myers [Page 1]</span>
  188. </pre><!--NewPage--><pre class='newpage'><a name="page-2" id="page-2" href="#page-2" class="invisible"> </a>
  189. <span class="grey"><a href="./rfc1734">RFC 1734</a> POP3 AUTH December 1994</span>
  190. should reject the AUTH command by sending a negative
  191. response.
  192. The authentication protocol exchange consists of a series
  193. of server challenges and client answers that are specific
  194. to the authentication mechanism. A server challenge,
  195. otherwise known as a ready response, is a line consisting
  196. of a "+" character followed by a single space and a BASE64
  197. encoded string. The client answer consists of a line
  198. containing a BASE64 encoded string. If the client wishes
  199. to cancel an authentication exchange, it should issue a
  200. line with a single "*". If the server receives such an
  201. answer, it must reject the AUTH command by sending a
  202. negative response.
  203. A protection mechanism provides integrity and privacy
  204. protection to the protocol session. If a protection
  205. mechanism is negotiated, it is applied to all subsequent
  206. data sent over the connection. The protection mechanism
  207. takes effect immediately following the CRLF that concludes
  208. the authentication exchange for the client, and the CRLF of
  209. the positive response for the server. Once the protection
  210. mechanism is in effect, the stream of command and response
  211. octets is processed into buffers of ciphertext. Each
  212. buffer is transferred over the connection as a stream of
  213. octets prepended with a four octet field in network byte
  214. order that represents the length of the following data.
  215. The maximum ciphertext buffer length is defined by the
  216. protection mechanism.
  217. The server is not required to support any particular
  218. authentication mechanism, nor are authentication mechanisms
  219. required to support any protection mechanisms. If an AUTH
  220. command fails with a negative response, the session remains
  221. in the AUTHORIZATION state and client may try another
  222. authentication mechanism by issuing another AUTH command,
  223. or may attempt to authenticate by using the USER/PASS or
  224. APOP commands. In other words, the client may request
  225. authentication types in decreasing order of preference,
  226. with the USER/PASS or APOP command as a last resort.
  227. Should the client successfully complete the authentication
  228. exchange, the POP3 server issues a positive response and
  229. the POP3 session enters the TRANSACTION state.
  230. Possible Responses:
  231. +OK maildrop locked and ready
  232. -ERR authentication exchange failed
  233. <span class="grey">Myers [Page 2]</span>
  234. </pre><!--NewPage--><pre class='newpage'><a name="page-3" id="page-3" href="#page-3" class="invisible"> </a>
  235. <span class="grey"><a href="./rfc1734">RFC 1734</a> POP3 AUTH December 1994</span>
  236. Examples:
  237. S: +OK POP3 server ready
  238. C: AUTH KERBEROS_V4
  239. S: + AmFYig==
  240. C: BAcAQU5EUkVXLkNNVS5FRFUAOCAsho84kLN3/IJmrMG+25a4DT
  241. +nZImJjnTNHJUtxAA+o0KPKfHEcAFs9a3CL5Oebe/ydHJUwYFd
  242. WwuQ1MWiy6IesKvjL5rL9WjXUb9MwT9bpObYLGOKi1Qh
  243. S: + or//EoAADZI=
  244. C: DiAF5A4gA+oOIALuBkAAmw==
  245. S: +OK Kerberos V4 authentication successful
  246. ...
  247. C: AUTH FOOBAR
  248. S: -ERR Unrecognized authentication type
  249. Note: the line breaks in the first client answer are
  250. for editorial clarity and are not in real authentica-
  251. tors.
  252. <span class="grey">Myers [Page 3]</span>
  253. </pre><!--NewPage--><pre class='newpage'><a name="page-4" id="page-4" href="#page-4" class="invisible"> </a>
  254. <span class="grey"><a href="./rfc1734">RFC 1734</a> POP3 AUTH December 1994</span>
  255. <span class="h2"><a class="selflink" name="section-3" href="#section-3">3</a>. Formal Syntax</span>
  256. The following syntax specification uses the augmented Backus-Naur
  257. Form (BNF) notation as specified in <a href="./rfc822">RFC 822</a>.
  258. Except as noted otherwise, all alphabetic characters are case-
  259. insensitive. The use of upper or lower case characters to define
  260. token strings is for editorial clarity only. Implementations MUST
  261. accept these strings in a case-insensitive fashion.
  262. ATOM_CHAR ::= &lt;any CHAR except atom_specials&gt;
  263. atom_specials ::= "(" / ")" / "{" / SPACE / CTLs / "%" / "*" /
  264. &lt;"&gt; / "\"
  265. auth ::= "AUTH" 1*(SPACE / TAB) auth_type *(CRLF base64)
  266. CRLF
  267. auth_type ::= 1*ATOM_CHAR
  268. base64 ::= *(4base64_CHAR) [base64_terminal]
  269. base64_char ::= "A" / "B" / "C" / "D" / "E" / "F" / "G" / "H" /
  270. "I" / "J" / "K" / "L" / "M" / "N" / "O" / "P" /
  271. "Q" / "R" / "S" / "T" / "U" / "V" / "W" / "X" /
  272. "Y" / "Z" /
  273. "a" / "b" / "c" / "d" / "e" / "f" / "g" / "h" /
  274. "i" / "j" / "k" / "l" / "m" / "n" / "o" / "p" /
  275. "q" / "r" / "s" / "t" / "u" / "v" / "w" / "x" /
  276. "y" / "z" /
  277. "0" / "1" / "2" / "3" / "4" / "5" / "6" / "7" /
  278. "8" / "9" / "+" / "/"
  279. ;; Case-sensitive
  280. base64_terminal ::= (2base64_char "==") / (3base64_char "=")
  281. CHAR ::= &lt;any 7-bit US-ASCII character except NUL,
  282. 0x01 - 0x7f&gt;
  283. continue_req ::= "+" SPACE base64 CRLF
  284. CR ::= &lt;ASCII CR, carriage return, 0x0C&gt;
  285. CRLF ::= CR LF
  286. CTL ::= &lt;any ASCII control character and DEL,
  287. 0x00 - 0x1f, 0x7f&gt;
  288. <span class="grey">Myers [Page 4]</span>
  289. </pre><!--NewPage--><pre class='newpage'><a name="page-5" id="page-5" href="#page-5" class="invisible"> </a>
  290. <span class="grey"><a href="./rfc1734">RFC 1734</a> POP3 AUTH December 1994</span>
  291. LF ::= &lt;ASCII LF, line feed, 0x0A&gt;
  292. SPACE ::= &lt;ASCII SP, space, 0x20&gt;
  293. TAB ::= &lt;ASCII HT, tab, 0x09&gt;
  294. <span class="h2"><a class="selflink" name="section-4" href="#section-4">4</a>. References</span>
  295. [<a name="ref-IMAP4-AUTH" id="ref-IMAP4-AUTH">IMAP4-AUTH</a>] Myers, J., "IMAP4 Authentication Mechanisms", <a href="./rfc1731">RFC 1731</a>,
  296. Carnegie Mellon, December 1994.
  297. <span class="h2"><a class="selflink" name="section-5" href="#section-5">5</a>. Security Considerations</span>
  298. Security issues are discussed throughout this memo.
  299. <span class="h2"><a class="selflink" name="section-6" href="#section-6">6</a>. Author's Address</span>
  300. John G. Myers
  301. Carnegie-Mellon University
  302. 5000 Forbes Ave
  303. Pittsburgh, PA 15213
  304. EMail: jgm+@cmu.edu
  305. Myers [Page 5]
  306. </pre><br />
  307. <span class="noprint"><small><small>Html markup produced by rfcmarkup 1.111, available from
  308. <a href="https://tools.ietf.org/tools/rfcmarkup/">https://tools.ietf.org/tools/rfcmarkup/</a>
  309. </small></small></span>
  310. </body></html>