rfc2180.IMAP4_multi-accessed_Mailbox_practice.txt 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787
  1. Network Working Group M. Gahrns
  2. Request for Comments: 2180 Microsoft
  3. Category: Informational July 1997
  4. IMAP4 Multi-Accessed Mailbox Practice
  5. Status of this Memo
  6. This memo provides information for the Internet community. This memo
  7. does not specify an Internet standard of any kind. Distribution of
  8. this memo is unlimited.
  9. 1. Abstract
  10. IMAP4[RFC-2060] is rich client/server protocol that allows a client
  11. to access and manipulate electronic mail messages on a server.
  12. Within the protocol framework, it is possible to have differing
  13. results for particular client/server interactions. If a protocol does
  14. not allow for this, it is often unduly restrictive.
  15. For example, when multiple clients are accessing a mailbox and one
  16. attempts to delete the mailbox, an IMAP4 server may choose to
  17. implement a solution based upon server architectural constraints or
  18. individual preference.
  19. With this flexibility comes greater client responsibility. It is not
  20. sufficient for a client to be written based upon the behavior of a
  21. particular IMAP server. Rather the client must be based upon the
  22. behavior allowed by the protocol.
  23. By documenting common IMAP4 server practice for the case of
  24. simultaneous client access to a mailbox, we hope to ensure the widest
  25. amount of inter-operation between IMAP4 clients and servers.
  26. The behavior described in this document reflects the practice of some
  27. existing servers or behavior that the consensus of the IMAP mailing
  28. list has deemed to be reasonable. The behavior described within this
  29. document is believed to be [RFC-2060] compliant. However, this
  30. document is not meant to define IMAP4 compliance, nor is it an
  31. exhaustive list of valid IMAP4 behavior. [RFC-2060] must always be
  32. consulted to determine IMAP4 compliance, especially for server
  33. behavior not described within this document.
  34. Gahrns Informational [Page 1]
  35. RFC 2180 IMAP4 Multi-Accessed Mailbox Practice July 1997
  36. 2. Conventions used in this document
  37. In examples,"C1:", "C2:" and "C3:" indicate lines sent by 3 different
  38. clients (client #1, client #2 and client #3) that are connected to a
  39. server. "S1:", "S2:" and "S3:" indicated lines sent by the server to
  40. client #1, client #2 and client #3 respectively.
  41. A shared mailbox, is a mailbox that can be used by multiple users.
  42. A multi-accessed mailbox, is a mailbox that has multiple clients
  43. simultaneously accessing it.
  44. A client is said to have accessed a mailbox after a successful SELECT
  45. or EXAMINE command.
  46. The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
  47. "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
  48. document are to be interpreted as described in [RFC-2119].
  49. 3. Deletion/Renaming of a multi-accessed mailbox
  50. If an external agent or multiple clients are accessing a mailbox,
  51. care must be taken when handling the deletion or renaming of the
  52. mailbox. Following are some strategies an IMAP server may choose to
  53. use when dealing with this situation.
  54. 3.1. The server MAY fail the DELETE/RENAME command of a multi-accessed
  55. mailbox
  56. In some cases, this behavior may not be practical. For example, if a
  57. large number of clients are accessing a shared mailbox, the window in
  58. which no clients have the mailbox accessed may be small or non-
  59. existent, effectively rendering the mailbox undeletable or
  60. unrenamable.
  61. Example:
  62. <Client #1 and Client #2 have mailbox FOO accessed. Client #1 tries
  63. to DELETE the mailbox and is refused>
  64. C1: A001 DELETE FOO
  65. S1: A001 NO Mailbox FOO is in use by another user.
  66. Gahrns Informational [Page 2]
  67. RFC 2180 IMAP4 Multi-Accessed Mailbox Practice July 1997
  68. 3.2. The server MAY allow the DELETE command of a multi-accessed
  69. mailbox, but keep the information in the mailbox available for
  70. those clients that currently have access to the mailbox.
  71. When all clients have finished accessing the mailbox, it is
  72. permanently removed. For clients that do not already have access to
  73. the mailbox, the 'ghosted' mailbox would not be available. For
  74. example, it would not be returned to these clients in a subsequent
  75. LIST or LSUB command and would not be a valid mailbox argument to any
  76. other IMAP command until the reference count of clients accessing the
  77. mailbox reached 0.
  78. In some cases, this behavior may not be desirable. For example if
  79. someone created a mailbox with offensive or sensitive information,
  80. one might prefer to have the mailbox deleted and all access to the
  81. information contained within removed immediately, rather than
  82. continuing to allow access until the client closes the mailbox.
  83. Furthermore, this behavior, may prevent 'recycling' of the same
  84. mailbox name until all clients have finished accessing the original
  85. mailbox.
  86. Example:
  87. <Client #1 and Client #2 have mailbox FOO selected. Client #1 DELETEs
  88. mailbox FOO>
  89. C1: A001 DELETE FOO
  90. S1: A001 OK Mailbox FOO is deleted.
  91. <Client #2 is still able to operate on the deleted mailbox>
  92. C2: B001 STORE 1 +FLAGS (\Seen)
  93. S2: * 1 FETCH FLAGS (\Seen)
  94. S2: B001 OK STORE completed
  95. <Client #3 which did not have access to the mailbox prior to the
  96. deletion by client #1 does not have access to the mailbox>
  97. C3: C001 STATUS FOO (MESSAGES)
  98. S3: C001 NO Mailbox does not exist
  99. <Nor is client #3 able to create a mailbox with the name FOO, while
  100. the reference count is non zero>
  101. C3: C002 CREATE FOO
  102. S3: C002 NO Mailbox FOO is still in use. Try again later.
  103. Gahrns Informational [Page 3]
  104. RFC 2180 IMAP4 Multi-Accessed Mailbox Practice July 1997
  105. <Client #2 closes its access to the mailbox, no other clients have
  106. access to the mailbox FOO and reference count becomes 0>
  107. C2: B002 CLOSE
  108. S2: B002 OK CLOSE Completed
  109. <Now that the reference count on FOO has reached 0, the mailbox name
  110. can be recycled>
  111. C3: C003 CREATE FOO
  112. S3: C003 OK CREATE Completed
  113. 3.3. The server MAY allow the DELETE/RENAME of a multi-accessed
  114. mailbox, but disconnect all other clients who have the mailbox
  115. accessed by sending a untagged BYE response.
  116. A server may often choose to disconnect clients in the DELETE case,
  117. but may choose to implement a "friendlier" method for the RENAME
  118. case.
  119. Example:
  120. <Client #1 and Client #2 have mailbox FOO accessed. Client #1 DELETEs
  121. the mailbox FOO>
  122. C1: A002 DELETE FOO
  123. S1: A002 OK DELETE completed.
  124. <Server disconnects all other users of the mailbox>
  125. S2: * BYE Mailbox FOO has been deleted.
  126. 3.4. The server MAY allow the RENAME of a multi-accessed mailbox by
  127. simply changing the name attribute on the mailbox.
  128. Other clients that have access to the mailbox can continue issuing
  129. commands such as FETCH that do not reference the mailbox name.
  130. Clients would discover the renaming the next time they referred to
  131. the old mailbox name. Some servers MAY choose to include the
  132. [NEWNAME] response code in their tagged NO response to a command that
  133. contained the old mailbox name, as a hint to the client that the
  134. operation can succeed if the command is issued with the new mailbox
  135. name.
  136. Gahrns Informational [Page 4]
  137. RFC 2180 IMAP4 Multi-Accessed Mailbox Practice July 1997
  138. Example:
  139. <Client #1 and Client #2 have mailbox FOO accessed. Client #1 RENAMEs
  140. the mailbox.>
  141. C1: A001 RENAME FOO BAR
  142. S1: A001 OK RENAME completed.
  143. <Client #2 is still able to do operations that do not reference the
  144. mailbox name>
  145. C2: B001 FETCH 2:4 (FLAGS)
  146. S2: * 2 FETCH . . .
  147. S2: * 3 FETCH . . .
  148. S2: * 4 FETCH . . .
  149. S2: B001 OK FETCH completed
  150. <Client #2 is not able to do operations that reference the mailbox
  151. name>
  152. C2: B002 APPEND FOO {300} C2: Date: Mon, 7 Feb 1994
  153. 21:52:25 0800 (PST) C2: . . . S2: B002 NO [NEWNAME FOO
  154. BAR] Mailbox has been renamed
  155. 4. Expunging of messages on a multi-accessed mailbox
  156. If an external agent or multiple clients are accessing a mailbox,
  157. care must be taken when handling the EXPUNGE of messages. Other
  158. clients accessing the mailbox may be in the midst of issuing a
  159. command that depends upon message sequence numbers. Because an
  160. EXPUNGE response can not be sent while responding to a FETCH, STORE
  161. or SEARCH command, it is not possible to immediately notify the
  162. client of the EXPUNGE. This can result in ambiguity if the client
  163. issues a FETCH, STORE or SEARCH operation on a message that has been
  164. EXPUNGED.
  165. 4.1. Fetching of expunged messages
  166. Following are some strategies an IMAP server may choose to use when
  167. dealing with a FETCH command on expunged messages.
  168. Gahrns Informational [Page 5]
  169. RFC 2180 IMAP4 Multi-Accessed Mailbox Practice July 1997
  170. Consider the following scenario:
  171. - Client #1 and Client #2 have mailbox FOO selected.
  172. - There are 7 messages in the mailbox.
  173. - Messages 4:7 are marked for deletion.
  174. - Client #1 issues an EXPUNGE, to expunge messages 4:7
  175. 4.1.1. The server MAY allow the EXPUNGE of a multi-accessed mailbox but
  176. keep the messages available to satisfy subsequent FETCH commands
  177. until it is able to send an EXPUNGE response to each client.
  178. In some cases, the behavior of keeping "ghosted" messages may not be
  179. desirable. For example if a message contained offensive or sensitive
  180. information, one might prefer to instantaneously remove all access to
  181. the information, regardless of whether another client is in the midst
  182. of accessing it.
  183. Example: (Building upon the scenario outlined in 4.1.)
  184. <Client #2 is still able to access the expunged messages because the
  185. server has kept a 'ghosted' copy of the messages until it is able to
  186. notify client #2 of the EXPUNGE>
  187. C2: B001 FETCH 4:7 RFC822
  188. S2: * 4 FETCH RFC822 . . . (RFC822 info returned)
  189. S2: * 5 FETCH RFC822 . . . (RFC822 info returned)
  190. S2: * 6 FETCH RFC822 . . . (RFC822 info returned)
  191. S2: * 7 FETCH RFC822 . . . (RFC822 info returned)
  192. S2: B001 OK FETCH Completed
  193. <Client #2 issues a command where it can get notified of the EXPUNGE>
  194. C2: B002 NOOP
  195. S2: * 4 EXPUNGE
  196. S2: * 4 EXPUNGE
  197. S2: * 4 EXPUNGE
  198. S2: * 4 EXPUNGE
  199. S2: * 3 EXISTS
  200. S2: B002 OK NOOP Complete
  201. <Client #2 no longer has access to the expunged messages>
  202. C2: B003 FETCH 4:7 RFC822
  203. S2: B003 NO Messages 4:7 are no longer available.
  204. Gahrns Informational [Page 6]
  205. RFC 2180 IMAP4 Multi-Accessed Mailbox Practice July 1997
  206. 4.1.2 The server MAY allow the EXPUNGE of a multi-accessed mailbox,
  207. and on subsequent FETCH commands return FETCH responses only for
  208. non-expunged messages and a tagged NO.
  209. After receiving a tagged NO FETCH response, the client SHOULD issue a
  210. NOOP command so that it will be informed of any pending EXPUNGE
  211. responses. The client may then either reissue the failed FETCH
  212. command, or by examining the EXPUNGE response from the NOOP and the
  213. FETCH response from the FETCH, determine that the FETCH failed
  214. because of pending expunges.
  215. Example: (Building upon the scenario outlined in 4.1.)
  216. <Client #2 attempts to FETCH a mix of expunged and non-expunged
  217. messages. A FETCH response is returned only for then non-expunged
  218. messages along with a tagged NO>
  219. C2: B001 FETCH 3:5 ENVELOPE
  220. S2: * 3 FETCH ENVELOPE . . . (ENVELOPE info returned)
  221. S2: B001 NO Some of the requested messages no longer exist
  222. <Upon receiving a tagged NO FETCH response, Client #2 issues a NOOP
  223. to be informed of any pending EXPUNGE responses>
  224. C2: B002 NOOP
  225. S2: * 4 EXPUNGE
  226. S2: * 4 EXPUNGE
  227. S2: * 4 EXPUNGE
  228. S2: * 4 EXPUNGE
  229. S2: * 3 EXISTS
  230. S2: B002 OK NOOP Completed.
  231. <By receiving a FETCH response for message 3, and an EXPUNGE response
  232. that indicates messages 4:7 have been expunged, the client does not
  233. need to re-issue the FETCH>
  234. Gahrns Informational [Page 7]
  235. RFC 2180 IMAP4 Multi-Accessed Mailbox Practice July 1997
  236. 4.1.3 The server MAY allow the EXPUNGE of a multi-accessed mailbox, and
  237. on subsequent FETCH commands return the usual FETCH responses for
  238. non-expunged messages, "NIL FETCH Responses" for expunged
  239. messages, and a tagged OK response.
  240. If all of the messages in the subsequent FETCH command have been
  241. expunged, the server SHOULD return only a tagged NO. In this case,
  242. the client SHOULD issue a NOOP command so that it will be informed of
  243. any pending EXPUNGE responses. The client may then either reissue
  244. the failed FETCH command, or by examining the EXPUNGE response from
  245. the NOOP, determine that the FETCH failed because of pending
  246. expunges.
  247. "NIL FETCH responses" are a representation of empty data as
  248. appropriate for the FETCH argument specified.
  249. Example:
  250. * 1 FETCH (ENVELOPE (NIL NIL NIL NIL NIL NIL NIL NIL NIL NIL))
  251. * 1 FETCH (FLAGS ())
  252. * 1 FETCH (INTERNALDATE "00-Jan-0000 00:00:00 +0000")
  253. * 1 FETCH (RFC822 "")
  254. * 1 FETCH (RFC822.HEADER "")
  255. * 1 FETCH (RFC822.TEXT "")
  256. * 1 FETCH (RFC822.SIZE 0)
  257. * 1 FETCH (BODY ("TEXT" "PLAIN" NIL NIL NIL "7BIT" 0 0)
  258. * 1 FETCH (BODYSTRUCTURE ("TEXT" "PLAIN" NIL NIL NIL "7BIT" 0 0)
  259. * 1 FETCH (BODY[<section>] "")
  260. * 1 FETCH (BODY[<section>]<partial> "")
  261. In some cases, a client may not be able to distinguish between "NIL
  262. FETCH responses" received because a message was expunged and those
  263. received because the data actually was NIL. For example, a * 5
  264. FETCH (FLAGS ()) response could be received if no flags were set on
  265. message 5, or because message 5 was expunged. In a case of potential
  266. ambiguity, the client SHOULD issue a command such as NOOP to force
  267. the sending of the EXPUNGE responses to resolve any ambiguity.
  268. Example: (Building upon the scenario outlined in 4.1.)
  269. <Client #2 attempts to access a mix of expunged and non-expunged
  270. messages. Normal data is returned for non-expunged message, "NIL
  271. FETCH responses" are returned for expunged messages>
  272. Gahrns Informational [Page 8]
  273. RFC 2180 IMAP4 Multi-Accessed Mailbox Practice July 1997
  274. C2: B002 FETCH 3:5 ENVELOPE
  275. S2: * 3 FETCH ENVELOPE . . . (ENVELOPE info returned)
  276. S2: * 4 FETCH ENVELOPE (NIL NIL NIL NIL NIL NIL NIL NIL
  277. NIL NIL)
  278. S2: * 5 FETCH ENVELOPE (NIL NIL NIL NIL NIL NIL NIL NIL
  279. NIL NIL)
  280. S2: B002 OK FETCH Completed
  281. <Client #2 attempts to FETCH only expunged messages and receives a
  282. tagged NO response>
  283. C2: B002 FETCH 4:7 ENVELOPE
  284. S2: B002 NO Messages 4:7 have been expunged.
  285. 4.1.4 To avoid the situation altogether, the server MAY fail the
  286. EXPUNGE of a multi-accessed mailbox
  287. In some cases, this behavior may not be practical. For example, if a
  288. large number of clients are accessing a shared mailbox, the window in
  289. which no clients have the mailbox accessed may be small or non-
  290. existent, effectively rendering the message unexpungeable.
  291. 4.2. Storing of expunged messages
  292. Following are some strategies an IMAP server may choose to use when
  293. dealing with a STORE command on expunged messages.
  294. 4.2.1 If the ".SILENT" suffix is used, and the STORE completed
  295. successfully for all the non-expunged messages, the server SHOULD
  296. return a tagged OK.
  297. Example: (Building upon the scenario outlined in 4.1.)
  298. <Client #2 tries to silently STORE flags on expunged and non-
  299. expunged messages. The server sets the flags on the non-expunged
  300. messages and returns OK>
  301. C2: B001 STORE 1:7 +FLAGS.SILENT (\SEEN)
  302. S2: B001 OK
  303. Gahrns Informational [Page 9]
  304. RFC 2180 IMAP4 Multi-Accessed Mailbox Practice July 1997
  305. 4.2.2. If the ".SILENT" suffix is not used, and only expunged messages
  306. are referenced, the server SHOULD return only a tagged NO.
  307. Example: (Building upon the scenario outlined in 4.1.)
  308. <Client #2 tries to STORE flags only on expunged messages>
  309. C2: B001 STORE 5:7 +FLAGS (\SEEN)
  310. S2: B001 NO Messages have been expunged
  311. 4.2.3. If the ".SILENT" suffix is not used, and a mixture of expunged
  312. and non-expunged messages are referenced, the server MAY set the
  313. flags and return a FETCH response for the non-expunged messages
  314. along with a tagged NO.
  315. After receiving a tagged NO STORE response, the client SHOULD issue a
  316. NOOP command so that it will be informed of any pending EXPUNGE
  317. responses. The client may then either reissue the failed STORE
  318. command, or by examining the EXPUNGE responses from the NOOP and
  319. FETCH responses from the STORE, determine that the STORE failed
  320. because of pending expunges.
  321. Example: (Building upon the scenario outlined in 4.1.)
  322. <Client #2 tries to STORE flags on a mixture of expunged and non-
  323. expunged messages>
  324. C2: B001 STORE 1:7 +FLAGS (\SEEN)
  325. S2: * FETCH 1 FLAGS (\SEEN)
  326. S2: * FETCH 2 FLAGS (\SEEN)
  327. S2: * FETCH 3 FLAGS (\SEEN)
  328. S2: B001 NO Some of the messages no longer exist.
  329. C2: B002 NOOP
  330. S2: * 4 EXPUNGE
  331. S2: * 4 EXPUNGE
  332. S2: * 4 EXPUNGE
  333. S2: * 4 EXPUNGE
  334. S2: * 3 EXISTS
  335. S2: B002 OK NOOP Completed.
  336. <By receiving FETCH responses for messages 1:3, and an EXPUNGE
  337. response that indicates messages 4:7 have been expunged, the client
  338. does not need to re-issue the STORE>
  339. Gahrns Informational [Page 10]
  340. RFC 2180 IMAP4 Multi-Accessed Mailbox Practice July 1997
  341. 4.2.4. If the ".SILENT" suffix is not used, and a mixture of expunged
  342. and non-expunged messages are referenced, the server MAY return
  343. an untagged NO and not set any flags.
  344. After receiving a tagged NO STORE response, the client SHOULD issue a
  345. NOOP command so that it will be informed of any pending EXPUNGE
  346. responses. The client would then re-issue the STORE command after
  347. updating its message list per any EXPUNGE response.
  348. If a large number of clients are accessing a shared mailbox, the
  349. window in which there are no pending expunges may be small or non-
  350. existent, effectively disallowing a client from setting the flags on
  351. all messages at once.
  352. Example: (Building upon the scenario outlined in 4.1.)
  353. <Client #2 tries to STORE flags on a mixture of expunged and non-
  354. expunged messages>
  355. C2: B001 STORE 1:7 +FLAGS (\SEEN)
  356. S2: B001 NO Some of the messages no longer exist.
  357. <Client #2 issues a NOOP to be informed of the EXPUNGED messages>
  358. C2: B002 NOOP
  359. S2: * 4 EXPUNGE
  360. S2: * 4 EXPUNGE
  361. S2: * 4 EXPUNGE
  362. S2: * 4 EXPUNGE
  363. S2: * 3 EXISTS
  364. S2: B002 OK NOOP Completed.
  365. <Client #2 updates its message list and re-issues the STORE on only
  366. those messages that have not been expunged>
  367. C2: B003 STORE 1:3 +FLAGS (\SEEN) S2: * FETCH 1 FLAGS
  368. (\SEEN) S2: * FETCH 2 FLAGS (\SEEN) S2: * FETCH 3 FLAGS
  369. (\SEEN) S2: B003 OK STORE Completed
  370. 4.3. Searching of expunged messages
  371. A server MAY simply not return a search response for messages that
  372. have been expunged and it has not been able to inform the client
  373. about. If a client was expecting a particular message to be returned
  374. in a search result, and it was not, the client SHOULD issue a NOOP
  375. command to see if the message was expunged by another client.
  376. Gahrns Informational [Page 11]
  377. RFC 2180 IMAP4 Multi-Accessed Mailbox Practice July 1997
  378. 4.4 Copying of expunged messages
  379. COPY is the only IMAP4 sequence number command that is safe to allow
  380. an EXPUNGE response on. This is because a client is not permitted to
  381. cascade several COPY commands together. A client is required to wait
  382. and confirm that the copy worked before issuing another one.
  383. 4.4.1 The server MAY disallow the COPY of messages in a multi-access
  384. mailbox that contains expunged messages.
  385. Pending EXPUNGE response(s) MUST be returned to the COPY command.
  386. Example:
  387. C: A001 COPY 2,4,6,8 FRED
  388. S: * 4 EXPUNGE
  389. S: A001 NO COPY rejected, because some of the requested
  390. messages were expunged
  391. Note: Non of the above messages are copied because if a COPY command
  392. is unsuccessful, the server MUST restore the destination mailbox to
  393. its state before the COPY attempt.
  394. 4.4.2 The server MAY allow the COPY of messages in a multi-access
  395. mailbox that contains expunged messages.
  396. Pending EXPUNGE response(s) MUST be returned to the COPY command.
  397. Messages that are copied are messages corresponding to sequence
  398. numbers before any EXPUNGE response.
  399. Example:
  400. C: A001 COPY 2,4,6,8 FRED
  401. S: * 3 EXPUNGE
  402. S: A001 OK COPY completed
  403. In the above example, the messages that are copied to FRED are
  404. messages 2,4,6,8 at the start of the COPY command. These are
  405. equivalent to messages 2,3,5,7 at the end of the COPY command. The
  406. EXPUNGE response can't take place until after the messages from the
  407. COPY command are identified (because of the "no expunge while no
  408. commands in progress" rule).
  409. Gahrns Informational [Page 12]
  410. RFC 2180 IMAP4 Multi-Accessed Mailbox Practice July 1997
  411. Example:
  412. C: A001 COPY 2,4,6,8 FRED
  413. S: * 4 EXPUNGE
  414. S: A001 OK COPY completed
  415. In the above example, message 4 was copied before it was expunged,
  416. and MUST appear in the destination mailbox FRED.
  417. 5. Security Considerations
  418. This document describes behavior of servers that use the IMAP4
  419. protocol, and as such, has the same security considerations as
  420. described in [RFC-2060].
  421. In particular, some described server behavior does not allow for the
  422. immediate deletion of information when a mailbox is accessed by
  423. multiple clients. This may be a consideration when dealing with
  424. sensitive information where immediate deletion would be preferred.
  425. 6. References
  426. [RFC-2060], Crispin, M., "Internet Message Access Protocol - Version
  427. 4rev1", RFC 2060, University of Washington, December 1996.
  428. [RFC-2119], Bradner, S., "Key words for use in RFCs to Indicate
  429. Requirement Levels", RFC 2119, Harvard University, March 1997.
  430. 7. Acknowledgments
  431. This document is the result of discussions on the IMAP4 mailing list
  432. and is meant to reflect consensus of this group. In particular,
  433. Raymond Cheng, Mark Crispin, Jim Evans, Erik Forsberg, Steve Hole,
  434. Mark Keasling, Barry Leiba, Syd Logan, John Mani, Pat Moran, Larry
  435. Osterman, Chris Newman, Bart Schaefer, Vladimir Vulovic, and Jack De
  436. Winter were active participants in this discussion or made
  437. suggestions to this document.
  438. Gahrns Informational [Page 13]
  439. RFC 2180 IMAP4 Multi-Accessed Mailbox Practice July 1997
  440. 8. Author's Address
  441. Mike Gahrns
  442. Microsoft
  443. One Microsoft Way
  444. Redmond, WA, 98072
  445. Phone: (206) 936-9833
  446. EMail: mikega@microsoft.com
  447. Gahrns Informational [Page 14]