⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc3501_en.htm

📁 因特网邮件访问协议-版本4rev1简体中文版。因特网邮件访问协议
💻 HTM
📖 第 1 页 / 共 5 页
字号:
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<!-- saved from url=(0071)http://www.jzdb.cn/agreement/Documents-RFC-English/116307442141468.html -->
<HTML><HEAD><TITLE>RFC3501 - INTERNET MESSAGE ACCESS PROTOCOL - VERSION 4rev1</TITLE>
<META http-equiv=Content-Type content="text/html; charset=gb2312">
<META content=all name=robots>
<META content="" name=description>
<META 
content="RFC3501 - INTERNET MESSAGE ACCESS PROTOCOL - VERSION 4rev1,解决,方案,方法" 
name=keywords><LINK href="RFC3501.files/css.css" type=text/css rel=stylesheet>
<META content="MSHTML 6.00.2900.3132" name=GENERATOR></HEAD>
<BODY>
<DIV id=content1>
  <H2><BR>
  </H2>
  <H1>RFC3501 - INTERNET MESSAGE ACCESS PROTOCOL - VERSION 4rev1</H1>
<DIV class=text><SPAN id=ad_01></SPAN>Network Working Group M. 
Crispin<BR>Request for Comments: 3501 University of Washington<BR>Obsoletes: 
2060 March 2003<BR>Category: Standards Track<BR><BR>INTERNET MESSAGE ACCESS 
PROTOCOL - VERSION 4rev1<BR><BR>Status of this Memo<BR><BR>This document 
specifies an Internet standards track protocol for the<BR>Internet community, 
and requests discussion and suggestions for<BR>improvements. Please refer to the 
current edition of the "Internet<BR>Official Protocol Standards" (STD 1) for the 
standardization state<BR>and status of this protocol. Distribution of this memo 
is unlimited.<BR><BR>Copyright Notice<BR><BR>Copyright (C) The Internet Society 
(2003). All Rights Reserved.<BR><BR>Abstract<BR><BR>The Internet Message Access 
Protocol, Version 4rev1 (IMAP4rev1)<BR>allows a client to access and manipulate 
electronic mail messages on<BR>a server. IMAP4rev1 permits manipulation of 
mailboxes (remote<BR>message folders) in a way that is functionally equivalent 
to local<BR>folders. IMAP4rev1 also provides the capability for an 
offline<BR>client to resynchronize with the server.<BR><BR>IMAP4rev1 includes 
operations for creating, deleting, and renaming<BR>mailboxes, checking for new 
messages, permanently removing messages,<BR>setting and clearing flags, <A 
href="http://www.jzdb.cn/Net/xieyi/index.html/rfcs/rfc2822.html"><U><FONT 
color=#0000ff>RFC2822</FONT></U></A> and <A 
href="http://www.jzdb.cn/Net/xieyi/index.html/rfcs/rfc2045.html"><U><FONT 
color=#0000ff>RFC2045</FONT></U></A> parsing, searching,<BR>and selective 
fetching of message attributes, texts, and portions<BR>thereof. Messages in 
IMAP4rev1 are accessed by the use of numbers.<BR>These numbers are either 
message sequence numbers or unique<BR>identifiers.<BR><BR>IMAP4rev1 supports a 
single server. A mechanism for accessing<BR>configuration information to support 
multiple IMAP4rev1 servers is<BR>discussed in <A 
href="http://www.jzdb.cn/Net/xieyi/index.html/rfcs/rfc2244.html"><U><FONT 
color=#0000ff>RFC2244</FONT></U></A>.<BR><BR>IMAP4rev1 does not specify a means 
of posting mail; this function is<BR>handled by a mail transfer protocol such as 
<A href="http://www.jzdb.cn/Net/xieyi/index.html/rfcs/rfc2821.html"><U><FONT 
color=#0000ff>RFC2821</FONT></U></A>.<BR><BR>Table of Contents<BR><BR>IMAP4rev1 
Protocol Specification ................................ 4<BR>1. How to Read This 
Document ............................... 4<BR>1.1. Organization of This Document 
........................... 4<BR>1.2. Conventions Used in This Document 
....................... 4<BR>1.3. Special Notes to Implementors 
........................... 5<BR>2. Protocol Overview 
....................................... 6<BR>2.1. Link Level 
.............................................. 6<BR>2.2. Commands and Responses 
.................................. 6<BR>2.2.1. Client Protocol Sender and Server 
Protocol Receiver ..... 6<BR>2.2.2. Server Protocol Sender and Client Protocol 
Receiver ..... 7<BR>2.3. Message Attributes 
...................................... 8<BR>2.3.1. Message Numbers 
......................................... 8<BR>2.3.1.1. Unique Identifier (UID) 
Message Attribute ....... 8<BR>2.3.1.2. Message Sequence Number Message 
Attribute ....... 10<BR>2.3.2. Flags Message Attribute 
................................. 11<BR>2.3.3. Internal Date Message Attribute 
......................... 12<BR>2.3.4. [<A 
href="http://www.jzdb.cn/Net/xieyi/index.html/rfcs/rfc2822.html"><U><FONT 
color=#0000ff>RFC-2822</FONT></U></A>] Size Message Attribute 
....................... 12<BR>2.3.5. Envelope Structure Message Attribute 
.................... 12<BR>2.3.6. Body Structure Message Attribute 
........................ 12<BR>2.4. Message Texts 
........................................... 13<BR>3. State and Flow Diagram 
.................................. 13<BR>3.1. Not Authenticated State 
................................. 13<BR>3.2. Authenticated State 
..................................... 13<BR>3.3. Selected State 
.......................................... 13<BR>3.4. Logout State 
............................................ 14<BR>4. Data Formats 
............................................ 16<BR>4.1. Atom 
.................................................... 16<BR>4.2. Number 
.................................................. 16<BR>4.3. String 
.................................................. 16<BR>4.3.1. 8-bit and Binary 
Strings ................................ 17<BR>4.4. Parenthesized List 
...................................... 17<BR>4.5. NIL 
..................................................... 17<BR>5. Operational 
Considerations .............................. 18<BR>5.1. Mailbox Naming 
.......................................... 18<BR>5.1.1. Mailbox Hierarchy Naming 
................................ 19<BR>5.1.2. Mailbox Namespace Naming 
Convention ..................... 19<BR>5.1.3. Mailbox International Naming 
Convention ................. 19<BR>5.2. Mailbox Size and Message Status Updates 
................. 21<BR>5.3. Response when no Command in Progress 
.................... 21<BR>5.4. Autologout Timer 
........................................ 22<BR>5.5. Multiple Commands in 
Progress ........................... 22<BR>6. Client Commands 
........................................ 23<BR>6.1. Client Commands - Any State 
............................ 24<BR>6.1.1. CAPABILITY Command 
..................................... 24<BR>6.1.2. NOOP Command 
........................................... 25<BR>6.1.3. LOGOUT Command 
......................................... 26<BR><BR>6.2. Client Commands - Not 
Authenticated State .............. 26<BR>6.2.1. STARTTLS Command 
....................................... 27<BR>6.2.2. AUTHENTICATE Command 
................................... 28<BR>6.2.3. LOGIN Command 
.......................................... 30<BR>6.3. Client Commands - 
Authenticated State .................. 31<BR>6.3.1. SELECT Command 
......................................... 32<BR>6.3.2. EXAMINE Command 
........................................ 34<BR>6.3.3. CREATE Command 
......................................... 34<BR>6.3.4. DELETE Command 
......................................... 35<BR>6.3.5. RENAME Command 
......................................... 37<BR>6.3.6. SUBSCRIBE Command 
...................................... 39<BR>6.3.7. UNSUBSCRIBE Command 
.................................... 39<BR>6.3.8. LIST Command 
........................................... 40<BR>6.3.9. LSUB Command 
........................................... 43<BR>6.3.10. STATUS Command 
......................................... 44<BR>6.3.11. APPEND Command 
......................................... 46<BR>6.4. Client Commands - Selected 
State ....................... 47<BR>6.4.1. CHECK Command 
.......................................... 47<BR>6.4.2. CLOSE Command 
.......................................... 48<BR>6.4.3. EXPUNGE Command 
........................................ 49<BR>6.4.4. SEARCH Command 
......................................... 49<BR>6.4.5. FETCH Command 
.......................................... 54<BR>6.4.6. STORE Command 
.......................................... 58<BR>6.4.7. COPY Command 
........................................... 59<BR>6.4.8. UID Command 
............................................ 60<BR>6.5. Client Commands - 
Experimental/Expansion ............... 62<BR>6.5.1. X&lt;atom&gt; Command 
........................................ 62<BR>7. Server Responses 
....................................... 62<BR>7.1. Server Responses - Status 
Responses .................... 63<BR>7.1.1. OK Response 
............................................ 65<BR>7.1.2. NO Response 
............................................ 66<BR>7.1.3. BAD Response 
........................................... 66<BR>7.1.4. PREAUTH Response 
....................................... 67<BR>7.1.5. BYE Response 
........................................... 67<BR>7.2. Server Responses - Server 
and Mailbox Status ........... 68<BR>7.2.1. CAPABILITY Response 
.................................... 68<BR>7.2.2. LIST Response 
.......................................... 69<BR>7.2.3. LSUB Response 
.......................................... 70<BR>7.2.4 STATUS Response 
........................................ 70<BR>7.2.5. SEARCH Response 
........................................ 71<BR>7.2.6. FLAGS Response 
......................................... 71<BR>7.3. Server Responses - Mailbox 
Size ........................ 71<BR>7.3.1. EXISTS Response 
........................................ 71<BR>7.3.2. RECENT Response 
........................................ 72<BR>7.4. Server Responses - Message 
Status ...................... 72<BR>7.4.1. EXPUNGE Response 
....................................... 72<BR>7.4.2. FETCH Response 
......................................... 73<BR>7.5. Server Responses - Command 
Continuation Request ........ 79<BR><BR>8. Sample IMAP4rev1 connection 
............................ 80<BR>9. Formal Syntax 
.......................................... 81<BR>10. Author's Note 
.......................................... 92<BR>11. Security Considerations 
................................ 92<BR>11.1. STARTTLS Security Considerations 
....................... 92<BR>11.2. Other Security Considerations 
.......................... 93<BR>12. IANA Considerations 
.................................... 94<BR>Appendices 
..................................................... 95<BR>A. References 
............................................. 95<BR>B. Changes from <A 
href="http://www.jzdb.cn/Net/xieyi/index.html/rfcs/rfc2060.html"><U><FONT 
color=#0000ff>RFC2060</FONT></U></A> .................................. 97<BR>C. 
Key Word Index ......................................... 103<BR>Author's Address 
............................................... 107<BR>Full Copyright Statement 
....................................... 108<BR><BR>IMAP4rev1 Protocol 
Specification<BR><BR>1. How to Read This Document<BR><BR>1.1. Organization of 
This Document<BR><BR>This document is written from the point of view of the 
implementor of<BR>an IMAP4rev1 client or server. Beyond the protocol overview 
in<BR>section 2, it is not optimized for someone trying to understand 
the<BR>operation of the protocol. The material in sections 3 through 
5<BR>provides the general context and definitions with which 
IMAP4rev1<BR>operates.<BR><BR>Sections 6, 7, and 9 describe the IMAP commands, 
responses, and<BR>syntax, respectively. The relationships among these are such 
that it<BR>is almost impossible to understand any of them separately. 
In<BR>particular, do not attempt to deduce command syntax from the 
command<BR>section alone; instead refer to the Formal Syntax 
section.<BR><BR>1.2. Conventions Used in This Document<BR><BR>"Conventions" are 
basic principles or procedures. Document<BR>conventions are noted in this 
section.<BR><BR>In examples, "C:" and "S:" indicate lines sent by the client 
and<BR>server respectively.<BR><BR>The key words "MUST", "MUST NOT", "REQUIRED", 
"SHALL", "SHALL NOT",<BR>"SHOULD", "SHOULD NOT", "MAY", and "OPTIONAL" in this 
document are to<BR>be interpreted as described in [KEYWORDS].<BR><BR>The word 
"can" (not "may") is used to refer to a possible<BR>circumstance or situation, 

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -