亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc4468.txt

?? 廣泛使用的郵件服務器!同時
?? TXT
?? 第 1 頁 / 共 2 頁
字號:
Network Working Group                                          C. NewmanRequest for Comments: 4468                              Sun MicrosystemsUpdates: 3463                                                   May 2006Category: Standards Track                   Message Submission BURL ExtensionStatus of This Memo   This document specifies an Internet standards track protocol for the   Internet community, and requests discussion and suggestions for   improvements.  Please refer to the current edition of the "Internet   Official Protocol Standards" (STD 1) for the standardization state   and status of this protocol.  Distribution of this memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (2006).Abstract   The submission profile of Simple Mail Transfer Protocol (SMTP)   provides a standard way for an email client to submit a complete   message for delivery.  This specification extends the submission   profile by adding a new BURL command that can be used to fetch   submission data from an Internet Message Access Protocol (IMAP)   server.  This permits a mail client to inject content from an IMAP   server into the SMTP infrastructure without downloading it to the   client and uploading it back to the server.Newman                      Standards Track                     [Page 1]RFC 4468           Message Submission BURL Extension            May 2006Table of Contents   1. Introduction ....................................................2   2. Conventions Used in This Document ...............................2   3. BURL Submission Extension .......................................3      3.1. SMTP Submission Extension Registration .....................3      3.2. BURL Transaction ...........................................3      3.3. The BURL IMAP Options ......................................4      3.4. Examples ...................................................5      3.5. Formal Syntax ..............................................6   4. 8-Bit and Binary ................................................7   5. Updates to RFC 3463 .............................................7   6. Response Codes ..................................................7   7. IANA Considerations .............................................9   8. Security Considerations .........................................9   9. References .....................................................11      9.1. Normative References ......................................11      9.2. Informative References ....................................12   Appendix A.  Acknowledgements .....................................131.  Introduction   This specification defines an extension to the standard Message   Submission [RFC4409] protocol to permit data to be fetched from an   IMAP server at message submission time.  This MAY be used in   conjunction with the CHUNKING [RFC3030] mechanism so that chunks of   the message can come from an external IMAP server.  This provides the   ability to forward an email message without first downloading it to   the client.2.  Conventions Used in This Document   The key words "MUST", "MUST NOT", "SHOULD", "SHOULD NOT", and "MAY"   in this document are to be interpreted as defined in "Key words for   use in RFCs to Indicate Requirement Levels" [RFC2119].   The formal syntax uses the Augmented Backus-Naur Form (ABNF)   [RFC4234] notation including the core rules defined in Appendix B of   RFC 4234.Newman                      Standards Track                     [Page 2]RFC 4468           Message Submission BURL Extension            May 20063.  BURL Submission Extension   This section defines the BURL submission extension.3.1.  SMTP Submission Extension Registration   1.  The name of this submission extension is "BURL".  This extends       the Message Submission protocol on port 587 and MUST NOT be       advertised by a regular SMTP [RFC2821] server on port 25 that       acts as a relay for incoming mail from other SMTP relays.   2.  The EHLO keyword value associated with the extension is "BURL".   3.  The BURL EHLO keyword will have zero or more arguments.  The only       argument defined at this time is the "imap" argument, which MUST       be present in order to use IMAP URLs with BURL.  Clients MUST       ignore other arguments after the BURL EHLO keyword unless they       are defined by a subsequent IETF standards track specification.       The arguments that appear after the BURL EHLO keyword may change       subsequent to the use of SMTP AUTH [RFC2554], so a server that       advertises BURL with no arguments prior to authentication       indicates that BURL is supported but authentication is required       to use it.   4.  This extension adds the BURL SMTP verb.  This verb is used as a       replacement for the DATA command and is only permitted during a       mail transaction after at least one successful RCPT TO.3.2.  BURL Transaction   A simple BURL transaction will consist of MAIL FROM, one or more RCPT   TO headers, and a BURL command with the "LAST" tag.  The BURL command   will include an IMAP URL pointing to a fully formed message ready for   injection into the SMTP infrastructure.  If PIPELINING [RFC2920] is   advertised, the client MAY send the entire transaction in one round   trip.  If no valid RCPT TO address is supplied, the BURL command will   simply fail, and no resolution of the BURL URL argument will be   performed.  If at least one valid RCPT TO address is supplied, then   the BURL URL argument will be resolved before the server responds to   the command.   A more sophisticated BURL transaction MAY occur when the server also   advertises CHUNKING [RFC3030].  In this case, the BURL and BDAT   commands may be interleaved until one of them terminates the   transaction with the "LAST" argument.  If PIPELINING [RFC2920] is   also advertised, then the client may pipeline the entire transaction   in one round-trip.  However, it MUST wait for the results of the   "LAST" BDAT or BURL command prior to initiating a new transaction.Newman                      Standards Track                     [Page 3]RFC 4468           Message Submission BURL Extension            May 2006   The BURL command directs the server to fetch the data object to which   the URL refers and include it in the message.  If the URL fetch   fails, the server will fail the entire transaction.3.3.  The BURL IMAP Options   When "imap" is present in the space-separated list of arguments   following the BURL EHLO keyword, it indicates that the BURL command   supports the URLAUTH [RFC4467] extended form of IMAP URLs [RFC2192]   and that the submit server is configured with the necessary   credentials to resolve "urlauth=submit+" IMAP URLs for the submit   server's domain.   Subsequent to a successful SMTP AUTH command, the submission server   MAY indicate a prearranged trust relationship with a specific IMAP   server by including a BURL EHLO keyword argument of the form   "imap://imap.example.com".  In this case, the submission server will   permit a regular IMAP URL referring to messages or parts of messages   on imap.example.com that the user who authenticated to the submit   server can access.  Note that this form does not imply that the   submit server supports URLAUTH URLs; the submit server must advertise   both "imap" and "imap://imap.example.com" to indicate support for   both extended and non-extended URL forms.   When the submit server connects to the IMAP server, it acts as an   IMAP client and thus is subject to both the mandatory-to-implement   IMAP capabilities in Section 6.1.1 of RFC 3501, and the security   considerations in Section 11 of RFC 3501.  Specifically, this   requires that the submit server implement a configuration that uses   STARTTLS followed by SASL PLAIN [SASL-PLAIN] to authenticate to the   IMAP server.   When the submit server resolves a URLAUTH IMAP URL, it uses submit   server credentials when authenticating to the IMAP server.  The   authentication identity and password used for submit credentials MUST   be configurable.  The string "submit" is suggested as a default value   for the authentication identity, with no default for the password.   Typically, the authorization identity is empty in this case; thus the   IMAP server will derive the authorization identity from the   authentication identity.  If the IMAP URL uses the "submit+" access   identifier prefix, the submit server MUST refuse the BURL command   unless the userid in the URL's <access> token matches the submit   client's authorization identity.   When the submit server resolves a regular IMAP URL, it uses the   submit client's authorization identity when authenticating to the   IMAP server.  If both the submit client and the submit server's   embedded IMAP client use SASL PLAIN (or the equivalent), the submitNewman                      Standards Track                     [Page 4]RFC 4468           Message Submission BURL Extension            May 2006   server SHOULD forward the client's credentials if and only if the   submit server knows that the IMAP server is in the same   administrative domain.  If the submit server supports SASL mechanisms   other than PLAIN, it MUST implement a configuration in which the   submit server's embedded IMAP client uses STARTTLS and SASL PLAIN   with the submit server's authentication identity and password (for   the respective IMAP server) and the submit client's authorization   identity.3.4.  Examples   In examples, "C:" and "S:" indicate lines sent by the client and   server, respectively.  If a single "C:" or "S:" label applies to   multiple lines, then the line breaks between those lines are for   editorial clarity only and are not part of the actual protocol   exchange.   Two successful submissions (without and with pipelining) follow:   <SSL/TLS encryption layer negotiated>   C: EHLO potter.example.com   S: 250-owlry.example.com   S: 250-8BITMIME   S: 250-BURL imap   S: 250-AUTH PLAIN   S: 250-DSN   S: 250 ENHANCEDSTATUSCODES   C: AUTH PLAIN aGFycnkAaGFycnkAYWNjaW8=   S: 235 2.7.0 PLAIN authentication successful.   C: MAIL FROM:<harry@gryffindor.example.com>   S: 250 2.5.0 Address Ok.   C: RCPT TO:<ron@gryffindor.example.com>   S: 250 2.1.5 ron@gryffindor.example.com OK.   C: BURL imap://harry@gryffindor.example.com/outbox           ;uidvalidity=1078863300/;uid=25;urlauth=submit+harry           :internal:91354a473744909de610943775f92038 LAST   S: 250 2.5.0 Ok.   <SSL/TLS encryption layer negotiated>   C: EHLO potter.example.com   S: 250-owlry.example.com   S: 250-8BITMIME   S: 250-PIPELINING   S: 250-BURL imap   S: 250-AUTH PLAIN   S: 250-DSN   S: 250 ENHANCEDSTATUSCODES   C: AUTH PLAIN aGFycnkAaGFycnkAYWNjaW8=Newman                      Standards Track                     [Page 5]RFC 4468           Message Submission BURL Extension            May 2006   C: MAIL FROM:<harry@gryffindor.example.com>   C: RCPT TO:<ron@gryffindor.example.com>   C: BURL imap://harry@gryffindor.example.com/outbox           ;uidvalidity=1078863300/;uid=25;urlauth=submit+harry           :internal:91354a473744909de610943775f92038 LAST   S: 235 2.7.0 PLAIN authentication successful.   S: 250 2.5.0 Address Ok.   S: 250 2.1.5 ron@gryffindor.example.com OK.   S: 250 2.5.0 Ok.   Note that PIPELINING of the AUTH command is only permitted if the   selected mechanism can be completed in one round trip, a client   initial response is provided, and no SASL security layer is   negotiated.  This is possible for PLAIN and EXTERNAL, but not for   most other SASL mechanisms.   Some examples of failure cases:   C: MAIL FROM:<harry@gryffindor.example.com>   C: RCPT TO:<malfoy@slitherin.example.com>   C: BURL imap://harry@gryffindor.example.com/outbox           ;uidvalidity=1078863300/;uid=25;urlauth=submit+harry           :internal:91354a473744909de610943775f92038 LAST   S: 250 2.5.0 Address Ok.   S: 550 5.7.1 Relaying not allowed: malfoy@slitherin.example.com   S: 554 5.5.0 No recipients have been specified.   C: MAIL FROM:<harry@gryffindor.example.com>   C: RCPT TO:<ron@gryffindor.example.com>   C: BURL imap://harry@gryffindor.example.com/outbox           ;uidvalidity=1078863300/;uid=25;urlauth=submit+harry           :internal:71354a473744909de610943775f92038 LAST   S: 250 2.5.0 Address Ok.   S: 250 2.1.5 ron@gryffindor.example.com OK.   S: 554 5.7.0 IMAP URL authorization failed3.5.  Formal Syntax   The following syntax specification inherits ABNF [RFC4234] and   Uniform Resource Identifiers [RFC3986].      burl-param  = "imap" / ("imap://" authority)                  ; parameter to BURL EHLO keyword      burl-cmd    = "BURL" SP absolute-URI [SP end-marker] CRLF      end-marker  = "LAST"Newman                      Standards Track                     [Page 6]RFC 4468           Message Submission BURL Extension            May 20064.  8-Bit and Binary   A submit server that advertises BURL MUST also advertise 8BITMIME   [RFC1652] and perform the down conversion described in that   specification on the resulting complete message if 8-bit data is   received with the BURL command and passed to a 7-bit server.  If the   URL argument to BURL refers to binary data, then the submit server   MAY refuse the command or down convert as described in Binary SMTP   [RFC3030].   The Submit server MAY refuse to accept a BURL command or combination   of BURL and BDAT commands that result in un-encoded 8-bit data in   mail or MIME [RFC2045] headers.  Alternatively, the server MAY accept   such data and down convert to MIME header encoding [RFC2047].5.  Updates to RFC 3463   SMTP or Submit servers that advertise ENHANCEDSTATUSCODES [RFC2034]   use enhanced status codes defined in RFC 3463 [RFC3463].  The BURL   extension introduces new error cases that that RFC did not consider.   The following additional enhanced status codes are defined by this   specification:   X.6.6 Message content not available      The message content could not be fetched from a remote system.      This may be useful as a permanent or persistent temporary      notification.   X.7.8 Trust relationship required      The submission server requires a configured trust relationship      with a third-party server in order to access the message content.6.  Response Codes   This section includes example response codes to the BURL command.   Other text may be used with the same response codes.  This list is   not exhaustive, and BURL clients MUST tolerate any valid SMTP   response code.  Most of these examples include the appropriate   enhanced status code [RFC3463].   554 5.5.0 No recipients have been specified      This response code occurs when BURL is used (for example, with      PIPELINING) and all RCPT TOs failed.Newman                      Standards Track                     [Page 7]

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲福利视频导航| 美女国产一区二区| 亚洲成人精品在线观看| 久久99国产精品免费| 色综合色狠狠天天综合色| 日韩亚洲欧美一区| 亚洲综合激情另类小说区| 国产毛片一区二区| 8v天堂国产在线一区二区| 综合电影一区二区三区| 久久国产生活片100| 欧美午夜精品久久久久久超碰| 国产香蕉久久精品综合网| 日本网站在线观看一区二区三区| 91女厕偷拍女厕偷拍高清| 精品国产成人系列| 日韩高清在线一区| 欧美日韩在线综合| 亚洲激情欧美激情| 色婷婷久久久综合中文字幕| 国产精品嫩草影院com| 激情综合色播五月| 日韩欧美国产不卡| 免费日韩伦理电影| 欧美高清视频不卡网| 亚洲无人区一区| 在线观看精品一区| 亚洲激情自拍偷拍| 色综合久久综合网欧美综合网 | 国产精品伦理在线| 国产一区二区视频在线播放| 日韩欧美国产一区二区三区 | 亚洲欧美一区二区三区极速播放| 成人免费精品视频| 国产三级精品视频| 成人网在线播放| 国产精品久久久久久亚洲毛片| 精品一区二区三区香蕉蜜桃| 99精品欧美一区二区蜜桃免费| 国产精品一二一区| 欧美少妇一区二区| 99国产精品国产精品毛片| 成人免费视频caoporn| 国产成人福利片| 久久国产精品无码网站| 男女男精品网站| 日韩高清不卡一区二区| 亚洲一区二区美女| 蜜桃一区二区三区在线观看| 亚洲色图制服诱惑 | 美女视频黄久久| 538prom精品视频线放| 免费人成精品欧美精品| 欧美精品一区二区三区在线| 国产精品综合久久| 国产欧美精品在线观看| 91视频com| 天天色综合成人网| 久久久久国产免费免费| 成人午夜激情视频| 亚洲成人先锋电影| 精品久久免费看| av不卡在线播放| 香蕉成人伊视频在线观看| 91精品国产免费| 丁香六月综合激情| 亚洲电影激情视频网站| 精品福利二区三区| 色婷婷av久久久久久久| 狠狠色综合日日| 亚洲免费av高清| www国产精品av| 欧洲另类一二三四区| 国产一区二区三区四区在线观看| 中文字幕一区二区三区不卡| 欧美一区二区三区影视| 色88888久久久久久影院按摩| 蜜臀va亚洲va欧美va天堂| 1区2区3区精品视频| 欧美一级片在线看| 色哟哟一区二区三区| 国产一区二区三区香蕉| 午夜精品久久久久久不卡8050| 久久久久国产免费免费| 91精选在线观看| 日本高清不卡一区| 国v精品久久久网| 麻豆91在线播放| 日韩精品亚洲一区二区三区免费| 国产精品久久久久久久久图文区| 日韩欧美亚洲一区二区| 婷婷久久综合九色综合绿巨人| 成人免费黄色在线| 播五月开心婷婷综合| 日本一区二区高清| 国产成人鲁色资源国产91色综| 精品国产欧美一区二区| 精品影视av免费| 精品国产乱码久久久久久久| 国产综合久久久久影院| 久久久影视传媒| 成人在线视频一区二区| 美国三级日本三级久久99| 中文字幕亚洲不卡| 国产偷国产偷亚洲高清人白洁| 欧美三级韩国三级日本一级| 91香蕉视频污| 波多野结衣亚洲一区| 国产a视频精品免费观看| 看片的网站亚洲| 久久精品国产99国产| 日韩高清不卡在线| 欧美a级理论片| 奇米精品一区二区三区在线观看一| 亚洲国产综合色| 亚洲国产成人91porn| 亚洲最大色网站| 亚洲一区二区在线观看视频| 亚洲精品ww久久久久久p站| 一区二区三区毛片| 亚洲国产精品久久久男人的天堂 | 色综合一区二区| 99精品视频一区二区三区| 色综合咪咪久久| 欧美伊人久久久久久久久影院 | 成人一区二区三区在线观看| 成人午夜伦理影院| 99久久婷婷国产综合精品电影| 91亚洲午夜精品久久久久久| 91亚洲精华国产精华精华液| 91成人在线免费观看| 欧美精品电影在线播放| 精品精品欲导航| 国产日韩欧美精品一区| 亚洲欧美日韩人成在线播放| 亚洲免费成人av| 免费观看30秒视频久久| 国产一区久久久| 99久久精品一区二区| 欧美亚洲免费在线一区| 日韩欧美的一区| 欧美激情艳妇裸体舞| 一区二区三区成人| 蜜乳av一区二区三区| 粉嫩嫩av羞羞动漫久久久| 色综合久久综合网欧美综合网| 欧美一区二区三区视频免费播放 | 欧美二区在线观看| 欧美v日韩v国产v| 中文字幕一区二区三区在线不卡 | 国产女同性恋一区二区| 亚洲免费观看高清| 久久9热精品视频| 91视频在线观看| 精品欧美乱码久久久久久1区2区| 国产精品久久久久久久午夜片| 五月综合激情日本mⅴ| 福利一区在线观看| 欧美欧美欧美欧美首页| 欧美激情一区二区| 欧美aⅴ一区二区三区视频| 成人污污视频在线观看| 91精品国产色综合久久| 中文字幕一区免费在线观看| 美日韩一区二区三区| 91在线丨porny丨国产| 亚洲精品一区二区在线观看| 亚洲午夜精品在线| 成人午夜精品一区二区三区| 欧美videossexotv100| 亚洲综合小说图片| 国产91清纯白嫩初高中在线观看 | 日韩精品每日更新| 成人性视频网站| 欧美变态tickling挠脚心| 亚洲精品美腿丝袜| 成人av资源站| 国产婷婷色一区二区三区在线| 首页国产欧美日韩丝袜| 在线观看视频91| 国产精品视频在线看| 国产在线不卡一区| 欧美一级久久久久久久大片| 亚洲一区精品在线| 99久久久免费精品国产一区二区| 精品国产伦一区二区三区观看方式| 亚洲国产精品天堂| 色吊一区二区三区| 一区二区三区四区中文字幕| 91在线精品一区二区| 国产精品国产三级国产普通话99| 国产一区在线精品| 精品国产免费人成电影在线观看四季| 同产精品九九九| 欧美日韩国产综合一区二区三区| 亚洲午夜一区二区| 欧美色图12p| 五月婷婷综合在线| 91福利区一区二区三区| 亚洲精品ww久久久久久p站|