Computers, Security
IMAP security information storage
As the dissemination of information technologies, the issue of security becomes important. And work has to be different aspects and relative to different developments. Here, for example, IMAP security - what is it? How reliable is the Internet Message Access Protocol? What advantages it has, why it was developed, what versions and mechanism of work exist - here is a brief retelling of the contents of the article that you are currently acquainting with.
What is IMAP?
Why was the IMAP protocol developed?
Advantages over POP3
Why did you use this protocol? The fact is that IMAP mail offers, in addition to the above, a number of other advantages:
- The connection is not disconnected while the user interface is active .
- Messages are downloaded only if there are appropriate requirements from the client.
- It can simultaneously access several people, and each of them can monitor all changes made.
- The client can create, change the name and delete boxes, and move messages between them. Also, if you have the IMAP 4 Access Control List extension, you can change the permissions.
- You can track the status of the message itself (it was read, deleted, sent a response, and more). Data about such actions are called flags and they are stored on servers.
- Message search is always performed on the server and there is an explicit extension mechanism.
Messages and their attributes
UID
Each message receives its 32-bit code. A unique identifier is added to it. Together, they form a 64-bit sequence, which is necessary to identify the message. This is IMAP security. The later it came, the more important the UID is. This parameter is used as a response code when you select a mailbox. It does not change during one session or between them. If the technical conditions require editing this parameter, then the UID must necessarily be larger than before. For data transfer, the same IMAP port is used.
Sequence number of the message
Message flags
- \ Seen - the message was read;
- \ Answered - the response was sent;
- \ Recent - the message appeared during the current session;
- \ Draft - was marked as a draft;
- \ Flagged - the user marked this message as important;
- \ Deleted - deleted.
Internal date and time of the message
How is it determined which values should be in these parameters? If the message was delivered using the SMTP protocol, then the time and date of the final destination are taken. If you use the copy command, the sender's parameters are used. You can specify both your time and date - for this you should use the append command.
Interaction between client and server
There may be two cases where the data sent by the client is not complete. The first - the argument of the command is provided with a code that previously determined the number of octets that is in the trod. The second is that you need a response from the server. In both cases, the client receives a request to continue the command, which necessarily begins with a character such as +. If a certain type of data begins to arrive, the transfer must be completed, otherwise it will not be possible to start a new process. Reading, parsing, highlighting of parameters and transfer to the server of data is carried out by a protocol receiver. When the processing of the command is completed, the client is sent a response with this notification. Information that does not indicate completion of the instruction execution is prefixed with *. It is called an unmarked response. It is practicable to send these servers as a response to a customer request or on their own initiative. Their format does not depend on the reason why they were sent.
And what about popular services like Gmail? IMAP settings for ordinary users are not available, but they can be made if you send a message through a special client. But this is purely only for outgoing letters.
And for what are the responses really necessary? They report the successful / unsuccessful execution of information. The response always applies the same label that the client command used, which started the procedure. Therefore, multithreading of data transmission is possible, and they will not be confused with themselves. To clarify the situation, three types of response from the server were developed:
- Successful execution.
- Failure.
- Protocol error IMAP (occurs when an unknown command is applied, or the server recognized that there is a problem with the syntax).
The peculiarity of the client is that he should always be ready to process any response that comes to him. The data must be written in such a way that the client can use them directly, without having to send clarifying requests to the server. You can see this in Gmail. IMAP settings can be edited or changed due to mail clients with wide functionality.
Conclusion
Similar articles
Trending Now