< draft-ietf-lemonade-compress-06.txt   draft-ietf-lemonade-compress-07.txt >
Network Working Group Arnt Gulbrandsen Network Working Group Arnt Gulbrandsen
Request for Comments: DRAFT Oryx Mail Systems GmbH Request for Comments: DRAFT Oryx Mail Systems GmbH
November 2006 January 2007
The IMAP COMPRESS Extension The IMAP COMPRESS Extension
draft-ietf-lemonade-compress-06.txt draft-ietf-lemonade-compress-07.txt
Status of this Memo Status of this Memo
By submitting this Internet-Draft, each author represents that any By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79. aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that Task Force (IETF), its areas, and its working groups. Note that
skipping to change at page 1, line 33 skipping to change at page 1, line 33
at any time. It is inappropriate to use Internet-Drafts as at any time. It is inappropriate to use Internet-Drafts as
reference material or to cite them other than as "work in progress". reference material or to cite them other than as "work in progress".
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt. The list of Internet- http://www.ietf.org/ietf/1id-abstracts.txt. The list of Internet-
Draft Shadow Directories can be accessed at Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
Copyright Notice Copyright Notice
Copyright (C) The Internet Society 2006. Copyright (C) The Internet Society 2007.
Abstract Abstract
The COMPRESS extension allows an IMAP connection to be effectively The COMPRESS extension allows an IMAP connection to be effectively
and efficiently compressed. and efficiently compressed.
Internet-draft November 2006 Internet-draft January 2007
Table of Contents Table of Contents
1. Conventions Used in This Document . . . . . . . . . . . . . . 2 1. Conventions Used in This Document . . . . . . . . . . . . . . 2
2. Introduction and Overview . . . . . . . . . . . . . . . . . . 2 2. Introduction and Overview . . . . . . . . . . . . . . . . . . 2
3. The COMPRESS Command . . . . . . . . . . . . . . . . . . . . . 3 3. The COMPRESS Command . . . . . . . . . . . . . . . . . . . . . 3
4. Compression Efficiency . . . . . . . . . . . . . . . . . . . . 5 4. Compression Efficiency . . . . . . . . . . . . . . . . . . . . 5
5. Formal Syntax . . . . . . . . . . . . . . . . . . . . . . . . 7 5. Formal Syntax . . . . . . . . . . . . . . . . . . . . . . . . 7
6. Security Considerations . . . . . . . . . . . . . . . . . . . 7 6. Security Considerations . . . . . . . . . . . . . . . . . . . 7
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 7 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 7
skipping to change at page 2, line 41 skipping to change at page 2, line 41
server respectively. server respectively.
2. Introduction and Overview 2. Introduction and Overview
A server which supports the COMPRESS extension indicates this with A server which supports the COMPRESS extension indicates this with
one or more capability names consisting of "COMPRESS=" followed by a one or more capability names consisting of "COMPRESS=" followed by a
supported compression algorithm name as described in this document. supported compression algorithm name as described in this document.
The goal of COMPRESS is to reduce the bandwidth usage of IMAP. The goal of COMPRESS is to reduce the bandwidth usage of IMAP.
Compared to PPP/MNP compression, COMPRESS offers much better Compared to PPP compression (see [RFC1962]) and modem-based
compression efficiency, and can be used together with TLS [RFC4346], compression (see [MNP] and [V42BIS]), COMPRESS offers much better
SASL encryption, VPNs etc. Compared to TLS compression [RFC3749], compression efficiency. COMPRESS can be used together with TLS
COMPRESS has the following (dis)advantages: [RFC4346], SASL encryption, VPNs etc. Compared to TLS compression
[RFC3749], COMPRESS has the following (dis)advantages:
- COMPRESS can be implemented easily by IMAP servers and clients. - COMPRESS can be implemented easily by IMAP servers and clients.
At present, TLS compression is not widely implemented. In the At present, TLS compression is not widely implemented. In the
LEMONADE WG, the general consent is that libraries implementing LEMONADE WG, the general consensus is that libraries implementing
TLS compression will not be available soon enough for LEMONADE. TLS compression will not be available soon enough for LEMONADE.
- IMAP compression efficiency benefits from an API that permits Internet-draft January 2007
flushing the compressor's dictionary at the right point. This is
Internet-draft November 2006
practical for COMPRESS, whereas typical TLS libraries don't - IMAP COMPRESS benefits from an intimate knowledge of the IMAP
currently allow that. protocol's state machine, allowing for dynamic and aggressive
optimization of the underlying compression algorithm's parameters.
- When a TLS librarly implements compression, all protocols that use - When the TLS layer implements compression, any protocol using that
TLS automatically are compressed (in LEMONADE's case, SMTP, IMAP, layer can transparently benefit from that compression (e.g. SMTP
and some notification protocol), whereas COMPRESS is specific to and IMAP). COMPRESS is specific to IMAP.
IMAP.
In order to increase interoperation, it is desirable to have as few In order to increase interoperation, it is desirable to have as few
different compression algorithms as possible, so this document different compression algorithms as possible, so this document
specifies only one. The DEFLATE algorithm (defined in [RFC1951]) is specifies only one. The DEFLATE algorithm (defined in [RFC1951]) is
standard, widely available, unencumbered by patents and fairly standard, widely available, unencumbered by patents and fairly
efficient, so it is the only algorithm defined by this document. efficient, so it is the only algorithm defined by this document.
The extension adds one new command (COMPRESS) and no new responses. The extension adds one new command (COMPRESS) and no new responses.
3. The COMPRESS Command 3. The COMPRESS Command
Arguments: Name of compression mechanism: "DEFLATE". Arguments: Name of compression mechanism: "DEFLATE".
Responses: None Responses: None
Result: OK The server will compress its responses and expects the Result: OK The server will compress its responses and expects the
client to compress its commands. client to compress its commands.
NO The server doesn't support the requested mechanism, or NO Compression is already active via another layer.
the mechanism is already active, BAD Command unknown, invalid or unknown argument, or COMPRESS
BAD Command unknown, invalid argument, or COMPRESS already already active.
active.
The COMPRESS command instructs the server to use the named The COMPRESS command instructs the server to use the named
compression mechanism ("DEFLATE" is the only one defined) for all compression mechanism ("DEFLATE" is the only one defined) for all
commands and/or responses after COMPRESS. commands and/or responses after COMPRESS.
The client MUST NOT send any further commands until it has seen the The client MUST NOT send any further commands until it has seen the
result of COMPRESS. If the response was OK, the client MUST compress result of COMPRESS. If the response was OK, the client MUST compress
starting with the first command after COMPRESS. If the server starting with the first command after COMPRESS. If the server
response was BAD or NO, the client MUST NOT turn on compression. response was BAD or NO, the client MUST NOT turn on compression.
If the server responds NO because it knows that the same mechanism If the server responds NO because it knows that the same mechanism
is active already (e.g. because TLS has negotiated the same is active already (e.g. because TLS has negotiated the same
mechanism), it MUST send COMPRESSIONACTIVE as resp-text-code (see mechanism), it MUST send COMPRESSIONACTIVE as resp-text-code (see
[RFC3501] section 7.1), and the resp-text SHOULD say which layer [RFC3501] section 7.1), and the resp-text SHOULD say which layer
compresses. compresses.
If the server issues an OK response, the server MUST compress If the server issues an OK response, the server MUST compress
starting with the first response after the CRLF ending the OK starting immediately after the CRLF which ends the tagged OK
response. (Responses issued by the server before the OK response response. (Responses issued by the server before the OK response
Internet-draft November 2006 Internet-draft January 2007
will, of course, still be uncompressed.) If the server issues a BAD will, of course, still be uncompressed.) If the server issues a BAD
or NO respnose, the server MUST NOT turn on compression. or NO respnose, the server MUST NOT turn on compression.
For DEFLATE (as for many other compression mechanisms), the For DEFLATE (as for many other compression mechanisms), the
compressor can trade speed against quality. When decompressing compressor can trade speed against quality. When decompressing
there isn't much of a tradeoff. Consequently, the client and server there isn't much of a tradeoff. Consequently, the client and server
are both free to pick the best reasonable rate of compression for are both free to pick the best reasonable rate of compression for
the data they send. the data they send.
skipping to change at page 5, line 5 skipping to change at page 5, line 5
C: b compress deflate C: b compress deflate
S: b OK DEFLATE active S: b OK DEFLATE active
From this point on, everything is compressed before being From this point on, everything is compressed before being
encrypted. encrypted.
C: c login arnt tnra C: c login arnt tnra
S: c OK Logged in as arnt S: c OK Logged in as arnt
Internet-draft November 2006 Internet-draft January 2007
The following example demonstrates how a server may refuse to The following example demonstrates how a server may refuse to
compress twice: compress twice:
S: * OK [CAPABILITY IMAP4REV1 STARTTLS COMPRESS=DEFLATE] S: * OK [CAPABILITY IMAP4REV1 STARTTLS COMPRESS=DEFLATE]
C: a starttls C: a starttls
S: a OK TLS active S: a OK TLS active
From this point on, everything is encrypted, and we assume From this point on, everything is encrypted, and we assume
that TLS negotiation has also enabled TLS compression (see that TLS negotiation has also enabled TLS compression (see
skipping to change at page 5, line 28 skipping to change at page 5, line 28
C: b compress deflate C: b compress deflate
S: b NO [COMPRESSIONACTIVE] DEFLATE active via TLS S: b NO [COMPRESSIONACTIVE] DEFLATE active via TLS
4. Compression Efficiency 4. Compression Efficiency
This section is informative, not normative. This section is informative, not normative.
IMAP poses some unusual problems for a compression layer. IMAP poses some unusual problems for a compression layer.
Upstream is fairly simple. Most IMAP clients send the same few Upstream is fairly simple. Most IMAP clients send the same few
commands again and again, so any compression algorith which can commands again and again, so any compression algorithm which can
exploit repetition works efficiently. The APPEND command is an exploit repetition works efficiently. The APPEND command is an
exception; clients which send many APPEND commands may want to exception; clients which send many APPEND commands may want to
surround large literals with flushes in the same way as is surround large literals with flushes in the same way as is
recommended for servers later in this section. recommended for servers later in this section.
Downstream has the unusual property that several kinds of data are Downstream has the unusual property that several kinds of data are
sent, confusing all dictionary-based compression algorithms. sent, confusing all dictionary-based compression algorithms.
One type is IMAP responses. These are highly compressible; zlib One type is IMAP responses. These are highly compressible; zlib
using its least CPU-intensive setting compresses typical responses using its least CPU-intensive setting compresses typical responses
skipping to change at page 6, line 5 skipping to change at page 6, line 5
A third is email body text. Text is usually fairly short and A third is email body text. Text is usually fairly short and
includes much ASCII, so the same compression dictionary will do a includes much ASCII, so the same compression dictionary will do a
good job here, too. When multiple messages in the same thread are good job here, too. When multiple messages in the same thread are
read at the same time, quoted lines etc. can often be compressed read at the same time, quoted lines etc. can often be compressed
almost to zero. almost to zero.
Finally, attachments (non-text email bodies) are transmitted, either Finally, attachments (non-text email bodies) are transmitted, either
in binary form or encoded with base-64. in binary form or encoded with base-64.
Internet-draft November 2006 Internet-draft January 2007
When attachments are retrieved in binary form, DEFLATE may be able When attachments are retrieved in binary form, DEFLATE may be able
to compress them, but the format of the attachment is usually not to compress them, but the format of the attachment is usually not
IMAP-like, so the dictionary built while compressing IMAP does not IMAP-like, so the dictionary built while compressing IMAP does not
help. The compressor has to adapt its dictionary from IMAP to the help. The compressor has to adapt its dictionary from IMAP to the
attachment's format, and then back. A few file formats aren't attachment's format, and then back. A few file formats aren't
compressible at all using deflate, e.g. .gz, .zip and .jpg files. compressible at all using deflate, e.g. .gz, .zip and .jpg files.
When attachments are retrieved in base-64 form, the same problems When attachments are retrieved in base-64 form, the same problems
apply, but the base-64 encoding adds another problem. 8-bit apply, but the base-64 encoding adds another problem. 8-bit
skipping to change at page 7, line 5 skipping to change at page 7, line 5
strategy is to change the level to 0 to at the start of a literal strategy is to change the level to 0 to at the start of a literal
provided the first two bytes are either 0x1F 0x8B (as in deflate- provided the first two bytes are either 0x1F 0x8B (as in deflate-
compressed files) or 0xFF 0xD8 (JPEG), and to keep it at 1-5 the compressed files) or 0xFF 0xD8 (JPEG), and to keep it at 1-5 the
rest of the time. rest of the time.
Note that when using TLS, compression may actually decrease the CPU Note that when using TLS, compression may actually decrease the CPU
usage, depending on which algorithms are used in TLS. This is usage, depending on which algorithms are used in TLS. This is
because fewer bytes need to be encrypted, and encryption is because fewer bytes need to be encrypted, and encryption is
generally more expensive than compression. generally more expensive than compression.
Internet-draft November 2006 Internet-draft January 2007
5. Formal Syntax 5. Formal Syntax
The following syntax specification uses the Augmented Backus-Naur The following syntax specification uses the Augmented Backus-Naur
Form (ABNF) notation as specified in [RFC4234]. [RFC4234] defines SP Form (ABNF) notation as specified in [RFC4234]. This syntax augments
and [RFC3501] defines command-any, capability and resp-text-code. the grammar specified in [RFC3501]. [RFC4234] defines SP and
[RFC3501] defines command-auth, capability and resp-text-code.
Except as noted otherwise, all alphabetic characters are case- Except as noted otherwise, all alphabetic characters are case-
insensitive. The use of upper or lower case characters to define insensitive. The use of upper or lower case characters to define
token strings is for editorial clarity only. Implementations MUST token strings is for editorial clarity only. Implementations MUST
accept these strings in a case-insensitive fashion. accept these strings in a case-insensitive fashion.
command-any =/ compress command-auth =/ compress
compress = "COMPRESS" SP algorithm compress = "COMPRESS" SP algorithm
capability =/ "COMPRESS=" algorithm capability =/ "COMPRESS=" algorithm
;; multiple COMPRESS capabilities allowed ;; multiple COMPRESS capabilities allowed
algorithm = "DEFLATE" algorithm = "DEFLATE"
resp-text-code =/ "COMPRESSIONACTIVE" resp-text-code =/ "COMPRESSIONACTIVE"
Note that due the syntax of capability names, future algorithm names Note that due the syntax of capability names, future algorithm names
must be atoms. must be atoms.
6. Security Considerations 6. Security Considerations
As for TLS compression [RFC3749]. As for TLS compression [RFC3749].
7. IANA Considerations 7. IANA Considerations
The IANA is requested to add COMPRESS=DEFLATE the list of IMAP The IANA is requested to add COMPRESS=DEFLATE the list of IMAP
extensions. extensions, http://www.iana.org/assignments/imap4-capabilities.
Note to IANA: This RFC does not specify the creation of a registry Note to IANA: This RFC does not specify the creation of a registry
for compression mechanisms. The current feeling of the IMAP for compression mechanisms. The current feeling of the IMAP
community is that is is unlikely that another compression mechanism community is that is is unlikely that another compression mechanism
will be added in the future. However, if this RFC is extended in the will be added in the future. However, if this RFC is extended in the
future by another RFC, and another compression mechanism is added at future by another RFC, and another compression mechanism is added at
that time, it would then be appropriate to create a registry. that time, it would then be appropriate to create a registry.
Internet-draft November 2006 Internet-draft January 2007
8. Acknowledgements 8. Acknowledgements
Eric Burger, Dave Cridland, Tony Finch, Ned Freed, Philip Guenther, Eric Burger, Dave Cridland, Tony Finch, Ned Freed, Philip Guenther,
Randall Gellens, Tony Hansen, Stephane Maes, Alexey Melnikov, Lyndon Randall Gellens, Tony Hansen, Stephane Maes, Alexey Melnikov, Lyndon
Nerenberg and Zoltan Ordogh have all helped with this document. Nerenberg and Zoltan Ordogh have all helped with this document.
The author would also like to thank various people in the rooms at The author would also like to thank various people in the rooms at
meetings, whose help is real, but not reflected in the author's meetings, whose help is real, but not reflected in the author's
mailbox. mailbox.
skipping to change at page 8, line 37 skipping to change at page 8, line 37
[RFC3501] Crispin, "Internet Message Access Protocol - Version [RFC3501] Crispin, "Internet Message Access Protocol - Version
4rev1", RFC 3501, University of Washington, June 2003. 4rev1", RFC 3501, University of Washington, June 2003.
[RFC4234] Crocker, Overell, "Augmented BNF for Syntax [RFC4234] Crocker, Overell, "Augmented BNF for Syntax
Specifications: ABNF", RFC 4234, Brandenburg Specifications: ABNF", RFC 4234, Brandenburg
Internetworking, Demon Internet Ltd, October 2005. Internetworking, Demon Internet Ltd, October 2005.
9.2. Informative References 9.2. Informative References
[RFC1962] Rand, "The PPP Compression Control Protocol (CCP)", RFC
1962, June 1996.
[RFC3516] Nerenberg, "IMAP4 Binary Content Extension", RFC 3516, [RFC3516] Nerenberg, "IMAP4 Binary Content Extension", RFC 3516,
Orthanc Systems, April 2003. Orthanc Systems, April 2003.
[RFC3749] Hollenbeck, "Transport Layer Security Protocol [RFC3749] Hollenbeck, "Transport Layer Security Protocol
Compression Methods", RFC 3749, VeriSign, May 2004. Compression Methods", RFC 3749, VeriSign, May 2004.
[RFC4346] Dierks, Rescorla, "The Transport Layer Security (TLS) [RFC4346] Dierks, Rescorla, "The Transport Layer Security (TLS)
Protocol, Version 1.1", RFC 4346, April 2006. Protocol, Version 1.1", RFC 4346, April 2006.
[RFC4422] Melnikov, Zeilenga, "Simple Authentication and Security [RFC4422] Melnikov, Zeilenga, "Simple Authentication and Security
Layer (SASL)", RFC 4422, Isode Limited, June 2006 Layer (SASL)", RFC 4422, Isode Limited, June 2006.
Internet-draft November 2006 Internet-draft January 2007
[V42BIS] ITU, "V.42bis: Data compression procedures for data
circuit-terminating equipment (DCE) using error
correction procedures", http://www.itu.int/rec/T-REC-
V.42bis, January 1990.
[MNP] Gilbert Held, "The Complete Modem Reference", Second
Edition, Wiley Professional Computing, ISBN
0-471-00852-4, May 1994.
10. Author's Address 10. Author's Address
Arnt Gulbrandsen Arnt Gulbrandsen
Oryx Mail Systems GmbH Oryx Mail Systems GmbH
Schweppermannstr. 8 Schweppermannstr. 8
D-81671 Muenchen D-81671 Muenchen
Germany Germany
Fax: +49 89 4502 9758 Fax: +49 89 4502 9758
skipping to change at page 9, line 43 skipping to change at page 10, line 5
of such proprietary rights by implementers or users of this of such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository specification can be obtained from the IETF on-line IPR repository
at http://www.ietf.org/ipr. at http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at ietf- this standard. Please address the information to the IETF at ietf-
ipr@ietf.org. ipr@ietf.org.
Internet-draft January 2007
Copyright Statement Copyright Statement
Copyright (C) The Internet Society (2006). Copyright (C) The Internet Society (2007).
This document is subject to the rights, licenses and restrictions This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors contained in BCP 78, and except as set forth therein, the authors
retain all their rights. retain all their rights.
Internet-draft November 2006
Disclaimer of Validity Disclaimer of Validity
This document and the information contained herein are provided on This document and the information contained herein are provided on
an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE
REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE
INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
 End of changes. 26 change blocks. 
39 lines changed or deleted 49 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/