Please Whitelist This Site?

I know everyone hates ads. But please understand that I am providing premium content for free that takes hundreds of hours of time to research and write. I don't want to go to a pay-only model like some sites, but when more and more people block ads, I end up working for free. And I have a family to support, just like you. :)

If you like The TCP/IP Guide, please consider the download version. It's priced very economically and you can read all of it in a convenient format without ads.

If you want to use this site for free, I'd be grateful if you could add the site to the whitelist for Adblock. To do so, just open the Adblock menu and select "Disable on tcpipguide.com". Or go to the Tools menu and select "Adblock Plus Preferences...". Then click "Add Filter..." at the bottom, and add this string: "@@||tcpipguide.com^$document". Then just click OK.

Thanks for your understanding!

Sincerely, Charles Kozierok
Author and Publisher, The TCP/IP Guide


NOTE: Using software to mass-download the site degrades the server and is prohibited.
If you want to read The TCP/IP Guide offline, please consider licensing it. Thank you.

The Book is Here... and Now On Sale!

Read offline with no ads or diagram watermarks!
The TCP/IP Guide

Custom Search







Table Of Contents  The TCP/IP Guide
 9  TCP/IP Application Layer Protocols, Services and Applications (OSI Layers 5, 6 and 7)
      9  TCP/IP Key Applications and Application Protocols
           9  TCP/IP File and Message Transfer Applications and Protocols (FTP, TFTP, Electronic Mail, USENET, HTTP/WWW, Gopher)
                9  TCP/IP Electronic Mail System: Concepts and Protocols (RFC 822, MIME, SMTP, POP3, IMAP)
                     9  TCP/IP Electronic Mail Access and Retrieval Protocols and Methods
                          9  TCP/IP Internet Message Access Protocol (IMAP/IMAP4)

Previous Topic/Section
IMAP Not Authenticated State: User Authentication Process and Commands
Previous Page
Pages in Current Topic/Section
1
2
Next Page
IMAP Selected State: Message Manipulation Process and Commands
Next Topic/Section

IMAP Authenticated State: Mailbox Manipulation/Selection Process and Commands
(Page 1 of 2)

In the normal progression of an IMAP session, the Authenticated state is the first one where the IMAP client is able to perform “useful work” on behalf of its user. This state will normally be reached from the Not Authenticated state after successful authentication using the LOGIN or AUTHENTICATE command. Alternately, a server may preauthenticate a client and begin the session in this state directly.

Once in the Authenticated state, the client is considered authorized to issue commands to the server. However, it may only give commands that deal with whole mailboxes. As mentioned in the general operation overview, IMAP was created to allow access to, and manipulation of, multiple mailboxes. For this reason, the client must specify dynamically which mailbox it wants to use before commands dealing with individual messages may be given. This is done in this state using the SELECT or EXAMINE commands, which cause a transition to the Selected state as we will see.

It is also possible that the Authenticated state can be re-entered during the course of a session. If the CLOSE command is used from the Selected state to close a particular mailbox, the server will consider that mailbox “de-selected” and the session will transition back to the Authenticated state until a new selection is made. The same can occur if a new SELECT or EXAMINE command is given from the Selected state but fails.

Authenticated State Commands

Table 261 provides a brief description of the mailbox-manipulation commands that can be used in the Authenticated state:


Table 261: IMAP Authenticated State Commands

Command

Parameters

Description

SELECT

Mailbox name

Selects a particular mailbox so that messages within it can be accessed. If the command is successful, the session transitions to the Selected state. The server will also normally respond with information for the client about the selected mailbox; see below.

EXAMINE

Mailbox name

Exactly the same as the SELECT command, except that the mailbox is opened “read-only”; no changes are allowed to it.

CREATE

Mailbox name

Creates a mailbox with the given name.

DELETE

Mailbox name

Deletes the specified mailbox.

RENAME

Current and new mailbox names

Renames a mailbox.

SUBSCRIBE

Mailbox name

Adds the mailbox to the server's set of “active” mailboxes. This is sometimes used when IMAP4 is employed for Usenet message access.

UNSUBSCRIBE

Mailbox name

Removes the mailbox from the “active” list.

LIST

Mailbox name or reference string

Requests a partial list of available mailbox names, based on the parameter provided.

LSUB

Mailbox name or reference string

The same as LIST but only returns names from the “active” list.

STATUS

Mailbox name

Requests the status of the specified mailbox. The server responds providing information such as the number of messages in the box and the number of recently-arrived and unseen messages.

APPEND

Mailbox name, message, optional flags and date/time

Adds a message to a mailbox.


Note: All of the commands above may also be used in the Selected state; they should really be called “Authenticated+Selected” state.commands.



Previous Topic/Section
IMAP Not Authenticated State: User Authentication Process and Commands
Previous Page
Pages in Current Topic/Section
1
2
Next Page
IMAP Selected State: Message Manipulation Process and Commands
Next Topic/Section

If you find The TCP/IP Guide useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider purchasing a download license of The TCP/IP Guide. Thanks for your support!
Donate $2
Donate $5
Donate $10
Donate $20
Donate $30
Donate: $



Home - Table Of Contents - Contact Us

The TCP/IP Guide (http://www.TCPIPGuide.com)
Version 3.0 - Version Date: September 20, 2005

© Copyright 2001-2005 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.