Network Working Group T. Showalter Internet Draft: Sieve Carnegie Mellon Document: draft-showalter-sieve-04.txt August 1998 Expire in six months (31 January 1999) Sieve -- a Mail Filtering Language Status of this memo This document is an Internet-Draft. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as ``work in progress.'' To learn the current status of any Internet-Draft, please check the ``1id-abstracts.txt'' listing contained in the Internet-Drafts Shadow Directories on ftp.is.co.za (Africa), ftp.nordu.net (Europe), munnari.oz.au (Pacific Rim), ftp.ietf.org (US East Coast), or ftp.isi.edu (US West Coast). The protocol discussed in this document is experimental and subject to change. Persons planning on either implementing or using this protocol are STRONGLY URGED to get in touch with the author before embarking on such a project. Copyright Copyright (C) The Internet Society 1998. All Rights Reserved. Abstract This document describes a mail filtering language for filtering messages at time of final delivery. It is designed to be independent of protocol, and implementable on either a mail client or mail server. It is meant to be extensible, simple, and independent of access protocol, mail architecture, and operating system. It is suitable for running on a mail server where users may not be allowed to execute arbitrary programs, such as on black box IMAP servers, as it has no variables, loops, or ability to shell out to external programs. Showalter Expires 31 Jan 1999 [Page 1] Internet DRAFT Sieve August 7, 1998 Table of Contents Status of this memo Copyright Abstract 0. Meta-information on this draft 0.1. Discussion 0.2. Known Problems 0.2.1. Probable Extensions 0.2.2. Known Bugs 0.3. Open Issues 0.3. Noted Changes 1. Introduction 1.1. Conventions used in this document 1.2. Example mail messages 2. Design 2.1. Form of the language 2.2. Whitespace 2.3. Comments 2.4. Literal data 2.4.1. Numbers 2.4.2. Strings 2.4.2.1. String lists 2.4.2.2. Headers 2.4.2.3. Addresses 2.5. Tests 2.5.1. String Comparison 2.6.1. Match Keyword 2.6.2. Comparators 2.7. Tagged Arguments 2.8. Blocks 2.9. Commands 2.9.1. Positional Arguments 2.9.2. Optional Arguments 2.9.3. Blocks as Arguments 2.11. Evaluation 2.11.1. Implicit keep 3. Conditionals and Control Structures 4. Actions 4.1. Action reject 4.2. Action fileinto 4.3. Action forward 4.4. Action keep Showalter Expires 31 Jan 1999 [Page 2] Internet DRAFT Sieve August 7, 1998 4.6. Action stop 4.7. Action discard 5. Tests 5.1. Test allof 5.2. Test anyof 5.3. Test exists 5.4. Test false 5.5. Test header 5.6. Test not 5.7. Test size 6. Errors in Processing a Script 7. Extensibility 7.1. Capability String 7.2. Registry 7.3. Capability Transport 8. Transmission 9. Acknowledgments 10. Formal Grammar 11. Security Considerations 12. Author's Address Appendices Appendix A. References Appendix B. Full Copyright Statement Showalter Expires 31 Jan 1999 [Page 3] Internet DRAFT Sieve August 7, 1998 Showalter Expires 31 Jan 1999 [Page 2] Internet DRAFT Sieve August 7, 1998 0. Meta-information on this draft This information is intended to facilitate discussion. It will be removed when this document leaves the Internet-Draft stage. 0.1. Discussion This draft is being discussed on the MTA Filters mailing list at . Subscription requests can be sent to (send an email message with the word "subscribe" in the body). More information on the mailing list along with a WWW archive of back messages is available at . 0.2. Known Problems 0.2.1. Probable Extensions The following suggestions have been made, and will probably be addressed by extensions. An extension for regular expressions will be written. While regular expressions are of questionable utility for most users, the programmers writing implementations desperately want regular expressions. Envelope-matching commands are not readily supported by all mail systems, and putting them in the draft will result in a system that cannot be implemented by a mail architecture that does not adequately store envelopes. "Detailed" addressing or "sub-addressing" (i.e., the "foo" in an address "tjs+foo@andrew.cmu.edu") is not handled, and will be moved to an extension for those systems that offer it. A vacation command has been requested for an extension; a preliminary draft exists and will be submitted to the internet-drafts repository. Vacation functionality is isn't in the draft because having vacation assumes you can store the addresses of people who have already received vacation notifications, which isn't always the case. A suggestion was made to set IMAP flags on delivery (e.g., \Flagged, \Deleted, \Answered, \Seen). An "include" command is not included, but has been suggested for an extension. Showalter Expires 31 Jan 1999 [Page 4] Internet DRAFT Sieve August 7, 1998 0.2.2. Known Bugs The formal grammar probably still has some holes in it. The reject command needs to be rechecked against the DSN specification. The error-handling clauses of this specification may not be completely sensible, and may conflict. The discussion of the limits of actions is not there. Only one forward should be allowed per message. Keep and reject are mutually exclusive. 0.3. Open Issues In the event that there is an error while processing a script, what happens? The draft implies you file into INBOX, but what if you've already taken actions before you do this? (The parts of the draft that require syntax checking stuff are all SHOULDs.) I tried to fill in some of the blanks in previous versions; among them, the description of what a rejected input message looks like, but it's still nearly incomplete. I moved the substring matching stuff out of the header command and into a section of its own as it is reusable by extensions. Suggestions on this section would be appreciated. I tried to fill in the blanks in the section on extensibility and borrowed some stuff from the ACAP spec (specifically, the comparator registry), but it's probably not complete or good enough. 0.3. Noted Changes This draft was unfortunately rushed and probably contains numerous errors. This is purely the fault of the editor. For this reason, readers are asked to subscribe to the mailing list noted above for discussion, as well as some inevitable corrections. The grammar has changed substantially to allow easier modification by extensions at the expense of some additional definition in the rest of the draft. Support and reply have been removed, and the format of stringlists has changed. Showalter Expires 31 Jan 1999 [Page 5] Internet DRAFT Sieve August 7, 1998 1. Introduction This memo documents a language that can be used to create filters for electronic mail. It is not tied to any particular operating system or mail architecture. It requires the use of [IMAIL]-compliant messages, but otherwise should generalize to other systems that meet these criteria. The language is powerful enough to be useful, but limited in power in order to allow for a safe server-side filtering system. The intention is to make it impossible for users to do anything more complex (and dangerous) than write simple mail filters, along with facilitating GUI-based editors. The language is not Turing-complete, and provides no way to write a loop or a function. Variables are not provided. Implementations of the language are expected to take place at time of final delivery, when the message is moved to the user-accessible mailbox. In systems where the MTA does final delivery, such as and traditional UNIX mail, is reasonable to sort when the MTA deposits mail into the user's mailbox. If the MTA does not do final delivery, or lacks the power to sort into separate mailboxes, as is the case under POP3, the MUA must do filtering into local-disk folders. There are a number of reasons to use a filtering system. Mail traffic for most users has been increasing due both to increased usage of e-mail, the emergence of unsolicited email as a form of advertising, and increased usage of mailing lists. Experience at Carnegie Mellon has shown that if a filtering system is made available to users, many will make use of it in order to file messages from specific users or mailing lists. However, many others did not make use of the Andrew system's FLAMES [FLAMES] filtering language due to difficulty in setting it up. Because of the expectation that users will make use of filtering if it is offered and easy to use, this language has been made simple enough to allow many users to make use of it, but rich enough that it can be used productively. However, it is expected that GUI-based editors will be the preferred way of editing filters for a large number of users. 1.1. Conventions used in this document In examples, line breaks have been inserted for readability. In the sections of this document that discuss the requirements of various keywords and operators, the following conventions have been Showalter Expires 31 Jan 1999 [Page 6] Internet DRAFT Sieve August 7, 1998 adopted. The key words "MUST", "MUST NOT", "SHOULD", "SHOULD NOT", "CAN", and "MAY" in this document are to be interpreted as defined in [KEYWORDS]. Each section on a test, action, or control structure has a line labeled "Syntax:". This line describes the syntax of the command, including its name and its arguments. Required arguments are listed inside angle brackets ("<" and ">"). Optional arguments are listed inside square brackets ("[" and "]"). However, the formal grammar for these commands in section 10 and is the authoritative reference on how to construct these commands. 1.2. Example mail messages The following mail messages will be used throughout this document in examples. Message A ----------------------------------------------------------- Date: Tue, 1 Apr 1997 09:06:31 -0800 (PST) From: coyote@desert.org To: roadrunner@birdseed.org Subject: I have a present for you Look, I'm sorry about the whole anvil thing, and I really didn't mean to try and drop it on you from the top of the cliff. I want to try to make it up to you. I've got some great birdseed over here at my place -- top of the line stuff -- and if you come by, I'll have it all wrapped up for you. I'm really sorry for all the problems I've caused for you over the years, but I know we can work this out. -- Wile E. Coyote "Super Genius" coyote@znic.net ----------------------------------------------------------- Showalter Expires 31 Jan 1999 [Page 7] Internet DRAFT Sieve August 7, 1998 Message B ----------------------------------------------------------- From: youcouldberich!@reply-by-postal-mail Sender: b1ff@de.res.frobnitzm.edu To: rube@landru.melon.net Date: Mon, 31 Mar 1997 18:26:10 -0800 (PST) Subject: $$$ YOU, TOO, CAN BE A MILLIONAIRE! $$$ YOU MAY HAVE ALREADY WON TEN MILLION DOLLARS, BUT I DOUBT IT! SO JUST POST THIS TO SIX HUNDRED NEWSGROUPS! IT WILL GUARANTEE THAT YOU GET AT LEAST FIVE RESPONSES WITH MONEY! MONEY! MONEY! COLD HARD CASH! YOU WILL RECEIVE OVER $20,000 IN LESS THAN TWO MONTHS! AND IT'S LEGAL!!!!!!!!! !!!!!!!!!!!!!!!!!!111111111!!!!!!!11111111111!!1 JUST SEND $5 IN SMALL, UNMARKED BILLS TO THE ADDRESSES BELOW! ----------------------------------------------------------- 2. Design 2.1. Form of the language This language is made up as a set of commands. Commands can take a number of arguments; arguments can be either literal data, tests, or blocks of commands. 2.2. Whitespace Whitespace is used to separate commands. Whitespace is made up of tabs, newlines (CRLF, never just CR or LF), and the space character. The amount of whitespace used is not significant. 2.3. Comments Comments begin with a "#" character that is not contained within a string and continue until the next CRLF. Example: if size over 100K { # this is a comment discard; } XXX this example is broken 2.4. Literal data Literal data means data that is not executed and is supplied as arguments, such as numbers and strings. Showalter Expires 31 Jan 1999 [Page 8] Internet DRAFT Sieve August 7, 1998 2.4.1. Numbers Numbers are given as ordinary decimal numbers. However, those numbers that have a tendency to be fairly large, such as message sizes, may have a "K", "M", or "G" appended to indicate a multiple of a base-two number. To be comparable with the power-of-two-based versions of SI units that computers frequently use, K specifies kilo, or 1,024 (2^10) times the value of the number; M specifies mega, or 1,048,576 (2^20) times the value of the number; and G specifies giga, or 1,073,741,824 (2^30) times the value of the number. Implementations MUST provide 31 bits of magnitude in numbers, but may provide more. Negative, fractional, and decimal numbers are not permitted by this specification. 2.4.2. Strings Scripts involve large numbers of strings, as they are used for pattern matching, addresses, and textual bodies, etc. Typically, short quoted strings suffice for most uses, but a more convenient form is provided for longer strings such as bodies of messages. A quoted string starts and ends with a single double quote (the <"> character). A backslash ("\") inside of a quoted string is followed by either another backslash or a double quote. This two-character sequence represents a single backslash or double-quote within the string, respectively. Other escape sequences may be permitted depending on context. An undefined escape sequence (such as "\a" in a context where "a" has no special meaning) is interpreted as if there were no backslash (in this case, "\a" is just "a"). Non-printing characters such as tabs, CR and LF, and control characters are permitted in strings. NUL (ASCII 0) is not allowed in strings. For entering larger amounts of text, such as an email message, a multi-line form is allowed. It starts with the keyword "text:", followed by a CRLF, and ends with the sequence of a CRLF, a single period, and another CRLF. In order to allow the message to begin lines with a single-dot, lines are dot-stuffed. That is, when composing a message body, an extra `.' is added before each line which begins with a `.'. When the server interprets the script, these extra dots are removed. Showalter Expires 31 Jan 1999 [Page 9] Internet DRAFT Sieve August 7, 1998 Note that a comment may occur in between the "text:" and the CRLF, but not within the string itself. 2.4.2.1. String lists When matching patterns, strings frequently come in groups. For this reason, a list of strings is allowed in many tests, implying that if the test is true using any one of the strings, then the test is true. Implementations are encouraged to use short-circuit evaluation in these cases. For instance, the test `header ["To", "Cc"] contains ["me@frobnitzm.edu", "me00@landru.melon.edu"]' is true if either the To header or Cc header of the input message contains either of the e-mail addresses "me@frobnitzm.edu" or "me00@landru.melon.edu". Conversely, in any case where a list of strings would be appropriate, a single string is allowed without being a member of a list; it is equivalent to a list with a single member. So the test `exists "To"' is equivalent to the test `exists ["To"]'. 2.4.2.2. Headers Headers are a subset of strings. In the Internet Message Specification [IMAIL], each header line is allowed to have whitespace nearly anywhere in the line, including after the field name and before the subsequent colon. Extra spaces between the header name and the ":" in a header field are ignored by the interpreter. A header name never contains a colon. The "From" header refers to a line beginning "From:" (or "From :", etc.). No header will match the string "From:" due to the trailing colon. 2.4.2.3. Addresses A number of commands call for email addresses, which are also a subset of strings. These addresses must be compliant with [IMAIL]. Implementations MUST ensure the addresses are syntactically valid, and need not ensure that they are actually deliverable. 2.5. Tests Tests are given as arguments to commands in order to control how the run. Generally, a test is used to decide if a block of code should be evaluated. Showalter Expires 31 Jan 1999 [Page 10] Internet DRAFT Sieve August 7, 1998 2.5.1. String Comparison When matching one string against another, there are a number of ways of performing the match. These are accomplished with three matches -- an exact match, a substring match, and a wildcard glob-style match. In order to provide for matches between character sets and case insensitivity, Sieve borrows ACAP's comparator registry. 2.6.1. Match Keyword There are two allowed match keywords describing the allowed match in this draft; they are ":is" and ":contains". Match keywords are supplied to those commands which allow them to specify whether the match is to be a complete match or not. These are used as tagged arguments to tests that perform string comparison. Exactly one of them is necessary for a command. The ":contains" version describes a substring match. If the value argument contains the key argument as a substring, the match is true. For instance, the string "frobnitzm" contains "frob" and "nit", but not "fbm". The null key ("") is contained in all values. The ":is" version describes an absolute match; if the contents of the first string are absolutely the same as the contents of the second string, they match. Only the string "frobnitzm" is the string "frobnitzm". The null key only "is" the null value. In order to specify what type of match is supposed to happen, commands that support matching take optional tagged arguments ":is" and ":contains". Commands default to using ":is" matching. Note that these modifiers may interact with comparators; in particular, some comparators are not suitable for matching with ":contains". It is an error to use a comparator with ":contains" that is not compatible with it. 2.6.2. Comparators In order to allow for character set-independent matches, the match keyword may be coupled with a comparator name. Comparators are described for [ACAP]; a registry is defined for ACAP, and this specification uses that registry. ACAP defines multiple comparator types. Only equality types are used in this specification. Showalter Expires 31 Jan 1999 [Page 11] Internet DRAFT Sieve August 7, 1998 All implementations MUST support the "i;octet" comparator, which simply compares one octet with the next. If left unspecified, the default is octet. Some comparators may not be usable with substring matches; that is, they may only work with ":is". It is an error to try and use a comparator with "matches" or "contains" that is not compatible with it. A comparator is specified with commands that support matching by the ":comparator" option. This option is followed by a string providing the name of the comparator to be used. So in this example, Example: if header "Subject" :contains :comparator "i;ascii-casemap" "make money fast" { discard; would discard any message with subjects such as "Make Money Fast" and "MaKe MONEY fAST". OPEN: Are there any other comparators that SHOULD or MUST be supported? 2.7. Tagged Arguments This document provides for tagged arguments in the style of CommonLISP. A tagged argument is an an argument for a command that begins with ":", and consists of a tag naming the argument, such as ":contains". This argument means that zero or more of the next tokens have some particular meaning, depending on the argument. These next tokens may be numbers or strings, but are never blocks. To keep the language simple, tagged arguments should not take tagged arguments as arguments. One case where this is useful is the ":comparator" argument, which allows the user to specify which ACAP comparator will be used to compare two strings, since different languages may impose different orderings on UTF-8 [UTF-8] characters. Tagged arguments may appear in any order, and may be interspersed with positional arguments. OPEN: Perhaps tagged arguments should always be before positional arguments. Showalter Expires 31 Jan 1999 [Page 12] Internet DRAFT Sieve August 7, 1998 2.8. Blocks Blocks are sets of commands enclosed within curly braces. Blocks are supplied to commands so that the commands can implement control structures. So a control structure is just a command that happens to take a test and a block as its arguments; depending on the result of the control structure, it runs the code in the block zero or more times. (Note that by the commands supplied in the specification, there are no loops, so the control structures supplied--if, elsif, and else--run a block either once or not at all.) 2.9. Commands Sieve scripts are made up of commands. Commands can take any of the tokens above as arguments, and arguments may be either tagged or positional arguments. A command begins with a name, which is a simple token. It ends with either a semicolon or a block. (Commands ending with blocks are used to implement control structures.) Commands never take both a semicolon and a block, nor do they ever take more than one block as an argument. 2.9.1. Positional Arguments Positional arguments are familiar from any programming language. A command takes zero or more untagged positional arguments in order to specify its behavior. Positional arguments are given their value based on their order in the command. 2.9.2. Optional Arguments Optional arguments are tagged arguments that may be omitted; when omitted, they are given default values. 2.9.3. Blocks as Arguments Commands may take blocks as arguments. A block is always the last argument to a command, and when it exists, it replaces the semicolon that would otherwise end the command. 2.11. Evaluation Precedence is not important in any of the commands in this base specification. However, as an extension might make order of operation important, all arguments to rules MUST be evaluated in Showalter Expires 31 Jan 1999 [Page 13] Internet DRAFT Sieve August 7, 1998 left-to-right order. Those operations that can implement short- circuit evaluation (such as "allof" and "anyof") MUST do so. Sieve imposes specific limits on actions; for instance, a rejected message may not also be filed into a mailbox. These restrictions are noted on a per-command basis. OPEN: Or rather, they should be. 2.11.1. Implicit keep If evaluation of a script fails to result in one "fileinto", "keep", or "reject", a "keep" action is implicitly taken. So the message is filed into the user's primary mailbox; that is, For instance, with any of the short messages offered above, the following script produces no actions. Example: if size over 500K discard; 3. Conditionals and Control Structures In order for a script to do more than one set of actions, control structures are needed. In Sieve, a control structure is a command that takes a block as an argument. In this document, only the "if" control structure is provided. There are three pieces to if: "if", "elsif", and "else". Syntax: if Syntax: elsif Syntax: else The semantics are similar to any other programming language this appears in. When the interpreter sees an "if", it evaluates the test associated with it. If the test is true, it executes the block associated with it. If the test of the "if" is false, it evaluates the test of the first Showalter Expires 31 Jan 1999 [Page 14] Internet DRAFT Sieve August 7, 1998 "elsif" (if any). If the test of "elsif" is true, it runs the elsif's block. An elsif may be followed by an elsif, in which case, the interpreter repeats this process until it runs out of elsifs. When the interpreter runs out of elsifs, there may be an "else" case. If there is, and none of the if or elsif tests were true, the interpreter runs the else case. This provides a way of performing exactly one of the blocks in the chain. In the following example, both Message A and B are dropped. Example: if header "from" contains "coyote" { discard; } elsif header ["subject"] :contains ["$$$"] { discard; } else fileinto "INBOX"; In the script below, when run over message A, forwards the message to acm@frobnitzm.edu; message B, to postmaster@frobnitzm.edu; any other message is forwarded to field@frobnitzm.edu. Example: if header ["From"] contains ["coyote"] { forward "acm@frobnitzm.edu"; } else if header "Subject" contains "$$$" { forward "postmaster@frobnitzm.edu"; } else forward "field@frobnitzm.edu"; 4. Actions This document supplies six actions that may be taken on a message: keep, fileinto, forward, reject, discard, and stop. 4.1. Action reject Syntax: reject The "reject" action resends the message to the sender, wrapping it in a "reject" form, noting that it was rejected by the recipient. In the following script, message A is rejected and returned to the sender. Example: if header "from" contains "coyote@znic.net" { Showalter Expires 31 Jan 1999 [Page 15] Internet DRAFT Sieve August 7, 1998 reject "I am not taking mail from you, and I don't want your birdseed, either!"; } A reject message MUST takes the form of a failed DSN as specified by [DSN]. The human-readable portion of the message, the first component of the DSN, contains the human readable message describing the error, although it SHOULD contain additional text alerting the original sender that mail was refused by a filter. This part of the DSN might appear as follows: ------------------------------------------------------------ Message was refused by recipient's mail filtering program. Reason given was as follows: I am not taking mail from you, and I don't want your birdseed, either! ------------------------------------------------------------ The action-value field as defined in the DSN specification MUST be "failed". A rejected message may not be filed, forwarded, or kept. A message that triggers a "reject" action is never allowed to be kept by the user, and the "reject" overrides all other actions. A message may only be rejected once. 4.2. Action fileinto Syntax: fileinto The "fileinto" action drops the message into a named folder. Implementations SHOULD support fileinto, but may not be able to in cases where the filtering agent is not able to write to the users' folders (such as a [POP3] implementation running inside the mail server where the folders are stored on the users' local disks). In the following script, message A is filed into folder "INBOX.harassment". Example: if header ["to"] contains "coyote" { fileinto "INBOX.harassment"; } Showalter Expires 31 Jan 1999 [Page 16] Internet DRAFT Sieve August 7, 1998 4.3. Action forward Syntax: forward
The "forward" action is used to forward the message to another user at the supplied address, as a mail forwarding feature does. The "forward" action makes no changes to the message body or headers, and only modifies the envelope recipient. A simple script can be used for forwarding: Example: forward "bart@frobnitzm.edu"; The forward command performs an MTA-style forward--that is, what you get from a .forward file using sendmail under UNIX. The address on the SMTP envelope is replaced with the one on the forward command and the message is sent back out. (This is not an MUA-style forward, which creates a new message with a different sender and message ID, wrapping the old message in a new one.) OPEN: At least one person rejects to this definition, claiming that a sendmail-style forward is inherently broken. 4.4. Action keep Syntax: keep The "keep" action is whatever action is taken in lieu of all other actions, if no filtering happens at all; generally, this simply means to file the message into the user's main mailbox. This command provides a way to execute this action without needing to know the name of the user's main mailbox, providing a way to call it without needing to understand the user's setup, or the underlying mail system. Example: if size under 1M keep; else discard; 4.6. Action stop Syntax: stop The "stop" action ends all processing. If no actions have been executed, then the keep action is taken. Showalter Expires 31 Jan 1999 [Page 17] Internet DRAFT Sieve August 7, 1998 Example: [There needs to be an example here.] 4.7. Action discard Syntax: discard Discard drops the message. In the following script, any mail from "idiot@frobnitzm.edu" is thrown out. Example: if header ["from"] contains ["idiot@frobnitzm.edu"] discard; Discard takes no arguments. While an important part of this language, "discard" has the potential to create serious problems for users: A student leaving themselves logged in to a machine in a computer lab may find their script changed to just "discard". In order to protect users in this situation (along with similar situations), implementations MAY keep messages destroyed by a script for an indefinite period, and MAY disallow scripts that throw out all mail. 5. Tests Tests are used in conditionals to decide which part(s) of the conditional to execute. 5.1. Test allof Syntax: allof ( , , ... ) The allof test preforms a logical AND on the tests supplied to it. Example: allof (false, false) => false allof (false, true) => false allof (true, true) => true The allof test takes as its argument a test-list. Showalter Expires 31 Jan 1999 [Page 18] Internet DRAFT Sieve August 7, 1998 5.2. Test anyof Syntax: anyof ( , , ... ) The anyof test preforms a logical OR on the tests supplied to it. Example: anyof (false, false) => false anyof (false, true) => true anyof (true, true) => true 5.3. Test exists Syntax: exists The "exists" test is true if the headers listed in the argument exist within the message. All of the headers must exist or the test is false. The following example throws out mail that doesn't have a From header and a Date header. Example: if not exists ["From","Date"] { discard; } 5.4. Test false Syntax: false The "false" test always evaluates to false. 5.5. Test header Syntax: header The "header" test evaluates to true if the any header name matches any key. How the match is done is described by the second argument, which is one of the string comparison arguments discussed in section 2.6. The first argument to header, the header-name-list, is a list of headers to get values from to be searched. The key-list is a list of keys. Showalter Expires 31 Jan 1999 [Page 19] Internet DRAFT Sieve August 7, 1998 If a header listed in the header-name-list argument exists, it contains the null key (""). However, if the named header is not present, it does not contain the null key. So if a message contained the header X-Caffeine: C8H10N4O2 these tests on that header evaluate as follows: header ["X-Y-Z"] is [""] => false header ["X-Y-Z"] contains [""] => true 5.6. Test not Syntax: not The "not" test takes some other test as an argument, and yields the opposite result. 5.7. Test size Syntax: size <":over" / ":under"> The "size" test deals with the size of a message. It takes either a tagged argument of ":over" or ":under", followed by a number representing the size of the message. If the argument is ":over", and the size of the message is greater than the number provided, the test is true; otherwise, it is false. If the argument is ":under", and the size of the message is less than the number provided, the test is true; otherwise, it is false. The size of a message is defined to be the number of octets from the initial header until the last character in the message body. 6. Errors in Processing a Script In any programming language, errors are inevitable. Users are expected to make errors, and even if a script works correctly today, it may fail tomorrow due to quotas, mailboxes being removed or renamed, or some piece of hardware being down. It is imperative that mail get through. Implementations SHOULD check a script before it is run in order to ensure that it is valid. Implementations SHOULD NOT try and recover Showalter Expires 31 Jan 1999 [Page 20] Internet DRAFT Sieve August 7, 1998 from a script with errors, and should instead file mail into the user's primary mailbox. Users MUST be notified of errors in processing a script. The method by which users are notified is implementation defined, but a mail message clearly describing the error is suggested if a preferable alternative cannot be found. In an implementation that allows for a script to be checked when it is turned over to the server, the script can be checked for errors before it is submitted. Implementations SHOULD notify the user of the error and refuse to accept a syntactically invalid script or one that makes use of extensions that the server does not report. Implementations MUST allow mail to be filed without filtering in case of a syntax error in the script. Implementations MUST avoid sending multiple messages describing the same error. Implementations are REQUIRED to notify users of errors in filtering scripts. If there are errors in the script being used, mail SHOULD be filed into the user's main mailbox. Implementations MUST NOT discard mail unless a command explicitly demands it. 7. Extensibility New control structures, actions, and tests can be added to the language. Sites must make these features known to their users; this document does not define a way to discover the list of extensions supported by the server. Any extensions to this language MUST define a string that uniquely identifies that extension. If a new version of an extension changes the functionality of a previously defined extension, it MUST use a different name. The purpose of such a string is for the "support" test, which mandates that script requires the use of that extension. Additionally, in a situation where there is a submission protocol and an extension advertisement mechanism aware of the details of this language, scripts submitted can be checked against the mail server to prevent use of an extension that that the server does not support. 7.1. Capability String Capability strings are typically short strings describing what capabilities are supported by the server. The following capability strings are defined by this document: fileinto The string "fileinto" indicates the implementation Showalter Expires 31 Jan 1999 [Page 21] Internet DRAFT Sieve August 7, 1998 supports filing into mailboxes. comparator- The string "comparator-elbonia" is provided if the implementation supports the "elbonia" comparator. Therefore, all implementations have at least the "comparator-i;octet" capability. 7.2. Registry In order to provide a standard set of extensions, a registry is provided by IANA. Capability names may be registered on a first- come, first-served basis. Extensions designed for interoperable use should be defined as standards track or IESG approved experimental RFCs. To: XXX@XXX.XXX Subject: Registration of new Sieve extension Capability name: Capability keyword: Capability arguments: Standards Track/IESG-approved experimental RFC number: Person and email address to contact for further information: 7.3. Capability Transport As the range of mail systems that this draft is intended to apply to is quite large, a method of advertising which capabilities an implementation supports is difficult due to the wide range of possible implementations. Such a mechanism, however, should have the following properties. (1) The implementation can advertise the complete set of extensions that it supports. OPEN: There needs to be a more complete description here. 8. Transmission The MIME type for a SIEVE script is "application/sieve". Scripts are encoded in UTF-8 during transmission. Showalter Expires 31 Jan 1999 [Page 22] Internet DRAFT Sieve August 7, 1998 9. Acknowledgments I am very thankful to Chris Newman for his support and his ABNF syntax checker, to John Myers and Steve Hole for outlining the requirements for the original drafts, and to Rob Earhart for an early implementation and a great deal of help. I am also indebted to all of the readers of the ietf-mta-filters@imc.org mailing list. 10. Formal Grammar The grammar used in this section is the same as the ABNF described in [ABNF]. In the case of alternative or optional rules in which a later rule overlaps an earlier rule, the rule which is listed earlier MUST take priority. (This shouldn't happen. Please let me know if it does.) argument = string / string-list / number / tag / test block = "{" [WSP] commands [WSP] "}" ;; C-style block CHAR-NOT-DOT = (%x01-2d / %x2f-%xff) ;; all the characters that aren't "." command = identifier WSP *(argument WSP) [WSP] ";" commands = *([WSP] command [WSP]) comment = "#" *VCHAR CRLF identifier = (ALPHA / "_") *(ALPHA DIGIT "_") multi-line = "text:" [WSP] CRLF *((1*CHAR-NOT-DOT *CHAR CRLF) / ("." 1*CHAR-NOT-DOT *CHAR CRLF) / (".." *CHAR CRLF) / CRLF) "." CRLF ;; Note when used, ;; a leading ".." on a line is mapped to ".". number = 1*DIGIT [QUANTIFIER] ;; quantifier is a multiplier (or bit shift) QUANTIFIER = "K" / "M" / "G" ;; K == 2^10; M == 2^20; G = 2^30 quoted-string = DQUOTE *CHAR DQUOTE ;; \" inside a string maps to " Showalter Expires 31 Jan 1999 [Page 23] Internet DRAFT Sieve August 7, 1998 ;; \\ inside a string maps to \ ;; All other characters map to themselves. ;; Note that newlines and other weird characters ;; are all allowed strings. string = quoted-string / multi-line string-list = "[" [WSP] *(string [WSP] "," [WSP]) string [WSP] "]" / string ;; if there is only a single string, the brackets are optional tag = ":" identifier test = identifier *(WSP argument) [WSP test-list] test-list = [WSP] "(" [WSP] *(test [WSP] "," [WSP]) test [WSP] ")" [WSP] WSP = 1*(SP / CRLF / HTAB) / comment ;; just whitespace. anyplace this is allowed, a comment is ;; as well 11. Security Considerations Users must get their mail. It is imperative that whatever method implementations use to store the user-defined filtering scripts be secure. It is equally important that implementations sanity-check the user's scripts, and not allow users to create on-demand mailbombs. For instance, an implementation that allows a user to reject or forward multiple times to a single message might also allow a user to create a mailbomb triggered by mail from a specific user. Therefore, an implementation SHOULD only allow one "reject" per message processed, and MAY limit the number of forward actions taken. An implementation MUST refuse to forward a message to itself. [OPEN: What do you do when a site limit prevents you from this? Say I do three replies; which ones take effect when the limit is 1? 2? 0?] Several commands, such as "discard", "forward", and "fileinto" allow for actions to be taken that are potentially very dangerous. 12. Author's Address Tim Showalter Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213 Showalter Expires 31 Jan 1999 [Page 24] Internet DRAFT Sieve August 7, 1998 E-Mail: tjs+@andrew.cmu.edu Showalter Expires 31 Jan 1999 [Page 25] Internet DRAFT Sieve August 7, 1998 Appendices Appendix A. References [ABNF] Crocker, D., "Augmented BNF for Syntax Specifications: ABNF", Internet Mail Consortium, RFC 2234, November 1997. [DSN] Moore, K., and G. Vaudreuil, "An Extensible Message Format for Delivery Status Notifications", RFC 1894, January 1996. [FLAMES] Borenstein, Nathaniel S., and Chris A. Thyberg, "Power, Ease of Use, and Cooperative Work in a Practical Multimedia Message System", Int. J. of Man-Machine Studies, April, 1991. Reprinted in Computer-Supported Cooperative Work and Groupware, Saul Greenberg, editor, Harcourt Brace Jovanovich, 1991. Reprinted in Readings in Groupware and Computer-Supported Cooperative Work, Ronald Baecker, editor, Morgan Kaufmann, 1993. [KEYWORDS] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", RFC 2119, Harvard University, March 1997. [IMAP] Crispin, M., "Internet Mail Access Protocol - version 4rev1", RFC 2060, University of Washington, December 1996. [IMAIL] Crocker, D., "Standard for the Format of ARPA Internet Text Messages", STD 11, RFC 822, University of Delaware, August 1982. [MIME] Freed, N., and N. Borenstein, "Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies", RFC 2045, Innosoft and First Virtual, November 1996. [SMTP] Postel, J., "Simple Mail Transfer Protocol", STD 10, RFC 821, USC/Information Sciences Institute, August 1982. [UTF-8] Yergeau, F. "UTF-8, a transformation format of Unicode and ISO 10646", RFC 2044, Alis Technologies, October 1996. Appendix B. Full Copyright Statement Copyright (C) The Internet Society 1998. All Rights Reserved. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are Showalter Expires 31 Jan 1999 [Page 26] Internet DRAFT Sieve August 7, 1998 included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be followed, or as required to translate it into languages other than English. The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assigns. This document will expire before January 31, 1999. Showalter Expires 31 Jan 1999 [Page 27]