[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: gpg



Hi Andre!

On Tue, 13 Mar 2001, Andre Berger wrote:

 >: 
 >: Is this enough input?
 
yep, but.. 

here's my config, perhaps your probs are better placed in @mutt.org> 
Mutt 1.2.5i (2000-07-28); gpg (GnuPG) 1.0.4

0:42@pts/2 ~ > cat .muttrc
<snip>
unset pgp_autosign      # pgp sign every outgoing mail. (send-hook?)
unset pgp_autoencrypt   # pgp encrypt every outgoing mail. (send-hook?)
set pgp_create_traditional=ask-no       # Use old-style PGP? (don't do it!)
set pgp_replyencrypt    # Encrypt replies on encrypted mail
set pgp_replysign       # Sign replies on signed mail
set pgp_replysignencrypted      # Sign replies on encrypted mail
unset pgp_retainable_sigs       # disable retainable signatures.
set pgp_verify_sig=yes  # ask me whether I want to check a pgp signature
set pgp_timeout=7200    # forget PGP passphrase after 7200 seconds (=2 hours)
set pgp_sign_as="cl.en" # UserID/KeyID for signing
set pgp_strict_enc      # allway use QP enc. with PGP.
unset pgp_long_ids      # display 64bit PGP key-ids (don't change this!)
set pgp_show_unusable   # show unusable PGP keys in menu
set pgp_sign_micalg=pgp-md5     # pgp-md5 for RSA-Keys & pgp2 user. (pgp-sha1, pgp-rmd160source)
source ~/.mutt/gpg.rc           # Start up with GnuPG by default
# %n = number   %k = key id     %K = key id of the principal key
# %u = user id  %a = algorithm  %A = algorithm of the princ. key
# %l = length   %L = length of the princ. key   
# %f = flags    %F = flags of the princ. key    
# %c = capabilities             %C = capabilities of the princ. key
# %t = trust/validity of the key-uid association
#set pgp_entry_format="%4n %t%f %4l/0x%k %-4a %2c %u"
set pgp_entry_format="%4n %t%f %[%y/%m/%d] %4l/0x%k %-4a %2c %u"
set pgp_sort_keys=trust
send-hook ingo 'set pgp_autoencrypt pgp_autosign' 

# PGP (compression and encryption of the folder):
#open-hook  \\.pgp$ "pgp -f < %f > %t"
#close-hook \\.pgp$ "pgp -fe roland@spinnaker.de < %t > %f"
# no appending possible with pgp

# PGP with IDEA only (compression and encryption of the folder):
#open-hook  \\.idea$ "pgp -f < %f > %t"
#close-hook \\.idea$ "pgp -cf < %t > %f"
# no appending possible with pgp

# Colorize (German) GnuPG messages:
color body       red        default  "Korrekte Unterschrift"
color body       brightyellow black  "(Öffentlicher Schlüssel nicht gefunden|keine vertrauenswürdige Signatur|Dieser Schlüssel ist verfallen|FALSCHE Unterschrift)"

source ~/.mutt/keybind-1.2i

0:42@pts/2 ~ > cat .procmailrc
<snip>

##PGP
:0
* !^Content-Type: message/
* !^Content-Type: multipart/
* !^Content-Type: application/pgp
{
        :0 fBw
        *^------BEGIN PGP MESSAGE------
        *^------END PGP MESSAGE------
        | formail \
            -i "Content-Type: application/pgp; format=text; x-action=encrypt"

        :0 fBw
        *^------BEGIN PGP SIGNED MESSAGE------
        *^------BEGIN PGP SIGNATURE------
        *^------END PGP SIGNATURE------
        | formail \
            -i "Content-Type: application/pgp; format=text; x-action=sign"
} 



good luck,

			Claus

besides,
<http://www.kuro5hin.org/?op=displaystory;sid=2000/5/9/193916/2290>
<http://www.kuro5hin.org/?op=displaystory;sid=2000/5/1/17058/47630>
# -*-muttrc-*-
#
# Command formats for gpg.
# 
# This version uses gpg-2comp from 
#   http://muppet.faveve.uni-stuttgart.de/~gero/gpg-2comp.tar.gz
#
# $Id: gpg.rc,v 1.5.2.1 2000/05/23 08:15:02 roessler Exp $
#
# %p    The empty string when no passphrase is needed,
#       the string "PGPPASSFD=0" if one is needed.
#
#       This is mostly used in conditional % sequences.
#
# %f    Most PGP commands operate on a single file or a file
#       containing a message.  %f expands to this file's name.
#
# %s    When verifying signatures, there is another temporary file
#       containing the detached signature.  %s expands to this
#       file's name.
#
# %a    In "signing" contexts, this expands to the value of the
#       configuration variable $pgp_sign_as.  You probably need to
#       use this within a conditional % sequence.
#
# %r    In many contexts, mutt passes key IDs to pgp.  %r expands to
#       a list of key IDs.

# decode application/pgp
set pgp_decode_command="gpg %?p?--passphrase-fd 0? --no-verbose --batch --output - %f"

# verify a pgp/mime signature
set pgp_verify_command="gpg --no-verbose --batch --output - --verify %s %f"

# decrypt a pgp/mime attachment
set pgp_decrypt_command="gpg --passphrase-fd 0 --no-verbose --batch --output - %f"

# create a pgp/mime signed attachment
# set pgp_sign_command="gpg-2comp --no-verbose --batch --output - --passphrase-fd 0 --armor --detach-sign --textmode %?a?-u %a? %f"
set pgp_sign_command="gpg --no-verbose --batch --output - --passphrase-fd 0 --armor --detach-sign --textmode %?a?-u %a? %f"

# create a application/pgp signed (old-style) message
# set pgp_clearsign_command="gpg-2comp --no-verbose --batch --output - --passphrase-fd 0 --armor --textmode --clearsign %?a?-u %a? %f"
set pgp_clearsign_command="gpg --no-verbose --batch --output - --passphrase-fd 0 --armor --textmode --clearsign %?a?-u %a? %f"

# create a pgp/mime encrypted attachment
# set pgp_encrypt_only_command="pgpewrap gpg-2comp -v --batch --output - --encrypt --textmode --armor --always-trust -- -r %r -- %f"
set pgp_encrypt_only_command="pgpewrap gpg -v --batch --output - --encrypt --textmode --armor --always-trust -- -r %r -- %f"

# create a pgp/mime encrypted and signed attachment
# set pgp_encrypt_sign_command="pgpewrap gpg-2comp --passphrase-fd 0 -v --batch --output - --encrypt --sign %?a?-u %a? --armor --always-trust -- -r %r -- %f"
set pgp_encrypt_sign_command="pgpewrap gpg --passphrase-fd 0 -v --batch --output - --encrypt --sign %?a?-u %a? --armor --always-trust -- -r %r -- %f"

# import a key into the public key ring
set pgp_import_command="gpg --no-verbose --import -v %f"

# export a key from the public key ring
set pgp_export_command="gpg --no-verbose --export --armor %r"

# verify a key
set pgp_verify_key_command="gpg --no-verbose --batch --fingerprint --check-sigs %r"

# read in the public key ring
set pgp_list_pubring_command="gpg --no-verbose --batch --with-colons --list-keys %r" 

# read in the secret key ring
set pgp_list_secring_command="gpg --no-verbose --batch --with-colons --list-secret-keys %r" 

# receive key from keyserver:
#set pgp_getkeys_command="wrap.sh -g %r"
set pgp_getkeys_command=""

Attachment: pgpH21PICxMmx.pgp
Description: PGP signature


Reply to: