Hi Andre!
On Tue, 13 Mar 2001, Andre Berger wrote:
>:
>: Is this enough input?
yep, but..
here's my config, perhaps your probs are better placed in @mutt.org>
Mutt 1.2.5i (2000-07-28); gpg (GnuPG) 1.0.4
0:42@pts/2 ~ > cat .muttrc
<snip>
unset pgp_autosign # pgp sign every outgoing mail. (send-hook?)
unset pgp_autoencrypt # pgp encrypt every outgoing mail. (send-hook?)
set pgp_create_traditional=ask-no # Use old-style PGP? (don't do it!)
set pgp_replyencrypt # Encrypt replies on encrypted mail
set pgp_replysign # Sign replies on signed mail
set pgp_replysignencrypted # Sign replies on encrypted mail
unset pgp_retainable_sigs # disable retainable signatures.
set pgp_verify_sig=yes # ask me whether I want to check a pgp signature
set pgp_timeout=7200 # forget PGP passphrase after 7200 seconds (=2 hours)
set pgp_sign_as="cl.en" # UserID/KeyID for signing
set pgp_strict_enc # allway use QP enc. with PGP.
unset pgp_long_ids # display 64bit PGP key-ids (don't change this!)
set pgp_show_unusable # show unusable PGP keys in menu
set pgp_sign_micalg=pgp-md5 # pgp-md5 for RSA-Keys & pgp2 user. (pgp-sha1, pgp-rmd160source)
source ~/.mutt/gpg.rc # Start up with GnuPG by default
# %n = number %k = key id %K = key id of the principal key
# %u = user id %a = algorithm %A = algorithm of the princ. key
# %l = length %L = length of the princ. key
# %f = flags %F = flags of the princ. key
# %c = capabilities %C = capabilities of the princ. key
# %t = trust/validity of the key-uid association
#set pgp_entry_format="%4n %t%f %4l/0x%k %-4a %2c %u"
set pgp_entry_format="%4n %t%f %[%y/%m/%d] %4l/0x%k %-4a %2c %u"
set pgp_sort_keys=trust
send-hook ingo 'set pgp_autoencrypt pgp_autosign'
# PGP (compression and encryption of the folder):
#open-hook \\.pgp$ "pgp -f < %f > %t"
#close-hook \\.pgp$ "pgp -fe roland@spinnaker.de < %t > %f"
# no appending possible with pgp
# PGP with IDEA only (compression and encryption of the folder):
#open-hook \\.idea$ "pgp -f < %f > %t"
#close-hook \\.idea$ "pgp -cf < %t > %f"
# no appending possible with pgp
# Colorize (German) GnuPG messages:
color body red default "Korrekte Unterschrift"
color body brightyellow black "(Öffentlicher Schlüssel nicht gefunden|keine vertrauenswürdige Signatur|Dieser Schlüssel ist verfallen|FALSCHE Unterschrift)"
source ~/.mutt/keybind-1.2i
0:42@pts/2 ~ > cat .procmailrc
<snip>
##PGP
:0
* !^Content-Type: message/
* !^Content-Type: multipart/
* !^Content-Type: application/pgp
{
:0 fBw
*^------BEGIN PGP MESSAGE------
*^------END PGP MESSAGE------
| formail \
-i "Content-Type: application/pgp; format=text; x-action=encrypt"
:0 fBw
*^------BEGIN PGP SIGNED MESSAGE------
*^------BEGIN PGP SIGNATURE------
*^------END PGP SIGNATURE------
| formail \
-i "Content-Type: application/pgp; format=text; x-action=sign"
}
good luck,
Claus
besides,
<http://www.kuro5hin.org/?op=displaystory;sid=2000/5/9/193916/2290>
<http://www.kuro5hin.org/?op=displaystory;sid=2000/5/1/17058/47630>
# -*-muttrc-*- # # Command formats for gpg. # # This version uses gpg-2comp from # http://muppet.faveve.uni-stuttgart.de/~gero/gpg-2comp.tar.gz # # $Id: gpg.rc,v 1.5.2.1 2000/05/23 08:15:02 roessler Exp $ # # %p The empty string when no passphrase is needed, # the string "PGPPASSFD=0" if one is needed. # # This is mostly used in conditional % sequences. # # %f Most PGP commands operate on a single file or a file # containing a message. %f expands to this file's name. # # %s When verifying signatures, there is another temporary file # containing the detached signature. %s expands to this # file's name. # # %a In "signing" contexts, this expands to the value of the # configuration variable $pgp_sign_as. You probably need to # use this within a conditional % sequence. # # %r In many contexts, mutt passes key IDs to pgp. %r expands to # a list of key IDs. # decode application/pgp set pgp_decode_command="gpg %?p?--passphrase-fd 0? --no-verbose --batch --output - %f" # verify a pgp/mime signature set pgp_verify_command="gpg --no-verbose --batch --output - --verify %s %f" # decrypt a pgp/mime attachment set pgp_decrypt_command="gpg --passphrase-fd 0 --no-verbose --batch --output - %f" # create a pgp/mime signed attachment # set pgp_sign_command="gpg-2comp --no-verbose --batch --output - --passphrase-fd 0 --armor --detach-sign --textmode %?a?-u %a? %f" set pgp_sign_command="gpg --no-verbose --batch --output - --passphrase-fd 0 --armor --detach-sign --textmode %?a?-u %a? %f" # create a application/pgp signed (old-style) message # set pgp_clearsign_command="gpg-2comp --no-verbose --batch --output - --passphrase-fd 0 --armor --textmode --clearsign %?a?-u %a? %f" set pgp_clearsign_command="gpg --no-verbose --batch --output - --passphrase-fd 0 --armor --textmode --clearsign %?a?-u %a? %f" # create a pgp/mime encrypted attachment # set pgp_encrypt_only_command="pgpewrap gpg-2comp -v --batch --output - --encrypt --textmode --armor --always-trust -- -r %r -- %f" set pgp_encrypt_only_command="pgpewrap gpg -v --batch --output - --encrypt --textmode --armor --always-trust -- -r %r -- %f" # create a pgp/mime encrypted and signed attachment # set pgp_encrypt_sign_command="pgpewrap gpg-2comp --passphrase-fd 0 -v --batch --output - --encrypt --sign %?a?-u %a? --armor --always-trust -- -r %r -- %f" set pgp_encrypt_sign_command="pgpewrap gpg --passphrase-fd 0 -v --batch --output - --encrypt --sign %?a?-u %a? --armor --always-trust -- -r %r -- %f" # import a key into the public key ring set pgp_import_command="gpg --no-verbose --import -v %f" # export a key from the public key ring set pgp_export_command="gpg --no-verbose --export --armor %r" # verify a key set pgp_verify_key_command="gpg --no-verbose --batch --fingerprint --check-sigs %r" # read in the public key ring set pgp_list_pubring_command="gpg --no-verbose --batch --with-colons --list-keys %r" # read in the secret key ring set pgp_list_secring_command="gpg --no-verbose --batch --with-colons --list-secret-keys %r" # receive key from keyserver: #set pgp_getkeys_command="wrap.sh -g %r" set pgp_getkeys_command=""
Attachment:
pgpH21PICxMmx.pgp
Description: PGP signature