Hi Andre! On Tue, 13 Mar 2001, Andre Berger wrote:
>: >: Is this enough input? yep, but.. here's my config, perhaps your probs are better placed in @mutt.org> Mutt 1.2.5i (2000-07-28); gpg (GnuPG) 1.0.4 0:[EMAIL PROTECTED]/2 ~ > cat .muttrc <snip> unset pgp_autosign # pgp sign every outgoing mail. (send-hook?) unset pgp_autoencrypt # pgp encrypt every outgoing mail. (send-hook?) set pgp_create_traditional=ask-no # Use old-style PGP? (don't do it!) set pgp_replyencrypt # Encrypt replies on encrypted mail set pgp_replysign # Sign replies on signed mail set pgp_replysignencrypted # Sign replies on encrypted mail unset pgp_retainable_sigs # disable retainable signatures. set pgp_verify_sig=yes # ask me whether I want to check a pgp signature set pgp_timeout=7200 # forget PGP passphrase after 7200 seconds (=2 hours) set pgp_sign_as="cl.en" # UserID/KeyID for signing set pgp_strict_enc # allway use QP enc. with PGP. unset pgp_long_ids # display 64bit PGP key-ids (don't change this!) set pgp_show_unusable # show unusable PGP keys in menu set pgp_sign_micalg=pgp-md5 # pgp-md5 for RSA-Keys & pgp2 user. (pgp-sha1, pgp-rmd160source) source ~/.mutt/gpg.rc # Start up with GnuPG by default # %n = number %k = key id %K = key id of the principal key # %u = user id %a = algorithm %A = algorithm of the princ. key # %l = length %L = length of the princ. key # %f = flags %F = flags of the princ. key # %c = capabilities %C = capabilities of the princ. key # %t = trust/validity of the key-uid association #set pgp_entry_format="%4n %t%f %4l/0x%k %-4a %2c %u" set pgp_entry_format="%4n %t%f %[%y/%m/%d] %4l/0x%k %-4a %2c %u" set pgp_sort_keys=trust send-hook ingo 'set pgp_autoencrypt pgp_autosign' # PGP (compression and encryption of the folder): #open-hook \\.pgp$ "pgp -f < %f > %t" #close-hook \\.pgp$ "pgp -fe [EMAIL PROTECTED] < %t > %f" # no appending possible with pgp # PGP with IDEA only (compression and encryption of the folder): #open-hook \\.idea$ "pgp -f < %f > %t" #close-hook \\.idea$ "pgp -cf < %t > %f" # no appending possible with pgp # Colorize (German) GnuPG messages: color body red default "Korrekte Unterschrift" color body brightyellow black "(Öffentlicher Schlüssel nicht gefunden|keine vertrauenswürdige Signatur|Dieser Schlüssel ist verfallen|FALSCHE Unterschrift)" source ~/.mutt/keybind-1.2i 0:[EMAIL PROTECTED]/2 ~ > cat .procmailrc <snip> ##PGP :0 * !^Content-Type: message/ * !^Content-Type: multipart/ * !^Content-Type: application/pgp { :0 fBw *^------BEGIN PGP MESSAGE------ *^------END PGP MESSAGE------ | formail \ -i "Content-Type: application/pgp; format=text; x-action=encrypt" :0 fBw *^------BEGIN PGP SIGNED MESSAGE------ *^------BEGIN PGP SIGNATURE------ *^------END PGP SIGNATURE------ | formail \ -i "Content-Type: application/pgp; format=text; x-action=sign" } good luck, Claus besides, <http://www.kuro5hin.org/?op=displaystory;sid=2000/5/9/193916/2290> <http://www.kuro5hin.org/?op=displaystory;sid=2000/5/1/17058/47630>
# -*-muttrc-*- # # Command formats for gpg. # # This version uses gpg-2comp from # http://muppet.faveve.uni-stuttgart.de/~gero/gpg-2comp.tar.gz # # $Id: gpg.rc,v 1.5.2.1 2000/05/23 08:15:02 roessler Exp $ # # %p The empty string when no passphrase is needed, # the string "PGPPASSFD=0" if one is needed. # # This is mostly used in conditional % sequences. # # %f Most PGP commands operate on a single file or a file # containing a message. %f expands to this file's name. # # %s When verifying signatures, there is another temporary file # containing the detached signature. %s expands to this # file's name. # # %a In "signing" contexts, this expands to the value of the # configuration variable $pgp_sign_as. You probably need to # use this within a conditional % sequence. # # %r In many contexts, mutt passes key IDs to pgp. %r expands to # a list of key IDs. # decode application/pgp set pgp_decode_command="gpg %?p?--passphrase-fd 0? --no-verbose --batch --output - %f" # verify a pgp/mime signature set pgp_verify_command="gpg --no-verbose --batch --output - --verify %s %f" # decrypt a pgp/mime attachment set pgp_decrypt_command="gpg --passphrase-fd 0 --no-verbose --batch --output - %f" # create a pgp/mime signed attachment # set pgp_sign_command="gpg-2comp --no-verbose --batch --output - --passphrase-fd 0 --armor --detach-sign --textmode %?a?-u %a? %f" set pgp_sign_command="gpg --no-verbose --batch --output - --passphrase-fd 0 --armor --detach-sign --textmode %?a?-u %a? %f" # create a application/pgp signed (old-style) message # set pgp_clearsign_command="gpg-2comp --no-verbose --batch --output - --passphrase-fd 0 --armor --textmode --clearsign %?a?-u %a? %f" set pgp_clearsign_command="gpg --no-verbose --batch --output - --passphrase-fd 0 --armor --textmode --clearsign %?a?-u %a? %f" # create a pgp/mime encrypted attachment # set pgp_encrypt_only_command="pgpewrap gpg-2comp -v --batch --output - --encrypt --textmode --armor --always-trust -- -r %r -- %f" set pgp_encrypt_only_command="pgpewrap gpg -v --batch --output - --encrypt --textmode --armor --always-trust -- -r %r -- %f" # create a pgp/mime encrypted and signed attachment # set pgp_encrypt_sign_command="pgpewrap gpg-2comp --passphrase-fd 0 -v --batch --output - --encrypt --sign %?a?-u %a? --armor --always-trust -- -r %r -- %f" set pgp_encrypt_sign_command="pgpewrap gpg --passphrase-fd 0 -v --batch --output - --encrypt --sign %?a?-u %a? --armor --always-trust -- -r %r -- %f" # import a key into the public key ring set pgp_import_command="gpg --no-verbose --import -v %f" # export a key from the public key ring set pgp_export_command="gpg --no-verbose --export --armor %r" # verify a key set pgp_verify_key_command="gpg --no-verbose --batch --fingerprint --check-sigs %r" # read in the public key ring set pgp_list_pubring_command="gpg --no-verbose --batch --with-colons --list-keys %r" # read in the secret key ring set pgp_list_secring_command="gpg --no-verbose --batch --with-colons --list-secret-keys %r" # receive key from keyserver: #set pgp_getkeys_command="wrap.sh -g %r" set pgp_getkeys_command=""
pgpVMyOpxLP3N.pgp
Description: PGP signature