Hi list, I've changed mutts config to enable gpg support within mutt. While it seems to work nicely, there is still a minor problem. I've used the default config from /usr/share/doc/mutt-1.5.23-r2/samples/gpg.rc.bz2 and added a few other options which i found useful like fetching keys automaticaly when opening mails.
My problem however is that every time i open a signed mail, gpg can't fetch the key in the first place. I always have to abort via Ctrl+C and reopen the mail again. Usually at least 3 times. After the third try it usually works. Thats quite annoying, even though after gpg could fetch the keys they are stored anyway and don't have to refetched again. Below is my actual mutt-gpg config: > # decode application/pgp > set pgp_decode_command="gpg --status-fd=2 %?p?--passphrase-fd 0? --no-verbose > --quiet --batch --output - %f" > # verify a pgp/mime signature > set pgp_verify_command="gpg --status-fd=2 --no-verbose --quiet --batch > --output - --verify %s %f" > # decrypt a pgp/mime attachment > set pgp_decrypt_command="gpg --status-fd=2 %?p?--passphrase-fd 0? > --no-verbose --quiet --batch --output - %f" > # create a pgp/mime signed attachment > set pgp_sign_command="gpg --no-verbose --batch --quiet --output - > %?p?--passphrase-fd 0? --armor --detach-sign --textmode %?a?-u %a? %f" > # create a application/pgp signed (old-style) message > set pgp_clearsign_command="gpg --no-verbose --batch --quiet --output - > %?p?--passphrase-fd 0? --armor --textmode --clearsign %?a?-u %a? %f" > # create a pgp/mime encrypted attachment > set pgp_encrypt_only_command="pgpewrap gpg --batch --quiet --no-verbose > --output - --encrypt --textmode --armor --always-trust --encrypt-to > 0xBE43B303 -- -r %r -- %f" > # create a pgp/mime encrypted and signed attachment > set pgp_encrypt_sign_command="pgpewrap gpg %?p?--passphrase-fd 0? --batch > --quiet --no-verbose --textmode --output - --encrypt --sign %?a?-u %a? > --armor --always-trust --encrypt-to 0xBE43B303 -- -r %r -- %f" > # import a key into the public key ring > set pgp_import_command="gpg --no-verbose --import %f" > # export a key from the public key ring > set pgp_export_command="gpg --no-verbose --export --armor %r" > # verify a key > set pgp_verify_key_command="gpg --verbose --batch --fingerprint --check-sigs > %r" > # read in the public key ring > set pgp_list_pubring_command="gpg --no-verbose --batch --quiet --with-colons > --list-keys %r" > # read in the secret key ring > set pgp_list_secring_command="gpg --no-verbose --batch --quiet --with-colons > --list-secret-keys %r" > > set pgp_autosign=yes > set pgp_sign_as=0xBE43B303 > set pgp_replyencrypt=yes > set pgp_timeout=1800 > > # fetch keys > set pgp_getkeys_command="gpg --keyserver subkeys.pgp.net --keyserver-options > honor-http-proxy --recv-key %r >/dev/null 2>&1" > > # pattern for good signature - may need to be adapted to locale! > set pgp_good_sign="^\\[GNUPG:\\] GOODSIG" Any ideas whats wrong here? thx -- greetings Michael Mair-Keimberger
signature.asc
Description: Digital signature