After searching good way to read gpg signed mailing list
I came to following conclusion:

Q1: Check sig only upon request (This is easy, did it!)
I did this.  Add macro to .muttrc (with others I defined)
---
macro index S ":toggle pgp_verify_sig\n"        # define S
macro pager z ":toggle pager_stop\n"    # stop at the end (z)?
bind pager \' toggle-quoted             # T is hard to use
macro index c <change-folder>?\n\t      # redefine c
---

Q2: Check sig in background (Too difficult to do now)
Someone mailed me info on this.  Checking in background with 
progress indicator is difficult to implement but procmail 
may achieve similar goal.  (Anyone knows example???)

Q3: Sig display at the end. (Let me not worry now...)
I guess same as Q2.

Since procmail filter seems complicated, I will use
:toggle pgp_verify_sig trick for reading mailing list with
many signed mails. (debian-user,...)



On Thu, Feb 15, 2001 at 11:36:02PM -0800, Osamu Aoki wrote:
> When Mutt read GnuPG-signed mail, it takes time to gather
> signature info from web(keyserver wwwkeys.us.pgp.net)
> and spit out annoying long message on the top of mail 
> message.  This is true as long as signature are checked.
> 
> This has been annoying sometimes when reading mailing list.
> 
> Followings are my wishlist/questions.  Can anyone give me
> some configuration which enables me to do this.
> 
> Q1.  Is there any method to check signature only upon request
>      for incoming-mail?
>      (Just like signing outgoing-mail, where p->s works.)
> 
> Q2.  Can this key retrieval to run in back ground process, so
>      I can read content before key is verified.  Then upon 
>      request result shall be displayed.  Progress indicator
>      during this process on status line will be nice.
>      Does anyone configured system like this?
> 
> Q3.  Can this signature info to be displayed at the end of 
>      message instead, if ever displayed?
> 
> I use default debian setting for mutt-gpg combination.
> Attached current configuration here.
> 
>  Regards,
> 
>  Osamu
> 
> 
> 
> 
> -- 
> +  Osamu Aoki <[EMAIL PROTECTED]>, GnuPG-key: 1024D/D5DE453D  +
> +   Fingerprint: 814E BD64 3288 40E7 E88E  3D92 C3F8 EA94 D5DE 453D   +
> +   === http://www.aokiconsulting.com ======= Cupertino, CA USA ===   +

> # GnuPG configuration
> set pgp_sign_micalg=pgp-sha1 # default for DSS keys
> set pgp_decode_command="gpg %?p?--passphrase-fd 0? --no-verbose --batch --output - 
>%f"
> set pgp_verify_command="gpg --no-verbose --batch --output - --verify %s %f"
> set pgp_decrypt_command="gpg --passphrase-fd 0 --no-verbose --batch --output - %f"
> set pgp_sign_command="gpg --no-verbose --batch --output - --passphrase-fd 0 --armor 
>--detach-sign --textmode %?a?-u %a? %f"
> set pgp_clearsign_command="gpg --no-verbose --batch --output - --passphrase-fd 0 
>--armor --textmode --clearsign %?a?-u %a? %f"
> set pgp_encrypt_only_command="/usr/lib/mutt/pgpewrap gpg -v --batch --output - 
>--encrypt --textmode --armor --always-trust -- -r %r -- %f"
> set pgp_encrypt_sign_command="/usr/lib/mutt/pgpewrap gpg --passphrase-fd 0 -v 
>--batch --textmode --output - --encrypt --sign %?a?-u %a? --armor --always-trust -- 
>-r %r -- %f"
> set pgp_import_command="gpg --no-verbose --import -v %f"
> set pgp_export_command="gpg --no-verbose --export --armor %r"
> set pgp_verify_key_command="gpg --no-verbose --batch --fingerprint --check-sigs %r"
> set pgp_list_pubring_command="gpg --no-verbose --batch --with-colons --list-keys %r" 
> set pgp_list_secring_command="gpg --no-verbose --batch --with-colons 
>--list-secret-keys %r" 
> set pgp_getkeys_command=""




-- 
+  Osamu Aoki <[EMAIL PROTECTED]>, GnuPG-key: 1024D/D5DE453D  +
+   Fingerprint: 814E BD64 3288 40E7 E88E  3D92 C3F8 EA94 D5DE 453D   +
+   === http://www.aokiconsulting.com ======= Cupertino, CA USA ===   +

Reply via email to