* Bastian <bastian-muttu...@t6l.de>:

> Try ^K, which is the default keybind for `extract-keys`.
> This command extracts the public key and adds is to your keyring 
> (smime_keys).

Yes, but this only displays precious little info.

Enter label: Found 1 certificate chains
Processing chain: subject=C = DE, ST = Berlin, L = Berlin, O = Charite- 
Universitaetsmedizin Berlin, SN = Lastname, GN = Firstname, CN = Firstname 
Lastname

Certificate: /home/hildeb-adm/.smime/certificates/6ab64010.0 already installed.
==> about to verify certificate of b43f1e2c.0

/home/hildeb-adm/.smime/certificates/b43f1e2c.0: OK

==> checking purpose flags for b43f1e2c.0
S/MIME signing : Yes
S/MIME encryption : Yes

certificate b43f1e2c.0 (foo) for firstname.lastn...@charite.de added.

But what *IS* "b43f1e2c"? Is it a serial number, a part of the fingerprint?

> Also check the config options `crypt_verify_sig`, and 
> `smime_verify_command`, `smime_verify_opaque_command`

I'll have a look at those.

> When receiving a smime signed mail, mutt tells me if the signature is 
> valid or not.

Well yes, but in some cases (please don't ask) my moron users have
more than one valid certifcate in use and I'd like to know which one
that is (because they don't know).

-- 
Ralf Hildebrandt
  Geschäftsbereich IT | Abteilung Netzwerk
  Charité - Universitätsmedizin Berlin
  Campus Benjamin Franklin
  Hindenburgdamm 30 | D-12203 Berlin
  Tel. +49 30 450 570 155 | Fax: +49 30 450 570 962
  ralf.hildebra...@charite.de | https://www.charite.de
            

Reply via email to