* Toby Cubitt <[email protected]> [2011-05-26 01:26]:
>> What version of gnupg and mutt are you using?
>> I have 
>> mutt-1.5.21-r1
>> gnupg-2.0.17
> 
> Sorry, I should have said:
> 
> gnupg-2.0.17
> use flags: bzip2 nls
> 
> mutt-1.5.21-r2 (but it was also working when I was using 1.5.21-r1)
> use flags: crypt doc mbox nls sidebar ssl tokyocabinet
> 
> (For the record, I also apply a bunch of extra patches to mutt, that
> aren't included in the standard ebuild. But none of them have anything to
> do with encryption, signatures, or gpg, so they're almost certainly not
> relevant here.)

Here it works also without any problems ...

mutt-9999 (berkdb crypt debug gdbm gpg imap mbox nls pop sasl smime smtp ssl 
-doc -gnutls -idn -qdbm -sidebar -tokyocabinet)

gnupg-2.0.17-r (02:44:03 AM 04/21/2011)(bzip2 nls -adns -caps -doc -ldap 
-selinux -smartcard -static -usb)

How do you implement GPG in your mutt config?

Here is how I have configured it:

a) mutt
source ~/.mutt/gpgrc

b) gnupg
# %p    The empty string when no passphrase is needed,
#       the string "PGPPASSFD=0" if one is needed.
#
#       This is mostly used in conditional % sequences.
#
# %f    Most PGP commands operate on a single file or a file
#       containing a message.  %f expands to this file's name.
#
# %s    When verifying signatures, there is another temporary file
#       containing the detached signature.  %s expands to this
#       file's name.
#
# %a    In "signing" contexts, this expands to the value of the
#       configuration variable $pgp_sign_as.  You probably need to
#       use this within a conditional % sequence.
#
# %r    In many contexts, mutt passes key IDs to pgp.  %r expands to
#       a list of key IDs.

# Note that we explicitly set the comment armor header since GnuPG, when used
# in some localiaztion environments, generates 8bit data in that header, thereby
# breaking PGP/MIME.

# decode application/pgp
set pgp_decode_command="/usr/bin/gpg --charset utf-8 --status-fd=2 
%?p?--passphrase-fd 0? --no-verbose --quiet --batch --output - %f"

# verify a pgp/mime signature
set pgp_verify_command="/usr/bin/gpg --status-fd=2 --no-verbose --quiet --batch 
--output - --verify %s %f"

# decrypt a pgp/mime attachment
set pgp_decrypt_command="/usr/bin/gpg --status-fd=2 %?p?--passphrase-fd 0? 
--no-verbose --quiet --batch --output - %f"

# create a pgp/mime signed attachment
# set pgp_sign_command="/usr/bin/gpg-2comp --comment '' --no-verbose --batch  
--output - --passphrase-fd 0 --armor --detach-sign --textmode %?a?-u %a? %f"
set pgp_sign_command="/usr/bin/gpg    --no-verbose --batch --quiet   --output - 
%?p?--passphrase-fd 0? --armor --detach-sign --textmode %?a?-u %a? %f"

# create a application/pgp signed (old-style) message
# set pgp_clearsign_command="/usr/bin/gpg-2comp --comment ''  --no-verbose 
--batch  --output - --passphrase-fd 0 --armor --textmode --clearsign %?a?-u %a? 
%f"
set pgp_clearsign_command="/usr/bin/gpg   --charset utf-8 --no-verbose --batch 
--quiet   --output - %?p?--passphrase-fd 0? --armor --textmode --clearsign 
%?a?-u %a? %f"

# create a pgp/mime encrypted attachment
# set pgp_encrypt_only_command="pgpewrap gpg-2comp  -v --batch  --output - 
--encrypt --textmode --armor --always-trust -- -r %r -- %f"
set pgp_encrypt_only_command="pgpewrap /usr/bin/gpg  --charset utf-8    --batch 
 --quiet  --no-verbose --output - --encrypt --textmode --armor --always-trust 
-- -r %r -- %f"

# create a pgp/mime encrypted and signed attachment
# set pgp_encrypt_sign_command="pgpewrap gpg-2comp  --passphrase-fd 0 -v 
--batch  --output - --encrypt --sign %?a?-u %a? --armor --always-trust -- -r %r 
-- %f"
set pgp_encrypt_sign_command="pgpewrap /usr/bin/gpg  --charset utf-8 
%?p?--passphrase-fd 0?  --batch --quiet  --no-verbose  --textmode --output - 
--encrypt --sign %?a?-u %a? --armor --always-trust -- -r %r -- %f"

# import a key into the public key ring
set pgp_import_command="/usr/bin/gpg  --no-verbose --import %f"

# export a key from the public key ring
set pgp_export_command="/usr/bin/gpg   --no-verbose --export --armor %r"

# verify a key
set pgp_verify_key_command="/usr/bin/gpg   --verbose --batch  --fingerprint 
--check-sigs %r"

# read in the public key ring
set pgp_list_pubring_command="/usr/bin/gpg   --no-verbose --batch --quiet   
--with-colons --list-keys %r" 

# read in the secret key ring
set pgp_list_secring_command="/usr/bin/gpg   --no-verbose --batch --quiet   
--with-colons --list-secret-keys %r" 

# fetch keys
#set pgp_getkeys_command="/usr/bin/gpg --recv-keys %r"
set pgp_getkeys_command=""

# pattern for good signature - may need to be adapted to locale!

# set pgp_good_sign="^gpg: Good signature from"

# OK, here's a version which uses gnupg's message catalog:
set pgp_good_sign="`gettext -d gnupg -s 'Good signature from "' | tr -d '"'`"

# This version uses --status-fd messages
# set pgp_good_sign="^\\[GNUPG:\\] GOODSIG"

Attachment: pgp8tSSDKbgYx.pgp
Description: PGP signature

Reply via email to