Hello, * The Fuzzy Whirlpool Thunderstorm wrote on Fri, 18 Jul 2014, at 20:04 (+0200):
> Is there any convenient way to automatically decrypt inline pgp
> messages? Piping the text attachment to `gpg --decrypt` works,
> but I need a simpler way to do the task.
if you use procmail, you could apply the following recipes to
handle inline PGP messages at least a little bit easier. But of
course, you can't catch all curiosities automatically that some
MUA may produce. So, finally, Derek's solutions may fit better.
:0
* ! ^Content-Type:[ \t]+message/
* ! ^Content-Type:[ \t]+multipart/
* ! ^Content-Type:[ \t]+application/pgp
{
:0 f w
* B ?? ^-----BEGIN PGP MESSAGE-----
* B ?? ^-----END PGP MESSAGE-----
|formail -b -f -i 'Content-Type: application/pgp; format=text;
x-action=encrypt'
:0 f w
* B ?? ^-----BEGIN PGP SIGNED MESSAGE-----
* B ?? ^-----BEGIN PGP SIGNATURE-----
* B ?? ^-----END PGP SIGNATURE-----
|formail -b -f -i 'Content-Type: application/pgp; format=text; x-action=sign'
}
For further details see the Mutt-GnuPG-PGP-HOWTO which is quite
old now (Feb 2000) [1]. Please note also, that the current
procmail v3.22 has some issues with the B flag [2]. Therefore I
suggest using the above modified/extended recipes instead.
> Although inline pgp is deprecated, many mail user agent such as
> K9 mail is still using it.
>
> In addition to that, is there any way to compose an inline pgp
> mail using mutt?
Isn't coping with incoming inline PGP messages enough? I mean,
there is a standard for PGP/MIME, RFC 3156 [3], and it's 13 years
old. k9mail seems to still work on supporting it - also for
several years now[4].
Perhaps you may consider the other side of inline PGP [5].
Regards,
Mathias
[1] http://tldp.org/HOWTO/Mutt-GnuPG-PGP-HOWTO-8.html
[2] http://pm-doc.sourceforge.net/doc/#flags_hb_at_top_of_recipe_warning
[3] http://www.ietf.org/rfc/rfc3156.txt
[4] https://code.google.com/p/k9mail/issues/detail?id=13#c89
https://code.google.com/p/k9mail/issues/detail?id=5864#c6
[5] https://dkg.fifthhorseman.net/notes/inline-pgp-harmful
--
CAcert Assurer
Do you want to encrypt your mail? Then join CAcert and get your SSL
certificate from https://www.CAcert.org. If you have any questions,
don't hesitate to ask.
OpenPGP: ID 0x44C3983FA7629DE8 - http://www.sks-keyservers.net
Fingerprint: B100 5DC4 9686 BE64 87E9 0E22 44C3 983F A762 9DE8
pgpk_gXsmHIv5.pgp
Description: PGP signature
