Can't install GPG GPA in FreeBSD: GTK install fails if using X Windows
Bernhard Reiter
bernhard@intevation.de
Wed Jun 13 11:28:01 2001
--3uo+9/B/ebqu+fSQ
Content-Type: multipart/mixed; boundary="BOKacYhQ+x31HxR3"
Content-Disposition: inline
--BOKacYhQ+x31HxR3
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
On Tue, Jun 12, 2001 at 08:51:36PM +1200, Craig Carey wrote:
> Getting Mutt to allow Gpg to encrypt the contents of an
> outgoing e-mail message is not obvious. Can some documentation
> on that be put online?.
In the new mutt variants I remember having an example .muttrc which
actually deals with this, called gpg.rc.
I have attached the relevant part of a working .muttrc.
Bernhard
--=20
Professional Service around Free Software (intevation.net) =
=20
The FreeGIS Project (freegis.org)
Association for a Free Informational Infrastructure (ffii.org)
FSF Europe (fsfeurope.org)
--BOKacYhQ+x31HxR3
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: attachment; filename=".muttrc"
Content-Transfer-Encoding: quoted-printable
#decode attachments and encrypted mail, before applying search pattern
set thorough_search=3Dyes
# The number of seconds after which a cached passphrase will expire if
# not used.
set pgp_timeout=3D1200
# set pgp_default_version=3Dgpg
set pgp_autosign=3Dyes
set pgp_replyencrypt=3Dyes
set pgp_sign_micalg=3Dpgp-sha1
###########################################################################
# Verschl=FCsselung mit gpg, neue mutt Version 1.2.2
###########################################################################
# Aus der Beispiel gpg.rc Datei von mutt v1.2.2I
# $Id: gpg.rc,v 1.5.2.1 2000/05/23 08:15:02 roessler Exp $
#
# %p The empty string when no passphrase is needed,
# the string "PGPPASSFD=3D0" if one is needed.
#
# This is mostly used in conditional % sequences.
#
# %f Most PGP commands operate on a single file or a file
# containing a message. %f expands to this file's name.
#
# %s When verifying signatures, there is another temporary file
# containing the detached signature. %s expands to this
# file's name.
#
# %a In "signing" contexts, this expands to the value of the
# configuration variable $pgp_sign_as. You probably need to
# use this within a conditional % sequence.
#
# %r In many contexts, mutt passes key IDs to pgp. %r expands to
# a list of key IDs.
# decode application/pgp
set pgp_decode_command=3D"gpg %?p?--passphrase-fd 0? --no-verbose --batch -=
-output - %f"
# verify a pgp/mime signature
set pgp_verify_command=3D"gpg --no-verbose --batch --output - --verify %s %=
f"
# decrypt a pgp/mime attachment
set pgp_decrypt_command=3D"gpg --passphrase-fd 0 --no-verbose --batch --out=
put - %f"
# create a pgp/mime signed attachment
# set pgp_sign_command=3D"gpg-2comp --no-verbose --batch --output - --passp=
hrase-fd 0 --armor --detach-sign --textmode %?a?-u %a? %f"
set pgp_sign_command=3D"gpg --no-verbose --batch --output - --passphrase-fd=
0 --armor --detach-sign --textmode %?a?-u %a? %f"
# create a application/pgp signed (old-style) message
# set pgp_clearsign_command=3D"gpg-2comp --no-verbose --batch --output - --=
passphrase-fd 0 --armor --textmode --clearsign %?a?-u %a? %f"
set pgp_clearsign_command=3D"gpg --no-verbose --batch --output - --passphra=
se-fd 0 --armor --textmode --clearsign %?a?-u %a? %f"
# create a pgp/mime encrypted attachment
# set pgp_encrypt_only_command=3D"pgpewrap gpg-2comp -v --batch --output - =
--encrypt --textmode --armor --always-trust -- -r %r -- %f"
set pgp_encrypt_only_command=3D"pgpewrap gpg -v --batch --output - --encryp=
t --textmode --armor --always-trust -- -r %r -- %f"
# create a pgp/mime encrypted and signed attachment
# set pgp_encrypt_sign_command=3D"pgpewrap gpg-2comp --passphrase-fd 0 -v -=
-batch --output - --encrypt --sign %?a?-u %a? --armor --always-trust -- -r =
%r -- %f"
set pgp_encrypt_sign_command=3D"pgpewrap gpg --passphrase-fd 0 -v --batch -=
-output - --encrypt --sign %?a?-u %a? --armor --always-trust -- -r %r -- %f"
# import a key into the public key ring
set pgp_import_command=3D"gpg --no-verbose --import -v %f"
# export a key from the public key ring
set pgp_export_command=3D"gpg --no-verbose --export --armor %r"
# verify a key
set pgp_verify_key_command=3D"gpg --no-verbose --batch --fingerprint --chec=
k-sigs %r"
# read in the public key ring
set pgp_list_pubring_command=3D"gpg --no-verbose --batch --with-colons --li=
st-keys %r"
# read in the secret key ring
set pgp_list_secring_command=3D"gpg --no-verbose --batch --with-colons --li=
st-secret-keys %r"
# receive key from keyserver:
#set pgp_getkeys_command=3D"wrap.sh -g %r"
set pgp_getkeys_command=3D""
--BOKacYhQ+x31HxR3--
--3uo+9/B/ebqu+fSQ
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: Weitere Infos: siehe http://www.gnupg.org
iEYEARECAAYFAjsnMa4ACgkQh9ag3dpKERbKUACeNd2r8yJLxIW0leOs6MRs4m7k
rkwAoIw/fO9EXAjPuKZUKNMKMsplToD4
=ibJW
-----END PGP SIGNATURE-----
--3uo+9/B/ebqu+fSQ--