Advertisement
Guest User

Untitled

a guest
Oct 28th, 2009
392
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.89 KB | None | 0 0
  1. # PGP command formats for PGP 5.
  2. # #
  3. # # $Id: pgp5.rc,v 3.0 2002/01/24 12:11:17 roessler Exp $
  4. # #
  5. #
  6. # # decode application/pgp
  7. set pgp_decode_command="%?p?PGPPASSFD=0; export PGPPASSFD;? cat %?p?-? %f | pgpv +language=mutt +verbose=0 +batchmode -f --OutputInformationFD=0"
  8. #
  9. # # verify a pgp/mime signature
  10. set pgp_verify_command="pgpv +language=mutt +verbose=0 +batchmode --OutputInformationFD=1 %f %s"
  11. #
  12. # # string that the verify command outputs if the signature is good
  13. set pgp_good_sign = "Good signature"
  14. #
  15. # # decrypt a pgp/mime attachment
  16. set pgp_decrypt_command="PGPPASSFD=0; export PGPPASSFD; cat - %f | pgpv +language=mutt +verbose=0 +batchmode --OutputInformationFD=2 -f"
  17. #
  18. # # create a pgp/mime signed attachment
  19. set pgp_sign_command="PGPPASSFD=0; export PGPPASSFD; cat - %f | pgps +language=mutt +verbose=0 +batchmode -abft %?a? -u %a?"
  20. #
  21. # # create a pgp/mime encrypted attachment
  22. set pgp_encrypt_only_command="pgpewrap pgpe +language=mutt +verbose=0 +batchmode +nobatchinvalidkeys=off -aft -- -r %r < %f"
  23. #
  24. # # create a pgp/mime encrypted and signed attachment
  25. set pgp_encrypt_sign_command="PGPPASSFD=0; export PGPPASSFD; cat - %f | pgpewrap pgpe +language=mutt +verbose=0 +batchmode +nobatchinvalidkeys=off -afts %?a? -u %a? -- -r %r"
  26. #
  27. # # import a key into the public key ring
  28. set pgp_import_command="pgpk -a +language=mutt --OutputInformationFD=1 %f"
  29. #
  30. # # export a key from the public key ring
  31. set pgp_export_command="pgpk -xa +language=mutt --OutputInformationFD=1 %r"
  32. #
  33. # # verify a key
  34. set pgp_verify_key_command="pgpk -c +batchmode +language=mutt --OutputInformationFD=1 %r"
  35. #
  36. # # read in the public key ring
  37. set pgp_list_pubring_command="pgpring -5 %r"
  38. #
  39. # # read in the secret key ring
  40. set pgp_list_secring_command="pgpring -5 -s %r"
  41.  
  42.  
  43. #
  44. ## PGP
  45. ##
  46. #
  47. unset fcc_clear # encrypt Fcc of PGP encrypted messages?
  48. set crypt_autosign=yes # pgp/smime sign every outgoing mail. (send-hook?)
  49. unset crypt_autoencrypt # pgp/smime encrypt every outgoing mail. (send-hook?)
  50. set crypt_autopgp=yes # pgp encryption/sign of messages
  51. #set crypt_autosmime # S/MIME encrypt/sign of messages
  52. set crypt_replyencrypt=yes # Encrypt replies on encrypted mail
  53. set crypt_replysign=yes # Sign replies on signed mail
  54. #set crypt_replysignencrypted # Sign replies on encrypted mail
  55. set crypt_timestamp=yes # include timestamp in pgp/smime output (antispoof)
  56. set crypt_verify_sig=yes # ask whether I want to check a pgp signature
  57. #
  58. #
  59. ##
  60. ## PGP:
  61. ##
  62. #
  63. set pgp_autosign=yes
  64. unset pgp_autoencrypt
  65. set pgp_replysign
  66. set pgp_replyencrypt=yes
  67. set pgp_verify_sig=yes
  68. # set pgp_sign_micalg=<some> # pgp-mda5 (to RSA keys), pgp-sha1 (to DSS (DSA) keys), pgp-rmd160
  69. set pgp_check_exit # check return value of PGP process
  70. set pgp_create_traditional=no # Use old-style PGP? (don't do it!)
  71. set pgp_ignore_subkeys # On OpenPGP keys only show the main key, not the sub.
  72. unset pgp_long_ids # display 64bit PGP key-ids (don't change this!)
  73. unset pgp_retainable_sigs # disable retainable signatures.
  74. set pgp_show_unusable # show unusable PGP keys in menu
  75. set pgp_strict_enc # allway use QP enc. with PGP.
  76. set pgp_timeout=7200 # forget PGP passphrase after 7200 seconds (=2 hours)
  77. #
  78. ## use my DSA key as default:
  79. set pgp_sign_as="0x93A78266" # UserID/KeyID for signing
  80. #
  81. ##source ~/.mutt/pgp2.rc
  82. #source ~/.mutt/gpg.rc # Start up with GnuPG by default
  83. #
  84. ## %n = number %k = key id %K = key id of the principal key
  85. ## %u = user id %a = algorithm %A = algorithm of the princ. key
  86. ## %l = length %L = length of the princ. key
  87. ## %f = flags %F = flags of the princ. key
  88. ## %c = capabilities %C = capabilities of the princ. key
  89. ## %t = trust/validity of the key-uid association
  90. ##set pgp_entry_format="%4n %t%f %4l/0x%k %-4a %2c %u"
  91. set pgp_entry_format="%4n %t%f %[%y/%m/%d] %4l/0x%k %-4a %2c %u"
  92. #
  93. ##
  94. ## Sorting of PGP keys:
  95. ## (address, keyid, date, trust) and reverse-*
  96. ##
  97. set pgp_sort_keys=trust
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement