From: Kevin McCarthy Date: Fri, 9 Aug 2019 03:49:32 +0000 (-0700) Subject: Minor autocrypt manual section updates. X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=38f066698b4e9e35a0941f71b645aabd500d1fc2;p=mutt Minor autocrypt manual section updates. Mention key selection during account creation and $autocrypt_reply for controlling autocrypt mode setting during replies. --- diff --git a/doc/manual.xml.head b/doc/manual.xml.head index dd94d2eb..7896e5fb 100644 --- a/doc/manual.xml.head +++ b/doc/manual.xml.head @@ -9584,8 +9584,8 @@ please have a look at the mixmaster documentation. Mutt can be compiled with Autocrypt support by running - configure with the - --enable-autocrypt flag. Autocrypt provides + configure with the + --enable-autocrypt flag. Autocrypt provides easy to use, passive protection against data collection. Keys are distributed via an Autocrypt: header added to emails. It does not protect against active @@ -9614,8 +9614,8 @@ please have a look at the mixmaster documentation. It is highly recommended Mutt be configured - --with-idn or - --with-idn2 so that Autocrypt can properly + --with-idn or + --with-idn2 so that Autocrypt can properly deal with international domain names. @@ -9650,11 +9650,11 @@ please have a look at the mixmaster documentation. differently from your GnuPG keyring directory (e.g. ~/.gnupg). Keys are automatically imported into the keyring from Autocrypt: - headers. Compared to standard WOT keys, Autocrypt keys are - somewhat ephemeral, and the autocrypt database is used to track - when keys change or fall out of use. Having these keys mixed in - with your normal keyring will make it more difficult to use - features such as web of trust keys, + Autocrypt keys are somewhat ephemeral, and the autocrypt + database is used to track when keys change or fall out of use. + Having these keys mixed in with your normal keyring will make it + more difficult to use features such as $crypt_opportunistic_encrypt and Autocrypt at the same time. @@ -9676,9 +9676,13 @@ please have a look at the mixmaster documentation. function in the index, by default bound to A. - Creating an account requires specifying an email address, and - then deciding whether this address should prefer encryption or - not. Autocrypt 1.1 allows automatically enabling encryption if + Account creation will first ask you for an email address. Next, + it will ask whether you want to create a new key or select an + existing key. (Note key selection takes place from the $autocrypt_dir keyring, which + will normally be empty during first run). Finally, it will ask + whether this address should prefer encryption or not. Autocrypt + 1.1 allows automatically enabling encryption if both sender and receiver have set prefer encryption. Otherwise, you will need to manually enable autocrypt encryption in the compose menu. For @@ -9781,14 +9785,18 @@ please have a look at the mixmaster documentation. either of these are chosen, the field will remain in that state despite what the Recommendation: field shows. Lastly, (a)utomatic will set the value based - on the recommendataion engine's output. + on the recommendation engine's output. Autocrypt encryption defers to normal encryption or signing. Anything that enables normal encryption or - signing will cause autocrypt encryption to turn off. The only exception is - when replying to an autocrypt-encrypted email. In those cases, autocrypt - will override settings + signing will cause autocrypt encryption to turn off. The only + exception is when replying to an autocrypt-encrypted email + (i.e. an email decrypted from the $autocrypt_dir keyring). Then, + if $autocrypt_reply is + set, autocrypt mode will be forced on, + overriding the settings $crypt_autosign, $crypt_autoencrypt, $crypt_replyencrypt,