From: Kevin McCarthy Date: Fri, 9 Aug 2019 20:37:08 +0000 (-0700) Subject: Add autocrypt documentation about shared key and keyring strategies X-Git-Tag: 2019-10-25~97^2~3 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=63f57dffba8a7d1298d704b8c4942c1a9a0de1e8;p=neomutt Add autocrypt documentation about shared key and keyring strategies --- diff --git a/doc/manual.xml.head b/doc/manual.xml.head index c84ac0be4..f5dcb3baa 100644 --- a/doc/manual.xml.head +++ b/doc/manual.xml.head @@ -17626,6 +17626,65 @@ bind index D purge-message available yet, but will be added in the future. + + + Alternative Key and Keyring Strategies + + Mutt by default partitions Autocrypt from normal keyring + encryption/signing. It does this by using a separate GPG + keyring (in $autocrypt_dir) + and creating a new ECC key in that keyring for accounts. There + are good reasons for doing this by default. It keeps random + keys found inside email headers out of your normal keyring. ECC + keys are compact and better suited for email headers. Autocrypt + key selection is completely different from web of + trust key selection, based on last-seen rules as opposed + to trust and validity. It also allows Mutt to distinguish + Autocrypt encrypted emails from regular encrypted emails, and + set the mode appropriately when replying to each type of email. + + + Still, some users may want to use an existing key from their + normal keyring for Autocrypt too. There are two ways this can + be accomplished: by copying the key over to the Autocrypt + keyring, or by pointing $autocrypt_dir at your normal + keyring directory (e.g. ~/.gnupg). The first + can be done using gpg from the command line, along the lines of + gpg --export [keyid] | gpg --homedir=~/.mutt/autocrypt + --import followed by gpg --export-secret-keys + [keyid] | gpg --homedir=~/.mutt/autocrypt --import. + Once this is done, choosing (s)elect existing GPG + key during account creation will list and allow + selecting that key for the account. + + + Copying your key over has the advantage of keeping Autocrypt keys + out of your normal keyring, but there is a downside. Mutt + first tries to decrypt messages using the + Autocrypt keyring, and if that fails tries the normal keyring + second. This means all encrypted emails to that key will be + decrypted, and have signatures verified from, the Autocrypt + keyring. Keys signatures and web of trust from your normal + keyring will no longer show up in signatures when decrypting. + + + Pointing $autocrypt_dir to + ~/.gnupg allows Autocrypt header keys to be + imported there, but also allows web of trust to show + an appropriate signature message for verified messages. + + + Both methods have one additional caveat: replying to an + Autocrypt decrypted message by default forces Autocrypt mode on. + By sharing the same key, all replies will then start in + Autocrypt mode, even if the message wasn't sent by one of your + Autocrypt peers. $autocrypt_reply can be + unset to allow manual control of the mode + when replying. + +