#3904: MS Outlook complains about invalid S/MIME signature in signed + encrypted
message
--------------------+----------------------
Reporter: cooler | Owner: mutt-dev
Type: defect | Status: new
Priority: major | Milestone:
Component: crypto | Version: 1.7.2
Keywords: patch |
--------------------+----------------------
When I use the gpgme backend and send a signed + encrypted S/MIME message
to an MS
Outlook user, the signature is reported as invalid. The signature is
reported as valid if the message is only signed but not encrypted. When I
use the
openssl backend, the signature is reported as valid in both cases.
When mutt uses the gpgme backend, <CR> is added at the end of the
lines of the message text before calculating the detached signature. When
the
message text and the detached signature are encrypted, no <CR> is added at
the
end of the lines of the message text. It appears that in case the
message is also encrypted, MS Outlook does not add <CR> before verifying
the signature.
The attached patch adds <CR> to the mail body before encrypting the
data. This solved the problem for me.
I don't know what the S/MIME standard says on this but as mutt+openssl
already adds <CR> to the mail body before encrypting wouldn't it be
consistent to do the same with mutt+gpgme?
--
Ticket URL: <https://dev.mutt.org/trac/ticket/3904>
Mutt <http://www.mutt.org/>
The Mutt mail user agent