Re: [Enigmail] gpg / Enigmail behavior after disabling Gnome Keyring

2014-12-15 Thread Daniel Kahn Gillmor
On 12/14/2014 05:45 PM, Ian Mann wrote:
> On 15/12/14 08:36, outa wrote:
>> I recently upgraded to Kubuntu 14.10. Since then gpg started to show that 
>> warning message about Gnome Keyring hijacking it. So I disabled Gnome 
>> Keyring and switched to gpg-agent again, like before. However, each time I 
>> decrypt an email now, gpg asks for my passphrase (apprently not caching it), 
>> and each time I want to sign an email, it asks for a passphrase twice. 
>> Basically like described here: 
>> http://comments.gmane.org/gmane.comp.mozilla.enigmail.general/19022
>>
>> This is odd and a bit annoying. Using gpg directly on the command line to 
>> sign a message results in only one passphrase prompt though.
>>
>> Has anyone experienced the same problem and could point me to a solution? 
>> Thanks a lot.

> I had to uncheck PGP/Mime under settings, Open PGP Security.


the PGP/MIME setting should have no bearing on gnupg prompting for a
password more than once.

outa, can you say what versions of software (gnupg, gpg-agent, and
enigmail) you're using?

  gpg --version
  gpg-agent --version

and the text from the top part of "About Enigmail" in thunderbird

also, can you show the output of:

 grep use-agent ~/.gnupg/gpg.conf
 cat ~/.gnupg/gpg-agent.conf
 echo $GPG_AGENT_INFO

?

the information above should help us figure out what's going on on your
system and maybe we can find a fix.

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] Enigmail does not respect per-email encryption/signing settings

2014-11-21 Thread Daniel Kahn Gillmor
Hi Michael--

On 11/21/2014 11:54 AM, Michael Carbone wrote:
> I draft an email to a recipient whose public key I have. I have signing,
> encryption, and PGP/MIME on by default. I proactively turn off
> encryption and/or signing, which is verified in the visual cues in the
> Compose window as well as the Enigmail menu in the Compose window.

I take it you mean that the menu items say "Force not to sign" and
"Force not to encrypt" and the icons in the bottom right of the compose
window have a blue circled exclamation point around them (tooltips
"Message will not be signed" and "Message will not be encrypted")

> However when I select Send, the confirmation dialog tells me that the
> email will be sent encrypted and signed, overriding my very clear
> instructions with this particular email to be unencrypted/unsigned.

Which confirmation dialog are you talking about?  I actually don't get
such a confirmation dialog, though  maybe i've turned it off somewhere.
 can you show the exact text of the dialog?

> And
> the subsequent email is indeed signed & encrypted, even though I have
> explicitly set that particular email to be not.

that's bad!

> I thought the issue might be in Enigmail Preferences --> Sending with
> the option Automatically Send Encrypted, as the language of the tooltip
> suggests that only a per-recipient rule can override the setting, versus
> manually override. However I changed it from If Possible to Never and
> run into the same issue.

What are your PGP/MIME settings for this account?  If you're OK with
sharing config details privately, can you send me the output of:

 egrep -i 'pgp|enigmail' .thunderbird/*.default/prefs.js

(replace .thunderbird with .icedove if you're using debian's unbranded
version).

Does this happen with every contact whose keys you have?  (feel free to
experiment by sending me private mails as well, if you like)

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] difference in output between 1.4.x and 2.0.x when agent fails to sign -- causes enigmail to send broken messages

2014-11-10 Thread Daniel Kahn Gillmor
On 11/10/2014 11:51 AM, Ludwig Hügelschäfer wrote:
> On 10.11.14 22:46, Daniel Kahn Gillmor wrote:
> 
>> I'm not seeing either of these alerts when sending
>> encrypted+signed messages with PGP/MIME using enigmail 1.7.2 and
>> gnupg 2.1.0 on debian GNU/Linux, x86_64 (amd64) platform.
> 
>> Are you sure you're doing encrypted+signed?  are you also doing
>> PGP/MIME?
> 
> Yep.
> 
>> Maybe there's a version/platform difference here?  what are you
>> using?
> 
> This is on Mac OS 10.10, TB31.2 and the latest enigmail nightly. I
> didn't use 1.7.2

What version of GnuPG are you using?

Can you try with enigmail 1.7.2?  I'd like to know if this is a bug due
to the choice of platform (i.e. if we need to do something different on
Linux than on Mac).

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] difference in output between 1.4.x and 2.0.x when agent fails to sign -- causes enigmail to send broken messages

2014-11-10 Thread Daniel Kahn Gillmor
Thanks for the prompt response, Ludwig!

On 11/10/2014 11:25 AM, Ludwig Hügelschäfer wrote:
> On 10.11.14 21:52, Daniel Kahn Gillmor wrote:
>> * enigmail probably should detect that its invocation of gpg
>> returns a non-zero error code and raise an error in the message
>> creation step. I note that it appears to do so properly for when
>> generating non-encrypted PGP/MIME-signed messages, it's just
>> failing at PGP/MIME encrypted+signed messages.
> 
> How exactly does this misbehaviour express to the user? I'm not
> getting a falsely sent mail or a misleading error message.
> 
> First Alert:
>   Error - encryption command failed
> 
> Second Alert:
>   Sending of message failed.
>   Please verify that your Mail & Newsgroups account settings are
>   correct and try again.

I'm not seeing either of these alerts when sending encrypted+signed
messages with PGP/MIME using enigmail 1.7.2 and gnupg 2.1.0 on debian
GNU/Linux, x86_64 (amd64) platform.

Are you sure you're doing encrypted+signed?  are you also doing PGP/MIME?

Maybe there's a version/platform difference here?  what are you using?

Regards,

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


[Enigmail] difference in output between 1.4.x and 2.0.x when agent fails to sign -- causes enigmail to send broken messages

2014-11-10 Thread Daniel Kahn Gillmor
When creating a signed message (whether encrypted or not), if gpg-agent
fails to sign the message, gpg 2.1.0 emits the first part of the
message, but then terminates with a non-zero error code.

gpg 1.4.x (and i think 2.0.x, but haven't tested today) both terminate
with a non-zero error code but produce no output on stdout.

This change in behavior causes problems with enigmail in particular,
which appears to send the truncated results when producing a PGP/MIME
encrypted+signed message if the agent fails to sign.

I believe this is two distinct issues, and maybe we want to address them
both:

 * gnupg 2.1.x might want to buffer data before the signature is made,
   and decline to emit anything if the signature fails

 * enigmail probably should detect that its invocation of gpg returns a
   non-zero error code and raise an error in the message creation step.
   I note that it appears to do so properly for when generating non-encrypted
   PGP/MIME-signed messages, it's just failing at PGP/MIME
   encrypted+signed messages.

Below is a transcript showing the different behaviors between 1.4.18
(with --use-agent) and 2.1.0 when the agent fails to produce a
signature.

Regards,

   --dkg

0 dkg@alice:~$ gpg --version
gpg (GnuPG) 1.4.18
Copyright (C) 2014 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.

Home: ~/.gnupg
Supported algorithms:
Pubkey: RSA, RSA-E, RSA-S, ELG-E, DSA
Cipher: IDEA, 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH,
CAMELLIA128, CAMELLIA192, CAMELLIA256
Hash: MD5, SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224
Compression: Uncompressed, ZIP, ZLIB, BZIP2
0 dkg@alice:~$ gpg2 --version
gpg (GnuPG) 2.1.0
libgcrypt 1.6.2
Copyright (C) 2014 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.

Home: ~/.gnupg
Supported algorithms:
Pubkey: RSA, ELG, DSA, ECDH, ECDSA, EDDSA
Cipher: IDEA, 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH,
CAMELLIA128, CAMELLIA192, CAMELLIA256
Hash: SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224
Compression: Uncompressed, ZIP, ZLIB, BZIP2
0 dkg@alice:~$ gpgconf --kill gpg-agent
0 dkg@alice:~$ gpgconf --launch gpg-agent
0 dkg@alice:~$ echo test | gpg --clearsign 

You need a passphrase to unlock the secret key for
user: "Daniel Kahn Gillmor "
4096-bit RSA key, ID 0xA52401B11BFDFA5C, created 2013-03-12
 (subkey on main key ID 0xCCD2ED94D21739E9)

gpg: cancelled by user
gpg: no default secret key: bad passphrase
gpg: [stdin]: clearsign failed: bad passphrase
2 dkg@alice:~$ echo test | gpg2 --clearsign 
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

test
gpg: signing failed: Operation cancelled
gpg: [stdin]: clearsign failed: Operation cancelled
2 dkg@alice:~$ echo test | gpg2 --sign --encrypt --armor -r $PGPID 
gpg: signing failed: Operation cancelled
-BEGIN PGP MESSAGE-
Version: GnuPG v2

hQIMA8Yb0+whSEz/ARAAnJCOUKoXQu0T0JCX3VmHzGW0HL5kvoZgrzYNzqfl2+0k
HxKxZzic6sOuiXQ7GcZ6v6OuZy79brPU4vnpzy5DeeaVBE/6UKGhLVRQbaqFD74t
PBVnwRdVKY7MHLeOn3H5H/CJRAqwXfYPBPTLEVb4HoJxtwR8GQcToqXTme42OHkd
Vttfg6tUbfzwaqGuUHLVH12JP1g5Usq1RzhSbdrPBdB5bs4RNFkXYSW4hL2BWbvX
ZoujMTXC+JwQJh5Edjav79rPXpCNuXZr6QS05FaDOfmDYRCSv+t1F1Yh0dIXwXcd
h+TwJFGP27T/d2mE3o2uA1P1iZOh1V5czcNa2EwsE/My4/ou3kvSHMt8QhNIBJvB
qENaQWM0hZKmPzlItc/J1oQW4BHvoOz5qNJxfxDw6aZrL7qP5+vgXD24JpR2DHzd
8/fi2QHsVnA7upMtfzaZ3x1jwbYxgM+/A3N8PdsKbyXu4SQwcvTmbRKgMx0L8DOJ
hgsM/LrpuEJvpYAU7YSy2h5jANlNebhjGwfCDDmyR97BjXMcVt6BuJOS6JjN5plS
RF6vrvdUD0NpJsPUkyVGD7RP6ofOScQ7oD8UfpegOldpK89U/3yJfk7yw2AYA0AI
FZicmDyzWb/aKFbHzIMCi14u3x8BPSANfqnWv+/5yDsGkrydLWRMZeaeDZ9mgpg: [stdin]: 
sign+encrypt failed: Operation cancelled
2 dkg@alice:~$ echo test | gpg --sign --encrypt --armor -r $PGPID 

You need a passphrase to unlock the secret key for
user: "Daniel Kahn Gillmor "
4096-bit RSA key, ID 0xA52401B11BFDFA5C, created 2013-03-12
 (subkey on main key ID 0xCCD2ED94D21739E9)

gpg: cancelled by user
gpg: no default secret key: bad passphrase
gpg: [stdin]: sign+encrypt failed: bad passphrase
2 dkg@alice:~$ 


signature.asc
Description: PGP signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] GnuPG 2.1.0

2014-11-06 Thread Daniel Kahn Gillmor
On 11/06/2014 06:11 AM, Bob Henson wrote:
> I hear this morning that there is a new GnuPG 2.1.0 version which is
> quite different from the 2.0.x versions. Will Enigmail continue to work
> with this new version?

Yes, i've been running enigmail 1.7.2 with the series of GnuPG 2.1.0
betas for over a month now.  I don't expect that the official release
version of 2.1.0 will cause a regression with respect to enigmail
functionality.

Note: I run debian testing/unstable, using the gnupg 2.1.0 packages from
experimental (which i plan to update to the released version later today).

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] enigmal wrongly shows valid signature when an pgp/mime signed mail is attached

2014-11-04 Thread Daniel Kahn Gillmor
On 11/04/2014 11:39 AM, Daniel Kahn Gillmor wrote:
> On 11/04/2014 10:58 AM, HW42 wrote:
>> When an correctly PGP/MIME signed email is attached to an unsigned
>> email enigmail wrongly verifies the attached mail and not the real mail.
> 
> 
> yes, this is a problem, and was noted on this list back in march of 2013 :(

I've reported this as a bug now so that it doesn't get lost again:

https://sourceforge.net/p/enigmail/bugs/362/

I consider it a pretty serious flaw in enigmail's message verification.

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] enigmal wrongly shows valid signature when an pgp/mime signed mail is attached

2014-11-04 Thread Daniel Kahn Gillmor
On 11/04/2014 10:58 AM, HW42 wrote:
> [I'm reporting this here and not on the bug tracker since I don't want
>  to agree to a few pages TOS for reporting a bug (sf account required)]
> 
> When an correctly PGP/MIME signed email is attached to an unsigned
> email enigmail wrongly verifies the attached mail and not the real mail.


yes, this is a problem, and was noted on this list back in march of 2013 :(

http://thread.gmane.org/gmane.comp.mozilla.enigmail.general/17707/focus=17839

The best proposed fix i've seen was from Eduard Christian Dumitrescu:

http://thread.gmane.org/gmane.comp.mozilla.enigmail.general/17707/focus=17924

but i don't think anyone has implemented it.
> 
> This is critical since this allows an attacker to write mails which
> looks to the receiver as if they were singed correctly by another
> person (If the attacker has access to one correctly singed PGP/MIME
> mail from the person she wants to imitate).
> 
> Steps to reproduce:
> 
> - Write a PGP/MIME singed mail (use a subject without spaces).
> - Forward the received mail as attachment and add some text. Don't sign
>   or encrypt the forwarded mail. You can add arbitrary text here.
> - Open the forwarded mail.


> In the last step enigmail shows the security info for the attached mail
> and not for the content of the mail. Therefore you get a correctly
> signed by ... message instead of the info that the content was unsigned.
> 
> Tested with enigmail version 1.7.2 and thunderbird 31.2.0 (both the
> debian as well as the archlinux versions are affected so that is
> probably not distribution specific).

agreed, i can confirm that this is also the case with enigmail 1.7.2 and
icedove 33.0~b1

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] Checking for keys in the compose windows

2014-10-10 Thread Daniel Kahn Gillmor
On 10/10/2014 09:50 AM, Tobias Hahn wrote:

> Am 08.10.2014 um 17:27 schrieb Patrick Brunschwig:
>> If you use the "convenient" composition mode (which means that
>> emails are automatically encrypted if the keys for all recipients
>> are found), then it's easy to determine if you got all keys: the
>> key icon in the lower right corner is yellow if all keys are
>> available and grey otherwise.
> I'm using the convenient encryption mode, but had never noticed that
> the icon changes colors depending on key availability.


the color change is subtle (maybe too subtle?  should we have visually
distinct icons, like a lock or a lock with a circle/slash through it?)

But i think it's also buggy (see the thread at [0]).

I've just opened a bug report about it [1] so that the problem is
tracked.  Sorry to have not done that earlier, i thought i had.

All the best,

--dkg

[0] http://thread.gmane.org/gmane.comp.mozilla.enigmail.general/18884
[1] https://sourceforge.net/p/enigmail/bugs/347/



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] problems with auto-encrypt

2014-10-10 Thread Daniel Kahn Gillmor
On Sat 2014-07-12 13:09:35 -0400, Patrick Brunschwig wrote:
> On 09.07.14 00:10, Daniel Kahn Gillmor wrote:
>> i am seeing the following misbehavior with the 1.7 beta i packaged
>> from yesterday (i have "convenient encryption" set as the
>> default):
>> 
>> When i reply to a message from someone for whom i have a key, more
>> often than not, the default leaves the message unencrypted.
>> 
>> When i send a new message to that person, or when i shift-tab up to
>> the address bar and then tab back down to the subject entry box,
>> the message becomes encrypted again.
>
> I can reproduce this. It is "just" a display problem. The logic works
> correctly when sending the message, but the menu and the icons in the
> lower right corner are incorrect.

I'm still seeing this behavior in 1.7.2.  It's pretty worrisome that
these indicators aren't correct (in either direction -- though being
incorrect in the other direction is unarguably worse).

Has this issue been fixed since 1.7.2?

--dkg


pgpHMBYa4HjTd.pgp
Description: PGP signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] Annoying Focus glitch

2014-09-15 Thread Daniel Kahn Gillmor
On 09/15/2014 06:33 AM, James Tandy wrote:
> Alt-tab'ing to the window is not an option, as this popup window appears at 
> the very end of the window list, nowhere
> near the thunderbird compose window. (Most irritating when you have like 15 
> programs running)

this isn't a fix at all, but a workaround to the specific problem you
describe here:

Alt+Shift+Tab cycles in the opposite direction from Alt+Tab, so it
should be quick to get to the window from the keyboard.

(note: i have not tested this with windows 8, but i know that it worked
for every version of Windows i've ever used, and i assume it works for
win8 as well)

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] importing keys in a message leaves wrong modification in resulting message

2014-09-08 Thread Daniel Kahn Gillmor
On 09/08/2014 02:05 PM, Olav Seyfarth wrote:

> would you please open a minor bug for this issue?

sure, here you go:

 https://sourceforge.net/p/enigmail/bugs/330/

Thanks,

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


[Enigmail] importing keys in a message leaves wrong modification in resulting message

2014-09-08 Thread Daniel Kahn Gillmor
i have a text/plain message, which has at the bottom of it an OpenPGP
key block ("-BEGIN PGP PUBLIC KEY BLOCK-", etc).

I have enigmail set to not decrypt or otherwise process text/plain
messages by default.

if i click "Decrypt" when viewing this message, I get a dialog asking:

 
  Import public key(s) embedded in message?
[Cancel] [Import]
 

If i click "Import", then i get a dialog box telling me details about
what was imported, and my view of the message gets modified: the key
block is removed, and in its place are a few lins of text that look like
this:

--
* *BEGIN ENCRYPTED or SIGNED PART* *



** *END ENCRYPTED or SIGNED PART* **
--

Also, at the top of the message, i see:

--
Enigmail: *Parts of the message have NOT been signed or encrypted*
--

But in fact *none* of the message has been signed or encrypted, there
was just a free-floating keyblock.

I (think i) understand what's happening behind the scenes, but the
signals to the user are actually misleading here.

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] case sensitivity in domain part of e-mail address matching

2014-09-04 Thread Daniel Kahn Gillmor
On 09/04/2014 03:43 PM, Olav Seyfarth wrote:

> When you're logged in to SourceForge you should see a dark gray header bar on
> https://sourceforge.net/p/enigmail/bugs/ - in its right, there's a mail icon.
> "Subscribe" there.

Thanks, Olav.  I had missed that setting, as the mail icon didn't render
in my browser for some reason.

Regards,

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] case sensitivity in domain part of e-mail address matching

2014-09-04 Thread Daniel Kahn Gillmor
On 09/04/2014 02:22 PM, Doug Barton wrote:
> On 9/4/14 11:14 AM, Daniel Kahn Gillmor wrote:
> | I think opportunistic mode is matching based on case-sensitive
> | e-mail addresses; while this is arguably appropriate for the
> | local-part of the e-mail address
> 
> The bug has already been identified and logged. :)

I think you're talking about

 https://sourceforge.net/p/enigmail/bugs/323/

Is there any way that i can subscribe to the bug reports coming through
that interface?  I can't seem to find it, and i'm not always online when
i'm finding these bugs.  if they were in my local mail store, it would
be a lot easier for me to make sure i'm not duplicating things.

> And FYI, no, it's not appropriate to be case sensitive about either
> part of the address.

According to the RFCs, this is incorrect, and the local part is entirel
up to the whims of the domain operator.

But i agree with you that anyone running a mailserver where the local
parts are case-sensitive on today's network is just asking for trouble.
 So i am quite happy to have the entire match be case-insensitive.

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


[Enigmail] case sensitivity in domain part of e-mail address matching

2014-09-04 Thread Daniel Kahn Gillmor
I think opportunistic mode is matching based on case-sensitive e-mail
addresses; while this is arguably appropriate for the local-part of the
e-mail address, the domain part should be matched in a case-insensitive
fashion.

For example:

I'm using enigmail 1.7.2, with "convenient" opportunistic mode enabled.

I have a key for Alice 

I go to compose mail to her, and for whatever reason, i write
al...@example.net in the address bar.

the e-mail will not be encrypted, despite the fact that all network
resolution will treat the two e-mail addresses as identical.

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


[Enigmail] encrypting drafts without a keyID

2014-08-08 Thread Daniel Kahn Gillmor
hi enigmail folks--

reading the commentary in:

 https://sourceforge.net/p/enigmail/bugs/144/#665e

suggests that the engimail preference to save drafts in encrypted form
will only work if a keyID is set for the account preferences.

Is this still the case?

If so, i find it surprising that the preferences dialog box doesn't
disable that checkbox when the radio button switches to "Use email
address of this identity to select OpenPGP key".

should i report this on the bugtracker, or reopen #144?  If so, do you
see it a bug in the dialog box UI, or is it a bug in the implementation?
 shouldn't we be able to use the same selection mechanisms to choose the
key, and then just throw a warning if it can't find a selected key to
encrypt each draft to.

Regards,

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] overeager key user ID matching

2014-07-26 Thread Daniel Kahn Gillmor
On 07/25/2014 11:16 AM, King Ables wrote:
> Of course, this only works on addresses already in your address book.
> But it would give you an easy way to manually check an address before
> using it.

sure, but i already have an easy way to manually check an address before
using it:

 gpg --list-keys al...@example.org

the goal here is simplicity and ease-of-use -- the necessity of a
workaround *is* the bug.

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] overeager key user ID matching

2014-07-23 Thread Daniel Kahn Gillmor
On 07/23/2014 04:03 AM, Olav Seyfarth wrote:
> Could you please open a bug report for that? 

sure, done:

  https://sourceforge.net/p/enigmail/bugs/288/

> As a temporary workaround, please
> use per receipient rules for those adresses that are matched falsely.

The trouble is that i don't know which user IDs are likely to trigger
this before i send mail.

Even if i could rely on the key icon in the compose window to correctly
indicate whether the message will be encrypted or not, without being
able to see the selected key at send time i can't tell whether this is
going to be a problem.

Once i discover a given problem, i can set a per-recipient rule, but
that'll only happen after i annoy my correspondent at least once
(assuming they let me know, rather than just deleting the
incomprehensible e-mail).

:(

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


[Enigmail] overeager key user ID matching

2014-07-21 Thread Daniel Kahn Gillmor
hi enigmail folks--

Enigmail 1.7 is choosing the wrong key in some cases due to overeager
matching on the user ID.  When matching for e-mail addresses, it needs
to make an *exact* match on the e-mail address, meaning that it is
either the entire User ID ("al...@example.com"), or that it is enclosed
in angle brackets ("alice ").

At the moment, if i have Alice's key, but i'm writing to the people
responsible for solid water at Example Corp (e-mail address
"i...@example.com" -- they don't have a key of their own) then enigmail
in "convenient mode" will happily encrypt to Alice's key, i think
because it found the string "i...@example.com" in her User ID.
I actually ran into this because i wrote to a friend j...@example.org
(who has no key that i know of), and my keyring knows of a
sarahj...@example.org, and Jane received an undecryptable message from
me. :(

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] Finding public keys

2014-07-15 Thread Daniel Kahn Gillmor
On 07/15/2014 03:00 PM, Otto de Voogd wrote:
> Actually, I'd like Enigmail to either show clearly that a key is revoked
> (as one would see when querying the keyserver), or not show revoked keys
> at all.

The keyservers do not check whether the revocation is cryptographically
correct, so their "(revoked)" is merely advisory.  Even if they did
check the cryptographic validity, you probably don't want to rely on
them doing the check correctly (that is, the local client should verify
the revocation anyway).

I agree that the standard operation should be simpler from what the end
user sees, but that doesn't mean that we should just believe the
response from the keyserver directly.

It may mean that we need to fetch more data and do some local processing
on it before providing more UI, though.

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] unable to disable "Automatically Decrypt messages"

2014-07-15 Thread Daniel Kahn Gillmor
On 07/15/2014 01:50 PM, Doug Barton wrote:

> For example, it's a fact that inline signatures work better with a wide
> variety of software (MTAs, mailing lists, etc.). That's the chief "pro"
> in terms of using inline.
> 
> The chief "con" is that for people who receive the message who are not
> using PGP it's "ugly" (which is to say that people sometimes do complain
> about the "weird" stuff that is in your message).

I'm frustrated to have to do this, but i do not think this is an
accurate summary of the situation.

MTAs are at least as likely to break inline message signatures as
PGP/MIME-signed messages, and there are several other arguments against
Inline PGP that i think are more important than things looking "ugly".
I've documented some of them here:

  https://dkg.fifthhorseman.net/notes/inline-pgp-harmful/

In fairness, i think the chief argument in favor of emitting inline PGP
signatures is that there are apparently a few broken MUAs out there
(apparently, some versions of android mail client and whatever windows
offers as a free MUA) that don't know how to display a PGP/MIME-signed
message properly, and fixing those clients is out of scope for this list.

This will be my last message on this thread.

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] unable to disable "Automatically Decrypt messages"

2014-07-15 Thread Daniel Kahn Gillmor
On 07/15/2014 01:23 PM, Martin Vegter wrote:
> What is the recommendation, then?
> Should inline-PGP be used preferably, when sending plain messages
> (without attachments) ?

that's for your correspondents to decide, and not something you have
control over there are much better arguments (in both directions) about
whether to use PGP/MIME or inline-PGP than the argument that one or the
other interacts differently with enigmail's "automatically decrypt" setting.

This list has hosted several epic flamewars on the inline-pgp vs
pgp/mime question over the years, it's probably not a great idea to
start another one.

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] kmail encrypted/signed message unverifiable in enigmail

2014-07-11 Thread Daniel Kahn Gillmor
On 07/11/2014 11:43 AM, Daniel Kahn Gillmor wrote:
> But i do see a signed tag enigmail-1-7 in the git repo from 2 days ago.
>  I'll go ahead and package that for debian :)  Should i be looking
> elsewhere for release announcements?

hm.  that signed tag for enigmail 1.7 contains a ./configure and
configure.ac that seems to indicate that the version is enigmail 1.6.

Attached is a patch that should fix this.

hth,

--dkg
--- a/configure
+++ b/configure
@@ -1,6 +1,6 @@
 #! /bin/sh
 # Guess values for system-dependent variables and create Makefiles.
-# Generated by GNU Autoconf 2.65 for enigmail 1.6.
+# Generated by GNU Autoconf 2.65 for enigmail 1.7.
 #
 # Report bugs to <https://www.enigmail.net>.
 #
@@ -551,8 +551,8 @@ MAKEFLAGS=
 # Identity of this package.
 PACKAGE_NAME='enigmail'
 PACKAGE_TARNAME='enigmail'
-PACKAGE_VERSION='1.6'
-PACKAGE_STRING='enigmail 1.6'
+PACKAGE_VERSION='1.7'
+PACKAGE_STRING='enigmail 1.7'
 PACKAGE_BUGREPORT='https://www.enigmail.net'
 PACKAGE_URL=''
 
@@ -1174,7 +1174,7 @@ if test "$ac_init_help" = "long"; then
   # Omit some internal or obsolete options to make the list less imposing.
   # This message is too long to be a string in the A/UX 3.1 sh.
   cat <<_ACEOF
-\`configure' configures enigmail 1.6 to adapt to many kinds of systems.
+\`configure' configures enigmail 1.7 to adapt to many kinds of systems.
 
 Usage: $0 [OPTION]... [VAR=VALUE]...
 
@@ -1240,7 +1240,7 @@ fi
 
 if test -n "$ac_init_help"; then
   case $ac_init_help in
- short | recursive ) echo "Configuration of enigmail 1.6:";;
+ short | recursive ) echo "Configuration of enigmail 1.7:";;
esac
   cat <<\_ACEOF
 
@@ -1319,7 +1319,7 @@ fi
 test -n "$ac_init_help" && exit $ac_status
 if $ac_init_version; then
   cat <<\_ACEOF
-enigmail configure 1.6
+enigmail configure 1.7
 generated by GNU Autoconf 2.65
 
 Copyright (C) 2009 Free Software Foundation, Inc.
@@ -1374,7 +1374,7 @@ cat >config.log <<_ACEOF
 This file contains any messages produced by compilers while
 running configure, to aid debugging if configure makes a mistake.
 
-It was created by enigmail $as_me 1.6, which was
+It was created by enigmail $as_me 1.7, which was
 generated by GNU Autoconf 2.65.  Invocation command line was
 
   $ $0 $@
@@ -3294,7 +3294,7 @@ cat >>$CONFIG_STATUS <<\_ACEOF || ac_write_fail=1
 # report actual input values of CONFIG_FILES etc. instead of their
 # values after options handling.
 ac_log="
-This file was extended by enigmail $as_me 1.6, which was
+This file was extended by enigmail $as_me 1.7, which was
 generated by GNU Autoconf 2.65.  Invocation command line was
 
   CONFIG_FILES= $CONFIG_FILES
@@ -3347,7 +3347,7 @@ _ACEOF
 cat >>$CONFIG_STATUS <<_ACEOF || ac_write_fail=1
 ac_cs_config="`$as_echo "$ac_configure_args" | sed 's/^ //; s/[\\""\`\$]/&/g'`"
 ac_cs_version="\\
-enigmail config.status 1.6
+enigmail config.status 1.7
 configured by $0, generated by GNU Autoconf 2.65,
   with options \\"\$ac_cs_config\\"
 
diff --git a/configure.ac b/configure.ac
index bbb3d13..61929d7 100644
--- a/configure.ac
+++ b/configure.ac
@@ -2,7 +2,7 @@
 AC_PREREQ(2.61)
 min_automake_version="1.10"
 
-AC_INIT([enigmail],[1.6], [https://www.enigmail.net])
+AC_INIT([enigmail],[1.7], [https://www.enigmail.net])
 
 
 AC_PATH_PROG(PYTHON, "python")


signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] kmail encrypted/signed message unverifiable in enigmail

2014-07-11 Thread Daniel Kahn Gillmor
On 07/11/2014 11:32 AM, Patrick Brunschwig wrote:
> Enigmail can decrypt/verify both methods. However, unless you use
> Enigmail 1.7 (or nightlies) KMail emails cannot be verified correctly.

Hm, i don't see a release of 1.7 on https://enigmail.net/ and there has
been no announcement on this mailing list of an actual release, just a
pending release.

But i do see a signed tag enigmail-1-7 in the git repo from 2 days ago.
 I'll go ahead and package that for debian :)  Should i be looking
elsewhere for release announcements?

fwiw, i'm running af19e586642d9, and one of these kmail encrypted+signed
messages still doesn't validate (as reported here) and one does (the one
samir sent).  I'm following up with the author of the first message to
see if we can get it to repeat, since both messages are validatable by a
different MUA (notmuch).

> See bug 209 (https://sourceforge.net/p/enigmail/bugs/209/)

thanks for the reference.

It looks like this was fixed in ab1b9a2d1c023c5bdf, right?  this commit
is already in the version of enigmail i'm running.

Thanks for all your work on Enigmail.

Regards,

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] kmail encrypted/signed message unverifiable in enigmail

2014-07-10 Thread Daniel Kahn Gillmor
On 07/11/2014 12:47 AM, Daniel Kahn Gillmor wrote:
> Could you send me (privately) an encrypted and signed message with your
> kmail instance?  I don't care what it says, but leave the body as a
> simple text/plain part -- no HTML formatting or attachments, and ask
> kmail to sign/encrypt with PGP/MIME.  Please encrypt it to my key
> 0x0EE5BE979282D80B9F7540F1CCD2ED94D21739E9.
> 
> I'll evaluate the structure and report back here on the list.

Samir sent me a PGP/MIME-encrypted message from:

User-Agent:
  KMail/4.13.2 (Linux/3.15.4-1-ARCH; KDE/4.13.2; x86_64; ; )

and it is structured in exactly the same way as the other Kmail message
i reported.  But enigmail is able to verify it, whereas the other one
was unverifiable.

It sounds like i need to go back to the original correspondent and
clarify their configuration to see if i can replicate this with
non-sensitive data.

interestingly, i'm looking at enigmail's PGP/MIME-encrypted messages,
and while they do bundle the signature directly into the encryption
layer, the cleartext of the PGP block looks like this:

D └┬╴multipart/mixed
E  └─╴text/plain


I would have expected just:

D └─╴text/plain

Is there a reason that enigmail doesn't use the simpler structure?  the
multipart/mixed seems like a bit of unnecessary cruft around the message.

Thanks Samir for your quick responses!

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] kmail encrypted/signed message unverifiable in enigmail

2014-07-10 Thread Daniel Kahn Gillmor
On 07/10/2014 06:18 PM, Samir Nassar wrote:
> On Thursday, 2014-07-10 17:53:52 Daniel Kahn Gillmor  
> wrote:
>> But i'm concerned because it seems like enigmail ought to be able to
>> parse the kmail construction, at least if the top-level cleartext part
>> is itself multipart/signed.
> 
> I am happy to help. I'm running KMail 4.13.2, is your reference to kmail 
> 1.13.7 perhaps KMail 4.13.7 ?


huh, weird.  your mail header shows:

User-Agent:
   KMail/4.13.2 (Linux/3.15.4-1-ARCH; KDE/4.13.2; x86_64; ; )

My other correspondent's mail header shows:

User-Agent:
  KMail/1.13.7 (Linux/3.14-0.bpo.1-amd64; KDE/4.8.4; x86_64; ; )

It seems unlikely that they were actually using KMail 1.13.7 this week :)

> If you need a KMail person to send emails back and forth for testing, I am 
> always happy to help.

Could you send me (privately) an encrypted and signed message with your
kmail instance?  I don't care what it says, but leave the body as a
simple text/plain part -- no HTML formatting or attachments, and ask
kmail to sign/encrypt with PGP/MIME.  Please encrypt it to my key
0x0EE5BE979282D80B9F7540F1CCD2ED94D21739E9.

I'll evaluate the structure and report back here on the list.

thanks for the quick volunteering, Samir!

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] problems with auto-encrypt

2014-07-10 Thread Daniel Kahn Gillmor
On 07/09/2014 05:20 AM, Olav Seyfarth wrote:
> I don't see that behaviour here, so could you please be more specific on your
> settings:
> 
>  - global sending settings "convenient"

The "Sending" tab shows "Convenient encryption settings" is set.

>  - global key selection settings

[X] By Per-Recipient Rules
[X] By Email Addresses according to Key Manager
[X] Manually if Keys are Missing
[ ] Always (also) Manually

>  - per account default settings (detailed)

[X] Enable OpenPGP support (Enigmail) for this identity

 (x) Use specific OpenPGP key ID [0xD21739E9]

[ ] Encrypt messages by default
[X] Sign messages by default
[X] Use PGP/MIME by default

After application of defaults and rules:
[X] sign non-encrypted messages
[X] sign encrypted messages
[X] Encrypt draft messages on saving

fwiw, i'm seeing this happen on multiple

>  - a debug trace (personal info obfuscated)

What flavor of debug trace do you want?  thunderbird can produce a lot
of different ones.  how would you like me to get it?

Interestingly, in trying to reproduce it, i'm now seeing that it's
easier to reproduce it (but not guaranteed) when replying to an
encrypted mail, instead of just clearsigned mail.  I haven't been able
to get a coherent, reliable reproduction, unfortuantely.  ah, heisenbugs :/

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


[Enigmail] kmail encrypted/signed message unverifiable in enigmail

2014-07-10 Thread Daniel Kahn Gillmor
hi folks--

a friend recently sent me a PGP/MIME encrypted/signed message from
k-mail 1.13.7.

enigmail decrypted it but claimed "bad signature".

Looking at it in more detail, i see that the message is structured like
this:

A └┬╴multipart/encrypted
B  ├─╴application/pgp-encrypted attachment
C  └─╴application/octet-stream inline [msg.asc]

but decrypting C shows that inside C is:

D   └┬╴multipart/signed
E├─╴text/plain
F└─╴application/pgp-signature [signature.asc]


The OpenPGP layer in C is *just encryption* -- no OpenPGP signature,
which (i think) is why enigmail shows "bad signature".

But the signature F is correct when calculated over E.

I think enigmail's usual mechanism for constriction of PGP/MIME messages
has part C contain the signature as well as encryption, and then part D
is just the message itself.

Both approaches seem valid from the perspective of RFC 3156, though the
enigmail construction seems simpler.

But i'm concerned because it seems like enigmail ought to be able to
parse the kmail construction, at least if the top-level cleartext part
is itself multipart/signed.

Any thoughts?

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


[Enigmail] problems with auto-encrypt

2014-07-08 Thread Daniel Kahn Gillmor
i am seeing the following misbehavior with the 1.7 beta i packaged from
yesterday (i have "convenient encryption" set as the default):

When i reply to a message from someone for whom i have a key, more often
than not, the default leaves the message unencrypted.

When i send a new message to that person, or when i shift-tab up to the
address bar and then tab back down to the subject entry box, the message
becomes encrypted again.

So something about the logic is misbehaving, i think.

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] last chance to beta test the upcoming version 1.7

2014-07-07 Thread Daniel Kahn Gillmor
On 07/07/2014 06:01 PM, Nicolai Josuttis (enigmail) wrote:
> OK, thanks a lot.
> We added a warning dialog for those switching to 1.7

yep, i did see the warning dialog.

> to double check preferences
> because we assumed that there are issues.
> Although we didn't THAT issue.
> Too much changes there 

is this something fixable before the release?

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] last chance to beta test the upcoming version 1.7

2014-07-07 Thread Daniel Kahn Gillmor
On 07/06/2014 03:57 PM, Nicolai Josuttis (enigmail) wrote:

> after several months and a huge amount of updates,
> Enigmail version 1.7 is close to be delivered.
> While we still process all the translations,
> the code and behavior should be done now.
> 
> As we fixed a couple of bugs recently, we are looking
> for final testers before everything gets freezed on Tuesday.
> Thus, for those who have time to test enigmail,
> please do so on Monday and send us detected bugs ASAP
> (especially if these are significant bugs).

thanks, i've gone ahead and uploaded a beta built from git commit
af19e586642d into debian's experimental repository, so folks who are
running debian can try fetching and testing from there.

I noticed that when i built it, unused.txt was created with the
following content:

---
unused labels:
  enigmail.alwaysTrustSend.label
  enigmail.disableRules.accesskey
  enigmail.disableRules.label
  enigmail.encryptedsend.label
  enigmail.openpgp.label
  enigmail.sendPGPMime.label
  enigmail.setupWiz.details.subtitle
  enigmail.setupWiz.pgSign.noSign
  enigmail.setupWiz.pgSign.signAllMsg
  enigmail.setupWiz.pgSign.yesSign
  enigmail.signedsend.label

unused properties:
  keyValid.valid
---

Also, i notice that when i start composing a message, the message will
be signed by default (That is, Sign messages by default used to be
checked for me).  looking at the preferences now, it looks like it is
unchecked, but new messages are still signed by default.  however, if i
switch to "force sign", and then go back to "Use Defaults for Signing",
the message switches to "Message will not be signed".

When i check the preference checkbox manually (Enigmail > Preferences >
Signing/Encryption Options…), then the "Use Defaults for Signing"
behaves as expected.

So i suspect that something about that preference didn't get transferred
properly.

Thanks for all your work on this.

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] Ubuntu uses old enigmail-Version

2014-07-03 Thread Daniel Kahn Gillmor
On 07/03/2014 08:18 AM, Philip Jackson wrote:
> It is actually quite easy to download and install the latest version of
> enigmail or even a nightly build.
> 
> Download the version you want from Enigmail's website and then go to
> Thunderbird : Tools/Add-ons.  In the add-on manager, click the small down
> arrow just to the left of the search box and select 'install add-on from 
> file'.

The traditional recommendation of the Enigmail team is to get enigmail
from whatever route you got thunderbird.  That is, if you run a
thunderbird installation that you got directly from mozilla.org, then
get the enigmail plugin from addons.mozilla.org.  If you run thunderbird
from your operating system, get enigmail from your operating system.

If that recommendation no longer holds, we should make a clear
announcement about it someplace.

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] Request for Translation

2014-07-01 Thread Daniel Kahn Gillmor
On 06/30/2014 12:01 PM, Patrick Brunschwig wrote:
> On 30.06.14 12:49, Kosuke Kaizuka wrote:
>> - enigmail.keyservers.sample does not include
>> pool.sks-keyservers.net
> 
> Yes, we removed it.

why?  the currently listed example keyservers are:

 sks.dnsalias.net, pgp.mit.edu, ldap://certserver.pgp.com

I think that keeping the pool in the example is probably a better for
resilience, redundancy, and not putting too much strain on any
individual keyserver.  I suspect that people who don't know what to
choose for this will copy/paste the defaults.  It'd be nice to give them
a default that's the well-maintained global pool.

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] 15 June nightly build

2014-06-17 Thread Daniel Kahn Gillmor
Hi Philip--

over on enigmail-users,
On 06/16/2014 09:58 AM, Philip Jackson wrote:
> me@me-desktop:~$ gpg --sign test-message
> 
> You need a passphrase to unlock the secret key for
> user: "Philip Jackson "
> 2048-bit RSA key, ID 23543A63, created 2013-01-22
> (here I entered the passphrase)
> gpg: problem with the agent - disabling agent use
> gpg: can't open `test-message': No such file or directory
> gpg: signing failed: file open error
> 
> I tried a couple of times - same both times.

is there a file named "test-message" ?  you can find out with:

 ls -l test-message


If that doesn't exist, you can create a simple text file with "example"
in it with:

  echo example > test-message

> command gpg-agent shows "gpg-agent: gpg-agent running and available"

are you doing this from within a terminal emulator in a graphical
environment, or are you doing this entirely from a text-mode virtual
terminal?

You might do better to debug this problem with gpg over on gnupg-users
(i've cc'ed them here).  If you want to follow up on that mailing list,
you'll probably need to subscribe first at:

 http://lists.gnupg.org/mailman/listinfo/gnupg-users

hth,

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] 15 June nightly build

2014-06-15 Thread Daniel Kahn Gillmor
On 06/15/2014 08:53 AM, Philip Jackson wrote:
> But when I want to send a signed email, it presents first the OpenPgp
> confirmation dialog and when I select OK, it immediately gives the error
> message "Bad passphrase" without having given any opportunity to provide the
> passphrase.

you didn't mention what flavor of GNU/Linux you're using -- is it
possible that you have gnupg installed, but not gpg-agent?  whne you did
your import, did you import the secret keyring as well as the public
keyring?

did you transfer your ownertrust database as well? (see the
--export-ownertrust and --import-ownertrust actions for gpg)

have you tried to use gpg from the terminal to sign a test message?  if
so, are there any error messages there?

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] on/off/default in a menu

2014-06-06 Thread Daniel Kahn Gillmor
Hi Nicolai--

On 06/06/2014 04:39 AM, Nicolai Josuttis wrote:

> I am about to make the enigmail UI more convenient/self-explaining.
> So, I have the following problem:
> I want to give three choices for encryption (and other options):
> 1) use default setting and rules
> 2) turn encryption on
> 3) turn encryption off
> 
> Unfortunately there is no 3-way-toggle button.
> But I want to give these three options in a menu.

i'm assuming you're talking about the OpenPGP menu in a single compose
window.  is that right?

At the moment, there are four options:

 Sign Message
 Encrypt Message
 --
 Use PGP/MIME for This Message
 Ignore Per-Recipient Rules

and they get little checkmarks when they're set.

It seems like you could apply these options just for encryption, leaving
the "Sign Message" alone, right?  Is there some sort of "default"
signing scenario that people might want to revert to?

All the options presented seem rather clunky to me, and (worse) they
present a problem for feedback -- if you're in the default state,
looking at this state should let you know whether the given message is
going to be encrypted or not.

have you thought about how to address this view in the icons in the
status bar (the pencil and the key) as well?

Unfortunately, i'm having a hard time coming up with something better.

I looked around at ideas about tri-stated checkboxes:

 https://en.wikipedia.org/wiki/File:Checkbox_States.svg
 http://guijournal.com/2011/05/gui-design-tri-state-checkboxes/

but they don't seem particularly useful to me.

Here are the things i'd like to come out of this decision:

 0) to see at a glance what the state of the message is

 1) to know if i'm using the defaults or not

 2) to be able to move from the default to a forced-setting other than
the current default

 3) to be able to move from the default to a forced-setting that is the
same as the current default

 4) to be able to move from one forced-setting to another

 5) to be able to move from a forced-setting back to the default

Some of these might seem more like things that humans want than others.

(3), for example, seems unlike something that a regular human would
think about.  But it is relevant in the context of "as i write this
draft, the defaults might change and i don't want to worry about that"


If there are three (or four?) categories that i want to be able to have
all these features on, it's pretty complicated!

Here are two more proposals to consider:

 A) explicit default/non-default action

What if the idea of deviating from the defaults was explicit and it
covered all the settings at once?

So the initial setup might look like:

 * Encrypt (default)
   Sign (default)
 * PGP/MIME (default)
 
   Lock these choices


If the user chooses "Lock these choices" then they go to:

 * Encrypt
   Sign
 * PGP/MIME
 
   Revert to defaults (Encrypted, unsigned, PGP/MIME)

Likewise, if the user chooses to alter any of the three items
individually, *all* of them move off of "defaults"

For cleanliness, the parenthetical in the "Revert to defaults" entry
could dynamically only show the diff between the defaults and the
current choices.  So, for example, using the above defaults, but if
someone clicked "Encrypt" (to disable encryption), they'd see:

   Encrypt
   Sign
 * PGP/MIME
 
   Revert to defaults (Encrypt message)


 B) submenus

The OpenPGP menu would have three menu items which show the state (and
whether they're a default) textually (not with a checkmark), and each of
them have submenus.  The submenu itself would change based on the state
of the value:

 Encrypted (default) > Force Encrypted
   Force Unencrypted
 Signed (default) > Force Signed
Force Unsigned
 PGP/MIME (default) > Force PGP/MIME
  Force Inline PGP


then, if you were to select "Force Unencrypted" the tree would show:

 Unencrypted  > Use Default (Encrypted)
Force Encrypted


If the current state had the default of Unencrypted, then it would look
like:

 Unencrypted  > Use Default (Unencrypted)
Force Encrypted


or if they're in the default state:

 Unencrypted (default) > Force Encrypted
 Force Unencrypted

It still seems very complex for users to deal with, for something that
is suppoesd to be more convenient/self-explaining :(


what do you think?  sorry to not have better suggestions.

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] OpenSSL vulnerability

2014-06-06 Thread Daniel Kahn Gillmor
On 06/06/2014 02:40 PM, Robert J. Hansen wrote:

> GnuPG uses libcurl to do things like access remote URLs.  libcurl
> depends on OpenSSL.

fwiw, curl can be built against any of three possible crypto backends:
OpenSSL, GnuTLS, or NSS (or it can be built without crypto at all, in
which case it won't work with https).

We're pretty far off-topic for the enigmail mailing list by now, though.

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] Documentation needs Update / Error Message

2014-06-03 Thread Daniel Kahn Gillmor
On 06/03/2014 06:17 PM, Daniel wrote:
> Am 03.06.2014 23:48, schrieb Daniel Kahn Gillmor:
>> the above doesn't look like it's being run from a cmd prompt.  If
>> you're running windows 7, click the start button, and then in the
>> search box, type "cmd" (without the quotes) and hit enter.
>>
>> you'll get what passes for a terminal environment on windows.
>>
>> In that box, try running the gpg commands and seeing what output
>> you get -- i think this should produce more copious logs than
>> you're currently seeing.
> 
> Dooh, youre right of course, i should go to bed...
> 
> So cmd says:
> 
> C:\Users\Daniel>gpg --charset utf-8 --display-charset utf-8
> --keyserver-options ca-cert-file=C:\Users\Daniel\s
> ks-keyserver.netCA.pem --keyserver-options debug --command-fd 0
> --no-tty --batch --fixed-list --with-colons --
> keyserver hkp://hkps.pool.sks-keyservers.net:11371 --search-keys
> susp...@gmx.de
> gpg: suche nach "susp...@gmx.de" auf hkp-Server
> hkps.pool.sks-keyservers.net
> SEARCH susp...@gmx.de BEGIN
> info:1:1
> pub:4229D21B:1:4096:1401723665::
> uid:Daniel :1401723665::
> 
> 
> SEARCH susp...@gmx.de END

hm, i'm having a hard time reading the line breaks in this, and i'm also
not seeing anything close to it when i do the search myself.

I get *lots* more content, including indications of what IP address was
used, etc.

even if the certs don't match at least i get the following info from gpg
2.0.22:

0 dkg@alice:~$ gpg2 --no-tty --batch --fixed-list --with-colons
--keyserver-options debug --keyserver-options
ca-cert-file=/tmp/mysteryca.pem --keyserver
hkps://hkps.pool.sks-keyservers.net --search susp...@gmx.de
gpg: searching for "susp...@gmx.de" from hkps server
hkps.pool.sks-keyservers.net
gpgkeys: curl version = libcurl/7.37.0 GnuTLS/3.2.15 zlib/1.2.8
libidn/1.28 libssh2/1.4.3
gpgkeys: search type is 0, and key is "susp...@gmx.de"
* Hostname was NOT found in DNS cache
*   Trying 162.243.93.15...
* Connected to hkps.pool.sks-keyservers.net (162.243.93.15) port 443 (#0)
* found 1 certificates in /tmp/mysteryca.pem
* server certificate verification failed. CAfile: /tmp/mysteryca.pem
CRLfile: none
* Closing connection 0
gpgkeys: HTTP search error 60: server certificate verification failed.
CAfile: /tmp/mysteryca.pem.pem CRLfile: none

SEARCH susp...@gmx.de FAILED 1
gpg: key "susp...@gmx.de" not found on keyserver
gpg: keyserver internal error
gpg: keyserver search failed: Keyserver error
2 dkg@alice:~$


i'm not sure what to suggest.  maybe someone with windows experience or
a windows test installation can chime in here?

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] Documentation needs Update / Error Message

2014-06-03 Thread Daniel Kahn Gillmor
On 06/03/2014 05:34 PM, Daniel wrote:
> Am 03.06.2014 22:47, schrieb Daniel Kahn Gillmor:
>> I don't know how to set the language environment to "C" in windows 
>> either, but let's go with this one for now.
>>
>> can you show a full cmd transcript of the above command, but also
>> with --keyserver-options debug ?
> 
> Just to be sure, the parameters added are now:
> --keyserver-options
> ca-cert-file=C:\Users\Daniel\sks-keyserver.netCA.pem
> --keyserver-options debug
> 
> Which gives me the same Problem:
> enigmail> "C:\Program Files (x86)\GNU\GnuPG\pub\gpg.exe" --charset
> utf-8 --display-charset utf-8 --keyserver-options
> ca-cert-file=C:\Users\Daniel\sks-keyserver.netCA.pem
> --keyserver-options debug --command-fd 0 --no-tty --batch --fixed-list
> --with-colons --keyserver hkps://hkps.pool.sks-keyservers.net:443
> --search-keys susp...@gmx.de
> gpg: suche nach "susp...@gmx.de" auf hkps-Server
> hkps.pool.sks-keyservers.net
> 
> gpg: Schlssel "susp...@gmx.de" wurde auf dem Schlsselserver nicht
> gefunden
> 
> 
> Or a succes without hkps://
> enigmail> "C:\Program Files (x86)\GNU\GnuPG\pub\gpg.exe" --charset
> utf-8 --display-charset utf-8 --keyserver-options
> ca-cert-file=C:\Users\Daniel\sks-keyserver.netCA.pem
> --keyserver-options debug --command-fd 0 --no-tty --batch --fixed-list
> --with-colons --keyserver hkp://hkps.pool.sks-keyservers.net:11371
> --search-keys susp...@gmx.de
> gpg: suche nach "susp...@gmx.de" auf hkp-Server
> hkps.pool.sks-keyservers.net


the above doesn't look like it's being run from a cmd prompt.  If you're
running windows 7, click the start button, and then in the search box,
type "cmd" (without the quotes) and hit enter.

you'll get what passes for a terminal environment on windows.

In that box, try running the gpg commands and seeing what output you get
-- i think this should produce more copious logs than you're currently
seeing.

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] Documentation needs Update / Error Message

2014-06-03 Thread Daniel Kahn Gillmor
On 06/03/2014 04:42 PM, Daniel wrote:
> Am 03.06.2014 22:30, schrieb Daniel Kahn Gillmor:

>> you may also want to add "--keyserver-options debug" to see more
>> info.
> 
> Not Working:
> enigmail> "C:\Program Files (x86)\GNU\GnuPG\pub\gpg.exe" --charset
> utf-8 --display-charset utf-8 --keyserver-options
> ca-cert-file=C:\Users\Daniel\sks-keyserver.netCA.pem --command-fd 0
> --no-tty --batch --fixed-list --with-colons --keyserver
> hkps://hkps.pool.sks-keyservers.net:443 --search-keys susp...@gmx.de
> gpg: suche nach "susp...@gmx.de" auf hkps-Server
> hkps.pool.sks-keyservers.net
> 
> gpg: Schlssel "susp...@gmx.de" wurde auf dem Schlsselserver nicht
> gefunden

I don't know how to set the language environment to "C" in windows
either, but let's go with this one for now.

can you show a full cmd transcript of the above command, but also with
--keyserver-options debug ?

If it contains information you're not certain about, you're welcome to
send it to me off-list, i just want to make sure we resolve the problem
on-list.

sorry i don't have a windows system handy to test it out with myself.

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] Documentation needs Update / Error Message

2014-06-03 Thread Daniel Kahn Gillmor
On 06/03/2014 04:22 PM, Daniel wrote:
> Sorry, I forgot to mention, I already did this. i tried both methods,
> manually editing the gpg.conf and the option in Enigmail.

[...]
> The System I'm currently running uses Windows 7 so thats not the Problem

can you report the version of gpg you have installed, the version of
enigmail, and the version of thunderbird?

Can you look at the "Debugging Options" > "View Console" to see what the
command is that's being run, and then try to re-run the exact same
command from the command line, and report what the response is?

you may also want to add "--keyserver-options debug" to see more info.

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] Documentation needs Update / Error Message

2014-06-03 Thread Daniel Kahn Gillmor
On 06/03/2014 12:03 PM, Daniel wrote:

> i looked up the Docs on http://www.rainydayz.org/content/915-keyserver
> Quote: "You may prepend a protocol to the name of a keyserver, e.g.
> hkp://keyserver.example.com or ldap://certserver.pgp.com.";
> 
> I tried and Enigmail 1.6 as well as today's nightly won't connect to
> hkps://hkps.pool.sks-keyservers.net
> using the search dialog in the key management menu.
> 
> Enigmail does connect to hkps.pool.sks-keyservers.net, so this seems to
> be a Enigmail Problem, either in the Docs or the Plugin?

Using hkps properly (with certificate checking) requires setting up the
root certificate authority.  Without this, the connection will fail to
validate.

To do this, you need to fetch the root CA key for this pool [0], as
described at [1].

Place this in a stable place (e.g. /home/daniel/sks-keyserver.netCA.pem
) and then tell enigmail to look for it.  You can do this either by
adding the following line to ~/.gnupg/gpg.conf:

 keyserver-options ca-cert-file=/home/daniel/sks-keyserver.netCA.pem

or you can do it directly from Enigmail: OpenPGP > Preferences >
"Display Expert Settings and Menus" > Advanced > "Additional Parameters
for GnuPG" should contain:

 --keyserver-options ca-cert-file=/home/daniel/sks-keyserver.netCA.pem

Once that's in place, you should be able to pull from the hkps pool.
Does this work for you?

Perhaps we should ship this root CA cert in enigmail directly, and
default to using the hkps pool, or use it automatically if no other
ca-cert-file option is set and the user has selected
hkps://hkps.pool.sks-keyserver.net as their keyserver.  Patrick, would
you be willing to accept a patch for this?

--dkg

PS on debian and debian-derived systems, hkps is also only available if
you have the "gnupg-curl" package installed.  Without that package, hkps
will fail regardless of the ca-cert-file, since you will just have the
default shim keyserver transports.

[0] https://sks-keyservers.net/sks-keyservers.netCA.pem
[1] https://sks-keyservers.net/overview-of-pools.php#pool_hkps



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] PGP/MIME confirmation dialog

2014-05-17 Thread Daniel Kahn Gillmor
On 5/17/2014 10:51 PM, Someone wrote:
>> Why not perform a check of the headers on all of the previously received
>> mail from the email address you're presently sending mail to, and then
>> skip the attachment scheme selection dialog if the contact's mail has
>> been exclusively composed either on mail clients that support PGP/MIME
>> or on ones that don't?

I like the proposal of enigmail being more proactively helpful in
figuring out what kind of message formatting is reasonable.

On 05/17/2014 11:13 PM, Robert J. Hansen wrote:
> A lot of users would object.  "I don't want Enigmail to keep track of
> whom I'm corresponding with and what technologies they're using!  It's a
> violation of privacy!  How do I know what you're doing with that
> information you're collecting?"
> 
> And I hasten to add -- it's a pretty reasonable objection.

I don't think this is a reasonable objection.  Enigmail already has
access to all of these mails.  it's not like anyone is proposing sending
this information to a network service or to the enigmail website or
leaking this kind of private data.  Users already expect Enigmail to
handle more sensitive things (like the user's key material) without
divulging them.

Just to be clear: I don't know of any MUA that can handle/decrypt
PGP-encrypted mail but *can't* handle/decrypt PGP/MIME-structured
encrypted mail.  All the PGP/MIME problems i've seen reported have to do
with failing to read PGP/MIME-signed (but not encrypted) messages.

I think there are engineering issues that might make the initial
proposal difficult, though.I don't know that they're insurmountable
(some will be answered with heuristics that won't always guess right),
but you probably want to think through them in more detail before trying
to implement something like this:

 * just because you've never been sent an e-mail from that user via a
PGP/MIME-broken MUA doesn't necessarily mean that they never read mail
on such a MUA.  Sending is not receiving.

 * you'd need to enumerate which versions of which MUAs (with which
plugins) are PGP/MIME-broken and keep that list up-to-date somehow.  How
does that interact with, say, webmail implementations?

 * some messages don't have any clear indication of what MUA they used.

 * someone who used a PGP/MIME-broken MUA 6 years ago may not still be
using that MUA.  should six-year-old mail still be relevant?  Figuring
out what sort of cutoffs are reasonable is non-trivial.

 * Imagine a user who has 300,000 message in their mail archive.  You
wouldn't want search all of those each time.  so you'd want to keep some
sort of state for each user that could be updated when new mail from
that user was discovered by thunderbird.  This doesn't necessarily just
mean when new mail is fetched -- thunderbird could suddenly get access
to an old mailbox, or a new folder could be published.  how would you
synchronize this cached state?

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] question regarding a new sending preferences layout

2014-05-04 Thread Daniel Kahn Gillmor
On 05/04/2014 11:41 AM, Phil Stracchino wrote:
> It appears to em that terms like 'thorough', 'careful' are scarcely
> even applicable to what you're trying to accomplish here.  Mode 1 is
> basically 'Encrypt whenever possible' or 'Encrypt always'.  Mode 2 is
> harder to define -- the best I can come up with is, 'Encrypt manually
> ONLY'.

In other discussions about crypto that aim for the idea of "whenever
possible, even if i'm not sure of the proper identity or other details",
the word that seems to have the most consensus behind it is
"opportunistic".

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] test implementation for auto encryption available in test-branch

2014-04-25 Thread Daniel Kahn Gillmor
[skipping a bunch of discussion covered elsewhere in the thread and
jumping directly to the UI/UX proposals]

On 04/22/2014 05:00 PM, Philip Jackson wrote:
> What about some consideration of the time elapsed since [valid] status was
> conferred ?

Is this the right time limit that a user should be interested in?  what
about duration since last use or something like that?  compare the two
following scenarios:

i certified Joe's key a year ago and we never exchanged any e-mails
(signed or otherwise) after that.

i certified Mary's key a year ago and we exchange encrypted/signed
e-mails every week.

time elapsed since [valid] status conferred is the same in both cases.

I agree that a time limit indication could be useful, but it should
probably be "time since last observed/used" or something like that.
that's a little trickier to count, unfortunately, and i'm not sure if
the extra UI complexity is worth the tradeoff.  but it's certainly worth
considering.

>> * if the user manually chooses to encrypt the message when some users are
>> not [valid, then the non-[valid] icons should be highlighted or made bigger
>> or flash or blink or something to draw attention to them.
> 
> With a help message when the cursor is hovered over the icon.

yes, that would be great.

> and perhaps if the time since {valid] status was conferred is greater than
> some specified interval, something like this --
> "it is x months since you accepted this key/userid as valid, are you sure you
> still want to use it or would you like to re-check?"

if the user said "i'd like to re-check", what do you think enigmail
should do?

Regards,

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] test implementation for auto encryption available in test-branch

2014-04-25 Thread Daniel Kahn Gillmor
On 04/24/2014 06:39 PM, Mike Acker wrote:

> one more time: all that happens in ENIGMAIL calls GnuPG passing a user (
> -u ) argument .  if that argument is just an e/mail address GnuPG won't
> have enough information to find the key you want if there are two or
> more keys in the keyring with that matching e/mail address.

Sure it does.  GnuPG is the tool that keeps track of the calculated
validity of the user IDs it knows about.

If you have two or more keys with the same User ID and one is valid for
that user ID and one is not, it should choose the valid key.  It does
not, currently.

> to be sure to get the right key you pass the fingerprint in the -u
> argument and this is what the recipient rules are for

As John pointed out, there are other good reasons for the recipient
rules.  The job of selecting the key that is best-bound to the e-mail
address shouldn't need to be one of them, since gpg already has all of
that information.

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] test implementation for auto encryption available in test-branch

2014-04-24 Thread Daniel Kahn Gillmor
On 04/24/2014 04:59 PM, John Clizbe wrote:
> Good luck with changing the behavior of GnuPG ;-)

Werner has suggested that 2.1 would actually perform key selection
differently, perhaps because the proposed keybox store has no innate
sense of linear order in the first place.  dunno when that'll happen,
though :/

> Obviate? Eh, not so much. Key selection for encryption is only one use for P-R
> rules. Whether to sign and/or encrypt, and Inline vs PGP/MIME decisions
> outside of default account settings are also handled by per-recipient rules.
> 
> I'm not saying key selection isn't an important use of P-R rules, but it's
> hardly the /sine qua non/ of P-R rules.

yes, these are good points, and i shouldn't have overlooked them.
thanks for pointing them out.

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] test implementation for auto encryption available in test-branch

2014-04-24 Thread Daniel Kahn Gillmor
On 04/24/2014 02:52 PM, Mike Acker wrote:
> On 04/23/2014 10:33 PM, Daniel Kahn Gillmor wrote:
>> FWIW, i fully agree that the right place to fix this misbehavior is in
>> GnuPG itself, not in enigmail.  I care about non-enigmail users of
>> GnuPG, and i definitely don't want to have the headache of synchronizing
>> key selection routines of multiple GnuPG-using applications.
> gnupg doesn't have access to your email directory.
> it has to be corrected in enigmail

eh?  why would access to the contents of my e-mail be a requirement to
select a valid key based on an e-mail address?

> which, as noted, is why they have per recipient rules

I know that enigmail has these rules, and that they are a way to work
around GnuPG's suboptimal key-selection-from-email-address routine.  I
think there may be better ways to resolve these issues if we consider
all the pieces of the stack.

I think GnuPG's key selection routines need to be improved, and that
would obviate the majority of the need for per-recipient rules.

--dkg




signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] test implementation for auto encryption available in test-branch

2014-04-23 Thread Daniel Kahn Gillmor
On 04/23/2014 09:18 PM, John Clizbe wrote:
> Philip Jackson wrote:
>> On 22/04/2014 01:30, Daniel Kahn Gillmor wrote:
>>
>>> Note that enigmail's current default behavior is to simply choose the 
>>> *first* key in GPG's keyring that claims to be associated with the e-mail
>>> address in question.  This is true, even if the first key in the keyring
>>> with a given e-mail address is *not valid* for that e-mail address, and
>>> another later key *is valid* for that e-mail address :(
>>
>> Whoops !
> 
> WRONG!!!
> 
> Dan, I know you know better than this. This is *NOT* Enigmail's behavior.
> It is the behavior of GnuPG. It is also one of the main reasons behind the
> creation of Enigmail's per-recipient rules.

Thanks for clarifying, John.  Yes, this the result of enigmail relying
on GnuPG to select the key, and GnuPG doing the laziest thing instead of
the most reasonable thing.

> If I tell GnuPG I wish to encrypt something to j...@foo.bar.tld, gpg will do a
> sequential scan of my public keyring and will return and use the first usable
> key with a matching email address. This is how GnuPG behaves and always has
> behaved.
> 
> Don't start whining that Enigmail should do it differently because you don't
> like GnuPG's default behavior. Outside of setting up a PR rule for an email
> address, Enigmail can only use the key that GnuPG selects.

FWIW, i fully agree that the right place to fix this misbehavior is in
GnuPG itself, not in enigmail.  I care about non-enigmail users of
GnuPG, and i definitely don't want to have the headache of synchronizing
key selection routines of multiple GnuPG-using applications.

For my own personal use, i manually reorder of keys in my gpg keyring to
ensure that the first key is the "best" one.  it's a pain to do, and
keyring updates could easily insert new user IDs earlier in the
keyring's sequential order than the current "best" key.  in that case, i
go manually reorder them again.

If GnuPG just did key selection by choosing the first key with the
highest known validity for the given user ID, we could do away with much
of the extra fiddly bits that make this process so slippery and confusing.

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] test implementation for auto encryption available in test-branch

2014-04-21 Thread Daniel Kahn Gillmor
Hi Nico--

thanks for your work on this; i'm really glad to see people thinking it
through in detail.

Responses in more detail below, along with a more radical proposal that
hopefully we can use to think through the desired behavior.

On 04/21/2014 04:11 PM, Nicolai Josuttis wrote:

> Let me try to find a wording both experts and novices can live with
> (IMO that's key for a better acceptance of PGP).

yes, clearer understanding is important.

> We have owners.

I'd say "we have keys", and there are people who control those keys.
Some keys might be held or controlled or owned by multiple people.

> We can specify how much we trust them.

since the term "trust" is so beleaguered, perhaps we should say "we can
specify how much we're willing to rely on any given key to certify other
certificates.

> We have keys.
> Keys belong to email addresses.

again, i'd say that keys are distributed within certificates, and (most)
certificates have e-mail addresses associated with them.

> So the hard part is how the following:
> - a key is valid means different thing for experts and novices

I think we should be talking about a (key,userid) being valid, or a "key
being valid for a given e-mail address".  Saying "a key is valid" isn't
really what we want to say.  In particular, a key could be valid for one
e-mail address, and it could be not valid for another e-mail address.

> - we trust a key is nothing useful for an expert
>   but for a novice.

i'm not sure what you mean by this.  can you explain more?

> Now we have to formulate an option:
> - we accept all keys except disabled/expired/revoked ones.
> AH, may be "accept" is a word we can use
> (I used it here incidentally...)

"accept" needs to be clearer, i think, because it may not be just "we
are willing to encrypt to this key" -- it may also be "we are willing to
believe that signatures made by this key actually come from the person
identified in the user ID of the key's certificate"


> So may be we allow to change both options into the following:
> 
> Accepted keys to send encrypted:
> - All valid keys according to the web of trust
> - All except disabled/expired/revoked keys

how about:

For a given e-mail address, encrypt messages to:

 * all keys valid for that e-mail address
 * all usable keys that claim to belong to that e-mail address

Note that enigmail's current default behavior is to simply choose the
*first* key in GPG's keyring that claims to be associated with the
e-mail address in question.  This is true, even if the first key in the
keyring with a given e-mail address is *not valid* for that e-mail
address, and another later key *is valid* for that e-mail address :(

> Automatically send encrypted
> - never
> - if we have accepted keys for all e-mail addresses



> And for the first option of the first option we NEED a very short but
> compelling explanation (ideally as help text),
> which I still try to find reading all the documentation.
> May be:
> - According to the web-of-trust, a key is valid if:
>   - it is your key (has ultimate owner trust)
>   - you signed it
>   - another owner you fully trust signed it
>   - at least 3 other owners you marginally trust signed it

this may or may not be true, depending on the certification patterns.
It's certainly possible for users of gpg to modify how gpg interprets
the network of identity certifications it knows about.  See
"--marginals-needed" and "--max-cert-depth" and "--trust-model"
arguments to gpg.

> But, BTW, I just saw that we also use the term "trusted" instead of
> "valid" in the key manager.
> So currently "trusted key" is used more or less consistently
> as non-technical term for "valid key".

Any place you find enigmail using "trusted" to mean "valid" is a bug,
and needs to be fixed.  it's not surprising that there are more cases
that still linger in the codebase; gpg didn't clarify its own
terminology until several years ago, and enigmail has done some cleanup
on this recently, but seems to be reintroducing some of the conflated
terminology in some places.  We should really try to avoid that.

(for example, the recent "trust the keys of all recipients" should
probably be something like "don't validate keys of recipients" -- we
don't know if the keys in questions actually belong to the recipients,
and we don't plan to actually indicate any ownertrust in them)

> So, let me ask again:
> May be you and we all can live with the term "trusted key"
> (as contrast to trust for owners),

no, i think that's one of the root causes of a lot of ongoing confusion.
 non-expert users and expert users alike will be confused if we use the
same term ("trusted") to mean two different things.


All of this discussion has me thinking more widely about what the ideal
user interface *should* be, if we could get to it, rather than making
incremental improvements.  I've tried to do a brief sketch below on a
new UI proposal that i think would address these concerns more helpfully
for regular use.  the proposa

Re: [Enigmail] test implementation for auto encryption available in test-branch

2014-04-21 Thread Daniel Kahn Gillmor
On 04/21/2014 07:09 AM, Nicolai Josuttis wrote:
> Thanks a lot for this feedback, Daniel.
> These are very compelling arguments.
> Seems I fall into the trap of making it "too good".

thanks for reading and taking this seriously.

> The new approach I suggest would be just to offer:
> 
> Automatically send encrypted?
> - Never
> - If all keys are known and valid

yep, this looks pretty good.  But you might instead want to phrase the
last part as:

 "if we have valid keys for all e-mail addresses"

conceptually, the thing we're hoping will be valid is the *certificate*,
which is a combination of user ID and key material, along with some
additional cryptographic assertions about it.  A valid certificate mean
"we believe that the key in this certificate belongs to the person
identified by the user ID in this certificate".

Note also that OpenPGP certificates can have multiple User IDs, and you
might believe that one User ID is valid, but another might not be.  For
example, I recently acquired a new e-mail address, and added it to my
OpenPGP certificate.  I haven't called publicly for new certifications
of that e-mail address, so most people are unlikely to have verified it.

So when we say "we have a valid key" we're omitting a bunch of details.
 We're really trying to say "we have a key that we believe is correctly
bound to a user ID for the e-mail address that you're sending this mail to".

> And let the option
>  "Always trust people's keys"

I think this option is misleadingly-labeled in the first place.  It
should say "use keys without verification" or "accept keys of unknown
validity" or something like that.  the point is (a) this is not "trust"
in the OpenPGP sense of ownertrust, so this term should be avoided here
and (b) the keys that you will use if you set this flag may or may not
actually belong to the people to whom you are sending the mail, so
"people's keys" is misleading on its own.

> then have the effect whether this means again:
> - (disabled:)
>   use the rules of the web of trust for validity
> or
> - (enabled)
>auto send encrypted if all keys are known
>and not disabled/revoked/expired/mistrusted.

this makes sense to me (though see below about "/mistrusted")

> So, my question is:
> What is the right term for
> "not expired and not revoked and not disabled"
> (the term should work for non-experts).

I'd use a term like "well-formed" or just "usable", but i don't know of
any consensus around either of those terms.

> Similar, do we have a term for
> "not expired and not revoked and not disabled and not mistrusted"?

again, what do you mean by "mistrusted" here.  are we talking about
ownertrust?  saying "no ownertrust" on a given key should *not* be used
as a proxy for saying "i do not consider this key valid" or "never
encrypt to this key".

For example, i could have a list of keys, including one for a friend of
mine who i know is very sloppy with his cryptographic certifications.
(e.g. i've seen him certify a key he pulled off of a web page without
doing any form of double-checking).  I know his key is his key, and i
still prefer to send him encrypted mail where possible, but i never want
to rely on his certifications.

If you never want to use a given key for encryption, you should disable
it; i'm not sure what we gain from throwing "mistrusted" into the mix
when deciding about what keys to encrypt to; "mistrusted" answers an
orthogonal question, and i don't think it should play into the
decision-making process for encryption.

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] test implementation for auto encryption available in test-branch

2014-04-20 Thread Daniel Kahn Gillmor
On 04/20/2014 07:12 PM, Daniel Kahn Gillmor wrote:

> I think it's a really bad idea to make encryption contingent on trust
> settings; it should only be contingent on validity.

let me explain this a bit further:

 * setting non-zero ownertrust on someone's keys puts you at risk of
being willing to believe any faulty certifications that they make.

 * therefore, you should only set ownertrust on a key if you think that
the keyholder makes reasonable certifications.

 * any tool which changes its behavior in ways unrelated to reliability
of a keyholder's certifications on the basis of how much ownertrust
you've set on the key will encourage some people to set ownertrust for
these other effects.

 * the result will be that those users will end up willing to rely on
certifications that they really do not want to rely on.

does this make sense?  any auto-encrypt mode needs to be based strictly
on certificate validity (for the e-mail addresses being sent to, not for
any other User ID on the key), and *not* on key ownertrust.

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] test implementation for auto encryption available in test-branch

2014-04-20 Thread Daniel Kahn Gillmor
Hi Nicolai, all--

On 04/20/2014 09:30 AM, Nicolai Josuttis wrote:

> a first implementation to provide the ability to
> automatically encrypt messages if all valid keys are known

this is a neat idea, but...

> without the need to have a rule for it
> into the sub-branch (derived from master):
>  AutoSendEncrypted
> 
> In fact, you can choose between:
>> Automatically send encrypted?
>> - Never
>>   No automatically encrypted sending except explicitly triggered by rules
>> - With full trust
>>   Automatically send encrypted when all keys are known and valid and have 
>> full trust
>> - With marginal trust
>>   Automatically send encrypted when all keys are known and valid and have at 
>> least marginal trust
>> - With unknown trust
>>   Automatically send encrypted when all keys are known and valid and have no 
>> explicit mistrust

the above terms are deeply confusing.  "valid keys" are not the same as
"trusted keys".  In OpenPGP, a "valid" certificate means that we believe
that the key belongs to the person named in the User ID.  a "trusted"
key means that we're willing to believe OpenPGP certifications made by
this key.

I think it's a really bad idea to make encryption contingent on trust
settings; it should only be contingent on validity.

Can you clarify this?

regards,

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] "trust the keys of all recipients" is problematic text

2014-03-26 Thread Daniel Kahn Gillmor
On 03/26/2014 09:57 AM, Mike Acker wrote:
> On 03/25/2014 06:21 PM, Daniel Kahn Gillmor wrote:
>> hi enigmail folks--
>>
>> 1ee310b5bcdb86f225cc11ca0ae2138a7aaba992 addresses bugs 212 and 179 with
>> a menu option called "trust the keys of all recipients".
>>
>> I think what this implies is that when sending a message to
>> f...@example.com, enigmail will just use the first key it happens to find
>> in the user's keyring that has f...@example.co in one of its user ids.
> it may be possible to correct this by setting a PGP rule on the address
> book entry
> I'm experimenting with this

What do you mean "correct this"?  This e-mail thread was not intended to
be about whether this particular action is right or wrong, it was about
whether the text accurately describes what is being offered.

That said, I'd be very interested in a separate discussion about what
kinds of key management workflows are sensible.  Ideally, we'd think
about this with respect to enigmail on its own, and how well enigmail
can integrate into other programs that might use OpenPGP for the user.

I have some vaguely-formed ideas about how to do this kind of thing in
ways that would share these validity decisions across other users of
GnuPG as well, using a designated separate/independent local
(non-exportable) trusted key to record temporary acceptances as
local-certifications on the keyring.

maybe we should start this discussion as a separate thread?

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


[Enigmail] "trust the keys of all recipients" is problematic text

2014-03-25 Thread Daniel Kahn Gillmor
hi enigmail folks--

1ee310b5bcdb86f225cc11ca0ae2138a7aaba992 addresses bugs 212 and 179 with
a menu option called "trust the keys of all recipients".

I think what this implies is that when sending a message to
f...@example.com, enigmail will just use the first key it happens to find
in the user's keyring that has f...@example.co in one of its user ids.

i think this is the wrong language to use for this feature, because it
conflates the idea of "trust" (which has a specific meaning about how
much you're willing to rely on certifications made by the keyholder)
with the idea of "validity" (how much you believe that a given key
belongs to the person/address named in the user ID).

I'm having a hard time coming up with a pithy replacement (possibly
because i'm not entirely sure this behavior is a great thing to do), but
i think it should be something like:

 "encrypt this message regardless of key validity"

or

 "don't check validity of recipient keys for this message"

or

 "ignore key validity when sending"

also, i don't think this menu option should be present (or maybe it
should be greyed out) when the message is not intended to be encrypted.

Probably the text in the preferences pane ("Always trust people's keys")
should be changed as well to use more sensible language.

Lastly, in the "key management" dialog box, the "Key Validity" column
(should it be "UserID validity"?) should probably choose its values from
the set {invalid,revoked,expired,-,unknown,marginal,valid} instead of
{invalid,revoked,expired,-,unknown,marginal,trusted}

At the moment, it's possible to have a key that is "Key Validity:
trusted", but "Owner Trust: untrusted", which is a pretty confusing
thing to see.

I'm happy to send patches, unless people have objections to this sort of
vocabulary cleanup.

--dkg

PS i'm very happy to see the build system cleanup.  it works well, and
has greatly simplified the debian packaging, which is awesome.  i plan
to upload a git snapshot into debian experimental in the next day or two.



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] Using Enigmail for mailing lists

2014-03-17 Thread Daniel Kahn Gillmor
On 03/16/2014 11:46 AM, Boris Month wrote:

> me and some friends of mine want to exchange encrypted emails on our
> mailing list. Does enigmail support encryption for multiple recepients?
> How would you encrypt information on a mailing list?

You might be interested in schleuder, which is an encrypted re-mailer
that is actively-maintained:

  http://schleuder2.nadir.org/

You might also be interested in SELS, which isn't currently maintained,
but has some interesting (and unusual) cryptographic properties:

 http://sels.ncsa.illinois.edu/

The enigmail-users mailing list we're using uses mailman, which doesn't
support encrypted messages (this is a reasonable choice for a mailing
list with public archives anyway).  But Abhilash Raj has recently done a
large chunk of work to try to get mailman ready to deal with
cryptographically signed messages (i regret that i haven't had a chance
to review it more closely -- maybe someone else wants to take a look?).
 If the key management is done sensibly, Abhilash's work should provide
a great foundation to be able to have an encrypted mailman installation.

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


[Enigmail] message with unrelated header verification

2014-02-22 Thread Daniel Kahn Gillmor
hi enigmail folks--

i know a few people have reported seeing a message verification pane
that was unrelated to the message shown beneath it.

We just got another one of these reports at
https://bugs.debian.org/739828 for version 1.5.2.

Is this problem believed to be solved in more recent versions?  I
haven't been able to replicate it myself with 1.6 today, but maybe
there's just a timing issue?

If this is a known bug, is there a specific bug id i should look for?

I wasn't able to find it at http://sourceforge.net/p/enigmail/bugs/search/.

Thanks for any info you might shed on the situation,

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


[Enigmail] [PATCH] use https for enigmail URL

2014-02-22 Thread Daniel Kahn Gillmor
---
 configure.ac | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/configure.ac b/configure.ac
index f1b97c9..bbb3d13 100644
--- a/configure.ac
+++ b/configure.ac
@@ -2,7 +2,7 @@
 AC_PREREQ(2.61)
 min_automake_version="1.10"
 
-AC_INIT([enigmail],[1.6], [http://www.enigmail.net])
+AC_INIT([enigmail],[1.6], [https://www.enigmail.net])
 
 
 AC_PATH_PROG(PYTHON, "python")
-- 
1.8.5.3


___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] How do I choose amongst multiple keys for a recipient?

2014-02-05 Thread Daniel Kahn Gillmor
On 02/05/2014 10:06 AM, Onno Ekker wrote:
> Well, to me it would also make sense to encrypt to the newest key by
> default (by creation date), which would eliminate the need to create a per
> recipient rule in most cases...
> Having per recipient rules also brings the necessity to manage and maintain
> those rules.

furthermore, for those of us who use GnuPG with MUAs other than
enigmail, per-recipient rules in enigmail don't translate to the other
clients, which creates a syncing problem.

Unfortunately, gnupg is pretty silly about its default choice of key
when asked for a match for a specific e-mail address: it chooses the
first key with that address in its list of User IDs based on a
sequential scan of ~/.gnupg/pubring.gpg.  You can figure out what the
sequential ordering is with: "gpg --list-keys ''" --
the order they are emitted is the order in the keyring.

If your keyring has two keys, 0x and 0x,
in that order in your pubring, both with the UID of "Alice
", and you want gpg to propose 0x
when you send mail to al...@example.org, you'll need to remove
0x from your keyring and then re-add it (which moves it
to the end).

I use the attached simple bash script "bumpkeytoend" to do this sort of
shuffling (it may not work with shells other than bash).  In the above
scenario, i'd invoke it as:

  bumpkeytoend 0x

Note that the script is designed to preserve non-local signatures.  Also
note that although it prompts the user whether they want to "delete the
key from the keyring", if they say "yes", the old key will be re-added
at the end of the keyring.  I haven't bothered to smooth out this
clumsiness.

Regards,

--dkg


#!/bin/bash

set -e

aa="$(gpg --export --export-options export-local --armor "$1")"
gpg --delete-key "$1"
gpg --import --import-options import-local <<<"$aa"



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] signing broken, sometimes

2014-01-30 Thread Daniel Kahn Gillmor
On 01/30/2014 09:08 AM, Nathan Andrew Fain wrote:
> it appears the enigmail has issues when the text of lines will get
> wrapped. What I believe is happening is that the signature is made
> before the text is converted to its unformatted version and
> line-wrapped. So, the signature is created on this email before this
> line gets wrapped. Then when the signature is checked again after the
> text has already been wrapped the new line breaks calls the signature to
> fail. I confirmed this by taking the failing signature and mail and
> removing all line breaks and then passing it through gpg. When doing
> this the signature is successful again. This also explains why when
> editing the failed mail as a new mail the signature does not fail as the
> line wrapping is already applied in the new mail.

Your current message was signed using inline PGP (i can confirm tha this
most recent message you sent to the list appears to have a broken
signature).

Does the same problem happen for you when using PGP/MIME instead?

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] how to find out to which key a mail was sent

2014-01-28 Thread Daniel Kahn Gillmor
On 01/28/2014 02:35 AM, Patrick Brunschwig wrote:
> gpg --list-packets 

This indicates which keys the given e-mail *appears* to be encrypted to;
but without the secret key material for each key, it's not possible to
verify that the message is actually decryptable by that key.

That is, it's possible to create a PK-ESK OpenPGP packet with a spoofed
target key ID field (and it's even documented in the spec that a target
key ID field of all-zeros is commonly used as a "hidden" recipient).

   https://tools.ietf.org/html/rfc4880#section-5.1

This is probably not surprising if you've thought about the underlying
math and the way it fits into the OpenPGP protocol, but it's worth
noting explicitly, lest other folks get the idea that the presence (or
absence) of a key ID in a PK-ESK on a given message is some sort of
guarantee that the message is decryptable (or not) by that key.

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] Citation gone upon connection failure

2014-01-24 Thread Daniel Kahn Gillmor
On 01/24/2014 10:49 AM, Patrick Brunschwig wrote:
> On 23.01.14 21:07, David wrote:
>> Do I understand this correctly? This bug was discovered in 1.6,
>> and still is, and that this bug is also present in 1.7a1pre? And
>> still is unrepaired?
> 
> 
> Yes, and the workaround is simple: press Ctrl-Z (undo) two or three times.

Or use PGP/MIME, which is not affected by this problem.

This bug only affects inline-PGP-signed messages.

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] [PATCH] select only the first fingerprint for any key, instead of the last

2014-01-10 Thread Daniel Kahn Gillmor
On 01/10/2014 11:45 AM, Robert J. Hansen wrote:
> Nothing can replace proper certificate validation.  

completely agreed.

> If I have a
> certificate 0xDEADBEEF that I have validated and signed, and someone
> else maliciously inserts a certificate 0xDEADBEEF (a different cert, but
> one that has the same short ID) into my keyring, well -- what of it? 
> It's trivial to tell the difference between a validated and an
> unvalidated certificate.  GnuPG will even give a conspicuous warning
> about it.

Right.  But in this case, we shouldn't be referring to key IDs at all,
but rather to real human-comprehensible data, like the User ID, or the
key creation date.

That is: if we're going to be referring to keys by things that are
spoofable and relying on proper certificate validation to weed out bad
keys, you are better off referring to the keys by human-sensible terms,
rather than expecting humans to deal with hexadecimal gibberish.

Even more strongly -- the thing the mail user agent cares about is (and
should be) the User ID, not the key ID.  Consider the situation when
Alice's key has ID 0xDEADBEEF, and her friend Bob has a wicked sense of
humor (or terrible luck), whose key (marked with his name and e-mail
address) happens to have a short keyID that is also 0xDEADBEEF, it's
conceivable that Carol could meet and verify the keys of both Bob and
Alice's key.  now both are valid.  when carol sends mail to Alice, she
should send it to the valid key *that matches alice's e-mail address*

So key IDs + validity don't actually solve the problem of "which key
should i use?" since both keys in the situation described have the same
validity.  And they're not human-comprehensible (hard to remember, hard
to communicate to other humans).  And they're not collision-resistant.
And they are forgeable (short keyids trivially so).

There is no good use case for key IDs that i can see.

> Where I see the need for full fingerprint IDs is in those situations
> where people have instructed GnuPG and/or Enigmail to consider all
> certificates to be valid.  My preferred solution for that is to tell
> people to stop living in sin, not to tell them to shift to full
> fingerprint identification.  :)

But we need fingerprint identification to be able to do certificate
validation, which is the only way to "stop living in sin".  So we need
the fingerprint to be displayed correctly.

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] [PATCH] select only the first fingerprint for any key, instead of the last

2014-01-10 Thread Daniel Kahn Gillmor
On 01/10/2014 04:56 AM, Patrick Brunschwig wrote:
> I'm sure that adding "fingerprint" or "with-fingerprint" to gpg.conf
> will cause more issues in Enigmail than just the one found in Bug 239,
> including situations where Enigmail will fail because it requires that
> the option is not present. I strongly recommend to NOT add this option
> to gpg.conf.

Can you point to some of these places?  I've been using enigmail daily,
with "fingerprint" in my gpg.conf for several months.

I think including "fingerprint" in gpg.conf is important because if
people are trying to refer to specific keys, i don't believe that either
the short or long keyid is a reasonable identifier [0].

If enigmail needs to know what all command line options are to get
stable output, as mentioned in the bug report [1], then the only way to
do that robustly given gpg's lack of a --withough-fingerprint option is
to explicitly add --fingerprint --fingerprint (twice so that we get
subkey fingerprints too) to gpg every time too), and deal with parsing
the output correctly.  I'm happy to send a patch for this as well if you
like.

Patrick, if you could point out places where you think enigmail can't
handle the presence of --fingerprint, i'm happy to try to send patches
to fix them too.

Regards,

--dkg

[0] https://www.debian-administration.org/users/dkg/weblog/105
[1] https://sourceforge.net/p/enigmail/bugs/239/#29bc



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


[Enigmail] [PATCH] select only the first fingerprint for any key, instead of the last

2014-01-09 Thread Daniel Kahn Gillmor
This addresses http://sourceforge.net/p/enigmail/bugs/239/
---
 ui/content/enigmailCommon.js | 5 -
 1 file changed, 4 insertions(+), 1 deletion(-)

diff --git a/ui/content/enigmailCommon.js b/ui/content/enigmailCommon.js
index b10375c..e19d9b0 100644
--- a/ui/content/enigmailCommon.js
+++ b/ui/content/enigmailCommon.js
@@ -1008,7 +1008,10 @@ function EnigGetKeyDetails(sigListStr) {
   subkeyList.push(aLine);
   break;
 case "fpr":
-  fingerprint = aLine[9];
+  // only select the first fingerprint, in case the user has "fingerprint" 
specified in gpg.conf
+  if (null == fingerprint) {
+fingerprint = aLine[9];
+  }
   break;
 }
   }
-- 
1.8.5.2


___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] default settings for key servers in enigmail

2014-01-05 Thread Daniel Kahn Gillmor
On 01/04/2014 11:34 PM, Kosuke Kaizuka wrote:
> ha.pool.sks-keyservers.net is also a good candidate.
> 
> https://sks-keyservers.net/overview-of-pools.php
>> This is a high-availibility subset of the pool. At the moment it
>> only includes servers running a reverse proxy rather than exposing
>> sks directly to the clients.

actually, kristian recently decided to make membership in
pool.sks-keyservers.net require a reverse proxy, so there's no need to
refer explicitly to ha.pool (see the thread on sks-devel that started on
Oct. 28, titled "reverse proxies and the pool")

Regards,

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] default settings for key servers in enigmail

2014-01-04 Thread Daniel Kahn Gillmor
On 01/04/2014 04:09 PM, Ludwig Hügelschäfer wrote:
> pool.sks-keyservers.net yields 20 addresses, 10 IPv6, 10 IPv4. This is
> the keyserver network I'm using and it worked reliably for me the last
> years.
> 
> keys.gnupg.net yields 20 addresses, 10 IPv6, 10 IPv4. Most of them are
> identical to those from pool.sks-keyservers.net, and should be as
> reliable as pool.sks-keyservers.net.

0 dkg@alice:~$ dig +short CNAME keys.gnupg.net
pool.sks-keyservers.net.
0 dkg@alice:~$

 :)

> Enter pool.sks-keyservers.net or keys.gnupg.net should be entered first
> in the list of keyservers. subkeys.pgp.net should neither be used nor
> entered by Enigmail per default.

I agree with this suggestion.  Kristian has done a great job at making
sure that the pool is functional and effective.  it should be the
standard default.

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] behaviour of enigmail 1.6 in Thunderbird 24.2.0

2013-12-15 Thread Daniel Kahn Gillmor
Hi Philip--

thanks for your thoughtful review of these scenarios.  i only have time
to respond to one of them now, but i think they all warrant further
review and probably some functionality changes.

On 12/15/2013 12:43 PM, Philip Jackson wrote:
 [a bunch of good diagnostics snipped]

> Fourth case :  sender's key imported, Thunderbird restarted, trust level set 
> to
> 'unknown' and sender's key signed by me.  Thunderbird displays a green band 
> with
> the message 'Part of the message signed; click on 'Details' button for more
> information + key ID and date signed.'
> 
> The date signed is given as today's date and the time as when the email was
> first opened, I think - but I actually signed this key last October (according
> to Kleopatra).

In this case, enigmail is reporting the date that e-mail was signed, not
that the sender's OpenPGP certificate (a.k.a. "public key") was
certified.  Since OpenPGP certificates are multi-issuer, there can be
many certifications on any given cert, and they can all have different
times.  It only makes sense in this context for thunderbird to report
the message signature time, i think.

Is there a way you could re-phrase the enigmail header that would
clarify that the time/date reported is the message signature timestamp
instead of the certificate's certification timestamp?

--dkg





signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] Key not found or not valid

2013-12-14 Thread Daniel Kahn Gillmor
On Wed 2013-01-16 09:12:09 -0500, Patrick Brunschwig wrote:
> On 15.01.13 21:10, Daniel Kahn Gillmor wrote:
>> Question B --
>> 
>> Would patches be welcome to improve the terminology around validity
>> and trust?
>
> Sure, yes :-)

It's been a while, but I've finally sent a patch to the list that
resolves one of the major discrepancies:

 
https://lists.enigmail.net/pipermail/enigmail-users_enigmail.net/2013-December/001182.html

but none of the patches in that set have had any response on the list.
maybe they got filtered out somehow?

anyway, feedback is welcome!

Regards,

--dkg


pgp534d5sT68t.pgp
Description: PGP signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] "Automatically decrypt/verify messages" not working in 1.6 or 1.5?

2013-12-14 Thread Daniel Kahn Gillmor
On 12/14/2013 09:23 AM, Patrick Brunschwig wrote:
> On 13.12.13 22:29, Daniel Kahn Gillmor wrote:
>> in http://bugs.debian.org/732067, a user reports that the checkbox 
>> "Automatically decrypt/verfiy messages" in the OpenPGP menu isn't 
>> working any more.
> 
>> Apparently, the menu option is only available when "show expert 
>> preferences" is chosen in the OpenPGP preferences dialog.
> 
>> The inital report came in about version 1.5, but i can confirm the
>> same misbehavior with 1.6.
> 
>> can other people test if this option works for them?
> 
> Please re-read the bug report. It is not about "Automatically
> decrypt/verfiy messages" but about the fact that the user has to type
> the password every time. The menu option is about attempting to
> decrypt the email, and not related to any password timeout settings...

I agree that the report mixes the two things; but i'm pretty sure the
issue is about "automatically decrypt/verify messages".  I've asked the
original reporter to clarify on the bug report; hopefully that will help.

Anyhow, in my testing, it does look to me like the "automatically
decrypt/verify messages" checkboxed menuentry doesn't have the desired
effect, at least on icedove 24.1.1 and enigmail 1.6.

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


[Enigmail] "Automatically decrypt/verify messages" not working in 1.6 or 1.5?

2013-12-13 Thread Daniel Kahn Gillmor
in http://bugs.debian.org/732067, a user reports that the checkbox
"Automatically decrypt/verfiy messages" in the OpenPGP menu isn't
working any more.

Apparently, the menu option is only available when "show expert
preferences" is chosen in the OpenPGP preferences dialog.

The inital report came in about version 1.5, but i can confirm the same
misbehavior with 1.6.

can other people test if this option works for them?

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


[Enigmail] [PATCH 1/4] avoid mixing declarations and code for compliance with C90

2013-12-10 Thread Daniel Kahn Gillmor
Without this patch, pedantic C compilers will choke with messages
like:

ipc/src/subprocess.c:71:5: error: ISO C90 forbids mixed declarations and code 
[-Werror=pedantic]
 int countFd = 0;
 ^
ipc/src/subprocess.c:91:5: error: ISO C90 forbids mixed declarations and code 
[-Werror=pedantic]
 int i;
 ^
ipc/src/subprocess.c:60:15: error: unused variable ‘fd’ 
[-Werror=unused-variable]
   int *const *fd;
   ^
cc1: all warnings being treated as errors
make: *** [ipc/src/subprocess.o] Error 1
---
 ipc/src/subprocess.c | 7 ++-
 1 file changed, 2 insertions(+), 5 deletions(-)

diff --git a/ipc/src/subprocess.c b/ipc/src/subprocess.c
index 92d20b5..5343120 100644
--- a/ipc/src/subprocess.c
+++ b/ipc/src/subprocess.c
@@ -57,10 +57,11 @@ pid_t launchProcess(const char *path,
   pid_t pid;
 
   int mergeStderr = (fd_err ? 0 : 1);
-  int *const *fd;
 
   pid = fork();
   if (pid == 0) {
+int countFd = 0;
+int i;
 /* child */
 if (workdir) {
   if (chdir(workdir) < 0) {
@@ -68,7 +69,6 @@ pid_t launchProcess(const char *path,
   }
 }
 
-int countFd = 0;
 while (dupFds[countFd] > 0) {
   ++countFd;
 }
@@ -87,13 +87,10 @@ pid_t launchProcess(const char *path,
 
 dup(mergeStderr ? fd_out[1] : fd_err[1]);
 
-
-int i;
 for (i=0; ihttps://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


[Enigmail] [PATCH 2/4] All keys should be shown by default in the key manager

2013-12-10 Thread Daniel Kahn Gillmor
the key manager's "Show all keys by default" checkbox is useful mainly
for people with large keyrings, who are likely to be experienced
users.

An experienced user can check the box and won't mind doing so.  The
default case should therefore be for inexperienced users, who would be
otherwise baffled by the empty list of keys, even though they know
they have a few keys fetched already.
---
 package/prefs/enigmail.js | 2 +-
 ui/content/enigmailKeyManager.xul | 2 +-
 2 files changed, 2 insertions(+), 2 deletions(-)

diff --git a/package/prefs/enigmail.js b/package/prefs/enigmail.js
index d891850..23d5d91 100644
--- a/package/prefs/enigmail.js
+++ b/package/prefs/enigmail.js
@@ -119,7 +119,7 @@ pref("extensions.enigmail.logDirectory","");
 pref("extensions.enigmail.keepSettingsForReply",true);
 
 // display all or no keys by default in the key manager
-pref("extensions.enigmail.keyManShowAllKeys",false);
+pref("extensions.enigmail.keyManShowAllKeys",true);
 
 
 // list of keyservers to use
diff --git a/ui/content/enigmailKeyManager.xul 
b/ui/content/enigmailKeyManager.xul
index 6d52a86..82973ce 100644
--- a/ui/content/enigmailKeyManager.xul
+++ b/ui/content/enigmailKeyManager.xul
@@ -403,7 +403,7 @@
  oncommand="onSearchInput();"/>
 
 
-- 
1.8.5.1


___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


[Enigmail] [PATCH 4/4] User Selection dialog should say "Validity" instead of "Trust"

2013-12-10 Thread Daniel Kahn Gillmor
The data shown in the "Trust" column of the User Selection dialog box
is actually the validity of the User ID, not the ownertrust in the
key.

This fix aligns this column header in the User Selection dialog with
the similar column header in the Key Management dialog.
---
 src/nsEnigMsgCompose.cpp |  3 +--
 ui/content/enigmailUserSelection.js  | 28 ++--
 ui/content/enigmailUserSelection.xul |  4 ++--
 ui/locale/en-US/enigmail.dtd |  1 +
 4 files changed, 18 insertions(+), 18 deletions(-)

diff --git a/src/nsEnigMsgCompose.cpp b/src/nsEnigMsgCompose.cpp
index 2bc3f7a..bd4928a 100644
--- a/src/nsEnigMsgCompose.cpp
+++ b/src/nsEnigMsgCompose.cpp
@@ -77,10 +77,9 @@ nsEnigMsgCompose::nsEnigMsgCompose()
 
 nsEnigMsgCompose::~nsEnigMsgCompose()
 {
-  nsresult rv;
 #ifdef FORCE_PR_LOG
   nsCOMPtr myThread;
-  rv = ENIG_GET_THREAD(myThread);
+  ENIG_GET_THREAD(myThread);
   DEBUG_LOG(("nsEnigMsgCompose:: > DTOR(%p): myThread=%p\n",
  this, myThread.get()));
 #endif
diff --git a/ui/content/enigmailUserSelection.js 
b/ui/content/enigmailUserSelection.js
index baaba7e..da462fc 100644
--- a/ui/content/enigmailUserSelection.js
+++ b/ui/content/enigmailUserSelection.js
@@ -518,16 +518,16 @@ function enigmailBuildList(refresh) {
 
 
 // create a (sub) row for the user tree
-function enigUserSelCreateRow (userObj, activeState, userId, keyValue, 
dateField, trustStatus, uidValid) {
+function enigUserSelCreateRow (userObj, activeState, userId, keyValue, 
dateField, uidValidityStatus, uidValid) {
   var selectCol=document.createElement("treecell");
   selectCol.setAttribute("id", "indicator");
-  var trustCol=document.createElement("treecell");
+  var uidValidityCol=document.createElement("treecell");
   var expCol=document.createElement("treecell");
   var userCol=document.createElement("treecell");
 
   userCol.setAttribute("id", "name");
   expCol.setAttribute("id", "expiry");
-  trustCol.setAttribute("id", "trust");
+  uidValidityCol.setAttribute("id", "validity");
 
   userCol.setAttribute("label", userId);
   expCol.setAttribute("label", EnigGetDateTime(dateField,true, false));
@@ -540,36 +540,36 @@ function enigUserSelCreateRow (userObj, activeState, 
userId, keyValue, dateField
 keyCol.setAttribute("label", EnigGetString("keyTrust.group"));
   keyCol.setAttribute("id", "keyid");
 
-  var trust=EnigGetTrustLabel(trustStatus.charAt(0));
+  var validity=EnigGetTrustLabel(uidValidityStatus.charAt(0));
   if (!uidValid) {
 userCol.setAttribute("properties", "enigKeyInactive");
-trustCol.setAttribute("properties", "enigKeyInactive");
+uidValidityCol.setAttribute("properties", "enigKeyInactive");
 expCol.setAttribute("properties", "enigKeyInactive");
 keyCol.setAttribute("properties", "enigKeyInactive");
-trust=EnigGetString("keyTrust.untrusted");
+validity=EnigGetString("keyTrust.untrusted");
   }
-  if (!userObj.subkeyOK && KEY_NOT_VALID.indexOf(trustStatus.charAt(0))<0) {
-trust=EnigGetString("keyValid.noSubkey");
+  if (!userObj.subkeyOK && 
KEY_NOT_VALID.indexOf(uidValidityStatus.charAt(0))<0) {
+validity=EnigGetString("keyValid.noSubkey");
   }
   if (((userObj.keyTrust.length>0) &&
   (KEY_NOT_VALID.indexOf(userObj.keyTrust.charAt(0))>=0)) ||
   (!userObj.subkeyOK) ||
   ((!gAlwaysTrust) && ("mfu".indexOf(userObj.keyTrust.charAt(0))<0)) ||
-  ((!gAlwaysTrust) && trustStatus.length>0 &&
-("o-qn".indexOf(trustStatus.charAt(0))>=0))) {
+  ((!gAlwaysTrust) && uidValidityStatus.length>0 &&
+("o-qn".indexOf(uidValidityStatus.charAt(0))>=0))) {
 userCol.setAttribute("properties", "enigKeyInactive");
-trustCol.setAttribute("properties", "enigKeyInactive");
+uidValidityCol.setAttribute("properties", "enigKeyInactive");
 expCol.setAttribute("properties", "enigKeyInactive");
 keyCol.setAttribute("properties", "enigKeyInactive");
 if (!gAllowExpired && activeState>=0) activeState=2;
   }
 
   EnigSetActive(selectCol, activeState);
-  trustCol.setAttribute("label", trust);
+  uidValidityCol.setAttribute("label", validity);
   var userRow=document.createElement("treerow");
   userRow.appendChild(selectCol);
   userRow.appendChild(userCol);
-  userRow.appendChild(trustCol);
+  userRow.appendChild(uidValidityCol);
   userRow.appendChild(expCol);
   userRow.appendChild(keyCol);
   var treeItem=document.createElement("treeitem");
@@ -676,7 +676,7 @@ function enigmailUserSelCallback(event) {
 if ((event.detail == 1) && (col.value.id != "selectionCol"))
   return; // single clicks are only relvant for the selection column
 
-if ((event.detail == 2)  && 
("selectionCol,enigUserNameCol,trustCol,expCol,keyCol".indexOf(col.value.id) < 
0))
+if ((event.detail == 2)  && 
("selectionCol,enigUserNameCol,uidValidityCol,expCol,keyCol".indexOf(col.value.id)
 < 0))
   return;
 
 event.stopPropagation();
diff --git a/ui/content/enigmailUserSelection.xul 
b/ui/content/eni

[Enigmail] [PATCH 3/4] Fix english grammar

2013-12-10 Thread Daniel Kahn Gillmor
---
 ui/locale/en-US/enigmail.properties | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/ui/locale/en-US/enigmail.properties 
b/ui/locale/en-US/enigmail.properties
index 74021fa..ea5141a 100644
--- a/ui/locale/en-US/enigmail.properties
+++ b/ui/locale/en-US/enigmail.properties
@@ -287,7 +287,7 @@ selKeyExpired=expired %S
 createdHeader=Created
 keyInvalid=INVALID KEY
 keyDisabled=DISABLED KEY
-atLeastOneKey=No key selected! You have to select at least one key for 
accepting this dialog
+atLeastOneKey=No key selected! You have to select at least one key to accept 
this dialog
 fewerKeysThanRecipients=You have selected a smaller number of keys than 
recipients. Are you sure that the list of keys to encrypt is complete?
 userSel.button.goBack=Select more Keys
 userSel.secretKeySel.title=Select a Secret OpenPGP Key to Sign Your Messages
-- 
1.8.5.1


___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


[Enigmail] [PATCH 2/2] add subprocess support for GNU/kFreeBSD (debian)

2013-11-14 Thread Daniel Kahn Gillmor
This patch records the library name and constants expected for debian
GNU/kFreeBSD.  Without this line, enigmail 1.6 on that platform
fails with:

[ERROR] enigmail.js: Enigmail.setAgentPath: subprocess.call failed with 
'TypeError: platformDefaults[gXulRuntime.OS.toLowerCase(...)] is undefined'
---
 ipc/modules/subprocess.jsm | 1 +
 1 file changed, 1 insertion(+)

diff --git a/ipc/modules/subprocess.jsm b/ipc/modules/subprocess.jsm
index 7b3ccd6..3de6ccc 100644
--- a/ipc/modules/subprocess.jsm
+++ b/ipc/modules/subprocess.jsm
@@ -333,6 +333,7 @@ function getPlatformValue(valueType) {
 'darwin':  [ 'libc.dylib',   0x04 , ctypes.uint64_t , 8 ],
 'linux':   [ 'libc.so.6',2024 , ctypes.unsigned_long, 7 ],
 'freebsd': [ 'libc.so.7',0x04 , ctypes.int64_t  , 8 ],
+'gnu/kfreebsd': [ 'libc.so.0.1', 0x04 , ctypes.int64_t  , 8 ],
 'openbsd': [ 'libc.so.61.0', 0x04 , ctypes.int64_t  , 8 ],
 'sunos':   [ 'libc.so',  0x80 , ctypes.unsigned_long, 5 ]
 };
-- 
1.8.4.2


___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


[Enigmail] [PATCH 1/2] deal with XPCOM_ABI names with slash (like "GNU/kFreeBSD")

2013-11-14 Thread Daniel Kahn Gillmor
Without this patch, the sed expressions in genxpi get tripped up when
they encounter an XPCOM_ABI with a slash in it.
---
 genxpi | 5 +++--
 1 file changed, 3 insertions(+), 2 deletions(-)

diff --git a/genxpi b/genxpi
index eb484fd..0d7608f 100755
--- a/genxpi
+++ b/genxpi
@@ -63,8 +63,9 @@ if [ "$xpcomAbi" = "" ] ; then
   xpcomAbi="unknown"
 fi
 platform=${osArch}_${xpcomAbi}
+escplatform="$(printf "%s" "${platform}" | sed 's_/_\\/_g')"
 # Pepare install.rdf
-sed 's//'${platform}'<\/em:targetPlatform>/' < 
${srcDir}/package/install.rdf > ${targetDir}/install.rdf
+sed 's//'${escplatform}'<\/em:targetPlatform>/' < 
${srcDir}/package/install.rdf > ${targetDir}/install.rdf
 
 
 enigmimeDll=${libPrefix}enigmime${dllSuffix}
@@ -82,7 +83,7 @@ 
spDllFile=platform/${platform}/lib/${libPrefix}subprocess-${xpcomAbi}${dllSuffix
 touch ${targetDir}/chrome.manifest
 cp  ${targetDir}/chrome.manifest ${targetDir}/chrome.manifest.save
 cat  ${srcDir}/package/chrome.manifest | \
-sed  's/##ENIGMIMEDLL-PLACEHOLDER##/binary-component 
platform\/'${platform}'\/components\/'`basename ${enigDllFile}`' 
ABI='${platform}'/' \
+sed  's/##ENIGMIMEDLL-PLACEHOLDER##/binary-component 
platform\/'${escplatform}'\/components\/'`basename ${enigDllFile}`' 
ABI='${escplatform}'/' \
 > ${targetDir}/chrome.manifest
 
 # Prepare languages other than en-US
-- 
1.8.4.2


___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] debugging failed verification

2013-11-12 Thread Daniel Kahn Gillmor
On 11/12/2013 02:19 PM, ernie wrote:
> I have been following this thread for some time.

That's interesting, because i just started this thread a few hours ago!

> Out of curiosity, are these problems win a flavor of Widows or Linux?

I don't use Windows, so i don't know if these are problems on Windows.
I'm seeing them (and am trying to debug them, which is the point of this
thread) on a GNU/Linux platform.

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


[Enigmail] debugging failed verification

2013-11-12 Thread Daniel Kahn Gillmor
i'm trying to use the standard enigmail debugging capability to figure
out why a message is failing verification in enigmail.

The message is clearsigned PGP/MIME, and it verifes correctly in another
MUA (notmuch, using libgmime).  Other clearsigned PGP/MIME messages
verify correctly.

When i enable debugging, i'm hoping to get the post-processed data from
the MIME info in eniginp.txt.  however, because enigmail invokes gpg
twice (once for the verification and once for the user IDs to show in
the verification pane), the eniginp.txt i'm interested in (from the
verification) is getting overwritten by the second command (the call to
show the user IDs).

is there a standard way to work around this when debugging?  how should
i try to get the processed text of the message so i can compare it to
better-diagnose the MIME handling?

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] [PATCH 2/2] .xpi generation should fail if components are missing

2013-11-12 Thread Daniel Kahn Gillmor
On 11/12/2013 12:27 PM, Patrick Brunschwig wrote:
> This patch won't work for Thunderbird 19 and newer, as the referenced
> ${enigDllFile} (line 153) is only generated on Gecko version <= 18.
> Thus the files would not match.

this seems like something that genxpi should know about, no?  If it
knows that it's being built against TB 18 or earlier, it could set
${enigDLLFile} to the empty string.  does that make sense?

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] C99 adoption

2013-11-11 Thread Daniel Kahn Gillmor
On 11/11/2013 05:43 PM, Michael Norrish wrote:
> As for //, compilers have had this forever given that it's been in C++ 
> forever.

yes, of course all modern compilers have this option.  however, there's
no reason for gratuitous incompatibility against older compilers or for
people who for whatever reason don't want to enable --std=c99 behavior.
 The original patch posted causes no functional change in the code, it's
just a simple style cleanup.

I did not intend this to be controversial in any way!

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


[Enigmail] [PATCH v2] avoid warning: variable 'rv' set but not used [-Wunused-but-set-variable]

2013-11-11 Thread Daniel Kahn Gillmor
Sorry for the earlier version, which had not been tested properly.
hopefully this one makes more sense.

This patch allows the build to proceed cleanly when using
-Wunused-but-set-variable
---
 src/nsEnigMsgCompose.cpp | 3 +--
 1 file changed, 1 insertion(+), 2 deletions(-)

diff --git a/src/nsEnigMsgCompose.cpp b/src/nsEnigMsgCompose.cpp
index 2bc3f7a..bd4928a 100644
--- a/src/nsEnigMsgCompose.cpp
+++ b/src/nsEnigMsgCompose.cpp
@@ -77,10 +77,9 @@ nsEnigMsgCompose::nsEnigMsgCompose()
 
 nsEnigMsgCompose::~nsEnigMsgCompose()
 {
-  nsresult rv;
 #ifdef FORCE_PR_LOG
   nsCOMPtr myThread;
-  rv = ENIG_GET_THREAD(myThread);
+  ENIG_GET_THREAD(myThread);
   DEBUG_LOG(("nsEnigMsgCompose:: > DTOR(%p): myThread=%p\n",
  this, myThread.get()));
 #endif
-- 
1.8.4.2


___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


[Enigmail] [PATCH] avoid warning: variable 'rv' set but not used [-Wunused-but-set-variable]

2013-11-11 Thread Daniel Kahn Gillmor
This patch allows the build to proceed cleanly when using
-Wunused-but-set-variable and without FORCE_PR_LOG
---
 src/nsEnigMsgCompose.cpp | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/src/nsEnigMsgCompose.cpp b/src/nsEnigMsgCompose.cpp
index 2bc3f7a..91ca07e 100644
--- a/src/nsEnigMsgCompose.cpp
+++ b/src/nsEnigMsgCompose.cpp
@@ -77,8 +77,8 @@ nsEnigMsgCompose::nsEnigMsgCompose()
 
 nsEnigMsgCompose::~nsEnigMsgCompose()
 {
-  nsresult rv;
 #ifdef FORCE_PR_LOG
+  nsresult rv;
   nsCOMPtr myThread;
   rv = ENIG_GET_THREAD(myThread);
   DEBUG_LOG(("nsEnigMsgCompose:: > DTOR(%p): myThread=%p\n",
-- 
1.8.4.2


___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


[Enigmail] please tag 1.6 release in upstream git

2013-11-11 Thread Daniel Kahn Gillmor
hi there enigmail folks!

It looks to me like the released enigmail-1.6.tar.gz is drawn from
commit id a16b43c68c9a829034f44082c392e5f9fb42e864, but that commit is
not explicitly tagged (or maybe it's tagged, but the tag hasn't been
pushed to git://git.code.sf.net/p/enigmail/source).

Could someone publish a signed tag for enigmail 1.6 in the git
repository?

Thanks,

--dkg


pgpL7QfiG_pKn.pgp
Description: PGP signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] enigmail picks invalid key ID

2013-11-11 Thread Daniel Kahn Gillmor
On 11/11/2013 02:16 PM, Ludwig Hügelschäfer wrote:
> On 11.11.13 20:03, Kai Poeritz wrote:
> 
>> Why does Enigmail pick this old "038D1C4D" ID? How can I make it use the
>> right ID?
> 
> While admitting that the observed behaviour is not good, please keep to
> the recommendation: Set the key-Id to be used explicitly in account
> settings, OpenPGP section instead of relying on the email address to
> address the right key.

fwiw, i believe enigmail is just relying on gpg to select "the right
key" here, and gpg is failing to do the right thing.  In particular, gpg
seems to select a key for a given User ID based on the first match in a
linear scan of its public keyring.  This is suboptimal behavior for a
variety of reasons, but it doesn't look like the gnupg folks plan to fix
it until the (unknown) future release of the 2.1 version.

One way to work around this is to remove the old key from your gpg
keyring entirely.

another way is to "bump the old key to the end" so gpg finds the newer
key shows up first in its linear scan.  that'd look something like:

 gpg --armor --export $OLDKEYID > oldkey.asc
 gpg --delete-key $OLDKEYID
 gpg --import < oldkey.asc

hth,

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


[Enigmail] [PATCH 2/2] .xpi generation should fail if components are missing

2013-11-11 Thread Daniel Kahn Gillmor
Without this change, zip would happily carry on even if some elements
are missing due to other undetected failures in the build process.
It's better to catch errors in the .xpi generation at build time,
rather than at install or runtime.
---
 genxpi | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/genxpi b/genxpi
index eb484fd..d67ee3a 100755
--- a/genxpi
+++ b/genxpi
@@ -128,7 +128,7 @@ fi
 
 echo "Creating ${xpiFile} file"
 
-zip ${xpiFile} \
+zip --must-match ${xpiFile} \
 components/${xpiModule}.xpt \
 components/${xpiModule}.js \
 components/enigprefs-service.js \
-- 
1.8.4.2


___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


[Enigmail] [PATCH 1/2] Use standard C comments in subprocess.c

2013-11-11 Thread Daniel Kahn Gillmor
Including this patch makes it possible to build subprocess.c in a
compiler with strict rules about C comments.
---
 ipc/src/subprocess.c | 8 
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/ipc/src/subprocess.c b/ipc/src/subprocess.c
index 47ad18c..0019e7c 100644
--- a/ipc/src/subprocess.c
+++ b/ipc/src/subprocess.c
@@ -8,12 +8,12 @@
 
 void closeOtherFds(int fdIn, int fdOut, int fdErr) {
 
-  int maxFD = 256; // arbitrary max
+  int maxFD = 256; /* arbitrary max */
   int i;
   struct rlimit rl;
 
   if (getrlimit(RLIMIT_NOFILE, &rl) == 0) {
-  if (rl.rlim_cur <  99) // ignore too high numbers
+  if (rl.rlim_cur <  99) /* ignore too high numbers */
 maxFD = rl.rlim_cur;
   }
 
@@ -37,7 +37,7 @@ pid_t launchProcess(const char *path, char *const argv[], 
char *const envp[],
 
   pid = fork();
   if (pid == 0) {
-// child
+/* child */
 if (workdir) {
   if (chdir(workdir) < 0) {
 _exit(126);
@@ -60,6 +60,6 @@ pid_t launchProcess(const char *path, char *const argv[], 
char *const envp[],
 _exit(1);
   }
 
-  // parent
+  /* parent */
   return pid;
 }
-- 
1.8.4.2


___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] Keys do not show up in per-recipient rules

2013-10-20 Thread Daniel Kahn Gillmor
On 10/20/2013 08:34 AM, Martin Braun wrote:

> I have some keys in my keyring which I can access and edit through
> enigmails "Key Management" tool as well as any other GPG program. I'm
> sure they're valid keys and in the keyring.
> The keys are not expired, and I have also tried giving them a trust
> level

assigning "trust" (aka "ownertrust") to a key means that you are willing
to believe identity certifications made by that key.  it does not
indicate whether you think the key actually belongs to a given person.
in the context you're asking about (whether enigmail is willing to
encrypt mail sent to that key), this is not a relevant operation.  it is
also a risky operation (people to whom you have assigned full ownertrust
can effectively man-in-the-middle your communications by having you
encrypt them to the wrong keys.

> Now, when I try to actually use them from enigmail, they won't show up.
> When I try to use them from the per-recipient rules, they simply don't
> show up in the list. It's as if "Key Management" and the per-recipient
> key selection dialog have different keyrings -- but don't ask me where
> the latter gets its keys from; it seems like a random subset of my keys.

i'm assuming you're talking about the dialog box that opens when you
choose "select keys" from the "new" or "edit" sub-dialog of the
"per-recipient rules" workflow.  is that correct?  what version of
thunderbird are you using?  what version of enigmail?

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] Enigmail refuses to use unsigned key for encryption

2013-10-15 Thread Daniel Kahn Gillmor
Hi Ralf--

On 10/15/2013 05:14 PM, Ralf Jung wrote:

> why does Enigmail refuse to use an unsigned key for encryption? A friend
> of mine recently contacted me via encrypted mail, and while I was able
> to get her key from a keyserver, I couldn't get a signature for it, so I
> decided to do that later but reply now. However, after hitting "Send",
> when Enigmail asked me which key to use for encryption, her key was
> marked red and I wasn't able to encrypt the mail - so I had the choice
> of signing a key I did not verify at all, or sending an unencrypted
> email. Why is that?

enigmail relies on gpg for the association between keys and e-mail
addresses.  gpg understands (correctly) that the keys in your keyring
are effectively populated over the network (e.g. keyserver fetches) and
shouldn't be considered validly-bound to their claimed user IDs without
some other indication that the user does actually believe these keys to
belong to the indicated user.

This is a good thing -- it makes it so that if you import a key from
someone else who happens to claim to have your friend's e-mail address,
enigmail won't accidentally encrypt your messages to that other person.

In the situation you describe, where you suspect that a given key
belongs to your friend, and you are willing to use it for now, i would
use a time-limited (a few months perhaps?) local (a.k.a.
"non-exportable") signature on just the User ID i plan to correspond
with, and then do my best to confirm her key's fingerprint securely
within the time limit, so i could go ahead and do a regular keysigning.

hope this helps,

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] Bad signature

2013-10-09 Thread Daniel Kahn Gillmor
On 10/09/2013 05:47 PM, Bryant Evans wrote:
> Not sure my message earlier went through. Trying again. I am using
> PGP/MIME as suggested.

both of these PGP/MIME messages appear to have a valid signature from
Key fingerprint: 3FDD CDC3 F146 3309 7FEE F699 19C1 9D85 1C0B 95E5

So whatever problem you're running into appears to only manifest itself
when sending clearsigned inline PGP.

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] Bad signature

2013-10-09 Thread Daniel Kahn Gillmor
On 10/09/2013 07:01 AM, Klearchos-Angelos Gkountras wrote:
> have you upload your public key to pgp server ? try pgp.mit.edu

please do not recommend pgp.mit.edu [0].  If you're going to recommend
keyservers to the general public, you should recommend the
high-availability pool [1] at this point:

 ha.pool.sks-keyservers.net

> On 10/09/2013 01:56 PM, Bryant Evans wrote:
> 
>> Ok, I replied to the list to answer and question and my signature
>> came back bad. I sent myself a message, encrypted, and it came in
>> fine. What am I missing?

it sounds like you sent two messages:

 a) to the list, inline-PGP signed (i think you're talking about
Message-ID: <52552f34.2060...@bryantevans.com>)
 b) to yourself, encrypted

Note that encryption ≠ signing.  Was (b) itself signed?

(a) appears to be generated by enigmail 1.6 with gnupg 2.0.19 and
thunderbird 24 on windows.  I tried to verify it with key
0x3FDDCDC3F14633097FEEF69919C19D851C0B95E5 and also got BAD signature.

It looks to me like all of your inline-PGP-signed messages to this list
have unverifiable signatures.  can you try sending a PGP/MIME-signed
message to the list instead?  when composing a message, from the
"OpenPGP" menu, ensure that "Use PGP/MIME for this message" is checked.

Regards,

--dkg


[0] https://we.riseup.net/debian/openpgp-best-practices#dont-use-pgp-mit-edu
[1] https://sks-keyservers.net/overview-of-pools.php



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] PGP signature brakes text signature?

2013-09-20 Thread Daniel Kahn Gillmor
On 09/20/2013 05:30 AM, Antonio Kless wrote:

> I use Thunderbird 17.0.7 with Enigmail 1.5.2 (20130703-1322).
> 
> I have text signature configured for my email account into
> Thunderbird, it inserts signature automatically every time I send a
> message, by adding "--" and signature text after message's text (as in
> this current email message you reading).
> 
> When I sign message with PGP by Enigmail, the "--"  before text
> signature changes to "- --", this is annoying behavior, and I
> searching way to solve them.

This is due to the "dash-escaping" required of cleartext inline PGP
signatures:

  https://tools.ietf.org/html/rfc4880#section-7.1

You could avoid it by switching to PGP/MIME instead of using inline PGP.
 In thunderbird+enigmail, i think you can choose PGP/MIME by default for
message composition in "Acocunt Settings" » "OpenPGP Security" » "Use
PGP/MIME by default".

hth,

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


[Enigmail] help understanding the build process?

2013-09-16 Thread Daniel Kahn Gillmor
Hi Patrick and other enigmail folks--

I'm trying to better understand the enigmail build process so that i can
keep it up to date within debian.

I see that in the changes to 1.5.2 you've updated the source to use the
new mozilla build system (e.g. commit 283b077aa), but 1.5.2 is intended
to be used with thunderbird 17.0, which does not have the updated build
system.

Does this mean that 1.5.2 is built against upstream's beta sources
(prereleases of TB 24), but they effectively retain compatibility with
the older (17.0) "stable" releases?  Or was 1.5.2 built against the
TB 17 sources that were somehow integrated into the new build system?
I'm a little leery of trying to ship cross-built binaries so it would be
useful to me to know how you're doing the build for the binary packages
shipped on enigmail.net.

I'm still struggling with complexities of building enigmail from source,
so i might also be misusing the terms above.  I would welcome any
edifying corrections or clarifications :)

Thanks as always for your work on enigmail.  It is a great tool to have.

Regards,

--dkg


pgpmKYHi4l2KP.pgp
Description: PGP signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] Do I have to create a new revocation certificate if I change my passphrase?

2013-09-13 Thread Daniel Kahn Gillmor
On 09/13/2013 08:10 AM, Bob Williams wrote:

> Should I create a new revocation certificate if I change my
> passphrase? Or is the passphrase only 'local' to my secring.gpg?

Your old revocation certificate will still work.  Both the revocation
certificate and the public part of your key can be evaluated together
with no other information.

your passphrase belongs only to the secret part of your key, so it is
not relevant to the validity or interpretation of the revocation
certificate.

make sense?

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] enigmail verification problem with signed message/rfc822 subparts

2013-09-12 Thread Daniel Kahn Gillmor
[about Eduard Christian Dumitrescu 's proposal to
only display the signed parts of a multipart message that validates
successfully to avoid spoofed headers/footers]

On Thu 2013-05-30 06:10:37 -0400, Ludwig Hügelschäfer wrote:

> On 30.05.13 10:47, Patrick Brunschwig wrote:
>> 
>> This is only partially feasible. It will certainly work for inline
>> PGP, but I can't say anything about PGP/MIME. The next major version
>> of TB will most likely come with a new MIME processing library, and I
>> know nothing about it except that it should land on trunk more or
>> less soon. Given that I don't know what changes this will impose to
>> Enigmail, I certainly won't do anything for the moment.
>
> Full ack. This can only be a post Thunderbird 24 task given the limited
> resources we have. We'll see which TB code canges come (and probably
> need adaptations within Enigmail) until end of june when Thunderbird 24
> enters aurora channel. There are chances that fixes for the broken
> things will even take longer.

Have you had any chance to look at the TB MIME processing code in the
upcoming TB 24 to see if this approach is feasible?

Regards,

--dkg


pgpDk7FJNDI5C.pgp
Description: PGP signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] Enigmail Wizard does not find all of my PGP keys

2013-09-09 Thread Daniel Kahn Gillmor
On 09/09/2013 03:29 PM, Paul Johnson wrote:
> I'm using Icedove (Debian's Thunderbird) version 17.0.8 and Enigmail
> 
> I've got  several keys for different purposes.
> 
> $ gpg --list-keys | grep paul
> /home/pauljohn/.gnupg/pubring.gpg
> uid  Paul E. Johnson (PGP Key 20101104) 
> uid  Paul E. Johnson (2011-10-06 KU Rocks) 
> uid  Paul Johnson (Binary Package Signing Key)
> 
> uid  Paul E. Johnson (Debian Packaging) 
> 

your pipeline only lists user IDs, not keys, so it's difficult to tell
whether there are separate keys involved.  also, it lists public keys,
not secret keys.

maybe you don't actually have the secret key material available?

> I want to use the top one, "(PGP Key 20101104)" to sign emails, but the Wizard
> only finds 2, the ones named (2011-10-06 KU Rocks) and (Debian Packaging).

if that's the one on the public keyservers with that comment, try:

  gpg --list-secret-keys 0xE1F06E9541EB6004

does it show up there?

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] Development: Marking a message as "to be encrypted" before it is created

2013-08-19 Thread Daniel Kahn Gillmor
On 08/18/2013 06:41 AM, Max Maass wrote:
> As I do not have enough experience with the Enigmail Source yet, I
> have no idea where even to begin to look for them. So I would be very
> grateful for an idea on what to do next. If we want to keep the ML out
> of this (I don't know if this is interesting or annoying for everyone
> else on [Enigmail]), we can take this to personal eMail as well, if
> you want.

I can't speak for the rest of the mailing list, but i'm quite happy to
see this discussion on-list, and in the archives.  I find it useful,
even though i'm just lurking in this conversation.

Thanks for your work on extending enigmail to cover this use case more
smoothly.

Regards,

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] [Pkg-mozext-maintainers] Enigmail in Debian

2013-07-15 Thread Daniel Kahn Gillmor
On 07/15/2013 04:34 PM, Ximin Luo wrote:
> For xul-ext-gnome-keyring, I am building the extension twice, against both 
> xulrunner-dev *and* icedove-dev, then packaging both binaries into the same 
> XUL extension and using the appId to tell XPCOM to conditionally load the 
> correct one. Have a look at debian/rules for source, although I don't know if 
> the same strategy would be applicable to enigmail. I'm also not sure which 
> version of the xulrunner lib the Debian iceape uses.
> 
> http://packages.debian.org/sid/xul-ext-gnome-keyring
> https://github.com/infinity0/mozilla-gnome-keyring/tree/debian

This is a neat approach, but my understanding of enigmail is that the
the issue is not just building against different -dev environments;
there are actually changes in enigmail source between the different
versions that are aligned to the behavior of the corresponding MUA versions.

So i don't think just building the same source package twice against
different dev environments will do the trick :(

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


Re: [Enigmail] Enigmail in Debian

2013-07-15 Thread Daniel Kahn Gillmor
On 07/15/2013 02:37 PM, Klearchos-Angelos Gkountras wrote:

> I am using Debian Sid and icedove as my personal email programm and I
> didn't install enigmail via repos but with icedove's add-ons manager .
> Please describe in which branch of debian is the problem ;)

This goes against the general recommendations of the enigmail team --
their suggestion is that you install icedove/thunderbird and enigmail
from the same source; if you use your distro's version of the MUA, use
your distro's version of the plugin; if you use the "upstream" binary
distribution of the MUA, use the "upstream" binary distribution of the
plugin.

> don't forget that debian has three branches
> branchcode name
> 
> stable|  wheezy
> testing   |  jessie
> unstable  |  sid
> 

Andy's concern is about iceape (seamonkey) which is version 2.7.12-1 in
all three active suites of debian (wheezy, jessie, and sid).

icedove is now at version 17.0.7 in wheezy (thanks to a security
update), and enigmail was updated to match the icedove version. However,
iceape has not been similarly updated.  There appears to be less
developer time spent on iceape than on the other mozilla variants :(

So Andy is right that there are versioning issues with enigmail in
wheezy if you try to use it with iceape.

As one of the members of the debian project who is trying to keep
enigmail functional in debian, i'm not sure what the answer is.  We
would love to continue to support enigmail for iceape as well as
icedove, but i'm not sure what the right thing to do is.  if we're using
the system-installed locations, i don't see how we can have the two
versions of enigmail co-installable.

I'm cc'ing the mozilla extension packaging team on the e-mail to see if
anyone has any suggestions for resolving this conflict in a healthy way.

Sorry to not have any more productive answers myself,

--dkg



signature.asc
Description: OpenPGP digital signature
___
enigmail-users mailing list
enigmail-users@enigmail.net
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


<    1   2   3   4   >