2 ## The following options are only available if you have
3 ## compiled in S/MIME support
5 # If you compiled mutt with support for both PGP and S/MIME, PGP
6 # will be the default method unless the following option is set
9 # Uncoment this if you don't want to set labels for certificates you add.
10 # unset smime_ask_cert_label
12 # Passphrase expiration
15 # Global crypto options -- these affect PGP operations as well.
16 set crypt_autosign = yes
17 set crypt_replyencrypt = yes
18 set crypt_replysign = yes
19 set crypt_replysignencrypted = yes
20 set crypt_verify_sig = yes
22 # Section A: Key Management.
24 # The (default) keyfile for signing/decrypting. Uncomment the following
25 # line and replace the keyid with your own.
26 set smime_default_key="12345678.0"
28 # Uncommen to make mutt ask what key to use when trying to decrypt a message.
29 # It will use the default key above (if that was set) else.
30 # unset smime_decrypt_use_default_key
32 # Path to a file or directory with trusted certificates
33 set smime_ca_location="~/.smime/ca-bundle.crt"
35 # Path to where all known certificates go. (must exist!)
36 set smime_certificates="~/.smime/certificates"
38 # Path to where all private keys go. (must exist!)
39 set smime_keys="~/.smime/keys"
41 # These are used to extract a certificate from a message.
42 # First generate a PKCS#7 structure from the message.
43 set smime_pk7out_command="openssl smime -verify -in %f -noverify -pk7out"
45 # Extract the included certificate(s) from a PKCS#7 structure.
46 set smime_get_cert_command="openssl pkcs7 -print_certs -in %f"
48 # Extract the signer's certificate only from a S/MIME signature (sender verification)
49 set smime_get_signer_cert_command="openssl smime -verify -in %f -noverify -signer %c -out /dev/null"
51 # This is used to get the email address the certificate was issued to.
52 set smime_get_cert_email_command="openssl x509 -in %f -noout -email"
54 # Add a certificate to the database using smime_keys.
55 set smime_import_cert_command="smime_keys add_cert %f"
59 # Sction B: Outgoing messages
61 # Algorithm to use for encryption.
62 # valid choices are rc2-40, rc2-64, rc2-128, des, des3
63 set smime_encrypt_with="des3"
65 # Encrypt a message. Input file is a MIME entity.
66 set smime_encrypt_command="openssl smime -encrypt -%a -outform DER -in %f %c"
69 set smime_sign_command="openssl smime -sign -signer %c -inkey %k -passin stdin -in %f -certfile %i -outform DER"
73 #Section C: Incoming messages
75 # Decrypt a message. Output is a MIME entity.
76 set smime_decrypt_command="openssl smime -decrypt -passin stdin -inform DER -in %f -inkey %k -recip %c"
78 # Verify a signature of type multipart/signed
79 set smime_verify_command="openssl smime -verify -inform DER -in %s %C -content %f"
81 # Verify a signature of type application/x-pkcs7-mime
82 set smime_verify_opaque_command="\
83 openssl smime -verify -inform DER -in %s %C || \
84 openssl smime -verify -inform DER -in %s -noverify 2>/dev/null"
88 # Section D: Alternatives
90 # Sign. If you wish to NOT include the certificate your CA used in signing
91 # your public key, use this command instead.
92 # set smime_sign_command="openssl smime -sign -signer %c -inkey %k -passin stdin -in %f -outform DER"
94 # In order to verify the signature only and skip checking the certificate chain:
96 # set smime_verify_command="openssl smime -verify -inform DER -in %s -content %f -noverify"
97 # set smime_verify_opaque_command="openssl smime -verify -inform DER -in %s -noverify"