Date: Mon, 07 Sep 2015 15:53:31 +0200 From: "Julian H. Stacey" <jhs@berklix.com> To: jvarner@gmail.com Cc: ctm-users@freebsd.org, Peter Wemm <peter@wemm.org> Subject: Re: Future of CTM Message-ID: <201509071354.t87DrVGV023261@fire.js.berklix.net> In-Reply-To: Your message "Sat, 05 Sep 2015 14:39:48 -0400." <201509051839.t85IdmIJ047044@eden.local>
next in thread | previous in thread | raw e-mail | index | archive | help
jvarner@gmail.com wrote: > (apologies for not replying to previous emails; just subscribed to > the list...) > Peter Wemm wrote: > > > I have been trying to find an example of somebody who is actually > > verifying signatures before piping the messages to ctm_rmail. > > I am such an example. The following recipe is the one I use (I > use nmh, so for most people the pipe to rcvstore should be > replaced with a simple mailbox or maildir delivery): > > :0 > * ^X-BeenThere: ctm-ports-cur@freebsd.org > { > > :0 c: ${MAILDIR}/ctm-ports.${LOCKEXT} > | rcvstore +ctm-ports -nounseen > > :0 c > | gpg --no-default-keyring --keyring ${PMDIR}/ctm.key --verify > > :0 a > | ctm_rmail -p ${HOME}/ctms/ports/pieces -d ${HOME}/ctms/ports/deltas -l ${PMDIR}/ctm.log > } Thanks for the example! I linked to it from http://ctm.berklix.org I'm studying it, before upgrading my http://berklix.com/~jhs/dots/.procmailrc.lists http://berklix.com/~jhs/src/bsd/jhs/bin/local/mail/ctm-freebsd-ports-incoming Suggestions: Line 1 s/:0/:0 Hw/ Line 11 s/:0 a/:0 Haw/ H is by default, but appending 'w', So if connecting to internet after days of absence, the 'w' should wait & thus reduce cpu load if mail includes an incoming flood of ctms for different paths, eg ports-cur src-9 src-10 etc that might otherwise run in parallel. Nit picking: ;-) Instead of * ^X-BeenThere: ctm-ports-cur@freebsd.org I use * ^Sender: (|owner\-)ctm-ports-cur(|\-bounces)@freebsd\.org Sender might be formaly correct, long term stable ? The 2nd ':' in ":0 c:" puzzled me. man 5 procmailrc shows you invoke a lockfile. No subsequent line uses your lock name, so why specify it "${MAILDIR}/ctm-ports.${LOCKEXT}" ? Is it so you know what to manually clear if something fails ? Why do you need a lockfile ? Is it gpg that needs the lockfile ? or would you have asserted a lock even if not using gpg ? (My non gpg ctm works, but I see bursts of errors which I guess are out of order mails, deltas or pieces to deltas, that dont always immediately build to an applicable ctm; is lockfile to mitigate that rather than particulary for gpg ?) man 5 procmailrc quotes opaquely: "A locallockfile on the recipe that marks the start of a non-forking nested block does not work as expected." > Where ctm.key was produced by importing and exporting the ascii > armored key from the mailman info page. OK, There's a common key in both http://lists.freebsd.org/mailman/listinfo/ctm-ports-cur http://lists.freebsd.org/mailman/listinfo/ctm-src4 & it works for src-10 too, so presumably all. Extracted with vi. mv ~/.gnupg ~/.gnupg.orig gpg --import \ ~/public_html/src/bsd/jhs/bin/local/mail/ctm-freebsd-gnupg-pubkey.asc mv ~/.gnupg/pubring.gpg \ ~/public_html/src/bsd/jhs/bin/local/mail/ctm-freebsd-gnupg-pubring.pgp rm -rf ~/.gnupg mv .gnupg.orig .gnupg In a Makefile (to test return result is 0 on success): gpg --verify --no-default-keyring --keyring \ ~/public_html/src/bsd/jhs/bin/local/mail/ctm-freebsd-gnupg-pubring.pgp \ /home/jhs/mail/CTM/36 cat ~/mail/CTM/36 | gpg --verify --no-default-keyring --keyring \ ~/public_html/src/bsd/jhs/bin/local/mail/ctm-freebsd-gnupg-pubring.pgp \ /home/jhs/mail/CTM/36 Both exit OK with next command running, though I saw: gpg: Good signature from "CTM Generator <ctm@freebsd.org>" gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs \ to the owner. I tried briefly but failed to get rid of the warning with gpg --edit-key trust 65FE4840 > I did check to confirm > that modifying a signed CTM message will prevent ctm_rmail from > running (gpg exits with an status of 2, which prevents the 'a' > recipe from running). Makefile errored both times when I tampered 1st char of delta or signature. > I did not check to confirm that a > mis-signed message would not verify, but my presumption is that > the combination of --no-default-keyring and --keyring should > prevent that verification from working since the only key in the > specified keyring is the CTM signing key. Sound reasonable. Thanks, & if you have time for questions above, great :-) Cheers, Julian -- Julian Stacey, BSD Linux Unix C Sys Eng Consultant Munich http://berklix.com Reply after previous text, like a play - Not before, which looses context. Indent previous text with "> " Insert new lines before 80 chars. Send plain text, Not quoted-printable, Not HTML, Not ms.doc, Not base64.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201509071354.t87DrVGV023261>