Date: Sat, 05 Sep 2015 14:39:48 -0400 From: jvarner@gmail.com To: ctm-users@freebsd.org Cc: Peter Wemm <peter@wemm.org> Subject: Re: Future of CTM Message-ID: <201509051839.t85IdmIJ047044@eden.local>
next in thread | raw e-mail | index | archive | help
(apologies for not replying to previous emails; just subscribed to
the list...)
Peter Wemm wrote:
> I have been trying to find an example of somebody who is actually
> verifying signatures before piping the messages to ctm_rmail.
I am such an example. The following recipe is the one I use (I
use nmh, so for most people the pipe to rcvstore should be
replaced with a simple mailbox or maildir delivery):
:0
* ^X-BeenThere: ctm-ports-cur@freebsd.org
{
:0 c: ${MAILDIR}/ctm-ports.${LOCKEXT}
| rcvstore +ctm-ports -nounseen
:0 c
| gpg --no-default-keyring --keyring ${PMDIR}/ctm.key --verify
:0 a
| ctm_rmail -p ${HOME}/ctms/ports/pieces -d ${HOME}/ctms/ports/del=
tas -l ${PMDIR}/ctm.log
}
Where ctm.key was produced by importing and exporting the ascii
armored key from the mailman info page. I did check to confirm
that modifying a signed CTM message will prevent ctm_rmail from
running (gpg exits with an status of 2, which prevents the 'a'
recipe from running). I did not check to confirm that a
mis-signed message would not verify, but my presumption is that
the combination of --no-default-keyring and --keyring should
prevent that verification from working since the only key in the
specified keyring is the CTM signing key.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201509051839.t85IdmIJ047044>
