Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 05 Sep 2015 14:39:48 -0400
From:      jvarner@gmail.com
To:        ctm-users@freebsd.org
Cc:        Peter Wemm <peter@wemm.org>
Subject:   Re: Future of CTM
Message-ID:  <201509051839.t85IdmIJ047044@eden.local>

next in thread | raw e-mail | index | archive | help
(apologies for not replying to previous emails; just subscribed to
the list...)
Peter Wemm wrote:

> I have been trying to find an example of somebody who is actually
> verifying signatures before piping the messages to ctm_rmail.

I am such an example.  The following recipe is the one I use (I
use nmh, so for most people the pipe to rcvstore should be
replaced with a simple mailbox or maildir delivery):

:0
* ^X-BeenThere: ctm-ports-cur@freebsd.org
{

        :0 c: ${MAILDIR}/ctm-ports.${LOCKEXT}
        | rcvstore +ctm-ports -nounseen

        :0 c
        | gpg --no-default-keyring --keyring ${PMDIR}/ctm.key --verify

        :0 a
        | ctm_rmail -p ${HOME}/ctms/ports/pieces -d ${HOME}/ctms/ports/del=
tas -l ${PMDIR}/ctm.log
}

Where ctm.key was produced by importing and exporting the ascii
armored key from the mailman info page.  I did check to confirm
that modifying a signed CTM message will prevent ctm_rmail from
running (gpg exits with an status of 2, which prevents the 'a'
recipe from running).  I did not check to confirm that a
mis-signed message would not verify, but my presumption is that
the combination of --no-default-keyring and --keyring should
prevent that verification from working since the only key in the
specified keyring is the CTM signing key.





Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201509051839.t85IdmIJ047044>