2014-10-10 Following the plans from yesterday, I finally made the mailing list for mmh ready to be used. Also registered it on Gmane. I didn't write a welcome message yet, because I want to wait until Gmane does archive the list. I have two PGP keys in active use: An old 1024D key and a newer 4096R key. Both are well integrated into the web of trust. The weaker key is the one I use for everyday work: signing and en- crypting email, signing software packages. The stronger key does only reside on hardware I control. I use it for signing software packages as well, but much less for email, because it's not available on the server where I do my emailing. If I receive encrypted mail from others, they usually encrypted with my stronger key -- that's understandable, of course. But this makes it more difficult for me: I need to copy the message on a self-controlled machine, decrypt it, then copy it back to the mail server. To ease this task, I wrote a script today: #!/bin/sh # # fetch remote messages, decrypt them locally, then push # the cleartext versions back to the remote machine # # depends on: ssh, mmh sshcmd='ssh -p1234 user@example.org' temp="`mktemp -d`" trap 'rm -rf "$temp"' 0 1 2 15 export MMH="$temp" echo "Path: $temp" >"$temp/profile" $sshcmd MMHC=/dev/null packf "${@:-c}" >"$temp/mbox" inc -file "$temp/mbox" mark -seq orig a for i in `scan -form '=%(msg)'` ; do mhpgp -w "$i" done for i in `scan -form '=%(msg)' !orig` ; do <`mhpath "$i"` $sshcmd MMHC=/dev/null rcvstore done # if inc(1) could read from stdin, then we could use # `packf !orig | $sshcmd inc' instead of the second loop. http://marmaro.de/lue/ markus schnalke