On 05/06/14 03:28, Vincent Penquerc'h wrote:
> Maybe you could set your gpg to /usr/local/qubes-gpg-client-enigmail,
> which might contain something like:
>
> #!/bin/sh
> export QUBES_GPG_DOMAIN=$domainname
> exec /bin/qubes-gpg-client "$@"
>
> Or something similar as a workaround.
Thanks Vincent, this totally seems to work! At least, much better than
before. I can decrypt emails now, and it requires me to verify that I
want to let email talk to gpgvm.
One problem I'm having is, once I verify it it pops up a window from
gpgvm saying: "Do you allow VM 'email' to access your GPG keys (now and
for the following 300 seconds)?"
It works when I choose yes, but it doesn't seem to be caching this
decision for 300 seconds. It asks every single time, which ends up being
a lot of boxes to click through to do anything with enigmail.
Also, it looks like --list-secret-keys isn't implemented in
qubes-gpg-client. When I open enigmail's Key Management, I get this error:
Error - encryption command failed
/home/user/qubes-gpg-client-enigmail --charset utf-8 --display-charset
utf-8 --use-agent --no-tty --batch --no-tty --status-fd 2
--with-fingerprint --fixed-list-mode --with-colons --list-secret-keys
/bin/qubes-gpg-client: unrecognized option '--list-secret-keys'
Was this on purpose? I don't see any security problems with listing
secret keys, as long as --export-secret-keys and --export-secret-subkeys
don't work.
Also, I'm not able to send emails that are just signed by not encrypted.
When I try, I get this error in an OpenPGP Alert window:
Error - encryption command failed
But it's exciting that it finally works (somewhat) with enigmail.
Once these issues are worked out I'd be interested in writing a wiki
page describing how to set this up.
--
Micah Lee