KMail/S MIME: Difference between revisions

From KDE UserBase Wiki
(Created page with " {{Construction}} For a user with a startcom ssl certificate that needs to be imported into Kmail it is necessary to set up gpgsm to prepare the certificate so that it is trus...")
 
mNo edit summary
 
Line 1: Line 1:
{{Construction}}
 
For a user with a startcom ssl certificate that needs to be imported into Kmail it is necessary to set up gpgsm to prepare the certificate so that it is trusted and available to be imported into Kmail before s/mime signing and encryption can be used.  Without doing the set of preparatory procedures below Kmail will not accept the certificate and s/mime cannot be used.  
For a user with a startcom ssl certificate that needs to be imported into Kmail it is necessary to set up gpgsm to prepare the certificate so that it is trusted and available to be imported into Kmail before s/mime signing and encryption can be used.  Without doing the set of preparatory procedures below Kmail will not accept the certificate and s/mime cannot be used.  


Line 81: Line 81:


If using a self signed ssl certificate some steps from the above may need to be different.
If using a self signed ssl certificate some steps from the above may need to be different.
Within Kmail the keys can be managed using Kleopatra.
Now signing and encryption is possible in kmail.
Now signing and encryption is possible in kmail.

Latest revision as of 09:40, 19 October 2013

For a user with a startcom ssl certificate that needs to be imported into Kmail it is necessary to set up gpgsm to prepare the certificate so that it is trusted and available to be imported into Kmail before s/mime signing and encryption can be used. Without doing the set of preparatory procedures below Kmail will not accept the certificate and s/mime cannot be used.

It is gpgsm that is the ssl certificate backend handler in Kmail. First it is necessary to extract the keys and output to a .pem file

openssl pkcs12 -in startcom-private-2013 -out startcom-private-2013.pem -nodes 

where the certificate names need to be changed to match your own filenames.

Now export the private key to a new .p12 cert file

openssl pkcs12 -in startcom-private-2013.pem -export -out startcom-private-2013.p12 -nocerts -nodes 

Import the key into gpgsm

gpgsm --import startcom-private-2013.p12 

During the above you need the passphrase to open the certificate file, and also to create the new one during export.

Now one has to add the issuer certificates (CA + intermediate CA) into gpgsm if they are not already there. In a default arch linux KDE system these will not be present so this step is essential.

The following command will add about 100 CA certificates or more from the ca-certificates package, but you could also only add the specific CA's for your certificate if you want.

$ gpgsm --import /usr/share/ca-certificates/mozilla/* 

You will need to set the trust level and confirm key fingerprints for each one! Now check if your own key has been added:

$ gpgsm --list-secret-keys 

Make sure that .gnupg/gpgsm.conf has the correct content:

$ cat .gnupg/gpgsm.conf

###+++--- GPGConf ---+++###
debug-level basic
log-file socket:///home/mike/.gnupg/log-socket
###+++--- GPGConf ---+++### Fri 18 Oct 2013 17:43:12 BST
# GPGConf edited this configuration file.
# It will disable options before this marked block, but it will
# never change anything below these lines.
include-certs -1  # this will include all certificates in the chain up to the root
default-key xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx
# my private key is default 

Add default key to the file as above using the fingerprint from the previous list.

Now add the fingerprints to the trust file: Make sure that option "allow-mark-trusted" is in gpg-agent.conf

$ cat .gnupg/gpg-agent.conf
#
# gpg agent 
#
pinentry-program /usr/bin/pinentry-gtk
no-grab
# GPGConf disabled this option here at Wed 10 Aug 2005 11:17:28 AM EDT
# default-cache-ttl 1800


###+++--- GPGConf ---+++###
default-cache-ttl 14400
debug-level basic
log-file socket:///home/mike/.gnupg/log-socket
###+++--- GPGConf ---+++### Thu 17 Oct 2013 19:40:20 BST
# GPGConf edited this configuration file.
# It will disable options before this marked block, but it will
# never change anything below these lines.
#use-agent
#log-file /home/mike/Documents/gpg_stuff/new/gpg.log
allow-mark-trusted 

Now execute the following to add the list of keys to the trust file:

gpgsm --list-keys 2>/dev/null | grep fingerprint | awk '{print $2 " S"}' >> ~/.gnupg/trustlist.txt 

(the command will append, not overwrite, the old file) Only once all of the above has been done will Kmail then will allow the private ssl certificate to be selected to be used for s/mime in the cryptography section of the identity data once "modify" is selected.

If using a self signed ssl certificate some steps from the above may need to be different.

Within Kmail the keys can be managed using Kleopatra. Now signing and encryption is possible in kmail.