Parse incoming Autocrypt header, import keys
I spoke with people about Schleuder version 4, and stuff they would find helpful. Something people mentioned several times was better Autocrypt support, especially if Schleuder is used in a "frontdesk setup", with lots of different people sending mail to Schleuder, etc. To make this more easy, and to give people an option to get rid of boring, manual and repeated work, this is a proposal:
- Introduce a new per-list option to parse incoming Autocrypt header.
- If enabled, handle the
keydatafield, check the data in there, and if all good, import the key into the final keyring. I'm not yet sure if the "main" keyring should be used, or a second one, dedicated to the Autocrypt mechanism.
- Probably, checking the data in the field means importing the data into a temporary keyring, and checking the result.
- Add a new pseudo-header,
sender key status, with the result of the check and/or import as per above:
Not present - Key imported(if there was not key yet for this email addr, TOFU)
Already present - Key unchangend(if the key is already part of the keyring)
Already present - Conflicting Key - not imported(if a different key for this mail addr is already part of the keyring)
That's a first draft, happy to take any input, and to get this into something worth implementing.