From 4bf825141cd564a2c5a23c55f79e04665c428641 Mon Sep 17 00:00:00 2001 From: Eduardo Chappa Date: Sun, 28 Feb 2016 14:12:49 -0700 Subject: * Add the ability to change the private key and certificates used to encrypt a password file in the SMIME setup configuration screen. --- pith/pine.hlp | 54 ++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 54 insertions(+) (limited to 'pith/pine.hlp') diff --git a/pith/pine.hlp b/pith/pine.hlp index de174d2b..2e0fd0c4 100644 --- a/pith/pine.hlp +++ b/pith/pine.hlp @@ -197,6 +197,10 @@ Additions include: in lower case, as some SMTP servers, such as those of libero.it reject messages if the boundary attribute is in uppercase. +
  • Add the ability to change the private key and certificates used + to encrypt a password file in the SMIME setup configuration screen. + Learn more +
  • SMIME: The ctrl-E command that gives information on the certificate is only available for messages that have a signed or encrypted part. @@ -35422,6 +35426,56 @@ import a command to this collection. <End of help on this topic> +====== h_config_smime_password_file_certificates ===== + + +S/MIME: Manage Password File Certificates + + +

    S/MIME: Manage Password File Certificates

    + +UNIX Alpine only. +

    +This option allows you to manage the certificates that are used to +encrypt and decrypt your password file. This is useful in case you +want to change the certificates used to encrypt your password file. +

    +In order to avoid unauthorized use of this option, you are asked to +enter the password of the current private key used to encrypt your +password file. +

    +Once you have entered your password for the current key, you enter a +screen where you can import your new key, and see the information on your +current key. +

    +To import a new key press "RETURN" and enter the location of +the new key. You will be asked to enter the password of the new key. If +this part of the process is successful, Alpine will search for the +certificate that matches that key. If your key is named +"your_email@address.com.key", then Alpine will look for your +certificate in the same directory in the file named +"your_email@address.com.crt", otherwise it will look for it +as part of your key (that is, it will look to see if your certificate +is in the file "your_email@address.com.key"), if all of this +fails, Alpine will ask you to enter the location of the certificate +that matches the key you unlocked. If a certificate is found, it will be +used, and in this case, the password file will be read, decrypted with the +old key and encrypted with the new key. Once this is done, the new key and +certificates are saved, and the old keys are permanently deleted. +

    +Alpine does not create a backup of your password file, or your old keys +that will be replaced. If you need to keep old copies, you will have to do +this operation outside Alpine. +

    +

    +

    +<End of help on this topic> + + ====== h_certificate_information ===== -- cgit v1.2.3-70-g09d2