Autocrypt-capable MUAs level 1 implementation status

Last updated: 2017-11-03

MUA/feature header parsing keygen peer state header inject recommend during compose encrypt setup message setup process uid decorative
_images/deltachat.png

delta.chat

y y y y y y started started y
_images/k9.png

K-9 Mail

y y [1] y y y y branch branch y
_images/enigmail.png

Enigmail

y y y y [2] n y y y n
py-autocrypt y y y y n n n n y
_images/notmuch.png

notmuch

branch n n n n n n n y
_images/mailpile.png

mailpile

                 
gmime master N/A N/A n N/A N/A n n y

Logos are copyright their respective owners.

Todo

TODO @hpk42

Legend:

[1]require passphrase
[2]always send

For developers

Source code:

Autocrypt bot

Implemented using py-autocrypt.

Responder

We deploy a preliminary auto-responder which accepts and sends mails with Autocrypt headers. Just sent a mail to bot at autocrypt dot org and wait for the reply and look at the headers. As of Janury 2017, the Bot does not implement the full level-1 protocol.

Bot Dovecot IMAP

You can login to IMAP/Dovecot (port 993, TLS mandatory) with the username “bot” and the password as stored in gitcrypt/credentials.txt. Ask on IRC or the mailing list and provide your gpg public key for access to the password credentials using git-crypt.

ssh access to bot account

You can ssh to the bot account: ssh -l bot mail.autocrypt.org, ECDSA key fingerprint is SHA256:4RWh81zOd/Pgq3mHhKpyLdVZJfOpq+DgqKheUIhJgWQ. Ask on IRC to get your SSH key added (anyone already with access to the bot@autocrypt.org account can add it to .ssh/authorized_keys).