SMimeConfiguration
0
0
360
434
-
If this option is selected, S/MIME certificates are validated using Certificate Revocation Lists (CRLs).
Validate certificates using CRLs
true
-
If this option is selected, S/MIME certificates are validated online using the Online Certificates Status Protocol (OCSP). Fill in the URL of the OCSP responder below.
Validate certificates online (OCSP)
-
Online Certificate Validation
-
-
-
OCSP responder URL:
false
-
OCSP responder signature:
false
-
-
Enter here the address of the server for online validation of certificates (OCSP responder). The URL is usually starting with http://.
-
-
Ignore service URL of certificates
-
By default GnuPG uses the file ~/.gnupg/policies.txt to check if a certificate policy is allowed. If this option is selected, policies are not checked.
Do not check certificate policies
-
If this option is checked, Certificate Revocation Lists are never used to validate S/MIME certificates.
Never consult a CRL
-
If this option is checked, missing issuer certificates are fetched when necessary (this applies to both validation methods, CRLs and OCSP)
Fetch missing issuer certificates
-
0
HTTP Requests
-
Entirely disables the use of HTTP for S/MIME.
Do not perform any HTTP requests
-
When looking for the location of a CRL, the to-be-tested certificate usually contains what are known as "CRL Distribution Point" (DP) entries, which are URLs describing the way to access the URL. The first found DP entry is used. With this option all entries using the HTTP scheme are ignored when looking for a suitable DP.
Ignore HTTP CRL distribution point of certificates
-
Qt::Vertical
20
40
-
-
If this option is selected, the value of the HTTP proxy shown on the right (which comes from the environment variable http_proxy) will be used for any HTTP request.
Use system HTTP proxy:
-
no proxy
false
-
Use this proxy for HTTP requests:
-
Enter here the location of your HTTP Proxy, which will be used for all HTTP requests relating to S/MIME. The syntax is host:port, for instance myproxy.nowhere.com:3128.
LDAP Requests
-
-
Entirely disables the use of LDAP for S/MIME.
Do not perform any LDAP requests
-
When looking for the location of a CRL, the to-be-tested certificate usually contains what are known as "CRL Distribution Point" (DP) entries, which are URLs describing the way to access the URL. The first found DP entry is used. With this option all entries using the LDAP scheme are ignored when looking for a suitable DP.
Ignore LDAP CRL distribution point of certificates
-
-
Primary host for LDAP requests:
false
-
Entering a LDAP server here will make all LDAP requests go to that server first. More precisely, this setting overrides any specified host and port part in a LDAP URL and will also be used if host and port have been omitted from the URL. Other LDAP servers will be used only if the connection to the "proxy" failed.
The syntax is "HOST" or "HOST:PORT". If PORT is omitted, port 389 (standard LDAP port) is used.
-
Qt::Vertical
20
40
KLineEdit
QLineEdit
KTabWidget
QTabWidget
1
Kleo::KeyRequester
CRLRB
OCSPRB
OCSPResponderURL
ignoreServiceURLCB
doNotCheckCertPolicyCB
neverConsultCB
fetchMissingCB
requestsTabs
disableHTTPCB
ignoreHTTPDPCB
honorHTTPProxyRB
useCustomHTTPProxyRB
customHTTPProxy
disableLDAPCB
ignoreLDAPDPCB
customLDAPProxy
ui/keyrequester.h
CRLRB
toggled(bool)
OCSPGroupBox
setDisabled(bool)
20
20
20
20
OCSPRB
toggled(bool)
OCSPGroupBox
setEnabled(bool)
20
20
20
20
useCustomHTTPProxyRB
toggled(bool)
customHTTPProxy
setEnabled(bool)
20
20
20
20
honorHTTPProxyRB
toggled(bool)
customHTTPProxy
setDisabled(bool)
20
20
20
20