Skip to content

Commit

Permalink
Merge pull request #300 from autocrypt/minimal-conflicting-muas2
Browse files Browse the repository at this point in the history
Document a simple workflow for when two MUAs conflict on an account
  • Loading branch information
hpk42 committed Dec 21, 2017
2 parents deb216e + 957fedb commit c87072a
Showing 1 changed file with 18 additions and 0 deletions.
18 changes: 18 additions & 0 deletions doc/level1.rst
Original file line number Diff line number Diff line change
Expand Up @@ -999,6 +999,22 @@ import it to enable Autocrypt. If the user agrees to do so:

See :ref:`setup-message-example`.

Since Level 1 only recommends looking for a Setup Message when
``accounts[addr].secret_key`` is unset, some Level 1 MUAs might not
look for or handle Setup Messages for an already-configured account at
all. If two such MUAs share an account, and both MUAs have somehow
enabled Autocrypt on it independently without discovery of a Setup
Message, they will have different secret keys. This situation is bad
because it may lead to intermittently unreadable mail on either or
both MUAs.

These simple implementations can both keep Autocrypt enabled and avoid
new unreadable mail if the user manually synchronizes secret keys. To
do this, the user must first :ref:`destroy their local secret
key<destroy-secret-key>` on one MUA. Afterwards, that MUA can begin
looking for a Setup Message again. A more sophisticated
implementation may offer a more user-friendly way to detect this
situation and resolve it.

User Interface
--------------
Expand Down Expand Up @@ -1100,6 +1116,8 @@ The act of re-enabling Autocrypt after it was disabled SHOULD leave
``accounts[addr].secret_key`` and ``accounts[addr].public_key``
intact, so that the user continues using the same key.

.. _`destroy-secret-key`:

Destroying Secret Key Material
++++++++++++++++++++++++++++++

Expand Down

0 comments on commit c87072a

Please sign in to comment.