OpenPGP for Roundcube via JavaScript
JavaScript PHP Python CSS
Latest commit e40a145 Jun 8, 2014 @qnrq Project killed.
Failed to load latest commit information.
js Merge pull request #138 from jseidl/master Jun 8, 2014
localization Adds missing_recipient_pubkey label, fixes #126 Jun 8, 2014
pygpghttpd Removes pointless rstrip arg from pygpghttpd Oct 9, 2013
skins/larry Initial support for moving encryption to it's own settings menu Jun 8, 2014
test Adds email sign (without encryption) Jun 22, 2013
LICENSE.txt Project killed. Jun 8, 2014
package.xml Name fix Jan 13, 2013
rc_openpgpjs.php Merge pull request #138 from jseidl/master Jun 8, 2014


This project is killed due to lost interest, motivation and resources. Its future development and survival relies entirely on the FOSS community. Please turn to maintained forks instead.

Feel free to contact me if you have any questions.


rc_openpgpjs is an open source (GPLv2) extension adding OpenPGPs functionality to the Roundcube webmail project. rc_openpgpjs is written with the intention to be as user friendly as possible for everyday PGP use. See Why do you need PGP?, OpenPGP.js and Roundcube for more info.


  • E-mail PGP signing
  • E-mail PGP encryption and decryption
  • Secure key storage (HTML5 local storage)
  • Key generation
  • Key lookups against PGP Secure Key Servers

Key storage

The keys are stored client side using HTML5 web storage. Private keys are never transferred from the user's local storage. Private and public keys can be exported from the web storage and be used outside of Roundcube and equally externally generated keys can be imported and used inside Roundcube.

Key lookups

Public keys can be imported from PGP Secure Key Servers, i.e. and any other Public Key Server which follows the OpenPGP HTTP Keyserver Protocol (HKP), i.e


  1. Copy plugin to 'plugins' folder
  2. Add 'rc_openpgpjs' to plugins array in your Roundcube config (config/


For any bug reports or feature requests please refer to the tracking system.

Questions? Please see the FAQ.