A mailgate for Postfix to encrypt incoming and outgoing email with S/MIME and/or OpenPGP and decrypting OpenPGP encrypted emails https://lacre.io
Go to file
pfm d75ded751e Merge pull request 'Rename GPG-Mailgate to Lacre' (#138) from 81_rename-to-lacre into main
Reviewed-on: #138
2024-02-23 07:35:21 +00:00
GnuPG Rename GPG-Mailgate to Lacre 2024-01-06 14:34:54 +01:00
cron_templates All mails from cron script are now passed through the GPG-Mailgate so they are encrypted if possible. 2015-06-04 20:13:04 +02:00
doc lacre.admin: Add more 'queue' documentation, clean up 2024-02-23 08:33:47 +01:00
lacre lacre.admin: Add a sub-command to manipulate database schema 2024-02-21 21:10:49 +01:00
register_templates Inform the user if registration failed because GPG-Mailgate-Web could not be reached. 2015-06-04 21:52:39 +02:00
test Retrieve data from db result before returning from Context Manager 2024-01-20 18:52:47 +01:00
.gitignore Update gitignore: generated config, project name 2024-01-06 15:46:33 +01:00
INSTALL.md Rename GPG-Mailgate to Lacre 2024-01-06 14:34:54 +01:00
LICENSE Update license to GNU GPL v3. 2013-10-02 14:27:28 -04:00
Makefile Use one config for cron and daemon tests 2024-01-07 21:52:52 +01:00
README.md Reorder and simplify first secions of README 2023-07-08 02:02:47 +02:00
lacre-logging.conf.sample Rename GPG-Mailgate to Lacre 2024-01-06 14:34:54 +01:00
lacre.conf.sample Rename GPG-Mailgate to Lacre 2024-01-06 14:34:54 +01:00
lacre.py Unify configuration requirements 2024-01-08 22:19:10 +01:00
register-handler.py Use Lacre logging and configuration in register-handler 2022-05-06 20:13:23 +02:00
requirements.txt Don't require watchdog anymore 2023-11-01 21:26:42 +01:00
webgate-cron.py Split webgate-cron.py into small functions 2024-01-21 11:28:46 +01:00


Lacre Project

Lacre (wax seal in Portuguese) is an add-on for Postfix that automatically encrypts incoming email before delivering it to recipients' inbox for recipients that have provided their public keys.

Lacre is a fork and continuation of the original work on gpg-mailgate project. It is still actively developed and should be considered as beta -- with all APIs and internals being subject to change. Please only use this software if you know GnuPG well and accept occasional failures.

How it works

Lacre is a content filter. This means, that when Postfix receives a message, it "forwards" that message to Lacre and if Lacre delivers it to a given destination, the message arrives to recipient's inbox.

After receiving the message, Lacre does the following:

  1. If message already is encrypted, it just delivers the message immediately.
  2. Checks the list of recipients, finds their public keys if any were provided.
  3. Encrypts message if possible.
  4. Delivers the message.

Work on this project in 2021 was funded by NGI Zero PET for which we are very thankful.

Made possible thanks to:


For installation instructions, please refer to the included INSTALL file.

Planned features

  • Correctly displays attachments and general email content; currently will only display first part of multipart messages
  • Public keys are stored in a dedicated gpg-home-directory
  • Encrypts both matching incoming and outgoing mail (this means gpg-mailgate can be used to encrypt outgoing mail for software that doesn't support PGP or S/MIME)
  • Easy installation
  • People can submit their public key like to any keyserver to gpg-mailgate with the gpg-mailgate-web extension
  • People can send an S/MIME signed email to register@yourdomain.tld to register their public key
  • People can send their public OpenPGP key as attachment or inline to register@yourdomain.tld to register it

See also: lacre-webgate -- a web interface allowing any user to upload PGP keys so that emails sent to them from your mail server will be encrypted

This is forked from the original project at http://code.google.com/p/gpg-mailgate/


This is a combined work of many developers and contributors. We would like to pay honours to original gpg mailbox developers for making this project happen, and providing solid solution for encryption emails at rest: