-
Notifications
You must be signed in to change notification settings - Fork 13
/
gpg.conf
88 lines (65 loc) · 5.44 KB
/
gpg.conf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
# ╔═══════════════════════════════════════════════════════════════════════════╗
# ║ gpg configuration (~/.gnupg/gpg.conf) ║
# ║ ║
# ║ This options file can contain any long options which are available in ║
# ║ GnuPG. See gpg(1) for a full list of options. ║
# ║ ║
# ║ Also useful: https://riseup.net/en/gpg-best-practices ║
# ║ ║
# ║ Note: Since GnuPG 2.1 some keyserver options have been moved to dirmngr ║
# ╚═══════════════════════════════════════════════════════════════════════════╝
# ┌───────────────────────────────────────────────────────────────────────────┐
# │ Default key and recipient │
# └───────────────────────────────────────────────────────────────────────────┘
# If you have more than one secret key in your keyring, you may want to
# uncomment the following option and set your preferred keyid.
#default-key C4380B57
# If you do not pass a recipient to gpg, it will ask for one. Using this option
# you can encrypt to a default key. Key validation will not be done in this
# case. The second form uses the default key as default recipient.
# default-recipient <user-id>
default-recipient-self
# ┌───────────────────────────────────────────────────────────────────────────┐
# │ Behavior │
# └───────────────────────────────────────────────────────────────────────────┘
# Get rid of the copyright notice
no-greeting
# Disable inclusion of the version string in ASCII armored output
no-emit-version
# Select how to display key IDs: none|short|long|0xshort|0xlong
keyid-format 0xlong
# List keys with their fingerprints
with-fingerprint
# Display the calculated validity of the user IDs during key listings
list-options show-uid-validity
verify-options show-uid-validity
# Because some mailers change lines starting with "From " to ">From " it is good
# to handle such lines in a special way when creating cleartext signatures; all
# other PGP versions do it this way too. To enable full OpenPGP compliance you
# may want to use this option.
# no-escape-from-lines
# ┌───────────────────────────────────────────────────────────────────────────┐
# │ Algorithms and ciphers │
# └───────────────────────────────────────────────────────────────────────────┘
# List of personal digest preferences. When multiple digest are supported by
# all recipients, choose the strongest one
personal-digest-preferences SHA512 SHA384 SHA256 SHA224
# Message digest algorithm used when signing a key
cert-digest-algo SHA512
# List of personal cipher preferences. When multiple ciphers are supported by
# all recipients, choose the strongest one
personal-cipher-preferences AES256 AES192 AES TWOFISH CAMELLIA256 3DES
# Preference list used for new keys. It becomes the default for "setpref" in the
# edit menu
default-preference-list SHA512 SHA384 SHA256 SHA224 AES256 AES192 AES CAST5 ZLIB BZIP2 ZIP Uncompressed
# ┌───────────────────────────────────────────────────────────────────────────┐
# │ Key servers │
# └───────────────────────────────────────────────────────────────────────────┘
# When using --refresh-keys, if the key in question has a preferred keyserver
# URL, then disable use of that preferred keyserver to refresh the key from
keyserver-options no-honor-keyserver-url
# When searching for a key with --search-keys, include keys that are marked on
# the keyserver as revoked
keyserver-options include-revoked
# Automatically fetch keys from key server when not on the local keyring
auto-key-retrieve