aboutsummaryrefslogtreecommitdiff
path: root/gnupg/.gnupg/gpg.conf
diff options
context:
space:
mode:
authorneodarz <neodarz@neodarz.net>2019-09-04 20:29:22 +0200
committerneodarz <neodarz@neodarz.net>2019-09-04 20:41:02 +0200
commitc1c0857f7a816b5b3f10fd3554b8bb9b24d1e193 (patch)
tree73337a7b79376967f9200aeaa41b300fb6699429 /gnupg/.gnupg/gpg.conf
parentfb30fb16f5f03cdff6cdd670f6aa7211c1fc7efe (diff)
downloaddotfiles_ascii-c1c0857f7a816b5b3f10fd3554b8bb9b24d1e193.tar.xz
dotfiles_ascii-c1c0857f7a816b5b3f10fd3554b8bb9b24d1e193.zip
Add some conf
Diffstat (limited to 'gnupg/.gnupg/gpg.conf')
-rw-r--r--gnupg/.gnupg/gpg.conf79
1 files changed, 79 insertions, 0 deletions
diff --git a/gnupg/.gnupg/gpg.conf b/gnupg/.gnupg/gpg.conf
index d8017a9..952c613 100644
--- a/gnupg/.gnupg/gpg.conf
+++ b/gnupg/.gnupg/gpg.conf
@@ -1 +1,80 @@
+# based on https://github.com/ioerror/duraconf
+
+#-----------------------------
+# behavior
+#-----------------------------
+
+# Disable inclusion of the version string in ASCII armored output
+no-emit-version
+
+# Disable comment string in clear text signatures and ASCII armored messages
+no-comments
+
+# Display long key IDs
+keyid-format 0xlong
+
+# List all keys (or the specified ones) along with their fingerprints
+with-fingerprint
+
+# Display the calculed validity of user IDs during key linstings
+list-options show-uid-validity
+verify-options show-uid-validity
+
+# Try to use the GnuPG-Agent. With this option, GnuPG first tries to connect
+# the agent before it asks a passphrase.
+use-agent
+
+#-----------------------------
+# keyserver
+#-----------------------------
+
+# This is the server that --recv-keys, --send-keys, and --search-keys will
+# communicate with to receive keys from, send keys to, and search for keys on
+#keyserver hkps://keys.openpgp.org
+keyserver hkp://pool.sks-keyservers.net
+
+# Provide a certificate store to override the system default
+# Get this from https://sks-keyservers.net/sks-keyservers.netCA.pem
+#keyserver-options ca-cert-file=/usr/local/etc/ssl/certs/hkps.pool.sks-keyservers.net.pem
+# NOT USED FOR THE MOMENT BECAUSE IT'S A DIFFERENT KEY NETWORK
+
+# Set the proxy to use for HTTP and HKP keyservers - default to the standard
+# local Tor socks proxy
+# It is encoraged to use Tor for improved anonymity. Preferrably use aither
+# a dedicated SOCKSPort for GnuPG and/or enable IsolateDestPort and
+# IsolateDestAddr
+#keyserver-options http-proxy=socks5-hostname://127.0.0.1:9050
+
+# Don't leak DNS, see https://trac.torproject.org/projects/tor/ticket/2846
+#keyserver-options no-try-dns-srv
+# Seems to be ok now (comment 51 of ticket)
+
+# when using --refresh-keys, if the key in question has preferred keyserver
+# url, then disable use of that preferred keyserver to regresh the key from
+keyserver-options no-honor-keyserver-url
+
+# When searching for a key with --search-keys, include keys that are marked on
+# the keyserver as revoked
+keyserver-options include-revoked
+
+#-----------------------------
+# algorithm and ciphers
+#-----------------------------
+
+# list of personal digest preferences. When multiple digest are supported by
+# all recipients, choose the stringest one
+personal-cipher-preferences AES256 AES192 AES CAST5
+
+# list of personal digest preferences. WHen multiple ciphers are supported by
+# all recipients, choose the strongest one
+personal-digest-preferences SHA512 SHA384 SHA224
+
+# message digest algorithm used when signing a key
+cert-digest-algo SHA512
+
+# This preference list is used for new keys and becomes the default tor
+# 'setpref' in the edit menu
+default-preference-list SHA512 SHA384 SHA256 AES256 AES192 AES CAST5 ZLIB BZIP2 ZIP Uncompressed
+
+
pinentry-mode default