From a12df5d06fb6606ee7bd552ee76e3f7ab7743a74 Mon Sep 17 00:00:00 2001 From: neodarz Date: Thu, 5 Sep 2019 08:05:23 +0200 Subject: Add gnupg config --- dotfiles/gnupg/gpg-agent.conf | 2 ++ dotfiles/gnupg/gpg.conf | 80 +++++++++++++++++++++++++++++++++++++++++++ 2 files changed, 82 insertions(+) create mode 100644 dotfiles/gnupg/gpg-agent.conf create mode 100644 dotfiles/gnupg/gpg.conf (limited to 'dotfiles/gnupg') diff --git a/dotfiles/gnupg/gpg-agent.conf b/dotfiles/gnupg/gpg-agent.conf new file mode 100644 index 0000000..83b82fb --- /dev/null +++ b/dotfiles/gnupg/gpg-agent.conf @@ -0,0 +1,2 @@ +pinentry-program /home/neodarz/.scripts/my-pinentry +allow-loopback-pinentry diff --git a/dotfiles/gnupg/gpg.conf b/dotfiles/gnupg/gpg.conf new file mode 100644 index 0000000..952c613 --- /dev/null +++ b/dotfiles/gnupg/gpg.conf @@ -0,0 +1,80 @@ +# based on https://github.com/ioerror/duraconf + +#----------------------------- +# behavior +#----------------------------- + +# Disable inclusion of the version string in ASCII armored output +no-emit-version + +# Disable comment string in clear text signatures and ASCII armored messages +no-comments + +# Display long key IDs +keyid-format 0xlong + +# List all keys (or the specified ones) along with their fingerprints +with-fingerprint + +# Display the calculed validity of user IDs during key linstings +list-options show-uid-validity +verify-options show-uid-validity + +# Try to use the GnuPG-Agent. With this option, GnuPG first tries to connect +# the agent before it asks a passphrase. +use-agent + +#----------------------------- +# keyserver +#----------------------------- + +# This is the server that --recv-keys, --send-keys, and --search-keys will +# communicate with to receive keys from, send keys to, and search for keys on +#keyserver hkps://keys.openpgp.org +keyserver hkp://pool.sks-keyservers.net + +# Provide a certificate store to override the system default +# Get this from https://sks-keyservers.net/sks-keyservers.netCA.pem +#keyserver-options ca-cert-file=/usr/local/etc/ssl/certs/hkps.pool.sks-keyservers.net.pem +# NOT USED FOR THE MOMENT BECAUSE IT'S A DIFFERENT KEY NETWORK + +# Set the proxy to use for HTTP and HKP keyservers - default to the standard +# local Tor socks proxy +# It is encoraged to use Tor for improved anonymity. Preferrably use aither +# a dedicated SOCKSPort for GnuPG and/or enable IsolateDestPort and +# IsolateDestAddr +#keyserver-options http-proxy=socks5-hostname://127.0.0.1:9050 + +# Don't leak DNS, see https://trac.torproject.org/projects/tor/ticket/2846 +#keyserver-options no-try-dns-srv +# Seems to be ok now (comment 51 of ticket) + +# when using --refresh-keys, if the key in question has preferred keyserver +# url, then disable use of that preferred keyserver to regresh the key from +keyserver-options no-honor-keyserver-url + +# When searching for a key with --search-keys, include keys that are marked on +# the keyserver as revoked +keyserver-options include-revoked + +#----------------------------- +# algorithm and ciphers +#----------------------------- + +# list of personal digest preferences. When multiple digest are supported by +# all recipients, choose the stringest one +personal-cipher-preferences AES256 AES192 AES CAST5 + +# list of personal digest preferences. WHen multiple ciphers are supported by +# all recipients, choose the strongest one +personal-digest-preferences SHA512 SHA384 SHA224 + +# message digest algorithm used when signing a key +cert-digest-algo SHA512 + +# This preference list is used for new keys and becomes the default tor +# 'setpref' in the edit menu +default-preference-list SHA512 SHA384 SHA256 AES256 AES192 AES CAST5 ZLIB BZIP2 ZIP Uncompressed + + +pinentry-mode default -- cgit v1.2.1