forked from anishathalye/dotfiles
-
Notifications
You must be signed in to change notification settings - Fork 140
/
gpg.conf
65 lines (49 loc) · 2.22 KB
/
gpg.conf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
##########
# BEHAVIOR
##########
# Disable inclusion of the version string in ASCII armored output.
no-emit-version
# Disable comment string in clear text signatures and ASCII armored messages.
no-comments
# Display long key IDs.
keyid-format 0xlong
# List all keys (or the specified ones) along with their fingerprints.
with-fingerprint
# Display the calculated validity of user IDs during key listings.
list-options show-uid-validity
verify-options show-uid-validity
# Try to use the GnuPG-Agent. With this option, GnuPG first tries to connect to
# the agent before it asks for a passphrase.
use-agent
###########
# KEYSERVER
###########
# This is the server that --recv-keys, --send-keys, and --search-keys will
# communicate with to receive keys from, send keys to, and search for keys on.
# The certificate from https://sks-keyservers.net/sks-keyservers.netCA.pem will
# need to be trusted by the system for this to work.
keyserver hkps://hkps.pool.sks-keyservers.net:443
# When using --refresh-keys, if the key in question has a preferred keyserver
# URL, then disable use of that preferred keyserver to refresh the key from.
keyserver-options no-honor-keyserver-url
# When searching for a key with --search-keys, include keys that are marked on
# the keyserver as revoked.
keyserver-options include-revoked
#######################
# ALGORITHM AND CIPHERS
#######################
# When verifying a signature made from a subkey, ensure that the cross
# certification "back signature" on the subkey is present and valid. This
# protects against a subtle attack against subkeys that can sign.
require-cross-certification
# List of personal digest preferences. When multiple digests are supported by
# all recipients, choose the strongest one.
personal-cipher-preferences AES256 AES192 AES CAST5
# List of personal digest preferences. When multiple ciphers are supported by
# all recipients, choose the strongest one.
personal-digest-preferences SHA512 SHA384 SHA256 SHA224
# Message digest algorithm used when signing a key.
cert-digest-algo SHA512
# This preference list is used for new keys and becomes the default for
# "setpref" in the edit menu.
default-preference-list SHA512 SHA384 SHA256 SHA224 AES256 AES192 AES CAST5 ZLIB BZIP2 ZIP Uncompressed