]> git.rmz.io Git - dotfiles.git/blob - gnupg/gpg.conf
gnupg: add gnupg configs
[dotfiles.git] / gnupg / gpg.conf
1 #-----------------------------
2 # default key
3 #-----------------------------
4
5 # The default key to sign with. If this option is not used, the default key is
6 # the first key found in the secret keyring
7
8 #default-key 0xD8692123C4065DEA5E0F3AB5249B39D24F25E3B6
9
10
11 #-----------------------------
12 # behavior
13 #-----------------------------
14
15 # Disable inclusion of the version string in ASCII armored output
16 no-emit-version
17
18 # Disable comment string in clear text signatures and ASCII armored messages
19 no-comments
20
21 # Display long key IDs
22 keyid-format 0xlong
23
24 # List all keys (or the specified ones) along with their fingerprints
25 with-fingerprint
26
27 # Display the calculated validity of user IDs during key listings
28 list-options show-uid-validity
29 verify-options show-uid-validity
30
31 # Try to use the GnuPG-Agent. With this option, GnuPG first tries to connect to
32 # the agent before it asks for a passphrase.
33 use-agent
34
35 # Use utf-8
36 charset utf-8
37
38 # View images with feh
39 photo-viewer feh %i
40
41 #-----------------------------
42 # keyserver
43 #-----------------------------
44
45 # This is the server that --recv-keys, --send-keys, and --search-keys will
46 # communicate with to receive keys from, send keys to, and search for keys on
47 keyserver hkp://pool.sks-keyservers.net
48 # keyserver hkps://hkps.pool.sks-keyservers.net
49
50 # Provide a certificate store to override the system default
51 # Get this from https://sks-keyservers.net/sks-keyservers.netCA.pem
52 # keyserver-options ca-cert-file=/usr/local/etc/ssl/certs/hkps.pool.sks-keyservers.net.pem
53
54 # Set the proxy to use for HTTP and HKP keyservers - default to the standard
55 # local Tor socks proxy
56 # It is encouraged to use Tor for improved anonymity. Preferrably use either a
57 # dedicated SOCKSPort for GnuPG and/or enable IsolateDestPort and
58 # IsolateDestAddr
59 #keyserver-options http-proxy=socks5-hostname://127.0.0.1:9050
60
61 # Don't leak DNS, see https://trac.torproject.org/projects/tor/ticket/2846
62 keyserver-options no-try-dns-srv
63
64 # When using --refresh-keys, if the key in question has a preferred keyserver
65 # URL, then disable use of that preferred keyserver to refresh the key from
66 keyserver-options no-honor-keyserver-url
67
68 # When searching for a key with --search-keys, include keys that are marked on
69 # the keyserver as revoked
70 keyserver-options include-revoked
71
72
73 #-----------------------------
74 # algorithm and ciphers
75 #-----------------------------
76
77 # list of personal digest preferences. When multiple digests are supported by
78 # all recipients, choose the strongest one
79 personal-cipher-preferences AES256 AES192 AES CAST5
80
81 # list of personal digest preferences. When multiple ciphers are supported by
82 # all recipients, choose the strongest one
83 personal-digest-preferences SHA512 SHA384 SHA256 SHA224
84
85 # message digest algorithm used when signing a key
86 cert-digest-algo SHA512
87
88 # This preference list is used for new keys and becomes the default for
89 # "setpref" in the edit menu
90 default-preference-list SHA512 SHA384 SHA256 SHA224 AES256 AES192 AES CAST5 ZLIB BZIP2 ZIP Uncompressed