Created
March 5, 2015 19:16
-
-
Save atErik/1a495624a5f03e3fe499 to your computer and use it in GitHub Desktop.
A comparatively stronger & safer & secured gpg.conf
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Created by atErik / tErik. | |
# Copyright 2011-2015, atErik. | |
# a4t4erik AT out4look dot co4m, t4erik AT sfk4 dot co4 | |
# (Remove "4" from above, for address). | |
# Released under GPL (GNU Public License). | |
# | |
# | |
# First modified original gpg.conf on 2011. | |
# Then continued to tranfer modifications on top of other new versions. | |
# Changed & improved options, when it was necessary. | |
# | |
# | |
# | |
# THIS GPG.CONF IS USED WITH GnuPG v1.4.18 (classic) IN WINDOWS, | |
# RUN FROM PORTABLE USB OR FLASH MEDIA STORAGE DRIVE. | |
# This Portable/external USB/FLASH media storage drive was | |
# assigned a fixed drive letter: J: | |
# by using windows "Computer Management" panel. | |
# (run: compmgmt.msc for "Computer Management") | |
# | |
# | |
# | |
# HOW GnuPG BINARY FILES WERE OBTAINED ? | |
# [1] After obtaining installer file from gnupg.org, [2] install GnuPG | |
# classic v1.4.18 into a sub-folder | |
# "C:\Program Files (x86)\GNU\GnuPG1\" <-- notice the "1". | |
# in a fresh+uninfected system, (after thorough checking of | |
# installer file). | |
# [3] Then copy all files except "uninstall.exe", from | |
# "C:\Program Files (x86)\GNU\GnuPG1\" into "J:\GPG\1\App\" | |
# And [4] again copy all files from "J:\GPG\1\App\" | |
# into "J:\GPG\1\v1.4.18\" It is backup of GPG v1.4.18. | |
# [5] Obtain Vanilla edition of GPG4Win (GPG v2.0.26) and | |
# [6] install into "C:\Program Files (x86)\GNU\GnuPG\" | |
# above folder, in a fresh & uninfected system, (you must check | |
# installer file thoroughly). | |
# [7] And then copy below 9 files from | |
# "C:\Program Files (x86)\GNU\GnuPG\" | |
# into "J:\GPG\1\App\" | |
# libadns-1.dll libcurl-4.dll | |
# libgcrypt-20.dll libgnutls-26.dll | |
# libgpg-error-0.dll libiconv-2.dll | |
# libtasn1-3.dll zlib1.dll | |
# gpgkeys_kdns.exe | |
# [8] Delete these 4 files from "J:\GPG\1\App\" | |
# gpgkeys_curl.exe gpgkeys_ldap.exe | |
# gpgkeys_finger.exe gpgkeys_hkp.exe | |
# [9] Copy below 4 files from "C:\Program Files (x86)\GNU\GnuPG\" | |
# into "J:\GPG\1\App\" | |
# gpg2keys_curl.exe gpg2keys_ldap.exe | |
# gpg2keys_finger.exe gpg2keys_hkp.exe | |
# [10] Then rename above 4 files, and remove the "2". | |
# [11] Now your files will look like the list, which shown below. | |
# [12] As GPG v2.0.26 supports HKPS (secure+encrypted connection) & | |
# other features, which we want to use, but was not avaiable | |
# in v1.4.18, thats why we have to do these steps. | |
# [13] Create an empty file "gpg.conf" inside "J:\GPG\1\Data\" | |
# [14] Copy-paste codes from this webpage into that "gpg.conf" file. | |
# [15] Obtain ThunderbirdPortable installer and [16] install into | |
# "J:\PortableApps\ThunderbirdPortable\" | |
# [17] Obtain "GPG for ThunderbirdPortable" installer, and | |
# [18] install into same "J:\PortableApps\ThunderbirdPortable\" | |
# [19] Copy/backup all files & folders from here | |
# "J:\PortableApps\ThunderbirdPortable\App\gpg\" | |
# and [20] paste into "J:\GPG\1\OldGPG\" | |
# [21] Download the "sks-keyservers.netCA.pem" file, from below | |
# website. It is the root CA TLS/SSL certificate file of a | |
# keyserver which supports HKPS encrypted connection, and | |
# it's domain name is also DNSSEC signed: | |
# https://sks-keyservers.net/overview-of-pools.php | |
# and [22] download pem file into this below folder: "J:\GPG\1\App\" | |
# [23] Create an empty (0/zero byte sized) file "gpgconf.ctl" | |
# inside this folder "J:\GPG\1\App\" | |
# [24] Now copy all files from here "J:\GPG\1\App\" and paste | |
# into "J:\PortableApps\ThunderbirdPortable\App\gpg\" | |
# [25] and copy all files from here "J:\GPG\1\Data\" and paste | |
# into "J:\PortableApps\ThunderbirdPortable\Data\gpg\" | |
# [26] Now start ThunderbirdPortable, [27] install "Enigmail" addon | |
# extension. [28] Restart Thunderbird. | |
# [29] Goto main menu > Enigmail > Preferences > Basic > and | |
# [30] click on "Show Expert Settings". [31] Then select the | |
# "Override with" option and [32] click on "Browse" button, | |
# and [33] select the "gpg.exe" file, located inside below | |
# folder: "J:\PortableApps\ThunderbirdPortable\App\gpg\" | |
# [34] Goto Enigmail > Preferences > Advanced > and | |
# [35] insert below line inside the "Additional parameters for GnuPG" | |
# textbox: | |
# --homedir "..\\..\\Data\\gpg\\" --options "..\\..\\Data\\gpg\\gpg.conf" --verbose --verbose --require-secmem --no-default-keyring --secret-keyring "..\\..\\Data\\gpg\\secring.gpg" --trustdb-name "..\\..\\Data\\gpg\\trustdb.gpg" --primary-keyring "..\\..\\Data\\gpg\\pubring.gpg" --keyring "..\\..\\Data\\gpg\\pubring.gpg" | |
# [36] keep one space character (an empty space) in fron of above | |
# line, and keep one space char at end. | |
# [37] Goto Enigmail > Preferences > Keyserver > and | |
# [38] insert below line inside the "Specify your keyservers" textbox: | |
# hkps://hkps.pool.sks-keyservers.net no-honor-keyserver-url,verbose,check-cert,ca-cert-file=".\\sks-keyservers.netCA.pem" | |
# [39] keep one space character (an empty space) in front of above | |
# line, and keep one space char at end. | |
# [40] Press "Ok" to save your changes, in Enigmail. | |
# [41] You should restart Thunderbird once. | |
# [42] Now you are ready to use it, from external USB/Flash | |
# storage drive. | |
# | |
# | |
# [100] Why do we have to copy/backup files on different folders ? | |
# [101] when/if you update portable-thunderbird next-time, then | |
# [102] installer program will AUTOMATICALLY DELETE existing all | |
# binary files & folders located inside | |
# "J:\PortableApps\ThunderbirdPortable\App\" | |
# folder! including the Improved-GPG folder. ( [103] The | |
# ThunderbirdPortable\Data\gpg\ folder & "gpg.conf" file | |
# will remain fine). [104] So we must have to keep backup of | |
# Improved-GPG, which is this location "J:\GPG\1\App\", | |
# and [105] keep backup of old-GPG into "J:\GPG\1\OldGPG\" | |
# And [106] IF you have updated ThunderbirdPortable, then you [107] must | |
# have to run the old "GPG for ThunderbirdPortable" installer | |
# again. [108] Then over-write old-GPG with Improved-GPG, by doing this: | |
# copy all files & folders from "J:\GPG\1\App\" into below | |
# folder: "J:\PortableApps\ThunderbirdPortable\App\" | |
# And then, finally, [109] you are again ready to use Thunderbird | |
# Portable, and portable & improved GPG. | |
# | |
# | |
# | |
# | |
# File list in "J:\GPG\1\App\" | |
# gpg.exe | |
# gpgconf.ctl gpgkeys_curl.exe | |
# gpgkeys_finger.exe gpgkeys_hkp.exe | |
# gpgkeys_kdns.exe gpgkeys_ldap.exe | |
# gpgsplit.exe gpgv.exe | |
# gpg_readme.txt iconv.dll | |
# libadns-1.dll libcurl-4.dll | |
# libgcrypt-20.dll libgnutls-26.dll | |
# libgpg-error-0.dll libiconv-2.dll | |
# libtasn1-3.dll zlib1.dll | |
# sks-keyservers.netCA.pem | |
# CAcert_class3.crt CAcert_root.crt | |
# [Doc] | |
# [gnupg.nls] | |
# | |
# | |
# | |
# | |
# | |
# These first three lines are not copied to the gpg.conf file in | |
# the users home directory. | |
# $Id$ | |
# Options for GnuPG | |
# Copyright 1998, 1999, 2000, 2001, 2002, 2003, | |
# 2010 Free Software Foundation, Inc. | |
# | |
# This file is free software; as a special exception the author gives | |
# unlimited permission to copy and/or distribute it, with or without | |
# modifications, as long as this notice is preserved. | |
# | |
# This file is distributed in the hope that it will be useful, but | |
# WITHOUT ANY WARRANTY, to the extent permitted by law; without even the | |
# implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. | |
# | |
# Unless you specify which option file to use (with the command line | |
# option "--options filename"), GnuPG uses the file ~/.gnupg/gpg.conf | |
# by default. | |
# | |
# An options file can contain any long options which are available in | |
# GnuPG. If the first non white space character of a line is a '#', | |
# this line is ignored. Empty lines are also ignored. | |
# | |
# See the man page for a list of options. | |
homedir "J:\PortableApps\ThunderbirdPortable\Data\gpg\" | |
options "J:\PortableApps\ThunderbirdPortable\Data\gpg\gpg.conf" | |
no-default-keyring | |
secret-keyring "J:\PortableApps\ThunderbirdPortable\Data\gpg\secring.gpg" | |
trustdb-name "J:\PortableApps\ThunderbirdPortable\Data\gpg\trustdb.gpg" | |
primary-keyring "J:\PortableApps\ThunderbirdPortable\Data\gpg\pubring.gpg" | |
keyring "J:\PortableApps\ThunderbirdPortable\Data\gpg\pubring.gpg" | |
# Below options are specified to Enigmail via Thunderbird's Config-Editor. | |
# --homedir "J:\\PortableApps\\ThunderbirdPortable\\Data\\gpg" --options "J:\\PortableApps\\ThunderbirdPortable\\Data\\gpg\\gpg.conf" --verbose --verbose --require-secmem --no-default-keyring --secret-keyring "J:\\PortableApps\\ThunderbirdPortable\\Data\\gpg\\secring.gpg" --trustdb-name "J:\\PortableApps\\ThunderbirdPortable\\Data\\gpg\\trustdb.gpg" --primary-keyring "J:\\PortableApps\\ThunderbirdPortable\\Data\\gpg\\pubring.gpg" --keyring "J:\\PortableApps\\ThunderbirdPortable\\Data\\gpg\\pubring.gpg" | |
# Relative-PATH can be specified, becasue ThunderbirdPortable uses this | |
# folder: ThunderbirdPortable\\App\gpg\ as its CWD (current working directory): | |
# --homedir "..\\..\\Data\\gpg\\" --options "..\\..\\Data\\gpg\\gpg.conf" --verbose --verbose --require-secmem --no-default-keyring --secret-keyring "..\\..\\Data\\gpg\\secring.gpg" --trustdb-name "..\\..\\Data\\gpg\\trustdb.gpg" --primary-keyring "..\\..\\Data\\gpg\\pubring.gpg" --keyring "..\\..\\Data\\gpg\\pubring.gpg" | |
# If you use ThunderbirdPortable from USB-drive, then change all "J:\PortableApps\ThunderbirdPortable\" | |
# into this: "E:\ThunderbirdPortable\" if E: drive is your USB-drive. | |
# Uncomment the following option to get rid of the copyright notice | |
#no-greeting | |
# If you have more than 1 secret key in your keyring, you may want to | |
# uncomment the following option and set your preferred keyid. | |
#default-key 621CC013 | |
# If you do not pass a recipient to gpg, it will ask for one. Using | |
# this option you can encrypt to a default key. Key validation will | |
# not be done in this case. The second form uses the default key as | |
# default recipient. | |
#default-recipient some-user-id | |
#default-recipient-self | |
# By default GnuPG creates version 4 signatures for data files as | |
# specified by OpenPGP. Some earlier (PGP 6, PGP 7) versions of PGP | |
# require the older version 3 signatures. Setting this option forces | |
# GnuPG to create version 3 signatures. | |
#force-v3-sigs | |
# Because some mailers change lines starting with "From " to ">From " | |
# it is good to handle such lines in a special way when creating | |
# cleartext signatures; all other PGP versions do it this way too. | |
# To enable full OpenPGP compliance you may want to use this option. | |
#no-escape-from-lines | |
# When verifying a signature made from a subkey, ensure that the cross | |
# certification "back signature" on the subkey is present and valid. | |
# This protects against a subtle attack against subkeys that can sign. | |
# Defaults to --no-require-cross-certification. However for new | |
# installations it should be enabled. | |
require-cross-certification | |
# If you do not use the Latin-1 (ISO-8859-1) charset, you should tell | |
# GnuPG which is the native character set. Please check the man page | |
# for supported character sets. This character set is only used for | |
# metadata and not for the actual message which does not undergo any | |
# translation. Note that future version of GnuPG will change to UTF-8 | |
# as default character set. | |
#charset utf-8 | |
display-charset utf-8 | |
# Group names may be defined like this: | |
# group mynames = paige 0x12345678 joe patti | |
# | |
# Any time "mynames" is a recipient (-r or --recipient), it will be | |
# expanded to the names "paige", "joe", and "patti", and the key ID | |
# "0x12345678". Note there is only one level of expansion - you | |
# cannot make an group that points to another group. Note also that | |
# if there are spaces in the recipient name, this will appear as two | |
# recipients. In these cases it is better to use the key ID. | |
#group mynames = paige 0x12345678 joe patti | |
# Some old Windows platforms require 8.3 filenames. If your system | |
# can handle long filenames, uncomment this. | |
#no-mangle-dos-filenames | |
# Lock the file only once for the lifetime of a process. If you do | |
# not define this, the lock will be obtained and released every time | |
# it is needed - normally this is not needed. | |
#lock-once | |
# GnuPG can send and receive keys to and from a keyserver. These | |
# servers can be HKP, email, or LDAP (if GnuPG is built with LDAP | |
# support). | |
# | |
# Example HKP keyservers: | |
# hkp://keys.gnupg.net | |
# | |
# Example LDAP keyservers: | |
# ldap://pgp.surfnet.nl:11370 | |
# | |
# Regular URL syntax applies, and you can set an alternate port | |
# through the usual method: | |
# hkp://keyserver.example.net:22742 | |
# | |
# If you have problems connecting to a HKP server through a buggy http | |
# proxy, you can use keyserver option broken-http-proxy (see below), | |
# but first you should make sure that you have read the man page | |
# regarding proxies (keyserver option honor-http-proxy) | |
# | |
# Most users just set the name and type of their preferred keyserver. | |
# Note that most servers (with the notable exception of | |
# ldap://keyserver.pgp.com) synchronize changes with each other. Note | |
# also that a single server name may actually point to multiple | |
# servers via DNS round-robin. hkp://keys.gnupg.net is an example of | |
# such a "server", which spreads the load over a number of physical | |
# servers. To see the IP address of the server actually used, you may use | |
# the "--keyserver-options debug". | |
#keyserver hkp://keys.gnupg.net | |
#keyserver http://http-keys.gnupg.net | |
#keyserver mailto:[email protected] | |
## We want to see more info from keyserver, so: | |
#keyserver-options debug,verbose | |
# Always use HKPS supported keyserver | |
keyserver hkps://hkps.pool.sks-keyservers.net | |
#keyserver-options no-honor-keyserver-url,check-cert,ca-cert-file="J:\\PortableApps\\ThunderbirdPortable\\App\\gpg\\sks-keyservers.netCA.pem" | |
# testing relative-path | |
keyserver-options no-honor-keyserver-url,check-cert,ca-cert-file=".\\sks-keyservers.netCA.pem" | |
# Below is specified in Enigmail, via Thunderbird's Config-editor: | |
# hkps://hkps.pool.sks-keyservers.net no-honor-keyserver-url,verbose,check-cert,ca-cert-file="J:\\PortableApps\\ThunderbirdPortable\\App\\gpg\\sks-keyservers.netCA.pem" | |
# From TorProject.org & sks-keyservers.net site: | |
#keyserver hkps://hkps.pool.sks-keyservers.net | |
#keyserver-options ca-cert-file=/path/to/CA/sks-keyservers.netCA.pem | |
#keyserver-options ca-cert-file=C:\Users\<user-name>\AppData\Local\gnupg\sks-keyservers.netCA.pem | |
#keyserver hkps://hkps.pool.sks-keyservers.net check-cert,ca-cert-file="J:\PortableApps\GnuPG\sks-keyservers.netCA.pem" | |
#keyserver hkps://keys.indymedia.org verbose,check-cert,ca-cert-file="C:\Users\<user-name>\AppData\Local\gnupg\CAcert_root.crt" | |
## When creating a key, individuals may designate a specific keyserver to | |
## use to pull their keys from. The below option will disregard this | |
## designation and use the pool, which is useful because (1) it prevents | |
## someone from designating an insecure method for pulling their key and | |
## (2) if the server designated uses hkps, the refresh will fail because | |
## the ca-cert will not match, so the keys will never be refreshed. | |
## (from riseup https://we.riseup.net/riseuplabs+paow/openpgp-best-practices) | |
#keyserver-options no-honor-keyserver-url | |
# Common options for keyserver functions: | |
# | |
# include-disabled = when searching, include keys marked as "disabled" | |
# on the keyserver (not all keyservers support this). | |
# | |
# no-include-revoked = when searching, do not include keys marked as | |
# "revoked" on the keyserver. | |
# | |
# verbose = show more information as the keys are fetched. | |
# Can be used more than once to increase the amount | |
# of information shown. | |
# | |
# use-temp-files = use temporary files instead of a pipe to talk to the | |
# keyserver. Some platforms (Win32 for one) always | |
# have this on. | |
# | |
# keep-temp-files = do not delete temporary files after using them | |
# (really only useful for debugging) | |
# | |
# honor-http-proxy = if the keyserver uses HTTP, honor the http_proxy | |
# environment variable | |
# | |
# broken-http-proxy = try to work around a buggy HTTP proxy | |
# | |
# auto-key-retrieve = automatically fetch keys as needed from the keyserver | |
# when verifying signatures or when importing keys that | |
# have been revoked by a revocation key that is not | |
# present on the keyring. | |
# | |
# no-include-attributes = do not include attribute IDs (aka "photo IDs") | |
# when sending keys to the keyserver. | |
#keyserver-options auto-key-retrieve | |
# Uncomment this line to display photo user IDs in key listings and | |
# when a signature from a key with a photo is verified. | |
#show-photos | |
# Use this program to display photo user IDs | |
# | |
# %i is expanded to a temporary file that contains the photo. | |
# %I is the same as %i, but the file isn't deleted afterwards by GnuPG. | |
# %k is expanded to the key ID of the key. | |
# %K is expanded to the long OpenPGP key ID of the key. | |
# %t is expanded to the extension of the image (e.g. "jpg"). | |
# %T is expanded to the MIME type of the image (e.g. "image/jpeg"). | |
# %f is expanded to the fingerprint of the key. | |
# %% is %, of course. | |
# | |
# If %i or %I are not present, then the photo is supplied to the | |
# viewer on standard input. If your platform supports it, standard | |
# input is the best way to do this as it avoids the time and effort in | |
# generating and then cleaning up a secure temp file. | |
# | |
# The default program is "xloadimage -fork -quiet -title 'KeyID 0x%k' stdin" | |
# On Mac OS X and Windows, the default is to use your regular JPEG image | |
# viewer. | |
# | |
# Some other viewers: | |
# photo-viewer "qiv %i" | |
# photo-viewer "ee %i" | |
# photo-viewer "display -title 'KeyID 0x%k'" | |
# | |
# This one saves a copy of the photo ID in your home directory: | |
# photo-viewer "cat > ~/photoid-for-key-%k.%t" | |
# | |
# Use your MIME handler to view photos: | |
# photo-viewer "metamail -q -d -b -c %T -s 'KeyID 0x%k' -f GnuPG" | |
#personal-cipher-preferences AES256 TWOFISH AES192 AES | |
personal-cipher-preferences AES256 TWOFISH CAMELLIA256 AES192 CAMELLIA192 AES CAMELLIA128 BLOWFISH CAST5 3DES | |
## when multiple digests are supported by all recipients, choose the | |
## strongest one: | |
## (from Debian http://keyring.debian.org/creating-key.html) | |
#personal-digest-preferences SHA512 | |
## By K_F at #gnupg @ irc.freenode.net | |
personal-digest-preferences SHA512 SHA384 SHA256 | |
## when making an OpenPGP certification, use a stronger digest than the | |
## default SHA1: | |
## (from Debian http://keyring.debian.org/creating-key.html) | |
cert-digest-algo SHA512 | |
## (from whom??) | |
personal-compress-preferences ZLIB BZIP2 ZIP | |
## preferences chosen for new keys should prioritize stronger algorithms: | |
## (from Debian http://keyring.debian.org/creating-key.html) | |
#default-preference-list SHA512 SHA384 SHA256 SHA224 AES256 AES192 AES CAST5 ZLIB BZIP2 ZIP Uncompressed | |
## (from whom??) | |
default-preference-list SHA512 SHA384 SHA256 SHA224 RIPEMD160 SHA1 AES256 TWOFISH CAMELLIA256 AES192 CAMELLIA192 AES CAMELLIA128 BLOWFISH CAST5 3DES BZIP2 ZIP ZLIB | |
## default-preference-list SHA512 SHA384 SHA256 SHA224 RIPEMD160 SHA1 MD5 AES256 TWOFISH CAMELLIA256 AES192 CAMELLIA192 AES CAMELLIA128 BLOWFISH CAST5 3DES BZIP2 ZIP ZLIB | |
# From http://www.postgresql.org/docs/9.2/static/pgcrypto.html | |
# When encrypting with a symmetric key (i.e., a password): The given | |
# password is hashed using a String2Key (S2K) algorithm. This is rather | |
# similar to crypt() algorithms — purposefully slow and with random salt | |
# — but it produces a full-length binary key. | |
## (from whom??) | |
s2k-cipher-algo AES256 | |
s2k-digest-algo SHA512 | |
## long keyids are more collision-resistant than short keyids (it's trivial | |
## to make a key with any desired short keyid) | |
## (from riseup https://we.riseup.net/riseuplabs+paow/openpgp-best-practices) | |
keyid-format 0xlong | |
## if you care about strong key identifiers, you always want to see the | |
## fingerprint: (info from riseup). | |
with-fingerprint | |
## You should always know at a glance which User IDs gpg thinks are | |
## legitimately bound to the keys in your keyring: | |
## (from riseup https://we.riseup.net/riseuplabs+paow/openpgp-best-practices) | |
verify-options show-uid-validity | |
list-options show-uid-validity | |
## (From riseup https://we.riseup.net/riseuplabs+paow/openpgp-best-practices) | |
## Only use your primary key for certification (and possibly signing). | |
## Have a separate subkey for encryption. Have a separate subkey for | |
## signing, and keep your primary key entirely offline. In this scenario, | |
## your primary key is used only for certifications, which happen | |
## infrequently. | |
## | |
## Primary keys should be DSA-2 or RSA, 2048 bits or more. (RSA preferred). | |
## To check if you are using DSA-2 or RSA, you can do this: | |
## gpg --export-options export-minimal --export <fingerprint> | gpg --list-packets |grep -A2 '^:public key packet:$'|grep algo | |
## If the algo reported is 1, you are using RSA. If it is 17, then it is | |
## DSA and you will need to confirm that the size reported in the next | |
## check reports a bit-length key size as greater than 1024, otherwise | |
## you aren’t using DSA-2. If the algo reported is 19, you are using | |
## ECDSA, if it is 18 you are using ECC, and the key bit-length deter- | |
## -mination check below is not an appropriate criteria for these types | |
## of keys as as the key sizes will drop significantly. To check the | |
## bit-length of the primary key you can do this: | |
## gpg --export-options export-minimal --export <fingerprint> | gpg --list-packets |grep -A2 'public key'|grep 'pkey\[0\]:' | |
## Do not start the gpg-agent or the dirmngr if it has not yet been started | |
## and if its service is required. This option is mostly useful on machines | |
## where the connection to gpg-agent has been redirected to another machines. | |
## If dirmngr is required on the remote machine, it may be started manually | |
## using gpgconf --launch dirmngr. | |
##no-autostart | |
## This is dummy option. gpg2 always requires the agent. | |
# Gnupg 1.4.x does not support/need agent, so disable agent: | |
no-use-agent |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment