Last active
March 24, 2021 18:07
-
-
Save jbouse/2635431 to your computer and use it in GitHub Desktop.
GnuPG configuration
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Options for GnuPG | |
# Copyright 1998, 1999, 2000, 2001, 2002, 2003 Free Software Foundation, Inc. | |
# | |
# This file is free software; as a special exception the author gives | |
# unlimited permission to copy and/or distribute it, with or without | |
# modifications, as long as this notice is preserved. | |
# | |
# This file is distributed in the hope that it will be useful, but | |
# WITHOUT ANY WARRANTY, to the extent permitted by law; without even the | |
# implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. | |
# | |
# Unless you specify which option file to use (with the command line | |
# option "--options filename"), GnuPG uses the file ~/.gnupg/gpg.conf | |
# by default. | |
# | |
# An options file can contain any long options which are available in | |
# GnuPG. If the first non white space character of a line is a '#', | |
# this line is ignored. Empty lines are also ignored. | |
# | |
# See the man page for a list of options. | |
# Uncomment the following option to get rid of the copyright notice | |
no-greeting | |
armor | |
comment "" | |
# If you have more than 1 secret key in your keyring, you may want to | |
# uncomment the following option and set your preferred keyid. | |
default-key 62DBDF62 # Personal | |
#default-key 29AB4CDD # Debian | |
# If you do not pass a recipient to gpg, it will ask for one. Using | |
# this option you can encrypt to a default key. Key validation will | |
# not be done in this case. The second form uses the default key as | |
# default recipient. | |
#default-recipient some-user-id | |
default-recipient-self | |
# By default GnuPG creates version 3 signatures for data files. This | |
# is not strictly OpenPGP compliant but PGP 6 and most versions of PGP | |
# 7 require them. To disable this behavior, you may use this option | |
# or --openpgp. | |
#no-force-v3-sigs | |
# Because some mailers change lines starting with "From " to ">From " | |
# it is good to handle such lines in a special way when creating | |
# cleartext signatures; all other PGP versions do it this way too. | |
# To enable full OpenPGP compliance you may want to use this option. | |
#no-escape-from-lines | |
# If you do not use the Latin-1 (ISO-8859-1) charset, you should tell | |
# GnuPG which is the native character set. Please check the man page | |
# for supported character sets. This character set is only used for | |
# metadata and not for the actual message which does not undergo any | |
# translation. Note that future version of GnuPG will change to UTF-8 | |
# as default character set. In most cases this option is not required | |
# GnuPG is able to figure out the correct charset and use that. | |
charset utf-8 | |
# Group names may be defined like this: | |
# group mynames = paige 0x12345678 joe patti | |
# | |
# Any time "mynames" is a recipient (-r or --recipient), it will be | |
# expanded to the names "paige", "joe", and "patti", and the key ID | |
# "0x12345678". Note there is only one level of expansion - you | |
# cannot make an group that points to another group. Note also that | |
# if there are spaces in the recipient name, this will appear as two | |
# recipients. In these cases it is better to use the key ID. | |
#group mynames = paige 0x12345678 joe patti | |
# Lock the file only once for the lifetime of a process. If you do | |
# not define this, the lock will be obtained and released every time | |
# it is needed, which is usually preferable. | |
#lock-once | |
# GnuPG can send and receive keys to and from a keyserver. These | |
# servers can be HKP, email, or LDAP (if GnuPG is built with LDAP | |
# support). | |
# | |
# Example HKP keyserver: | |
# hkp://subkeys.pgp.net | |
# | |
# Example email keyserver: | |
# mailto:[email protected] | |
# | |
# Example LDAP keyservers: | |
# ldap://pgp.surfnet.nl:11370 | |
# ldap://keyserver.pgp.com | |
# | |
# Regular URL syntax applies, and you can set an alternate port | |
# through the usual method: | |
# hkp://keyserver.example.net:22742 | |
# | |
# If you have problems connecting to a HKP server through a buggy http | |
# proxy, you can use keyserver option broken-http-proxy (see below), | |
# but first you should make sure that you have read the man page | |
# regarding proxies (keyserver option honor-http-proxy) | |
# | |
# Most users just set the name and type of their preferred keyserver. | |
# Note that most servers (with the notable exception of | |
# ldap://keyserver.pgp.com) synchronize changes with each other. Note | |
# also that a single server name may actually point to multiple | |
# servers via DNS round-robin. hkp://subkeys.pgp.net is an example of | |
# such a "server", which spreads the load over a number of physical | |
# servers. | |
keyserver hkp://keyserver.undergrid.net | |
keyserver hkp://na.pool.sks-keyservers.net | |
keyserver hkp://keyring.debian.org | |
keyserver-options ca-cert-file=~/.gnupg/sks-keyservers.netCA.pem | |
# Common options for keyserver functions: | |
# | |
# include-disabled = when searching, include keys marked as "disabled" | |
# on the keyserver (not all keyservers support this). | |
# | |
# no-include-revoked = when searching, do not include keys marked as | |
# "revoked" on the keyserver. | |
# | |
# verbose = show more information as the keys are fetched. | |
# Can be used more than once to increase the amount | |
# of information shown. | |
# | |
# use-temp-files = use temporary files instead of a pipe to talk to the | |
# keyserver. Some platforms (Win32 for one) always | |
# have this on. | |
# | |
# keep-temp-files = do not delete temporary files after using them | |
# (really only useful for debugging) | |
# | |
# honor-http-proxy = if the keyserver uses HTTP, honor the http_proxy | |
# environment variable | |
# | |
# broken-http-proxy = try to work around a buggy HTTP proxy | |
# | |
# auto-key-retrieve = automatically fetch keys as needed from the keyserver | |
# when verifying signatures or when importing keys that | |
# have been revoked by a revocation key that is not | |
# present on the keyring. | |
# | |
# no-include-attributes = do not include attribute IDs (aka "photo IDs") | |
# when sending keys to the keyserver. | |
keyserver-options auto-key-retrieve honor-http-proxy broken-http-proxy include-subkeys honor-keyserver-url honor-pka-record | |
auto-key-locate pka,keyserver | |
# Display photo user IDs in key listings | |
# list-options show-photos | |
#list-options show-policy-urls show-keyserver-urls | |
# Display photo user IDs when a signature from a key with a photo is | |
# verified | |
# verify-options show-photos | |
verify-options show-policy-urls show-keyserver-urls pka-lookups | |
import-options repair-pks-subkey-bug import-clean | |
export-options export-clean | |
# Use this program to display photo user IDs | |
# | |
# %i is expanded to a temporary file that contains the photo. | |
# %I is the same as %i, but the file isn't deleted afterwards by GnuPG. | |
# %k is expanded to the key ID of the key. | |
# %K is expanded to the long OpenPGP key ID of the key. | |
# %t is expanded to the extension of the image (e.g. "jpg"). | |
# %T is expanded to the MIME type of the image (e.g. "image/jpeg"). | |
# %f is expanded to the fingerprint of the key. | |
# %% is %, of course. | |
# | |
# If %i or %I are not present, then the photo is supplied to the | |
# viewer on standard input. If your platform supports it, standard | |
# input is the best way to do this as it avoids the time and effort in | |
# generating and then cleaning up a secure temp file. | |
# | |
# The default program is "xloadimage -fork -quiet -title 'KeyID 0x%k' stdin" | |
# On Mac OS X and Windows, the default is to use your regular JPEG image | |
# viewer. | |
# | |
# Some other viewers: | |
# photo-viewer "qiv %i" | |
# photo-viewer "ee %i" | |
# photo-viewer "display -title 'KeyID 0x%k'" | |
# | |
# This one saves a copy of the photo ID in your home directory: | |
# photo-viewer "cat > ~/photoid-for-key-%k.%t" | |
# | |
# Use your MIME handler to view photos: | |
# photo-viewer "metamail -q -d -b -c %T -s 'KeyID 0x%k' -f GnuPG" | |
# Passphrase agent | |
# | |
# We support the old experimental passphrase agent protocol as well as | |
# the new Assuan based one (currently available in the "newpg" package | |
# at ftp.gnupg.org/gcrypt/alpha/aegypten/). To make use of the agent, | |
# you have to run an agent as daemon and use the option | |
# | |
use-agent | |
no-default-keyring | |
secret-keyring ~/.gnupg/keyrings.d/secring.gpg | |
keyring ~/.gnupg/pubring.gpg | |
primary-keyring ~/.gnupg/pubring.gpg | |
trustdb-name ~/.gnupg/trustdb.gpg | |
trusted-key 544C486862DBDF62 # 1024D/62DBDF62 2002-03-27 Personal | |
trusted-key D573D5B129AB4CDD # 1024D/29AB4CDD 2002-03-27 Debian Maintainer | |
trusted-key 15D0A62ED01E190C # 4096R/D01E190C 2011-12-23 Personal | |
trusted-key FFCE1C9A4FADF197 # 4096R/4FADF197 2011-12-23 Debian Developer | |
cert-policy-url http://undergrid.net/legal/gpg/policy/20111224/67dbe13b5a8d42041f0b09e2b7d244f842fccb8ca3bfc70b793eee3e65286dc1 | |
require-cross-certification | |
personal-digest-preferences SHA256 | |
# cert-digest-algo SHA256 | |
default-preference-list SHA512 SHA384 SHA256 SHA224 AES256 AES192 AES CAST5 ZLIB BZIP2 ZIP Uncompressed | |
default-cert-level 3 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Note that GnuPG 1 doesn't do tilde expansion and with GnuPG 2 one has to configure a certificate in
~/.gnupg/dirmngr.conf
using thehkp-cacert
directive - which does support tilde expansion.