shell-things/.mikaela/gpg.conf

76 lines
2.5 KiB
Plaintext
Raw Normal View History

2012-12-21 13:50:51 +01:00
# Options for GnuPG
# Copyright 1998, 1999, 2000, 2001, 2002, 2003,
# 2010 Free Software Foundation, Inc.
# 2012 - 2018 Mikaela Suomalainen
2012-12-21 13:50:51 +01:00
# This file is free software; as a special exception the author gives
# unlimited permission to copy and/or distribute it, with or without
# modifications, as long as this notice is preserved.
2019-12-06 18:40:00 +01:00
#
2012-12-21 13:50:51 +01:00
# This file is distributed in the hope that it will be useful, but
# WITHOUT ANY WARRANTY, to the extent permitted by law; without even the
# implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
#
# Unless you specify which option file to use (with the command line
# option "--options filename"), GnuPG uses the file ~/.gnupg/gpg.conf
# by default.
#
# An options file can contain any long options which are available in
# GnuPG. If the first non white space character of a line is a '#',
# this line is ignored. Empty lines are also ignored.
#
# See the man page for a list of options.
2019-12-06 18:41:24 +01:00
# Use my key by default
default-key 0x99392F62BAE30723
# WTOP
#default-key 0xDC189FE6FA9BD685
2019-12-06 18:40:00 +01:00
# Ignore preferred keyserver, remove signatures from keys not in keyring
# import clean as it may be better for WoT than self-sigs-only and I
# am not setting import/export options in fear of removing signatures
# useful to other people in public keys that multiple people are touching.
keyserver-options no-honor-keyserver-url import-clean
2012-12-21 13:50:51 +01:00
# Try to automatically find keys from local/wkd if key for email address isn't found, but we are encrypting to email address.
2019-12-05 13:51:13 +01:00
auto-key-retrieve
auto-key-locate local,wkd
2019-11-20 10:15:39 +01:00
2012-12-21 13:50:51 +01:00
# Encrypt to sender's key by default
default-recipient-self
2019-12-06 18:40:00 +01:00
# I don't think there is point in "encrypt-to 0xOWNKEYID, because there
# is the default-recipient-self above.
2012-12-21 13:50:51 +01:00
# Use UTF-8 charset
charset UTF-8
display-charset utf-8
2012-12-21 13:50:51 +01:00
# use GPG Agent to avoid retyping passphrase very often.
2012-12-21 13:50:51 +01:00
use-agent
# Do everything in ASCII format by default instead of binary
armor
# Show the LONG KEYID and fingerprint by default and tell that it's hexadecimal string.
2012-12-21 13:50:51 +01:00
keyid-format 0xLONG
with-fingerprint
2012-12-21 13:50:51 +01:00
# Ask everything
ask-cert-level
ask-cert-expire
# Copying https://we.riseup.net/riseuplabs+paow/openpgp-best-practices#update-your-gpg-defaults
# when outputting certificates, view user IDs distinctly from keys:
fixed-list-mode
# You should always know at a glance which User IDs gpg thinks are legitimately bound to the keys in your keyring:
verify-options show-uid-validity
list-options show-uid-validity
# Disable comments
no-comments
# Don't output version, small chance of having people put same keys on IPFS
no-emit-version