shell-things/gpg/gpg.conf

105 lines
3.7 KiB
Plaintext

# Options for GnuPG
# Copyright 1998, 1999, 2000, 2001, 2002, 2003,
# 2010 Free Software Foundation, Inc.
# 2012 - 2016 Mikaela Suomalainen
# This file is free software; as a special exception the author gives
# unlimited permission to copy and/or distribute it, with or without
# modifications, as long as this notice is preserved.
#
# This file is distributed in the hope that it will be useful, but
# WITHOUT ANY WARRANTY, to the extent permitted by law; without even the
# implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
#
# Unless you specify which option file to use (with the command line
# option "--options filename"), GnuPG uses the file ~/.gnupg/gpg.conf
# by default.
#
# An options file can contain any long options which are available in
# GnuPG. If the first non white space character of a line is a '#',
# this line is ignored. Empty lines are also ignored.
#
# See the man page for a list of options.
# This is one of the most used keyservers as far as I know.
keyserver hkp://pool.sks-keyservers.net
keyserver-options auto-key-retrieve no-include-revoked
#import-clean
# Try to automatically find keys from keyserver if key for email address isn't found, but we are encrypting to email address.
auto-key-locate keyserver
# Use my key by default
#default-key 0x0C207F07B2F32B67 # MIKAELA_GREP # MIKAELA_GREP_GPG
# Encrypt to sender's key by default
default-recipient-self
# Always encrypt to my key
#encrypt-to 0x0C207F07B2F32B67# MIKAELA_GREP MIKAELA_GREP_GPG
# Use UTF-8 charset
charset UTF-8
display-charset utf-8
# use GPG Agent to avoid retyping passphrase very ofoten.
use-agent
# Do everything in ASCII format by default instead of binary
armor
# Note to self: import-clean = delete signatures from unknown keys || import-minimal = remove all signatures from keys.
personal-cipher-preferences AES256,AES192,AES,CAST5,3DES
personal-digest-preferences SHA512,SHA384,SHA256,SHA224,RIPEMD160,SHA1,MD5
personal-compress-preferences BZIP2,ZLIB,ZIP
# Default preferences
default-preference-list AES256,AES192,AES,CAST5,3DES SHA512,SHA384,SHA256,SHA224,RIPEMD160,SHA1,MD5 BZIP2,ZLIB,ZIP
default-keyserver-url hkp://pool.sks-keyservers.net
# Forcing preferred settings even if it's against OpenPGP standards
cert-digest-algo SHA512
digest-algo SHA512
compress-algo BZIP2
no-allow-non-selfsigned-uid
allow-multiple-messages
# Show the LONG KEYID and fingerprint by default and tell that it's hexadecimal string.
keyid-format 0xLONG
with-fingerprint
# Use Eye Of Gnome as default image viewer
photo-viewer eog %i
# The default to use for the check level when signing a key.
#default-cert-level 2
lock-multiple
expert
#verbose
#verbose
#verbose
# Teach to be careful with sensitive things by exporting them like everything else
import-options import-local-sigs import-clean
export-options export-local-sigs export-attributes export-sensitive-revkeys export-clean
# Ask everything
ask-cert-level
ask-cert-expire
# Copying https://we.riseup.net/riseuplabs+paow/openpgp-best-practices#update-your-gpg-defaults
# when outputting certificates, view user IDs distinctly from keys:
fixed-list-mode
# You should always know at a glance which User IDs gpg thinks are legitimately bound to the keys in your keyring:
verify-options show-uid-validity
list-options show-uid-validity
# Add comments to things signed/encrypted by gpg
#comment Website: https://mikaela.info/ # MIKAELA_GREP MIKAELA_GREP_GPG
#comment Public key: https://mikaela.info/PGP/0xB2F32B67.txt # MIKAELA_GREP MIKAELA_GREP_GPG
#comment gpg --fetch-keys https://mikaela.info/PGP/0xB2F32B67.txt # MIKAELA_GREP MIKAELA_GREP_GPG
#comment Fingerprint = 2910 4A46 C561 5BF9 78A0 83F2 0C20 7F07 B2F3 2B67 # MIKAELA_GREP MIKAELA_GREP_GPG