gpg.conf 2.0 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970
  1. #
  2. # This is an implementation of the Riseup OpenPGP Best Practices
  3. # https://help.riseup.net/en/security/message-security/openpgp/best-practices
  4. #
  5. #-----------------------------
  6. # default key
  7. #-----------------------------
  8. # The default key to sign with. If this option is not used, the default key is
  9. # the first key found in the secret keyring
  10. default-key 0x167F8EA5001AFA9C
  11. default-recipient 0x921A97F4DC6D31F0
  12. #-----------------------------
  13. # behavior
  14. #-----------------------------
  15. # Disable inclusion of the version string in ASCII armored output
  16. no-emit-version
  17. # Disable comment string in clear text signatures and ASCII armored messages
  18. no-comments
  19. # Display long key IDs
  20. keyid-format 0xlong
  21. # List all keys (or the specified ones) along with their fingerprints
  22. with-fingerprint
  23. # Display the calculated validity of user IDs during key listings
  24. list-options show-uid-validity
  25. verify-options show-uid-validity
  26. # Try to use the GnuPG-Agent. With this option, GnuPG first tries to connect to
  27. # the agent before it asks for a passphrase.
  28. use-agent
  29. #-----------------------------
  30. # keyserver
  31. #-----------------------------
  32. # When searching for a key with --search-keys, include keys that are marked on
  33. # the keyserver as revoked
  34. keyserver-options include-revoked
  35. #-----------------------------
  36. # algorithm and ciphers
  37. #-----------------------------
  38. # list of personal digest preferences. When multiple digests are supported by
  39. # all recipients, choose the strongest one
  40. personal-cipher-preferences AES256 AES192 AES CAST5
  41. # list of personal digest preferences. When multiple ciphers are supported by
  42. # all recipients, choose the strongest one
  43. personal-digest-preferences SHA512 SHA384 SHA256 SHA224
  44. # message digest algorithm used when signing a key
  45. cert-digest-algo SHA512
  46. # This preference list is used for new keys and becomes the default for
  47. # "setpref" in the edit menu
  48. default-preference-list SHA512 SHA384 SHA256 SHA224 AES256 AES192 AES CAST5 ZLIB BZIP2 ZIP Uncompressed