# based on https://github.com/ioerror/duraconf #----------------------------- # behavior #----------------------------- # Disable inclusion of the version string in ASCII armored output no-emit-version # Disable comment string in clear text signatures and ASCII armored messages no-comments # Display long key IDs keyid-format 0xlong # List all keys (or the specified ones) along with their fingerprints with-fingerprint # Display the calculed validity of user IDs during key linstings list-options show-uid-validity verify-options show-uid-validity # Try to use the GnuPG-Agent. With this option, GnuPG first tries to connect # the agent before it asks a passphrase. use-agent #----------------------------- # keyserver #----------------------------- # This is the server that --recv-keys, --send-keys, and --search-keys will # communicate with to receive keys from, send keys to, and search for keys on #keyserver hkps://keys.openpgp.org keyserver hkp://pool.sks-keyservers.net # Provide a certificate store to override the system default # Get this from https://sks-keyservers.net/sks-keyservers.netCA.pem #keyserver-options ca-cert-file=/usr/local/etc/ssl/certs/hkps.pool.sks-keyservers.net.pem # NOT USED FOR THE MOMENT BECAUSE IT'S A DIFFERENT KEY NETWORK # Set the proxy to use for HTTP and HKP keyservers - default to the standard # local Tor socks proxy # It is encoraged to use Tor for improved anonymity. Preferrably use aither # a dedicated SOCKSPort for GnuPG and/or enable IsolateDestPort and # IsolateDestAddr #keyserver-options http-proxy=socks5-hostname://127.0.0.1:9050 # Don't leak DNS, see https://trac.torproject.org/projects/tor/ticket/2846 #keyserver-options no-try-dns-srv # Seems to be ok now (comment 51 of ticket) # when using --refresh-keys, if the key in question has preferred keyserver # url, then disable use of that preferred keyserver to regresh the key from keyserver-options no-honor-keyserver-url # When searching for a key with --search-keys, include keys that are marked on # the keyserver as revoked keyserver-options include-revoked #----------------------------- # algorithm and ciphers #----------------------------- # list of personal digest preferences. When multiple digest are supported by # all recipients, choose the stringest one personal-cipher-preferences AES256 AES192 AES CAST5 # list of personal digest preferences. WHen multiple ciphers are supported by # all recipients, choose the strongest one personal-digest-preferences SHA512 SHA384 SHA224 # message digest algorithm used when signing a key cert-digest-algo SHA512 # This preference list is used for new keys and becomes the default tor # 'setpref' in the edit menu default-preference-list SHA512 SHA384 SHA256 AES256 AES192 AES CAST5 ZLIB BZIP2 ZIP Uncompressed pinentry-mode default