1
0
forked from extern/nix-config
donovanglover-nix-config/gnupg/.gnupg/gpg.conf
2018-02-27 23:04:08 -05:00

52 lines
1.7 KiB
Plaintext

# New Start: A modern Arch workflow built with an emphasis on functionality.
# Copyright (C) 2017 Donovan Glover
# 1. Use a keypool (specifically sks) instead of a regular keyserver
# 2. Use hkps to ensure a secure connection (hkp is to GPG as what http is to the web)
keyserver hkps://hkps.pool.sks-keyservers.net
# Use our own certificate to ensure a secure communication
# Verify the certificate with `openssl x509 -in <CERT_FILE> -noout -fingerprint`
# This should output 79:1B:27:A3:8E:66:7F:80:27:81:4D:4E:68:E7:C4:78:A4:5D:5A:17
keyserver-options ca-cert-file=sks-cert.pem
# Ignore all other keyservers since they may be malicious, whether intentional or not.
# This prevents pulling keys from a specific keyserver and forces GPG to use the keypool
keyserver-options no-honor-keyserver-url
# Use SHA512 instead of SHA256
personal-digest-preferences SHA512
cert-digest-algo SHA512
# Use AES256 instead of AES128 or CAST5
cipher-algo AES256
# Prefer encryption algorithms in this order
default-preference-list SHA512 SHA384 SHA256 SHA224 AES256 AES192 AES CAST5 ZLIB BZIP2 ZIP Uncompressed
personal-cipher-preferences TWOFISH CAMELLIA256 AES 3DES
# Prevent the recipient id from being leaked in the message
throw-keyids
# Always show long key IDs
keyid-format 0xlong
# Always show full fingerprints of keys
with-fingerprint
# Never show the version number (should be default)
no-emit-version
# Never use comments (should be default)
no-comments
# Always use utf-8
display-charset utf-8
# Always view user IDs distinctly from keys (should be default)
fixed-list-mode
# Always show user ID validity (should be default)
verify-options show-uid-validity
list-options show-uid-validity