aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--gnupg/gpa.conf5
-rw-r--r--gnupg/gpg-agent.conf13
-rw-r--r--gnupg/gpg.conf35
3 files changed, 53 insertions, 0 deletions
diff --git a/gnupg/gpa.conf b/gnupg/gpa.conf
new file mode 100644
index 0000000..f221319
--- /dev/null
+++ b/gnupg/gpa.conf
@@ -0,0 +1,5 @@
+default-key 5134EF9EAF65F95B6BB1608E50FB9B273A9D0BB5
+backup-generated
+advanced-ui
+show-advanced-options
+detailed-view
diff --git a/gnupg/gpg-agent.conf b/gnupg/gpg-agent.conf
new file mode 100644
index 0000000..75402a8
--- /dev/null
+++ b/gnupg/gpg-agent.conf
@@ -0,0 +1,13 @@
+# GPGConf disabled this option here at Sun 19 Jan 2014 07:36:12 PM CET
+# default-cache-ttl 300
+# GPGConf disabled this option here at Sun 19 Jan 2014 07:36:12 PM CET
+# max-cache-ttl 999999
+###+++--- GPGConf ---+++###
+enable-ssh-support
+default-cache-ttl 300
+max-cache-ttl 3000
+###+++--- GPGConf ---+++### Sun 19 Jan 2014 07:36:48 PM CET
+# GPGConf edited this configuration file.
+# It will disable options before this marked block, but it will
+# never change anything below these lines.
+pinentry-program /usr/bin/pinentry-qt4
diff --git a/gnupg/gpg.conf b/gnupg/gpg.conf
new file mode 100644
index 0000000..b40b3f0
--- /dev/null
+++ b/gnupg/gpg.conf
@@ -0,0 +1,35 @@
+
+###+++--- GPGConf ---+++###
+utf8-strings
+keyserver hkps.pool.sks-keyservers.net
+keyserver-options ca-cert-file=~/.config/gnupg/sks-keyservers.netCA.pem
+keyserver-options no-honor-keyserver-url
+auto-key-locate local,pka,keyserver
+keyserver-options honor-pka-record,auto-key-retrieve
+verify-options show-keyserver-urls,pka-lookups
+###+++--- GPGConf ---+++### Tue 14 Jan 2014 09:55:23 AM CET
+# GPGConf edited this configuration file.
+# It will disable options before this marked block, but it will
+# never change anything below these lines.
+default-key 3A9D0BB5
+homedir ~/.config/gnupg
+display-charset utf-8
+armor
+use-agent
+encrypt-to 3A9D0BB5
+personal-digest-preferences SHA512
+
+# when outputting certificates, view user IDs distinctly from keys:
+fixed-list-mode
+# short-keyids are trivially spoofed; it's easy to create a long-keyid collision; if you care about strong key identifiers, you always want to see the fingerprint:
+keyid-format 0xlong
+#with-fingerprint
+# when multiple digests are supported by all recipients, choose the strongest one:
+personal-digest-preferences SHA512 SHA384 SHA256 SHA224
+# preferences chosen for new keys should prioritize stronger algorithms:
+default-preference-list SHA512 SHA384 SHA256 SHA224 AES256 AES192 AES CAST5 BZIP2 ZLIB ZIP Uncompressed
+# You should always know at a glance which User IDs gpg thinks are legitimately bound to the keys in your keyring:
+verify-options show-uid-validity
+list-options show-uid-validity
+# when making an OpenPGP certification, use a stronger digest than the default SHA1:
+cert-digest-algo SHA512