1 # Configuration file for GnuPG.
3 # Thanks to [1] for some hints to generate stronger keys (read on 2013-04-04).
5 # [1]: https://we.riseup.net/riseuplabs+paow/openpgp-best-practices
7 # Copyright (C) 2009-2013 Simon Ruderich
9 # This file is free software: you can redistribute it and/or modify
10 # it under the terms of the GNU General Public License as published by
11 # the Free Software Foundation, either version 3 of the License, or
12 # (at your option) any later version.
14 # This file is distributed in the hope that it will be useful,
15 # but WITHOUT ANY WARRANTY; without even the implied warranty of
16 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 # GNU General Public License for more details.
19 # You should have received a copy of the GNU General Public License
20 # along with this file. If not, see <http://www.gnu.org/licenses/>.
25 # Don't display the copyright notice.
28 # Use long keyids because the short ones have collisions.
31 # Display validity of UIDs when verifying signatures.
32 list-options show-uid-validity
33 verify-options show-uid-validity
38 # Use stronger preferences. These are not enforced, but tried in the given
39 # order and the first supported by all recipients is used.
41 # Ciphers for encryption.
42 personal-cipher-preferences AES256 AES192 AES CAST5
43 # Don't use insecure hashes like SHA1 or MD5 and prefer stronger hashes.
44 personal-digest-preferences SHA512 SHA384 SHA256 SHA224
45 # Prefer better compression methods.
46 personal-compress-preferences BZIP2 ZLIB ZIP Uncompressed
48 # Default preferences when generating a new key. Use the three settings above
49 # combined to create stronger keys.
50 default-preference-list SHA512 SHA384 SHA256 SHA224 AES256 AES192 AES CAST5 BZIP2 ZLIB ZIP Uncompressed
52 # Don't use SHA1 when signing keys, this includes self-certificates. This
53 # setting is separate from the settings above and needs to be explicitly set
54 # or SHA1 will be used! Thanks to [1].
55 cert-digest-algo SHA512
60 # Mangle passphrases for private keys and symmetric encryption by applying a
61 # hash function (s2k-digest-algo) with a salt s2k-count times (default).
63 # Increase count. Takes ~0.5 seconds on my machine.
65 # Use SHA-512 as hash function. Takes a little longer than SHA-1, which is the
67 s2k-digest-algo SHA512
72 # Use the given keyserver.
73 keyserver hkp://pool.sks-keyservers.net
75 # Don't use the preferred keyserver of the key, but our keyserver pool
76 # instead. This way we won't use any broken keyservers like pgp.mit.edu
77 # specified by the key.
78 keyserver-options no-honor-keyserver-url
83 # Use my newest key as default key.
84 default-key 0x92FEFDB7E44C32F9