1 # Configuration file for GnuPG.
3 # Thanks to [1] for some hints to generate stronger keys (read on 2013-04-04).
5 # [1]: https://we.riseup.net/riseuplabs+paow/openpgp-best-practices
7 # Copyright (C) 2009-2013 Simon Ruderich
9 # This file is free software: you can redistribute it and/or modify
10 # it under the terms of the GNU General Public License as published by
11 # the Free Software Foundation, either version 3 of the License, or
12 # (at your option) any later version.
14 # This file is distributed in the hope that it will be useful,
15 # but WITHOUT ANY WARRANTY; without even the implied warranty of
16 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 # GNU General Public License for more details.
19 # You should have received a copy of the GNU General Public License
20 # along with this file. If not, see <http://www.gnu.org/licenses/>.
25 # Don't display the copyright notice.
28 # Use long keyids because the short ones have collisions.
34 # Use stronger preferences. These are not enforced, but tried in the given
35 # order and the first supported by all recipients is used.
37 # Ciphers for encryption.
38 personal-cipher-preferences AES256 AES192 AES CAST5
39 # Don't use insecure hashes like SHA1 or MD5 and prefer stronger hashes.
40 personal-digest-preferences SHA512 SHA384 SHA256 SHA224
41 # Prefer better compression methods.
42 personal-compress-preferences BZIP2 ZLIB ZIP Uncompressed
44 # Default preferences when generating a new key. Use the three settings above
45 # combined to create stronger keys.
46 default-preference-list SHA512 SHA384 SHA256 SHA224 AES256 AES192 AES CAST5 BZIP2 ZLIB ZIP Uncompressed
48 # Don't use SHA1 when signing keys, this includes self-certificates. This
49 # setting is separate from the settings above and needs to be explicitly set
50 # or SHA1 will be used! Thanks to [1].
51 cert-digest-algo SHA512
56 # Mangle passphrases for private keys and symmetric encryption by applying a
57 # hash function (s2k-digest-algo) with a salt s2k-count times (default).
59 # Increase count. Takes ~0.5 seconds on my machine.
61 # Use SHA-512 as hash function. Takes a little longer than SHA-1, which is the
63 s2k-digest-algo SHA512
68 # Use the given keyserver.
69 keyserver hkp://pool.sks-keyservers.net
71 # Don't use the preferred keyserver of the key, but our keyserver pool
72 # instead. This way we won't use any broken keyservers like pgp.mit.edu
73 # specified by the key.
74 keyserver-options no-honor-keyserver-url
79 # Use my newest key as default key.
80 default-key 0x92FEFDB7E44C32F9