gpg.conf (8078B)
1 no-greeting 2 default-key ED59FC1A 3 4 # If you do not pass a recipient to gpg, it will ask for one. Using 5 # this option you can encrypt to a default key. Key validation will 6 # not be done in this case. The second form uses the default key as 7 # default recipient. 8 9 #default-recipient some-user-id 10 #default-recipient-self 11 12 # Use --encrypt-to to add the specified key as a recipient to all 13 # messages. This is useful, for example, when sending mail through a 14 # mail client that does not automatically encrypt mail to your key. 15 # In the example, this option allows you to read your local copy of 16 # encrypted mail that you've sent to others. 17 18 encrypt-to ED59FC1A 19 20 # By default GnuPG creates version 4 signatures for data files as 21 # specified by OpenPGP. Some earlier (PGP 6, PGP 7) versions of PGP 22 # require the older version 3 signatures. Setting this option forces 23 # GnuPG to create version 3 signatures. 24 25 #force-v3-sigs 26 27 # Because some mailers change lines starting with "From " to ">From " 28 # it is good to handle such lines in a special way when creating 29 # cleartext signatures; all other PGP versions do it this way too. 30 31 #no-escape-from-lines 32 33 # If you do not use the Latin-1 (ISO-8859-1) charset, you should tell 34 # GnuPG which is the native character set. Please check the man page 35 # for supported character sets. This character set is only used for 36 # metadata and not for the actual message which does not undergo any 37 # translation. Note that future version of GnuPG will change to UTF-8 38 # as default character set. In most cases this option is not required 39 # as GnuPG is able to figure out the correct charset at runtime. 40 41 #charset utf-8 42 43 # Group names may be defined like this: 44 # group mynames = paige 0x12345678 joe patti 45 # 46 # Any time "mynames" is a recipient (-r or --recipient), it will be 47 # expanded to the names "paige", "joe", and "patti", and the key ID 48 # "0x12345678". Note there is only one level of expansion - you 49 # cannot make an group that points to another group. Note also that 50 # if there are spaces in the recipient name, this will appear as two 51 # recipients. In these cases it is better to use the key ID. 52 53 #group mynames = paige 0x12345678 joe patti 54 55 # Lock the file only once for the lifetime of a process. If you do 56 # not define this, the lock will be obtained and released every time 57 # it is needed, which is usually preferable. 58 59 #lock-once 60 61 # GnuPG can send and receive keys to and from a keyserver. These 62 # servers can be HKP, email, or LDAP (if GnuPG is built with LDAP 63 # support). 64 # 65 # Example HKP keyserver: 66 # hkp://keys.gnupg.net 67 # hkp://subkeys.pgp.net 68 # 69 # Example email keyserver: 70 # mailto:pgp-public-keys@keys.pgp.net 71 # 72 # Example LDAP keyservers: 73 # ldap://keyserver.pgp.com 74 # 75 # Regular URL syntax applies, and you can set an alternate port 76 # through the usual method: 77 # hkp://keyserver.example.net:22742 78 # 79 # Most users just set the name and type of their preferred keyserver. 80 # Note that most servers (with the notable exception of 81 # ldap://keyserver.pgp.com) synchronize changes with each other. Note 82 # also that a single server name may actually point to multiple 83 # servers via DNS round-robin. hkp://keys.gnupg.net is an example of 84 # such a "server", which spreads the load over a number of physical 85 # servers. To see the IP address of the server actually used, you may use 86 # the "--keyserver-options debug". 87 88 keyserver keyserver.ubuntu.com 89 #keyserver mailto:pgp-public-keys@keys.nl.pgp.net 90 #keyserver ldap://keyserver.pgp.com 91 92 # Common options for keyserver functions: 93 # 94 # include-disabled : when searching, include keys marked as "disabled" 95 # on the keyserver (not all keyservers support this). 96 # 97 # no-include-revoked : when searching, do not include keys marked as 98 # "revoked" on the keyserver. 99 # 100 # verbose : show more information as the keys are fetched. 101 # Can be used more than once to increase the amount 102 # of information shown. 103 # 104 # use-temp-files : use temporary files instead of a pipe to talk to the 105 # keyserver. Some platforms (Win32 for one) always 106 # have this on. 107 # 108 # keep-temp-files : do not delete temporary files after using them 109 # (really only useful for debugging) 110 # 111 # http-proxy="proxy" : set the proxy to use for HTTP and HKP keyservers. 112 # This overrides the "http_proxy" environment variable, 113 # if any. 114 # 115 # auto-key-retrieve : automatically fetch keys as needed from the keyserver 116 # when verifying signatures or when importing keys that 117 # have been revoked by a revocation key that is not 118 # present on the keyring. 119 # 120 # no-include-attributes : do not include attribute IDs (aka "photo IDs") 121 # when sending keys to the keyserver. 122 123 #keyserver-options auto-key-retrieve 124 125 # Display photo user IDs in key listings 126 127 # list-options show-photos 128 129 # Display photo user IDs when a signature from a key with a photo is 130 # verified 131 132 # verify-options show-photos 133 134 # Use this program to display photo user IDs 135 # 136 # %i is expanded to a temporary file that contains the photo. 137 # %I is the same as %i, but the file isn't deleted afterwards by GnuPG. 138 # %k is expanded to the key ID of the key. 139 # %K is expanded to the long OpenPGP key ID of the key. 140 # %t is expanded to the extension of the image (e.g. "jpg"). 141 # %T is expanded to the MIME type of the image (e.g. "image/jpeg"). 142 # %f is expanded to the fingerprint of the key. 143 # %% is %, of course. 144 # 145 # If %i or %I are not present, then the photo is supplied to the 146 # viewer on standard input. If your platform supports it, standard 147 # input is the best way to do this as it avoids the time and effort in 148 # generating and then cleaning up a secure temp file. 149 # 150 # If no photo-viewer is provided, GnuPG will look for xloadimage, eog, 151 # or display (ImageMagick). On Mac OS X and Windows, the default is 152 # to use your regular JPEG image viewer. 153 154 photo-viewer "sxiv %i" 155 156 # 157 # Some other viewers: 158 # photo-viewer "qiv %i" 159 # photo-viewer "ee %i" 160 # 161 # This one saves a copy of the photo ID in your home directory: 162 # photo-viewer "cat > ~/photoid-for-key-%k.%t" 163 # 164 # Use your MIME handler to view photos: 165 # photo-viewer "metamail -q -d -b -c %T -s 'KeyID 0x%k' -f GnuPG" 166 167 # Passphrase agent 168 # 169 # We support the old experimental passphrase agent protocol as well as 170 # the new Assuan based one (currently available in the "newpg" package 171 # at ftp.gnupg.org/gcrypt/alpha/aegypten/). To make use of the agent, 172 # you have to run an agent as daemon and use the option 173 # 174 # use-agent 175 # 176 # which tries to use the agent but will fallback to the regular mode 177 # if there is a problem connecting to the agent. The normal way to 178 # locate the agent is by looking at the environment variable 179 # GPG_AGENT_INFO which should have been set during gpg-agent startup. 180 # In certain situations the use of this variable is not possible, thus 181 # the option 182 # 183 # --gpg-agent-info=<path>:<pid>:1 184 # 185 # may be used to override it. 186 187 # Automatic key location 188 # 189 # GnuPG can automatically locate and retrieve keys as needed using the 190 # auto-key-locate option. This happens when encrypting to an email 191 # address (in the "user@example.com" form), and there are no 192 # user@example.com keys on the local keyring. This option takes the 193 # following arguments, in the order they are to be tried: 194 # 195 # cert = locate a key using DNS CERT, as specified in RFC-4398. 196 # GnuPG can handle both the PGP (key) and IPGP (URL + fingerprint) 197 # CERT methods. 198 # 199 # pka = locate a key using DNS PKA. 200 # 201 # ldap = locate a key using the PGP Universal method of checking 202 # "ldap://keys.(thedomain)". For example, encrypting to 203 # user@example.com will check ldap://keys.example.com. 204 # 205 # keyserver = locate a key using whatever keyserver is defined using 206 # the keyserver option. 207 # 208 # You may also list arbitrary keyservers here by URL. 209 # 210 # Try CERT, then PKA, then LDAP, then hkp://subkeys.net: 211 #auto-key-locate cert pka ldap hkp://subkeys.pgp.net