From e6051a38a672182c7f7dfa083ca1e72b97803c94 Mon Sep 17 00:00:00 2001 From: Toby Vincent Date: Fri, 25 Mar 2022 23:38:13 -0500 Subject: feat: migrated to gnu stow --- gnupg/.gnupg/gpg-agent.conf | 2 ++ gnupg/.gnupg/gpg.conf | 64 +++++++++++++++++++++++++++++++++++++++++++++ gnupg/.gnupg/scdaemon.conf | 2 ++ gnupg/.gnupg/trustfile.txt | 3 +++ 4 files changed, 71 insertions(+) create mode 100644 gnupg/.gnupg/gpg-agent.conf create mode 100755 gnupg/.gnupg/gpg.conf create mode 100755 gnupg/.gnupg/scdaemon.conf create mode 100644 gnupg/.gnupg/trustfile.txt (limited to 'gnupg/.gnupg') diff --git a/gnupg/.gnupg/gpg-agent.conf b/gnupg/.gnupg/gpg-agent.conf new file mode 100644 index 0000000..52034d5 --- /dev/null +++ b/gnupg/.gnupg/gpg-agent.conf @@ -0,0 +1,2 @@ +enable-ssh-support +enable-putty-support \ No newline at end of file diff --git a/gnupg/.gnupg/gpg.conf b/gnupg/.gnupg/gpg.conf new file mode 100755 index 0000000..cc4ecce --- /dev/null +++ b/gnupg/.gnupg/gpg.conf @@ -0,0 +1,64 @@ +# https://github.com/drduh/config/blob/master/gpg.conf +# https://www.gnupg.org/documentation/manuals/gnupg/GPG-Configuration-Options.html +# https://www.gnupg.org/documentation/manuals/gnupg/GPG-Esoteric-Options.html +# Use AES256, 192, or 128 as cipher +personal-cipher-preferences AES256 AES192 AES +# Use SHA512, 384, or 256 as digest +personal-digest-preferences SHA512 SHA384 SHA256 +# Use ZLIB, BZIP2, ZIP, or no compression +personal-compress-preferences ZLIB BZIP2 ZIP Uncompressed +# Default preferences for new keys +default-preference-list SHA512 SHA384 SHA256 AES256 AES192 AES ZLIB BZIP2 ZIP Uncompressed +# SHA512 as digest to sign keys +cert-digest-algo SHA512 +# SHA512 as digest for symmetric ops +s2k-digest-algo SHA512 +# AES256 as cipher for symmetric ops +s2k-cipher-algo AES256 +# UTF-8 support for compatibility +charset utf-8 +# Show Unix timestamps +fixed-list-mode +# No comments in signature +no-comments +# No version in output +no-emit-version +# Disable banner +no-greeting +# Long hexidecimal key format +keyid-format 0xlong +# Display UID validity +list-options show-uid-validity +verify-options show-uid-validity +# Display all keys and their fingerprints +with-fingerprint +# Display key origins and updates +#with-key-origin +# Cross-certify subkeys are present and valid +require-cross-certification +# Disable caching of passphrase for symmetrical ops +no-symkey-cache +# Enable smartcard +use-agent +# Disable recipient key ID in messages +throw-keyids +# Default/trusted key ID to use (helpful with throw-keyids) +default-key 0xC8F6E06F5C8E2634 +trusted-key 0xC8F6E06F5C8E2634 +# Use the default key as default recipient +default-recipient-self +# Group recipient keys (preferred ID last) +#group keygroup = 0xFF00000000000001 0xFF00000000000002 0xFF3E7D88647EBCDB +# Keyserver URL +keyserver hkps://keys.openpgp.org +#keyserver hkps://keyserver.ubuntu.com:443 +#keyserver hkps://hkps.pool.sks-keyservers.net +#keyserver hkps://pgp.ocf.berkeley.edu +# Proxy to use for keyservers +keyserver-options auto-key-retrieve +#keyserver-options http-proxy=http://127.0.0.1:8118 +#keyserver-options http-proxy=socks5-hostname://127.0.0.1:9050 +# Verbose output +#verbose +# Show expired subkeys +#list-options show-unusable-subkeys \ No newline at end of file diff --git a/gnupg/.gnupg/scdaemon.conf b/gnupg/.gnupg/scdaemon.conf new file mode 100755 index 0000000..dbdae90 --- /dev/null +++ b/gnupg/.gnupg/scdaemon.conf @@ -0,0 +1,2 @@ +reader-port Yubico YubiKey OTP+FIDO+CCID 0 +card-timeout 1 \ No newline at end of file diff --git a/gnupg/.gnupg/trustfile.txt b/gnupg/.gnupg/trustfile.txt new file mode 100644 index 0000000..969df06 --- /dev/null +++ b/gnupg/.gnupg/trustfile.txt @@ -0,0 +1,3 @@ +# List of assigned trustvalues, created Sat 08 May 2021 02:20:43 PM CDT +# (Use "gpg --import-ownertrust" to restore them) +B9520450A6280A2E7448C22EC8F6E06F5C8E2634:6: -- cgit v1.2.3-70-g09d2