all repos — archive/dotfiles @ aaaa3a1de82245f2a7b79475182eca113a2dfab2

Superseded by nixfiles

Configure GPG (version 2.1)
Alan Pearce alan@alanpearce.eu
Fri, 18 Aug 2017 21:23:35 +0200
commit

aaaa3a1de82245f2a7b79475182eca113a2dfab2

parent

a0c9b7633b0d4382e3681109d5011feae0e8bab3

M git/.config/git/configgit/.config/git/config
@@ -1,6 +1,7 @@ [user]
 	email = alan@alanpearce.eu
 	name = Alan Pearce
+	signingkey = 0xE711C48B9C041266
 [color]
 	branch = auto
 	diff = auto
@@ -41,4 +42,6 @@ tool = icdiff [difftool]
   prompt = false
 [difftool "icdiff"]
-  cmd = icdiff --line-numbers $LOCAL $REMOTE+  cmd = icdiff --line-numbers $LOCAL $REMOTE
+[gpg]
+	program = gpg2
A gnupg/.gnupg/dirmngr.conf
@@ -0,0 +1,1 @@+hkp-cacert = .gnupg/sks-keyservers.netCA.pem
A gnupg/.gnupg/gpa.conf
@@ -0,0 +1,2 @@+default-key 5FA779613E2AB0EEFC6DD3056A56F2A314E23293
+detailed-view
A gnupg/.gnupg/gpg-agent.conf
@@ -0,0 +1,3 @@+enable-ssh-support
+default-cache-ttl 600
+max-cache-ttl 7200
A gnupg/.gnupg/gpg.conf
@@ -0,0 +1,84 @@+#
+# This is an implementation of the Riseup OpenPGP Best Practices
+# https://help.riseup.net/en/security/message-security/openpgp/best-practices
+#
+
+
+#-----------------------------
+# default key
+#-----------------------------
+
+# The default key to sign with. If this option is not used, the default key is
+# the first key found in the secret keyring
+
+# default-key 
+
+#-----------------------------
+# behavior
+#-----------------------------
+
+# Disable inclusion of the version string in ASCII armored output
+no-emit-version
+
+# Disable comment string in clear text signatures and ASCII armored messages
+no-comments
+
+# Display long key IDs
+keyid-format 0xlong
+
+# List all keys (or the specified ones) along with their fingerprints
+with-fingerprint
+
+# Display the calculated validity of user IDs during key listings
+list-options show-uid-validity
+verify-options show-uid-validity
+
+# Try to use the GnuPG-Agent. With this option, GnuPG first tries to connect to
+# the agent before it asks for a passphrase.
+use-agent
+
+#-----------------------------
+# keyserver
+#-----------------------------
+
+# This is the server that --recv-keys, --send-keys, and --search-keys will
+# communicate with to receive keys from, send keys to, and search for keys on
+keyserver hkps://hkps.pool.sks-keyservers.net
+
+# Provide a certificate store to override the system default
+# Get this from https://sks-keyservers.net/sks-keyservers.netCA.pem
+# keyserver-options ca-cert-file=.gnupg/sks-keyservers.netCA.pem
+
+# Set the proxy to use for HTTP and HKP keyservers - default to the standard
+# local Tor socks proxy
+# It is encouraged to use Tor for improved anonymity. Preferrably use either a
+# dedicated SOCKSPort for GnuPG and/or enable IsolateDestPort and
+# IsolateDestAddr
+keyserver-options http-proxy=socks5-hostname://127.0.0.1:9050
+
+# When using --refresh-keys, if the key in question has a preferred keyserver
+# URL, then disable use of that preferred keyserver to refresh the key from
+keyserver-options no-honor-keyserver-url
+
+# When searching for a key with --search-keys, include keys that are marked on
+# the keyserver as revoked
+keyserver-options include-revoked
+
+#-----------------------------
+# algorithm and ciphers
+#-----------------------------
+
+# list of personal digest preferences. When multiple digests are supported by
+# all recipients, choose the strongest one
+personal-cipher-preferences AES256 AES192 AES CAST5
+
+# list of personal digest preferences. When multiple ciphers are supported by
+# all recipients, choose the strongest one
+personal-digest-preferences SHA512 SHA384 SHA256 SHA224
+
+# message digest algorithm used when signing a key
+cert-digest-algo SHA512
+
+# This preference list is used for new keys and becomes the default for
+# "setpref" in the edit menu
+default-preference-list SHA512 SHA384 SHA256 SHA224 AES256 AES192 AES CAST5 ZLIB BZIP2 ZIP Uncompressed
M xprofile/.xprofilexprofile/.xprofile
@@ -1,6 +1,7 @@ #!/bin/sh
 sh -c 'sleep 5 && xsetroot -cursor_name left_ptr' &
 xmodmap .xmodmaprc
+gpg-connect-agent /bye
 xrdb -I$HOME/.xresources .xresources/main
 cmst --minimized &
 sxhkd &
M zsh/.config/zsh/.zshrczsh/.config/zsh/.zshrc
@@ -106,7 +106,18 @@ zstyle ':completion:*' matcher-list 'm:{a-zA-Z-_}={A-Za-z_-}' 'r:|=*' 'l:|=* r:|=*'
 zstyle ':completion:*' completer _expand _complete _match
 
-if [[ -z $SSH_AUTH_SOCK && $commands[ssh-agent] ]]
+if [[ -n $commands[gpg-connect-agent] ]]
+then
+  # When using SSH support, use the current TTY for passphrase prompts
+  gpg-connect-agent updatestartuptty /bye > /dev/null
+
+  # Point the SSH_AUTH_SOCK to the one handled by gpg-agent
+  if [ -S $(gpgconf --list-dirs agent-ssh-socket) ]; then
+    export SSH_AUTH_SOCK=$(gpgconf --list-dirs agent-ssh-socket)
+  else
+    echo "$(gpgconf --list-dirs agent-ssh-socket) doesn't exist. Is gpg-agent running ?"
+  fi
+elif [[ -z $SSH_AUTH_SOCK && $commands[ssh-agent] ]]
 then
   eval $(ssh-agent)
 fi
@@ -165,6 +176,11 @@ if [[ -n $commands[hub] ]] then
   alias git=hub
   alias gh=hub
+fi
+
+if [[ -n $commands[gpg2] && -z $commands[gpg] ]]
+then
+  alias gpg=gpg2
 fi
 
 if [[ -n $commands[lunchy] ]]