commit:     be03b7085d02d1b4491ebb0c529830677f70bad4
Author:     Pavlos Ratis <dastergon <AT> gentoo <DOT> org>
AuthorDate: Thu Nov 27 11:37:05 2014 +0000
Commit:     Pavlos Ratis <dastergon <AT> gentoo <DOT> org>
CommitDate: Thu Nov 27 11:37:54 2014 +0000
URL:        http://sources.gentoo.org/gitweb/?p=proj/api.git;a=commit;h=be03b708

add glep63 spec files

Signed-off-by: Pavlos Ratis <dastergon <AT> gentoo.org>

---
 files/gentoo-keys/specs/glep63-gpg-conf.skel     |  44 +++++++++++++++++++++++
 files/gentoo-keys/specs/glep63-gpg-conf.skel.sig | Bin 0 -> 639 bytes
 files/gentoo-keys/specs/glep63.spec              |  13 +++++++
 files/gentoo-keys/specs/glep63.spec.sig          | Bin 0 -> 639 bytes
 4 files changed, 57 insertions(+)

diff --git a/files/gentoo-keys/specs/glep63-gpg-conf.skel 
b/files/gentoo-keys/specs/glep63-gpg-conf.skel
new file mode 100644
index 0000000..73e8708
--- /dev/null
+++ b/files/gentoo-keys/specs/glep63-gpg-conf.skel
@@ -0,0 +1,44 @@
+#################################################
+# GLEP 63 specifications for OpenPGP key creation
+#################################################
+
+# Keyserver
+keyserver pool.sks-keyservers.net
+
+emit-version
+
+default-recipient-self
+
+# -- All of the below portion from the RiseUp.net OpenPGP best practices, and
+# -- many of them are also in the Debian GPG documentation.
+
+# when outputting certificates, view user IDs distinctly from keys:
+fixed-list-mode
+
+# Long keyids are more collision-resistant than short keyids (it's trivial to 
make a key
+# with any desired short keyid)
+# NOTE: this breaks KMail GnuPG support!
+keyid-format 0xlong
+
+# When multiple digests are supported by all recipients, choose the strongest 
one:
+personal-digest-preferences SHA512 SHA384 SHA256 SHA224
+
+# Preferences chosen for new keys should prioritize stronger algorithms: 
+default-preference-list SHA512 SHA384 SHA256 SHA224 AES256 AES192 AES CAST5 
BZIP2 ZLIB ZIP Uncompressed
+
+# If you use a graphical environment (and even if you don't) you should be 
using an agent:
+# (similar arguments as  
https://www.debian-administration.org/users/dkg/weblog/64)
+use-agent
+
+# You should always know at a glance which User IDs gpg thinks are 
legitimately bound to 
+# the keys in your keyring:
+verify-options show-uid-validity
+list-options show-uid-validity
+
+# Include an unambiguous indicator of which key made a signature:
+# (see http://thread.gmane.org/gmane.mail.notmuch.general/3721/focus=7234)
+# (and http://www.ietf.org/mail-archive/web/openpgp/current/msg00405.html)
+sig-notation issuer-...@notations.openpgp.fifthhorseman.net=%g
+
+# When making an OpenPGP certification, use a stronger digest than the default 
SHA1:
+cert-digest-algo SHA256

diff --git a/files/gentoo-keys/specs/glep63-gpg-conf.skel.sig 
b/files/gentoo-keys/specs/glep63-gpg-conf.skel.sig
new file mode 100644
index 0000000..493a5d7
Binary files /dev/null and b/files/gentoo-keys/specs/glep63-gpg-conf.skel.sig 
differ

diff --git a/files/gentoo-keys/specs/glep63.spec 
b/files/gentoo-keys/specs/glep63.spec
new file mode 100644
index 0000000..2b4fc45
--- /dev/null
+++ b/files/gentoo-keys/specs/glep63.spec
@@ -0,0 +1,13 @@
+<GnupgKeyParms format="internal">
+    Key-Type: RSA
+    Key-Length: 4096
+    Expire-Date: 36m
+    Key-Usage: ,
+    Subkey-Type: RSA
+    Subkey-Length: 4096
+    Subkey-Usage: sign
+    Name-Real: {0}
+    Name-Email: {1}
+    %ask-passphrase
+</GnupgKeyParms>
+

diff --git a/files/gentoo-keys/specs/glep63.spec.sig 
b/files/gentoo-keys/specs/glep63.spec.sig
new file mode 100644
index 0000000..82b8b8f
Binary files /dev/null and b/files/gentoo-keys/specs/glep63.spec.sig differ

Reply via email to