1GPG-AGENT(1)                 GNU Privacy Guard 2.3                GPG-AGENT(1)
2
3
4

NAME

6       gpg-agent - Secret key management for GnuPG
7

SYNOPSIS

9       gpg-agent [--homedir dir] [--options file] [options]
10       gpg-agent [--homedir dir] [--options file] [options] --server
11       gpg-agent  [--homedir  dir]  [--options  file] [options] --daemon [com‐
12       mand_line]
13
14

DESCRIPTION

16       gpg-agent is a daemon to manage  secret  (private)  keys  independently
17       from  any  protocol.  It is used as a backend for gpg and gpgsm as well
18       as for a couple of other utilities.
19
20       The agent is automatically started on demand by gpg, gpgsm, gpgconf, or
21       gpg-connect-agent.   Thus  there is no reason to start it manually.  In
22       case you want to use the included Secure Shell Agent you may start  the
23       agent using:
24
25
26         gpg-connect-agent /bye
27
28
29       If  you want to manually terminate the currently-running agent, you can
30       safely do so with:
31
32         gpgconf --kill gpg-agent
33
34
35       You should always add the following lines to your .bashrc  or  whatever
36       initialization file is used for all shell invocations:
37
38         GPG_TTY=$(tty)
39         export GPG_TTY
40
41
42       It is important that this environment variable always reflects the out‐
43       put of the tty command.  For W32 systems this option is not required.
44
45       Please make sure that a proper pinentry program has been installed  un‐
46       der  the default filename (which is system dependent) or use the option
47       pinentry-program to specify the full name of that program.  It is often
48       useful  to  install a symbolic link from the actual used pinentry (e.g.
49/usr/bin/pinentry-gtk’) to the  expected  one  (e.g.  ‘/usr/bin/pinen‐
50       try’).
51
52
53
54

COMMANDS

56       Commands  are  not  distinguished from options except for the fact that
57       only one command is allowed.
58
59
60       --version
61              Print the program version and licensing information.  Note  that
62              you cannot abbreviate this command.
63
64
65       --help
66       -h     Print  a  usage message summarizing the most useful command-line
67              options.  Note that you cannot abbreviate this command.
68
69
70       --dump-options
71              Print a list of all available options and commands.   Note  that
72              you cannot abbreviate this command.
73
74
75       --server
76              Run  in server mode and wait for commands on the stdin.  The de‐
77              fault mode is to create a socket and listen for commands there.
78
79
80       --daemon [command line]
81              Start the gpg-agent as a daemon; that is,  detach  it  from  the
82              console and run it in the background.
83
84              As  an  alternative  you  may create a new process as a child of
85              gpg-agent: gpg-agent --daemon /bin/sh.  This way you get  a  new
86              shell  with  the environment setup properly; after you exit from
87              this shell, gpg-agent terminates within a few seconds.
88
89
90       --supervised
91              Run in the foreground, sending logs by default  to  stderr,  and
92              listening  on  provided  file descriptors, which must already be
93              bound to listening sockets.  This option is deprecated  and  not
94              supported on Windows.
95
96              In --supervised mode, different file descriptors can be provided
97              for use as different socket types (e.g. ssh, extra) as  long  as
98              they  are  identified in the environment variable LISTEN_FDNAMES
99              (see sd_listen_fds(3) on some Linux distributions for  more  in‐
100              formation on this convention).
101

OPTIONS

103       Options  may either be used on the command line or, after stripping off
104       the two leading dashes, in the configuration file.
105
106
107
108
109       --options file
110              Reads configuration from file instead of from the  default  per-
111              user  configuration  file.   The  default  configuration file is
112              named ‘gpg-agent.conf’ and expected in  the  ‘.gnupg’  directory
113              directly  below  the home directory of the user.  This option is
114              ignored if used in an options file.
115
116
117
118       --homedir dir
119              Set the name of the home directory to dir. If this option is not
120              used,  the  home  directory  defaults to ‘~/.gnupg’.  It is only
121              recognized when given on the command line.   It  also  overrides
122              any  home  directory  stated  through  the  environment variable
123GNUPGHOME’ or (on Windows systems) by means of the Registry en‐
124              try HKCU\Software\GNU\GnuPG:HomeDir.
125
126              On Windows systems it is possible to install GnuPG as a portable
127              application.  In this case only this command line option is con‐
128              sidered, all other ways to set a home directory are ignored.
129
130              To install GnuPG as a portable application under Windows, create
131              an empty file named ‘gpgconf.ctl’ in the same directory  as  the
132              tool  ‘gpgconf.exe’.   The root of the installation is then that
133              directory; or, if ‘gpgconf.exe’ has been installed directly  be‐
134              low  a  directory  named  ‘bin’, its parent directory.  You also
135              need to make sure that the following directories exist  and  are
136              writable:     ‘ROOT/home’     for    the    GnuPG    home    and
137ROOT/var/cache/gnupg’ for internal cache files.
138
139
140
141       -v
142       --verbose
143              Outputs additional information while running.  You can  increase
144              the  verbosity  by giving several verbose commands to gpg-agent,
145              such as ‘-vv’.
146
147
148       -q
149       --quiet
150              Try to be as quiet as possible.
151
152
153       --batch
154              Don't invoke a pinentry or do any other  thing  requiring  human
155              interaction.
156
157
158       --faked-system-time epoch
159              This  option is only useful for testing; it sets the system time
160              back or forth to epoch which is the number  of  seconds  elapsed
161              since the year 1970.
162
163
164       --debug-level level
165              Select  the debug level for investigating problems. level may be
166              a numeric value or a keyword:
167
168
169              none   No debugging at all.  A value of less than 1 may be  used
170                     instead of the keyword.
171
172              basic  Some  basic  debug messages.  A value between 1 and 2 may
173                     be used instead of the keyword.
174
175              advanced
176                     More verbose debug messages.  A value between 3 and 5 may
177                     be used instead of the keyword.
178
179              expert Even more detailed messages.  A value between 6 and 8 may
180                     be used instead of the keyword.
181
182              guru   All of the debug messages you can get.  A  value  greater
183                     than  8 may be used instead of the keyword.  The creation
184                     of hash tracing files is only enabled if the  keyword  is
185                     used.
186
187       How  these  messages  are  mapped  to the actual debugging flags is not
188       specified and may change with newer releases of this program. They  are
189       however carefully selected to best aid in debugging.
190
191
192       --debug flags
193              Set  debug flags.  All flags are or-ed and flags may be given in
194              C syntax (e.g. 0x0042) or as a  comma  separated  list  of  flag
195              names.   To  get  a  list of all supported flags the single word
196              "help" can be used. This option is only useful for debugging and
197              the behavior may change at any time without notice.
198
199
200       --debug-all
201              Same as --debug=0xffffffff
202
203
204       --debug-wait n
205              When  running in server mode, wait n seconds before entering the
206              actual processing loop and print the pid.  This  gives  time  to
207              attach a debugger.
208
209
210       --debug-quick-random
211              This  option  inhibits the use of the very secure random quality
212              level (Libgcrypt’s GCRY_VERY_STRONG_RANDOM) and degrades all re‐
213              quest  down  to  standard  random  quality.  It is only used for
214              testing and should not be used for any production quality  keys.
215              This option is only effective when given on the command line.
216
217              On  GNU/Linux,  another way to quickly generate insecure keys is
218              to use rngd to fill the kernel's entropy pool with lower quality
219              random  data.  rngd is typically provided by the rng-tools pack‐
220              age.  It can be run as follows: ‘sudo rngd -f -r /dev/urandom’.
221
222
223       --debug-pinentry
224              This option enables extra debug information  pertaining  to  the
225              Pinentry.   As  of  now  it  is only useful when used along with
226              --debug 1024.
227
228
229       --no-detach
230              Don't detach the process from the console.  This is mainly  use‐
231              ful for debugging.
232
233
234       --steal-socket
235              In --daemon mode, gpg-agent detects an already running gpg-agent
236              and does not allow to start a new instance. This option  can  be
237              used  to override this check: the new gpg-agent process will try
238              to take over the communication sockets from the already  running
239              process  and start anyway.  This option should in general not be
240              used.
241
242
243
244       -s
245       --sh
246       -c
247       --csh  Format the info output in daemon mode for use with the  standard
248              Bourne  shell  or  the  C-shell respectively.  The default is to
249              guess it based on the environment variable SHELL which  is  cor‐
250              rect in almost all cases.
251
252
253
254       --grab
255       --no-grab
256              Tell  the  pinentry to grab the keyboard and mouse.  This option
257              should be used on X-Servers to avoid X-sniffing attacks. Any use
258              of  the  option  --grab overrides an used option --no-grab.  The
259              default is --no-grab.
260
261
262
263       --log-file file
264              Append all logging output to file.  This is very helpful in see‐
265              ing  what  the  agent  actually  does. Use ‘socket://’ to log to
266              socket.  If neither a log file nor a  log  file  descriptor  has
267              been  set  on  a Windows platform, the Registry entry HKCU\Soft‐
268              ware\GNU\GnuPG:DefaultLogFile, if set, is used  to  specify  the
269              logging output.
270
271
272
273
274       --no-allow-mark-trusted
275              Do not allow clients to mark keys as trusted, i.e. put them into
276              the ‘trustlist.txt’ file.  This makes it harder for users to in‐
277              advertently accept Root-CA keys.
278
279
280
281
282       --no-user-trustlist
283              Entirely ignore the user trust list and consider only the global
284              trustlist (‘/etc/gnupg/trustlist.txt’).  This implies  the  [op‐
285              tion --no-allow-mark-trusted].
286
287
288       --sys-trustlist-name file
289              Changes   the   default  name  for  the  global  trustlist  from
290              "trustlist.txt" to file.  If file does not contain  any  slashes
291              and  does  not start with "~/" it is searched in the system con‐
292              figuration directory (‘/etc/gnupg’).
293
294
295
296       --allow-preset-passphrase
297              This option allows the use of gpg-preset-passphrase to seed  the
298              internal cache of gpg-agent with passphrases.
299
300
301
302       --no-allow-loopback-pinentry
303
304       --allow-loopback-pinentry
305              Disallow or allow clients to use the loopback pinentry features;
306              see the option pinentry-mode for details.  Allow is the default.
307
308              The --force option of the Assuan command DELETE_KEY is also con‐
309              trolled  by  this  option:  The  option is ignored if a loopback
310              pinentry is disallowed.
311
312
313       --no-allow-external-cache
314              Tell Pinentry not to enable features which use an external cache
315              for passphrases.
316
317              Some  desktop environments prefer to unlock all credentials with
318              one master password and may have installed a Pinentry which  em‐
319              ploys  an  additional external cache to implement such a policy.
320              By using this option the Pinentry is advised not to make use  of
321              such  a  cache and instead always ask the user for the requested
322              passphrase.
323
324
325       --allow-emacs-pinentry
326              Tell Pinentry to allow features to divert the  passphrase  entry
327              to  a  running  Emacs instance.  How this is exactly handled de‐
328              pends on the version of the used Pinentry.
329
330
331       --ignore-cache-for-signing
332              This option will let gpg-agent bypass the passphrase  cache  for
333              all  signing  operation.   Note that there is also a per-session
334              option to control this behavior but  this  command  line  option
335              takes precedence.
336
337
338       --default-cache-ttl n
339              Set  the  time a cache entry is valid to n seconds.  The default
340              is 600 seconds.  Each time a cache entry is  accessed,  the  en‐
341              try's  timer  is reset.  To set an entry's maximum lifetime, use
342              max-cache-ttl.  Note that a cached passphrase may not be evicted
343              immediately from memory if no client requests a cache operation.
344              This is due to an internal housekeeping function which  is  only
345              run every few seconds.
346
347
348       --default-cache-ttl-ssh n
349              Set  the time a cache entry used for SSH keys is valid to n sec‐
350              onds.  The default is 1800 seconds.  Each time a cache entry  is
351              accessed, the entry's timer is reset.  To set an entry's maximum
352              lifetime, use max-cache-ttl-ssh.
353
354
355       --max-cache-ttl n
356              Set the maximum time a cache entry is valid to n seconds.  After
357              this  time a cache entry will be expired even if it has been ac‐
358              cessed recently or has  been  set  using  gpg-preset-passphrase.
359              The default is 2 hours (7200 seconds).
360
361
362       --max-cache-ttl-ssh n
363              Set the maximum time a cache entry used for SSH keys is valid to
364              n seconds.  After this time a cache entry will be  expired  even
365              if  it has been accessed recently or has been set using gpg-pre‐
366              set-passphrase.  The default is 2 hours (7200 seconds).
367
368
369       --enforce-passphrase-constraints
370              Enforce the passphrase constraints by not allowing the  user  to
371              bypass them using the ``Take it anyway'' button.
372
373
374       --min-passphrase-len n
375              Set  the  minimal  length  of a passphrase.  When entering a new
376              passphrase shorter than this value a warning will be  displayed.
377              Defaults to 8.
378
379
380       --min-passphrase-nonalpha n
381              Set  the minimal number of digits or special characters required
382              in a passphrase.  When entering a new passphrase with less  than
383              this  number  of  digits or special characters a warning will be
384              displayed.  Defaults to 1.
385
386
387       --check-passphrase-pattern file
388       --check-sym-passphrase-pattern file
389              Check the passphrase against the pattern given  in  file.   When
390              entering  a new passphrase matching one of these pattern a warn‐
391              ing will be displayed.  If file does not contain any slashes and
392              does not start with "~/" it is searched in the system configura‐
393              tion directory (‘/etc/gnupg’).  The default is not  to  use  any
394              pattern  file.   The  second version of this option is only used
395              when creating a new symmetric key to allow the use of  different
396              patterns for such passphrases.
397
398              Security  note: It is known that checking a passphrase against a
399              list of pattern or even against a  complete  dictionary  is  not
400              very  effective  to  enforce  good passphrases.  Users will soon
401              figure up ways to bypass such a policy.  A better policy  is  to
402              educate  users on good security behavior and optionally to run a
403              passphrase cracker regularly on all users passphrases  to  catch
404              the very simple ones.
405
406
407       --max-passphrase-days n
408              Ask  the  user  to  change  the passphrase if n days have passed
409              since the last  change.   With  --enforce-passphrase-constraints
410              set the user may not bypass this check.
411
412
413       --enable-passphrase-history
414              This option does nothing yet.
415
416
417       --pinentry-invisible-char char
418              This  option asks the Pinentry to use char for displaying hidden
419              characters.  char must be one character UTF-8 string.  A  Pinen‐
420              try may or may not honor this request.
421
422
423       --pinentry-timeout n
424              This option asks the Pinentry to timeout after n seconds with no
425              user input.  The default value of 0 does not ask the pinentry to
426              timeout,  however  a  Pinentry  may  use its own default timeout
427              value in this case.  A Pinentry may or may not  honor  this  re‐
428              quest.
429
430
431       --pinentry-formatted-passphrase
432              This  option  asks  the Pinentry to enable passphrase formatting
433              when asking the user for a new passphrase  and  masking  of  the
434              passphrase is turned off.
435
436              If passphrase formatting is enabled, then all non-breaking space
437              characters are stripped from the entered passphrase.  Passphrase
438              formatting is mostly useful in combination with passphrases gen‐
439              erated with the GENPIN feature of some  Pinentries.   Note  that
440              such  a generated passphrase, if not modified by the user, skips
441              all passphrase constraints  checking  because  such  constraints
442              would actually weaken the generated passphrase.
443
444
445       --pinentry-program filename
446              Use program filename as the PIN entry.  The default is installa‐
447              tion dependent.  With the default configuration the name of  the
448              default  pinentry is ‘pinentry’; if that file does not exist but
449              a ‘pinentry-basic’ exist the latter is used.
450
451              On a Windows platform the default is to use the  first  existing
452              program       from      this      list:      ‘bin\pinentry.exe’,
453..\Gpg4win\bin\pinentry.exe’,        ‘..\Gpg4win\pinentry.exe’,
454..\GNU\GnuPG\pinentry.exe’,          ‘..\GNU\bin\pinentry.exe’,
455bin\pinentry-basic.exe’ where the file names  are  relative  to
456              the GnuPG installation directory.
457
458
459
460       --pinentry-touch-file filename
461              By default the filename of the socket gpg-agent is listening for
462              requests is passed to Pinentry, so that it can touch  that  file
463              before  exiting (it does this only in curses mode).  This option
464              changes the file passed to Pinentry to  filename.   The  special
465              name  /dev/null  may be used to completely disable this feature.
466              Note that Pinentry will not  create  that  file,  it  will  only
467              change the modification and access time.
468
469
470
471       --scdaemon-program filename
472              Use  program  filename  as the Smartcard daemon.  The default is
473              installation dependent and can be shown with  the  gpgconf  com‐
474              mand.
475
476
477       --disable-scdaemon
478              Do  not  make use of the scdaemon tool.  This option has the ef‐
479              fect of disabling the ability to do smartcard operations.  Note,
480              that  enabling  this  option at runtime does not kill an already
481              forked scdaemon.
482
483
484       --disable-check-own-socket
485              gpg-agent employs  a  periodic  self-test  to  detect  a  stolen
486              socket.   This  usually means a second instance of gpg-agent has
487              taken over the socket and gpg-agent will then terminate  itself.
488              This  option may be used to disable this self-test for debugging
489              purposes.
490
491
492       --use-standard-socket
493       --no-use-standard-socket
494       --use-standard-socket-p
495              Since GnuPG 2.1 the standard socket is always used.   These  op‐
496              tions  have  no  more effect.  The command gpg-agent --use-stan‐
497              dard-socket-p will thus always return success.
498
499
500       --display string
501       --ttyname string
502       --ttytype string
503       --lc-ctype string
504       --lc-messages string
505       --xauthority string
506              These options are used with the server mode to pass localization
507              information.
508
509
510       --keep-tty
511       --keep-display
512              Ignore  requests  to change the current tty or X window system's
513              DISPLAY variable respectively.   This  is  useful  to  lock  the
514              pinentry to pop up at the tty or display you started the agent.
515
516
517       --listen-backlog n
518              Set  the size of the queue for pending connections.  The default
519              is 64.
520
521
522
523       --extra-socket name
524              The extra socket is created by default, you may use this  option
525              to  change  the  name of the socket.  To disable the creation of
526              the socket use ``none'' or ``/dev/null'' for name.
527
528              Also listen on native gpg-agent connections on the given socket.
529              The intended use for this extra socket is to setup a Unix domain
530              socket forwarding from a remote machine to this  socket  on  the
531              local  machine.   A  gpg  running on the remote machine may then
532              connect to the local gpg-agent and use its private  keys.   This
533              enables  decrypting  or signing data on a remote machine without
534              exposing the private keys to the remote machine.
535
536
537       --enable-extended-key-format
538       --disable-extended-key-format
539              Since version 2.3 keys are created in the extended  private  key
540              format.   Changing the passphrase of a key will also convert the
541              key to that new format.  This new key format is supported  since
542              GnuPG version 2.1.12 and thus there should be no need to disable
543              it.  The disable option allows to revert to the old behavior for
544              new  keys; be aware that keys are never migrated back to the old
545              format.  However if the enable option has been used the  disable
546              option won't have an effect.  The advantage of the extended pri‐
547              vate key format is that it is text based  and  can  carry  addi‐
548              tional meta data.
549
550
551
552       --enable-ssh-support
553       --enable-putty-support
554
555              The OpenSSH Agent protocol is always enabled, but gpg-agent will
556              only set the SSH_AUTH_SOCK variable if this flag is given.
557
558              In this mode of operation, the agent does not only implement the
559              gpg-agent  protocol, but also the agent protocol used by OpenSSH
560              (through a separate socket).  Consequently, it should be  possi‐
561              ble  to  use the gpg-agent as a drop-in replacement for the well
562              known ssh-agent.
563
564              SSH Keys, which are to be used through the  agent,  need  to  be
565              added  to  the  gpg-agent initially through the ssh-add utility.
566              When a key is added, ssh-add will ask for the  password  of  the
567              provided  key  file and send the unprotected key material to the
568              agent; this causes the gpg-agent to ask for a passphrase,  which
569              is  to be used for encrypting the newly received key and storing
570              it in a gpg-agent specific directory.
571
572              Once a key has been added to the gpg-agent this  way,  the  gpg-
573              agent will be ready to use the key.
574
575              Note:  in  case  the gpg-agent receives a signature request, the
576              user might need to be prompted for a passphrase, which is neces‐
577              sary  for decrypting the stored key.  Since the ssh-agent proto‐
578              col does not contain a mechanism for telling the agent on  which
579              display/terminal it is running, gpg-agent's ssh-support will use
580              the TTY or X display  where  gpg-agent  has  been  started.   To
581              switch  this  display  to the current one, the following command
582              may be used:
583
584         gpg-connect-agent updatestartuptty /bye
585
586       Although all GnuPG components try to start  the  gpg-agent  as  needed,
587       this  is  not  possible  for  the ssh support because ssh does not know
588       about it.  Thus if no GnuPG tool which accesses the agent has been run,
589       there is no guarantee that ssh is able to use gpg-agent for authentica‐
590       tion.  To fix this you may start gpg-agent if needed using this  simple
591       command:
592
593         gpg-connect-agent /bye
594
595       Adding the --verbose shows the progress of starting the agent.
596
597       The  --enable-putty-support  is only available under Windows and allows
598       the use of gpg-agent with the ssh implementation putty.  This is  simi‐
599       lar  to  the regular ssh-agent support but makes use of Windows message
600       queue as required by putty.
601
602
603
604       --ssh-fingerprint-digest
605
606              Select the digest algorithm used  to  compute  ssh  fingerprints
607              that  are  communicated  to  the user, e.g. in pinentry dialogs.
608              OpenSSH has transitioned from  using  MD5  to  the  more  secure
609              SHA256.
610
611
612
613       --auto-expand-secmem n
614              Allow  Libgcrypt  to  expand its secure memory area as required.
615              The optional value n is a non-negative integer with a  suggested
616              size in bytes of each additionally allocated secure memory area.
617              The value is rounded up to the next 32 KiB; usual C  style  pre‐
618              fixes are allowed.  For an heavy loaded gpg-agent with many con‐
619              current connection this option avoids sign or decrypt errors due
620              to out of secure memory error returns.
621
622
623       --s2k-calibration milliseconds
624              Change  the default calibration time to milliseconds.  The given
625              value is capped at 60 seconds; a value of 0 resets to  the  com‐
626              piled-in  default.   This option is re-read on a SIGHUP (or gpg‐
627              conf --reload gpg-agent) and the  S2K  count  is  then  re-cali‐
628              brated.
629
630
631       --s2k-count n
632              Specify  the  iteration  count  used  to protect the passphrase.
633              This option can be used to override the auto-calibration done by
634              default.   The  auto-calibration computes a count which requires
635              by default 100ms to mangle a given passphrase.  See also  --s2k-
636              calibration.
637
638              To  view  the actually used iteration count and the milliseconds
639              required for an S2K operation use:
640
641         gpg-connect-agent 'GETINFO s2k_count' /bye
642         gpg-connect-agent 'GETINFO s2k_time' /bye
643
644       To view the auto-calibrated count use:
645
646         gpg-connect-agent 'GETINFO s2k_count_cal' /bye
647
648
649

EXAMPLES

651       It is important to set the environment variable GPG_TTY in  your  login
652       shell, for example in the ‘~/.bashrc’ init script:
653
654           export GPG_TTY=$(tty)
655
656       If  you  enabled the Ssh Agent Support, you also need to tell ssh about
657       it by adding this to your init script:
658
659         unset SSH_AGENT_PID
660         if [ "${gnupg_SSH_AUTH_SOCK_by:-0}" -ne $$ ]; then
661           export SSH_AUTH_SOCK="$(gpgconf --list-dirs agent-ssh-socket)"
662         fi
663
664
665
666

FILES

668       There are a few configuration files needed for  the  operation  of  the
669       agent.  By  default they may all be found in the current home directory
670       (see: [option --homedir]).
671
672
673
674       gpg-agent.conf
675                This is the standard configuration file read by gpg-agent on
676                startup.  It may contain any valid long option; the leading
677                two dashes may not be entered and the option may not be abbre‐
678              viated.
679                This file is also read after a SIGHUP however only a few
680                options  will  actually have an effect.  This default name may
681              be
682                changed on the command line (see: [option --options]).
683                You should backup this file.
684
685
686       trustlist.txt
687                This is the list of trusted  keys.   You  should  backup  this
688              file.
689
690                Comment  lines,  indicated  by a leading hash mark, as well as
691              empty
692                lines are ignored.  To mark a key as trusted you need to enter
693              its
694                fingerprint  followed  by  a  space  and  a  capital letter S.
695              Colons
696                may optionally be used to separate the bytes of a fingerprint;
697              this
698                enables cutting and pasting the fingerprint from a key listing
699              output.  If
700                the line is prefixed with a ! the key is explicitly marked as
701                not trusted.
702
703                Here is an example where two keys  are  marked  as  ultimately
704              trusted
705                and one as not trusted:
706
707                  .RS 2
708                # CN=Wurzel ZS 3,O=Intevation GmbH,C=DE
709                A6935DD34EF3087973C706FC311AA2CCF733765B S
710
711                # CN=PCA-1-Verwaltung-02/O=PKI-1-Verwaltung/C=DE
712                DC:BD:69:25:48:BD:BB:7E:31:6E:BB:80:D3:00:80:35:D4:F8:A6:CD S
713
714                # CN=Root-CA/O=Schlapphuete/L=Pullach/C=DE
715                !14:56:98:D3:FE:9C:CA:5A:31:6E:BC:81:D3:11:4E:00:90:A3:44:C2 S
716                .fi
717
718       Before entering a key into this file, you need to ensure its
719       authenticity.  How to do this depends on your organisation; your
720       administrator might have already entered those keys which are deemed
721       trustworthy enough into this file.  Places where to look for the
722       fingerprint of a root certificate are letters received from the CA or
723       the website of the CA (after making 100% sure that this is indeed the
724       website of that CA).  You may want to consider disallowing interactive
725       updates of this file by using the [option --no-allow-mark-trusted].
726       It might even be advisable to change the permissions to read-only so
727       that this file can't be changed inadvertently.
728
729       As a special feature a line include-default will include a global
730       list of trusted certificates (e.g. ‘/etc/gnupg/trustlist.txt’).
731       This global list is also used if the local list is not available;
732       the [option --no-user-trustlist] enforces the use of only
733       this global list.
734
735       It is possible to add further flags after the S for use by the
736       caller:
737
738
739
740              relax  Relax checking of some root certificate requirements.  As of now this
741                     flag allows the use of root certificates with a missing basicConstraints
742                     attribute (despite that it is a MUST for CA certificates) and disables
743                     CRL checking for the root certificate.
744
745
746              cm     If validation of a certificate finally issued by a CA with this flag set
747                     fails, try again using the chain validation model.
748
749
750              qual   The CA is allowed to issue certificates for qualified signatures.
751                     This flag has an effect only if used in the global list.  This is now
752                     the preferred way to mark such CA; the old way of having a separate
753                     file ‘qualified.txt’ is still supported.
754
755
756
757
758       sshcontrol
759              This file is used when support for the secure shell agent protocol has
760              been enabled (see: [option --enable-ssh-support]). Only keys present in
761              this file are used in the SSH protocol.  You should backup this file.
762
763              The ssh-add tool may be used to add new entries to this file;
764              you may also add them manually.  Comment lines, indicated by a leading
765              hash mark, as well as empty lines are ignored.  An entry starts with
766              optional whitespace, followed by the keygrip of the key given as 40 hex
767              digits, optionally followed by the caching TTL in seconds and another
768              optional field for arbitrary flags.  A non-zero TTL overrides the global
769              default as set by --default-cache-ttl-ssh.
770
771              The only flag support is confirm.  If this flag is found for a
772              key, each use of the key will pop up a pinentry to confirm the use of
773              that key.  The flag is automatically set if a new key was loaded into
774              gpg-agent using the option -c of the ssh-add
775              command.
776
777              The keygrip may be prefixed with a ! to disable an entry.
778
779              The following example lists exactly one key.  Note that keys available
780              through a OpenPGP smartcard in the active smartcard reader are
781              implicitly added to this list; i.e. there is no need to list them.
782
783                # Key added on: 2011-07-20 20:38:46
784                # Fingerprint:  5e:8d:c4:ad:e7:af:6e:27:8a:d6:13:e4:79:ad:0b:81
785                34B62F25E277CF13D3C6BCEBFD3F85D08F0A864B 0 confirm
786
787
788       private-keys-v1.d/
789
790                This is the directory where gpg-agent stores the private keys.
791              Each
792                key is stored in a file with the name made up of  the  keygrip
793              and the
794                suffix ‘key’.  You should backup all files in this directory
795                and take great care to keep this backup closed away.
796
797
798
799       Note that on larger installations, it is useful to put predefined files
800       into the directory ‘/etc/skel/.gnupg’ so that newly created users start
801       up with a working configuration.  For existing users the a small helper
802       script is provided to create these files (see: [addgnupghome]).
803
804
805
806
807

SIGNALS

809       A running gpg-agent may be controlled by signals, i.e. using  the  kill
810       command to send a signal to the process.
811
812       Here is a list of supported signals:
813
814
815
816       SIGHUP This  signal  flushes  all cached passphrases and if the program
817              has been started with a configuration  file,  the  configuration
818              file  is  read  again.  Only certain options are honored: quiet,
819              verbose, debug, debug-all, debug-level, debug-pinentry, no-grab,
820              pinentry-program,   pinentry-invisible-char,  default-cache-ttl,
821              max-cache-ttl, ignore-cache-for-signing, s2k-count, no-allow-ex‐
822              ternal-cache,  allow-emacs-pinentry, no-allow-mark-trusted, dis‐
823              able-scdaemon, and  disable-check-own-socket.   scdaemon-program
824              is  also  supported but due to the current implementation, which
825              calls the scdaemon only once, it is not of much use  unless  you
826              manually kill the scdaemon.
827
828
829
830       SIGTERM
831              Shuts  down the process but waits until all current requests are
832              fulfilled.  If the process has received 3 of these  signals  and
833              requests are still pending, a shutdown is forced.
834
835
836       SIGINT Shuts down the process immediately.
837
838
839       SIGUSR1
840              Dump internal information to the log file.
841
842
843       SIGUSR2
844              This signal is used for internal purposes.
845
846

SEE ALSO

848       gpg(1), gpgsm(1), gpgconf(1), gpg-connect-agent(1), scdaemon(1)
849
850       The full documentation for this tool is maintained as a Texinfo manual.
851       If GnuPG and the info program are properly installed at your site,  the
852       command
853
854         info gnupg
855
856       should  give  you access to the complete manual including a menu struc‐
857       ture and an index.
858
859
860
861GnuPG 2.3.7                       2022-06-27                      GPG-AGENT(1)
Impressum