Registry Settings
This is the concise documentation of the registry settings. For a more detailed version see the verbose description.
For Kleopatra Settings look ⇒ here.
GnuPG Engine
Since version 3.1.20 it is possible to read configuration settings from the Windows Registry. This is implemented using meta-commands in the configuration files.
The key for all entries is SOFTWARE\WOW6432Node\GNU\GnuPG
below
HKEY_LOCAL_MACHINE (HKLM) unless noted otherwise. The type of all
entries is string (REG_SZ or REG_EXPAND_SZ); even for numeric values.
OpenPGP related settings
NewKeyAlgo
Used to change the default algorithm for new keys. Valid values are:
- rsa3072
- rsa4096
- brainpoolP256r1
- brainpoolP384r1
- brainpoolP512r1
- none
The value "none" disallows the generation of new keys.
DisableWKD
Any value interpreted as non-zero (e.g. "1") disables the use of the Web Key Directory for automatic key lookup.
DisableAKR
Any value interpreted as non-zero (e.g. "1") disables the use of automatic key retrieval from key servers when checking signatures. Default value is 1.
AutoKeyImport
Any value interpreted as non-zero (e.g. "1") enables an offline mechanism to get a missing public key for signature verification and for later encryption to this key. If this option is enabled and a signature includes an embedded key, that key is used to verify the signature and on verification success the key is imported. Used together with
IncludeKeyBlock
. [since 3.1.24.0]
IncludeKeyBlock
- Any value interpreted as non-zero (e.g. "1")
puts the used public key into a data signature. This embedded
key is stripped down to a single user id and includes only the
signing subkey and all valid encryption subkeys. This option is
the OpenPGP counterpart to the S/MIME feature of embedding the
certificates into signatures. It allows the recipient of a
signed message to reply encrypted to the sender without first
using any online directories to lookup the key. Used together
with
AutoKeyImport
. [since 3.1.24.0] DesigRevoker
- The value specified shall be the fingerprint of a public OpenPGP allowed to create a revocation certificate for a newly created key. This Designed Revoker Key must exist in the public keyring of the user at the time the user creates a new key. [since 3.2.2.1]
TrustedKey1
- The value specifies a fixed trust root (trusted-key).
If more than one trust root is required, the entries
TrustedKey2
,TrustedKey3
,TrustedKey4
,TrustedKey5
may also be used. Take care to specify the 40 hex-digit fingerprint of those trusted keys. EncryptTo1
- The value specifies a key wich is always used in
addition to the specified recipient keys. This may
be used for an archival key. A second and third such key may
be given using
EncryptTo2
andEncryptTo3
. Please use the 40 hex-digit fingerprint as value and not a user name or the shorter key-id. [since 3.1.20.7]
S/MIME related settings
DisableUserTrustlist
- Any value interpreted as non-zero (e.g. "1") entirely ignores the users trustlist.txt and considers only the global trustlist. [since 3.1.24.0]
SysTrustlistFile
- The list of trusted root certificates are distributed in a file named trustlist.txt. This option allows to specify another file for this list. This is needed to avoid overwriting a custom version of the list by a software update. [since 3.1.24.0]
GpgsmCompatibility
- Set compatibility flags to work around problems due to non-compliant certificates or data. The flags are given as a comma separated list of flag names and are OR-ed together. This option should only be set in special cases when advised by the GnuPG.com support. [since 3.1.23.0]
Private key related settings
Note: These settings do not affect smart card PINs.
CacheTime
- The number of seconds a password is cached after its last use. Re-triggered with each use. Defaults to 900 (15 minutes). This entry is looked up under HKCU with a fallback to HKLM.
CacheTimeMax
- The number of seconds a password is cached after its first use. Defaults to 3600 (1 hour). This entry is looked up under HKCU with a fallback to HKLM.
MinPasswordLen
- The minimum number of characters required for a password. The default is 9. Note that in addition to this value the regular expressions in asymrules.txt and symrules.txt also take effect. [since 3.1.21.1]
SymrulesFile
- The pattern defining the rules for symmetric passwords are distributed in a file named symrules.txt. This option allows to specify another file for these pattern. Use only if advised to do so. [since 3.1.21.3]
AsymrulesFile
- The pattern defining the rules for passwords to protect private keys are distributed in a file named asymrules.txt. This option allows to specify another file for these pattern. Use only if advised to do so. [since 3.1.21.3]
Network related settings
NtdsKeyserver
The value specifies an Active Directory authenticated LDS server name for OpenPGP keys. If a non-standard port is used it must be given delimited by a colon. Examples: "openpgp-lds", "keyserver.example.com:8389".
Keyserver
A full keyserver specification string; used only if NtdsKeyserver is not set. Up to version 3.1.26 the default was "ldap:///" to specify an OpenPGP keyserver as part of the AD. Since then it is "none", i.e. no keyserver is configured as default any more. In case of initial delays in name resolution with LDAP servers on Windows, it is often useful to use a value like
openpgp-lds:::::starttls,ntds,areconly
instead of NtdsKeyserver or the URL format.
Ldapserver
A full LDAP server specification string. This will be used as the default LDAP server for X.509 certificate lookup. For example
ldap.example.com:::::starttls,ntds
uses the given server in StartTLS mode with AD authentication. To use password based authentication this might be used
ldap.example.com::username:mypassword::starttls
[since 3.1.21.1]
HttpProxy
If set specifies a proxy for HTTP. For example "proxy.local:8080" or "authstring@proxy.local:8080"
LdapProxy
If set specifies a proxy for LDAP. For example "proxy.local:8389".
OnlyLdapProxy
If set LDAP will only be accessed through the LDAP proxy.
IgnoreHttpDP
Any value interpreted as non-zero (e.g. "1") disables the use of HTTP CRL distribution points.
IgnoreLdapDP
Any value interpreted as non-zero (e.g. "1") disables the use of LDAP CRL distribution points.
DisableIPv4
Any value interpreted as non-zero (e.g. "1") disables the use of the IPv4 protocol. Used in case of problems with IPv4 connections. [since 3.1.24.0]
DisableIPv6
Any value interpreted as non-zero (e.g. "1") disables the use of the IPv6 protocol. Used in case of problems with IPv6 connections. [since 3.1.24.0]
ResolverTimeout
The timeout value in seconds for DNS requests. The default is 30 seconds. [since 3.1.24.0]
ConnectTimeout
The timeout value in seconds for all HTTP, HTTPS, and other TCP connection attempts. The default is 15 seconds. For LDAP connections the native Windows settings must be used. [since 3.1.24.0]
ConnectQuickTimeout
Like
ConnectTimeout
but for connection attempts which are required to happen fast. The default is 2 seconds. [since 3.1.24.0]
Smart card related settings
ReaderPort
The smart card reader to use. The GUI has an option to show all detected readers in the settings menu. The exact string – or at least the exact start of the string, if there is no risk of mix-up – needs to be entered.
The entry ReaderPort is looked up under HKCU with a fallback to HKLM. If this entry is not set and there is no local override the reader to use is determined by a simple heuristic.
SharePort
Any value interpreted as non-zero (e.g. "1") enables the option pcsc-shared. This allows GnuPG VS-Desktop and the other software to access the same card.
DisableSCD
Any value interpreted as non-zero (e.g. "1") entirely disables smart card support. [since 3.1.20.7]
Windows Explorer related settings
GpgExDefault
The default command available on right-click of unencrypted files or folders. The value must be a string value (REG_SZ) with the Number. [since 3.1.22.0] Valid values are:
- 0: Help
- 1: Decrypt & Verify
- 2: Decrypt
- 3: Verify
- 4: Sign & Encrypt
- 5: Encrypt
- 6: Sign
- 7: Import
- 8: Create Checksums
- 9: Verify Checksums
- 11: About
Outlook Add-In related
The Add-In does not directly use config files but takes all parameters from the Registry.
The key for all entries is SOFTWARE\WOW6432Node\GNU\GpgOL
below
HKEY_LOCAL_MACHINE (HKLM) unless noted otherwise. The type of all
entries is string (REG_SZ or REG_EXPAND_SZ). Except for the option
"draftKey" the values of the settings can either be "1" or "0".
An additional "!" after the number enforces the setting, otherwise users can change them through the configuration dialog. User changes are stored below HKEY_CURRENT_USER. e.g.: A value of "1!" enforces an option to be enabled.
enableSmime
- Disable / Enable S/MIME support. Default: 0
preferSmime
- If S/MIME and OpenPGP certificates are available, S/MIME gets preferred. Depends on enableSmime. Default: 0
smimeNoCertSigErr
- Text for the error window which appears when
"signDefault" and "preferSmime" are configured
but no S/MIME key is present. The default text is:
No S/MIME (X509) signing certificate found.
Your organization has configured GpgOL to sign outgoing
mails with S/MIME certificates but there is no S/MIME
certificate configured for your mail address.
Please ask your Administrators for assistance or switch
to OpenPGP in the next dialog. searchSmimeServers
- Search and import X509 certificates in the configured directory services. The directory services need to be configured in Kleopatra or with the Ldapserver registry key of GnuPG. Depends on enableSmime Default: 0
signDefault
- Always sign new messages by default
encDefault
- Always encrypt new messages by default
replyCrypt
- Select crypto settings automatically for reply and forward. So a reply/forward will be signed when the original mail was signed, encrypted when it was encrypted, or both. Default: 1
inlinePGP
- Send OpenPGP mails without attachments as PGP/Inline. PGP/Inline means that the text body of the Mail will contain an ASCII armored PGP Message, similar to the Kleopatra Notepad behavior. This option is mostly relevant to help recpients with clients that have no PGP support, as they can copy the contents of the mail to Kleopatra for decryption. Default: 0
alwaysShowApproval
- Always show the security approval dialog. Default: 0
autoimport
- Import any keys included in mails. Default: 0
autoresolve
- Resolve and search for recipient keys automatically. Depending on the GnuPG settings this might include external sources. By default LDAP (LDS) and WKD sources are included in the search. Default: 1
autosecure
- Automatically secure messages if keys are found. Depends on autoresolve. Default: 0
hideCryptoConfig
- Hide the GnuPG-System config settings in the options. Default: 0
draftEnc
- Set this to 1 to enable draft encryption. Without draftKey this will lead to an error until the user sets the draftKey through the settings dialog. Default: 0
draftKey
- The fingerprint of the S/MIME or OpenPGP certificate to use
for draft / autosave encryption if draftEnc is enabled.
Set this to the special value: "auto" to have GpgOL autoselect
the first ultimately trusted secret key on the next Outlook
start. Depends on draftEnc. No default.
If draftEnc is enabled and draftKey is not set the user will be notified that a key must be set manually.
Additional values may be placed by the Add-In under the user registry key but are mostly treated as internal values.
Installer related settings
The installer records the installation directory of the engine under
the key SOFTWARE\WOW6432Node\GnuPG
below HKLM in an entry named
"Install Directory". Note that the key is different from the other
GnuPG related keys.
For the installation settings see the Installation Page.