gnupg: GPG Esoteric Options
4.2.6 Doing things one usually doesn't want to do
-------------------------------------------------
'-n'
'--dry-run'
Don't make any changes (this is not completely implemented).
'--list-only'
Changes the behaviour of some commands. This is like '--dry-run'
but different in some cases. The semantic of this option may be
extended in the future. Currently it only skips the actual
decryption pass and therefore enables a fast listing of the
encryption keys.
'-i'
'--interactive'
Prompt before overwriting any files.
'--debug-level LEVEL'
Select the debug level for investigating problems. LEVEL may be a
numeric value or by a keyword:
'none'
No debugging at all. A value of less than 1 may be used
instead of the keyword.
'basic'
Some basic debug messages. A value between 1 and 2 may be
used instead of the keyword.
'advanced'
More verbose debug messages. A value between 3 and 5 may be
used instead of the keyword.
'expert'
Even more detailed messages. A value between 6 and 8 may be
used instead of the keyword.
'guru'
All of the debug messages you can get. A value greater than 8
may be used instead of the keyword. The creation of hash
tracing files is only enabled if the keyword is used.
How these messages are mapped to the actual debugging flags is not
specified and may change with newer releases of this program. They
are however carefully selected to best aid in debugging.
'--debug FLAGS'
Set debugging flags. All flags are or-ed and FLAGS may be given in
C syntax (e.g. 0x0042) or as a comma separated list of flag names.
To get a list of all supported flags the single word "help" can be
used.
'--debug-all'
Set all useful debugging flags.
'--debug-iolbf'
Set stdout into line buffered mode. This option is only honored
when given on the command line.
'--faked-system-time EPOCH'
This option is only useful for testing; it sets the system time
back or forth to EPOCH which is the number of seconds elapsed since
the year 1970. Alternatively EPOCH may be given as a full ISO time
string (e.g. "20070924T154812").
If you suffix EPOCH with an exclamation mark (!), the system time
will appear to be frozen at the specified time.
'--enable-progress-filter'
Enable certain PROGRESS status outputs. This option allows
frontends to display a progress indicator while gpg is processing
larger files. There is a slight performance overhead using it.
'--status-fd N'
Write special status strings to the file descriptor N. See the
file DETAILS in the documentation for a listing of them.
'--status-file FILE'
Same as '--status-fd', except the status data is written to file
FILE.
'--logger-fd N'
Write log output to file descriptor N and not to STDERR.
'--log-file FILE'
'--logger-file FILE'
Same as '--logger-fd', except the logger data is written to file
FILE. Use 'socket://' to log to a socket. Note that in this
version of gpg the option has only an effect if '--batch' is also
used.
'--attribute-fd N'
Write attribute subpackets to the file descriptor N. This is most
useful for use with '--status-fd', since the status messages are
needed to separate out the various subpackets from the stream
delivered to the file descriptor.
'--attribute-file FILE'
Same as '--attribute-fd', except the attribute data is written to
file FILE.
'--comment STRING'
'--no-comments'
Use STRING as a comment string in cleartext signatures and ASCII
armored messages or keys (see '--armor'). The default behavior is
not to use a comment string. '--comment' may be repeated multiple
times to get multiple comment strings. '--no-comments' removes all
comments. It is a good idea to keep the length of a single comment
below 60 characters to avoid problems with mail programs wrapping
such lines. Note that comment lines, like all other header lines,
are not protected by the signature.
'--emit-version'
'--no-emit-version'
Force inclusion of the version string in ASCII armored output. If
given once only the name of the program and the major number is
emitted, given twice the minor is also emitted, given thrice the
micro is added, and given four times an operating system
identification is also emitted. '--no-emit-version' (default)
disables the version line.
'--sig-notation {NAME=VALUE}'
'--cert-notation {NAME=VALUE}'
'-N, --set-notation {NAME=VALUE}'
Put the name value pair into the signature as notation data. NAME
must consist only of printable characters or spaces, and must
contain a '@' character in the form keyname@domain.example.com
(substituting the appropriate keyname and domain name, of course).
This is to help prevent pollution of the IETF reserved notation
namespace. The '--expert' flag overrides the '@' check. VALUE may
be any printable string; it will be encoded in UTF-8, so you should
check that your '--display-charset' is set correctly. If you
prefix NAME with an exclamation mark (!), the notation data will be
flagged as critical (rfc4880:5.2.3.16). '--sig-notation' sets a
notation for data signatures. '--cert-notation' sets a notation
for key signatures (certifications). '--set-notation' sets both.
There are special codes that may be used in notation names. "%k"
will be expanded into the key ID of the key being signed, "%K" into
the long key ID of the key being signed, "%f" into the fingerprint
of the key being signed, "%s" into the key ID of the key making the
signature, "%S" into the long key ID of the key making the
signature, "%g" into the fingerprint of the key making the
signature (which might be a subkey), "%p" into the fingerprint of
the primary key of the key making the signature, "%c" into the
signature count from the OpenPGP smartcard, and "%%" results in a
single "%". %k, %K, and %f are only meaningful when making a key
signature (certification), and %c is only meaningful when using the
OpenPGP smartcard.
'--known-notation NAME'
Adds NAME to a list of known critical signature notations. The
effect of this is that gpg will not mark a signature with a
critical signature notation of that name as bad. Note that gpg
already knows by default about a few critical signatures notation
names.
'--sig-policy-url STRING'
'--cert-policy-url STRING'
'--set-policy-url STRING'
Use STRING as a Policy URL for signatures (rfc4880:5.2.3.20). If
you prefix it with an exclamation mark (!), the policy URL packet
will be flagged as critical. '--sig-policy-url' sets a policy url
for data signatures. '--cert-policy-url' sets a policy url for key
signatures (certifications). '--set-policy-url' sets both.
The same %-expandos used for notation data are available here as
well.
'--sig-keyserver-url STRING'
Use STRING as a preferred keyserver URL for data signatures. If
you prefix it with an exclamation mark (!), the keyserver URL
packet will be flagged as critical.
The same %-expandos used for notation data are available here as
well.
'--set-filename STRING'
Use STRING as the filename which is stored inside messages. This
overrides the default, which is to use the actual filename of the
file being encrypted. Using the empty string for STRING
effectively removes the filename from the output.
'--for-your-eyes-only'
'--no-for-your-eyes-only'
Set the 'for your eyes only' flag in the message. This causes
GnuPG to refuse to save the file unless the '--output' option is
given, and PGP to use a "secure viewer" with a claimed
Tempest-resistant font to display the message. This option
overrides '--set-filename'. '--no-for-your-eyes-only' disables
this option.
'--use-embedded-filename'
'--no-use-embedded-filename'
Try to create a file with a name as embedded in the data. This can
be a dangerous option as it enables overwriting files. Defaults to
no. Note that the option '--output' overrides this option.
'--cipher-algo NAME'
Use NAME as cipher algorithm. Running the program with the command
'--version' yields a list of supported algorithms. If this is not
used the cipher algorithm is selected from the preferences stored
with the key. In general, you do not want to use this option as it
allows you to violate the OpenPGP standard.
'--personal-cipher-preferences' is the safe way to accomplish the
same thing.
'--digest-algo NAME'
Use NAME as the message digest algorithm. Running the program with
the command '--version' yields a list of supported algorithms. In
general, you do not want to use this option as it allows you to
violate the OpenPGP standard. '--personal-digest-preferences' is
the safe way to accomplish the same thing.
'--compress-algo NAME'
Use compression algorithm NAME. "zlib" is RFC-1950 ZLIB
compression. "zip" is RFC-1951 ZIP compression which is used by
PGP. "bzip2" is a more modern compression scheme that can compress
some things better than zip or zlib, but at the cost of more memory
used during compression and decompression. "uncompressed" or
"none" disables compression. If this option is not used, the
default behavior is to examine the recipient key preferences to see
which algorithms the recipient supports. If all else fails, ZIP is
used for maximum compatibility.
ZLIB may give better compression results than ZIP, as the
compression window size is not limited to 8k. BZIP2 may give even
better compression results than that, but will use a significantly
larger amount of memory while compressing and decompressing. This
may be significant in low memory situations. Note, however, that
PGP (all versions) only supports ZIP compression. Using any
algorithm other than ZIP or "none" will make the message unreadable
with PGP. In general, you do not want to use this option as it
allows you to violate the OpenPGP standard.
'--personal-compress-preferences' is the safe way to accomplish the
same thing.
'--cert-digest-algo NAME'
Use NAME as the message digest algorithm used when signing a key.
Running the program with the command '--version' yields a list of
supported algorithms. Be aware that if you choose an algorithm
that GnuPG supports but other OpenPGP implementations do not, then
some users will not be able to use the key signatures you make, or
quite possibly your entire key.
'--disable-cipher-algo NAME'
Never allow the use of NAME as cipher algorithm. The given name
will not be checked so that a later loaded algorithm will still get
disabled.
'--disable-pubkey-algo NAME'
Never allow the use of NAME as public key algorithm. The given
name will not be checked so that a later loaded algorithm will
still get disabled.
'--throw-keyids'
'--no-throw-keyids'
Do not put the recipient key IDs into encrypted messages. This
helps to hide the receivers of the message and is a limited
countermeasure against traffic analysis.(1) On the receiving side,
it may slow down the decryption process because all available
secret keys must be tried. '--no-throw-keyids' disables this
option. This option is essentially the same as using
'--hidden-recipient' for all recipients.
'--not-dash-escaped'
This option changes the behavior of cleartext signatures so that
they can be used for patch files. You should not send such an
armored file via email because all spaces and line endings are
hashed too. You can not use this option for data which has 5
dashes at the beginning of a line, patch files don't have this. A
special armor header line tells GnuPG about this cleartext
signature option.
'--escape-from-lines'
'--no-escape-from-lines'
Because some mailers change lines starting with "From " to ">From "
it is good to handle such lines in a special way when creating
cleartext signatures to prevent the mail system from breaking the
signature. Note that all other PGP versions do it this way too.
Enabled by default. '--no-escape-from-lines' disables this option.
'--passphrase-repeat N'
Specify how many times 'gpg' will request a new passphrase be
repeated. This is useful for helping memorize a passphrase.
Defaults to 1 repetition; can be set to 0 to disable any passphrase
repetition. Note that a N greater than 1 will pop up the pinentry
window N+1 times even if a modern pinentry with two entry fields is
used.
'--passphrase-fd N'
Read the passphrase from file descriptor N. Only the first line
will be read from file descriptor N. If you use 0 for N, the
passphrase will be read from STDIN. This can only be used if only
one passphrase is supplied.
Note that since Version 2.0 this passphrase is only used if the
option '--batch' has also been given. Since Version 2.1 the
'--pinentry-mode' also needs to be set to 'loopback'.
'--passphrase-file FILE'
Read the passphrase from file FILE. Only the first line will be
read from file FILE. This can only be used if only one passphrase
is supplied. Obviously, a passphrase stored in a file is of
questionable security if other users can read this file. Don't use
this option if you can avoid it.
Note that since Version 2.0 this passphrase is only used if the
option '--batch' has also been given. Since Version 2.1 the
'--pinentry-mode' also needs to be set to 'loopback'.
'--passphrase STRING'
Use STRING as the passphrase. This can only be used if only one
passphrase is supplied. Obviously, this is of very questionable
security on a multi-user system. Don't use this option if you can
avoid it.
Note that since Version 2.0 this passphrase is only used if the
option '--batch' has also been given. Since Version 2.1 the
'--pinentry-mode' also needs to be set to 'loopback'.
'--pinentry-mode MODE'
Set the pinentry mode to MODE. Allowed values for MODE are:
default
Use the default of the agent, which is 'ask'.
ask
Force the use of the Pinentry.
cancel
Emulate use of Pinentry's cancel button.
error
Return a Pinentry error ("No Pinentry").
loopback
Redirect Pinentry queries to the caller. Note that in
contrast to Pinentry the user is not prompted again if he
enters a bad password.
'--no-symkey-cache'
Disable the passphrase cache used for symmetrical en- and
decryption. This cache is based on the message specific salt value
(cf. '--s2k-mode').
'--request-origin ORIGIN'
Tell gpg to assume that the operation ultimately originated at
ORIGIN. Depending on the origin certain restrictions are applied
and the Pinentry may include an extra note on the origin.
Supported values for ORIGIN are: 'local' which is the default,
'remote' to indicate a remote origin or 'browser' for an operation
requested by a web browser.
'--command-fd N'
This is a replacement for the deprecated shared-memory IPC mode.
If this option is enabled, user input on questions is not expected
from the TTY but from the given file descriptor. It should be used
together with '--status-fd'. See the file doc/DETAILS in the
source distribution for details on how to use it.
'--command-file FILE'
Same as '--command-fd', except the commands are read out of file
FILE
'--allow-non-selfsigned-uid'
'--no-allow-non-selfsigned-uid'
Allow the import and use of keys with user IDs which are not
self-signed. This is not recommended, as a non self-signed user ID
is trivial to forge. '--no-allow-non-selfsigned-uid' disables.
'--allow-freeform-uid'
Disable all checks on the form of the user ID while generating a
new one. This option should only be used in very special
environments as it does not ensure the de-facto standard format of
user IDs.
'--ignore-time-conflict'
GnuPG normally checks that the timestamps associated with keys and
signatures have plausible values. However, sometimes a signature
seems to be older than the key due to clock problems. This option
makes these checks just a warning. See also '--ignore-valid-from'
for timestamp issues on subkeys.
'--ignore-valid-from'
GnuPG normally does not select and use subkeys created in the
future. This option allows the use of such keys and thus exhibits
the pre-1.0.7 behaviour. You should not use this option unless
there is some clock problem. See also '--ignore-time-conflict' for
timestamp issues with signatures.
'--ignore-crc-error'
The ASCII armor used by OpenPGP is protected by a CRC checksum
against transmission errors. Occasionally the CRC gets mangled
somewhere on the transmission channel but the actual content (which
is protected by the OpenPGP protocol anyway) is still okay. This
option allows GnuPG to ignore CRC errors.
'--ignore-mdc-error'
This option changes a MDC integrity protection failure into a
warning. It is required to decrypt old messages which did not use
an MDC. It may also be useful if a message is partially garbled,
but it is necessary to get as much data as possible out of that
garbled message. Be aware that a missing or failed MDC can be an
indication of an attack. Use with great caution; see also option
'--rfc2440'.
'--allow-weak-digest-algos'
Signatures made with known-weak digest algorithms are normally
rejected with an "invalid digest algorithm" message. This option
allows the verification of signatures made with such weak
algorithms. MD5 is the only digest algorithm considered weak by
default. See also '--weak-digest' to reject other digest
algorithms.
'--weak-digest NAME'
Treat the specified digest algorithm as weak. Signatures made over
weak digests algorithms are normally rejected. This option can be
supplied multiple times if multiple algorithms should be considered
weak. See also '--allow-weak-digest-algos' to disable rejection of
weak digests. MD5 is always considered weak, and does not need to
be listed explicitly.
'--allow-weak-key-signatures'
To avoid a minor risk of collision attacks on third-party key
signatures made using SHA-1, those key signatures are considered
invalid. This options allows to override this restriction.
'--no-default-keyring'
Do not add the default keyrings to the list of keyrings. Note that
GnuPG will not operate without any keyrings, so if you use this
option and do not provide alternate keyrings via '--keyring' or
'--secret-keyring', then GnuPG will still use the default public or
secret keyrings.
'--no-keyring'
Do not use any keyring at all. This overrides the default and all
options which specify keyrings.
'--skip-verify'
Skip the signature verification step. This may be used to make the
decryption faster if the signature verification is not needed.
'--with-key-data'
Print key listings delimited by colons (like '--with-colons') and
print the public key data.
'--list-signatures'
'--list-sigs'
Same as '--list-keys', but the signatures are listed too. This
command has the same effect as using '--list-keys' with
'--with-sig-list'. Note that in contrast to '--check-signatures'
the key signatures are not verified. This command can be used to
create a list of signing keys missing in the local keyring; for
example:
gpg --list-sigs --with-colons USERID | \
awk -F: '$1=="sig" && $2=="?" {if($13){print $13}else{print $5}}'
'--fast-list-mode'
Changes the output of the list commands to work faster; this is
achieved by leaving some parts empty. Some applications don't need
the user ID and the trust information given in the listings. By
using this options they can get a faster listing. The exact
behaviour of this option may change in future versions. If you are
missing some information, don't use this option.
'--no-literal'
This is not for normal use. Use the source to see for what it
might be useful.
'--set-filesize'
This is not for normal use. Use the source to see for what it
might be useful.
'--show-session-key'
Display the session key used for one message. See
'--override-session-key' for the counterpart of this option.
We think that Key Escrow is a Bad Thing; however the user should
have the freedom to decide whether to go to prison or to reveal the
content of one specific message without compromising all messages
ever encrypted for one secret key.
You can also use this option if you receive an encrypted message
which is abusive or offensive, to prove to the administrators of
the messaging system that the ciphertext transmitted corresponds to
an inappropriate plaintext so they can take action against the
offending user.
'--override-session-key STRING'
'--override-session-key-fd FD'
Don't use the public key but the session key STRING respective the
session key taken from the first line read from file descriptor FD.
The format of this string is the same as the one printed by
'--show-session-key'. This option is normally not used but comes
handy in case someone forces you to reveal the content of an
encrypted message; using this option you can do this without
handing out the secret key. Note that using
'--override-session-key' may reveal the session key to all local
users via the global process table. Often it is useful to combine
this option with '--no-keyring'.
'--ask-sig-expire'
'--no-ask-sig-expire'
When making a data signature, prompt for an expiration time. If
this option is not specified, the expiration time set via
'--default-sig-expire' is used. '--no-ask-sig-expire' disables
this option.
'--default-sig-expire'
The default expiration time to use for signature expiration. Valid
values are "0" for no expiration, a number followed by the letter d
(for days), w (for weeks), m (for months), or y (for years) (for
example "2m" for two months, or "5y" for five years), or an
absolute date in the form YYYY-MM-DD. Defaults to "0".
'--ask-cert-expire'
'--no-ask-cert-expire'
When making a key signature, prompt for an expiration time. If
this option is not specified, the expiration time set via
'--default-cert-expire' is used. '--no-ask-cert-expire' disables
this option.
'--default-cert-expire'
The default expiration time to use for key signature expiration.
Valid values are "0" for no expiration, a number followed by the
letter d (for days), w (for weeks), m (for months), or y (for
years) (for example "2m" for two months, or "5y" for five years),
or an absolute date in the form YYYY-MM-DD. Defaults to "0".
'--default-new-key-algo STRING'
This option can be used to change the default algorithms for key
generation. The STRING is similar to the arguments required for
the command '--quick-add-key' but slightly different. For example
the current default of '"rsa2048/cert,sign+rsa2048/encr"' (or
'"rsa3072"') can be changed to the value of what we currently call
future default, which is '"ed25519/cert,sign+cv25519/encr"'. You
need to consult the source code to learn the details. Note that
the advanced key generation commands can always be used to specify
a key algorithm directly.
'--allow-secret-key-import'
This is an obsolete option and is not used anywhere.
'--allow-multiple-messages'
'--no-allow-multiple-messages'
Allow processing of multiple OpenPGP messages contained in a single
file or stream. Some programs that call GPG are not prepared to
deal with multiple messages being processed together, so this
option defaults to no. Note that versions of GPG prior to 1.4.7
always allowed multiple messages. Future versions of GnUPG will
remove this option.
Warning: Do not use this option unless you need it as a temporary
workaround!
'--enable-special-filenames'
This option enables a mode in which filenames of the form '-&n',
where n is a non-negative decimal number, refer to the file
descriptor n and not to a file with that name.
'--no-expensive-trust-checks'
Experimental use only.
'--preserve-permissions'
Don't change the permissions of a secret keyring back to user
read/write only. Use this option only if you really know what you
are doing.
'--default-preference-list STRING'
Set the list of default preferences to STRING. This preference
list is used for new keys and becomes the default for "setpref" in
the edit menu.
'--default-keyserver-url NAME'
Set the default keyserver URL to NAME. This keyserver will be used
as the keyserver URL when writing a new self-signature on a key,
which includes key generation and changing preferences.
'--list-config'
Display various internal configuration parameters of GnuPG. This
option is intended for external programs that call GnuPG to perform
tasks, and is thus not generally useful. See the file
'doc/DETAILS' in the source distribution for the details of which
configuration items may be listed. '--list-config' is only usable
with '--with-colons' set.
'--list-gcrypt-config'
Display various internal configuration parameters of Libgcrypt.
'--gpgconf-list'
This command is similar to '--list-config' but in general only
internally used by the 'gpgconf' tool.
'--gpgconf-test'
This is more or less dummy action. However it parses the
configuration file and returns with failure if the configuration
file would prevent 'gpg' from startup. Thus it may be used to run
a syntax check on the configuration file.
---------- Footnotes ----------
(1) Using a little social engineering anyone who is able to decrypt
the message can check whether one of the other recipients is the one he
suspects.