1 # Example PWMD configuration file. Edit and save to ~/.pwmd/config or
2 # specify with the -f command line option. See the pwmd(1) manual page or the
3 # pwmd.info documentation for complete details of the options.
5 # The global section is for non-file related settings and defaults for data
6 # files without a file section of their own.
9 # Location of the pinentry binary.
10 #pinentry_path=/usr/bin/pinentry
12 # The number of seconds to wait for a pinentry before giving up.
15 # Location of the listening socket.
16 #socket_path=~/.pwmd/socket
18 # Socket permissions. This will override any umask setting.
21 # Usernames or groups obtained via SO_PEERCRED which are allowed to
22 # connect to the socket. Groups should be prefixed with a '@'. When not
23 # specified only the invoking user is allowed.
24 #allowed = username,another_user,@group
26 # When false, disable keeping backups for data files.
32 # Set to true to enable logging to log_path.
35 # Set to true to enable logging to syslog.
38 # The logging level: 0=connections and errors, 1=client commands.
41 # Enable gpg-agent support.
44 # A file containing the environment settings for connecting to gpg-agent.
45 #agent_env_file=/path/to/some/file
47 # Kill the smartcard daemon after each OPEN or SAVE.
50 # Require the passphrase needed for a data file before each SAVE.
51 #require_save_key=true
53 # Set to false to call mlockall(2) after a client connects. Uses more memory
54 # but is also more secure. Most will probably find it overkill since the
55 # contents of all memory is cleared before being freed.
56 #disable_mlockall=true
58 # Disable the XPATH, LIST and DUMP commands. When "true" and a client sends
59 # these commands the error GPG_ERR_NOT_IMPLEMENTED will be returned.
60 #disable_list_and_dump=false
62 # When sending data to the client an XFER status message will be sent after
63 # N bytes. N is rounded to ASSUAN_LINELENGTH (1002) bytes.
66 # A comma separated list of filenames to add to the file cache upon startup.
67 # You will be prompted for the passphrasefor each file if required. The files
68 # are looked for in ~/.pwmd/data. This also affects rcfile reloading via
70 #cache_push=somefile,anotherfile
72 # The number of seconds to keep a file in the cache. If -1, the file will be
73 # kept forever. If 0 then every OPEN will require a passphrase.
76 # The maximum recursion depth when resolving elements that contain a "target"
77 # attribute. When this value is exceeded an error will be returned.
80 # The priority or nice value of the server process. The default is inherited
81 # from the parent process.
84 # The cipher to use for newly created files.
87 # The number of cipher encryption iterations of the data. This differs from
88 # the s2k_count option (see below) that determines the hash iterations of the
92 # Send a status message to the client after this many encryption/decryption
96 # The default key parameters to use when generating a new keypair
98 #keyparam=(genkey (rsa (nbits 4:2048)))
100 # The number of passphrase hashing iterations for new files and when changing
101 # the passphrase of a secret key. The default is the calibrated value of the
105 # Whether to enable TCP/TLS server support. If enabled, both TCP and the local
106 # unix domain socket will listen for connections.
109 # If TCP is enabled, the port to listen on.
112 # The network interface to listen on.
115 # The number of seconds to wait for a network read and write to complete
116 # for TLS connections.
119 # A comma separated list of client x509 certificate fingerprints in
120 # SHA-1 format that will be allowed to connect or open a file. See the
121 # documentation for details.
122 #tls_access=ALLOWEDFINGERPRINT,ANOTHERFINGERPRINT
124 # Require the client to provide the key to open a file even if the file is
126 #tcp_require_key=false
128 # The time in tenths of a second to wait for a new TCP connection. Setting to
129 # 0 will disable waiting.
132 # Accept TCP connections from the specified protocol. One of: ipv4, ipv6 or
133 # any. The default is "any".
136 # The GnuTLS cipher suite and protocol to use.
137 #tls_cipher_suite=SECURE256
139 # The interval in seconds to send the KEEPALIVE status message when
141 #keepalive_interval=60
143 # END GLOBAL SETTINGS
145 # File specific settings are allowed by placing the filename in braces. Each
146 # file can have it's own configuration settings from those listed below.
148 #tls_access=+,!DENIEDFINGERPRINT
151 #passphrase_file=/path/to/file.key