7463e885872e92ee32ebcdb271bc4e77ea598a1b
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

1) ## translation metadata
Roger Dingledine looks like we never set the...

Roger Dingledine authored 13 years ago

2) # Revision: $Revision$
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

3) # Translation-Priority: 2-medium
4) 
5) #include "head.wmi" TITLE="Tor Project: Verifying Signatures" CHARSET="UTF-8"
6) <div id="content" class="clearfix">
7)   <div id="breadcrumbs">
Andrew Lewman change all of the breadcrum...

Andrew Lewman authored 13 years ago

8)     <a href="<page index>">Home &raquo; </a>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

9)     <a href="<page docs/verifying-signatures>">Verifying Signatures</a>
10)   </div>
Roger Dingledine clear trailing whitespaces;...

Roger Dingledine authored 13 years ago

11)   <div id="maincol">
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

12)     <h1>How to verify signatures for packages</h1>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

13)     <hr>
Roger Dingledine clear trailing whitespaces;...

Roger Dingledine authored 13 years ago

14) 
Roger Dingledine add some introduction parag...

Roger Dingledine authored 12 years ago

15)     <h3>What is a signature and why should I check it?</h3>
16)     <hr>
17) 
18)     <p>How do you know that the Tor program you have is really the
19)     one we made? Many Tor users have very real adversaries who might
20)     try to give them a fake version of Tor &mdash; and it doesn't matter
21)     how secure and anonymous Tor is if you're not running the real Tor.</p>
22) 
23)     <p>An attacker could try a variety of attacks to get you to download
24)     a fake Tor. For example, he could trick you into thinking some other
25)     website is a great place to download Tor. That's why you should
26)     always download Tor from <b>https</b>://www.torproject.org/. The
27)     https part means there's encryption and authentication between your
28)     browser and the website, making it much harder for the attacker
29)     to modify your download. But it's not perfect. Some places in the
Roger Dingledine give a suggestion for where...

Roger Dingledine authored 12 years ago

30)     world block the Tor website, making users try <a href="<page
31)     docs/faq>#GetTor">somewhere else</a>. Large
Roger Dingledine add some introduction parag...

Roger Dingledine authored 12 years ago

32)     companies sometimes force employees to use a modified browser,
33)     so the company can listen in on all their browsing. We've even <a
34)     href="https://blog.torproject.org/blog/diginotar-debacle-and-what-you-should-do-about-it">seen</a>
35)     attackers who have the ability to trick your browser into thinking
36)     you're talking to the Tor website with https when you're not.</p>
37) 
38)     <p>Some software sites list <a
39)     href="http://en.wikipedia.org/wiki/Cryptographic_hash_function">sha1
40)     hashes</a> alongside the software on their website, so users can
41)     verify that they downloaded the file without any errors. These
42)     "checksums" help you answer the question "Did I download this file
43)     correctly from whoever sent it to me?" They do a good job at making
44)     sure you didn't have any random errors in your download, but they
45)     don't help you figure out whether you were downloading it from the
46)     attacker. The better question to answer is: "Is this file that I
47)     just downloaded the file that Tor intended me to get?"</p>
48) 
Roger Dingledine add another heading on veri...

Roger Dingledine authored 12 years ago

49)     <h3>Where do I get the signatures and the keys that made them?</h3>
50)     <hr>
Andrew Lewman revert mttp's changes.

Andrew Lewman authored 10 years ago

51)     <p>Each file on <a href="<page download/download>">our download
Roger Dingledine the verifying signatures pa...

Roger Dingledine authored 12 years ago

52)     page</a> is accompanied by a file with the same name as the
53)     package and the extension ".asc". These .asc files are GPG
54)     signatures. They allow you to verify the file you've downloaded
55)     is exactly the one that we intended you to get. For example,
Matt Pagan

Matt Pagan authored 10 years ago

56)     tor-browser-2.3.25-13_en-US.exe is accompanied by
57)     tor-browser-2.3.25-13_en-US.exe.asc. For a list
Andrew Lewman add the correct >.

Andrew Lewman authored 10 years ago

58)     of which developer signs which package, see our <a href="<page docs/signing-keys>">signing keys</a> page.</p>
Roger Dingledine the verifying signatures pa...

Roger Dingledine authored 12 years ago

59)     <h3>Windows</h3>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

60)     <hr>
Roger Dingledine add some introduction parag...

Roger Dingledine authored 12 years ago

61)     <p>You need to have GnuPG installed before
62)     you can verify signatures. Download it from <a
Andrew Lewman revert mttp's changes.

Andrew Lewman authored 10 years ago

63)     href="http://gpg4win.org/download.html">http://gpg4win.org/download.html</a>.</p>
Roger Dingledine the verifying signatures pa...

Roger Dingledine authored 12 years ago

64)     <p>Once it's installed, use GnuPG to import the key that signed your
65)     package. Since GnuPG for Windows is a command-line tool, you will need
Matt Pagan

Matt Pagan authored 10 years ago

66)     to use <i>cmd.exe</i>. Unless you edit your PATH environment variable,
67)     you will need to tell Windows the full path to the GnuPG program. If
68)     you installed GnuPG with the default values, the path should be
69)     something like this: <i>C:\Program Files\Gnu\GnuPg\gpg.exe</i>.</p>
Matt Pagan Replaced "the Tor Browser B...

Matt Pagan authored 9 years ago

70)     <p>Erinn Clark signs the Tor Browsers. Import her key
Matt Pagan

Matt Pagan authored 10 years ago

71)     (0x416F061063FEE659) by starting <i>cmd.exe</i> and typing:</p>
72)     <pre>"C:\Program Files\Gnu\GnuPg\gpg.exe" --keyserver x-hkp://pool.sks-keyservers.net --recv-keys 0x416F061063FEE659</pre>
73)     <p>After importing the key, you can verify that the fingerprint
Roger Dingledine the verifying signatures pa...

Roger Dingledine authored 12 years ago

74)     is correct:</p>
Matt Pagan

Matt Pagan authored 10 years ago

75)     <pre>"C:\Program Files\Gnu\GnuPg\gpg.exe" --fingerprint 0x416F061063FEE659</pre>
Roger Dingledine the verifying signatures pa...

Roger Dingledine authored 12 years ago

76)     <p>You should see:</p>
77)     <pre>
78)     pub   2048R/63FEE659 2003-10-16
79)           Key fingerprint = 8738 A680 B84B 3031 A630  F2DB 416F 0610 63FE E659
80)     uid                  Erinn Clark &lt;erinn@torproject.org&gt;
81)     uid                  Erinn Clark &lt;erinn@debian.org&gt;
82)     uid                  Erinn Clark &lt;erinn@double-helix.org&gt;
83)     sub   2048R/EB399FD7 2003-10-16
84) </pre>
85)     <p>To verify the signature of the package you downloaded, you will need
86)     to download the ".asc" file as well. Assuming you downloaded the
87)     package and its signature to your Desktop, run:</p>
ilv Fixed version tags and wind...

ilv authored 9 years ago

88)     <pre>"C:\Program Files\Gnu\GnuPg\gpg.exe" --verify C:\Users\Alice\Desktop\torbrowser-install-<version-torbrowserbundle>_en-US.exe.asc C:\Users\Alice\Desktop\torbrowser-install-<version-torbrowserbundle>_en-US.exe</pre>
Roger Dingledine the verifying signatures pa...

Roger Dingledine authored 12 years ago

89)     <p>The output should say "Good signature": </p>
90)     <pre>
91)     gpg: Signature made Wed 31 Aug 2011 06:37:01 PM EDT using RSA key ID 63FEE659
92)     gpg: Good signature from "Erinn Clark &lt;erinn@torproject.org&gt;"
93)     gpg:                 aka "Erinn Clark &lt;erinn@debian.org&gt;"
94)     gpg:                 aka "Erinn Clark &lt;erinn@double-helix.org&gt;"
95)     gpg: WARNING: This key is not certified with a trusted signature!
96)     gpg:          There is no indication that the signature belongs to the owner.
97)     Primary key fingerprint: 8738 A680 B84B 3031 A630  F2DB 416F 0610 63FE E659
98)     </pre>
99)     <p>
100)     Notice that there is a warning because you haven't assigned a trust
101)     index to this person. This means that GnuPG verified that the key made
102)     that signature, but it's up to you to decide if that key really belongs
103)     to the developer. The best method is to meet the developer in person and
104)     exchange key fingerprints.
105)     </p>
ilv Combined osx and linux inst...

ilv authored 9 years ago

106)     <h3>Mac OS X and Linux</h3>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

107)     <hr>
Roger Dingledine clear trailing whitespaces;...

Roger Dingledine authored 13 years ago

108) 
Roger Dingledine the verifying signatures pa...

Roger Dingledine authored 12 years ago

109)     <p>You need to have GnuPG installed before you can verify
ilv Combined osx and linux inst...

ilv authored 9 years ago

110)     signatures. If you are using Mac OS X, you can install it from <a
111)     href="http://www.gpgtools.org/">http://www.gpgtools.org/</a>. If you
112)     are using Linux, then it's probably you already have GnuPG in your
113)     system, as most Linux distributions come with it preinstalled.
Roger Dingledine the verifying signatures pa...

Roger Dingledine authored 12 years ago

114)     </p>
Roger Dingledine clear trailing whitespaces;...

Roger Dingledine authored 13 years ago

115) 
ilv Combined osx and linux inst...

ilv authored 9 years ago

116)     <p>The next step is to use GnuPG to import the key that signed
Matt Pagan Replaced "the Tor Browser B...

Matt Pagan authored 9 years ago

117)     your package. Erinn Clark signs the Tor Browsers. Import her
ilv Combined osx and linux inst...

ilv authored 9 years ago

118)     key (0x416F061063FEE659) by starting the terminal (under "Applications"
119)     in Mac OS X) and typing:</p>
Roger Dingledine clear trailing whitespaces;...

Roger Dingledine authored 13 years ago

120) 
Moritz Bartl switching to longer key ids

Moritz Bartl authored 10 years ago

121)     <pre>gpg --keyserver x-hkp://pool.sks-keyservers.net --recv-keys 0x416F061063FEE659</pre>
Roger Dingledine clear trailing whitespaces;...

Roger Dingledine authored 13 years ago

122) 
Roger Dingledine the verifying signatures pa...

Roger Dingledine authored 12 years ago

123)     <p>After importing the key, you can verify that the fingerprint
124)     is correct:</p>
125) 
Moritz Bartl switching to longer key ids

Moritz Bartl authored 10 years ago

126)     <pre>gpg --fingerprint 0x416F061063FEE659</pre>
Roger Dingledine clear trailing whitespaces;...

Roger Dingledine authored 13 years ago

127) 
Roger Dingledine the verifying signatures pa...

Roger Dingledine authored 12 years ago

128)     <p>You should see:</p>
129)     <pre>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

130)     pub   2048R/63FEE659 2003-10-16
131)           Key fingerprint = 8738 A680 B84B 3031 A630  F2DB 416F 0610 63FE E659
132)     uid                  Erinn Clark &lt;erinn@torproject.org&gt;
133)     uid                  Erinn Clark &lt;erinn@debian.org&gt;
134)     uid                  Erinn Clark &lt;erinn@double-helix.org&gt;
135)     sub   2048R/EB399FD7 2003-10-16
136)     </pre>
Roger Dingledine clear trailing whitespaces;...

Roger Dingledine authored 13 years ago

137) 
Roger Dingledine the verifying signatures pa...

Roger Dingledine authored 12 years ago

138)     <p>To verify the signature of the package you downloaded, you will need
139)     to download the ".asc" file as well. Assuming you downloaded the
ilv Fixed version tags and wind...

ilv authored 9 years ago

140)     package and its signature to your Desktop, run:</p>
Roger Dingledine clear trailing whitespaces;...

Roger Dingledine authored 13 years ago

141) 
ilv Fixed version tags and wind...

ilv authored 9 years ago

142)     <strong>For Mac OS X users</strong>:<br />
143)     <pre>gpg --verify ~/Desktop/TorBrowser-<version-torbrowserbundleosx32>-osx32_en-US.dmg{.asc*,}</pre>
ilv Combined osx and linux inst...

ilv authored 9 years ago

144)     
Sebastian Hahn Fix grammar as pointed out...

Sebastian Hahn authored 9 years ago

145)     <strong>For Linux users</strong> (change 32 to 64 if you have the 64-bit package):<br />
ilv Fixed version tags and wind...

ilv authored 9 years ago

146)     <pre>gpg --verify ~/Desktop/tor-browser-linux32-<version-torbrowserbundlelinux32>_en-US.tar.xz{.asc*,}</pre>
Roger Dingledine clear trailing whitespaces;...

Roger Dingledine authored 13 years ago

147) 
Roger Dingledine the verifying signatures pa...

Roger Dingledine authored 12 years ago

148)     <p>The output should say "Good signature": </p>
Roger Dingledine clear trailing whitespaces;...

Roger Dingledine authored 13 years ago

149) 
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

150)     <pre>
Roger Dingledine the verifying signatures pa...

Roger Dingledine authored 12 years ago

151)     gpg: Signature made Wed 31 Aug 2011 06:37:01 PM EDT using RSA key ID 63FEE659
152)     gpg: Good signature from "Erinn Clark &lt;erinn@torproject.org&gt;"
153)     gpg:                 aka "Erinn Clark &lt;erinn@debian.org&gt;"
154)     gpg:                 aka "Erinn Clark &lt;erinn@double-helix.org&gt;"
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

155)     gpg: WARNING: This key is not certified with a trusted signature!
156)     gpg:          There is no indication that the signature belongs to the owner.
Roger Dingledine the verifying signatures pa...

Roger Dingledine authored 12 years ago

157)     Primary key fingerprint: 8738 A680 B84B 3031 A630  F2DB 416F 0610 63FE E659
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

158)     </pre>
Roger Dingledine clear trailing whitespaces;...

Roger Dingledine authored 13 years ago

159) 
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

160)     <p>
161)     Notice that there is a warning because you haven't assigned a trust
162)     index to this person. This means that GnuPG verified that the key made
163)     that signature, but it's up to you to decide if that key really belongs
164)     to the developer. The best method is to meet the developer in person and
165)     exchange key fingerprints.
166)     </p>
ilv Combined osx and linux inst...

ilv authored 9 years ago

167)     
168)     <p>
169)     If you're a Linux user and you're using the <b>Debian</b> Tor (not Tor
170)     Browser) packages, you should read the instructions on <a
171)     href="<page docs/debian>#packages">importing these keys to apt</a>.
172)     If you're using the <b>RPMs</b> (for Tor, not Tor Browser), you can
173)     manually verify the signatures on the RPM packages by
174)     <pre>rpm -K filename.rpm</pre>
175)     </p>
Roger Dingledine explain that linux users ar...

Roger Dingledine authored 12 years ago

176) 
177)     <p>See <a
178)     href="http://www.gnupg.org/documentation/">http://www.gnupg.org/documentation/</a>
ilv Added missing hr and s/GPG/...

ilv authored 9 years ago

179)     to learn more about GnuPG.</p>
180) 
181)     <hr>
Roger Dingledine the verifying signatures pa...

Roger Dingledine authored 12 years ago

182) 
Matt Pagan Moved verification instruct...

Matt Pagan authored 9 years ago

183)     <a id="BuildVerification"></a>
184)     <h3><a class="anchor" href="#BuildVerification">
185)     Verifying sha256sums (advanced)</a></h3>
186)     <hr>
Georg Koppen Bug 14304: Document strippi...

Georg Koppen authored 9 years ago

187)     <p>Build reproducibility is a <a
188)        href="https://blog.torproject.org/blog/deterministic-builds-part-one-cyberwar-and-global-compromise">security
Sebastian Hahn Remove some whitespace at eol

Sebastian Hahn authored 9 years ago

189)        property</a> of Tor Browser 3.0 and later. Anyone can build
190)        Tor Browser on their own machine and produce a binary that is
191)        bit-for-bit identical to the binary we offer on the download page.
192)        Fortunately, it is not necessary for everyone to build the Tor Browser
193)        locally to get this security. Verifying and comparing the signed list
194)        of <a href="https://en.wikipedia.org/wiki/Cryptographic_hash">hashes</a>
195)        will confirm that multiple people have built Tor Browsers
Matt Pagan Moved verification instruct...

Matt Pagan authored 9 years ago

196)        identical to the download.</p>
197) 
198)       <p>The steps below walk through this process:</p>
199) 
200)     <ul>
201)       <li>Download the Tor Browser package, the sha256sums.txt file, and the
Georg Koppen Bug 14304: Document strippi...

Georg Koppen authored 9 years ago

202)       sha256sums signature files. They can all be found in the same directory
Andrew Lewman there is no page macro for...

Andrew Lewman authored 9 years ago

203)       under <a href="https://www.torproject.org/dist/torbrowser/">
Georg Koppen Bug 14304: Document strippi...

Georg Koppen authored 9 years ago

204)       https://www.torproject.org/dist/torbrowser/</a>, for example in '3.6.1'
Andrew Lewman there is no page macro for...

Andrew Lewman authored 9 years ago

205)       for TBB 3.6.1.</li>
Georg Koppen Bug 14304: Document strippi...

Georg Koppen authored 9 years ago

206)       <li>Retrieve the signers' GPG keys. This can be done from the command
207)       line by entering something like
Matt Pagan Moved verification instruct...

Matt Pagan authored 9 years ago

208)       <pre>gpg --keyserver keys.mozilla.org --recv-keys 0x29846B3C683686CC</pre>
Georg Koppen Bug 14304: Document strippi...

Georg Koppen authored 9 years ago

209)       (This will bring you developer Mike Perry's public key. Other
Matt Pagan Moved verification instruct...

Matt Pagan authored 9 years ago

210)       developers' key IDs can be found on
Georg Koppen Bug 14304: Document strippi...

Georg Koppen authored 9 years ago

211)       <a href="<page docs/signing-keys>">this
Matt Pagan Moved verification instruct...

Matt Pagan authored 9 years ago

212)       page</a>.)</li>
213)       <li>Verify the sha256sums.txt file by executing this command:
214)       <pre>gpg --verify &lt;NAME OF THE SIGNATURE FILE&gt;.asc sha256sums.txt</pre></li>
Georg Koppen Bug 14304: Document strippi...

Georg Koppen authored 9 years ago

215)       <li>You should see a message like "Good signature from &lt;DEVELOPER
Matt Pagan Moved verification instruct...

Matt Pagan authored 9 years ago

216)       NAME&gt;". If you don't, there is a problem. Try these steps again.</li>
Georg Koppen Bug 14304: Document strippi...

Georg Koppen authored 9 years ago

217)       <li>Now you can take the sha256sum of the Tor Browser package. On
Matt Pagan Moved verification instruct...

Matt Pagan authored 9 years ago

218)       Windows you can use the <a href="http://md5deep.sourceforge.net/">
219)       hashdeep utility</a> and run
220)       <pre>C:\location\where\you\saved\hashdeep -c sha256sum &lt;TOR BROWSER FILE NAME&gt;.exe</pre>
Sebastian Hahn Fix osx gpg instructions (#...

Sebastian Hahn authored 9 years ago

221)       On Mac or Linux you can run <pre>sha256sum &lt;TOR BROWSER FILE NAME&gt;.dmg</pre> or <pre>sha256sum &lt;TOR BROWSER FILE NAME&gt;.tar.gz</pre> without having to download a utility.</li>
Matt Pagan Moved verification instruct...

Matt Pagan authored 9 years ago

222)       <li>You will see a string of letters and numbers.</li>
223)       <li>Open sha256sums.txt in a text editor.</li>
224)       <li>Locate the name of the Tor Browser file you downloaded.</li>
225)       <li>Compare the string of letters and numbers to the left of your
Georg Koppen Bug 14304: Document strippi...

Georg Koppen authored 9 years ago

226)       filename with the string of letters and numbers that appeared
227)       on your command line. If they match, you've successfully verified the
228)       build.</li>
Matt Pagan Moved verification instruct...

Matt Pagan authored 9 years ago

229)     </ul>
Georg Koppen Bug 14304: Document strippi...

Georg Koppen authored 9 years ago

230) 
231)     <p><a href="https://github.com/isislovecruft/scripts/blob/master/verify-gitian-builder-signatures">Scripts</a>
232)     to <a href="http://tor.stackexchange.com/questions/648/how-to-verify-tor-browser-bundle-tbb-3-x">automate</a>
233)     these steps have been written, but to use them you will need to modify
Matt Pagan Replaced "the Tor Browser B...

Matt Pagan authored 9 years ago

234)     them yourself with the latest Tor Browser filename.</p>
Georg Koppen Bug 14304: Document strippi...

Georg Koppen authored 9 years ago

235) 
236)     <hr>
237) 
238)     <a id="MARVerification"></a>
239)     <h3><a class="anchor" href="#MARVerification">
240)     Verifying MAR files we ship (advanced)</a></h3>
Matt Pagan Moved verification instruct...

Matt Pagan authored 9 years ago

241)     <hr>
Georg Koppen Bug 14304: Document strippi...

Georg Koppen authored 9 years ago

242)     <p>Starting with Tor Browser 4.5a4 we sign our MAR files which helps
243)     securing our update process. The downside of this is the need for additional
244)     instructions to verify that the MAR files we ship are indeed the ones we
245)     produced with our Gitian setup.</p>
246) 
247)     <p>Assuming the verification happens on a Linux computer one first needs the
248)     <tt>mar-tools-linux*.zip</tt> out of the <tt>gitian-builder/inputs</tt>
249)     directory to remove the embedded signature(s). The steps to get the unsigned
250)     MAR file on a 64 bit Linux are</p>
251)     <pre>
252)     cd /path/to/MAR/file
253)     unzip /path/to/gitian-builder/inputs/mar-tools-linux64.zip
254)     mar-tools/signmar -r your-signed-mar-file.mar your-unsigned-mar-file.mar</pre>
255)     <p>Now you can compare the SHA256 sum of <tt>your-unsigned-mar-file.mar</tt>
256)     with the one provided in the <tt>sha265sums.txt</tt> or
257)     <tt>sha256sums.incremental.txt</tt> as outlined in <a href="#BuildVerification">Verifying
258)     sha256sums (advancded)</a> above.</p>
Matt Pagan Moved verification instruct...

Matt Pagan authored 9 years ago

259) 
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

260)   </div>
261)   <!-- END MAINCOL -->
262)   <div id = "sidecol">
263) #include "side.wmi"
264) #include "info.wmi"
265)   </div>
266)   <!-- END SIDECOL -->
267) </div>
268) <!-- END CONTENT -->