931eb98293943c1e26f1c3160e57ef288527cb37
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 14 years ago

1) ## translation metadata
Roger Dingledine looks like we never set the...

Roger Dingledine authored 14 years ago

2) # Revision: $Revision$
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 14 years ago

3) # Translation-Priority: 2-medium
4) 
5) #include "head.wmi" TITLE="Tor Project: Verifying Signatures" CHARSET="UTF-8"
6) <div id="content" class="clearfix">
7)   <div id="breadcrumbs">
Andrew Lewman change all of the breadcrum...

Andrew Lewman authored 14 years ago

8)     <a href="<page index>">Home &raquo; </a>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 14 years ago

9)     <a href="<page docs/verifying-signatures>">Verifying Signatures</a>
10)   </div>
Roger Dingledine clear trailing whitespaces;...

Roger Dingledine authored 13 years ago

11)   <div id="maincol">
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 14 years ago

12)     <h1>How to verify signatures for packages</h1>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 14 years ago

13)     <hr>
Roger Dingledine clear trailing whitespaces;...

Roger Dingledine authored 13 years ago

14) 
Roger Dingledine add some introduction parag...

Roger Dingledine authored 13 years ago

15)     <h3>What is a signature and why should I check it?</h3>
16)     <hr>
17) 
18)     <p>How do you know that the Tor program you have is really the
19)     one we made? Many Tor users have very real adversaries who might
20)     try to give them a fake version of Tor &mdash; and it doesn't matter
21)     how secure and anonymous Tor is if you're not running the real Tor.</p>
22) 
23)     <p>An attacker could try a variety of attacks to get you to download
24)     a fake Tor. For example, he could trick you into thinking some other
25)     website is a great place to download Tor. That's why you should
26)     always download Tor from <b>https</b>://www.torproject.org/. The
27)     https part means there's encryption and authentication between your
28)     browser and the website, making it much harder for the attacker
29)     to modify your download. But it's not perfect. Some places in the
Roger Dingledine give a suggestion for where...

Roger Dingledine authored 13 years ago

30)     world block the Tor website, making users try <a href="<page
31)     docs/faq>#GetTor">somewhere else</a>. Large
Roger Dingledine add some introduction parag...

Roger Dingledine authored 13 years ago

32)     companies sometimes force employees to use a modified browser,
33)     so the company can listen in on all their browsing. We've even <a
34)     href="https://blog.torproject.org/blog/diginotar-debacle-and-what-you-should-do-about-it">seen</a>
35)     attackers who have the ability to trick your browser into thinking
36)     you're talking to the Tor website with https when you're not.</p>
37) 
38)     <p>Some software sites list <a
39)     href="http://en.wikipedia.org/wiki/Cryptographic_hash_function">sha1
40)     hashes</a> alongside the software on their website, so users can
41)     verify that they downloaded the file without any errors. These
42)     "checksums" help you answer the question "Did I download this file
43)     correctly from whoever sent it to me?" They do a good job at making
44)     sure you didn't have any random errors in your download, but they
45)     don't help you figure out whether you were downloading it from the
46)     attacker. The better question to answer is: "Is this file that I
47)     just downloaded the file that Tor intended me to get?"</p>
48) 
Roger Dingledine add another heading on veri...

Roger Dingledine authored 13 years ago

49)     <h3>Where do I get the signatures and the keys that made them?</h3>
50)     <hr>
Andrew Lewman revert mttp's changes.

Andrew Lewman authored 11 years ago

51)     <p>Each file on <a href="<page download/download>">our download
Roger Dingledine the verifying signatures pa...

Roger Dingledine authored 13 years ago

52)     page</a> is accompanied by a file with the same name as the
53)     package and the extension ".asc". These .asc files are GPG
54)     signatures. They allow you to verify the file you've downloaded
55)     is exactly the one that we intended you to get. For example,
Matt Pagan

Matt Pagan authored 11 years ago

56)     tor-browser-2.3.25-13_en-US.exe is accompanied by
57)     tor-browser-2.3.25-13_en-US.exe.asc. For a list
Andrew Lewman add the correct >.

Andrew Lewman authored 11 years ago

58)     of which developer signs which package, see our <a href="<page docs/signing-keys>">signing keys</a> page.</p>
Roger Dingledine the verifying signatures pa...

Roger Dingledine authored 13 years ago

59)     <h3>Windows</h3>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 14 years ago

60)     <hr>
Roger Dingledine add some introduction parag...

Roger Dingledine authored 13 years ago

61)     <p>You need to have GnuPG installed before
62)     you can verify signatures. Download it from <a
Andrew Lewman revert mttp's changes.

Andrew Lewman authored 11 years ago

63)     href="http://gpg4win.org/download.html">http://gpg4win.org/download.html</a>.</p>
Roger Dingledine the verifying signatures pa...

Roger Dingledine authored 13 years ago

64)     <p>Once it's installed, use GnuPG to import the key that signed your
65)     package. Since GnuPG for Windows is a command-line tool, you will need
Matt Pagan

Matt Pagan authored 11 years ago

66)     to use <i>cmd.exe</i>. Unless you edit your PATH environment variable,
67)     you will need to tell Windows the full path to the GnuPG program. If
68)     you installed GnuPG with the default values, the path should be
69)     something like this: <i>C:\Program Files\Gnu\GnuPg\gpg.exe</i>.</p>
Matt Pagan Replaced "the Tor Browser B...

Matt Pagan authored 9 years ago

70)     <p>Erinn Clark signs the Tor Browsers. Import her key
Matt Pagan

Matt Pagan authored 11 years ago

71)     (0x416F061063FEE659) by starting <i>cmd.exe</i> and typing:</p>
72)     <pre>"C:\Program Files\Gnu\GnuPg\gpg.exe" --keyserver x-hkp://pool.sks-keyservers.net --recv-keys 0x416F061063FEE659</pre>
73)     <p>After importing the key, you can verify that the fingerprint
Roger Dingledine the verifying signatures pa...

Roger Dingledine authored 13 years ago

74)     is correct:</p>
Matt Pagan

Matt Pagan authored 11 years ago

75)     <pre>"C:\Program Files\Gnu\GnuPg\gpg.exe" --fingerprint 0x416F061063FEE659</pre>
Roger Dingledine the verifying signatures pa...

Roger Dingledine authored 13 years ago

76)     <p>You should see:</p>
77)     <pre>
78)     pub   2048R/63FEE659 2003-10-16
79)           Key fingerprint = 8738 A680 B84B 3031 A630  F2DB 416F 0610 63FE E659
80)     uid                  Erinn Clark &lt;erinn@torproject.org&gt;
81)     uid                  Erinn Clark &lt;erinn@debian.org&gt;
82)     uid                  Erinn Clark &lt;erinn@double-helix.org&gt;
83)     sub   2048R/EB399FD7 2003-10-16
84) </pre>
85)     <p>To verify the signature of the package you downloaded, you will need
86)     to download the ".asc" file as well. Assuming you downloaded the
87)     package and its signature to your Desktop, run:</p>
Matt Pagan

Matt Pagan authored 11 years ago

88)     <pre>"C:\Program Files\Gnu\GnuPg\gpg.exe" --verify C:\Users\Alice\Desktop\tor-browser-2.3.25-13_en-US.exe.asc C:\Users\Alice\Desktop\tor-browser-2.3.25-13_en-US.exe</pre>
Roger Dingledine the verifying signatures pa...

Roger Dingledine authored 13 years ago

89)     <p>The output should say "Good signature": </p>
90)     <pre>
91)     gpg: Signature made Wed 31 Aug 2011 06:37:01 PM EDT using RSA key ID 63FEE659
92)     gpg: Good signature from "Erinn Clark &lt;erinn@torproject.org&gt;"
93)     gpg:                 aka "Erinn Clark &lt;erinn@debian.org&gt;"
94)     gpg:                 aka "Erinn Clark &lt;erinn@double-helix.org&gt;"
95)     gpg: WARNING: This key is not certified with a trusted signature!
96)     gpg:          There is no indication that the signature belongs to the owner.
97)     Primary key fingerprint: 8738 A680 B84B 3031 A630  F2DB 416F 0610 63FE E659
98)     </pre>
99)     <p>
100)     Notice that there is a warning because you haven't assigned a trust
101)     index to this person. This means that GnuPG verified that the key made
102)     that signature, but it's up to you to decide if that key really belongs
103)     to the developer. The best method is to meet the developer in person and
104)     exchange key fingerprints.
105)     </p>
ilv Combined osx and linux inst...

ilv authored 9 years ago

106)     <h3>Mac OS X and Linux</h3>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 14 years ago

107)     <hr>
Roger Dingledine clear trailing whitespaces;...

Roger Dingledine authored 13 years ago

108) 
Roger Dingledine the verifying signatures pa...

Roger Dingledine authored 13 years ago

109)     <p>You need to have GnuPG installed before you can verify
ilv Combined osx and linux inst...

ilv authored 9 years ago

110)     signatures. If you are using Mac OS X, you can install it from <a
111)     href="http://www.gpgtools.org/">http://www.gpgtools.org/</a>. If you
112)     are using Linux, then it's probably you already have GnuPG in your
113)     system, as most Linux distributions come with it preinstalled.
Roger Dingledine the verifying signatures pa...

Roger Dingledine authored 13 years ago

114)     </p>
Roger Dingledine clear trailing whitespaces;...

Roger Dingledine authored 13 years ago

115) 
ilv Combined osx and linux inst...

ilv authored 9 years ago

116)     <p>The next step is to use GnuPG to import the key that signed
Matt Pagan Replaced "the Tor Browser B...

Matt Pagan authored 9 years ago

117)     your package. Erinn Clark signs the Tor Browsers. Import her
ilv Combined osx and linux inst...

ilv authored 9 years ago

118)     key (0x416F061063FEE659) by starting the terminal (under "Applications"
119)     in Mac OS X) and typing:</p>
Roger Dingledine clear trailing whitespaces;...

Roger Dingledine authored 13 years ago

120) 
Moritz Bartl switching to longer key ids

Moritz Bartl authored 11 years ago

121)     <pre>gpg --keyserver x-hkp://pool.sks-keyservers.net --recv-keys 0x416F061063FEE659</pre>
Roger Dingledine clear trailing whitespaces;...

Roger Dingledine authored 13 years ago

122) 
Roger Dingledine the verifying signatures pa...

Roger Dingledine authored 13 years ago

123)     <p>After importing the key, you can verify that the fingerprint
124)     is correct:</p>
125) 
Moritz Bartl switching to longer key ids

Moritz Bartl authored 11 years ago

126)     <pre>gpg --fingerprint 0x416F061063FEE659</pre>
Roger Dingledine clear trailing whitespaces;...

Roger Dingledine authored 13 years ago

127) 
Roger Dingledine the verifying signatures pa...

Roger Dingledine authored 13 years ago

128)     <p>You should see:</p>
129)     <pre>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 14 years ago

130)     pub   2048R/63FEE659 2003-10-16
131)           Key fingerprint = 8738 A680 B84B 3031 A630  F2DB 416F 0610 63FE E659
132)     uid                  Erinn Clark &lt;erinn@torproject.org&gt;
133)     uid                  Erinn Clark &lt;erinn@debian.org&gt;
134)     uid                  Erinn Clark &lt;erinn@double-helix.org&gt;
135)     sub   2048R/EB399FD7 2003-10-16
136)     </pre>
Roger Dingledine clear trailing whitespaces;...

Roger Dingledine authored 13 years ago

137) 
Roger Dingledine the verifying signatures pa...

Roger Dingledine authored 13 years ago

138)     <p>To verify the signature of the package you downloaded, you will need
139)     to download the ".asc" file as well. Assuming you downloaded the
ilv Combined osx and linux inst...

ilv authored 9 years ago

140)     package and its signature to your Desktop, run (where <version> stands
141)     for the version of Tor Browser you downloaded):</p>
Roger Dingledine clear trailing whitespaces;...

Roger Dingledine authored 13 years ago

142) 
ilv Combined osx and linux inst...

ilv authored 9 years ago

143)     <strong>For Mac OS X users</strong>:
144)     <pre>gpg --verify ~/Desktop/TorBrowser-<version>-osx32_en-US.dmg{.asc*,}</pre>
145)     
146)     <strong>For Linux users</strong> (change 32 by 64 if you have the 64-bit package):
147)     <pre>gpg --verify ~/Desktop/tor-browser-linux32-<version>_en-US.tar.xz{.asc*,}</pre>
Roger Dingledine clear trailing whitespaces;...

Roger Dingledine authored 13 years ago

148) 
Roger Dingledine the verifying signatures pa...

Roger Dingledine authored 13 years ago

149)     <p>The output should say "Good signature": </p>
Roger Dingledine clear trailing whitespaces;...

Roger Dingledine authored 13 years ago

150) 
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 14 years ago

151)     <pre>
Roger Dingledine the verifying signatures pa...

Roger Dingledine authored 13 years ago

152)     gpg: Signature made Wed 31 Aug 2011 06:37:01 PM EDT using RSA key ID 63FEE659
153)     gpg: Good signature from "Erinn Clark &lt;erinn@torproject.org&gt;"
154)     gpg:                 aka "Erinn Clark &lt;erinn@debian.org&gt;"
155)     gpg:                 aka "Erinn Clark &lt;erinn@double-helix.org&gt;"
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 14 years ago

156)     gpg: WARNING: This key is not certified with a trusted signature!
157)     gpg:          There is no indication that the signature belongs to the owner.
Roger Dingledine the verifying signatures pa...

Roger Dingledine authored 13 years ago

158)     Primary key fingerprint: 8738 A680 B84B 3031 A630  F2DB 416F 0610 63FE E659
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 14 years ago

159)     </pre>
Roger Dingledine clear trailing whitespaces;...

Roger Dingledine authored 13 years ago

160) 
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 14 years ago

161)     <p>
162)     Notice that there is a warning because you haven't assigned a trust
163)     index to this person. This means that GnuPG verified that the key made
164)     that signature, but it's up to you to decide if that key really belongs
165)     to the developer. The best method is to meet the developer in person and
166)     exchange key fingerprints.
167)     </p>
ilv Combined osx and linux inst...

ilv authored 9 years ago

168)     
169)     <p>
170)     If you're a Linux user and you're using the <b>Debian</b> Tor (not Tor
171)     Browser) packages, you should read the instructions on <a
172)     href="<page docs/debian>#packages">importing these keys to apt</a>.
173)     If you're using the <b>RPMs</b> (for Tor, not Tor Browser), you can
174)     manually verify the signatures on the RPM packages by
175)     <pre>rpm -K filename.rpm</pre>
176)     </p>
Roger Dingledine explain that linux users ar...

Roger Dingledine authored 13 years ago

177) 
178)     <p>See <a
179)     href="http://www.gnupg.org/documentation/">http://www.gnupg.org/documentation/</a>
ilv Added missing hr and s/GPG/...

ilv authored 9 years ago

180)     to learn more about GnuPG.</p>
181) 
182)     <hr>
Roger Dingledine the verifying signatures pa...

Roger Dingledine authored 13 years ago

183) 
Matt Pagan Moved verification instruct...

Matt Pagan authored 10 years ago

184)     <a id="BuildVerification"></a>
185)     <h3><a class="anchor" href="#BuildVerification">
186)     Verifying sha256sums (advanced)</a></h3>
187)     <hr>
Georg Koppen Bug 14304: Document strippi...

Georg Koppen authored 9 years ago

188)     <p>Build reproducibility is a <a
189)        href="https://blog.torproject.org/blog/deterministic-builds-part-one-cyberwar-and-global-compromise">security
Sebastian Hahn Remove some whitespace at eol

Sebastian Hahn authored 9 years ago

190)        property</a> of Tor Browser 3.0 and later. Anyone can build
191)        Tor Browser on their own machine and produce a binary that is
192)        bit-for-bit identical to the binary we offer on the download page.
193)        Fortunately, it is not necessary for everyone to build the Tor Browser
194)        locally to get this security. Verifying and comparing the signed list
195)        of <a href="https://en.wikipedia.org/wiki/Cryptographic_hash">hashes</a>
196)        will confirm that multiple people have built Tor Browsers
Matt Pagan Moved verification instruct...

Matt Pagan authored 10 years ago

197)        identical to the download.</p>
198) 
199)       <p>The steps below walk through this process:</p>
200) 
201)     <ul>
202)       <li>Download the Tor Browser package, the sha256sums.txt file, and the
Georg Koppen Bug 14304: Document strippi...

Georg Koppen authored 9 years ago

203)       sha256sums signature files. They can all be found in the same directory
Andrew Lewman there is no page macro for...

Andrew Lewman authored 10 years ago

204)       under <a href="https://www.torproject.org/dist/torbrowser/">
Georg Koppen Bug 14304: Document strippi...

Georg Koppen authored 9 years ago

205)       https://www.torproject.org/dist/torbrowser/</a>, for example in '3.6.1'
Andrew Lewman there is no page macro for...

Andrew Lewman authored 10 years ago

206)       for TBB 3.6.1.</li>
Georg Koppen Bug 14304: Document strippi...

Georg Koppen authored 9 years ago

207)       <li>Retrieve the signers' GPG keys. This can be done from the command
208)       line by entering something like
Matt Pagan Moved verification instruct...

Matt Pagan authored 10 years ago

209)       <pre>gpg --keyserver keys.mozilla.org --recv-keys 0x29846B3C683686CC</pre>
Georg Koppen Bug 14304: Document strippi...

Georg Koppen authored 9 years ago

210)       (This will bring you developer Mike Perry's public key. Other
Matt Pagan Moved verification instruct...

Matt Pagan authored 10 years ago

211)       developers' key IDs can be found on
Georg Koppen Bug 14304: Document strippi...

Georg Koppen authored 9 years ago

212)       <a href="<page docs/signing-keys>">this
Matt Pagan Moved verification instruct...

Matt Pagan authored 10 years ago

213)       page</a>.)</li>
214)       <li>Verify the sha256sums.txt file by executing this command:
215)       <pre>gpg --verify &lt;NAME OF THE SIGNATURE FILE&gt;.asc sha256sums.txt</pre></li>
Georg Koppen Bug 14304: Document strippi...

Georg Koppen authored 9 years ago

216)       <li>You should see a message like "Good signature from &lt;DEVELOPER
Matt Pagan Moved verification instruct...

Matt Pagan authored 10 years ago

217)       NAME&gt;". If you don't, there is a problem. Try these steps again.</li>
Georg Koppen Bug 14304: Document strippi...

Georg Koppen authored 9 years ago

218)       <li>Now you can take the sha256sum of the Tor Browser package. On
Matt Pagan Moved verification instruct...

Matt Pagan authored 10 years ago

219)       Windows you can use the <a href="http://md5deep.sourceforge.net/">
220)       hashdeep utility</a> and run
221)       <pre>C:\location\where\you\saved\hashdeep -c sha256sum &lt;TOR BROWSER FILE NAME&gt;.exe</pre>
Sebastian Hahn Fix osx gpg instructions (#...

Sebastian Hahn authored 9 years ago

222)       On Mac or Linux you can run <pre>sha256sum &lt;TOR BROWSER FILE NAME&gt;.dmg</pre> or <pre>sha256sum &lt;TOR BROWSER FILE NAME&gt;.tar.gz</pre> without having to download a utility.</li>
Matt Pagan Moved verification instruct...

Matt Pagan authored 10 years ago

223)       <li>You will see a string of letters and numbers.</li>
224)       <li>Open sha256sums.txt in a text editor.</li>
225)       <li>Locate the name of the Tor Browser file you downloaded.</li>
226)       <li>Compare the string of letters and numbers to the left of your
Georg Koppen Bug 14304: Document strippi...

Georg Koppen authored 9 years ago

227)       filename with the string of letters and numbers that appeared
228)       on your command line. If they match, you've successfully verified the
229)       build.</li>
Matt Pagan Moved verification instruct...

Matt Pagan authored 10 years ago

230)     </ul>
Georg Koppen Bug 14304: Document strippi...

Georg Koppen authored 9 years ago

231) 
232)     <p><a href="https://github.com/isislovecruft/scripts/blob/master/verify-gitian-builder-signatures">Scripts</a>
233)     to <a href="http://tor.stackexchange.com/questions/648/how-to-verify-tor-browser-bundle-tbb-3-x">automate</a>
234)     these steps have been written, but to use them you will need to modify
Matt Pagan Replaced "the Tor Browser B...

Matt Pagan authored 9 years ago

235)     them yourself with the latest Tor Browser filename.</p>
Georg Koppen Bug 14304: Document strippi...

Georg Koppen authored 9 years ago

236) 
237)     <hr>
238) 
239)     <a id="MARVerification"></a>
240)     <h3><a class="anchor" href="#MARVerification">
241)     Verifying MAR files we ship (advanced)</a></h3>
Matt Pagan Moved verification instruct...

Matt Pagan authored 10 years ago

242)     <hr>
Georg Koppen Bug 14304: Document strippi...

Georg Koppen authored 9 years ago

243)     <p>Starting with Tor Browser 4.5a4 we sign our MAR files which helps
244)     securing our update process. The downside of this is the need for additional
245)     instructions to verify that the MAR files we ship are indeed the ones we
246)     produced with our Gitian setup.</p>
247) 
248)     <p>Assuming the verification happens on a Linux computer one first needs the
249)     <tt>mar-tools-linux*.zip</tt> out of the <tt>gitian-builder/inputs</tt>
250)     directory to remove the embedded signature(s). The steps to get the unsigned
251)     MAR file on a 64 bit Linux are</p>
252)     <pre>
253)     cd /path/to/MAR/file
254)     unzip /path/to/gitian-builder/inputs/mar-tools-linux64.zip
255)     mar-tools/signmar -r your-signed-mar-file.mar your-unsigned-mar-file.mar</pre>
256)     <p>Now you can compare the SHA256 sum of <tt>your-unsigned-mar-file.mar</tt>
257)     with the one provided in the <tt>sha265sums.txt</tt> or
258)     <tt>sha256sums.incremental.txt</tt> as outlined in <a href="#BuildVerification">Verifying
259)     sha256sums (advancded)</a> above.</p>
Matt Pagan Moved verification instruct...

Matt Pagan authored 10 years ago

260) 
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 14 years ago

261)   </div>
262)   <!-- END MAINCOL -->
263)   <div id = "sidecol">
264) #include "side.wmi"
265) #include "info.wmi"
266)   </div>
267)   <!-- END SIDECOL -->
268) </div>
269) <!-- END CONTENT -->