how to verify signatures in windows and os x as well
Runa A. Sandvik

Runa A. Sandvik commited on 2010-04-25 18:43:01
Zeige 1 geänderte Dateien mit 87 Einfügungen und 46 Löschungen.

... ...
@@ -11,41 +11,77 @@
11 11
 
12 12
 <p>Each file on <a href="<page download>">our download page</a> is accompanied
13 13
 by a file with the same name as the package and the extension
14
-".asc".  For example, the current Installation Bundle for Windows:
15
-<package-win32-bundle-stable-sig>.</p>
14
+".asc". These .asc files are GPG signatures. They allow you to verify
15
+the file you've downloaded is exactly the one that we intended you to
16
+get. For example, vidalia-bundle-0.2.1.25-0.2.7.exe is accompanied by
17
+vidalia-bundle-0.2.1.25-0.2.7.exe.asc.</p>
16 18
 
17
-<p>These .asc files are PGP signatures. They allow you to verify the file you've downloaded
18
-is exactly the one that we intended you to get.</p>
19
-
20
-<p>Of course, you'll need to have our pgp keys in your keyring: if you don't
21
-know the pgp key, you can't be sure that it was really us who signed it. The
19
+<p>Of course, you'll need to have our GPG keys in your keyring: if you don't
20
+know the GPG key, you can't be sure that it was really us who signed it. The
22 21
 signing keys we use are:</p>
23 22
 <ul>
24 23
 <li>Roger's (0x28988BF5) typically signs the source code file.</li>
25
-<li>Nick's (0x165733EA, or its subkey 0x8D29319A)</li>
26
-<li>Andrew's (0x31B0974B)</li>
27
-<li>Peter's (0x94C09C7F, or its subkey 0xAFA44BDD)</li>
28
-<li>Matt's (0x5FA14861)</li>
29
-<li>Jacob's (0x9D0FACE4)</li>
30
-<li>Erinn's (0x63FEE659) and (0xF1F5C9B5)</li>
24
+<li>Nick's (0x165733EA, or its subkey 0x8D29319A).</li>
25
+<li>Andrew's (0x31B0974B) typically signs the windows packages.</li>
26
+<li>Peter's (0x94C09C7F, or its subkey 0xAFA44BDD).</li>
27
+<li>Matt's (0x5FA14861).</li>
28
+<li>Jacob's (0x9D0FACE4).</li>
29
+<li>Erinn's (0x63FEE659) and (0xF1F5C9B5) typically signs the linux packages.</li>
30
+</ul>
31
+
32
+<h3>Step Zero: Install GnuPG</h3>
33
+<hr />
34
+<p>You need to have GnuPG installed before you can verify
35
+signatures.</p>
36
+
37
+<ul>
38
+<li>Linux: see <a
39
+href="http://www.gnupg.org/download/">http://www.gnupg.org/download/</a>
40
+or install <i>gnupg</i> from the package management system.</li>
41
+<li>Windows: see <a
42
+href="http://www.gnupg.org/download/">http://www.gnupg.org/download/</a>. Look
43
+for the "version compiled for MS-Windows" under "Binaries".</li>
44
+<li>Mac: see <a
45
+href="http://macgpg.sourceforge.net/">http://macgpg.sourceforge.net/</a>.</li>
31 46
 </ul>
32 47
 
33 48
 <h3>Step One:  Import the keys</h3>
34 49
 <hr />
35
-<p>You can import keys directly from GnuPG as well:</p>
50
+<p>The next step is to import the key. This can be done directly from
51
+GnuPG. Make sure you import the correct key. For example, if you
52
+downloaded a Windows package, you will need to import Andrew's key.</p>
53
+
54
+<p><b>Windows:</b></p>
55
+<p>GnuPG for Windows is a command line tool, and you will need to use
56
+<i>cmd.exe</i>. Unless you edit your PATH environment variable, you will
57
+need to tell Windows the full path to the GnuPG program. If you installed GnuPG
58
+with the default values, the path should be something like this: <i>C:\Program
59
+Files\Gnu\GnuPg\gpg.exe</i>.</p>
60
+
61
+<p>To import the key 0x28988BF5, start <i>cmd.exe</i> and type:</p>
36 62
 
37
-<pre>gpg --keyserver subkeys.pgp.net --recv-keys 0x28988BF5</pre>
63
+<pre>C:\Program Files\Gnu\GnuPg\gpg.exe --recv-keys 0x28988BF5</pre>
38 64
 
39
-<p>or search for keys with</p>
65
+<p><b>Mac and Linux</b></p>
66
+<p>Whether you have a Mac or you run Linux, you will need to use the terminal
67
+to run GnuPG. Mac users can find the terminal under "Applications". If you run
68
+Linux and use Gnome, the terminal should be under "Applications menu" and
69
+"Accessories". KDE users can find the terminal under "Menu" and "System".</p>
40 70
 
41
-<pre>gpg --keyserver subkeys.pgp.net --search-keys 0x28988BF5</pre>
71
+<p>To import the key 0x28988BF5, start the terminal and type:</p>
42 72
 
43
-<p>and when you select one, it will be added to your keyring.</p>
73
+<pre>gpg --recv-keys 0x28988BF5</pre>
44 74
 
45 75
 <h3>Step Two:  Verify the fingerprints</h3>
46 76
 <hr />
47
-<p>Verify the pgp fingerprints using:</p>
77
+<p>After importing the key, you will want to verify that the fingerprint is correct.</p>
78
+
79
+<p><b>Windows:</b></p>
80
+<pre>C:\Program Files\Gnu\GnuPg\gpg.exe --fingerprint (insert keyid here)</pre>
81
+
82
+<p><b>Mac and Linux</b></p>
48 83
 <pre>gpg --fingerprint (insert keyid here)</pre>
84
+
49 85
 The fingerprints for the keys should be:
50 86
 
51 87
 <pre>
... ...
@@ -98,53 +134,58 @@ sub   1024g/7828F26A 2010-02-03
98 134
 
99 135
 </pre>
100 136
 
101
-<p>(Of course if you want to be really certain that those are the real ones
102
-then you should check this from more places or even better get into key signing
103
-and build a trust path to those keys.)</p>
104
-
105 137
 <h3>Step Three:  Verify the downloaded package</h3>
106 138
 <hr />
107
-<p>If you're using GnuPG, then put the .asc and the download in the same
108
-directory and type "gpg --verify (whatever).asc (whatever)". It will say
109
-something like "Good signature" or "BAD signature" using the following type of
110
-command:</p>
139
+<p> To verify the signature of the package you downloaded, you will need
140
+to download the ".asc" file as well.</p>
141
+
142
+<p>In the following examples, the user Alice downloads packages for
143
+Windows, Mac OS X and Linux and also verifies the signature of each
144
+package. All files are saved on the desktop.</p>
145
+
146
+<p><b>Windows:</b></p>
147
+<pre>C:\Program Files\Gnu\GnuPg\gpg.exe --verify C:\Users\Alice\Desktop\vidalia-bundle-0.2.1.25-0.2.7.exe.asc C:\Users\Alice\Desktop\vidalia-bundle-0.2.1.25-0.2.7.exe</pre>
148
+
149
+<p><b>Mac:</b></p>
150
+<pre>gpg --verify /Users/Alice/vidalia-bundle-0.2.1.25-0.2.7-i386.dmg.asc /Users/Alice/vidalia-bundle-0.2.1.25-0.2.7-i386.dmg</pre>
151
+
152
+<p><b>Linux</b></p>
153
+<pre>gpg --verify /home/Alice/Desktop/tor-0.2.1.25.tar.gz.asc /home/Alice/Desktop/tor-0.2.1.25.tar.gz</pre>
154
+
155
+<p>After verifying, GnuPG will come back saying something like "Good
156
+signature" or "BAD signature". The output should look something like
157
+this:</p>
111 158
 
112 159
 <pre>
113
-gpg --verify tor-0.1.0.17.tar.gz.asc tor-0.1.0.17.tar.gz
114
-gpg: Signature made Wed Feb 23 01:33:29 2005 EST using DSA key ID 28988BF5
160
+gpg: Signature made Tue 16 Mar 2010 05:55:17 AM CET using DSA key ID 28988BF5
115 161
 gpg: Good signature from "Roger Dingledine &lt;arma@mit.edu&gt;"
116
-gpg:                 aka "Roger Dingledine &lt;arma@mit.edu&gt;"
117 162
 gpg: WARNING: This key is not certified with a trusted signature!
118 163
 gpg:          There is no indication that the signature belongs to the owner.
119 164
 Primary key fingerprint: B117 2656 DFF9 83C3 042B  C699 EB5A 896A 2898 8BF5
120 165
 </pre>
121 166
 
122 167
 <p>
123
-Notice that there is a warning because you haven't assigned a trust index to
124
-this user. This means that your program verified the key made that signature.
125
-It's up to the user to decide if that key really belongs to the developers. The
126
-best method is to meet them in person and exchange gpg fingerprints. Keys can
127
-also be signed. If you look up Roger or Nick's keys, other people have
128
-essentially said "we have verified this is Roger/Nick". So if you trust that
129
-third party, then you have a level of trust for that arma/nick.
168
+Notice that there is a warning because you haven't assigned a trust
169
+index to this person. This means that GnuPG verified that the key made
170
+that signature, but it's up to you to decide if that key really belongs
171
+to the developer. The best method is to meet the developer in person and
172
+exchange key fingerprints.
130 173
 </p>
131 174
 
132
-<p>All this means is you can ignore the message or assign a trust level.</p>
133
-
134 175
 <p>For your reference, this is an example of a <em>BAD</em> verification. It
135
-means that the signature and file contents do not match:</p>
176
+means that the signature and file contents do not match. In this case,
177
+you should not trust the file contents:</p>
136 178
 
137 179
 <pre>
138
-gpg --verify tor-0.1.0.17.tar.gz.asc
139
-gpg: Signature made Wed Feb 23 01:33:29 2005 EST using DSA key ID 28988BF5
180
+gpg: Signature made Tue 20 Apr 2010 12:22:32 PM CEST using DSA key ID 28988BF5
140 181
 gpg: BAD signature from "Roger Dingledine &lt;arma@mit.edu&gt;"
141 182
 </pre>
142 183
 
143
-<p>If you see a message like the above one, then you should not trust the file contents.</p>
144
-
145 184
 <p>If you are running Tor on Debian you should read the instructions on
146
-<a
147
-href="<page docs/debian>#packages">importing these keys to apt</a>.</p>
185
+<a href="<page docs/debian>#packages">importing these keys to apt</a>.</p>
186
+
187
+<p>If you wish to learn more about GPG, see <a
188
+href="http://www.gnupg.org/documentation/">http://www.gnupg.org/documentation/</a>.</p>
148 189
 
149 190
 </div><!-- #main -->
150 191
 
151 192