Runa A. Sandvik commited on 2010-04-25 18:43:01
Zeige 1 geänderte Dateien mit 87 Einfügungen und 46 Löschungen.
| ... | ... |
@@ -11,41 +11,77 @@ |
| 11 | 11 |
|
| 12 | 12 |
<p>Each file on <a href="<page download>">our download page</a> is accompanied |
| 13 | 13 |
by a file with the same name as the package and the extension |
| 14 |
-".asc". For example, the current Installation Bundle for Windows: |
|
| 15 |
-<package-win32-bundle-stable-sig>.</p> |
|
| 14 |
+".asc". These .asc files are GPG signatures. They allow you to verify |
|
| 15 |
+the file you've downloaded is exactly the one that we intended you to |
|
| 16 |
+get. For example, vidalia-bundle-0.2.1.25-0.2.7.exe is accompanied by |
|
| 17 |
+vidalia-bundle-0.2.1.25-0.2.7.exe.asc.</p> |
|
| 16 | 18 |
|
| 17 |
-<p>These .asc files are PGP signatures. They allow you to verify the file you've downloaded |
|
| 18 |
-is exactly the one that we intended you to get.</p> |
|
| 19 |
- |
|
| 20 |
-<p>Of course, you'll need to have our pgp keys in your keyring: if you don't |
|
| 21 |
-know the pgp key, you can't be sure that it was really us who signed it. The |
|
| 19 |
+<p>Of course, you'll need to have our GPG keys in your keyring: if you don't |
|
| 20 |
+know the GPG key, you can't be sure that it was really us who signed it. The |
|
| 22 | 21 |
signing keys we use are:</p> |
| 23 | 22 |
<ul> |
| 24 | 23 |
<li>Roger's (0x28988BF5) typically signs the source code file.</li> |
| 25 |
-<li>Nick's (0x165733EA, or its subkey 0x8D29319A)</li> |
|
| 26 |
-<li>Andrew's (0x31B0974B)</li> |
|
| 27 |
-<li>Peter's (0x94C09C7F, or its subkey 0xAFA44BDD)</li> |
|
| 28 |
-<li>Matt's (0x5FA14861)</li> |
|
| 29 |
-<li>Jacob's (0x9D0FACE4)</li> |
|
| 30 |
-<li>Erinn's (0x63FEE659) and (0xF1F5C9B5)</li> |
|
| 24 |
+<li>Nick's (0x165733EA, or its subkey 0x8D29319A).</li> |
|
| 25 |
+<li>Andrew's (0x31B0974B) typically signs the windows packages.</li> |
|
| 26 |
+<li>Peter's (0x94C09C7F, or its subkey 0xAFA44BDD).</li> |
|
| 27 |
+<li>Matt's (0x5FA14861).</li> |
|
| 28 |
+<li>Jacob's (0x9D0FACE4).</li> |
|
| 29 |
+<li>Erinn's (0x63FEE659) and (0xF1F5C9B5) typically signs the linux packages.</li> |
|
| 30 |
+</ul> |
|
| 31 |
+ |
|
| 32 |
+<h3>Step Zero: Install GnuPG</h3> |
|
| 33 |
+<hr /> |
|
| 34 |
+<p>You need to have GnuPG installed before you can verify |
|
| 35 |
+signatures.</p> |
|
| 36 |
+ |
|
| 37 |
+<ul> |
|
| 38 |
+<li>Linux: see <a |
|
| 39 |
+href="http://www.gnupg.org/download/">http://www.gnupg.org/download/</a> |
|
| 40 |
+or install <i>gnupg</i> from the package management system.</li> |
|
| 41 |
+<li>Windows: see <a |
|
| 42 |
+href="http://www.gnupg.org/download/">http://www.gnupg.org/download/</a>. Look |
|
| 43 |
+for the "version compiled for MS-Windows" under "Binaries".</li> |
|
| 44 |
+<li>Mac: see <a |
|
| 45 |
+href="http://macgpg.sourceforge.net/">http://macgpg.sourceforge.net/</a>.</li> |
|
| 31 | 46 |
</ul> |
| 32 | 47 |
|
| 33 | 48 |
<h3>Step One: Import the keys</h3> |
| 34 | 49 |
<hr /> |
| 35 |
-<p>You can import keys directly from GnuPG as well:</p> |
|
| 50 |
+<p>The next step is to import the key. This can be done directly from |
|
| 51 |
+GnuPG. Make sure you import the correct key. For example, if you |
|
| 52 |
+downloaded a Windows package, you will need to import Andrew's key.</p> |
|
| 53 |
+ |
|
| 54 |
+<p><b>Windows:</b></p> |
|
| 55 |
+<p>GnuPG for Windows is a command line tool, and you will need to use |
|
| 56 |
+<i>cmd.exe</i>. Unless you edit your PATH environment variable, you will |
|
| 57 |
+need to tell Windows the full path to the GnuPG program. If you installed GnuPG |
|
| 58 |
+with the default values, the path should be something like this: <i>C:\Program |
|
| 59 |
+Files\Gnu\GnuPg\gpg.exe</i>.</p> |
|
| 60 |
+ |
|
| 61 |
+<p>To import the key 0x28988BF5, start <i>cmd.exe</i> and type:</p> |
|
| 36 | 62 |
|
| 37 |
-<pre>gpg --keyserver subkeys.pgp.net --recv-keys 0x28988BF5</pre> |
|
| 63 |
+<pre>C:\Program Files\Gnu\GnuPg\gpg.exe --recv-keys 0x28988BF5</pre> |
|
| 38 | 64 |
|
| 39 |
-<p>or search for keys with</p> |
|
| 65 |
+<p><b>Mac and Linux</b></p> |
|
| 66 |
+<p>Whether you have a Mac or you run Linux, you will need to use the terminal |
|
| 67 |
+to run GnuPG. Mac users can find the terminal under "Applications". If you run |
|
| 68 |
+Linux and use Gnome, the terminal should be under "Applications menu" and |
|
| 69 |
+"Accessories". KDE users can find the terminal under "Menu" and "System".</p> |
|
| 40 | 70 |
|
| 41 |
-<pre>gpg --keyserver subkeys.pgp.net --search-keys 0x28988BF5</pre> |
|
| 71 |
+<p>To import the key 0x28988BF5, start the terminal and type:</p> |
|
| 42 | 72 |
|
| 43 |
-<p>and when you select one, it will be added to your keyring.</p> |
|
| 73 |
+<pre>gpg --recv-keys 0x28988BF5</pre> |
|
| 44 | 74 |
|
| 45 | 75 |
<h3>Step Two: Verify the fingerprints</h3> |
| 46 | 76 |
<hr /> |
| 47 |
-<p>Verify the pgp fingerprints using:</p> |
|
| 77 |
+<p>After importing the key, you will want to verify that the fingerprint is correct.</p> |
|
| 78 |
+ |
|
| 79 |
+<p><b>Windows:</b></p> |
|
| 80 |
+<pre>C:\Program Files\Gnu\GnuPg\gpg.exe --fingerprint (insert keyid here)</pre> |
|
| 81 |
+ |
|
| 82 |
+<p><b>Mac and Linux</b></p> |
|
| 48 | 83 |
<pre>gpg --fingerprint (insert keyid here)</pre> |
| 84 |
+ |
|
| 49 | 85 |
The fingerprints for the keys should be: |
| 50 | 86 |
|
| 51 | 87 |
<pre> |
| ... | ... |
@@ -98,53 +134,58 @@ sub 1024g/7828F26A 2010-02-03 |
| 98 | 134 |
|
| 99 | 135 |
</pre> |
| 100 | 136 |
|
| 101 |
-<p>(Of course if you want to be really certain that those are the real ones |
|
| 102 |
-then you should check this from more places or even better get into key signing |
|
| 103 |
-and build a trust path to those keys.)</p> |
|
| 104 |
- |
|
| 105 | 137 |
<h3>Step Three: Verify the downloaded package</h3> |
| 106 | 138 |
<hr /> |
| 107 |
-<p>If you're using GnuPG, then put the .asc and the download in the same |
|
| 108 |
-directory and type "gpg --verify (whatever).asc (whatever)". It will say |
|
| 109 |
-something like "Good signature" or "BAD signature" using the following type of |
|
| 110 |
-command:</p> |
|
| 139 |
+<p> To verify the signature of the package you downloaded, you will need |
|
| 140 |
+to download the ".asc" file as well.</p> |
|
| 141 |
+ |
|
| 142 |
+<p>In the following examples, the user Alice downloads packages for |
|
| 143 |
+Windows, Mac OS X and Linux and also verifies the signature of each |
|
| 144 |
+package. All files are saved on the desktop.</p> |
|
| 145 |
+ |
|
| 146 |
+<p><b>Windows:</b></p> |
|
| 147 |
+<pre>C:\Program Files\Gnu\GnuPg\gpg.exe --verify C:\Users\Alice\Desktop\vidalia-bundle-0.2.1.25-0.2.7.exe.asc C:\Users\Alice\Desktop\vidalia-bundle-0.2.1.25-0.2.7.exe</pre> |
|
| 148 |
+ |
|
| 149 |
+<p><b>Mac:</b></p> |
|
| 150 |
+<pre>gpg --verify /Users/Alice/vidalia-bundle-0.2.1.25-0.2.7-i386.dmg.asc /Users/Alice/vidalia-bundle-0.2.1.25-0.2.7-i386.dmg</pre> |
|
| 151 |
+ |
|
| 152 |
+<p><b>Linux</b></p> |
|
| 153 |
+<pre>gpg --verify /home/Alice/Desktop/tor-0.2.1.25.tar.gz.asc /home/Alice/Desktop/tor-0.2.1.25.tar.gz</pre> |
|
| 154 |
+ |
|
| 155 |
+<p>After verifying, GnuPG will come back saying something like "Good |
|
| 156 |
+signature" or "BAD signature". The output should look something like |
|
| 157 |
+this:</p> |
|
| 111 | 158 |
|
| 112 | 159 |
<pre> |
| 113 |
-gpg --verify tor-0.1.0.17.tar.gz.asc tor-0.1.0.17.tar.gz |
|
| 114 |
-gpg: Signature made Wed Feb 23 01:33:29 2005 EST using DSA key ID 28988BF5 |
|
| 160 |
+gpg: Signature made Tue 16 Mar 2010 05:55:17 AM CET using DSA key ID 28988BF5 |
|
| 115 | 161 |
gpg: Good signature from "Roger Dingledine <arma@mit.edu>" |
| 116 |
-gpg: aka "Roger Dingledine <arma@mit.edu>" |
|
| 117 | 162 |
gpg: WARNING: This key is not certified with a trusted signature! |
| 118 | 163 |
gpg: There is no indication that the signature belongs to the owner. |
| 119 | 164 |
Primary key fingerprint: B117 2656 DFF9 83C3 042B C699 EB5A 896A 2898 8BF5 |
| 120 | 165 |
</pre> |
| 121 | 166 |
|
| 122 | 167 |
<p> |
| 123 |
-Notice that there is a warning because you haven't assigned a trust index to |
|
| 124 |
-this user. This means that your program verified the key made that signature. |
|
| 125 |
-It's up to the user to decide if that key really belongs to the developers. The |
|
| 126 |
-best method is to meet them in person and exchange gpg fingerprints. Keys can |
|
| 127 |
-also be signed. If you look up Roger or Nick's keys, other people have |
|
| 128 |
-essentially said "we have verified this is Roger/Nick". So if you trust that |
|
| 129 |
-third party, then you have a level of trust for that arma/nick. |
|
| 168 |
+Notice that there is a warning because you haven't assigned a trust |
|
| 169 |
+index to this person. This means that GnuPG verified that the key made |
|
| 170 |
+that signature, but it's up to you to decide if that key really belongs |
|
| 171 |
+to the developer. The best method is to meet the developer in person and |
|
| 172 |
+exchange key fingerprints. |
|
| 130 | 173 |
</p> |
| 131 | 174 |
|
| 132 |
-<p>All this means is you can ignore the message or assign a trust level.</p> |
|
| 133 |
- |
|
| 134 | 175 |
<p>For your reference, this is an example of a <em>BAD</em> verification. It |
| 135 |
-means that the signature and file contents do not match:</p> |
|
| 176 |
+means that the signature and file contents do not match. In this case, |
|
| 177 |
+you should not trust the file contents:</p> |
|
| 136 | 178 |
|
| 137 | 179 |
<pre> |
| 138 |
-gpg --verify tor-0.1.0.17.tar.gz.asc |
|
| 139 |
-gpg: Signature made Wed Feb 23 01:33:29 2005 EST using DSA key ID 28988BF5 |
|
| 180 |
+gpg: Signature made Tue 20 Apr 2010 12:22:32 PM CEST using DSA key ID 28988BF5 |
|
| 140 | 181 |
gpg: BAD signature from "Roger Dingledine <arma@mit.edu>" |
| 141 | 182 |
</pre> |
| 142 | 183 |
|
| 143 |
-<p>If you see a message like the above one, then you should not trust the file contents.</p> |
|
| 144 |
- |
|
| 145 | 184 |
<p>If you are running Tor on Debian you should read the instructions on |
| 146 |
-<a |
|
| 147 |
-href="<page docs/debian>#packages">importing these keys to apt</a>.</p> |
|
| 185 |
+<a href="<page docs/debian>#packages">importing these keys to apt</a>.</p> |
|
| 186 |
+ |
|
| 187 |
+<p>If you wish to learn more about GPG, see <a |
|
| 188 |
+href="http://www.gnupg.org/documentation/">http://www.gnupg.org/documentation/</a>.</p> |
|
| 148 | 189 |
|
| 149 | 190 |
</div><!-- #main --> |
| 150 | 191 |
|
| 151 | 192 |