Andrew Lewman commited on 2009-02-16 04:42:06
Zeige 1 geänderte Dateien mit 28 Einfügungen und 10 Löschungen.
... | ... |
@@ -6,22 +6,32 @@ |
6 | 6 |
|
7 | 7 |
<div class="main-column"> |
8 | 8 |
|
9 |
-<h2>Verifying signatures on released files</h2> |
|
9 |
+<h2>How to verify signatures for packages</h2> |
|
10 | 10 |
<hr /> |
11 | 11 |
|
12 | 12 |
<p>Each file on <a href="<page download>">our download page</a> is accompanied |
13 |
-by a file with the same name and the extension ".asc".</p> |
|
13 |
+by a file with the same name as the package and the extension |
|
14 |
+".asc". For example, the current Installation Bundle for Windows: |
|
15 |
+<package-win32-bundle-stable-sig>.</p> |
|
14 | 16 |
|
15 |
-<p>These are PGP signatures, so you can verify that the file you've downloaded |
|
17 |
+<p>These .asc files are PGP signatures. They allow you to verify the file you've downloaded |
|
16 | 18 |
is exactly the one that we intended you to get.</p> |
17 | 19 |
|
18 | 20 |
<p>Of course, you'll need to have our pgp keys in your keyring: if you don't |
19 | 21 |
know the pgp key, you can't be sure that it was really us who signed it. The |
20 |
-signing keys we use are Roger's (0x28988BF5) and Nick's (0x165733EA, or its |
|
21 |
-subkey 0x8D29319A). Some binary packages may also be signed by Andrew's |
|
22 |
-(0x31B0974B), Peter's (0x94C09C7F, or its subkey 0xAFA44BDD), Matt's |
|
23 |
-(0x5FA14861), or Jacob's (0x9D0FACE4).</p> |
|
22 |
+signing keys we use are: |
|
23 |
+<ul> |
|
24 |
+<li>Roger's (0x28988BF5) typically signs the source code file.</li> |
|
25 |
+<li>Nick's (0x165733EA, or its subkey 0x8D29319A)</li> |
|
26 |
+<li>Andrew's (0x31B0974B)</li> |
|
27 |
+<li>Peter's (0x94C09C7F, or its subkey 0xAFA44BDD)</li> |
|
28 |
+<li>Matt's (0x5FA14861)</li> |
|
29 |
+<li>Jacob's (0x9D0FACE4)</li> |
|
30 |
+</ul> |
|
31 |
+</p> |
|
24 | 32 |
|
33 |
+<h3>Step One: Import the keys</h3> |
|
34 |
+<hr /> |
|
25 | 35 |
<p>You can import keys directly from GnuPG as well:</p> |
26 | 36 |
|
27 | 37 |
<pre>gpg --keyserver subkeys.pgp.net --recv-keys 0x28988BF5</pre> |
... | ... |
@@ -32,7 +42,11 @@ subkey 0x8D29319A). Some binary packages may also be signed by Andrew's |
32 | 42 |
|
33 | 43 |
<p>and when you select one, it will be added to your keyring.</p> |
34 | 44 |
|
35 |
-<p>The fingerprints for the keys should be:</p> |
|
45 |
+<h3>Step Two: Verify the fingerprints</h3> |
|
46 |
+<hr /> |
|
47 |
+<p>Verify the pgp fingerprints using: |
|
48 |
+<pre>gpg --fingerprint (insert keyid here)</pre> |
|
49 |
+The fingerprints for the keys should be:</p> |
|
36 | 50 |
|
37 | 51 |
<pre> |
38 | 52 |
pub 1024D/28988BF5 2000-02-27 |
... | ... |
@@ -48,6 +62,9 @@ uid Nick Mathewson <nickm@freehaven.net> |
48 | 62 |
pub 1024D/31B0974B 2003-07-17 |
49 | 63 |
Key fingerprint = 0295 9AA7 190A B9E9 027E 0736 3B9D 093F 31B0 974B |
50 | 64 |
uid Andrew Lewman (phobos) <phobos@rootme.org> |
65 |
+uid Andrew Lewman <andrew@lewman.com> |
|
66 |
+uid Andrew Lewman <andrew@torproject.org> |
|
67 |
+sub 4096g/B77F95F7 2003-07-17 |
|
51 | 68 |
|
52 | 69 |
pub 1024D/94C09C7F 1999-11-10 |
53 | 70 |
Key fingerprint = 5B00 C96D 5D54 AEE1 206B AF84 DE7A AF6E 94C0 9C7F |
... | ... |
@@ -72,6 +89,8 @@ sub 4096g/D5E87583 2008-03-11 [expires: 2010-03-11] |
72 | 89 |
then you should check this from more places or even better get into key signing |
73 | 90 |
and build a trust path to those keys.)</p> |
74 | 91 |
|
92 |
+<h3>Step Three: Verify the downloaded package</h3> |
|
93 |
+<hr /> |
|
75 | 94 |
<p>If you're using GnuPG, then put the .asc and the download in the same |
76 | 95 |
directory and type "gpg --verify (whatever).asc (whatever)". It will say |
77 | 96 |
something like "Good signature" or "BAD signature" using the following type of |
... | ... |
@@ -108,8 +127,7 @@ gpg: Signature made Wed Feb 23 01:33:29 2005 EST using DSA key ID 28988BF5 |
108 | 127 |
gpg: BAD signature from "Roger Dingledine <arma@mit.edu>" |
109 | 128 |
</pre> |
110 | 129 |
|
111 |
-<p>If you see a message like the above one, then you should not have any trust |
|
112 |
-in the file contents.</p> |
|
130 |
+<p>If you see a message like the above one, then you should not trust the file contents.</p> |
|
113 | 131 |
|
114 | 132 |
<p>If you are running Tor on Debian you should read the instructions on |
115 | 133 |
<a |
116 | 134 |