Matt Pagan commited on 2014-05-13 01:25:52
Zeige 2 geänderte Dateien mit 60 Einfügungen und 43 Löschungen.
| ... | ... |
@@ -1606,49 +1606,9 @@ href="http://www.crowdstrike.com/community-tools/index.html#tool-79">proposed |
| 1606 | 1606 |
<h3><a class="anchor" href="#VerifyDownload">How do I verify the download |
| 1607 | 1607 |
(sha256sums.txt)?</a></h3> |
| 1608 | 1608 |
|
| 1609 |
- <p>You can still verify your Tor Browser download by downloading the |
|
| 1610 |
- signature file (.asc) along with your package and <a |
|
| 1611 |
- href="<page docs/verifying-signatures>"> |
|
| 1612 |
- checking the GPG signature</a> as before. We now have an additional |
|
| 1613 |
- verification method that allows you to verify the build as well as |
|
| 1614 |
- the download.</p> |
|
| 1615 |
- |
|
| 1616 |
- <ul> |
|
| 1617 |
- <li>Download the Tor Browser package, the sha256sums.txt file, and the |
|
| 1618 |
- sha256sums signature files. They can all be found in the same directory |
|
| 1619 |
- under <a href="https://www.torproject.org/dist/torbrowser/"> |
|
| 1620 |
- https://www.torproject.org/dist/torbrowser/</a>, for example in 3.5 |
|
| 1621 |
- for TBB 3.5.</li> |
|
| 1622 |
- <li>Retrieve the signers' GPG keys. This can be done from the command |
|
| 1623 |
- line by entering something like |
|
| 1624 |
- <pre>gpg --keyserver keys.mozilla.org --recv-keys 0x29846B3C683686CC</pre> |
|
| 1625 |
- (This will bring you developer Mike Perry's public key. Other |
|
| 1626 |
- developers' key IDs can be found on |
|
| 1627 |
- <a href="<page docs/signing-keys>">this |
|
| 1628 |
- page</a>.)</li> |
|
| 1629 |
- <li>Verify the sha256sums.txt file by executing this command: |
|
| 1630 |
- <pre>gpg --verify <NAME OF THE SIGNATURE FILE>.asc sha256sums.txt</pre></li> |
|
| 1631 |
- <li>You should see a message like "Good signature from <DEVELOPER |
|
| 1632 |
- NAME>". If you don't, there is a problem. Try these steps again.</li> |
|
| 1633 |
- <li>Now you can take the sha256sum of the Tor Browser package. On |
|
| 1634 |
- Windows you can use the <a href="http://md5deep.sourceforge.net/"> |
|
| 1635 |
- hashdeep utility</a> and run |
|
| 1636 |
- <pre>C:\location\where\you\saved\hashdeep -c sha256sum <TOR BROWSER FILE NAME>.exe</pre> |
|
| 1637 |
- On Mac or Linux you can run <pre>sha256sum <TOR BROWSER FILE NAME>.zip</pre> or <pre>sha256sum <TOR BROWSER FILE NAME>.tar.gz</pre> without having to download a utility.</li> |
|
| 1638 |
- <li>You will see a string of letters and numbers.</li> |
|
| 1639 |
- <li>Open sha256sums.txt in a text editor.</li> |
|
| 1640 |
- <li>Locate the name of the Tor Browser file you downloaded.</li> |
|
| 1641 |
- <li>Compare the string of letters and numbers to the left of your |
|
| 1642 |
- filename with the string of letters and numbers that appeared |
|
| 1643 |
- on your command line. If they match, you've successfully verified the |
|
| 1644 |
- build.</li> |
|
| 1645 |
- </ul> |
|
| 1646 |
- |
|
| 1647 |
- <p><a href="https://github.com/isislovecruft/scripts/blob/master/verify-gitian-builder-signatures"> |
|
| 1648 |
- Scripts</a> to <a |
|
| 1649 |
- href="http://tor.stackexchange.com/questions/648/how-to-verify-tor-browser-bundle-tbb-3-x">automate |
|
| 1650 |
- </a> these steps have been written, but to use them you will need to |
|
| 1651 |
- modify them yourself with the latest Tor Browser Bundle filename.</p> |
|
| 1609 |
+ <p>Instructions are on the <a |
|
| 1610 |
+ href="<page docs/verifying-signatures#BuildVerification>">verifying |
|
| 1611 |
+ signatures</a> page.</p> |
|
| 1652 | 1612 |
|
| 1653 | 1613 |
<hr> |
| 1654 | 1614 |
|
| ... | ... |
@@ -179,6 +179,63 @@ |
| 179 | 179 |
href="http://www.gnupg.org/documentation/">http://www.gnupg.org/documentation/</a> |
| 180 | 180 |
to learn more about GPG.</p> |
| 181 | 181 |
|
| 182 |
+ <hr> |
|
| 183 |
+ |
|
| 184 |
+ <a id="BuildVerification"></a> |
|
| 185 |
+ <h3><a class="anchor" href="#BuildVerification"> |
|
| 186 |
+ Verifying sha256sums (advanced)</a></h3> |
|
| 187 |
+ <hr> |
|
| 188 |
+ <p>Build reproducibility is a <a |
|
| 189 |
+ href="https://blog.torproject.org/blog/deterministic-builds-part-one-cyberwar-and-global-compromise">security |
|
| 190 |
+ property</a> of Tor Browser Bundle 3.0 and later. Anyone can build the |
|
| 191 |
+ Tor Browser Bundle on their own machine and produce a binary that is |
|
| 192 |
+ bit-for-bit identical to the binary we offer on the download page. |
|
| 193 |
+ Fortunately, it is not necessary for everyone to build the Tor Browser |
|
| 194 |
+ locally to get this security. Verifying and comparing the signed list |
|
| 195 |
+ of <a href="https://en.wikipedia.org/wiki/Cryptographic_hash">hashes</a> |
|
| 196 |
+ will confirm that multiple people have built Tor Browser Bundles |
|
| 197 |
+ identical to the download.</p> |
|
| 198 |
+ |
|
| 199 |
+ <p>The steps below walk through this process:</p> |
|
| 200 |
+ |
|
| 201 |
+ <ul> |
|
| 202 |
+ <li>Download the Tor Browser package, the sha256sums.txt file, and the |
|
| 203 |
+ sha256sums signature files. They can all be found in the same directory |
|
| 204 |
+ under <a href="https://www.torproject.org/dist/torbrowser/"> |
|
| 205 |
+ https://www.torproject.org/dist/torbrowser/</a>, for example in '3.5' |
|
| 206 |
+ for TBB 3.5.</li> |
|
| 207 |
+ <li>Retrieve the signers' GPG keys. This can be done from the command |
|
| 208 |
+ line by entering something like |
|
| 209 |
+ <pre>gpg --keyserver keys.mozilla.org --recv-keys 0x29846B3C683686CC</pre> |
|
| 210 |
+ (This will bring you developer Mike Perry's public key. Other |
|
| 211 |
+ developers' key IDs can be found on |
|
| 212 |
+ <a href="https://www.torproject.org/docs/signing-keys.html.en">this |
|
| 213 |
+ page</a>.)</li> |
|
| 214 |
+ <li>Verify the sha256sums.txt file by executing this command: |
|
| 215 |
+ <pre>gpg --verify <NAME OF THE SIGNATURE FILE>.asc sha256sums.txt</pre></li> |
|
| 216 |
+ <li>You should see a message like "Good signature from <DEVELOPER |
|
| 217 |
+ NAME>". If you don't, there is a problem. Try these steps again.</li> |
|
| 218 |
+ <li>Now you can take the sha256sum of the Tor Browser package. On |
|
| 219 |
+ Windows you can use the <a href="http://md5deep.sourceforge.net/"> |
|
| 220 |
+ hashdeep utility</a> and run |
|
| 221 |
+ <pre>C:\location\where\you\saved\hashdeep -c sha256sum <TOR BROWSER FILE NAME>.exe</pre> |
|
| 222 |
+ On Mac or Linux you can run <pre>sha256sum <TOR BROWSER FILE NAME>.zip</pre> or <pre>sha256sum <TOR BROWSER FILE NAME>.tar.gz</pre> without having to download a utility.</li> |
|
| 223 |
+ <li>You will see a string of letters and numbers.</li> |
|
| 224 |
+ <li>Open sha256sums.txt in a text editor.</li> |
|
| 225 |
+ <li>Locate the name of the Tor Browser file you downloaded.</li> |
|
| 226 |
+ <li>Compare the string of letters and numbers to the left of your |
|
| 227 |
+ filename with the string of letters and numbers that appeared |
|
| 228 |
+ on your command line. If they match, you've successfully verified the |
|
| 229 |
+ build.</li> |
|
| 230 |
+ </ul> |
|
| 231 |
+ |
|
| 232 |
+ <p><a href="https://github.com/isislovecruft/scripts/blob/master/verify-gitian-builder-signatures">Scripts</a> |
|
| 233 |
+ to <a href="http://tor.stackexchange.com/questions/648/how-to-verify-tor-browser-bundle-tbb-3-x">automate</a> |
|
| 234 |
+ these steps have been written, but to use them you will need to modify |
|
| 235 |
+ them yourself with the latest Tor Browser Bundle filename.</p> |
|
| 236 |
+ |
|
| 237 |
+ <hr> |
|
| 238 |
+ |
|
| 182 | 239 |
</div> |
| 183 | 240 |
<!-- END MAINCOL --> |
| 184 | 241 |
<div id = "sidecol"> |
| 185 | 242 |