Sebastian Hahn commited on 2009-01-09 12:19:35
Zeige 1 geänderte Dateien mit 117 Einfügungen und 0 Löschungen.
| ... | ... |
@@ -0,0 +1,117 @@ |
| 1 |
+## translation metadata |
|
| 2 |
+# Revision: $Revision$ |
|
| 3 |
+# Translation-Priority: 3-medium |
|
| 4 |
+ |
|
| 5 |
+#include "head.wmi" TITLE="Verifying Signatures" CHARSET="UTF-8" |
|
| 6 |
+ |
|
| 7 |
+<div class="main-column"> |
|
| 8 |
+ |
|
| 9 |
+<h2>Verifying signatures on released files</h2> |
|
| 10 |
+<hr /> |
|
| 11 |
+ |
|
| 12 |
+<p>Each file on <a href="<page download>">our download page</a> is accompanied |
|
| 13 |
+by a file with the same name and the extension ".asc".</p> |
|
| 14 |
+ |
|
| 15 |
+<p>These are PGP signatures, so you can verify that the file you've downloaded |
|
| 16 |
+is exactly the one that we intended you to get.</p> |
|
| 17 |
+ |
|
| 18 |
+<p>Of course, you'll need to have our pgp keys in your keyring: if you don't |
|
| 19 |
+know the pgp key, you can't be sure that it was really us who signed it. The |
|
| 20 |
+signing keys we use are Roger's (0x28988BF5) and Nick's (0x165733EA, or its |
|
| 21 |
+subkey 0x8D29319A). Some binary packages may also be signed by Andrew's |
|
| 22 |
+(0x31B0974B), Peter's (0x94C09C7F, or its subkey 0xAFA44BDD), or Matt's |
|
| 23 |
+(0x5FA14861). See keyserver.noreply.org for details.</p> |
|
| 24 |
+ |
|
| 25 |
+<p>You can import keys directly from GnuPG as well:</p> |
|
| 26 |
+ |
|
| 27 |
+<pre>gpg --keyserver subkeys.pgp.net --recv-keys 0x28988BF5</pre> |
|
| 28 |
+ |
|
| 29 |
+<p>or search for keys with</p> |
|
| 30 |
+ |
|
| 31 |
+<pre>gpg --keyserver subkeys.pgp.net --search-keys |
|
| 32 |
+0x28988BF5</pre> |
|
| 33 |
+ |
|
| 34 |
+<p>and when you select one, it will be added to your keyring.</p> |
|
| 35 |
+ |
|
| 36 |
+<p>The fingerprints for the keys should be:</p> |
|
| 37 |
+ |
|
| 38 |
+<pre> |
|
| 39 |
+pub 1024D/28988BF5 2000-02-27 |
|
| 40 |
+ Key fingerprint = B117 2656 DFF9 83C3 042B C699 EB5A 896A 2898 8BF5 |
|
| 41 |
+uid Roger Dingledine <arma@mit.edu> |
|
| 42 |
+ |
|
| 43 |
+pub 3072R/165733EA 2004-07-03 |
|
| 44 |
+ Key fingerprint = B35B F85B F194 89D0 4E28 C33C 2119 4EBB 1657 33EA |
|
| 45 |
+uid Nick Mathewson <nickm@alum.mit.edu> |
|
| 46 |
+uid Nick Mathewson <nickm@wangafu.net> |
|
| 47 |
+uid Nick Mathewson <nickm@freehaven.net> |
|
| 48 |
+ |
|
| 49 |
+pub 1024D/31B0974B 2003-07-17 |
|
| 50 |
+ Key fingerprint = 0295 9AA7 190A B9E9 027E 0736 3B9D 093F 31B0 974B |
|
| 51 |
+uid Andrew Lewman (phobos) <phobos@rootme.org> |
|
| 52 |
+ |
|
| 53 |
+pub 1024D/94C09C7F 1999-11-10 |
|
| 54 |
+ Key fingerprint = 5B00 C96D 5D54 AEE1 206B AF84 DE7A AF6E 94C0 9C7F |
|
| 55 |
+uid Peter Palfrader |
|
| 56 |
+uid Peter Palfrader <peter@palfrader.org> |
|
| 57 |
+uid Peter Palfrader <weasel@debian.org> |
|
| 58 |
+ |
|
| 59 |
+pub 1024D/5FA14861 2005-08-17 |
|
| 60 |
+ Key fingerprint = 9467 294A 9985 3C9C 65CB 141D AF7E 0E43 5FA1 4861 |
|
| 61 |
+uid Matt Edman <edmanm@rpi.edu> |
|
| 62 |
+uid Matt Edman <Matt_Edman@baylor.edu> |
|
| 63 |
+uid Matt Edman <edmanm2@cs.rpi.edu> |
|
| 64 |
+sub 4096g/EA654E59 2005-08-17 |
|
| 65 |
+</pre> |
|
| 66 |
+ |
|
| 67 |
+<p>(Of course if you want to be really certain that those are the real ones |
|
| 68 |
+(this wiki could have been tampered with) then you should check this from more |
|
| 69 |
+places or even better get into key signing and build a trust path to those |
|
| 70 |
+keys.)</p> |
|
| 71 |
+ |
|
| 72 |
+<p>If you're using GnuPG, then put the .asc and the download in the same |
|
| 73 |
+directory and type "gpg (whatever).asc". It will say something like "Good |
|
| 74 |
+signature" or "BAD signature" using the following type of command:</p> |
|
| 75 |
+ |
|
| 76 |
+<pre> |
|
| 77 |
+gpg --verify tor-0.1.0.17.tar.gz.asc |
|
| 78 |
+gpg: Signature made Wed Feb 23 01:33:29 2005 EST using DSA key ID 28988BF5 |
|
| 79 |
+gpg: Good signature from "Roger Dingledine <arma@mit.edu>" |
|
| 80 |
+gpg: aka "Roger Dingledine <arma@mit.edu>" |
|
| 81 |
+gpg: WARNING: This key is not certified with a trusted signature! |
|
| 82 |
+gpg: There is no indication that the signature belongs to the owner. |
|
| 83 |
+Primary key fingerprint: B117 2656 DFF9 83C3 042B C699 EB5A 896A 2898 8BF5 |
|
| 84 |
+</pre> |
|
| 85 |
+ |
|
| 86 |
+<p> |
|
| 87 |
+Notice that there is a warning because you haven't assigned a trust index to |
|
| 88 |
+this user. This means that your program verified the key made that signature. |
|
| 89 |
+It's up to the user to decide if that key really belongs to the developers. The |
|
| 90 |
+best method is to meet them in person and exchange gpg fingerprints. Keys can |
|
| 91 |
+also be signed. If you look up arma or nick's keys, other people have |
|
| 92 |
+essentially said "we have verified this is arma/nick". So if you trust that |
|
| 93 |
+third party, then you have a level of trust for that arma/nick. |
|
| 94 |
+</p> |
|
| 95 |
+ |
|
| 96 |
+<p>All this means is you can ignore the message or assign a trust level.</p> |
|
| 97 |
+ |
|
| 98 |
+<p>For your reference, this is an example of a <em>BAD</em> verification. It |
|
| 99 |
+means that the signature and file contents do not match:</p> |
|
| 100 |
+ |
|
| 101 |
+<pre> |
|
| 102 |
+gpg --verify tor-0.1.0.17.tar.gz.asc |
|
| 103 |
+gpg: Signature made Wed Feb 23 01:33:29 2005 EST using DSA key ID 28988BF5 |
|
| 104 |
+gpg: BAD signature from "Roger Dingledine <arma@mit.edu>" |
|
| 105 |
+</pre> |
|
| 106 |
+ |
|
| 107 |
+<p>If you see a message like the above one, then you should not have any trust |
|
| 108 |
+in the file contents.</p> |
|
| 109 |
+ |
|
| 110 |
+<p>If you are running Tor on Debian you should read the instructions on |
|
| 111 |
+<a |
|
| 112 |
+href="https://wiki.torproject.org/noreply/TheOnionRouter/TorOnDebian">importing |
|
| 113 |
+these keys to apt</a>.</p> |
|
| 114 |
+ |
|
| 115 |
+</div><!-- #main --> |
|
| 116 |
+ |
|
| 117 |
+#include <foot.wmi> |
|
| 0 | 118 |