[or-cvs] r18552: {website} Updates to verifying signatures for easier reading. (website/trunk/en)

phobos at seul.org phobos at seul.org
Mon Feb 16 03:42:09 UTC 2009


Author: phobos
Date: 2009-02-15 22:42:06 -0500 (Sun, 15 Feb 2009)
New Revision: 18552

Modified:
   website/trunk/en/verifying-signatures.wml
Log:
Updates to verifying signatures for easier reading.


Modified: website/trunk/en/verifying-signatures.wml
===================================================================
--- website/trunk/en/verifying-signatures.wml	2009-02-16 00:32:42 UTC (rev 18551)
+++ website/trunk/en/verifying-signatures.wml	2009-02-16 03:42:06 UTC (rev 18552)
@@ -6,22 +6,32 @@
 
 <div class="main-column">
 
-<h2>Verifying signatures on released files</h2>
+<h2>How to verify signatures for packages</h2>
 <hr />
 
 <p>Each file on <a href="<page download>">our download page</a> is accompanied
-by a file with the same name and the extension ".asc".</p>
+by a file with the same name as the package and the extension
+".asc".  For example, the current Installation Bundle for Windows:
+<package-win32-bundle-stable-sig>.</p>
 
-<p>These are PGP signatures, so you can verify that the file you've downloaded
+<p>These .asc files are PGP signatures. They allow you to verify the file you've downloaded
 is exactly the one that we intended you to get.</p>
 
 <p>Of course, you'll need to have our pgp keys in your keyring: if you don't
 know the pgp key, you can't be sure that it was really us who signed it. The
-signing keys we use are Roger's (0x28988BF5) and Nick's (0x165733EA, or its
-subkey 0x8D29319A). Some binary packages may also be signed by Andrew's
-(0x31B0974B), Peter's (0x94C09C7F, or its subkey 0xAFA44BDD), Matt's
-(0x5FA14861), or Jacob's (0x9D0FACE4).</p>
+signing keys we use are:
+<ul>
+<li>Roger's (0x28988BF5) typically signs the source code file.</li>
+<li>Nick's (0x165733EA, or its subkey 0x8D29319A)</li>
+<li>Andrew's (0x31B0974B)</li>
+<li>Peter's (0x94C09C7F, or its subkey 0xAFA44BDD)</li>
+<li>Matt's (0x5FA14861)</li>
+<li>Jacob's (0x9D0FACE4)</li>
+</ul>
+</p>
 
+<h3>Step One:  Import the keys</h3>
+<hr />
 <p>You can import keys directly from GnuPG as well:</p>
 
 <pre>gpg --keyserver subkeys.pgp.net --recv-keys 0x28988BF5</pre>
@@ -32,7 +42,11 @@
 
 <p>and when you select one, it will be added to your keyring.</p>
 
-<p>The fingerprints for the keys should be:</p>
+<h3>Step Two:  Verify the fingerprints</h3>
+<hr />
+<p>Verify the pgp fingerprints using:
+<pre>gpg --fingerprint (insert keyid here)</pre>
+The fingerprints for the keys should be:</p>
 
 <pre>
 pub   1024D/28988BF5 2000-02-27
@@ -48,6 +62,9 @@
 pub  1024D/31B0974B 2003-07-17
      Key fingerprint = 0295 9AA7 190A B9E9 027E  0736 3B9D 093F 31B0 974B
 uid                  Andrew Lewman (phobos) &lt;phobos at rootme.org&gt;
+uid                  Andrew Lewman &lt;andrew at lewman.com&gt;
+uid                  Andrew Lewman &lt;andrew at torproject.org&gt;
+sub   4096g/B77F95F7 2003-07-17
 
 pub   1024D/94C09C7F 1999-11-10
       Key fingerprint = 5B00 C96D 5D54 AEE1 206B  AF84 DE7A AF6E 94C0 9C7F
@@ -72,6 +89,8 @@
 then you should check this from more places or even better get into key signing
 and build a trust path to those keys.)</p>
 
+<h3>Step Three:  Verify the downloaded package</h3>
+<hr />
 <p>If you're using GnuPG, then put the .asc and the download in the same
 directory and type "gpg --verify (whatever).asc (whatever)". It will say
 something like "Good signature" or "BAD signature" using the following type of
@@ -108,8 +127,7 @@
 gpg: BAD signature from "Roger Dingledine &lt;arma at mit.edu&gt;"
 </pre>
 
-<p>If you see a message like the above one, then you should not have any trust
-in the file contents.</p>
+<p>If you see a message like the above one, then you should not trust the file contents.</p>
 
 <p>If you are running Tor on Debian you should read the instructions on
 <a



More information about the tor-commits mailing list