[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #26539 [Webpages/Website]: add checksums to download page; make checksum vs. sig file purpose much clearer
#26539: add checksums to download page; make checksum vs. sig file purpose much
clearer
----------------------------------+----------------------------------------
Reporter: cypherpunks | Owner: (none)
Type: defect | Status: new
Priority: Medium | Milestone:
Component: Webpages/Website | Version:
Severity: Normal | Keywords: gpg, verify gpg signatures
Actual Points: | Parent ID:
Points: | Reviewer:
Sponsor: |
----------------------------------+----------------------------------------
Gpg recently failed to verify a Tor Browser download - a first for me.
Since data errors in downloads aren't as common as years ago, I assumed an
error in the *.asc sig file itself, or other issues.
Such as my Linux GPG version not playing well with the version used to
sign Tor Browser.
I wanted to verify checksum of the downloaded TBB, but after a few
searches on TorProject didn't find the checksum, I re-download TBB.
It was faster in the long run, but it's a big package to re-download for
users with limited data plans, when a few byte checksum would suffice to
see if there was a download data error.
I propose that checksum files - or a prominent link, be added to the
download page - not make users hunt them. That's how many well run
projects seem to do it - app packages, sig files & checksums are all
easily found, or have links on the same page.
The statement, "''See our instructions on how to verify package
signatures, which allows you to make sure you've downloaded the file we
intended you to get. Also, note that the Firefox ESR in our bundles is
modified from the default Firefox ESR'' "
should be placed above the packages & sig files, where users are far more
likely to see it.
The wording could be stronger, clearer - why users would want to verify
the TBB / other packages PGP signatures of downloads, EVEN from
TorProject's site (not rely solely on checksums). A brief statement why
verifying signed packages is important & how it's unrelated to using
checksums. If users (of anything) don't understand a real purpose or
need, they're more likely to skip steps.
I could write something to make changes, additions & submit for
consideration, but only if there's interest in making changes to general
security methods to educate users, that work for many products.
* Verification instructions: They're generally good & someone did a lot
of work, but many users unfamiliar w/ PGP / GPG's real purpose & the
procedures may be clueless.
On the Windows verify instructions (maybe Linux, OS X), it's unclear which
signature & which "package" they're verifying.
If they're installing GPG or gpg4win, the instructions should include
steps (or link to clear instructions) to first verify GPG itself (once),
then a separate verification of downloaded Tor products - EVEN from
TorProject's https site.
The statement, "make sure you've downloaded the file we intended you to
get." means little to non-gpg users or slightly familiar. To many, they
downloaded the correct platform package, therefore they "have the file
intended for their OS." As far as they know, they did everything
required.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/26539>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs