[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] [webwml/staging] Update signature verification page
commit 181d059fa2448158675736e352c926602320a485
Author: Georg Koppen <gk@xxxxxxxxxxxxxx>
Date: Wed Dec 23 14:28:39 2015 +0000
Update signature verification page
This update fixes bug 17851 by changing all http:// links to gpg related
websites to https:// ones. Furthermore, it incorporates feedback Josef
provided to us with respect to signature and SHA256 sums verification on
OS X. Thirdly, we need to set LD_LIBRARY_PATH to be able to strip MAR
signatures. And, finally, this patch cleans up the GPG output of the Tor
Browser developers signing key.
---
docs/en/verifying-signatures.wml | 41 +++++++++++++++++++---------------------
1 file changed, 19 insertions(+), 22 deletions(-)
diff --git a/docs/en/verifying-signatures.wml b/docs/en/verifying-signatures.wml
index 8740062..45ffb28 100644
--- a/docs/en/verifying-signatures.wml
+++ b/docs/en/verifying-signatures.wml
@@ -36,7 +36,7 @@
you're talking to the Tor website with https when you're not.</p>
<p>Some software sites list <a
- href="http://en.wikipedia.org/wiki/Cryptographic_hash_function">sha1
+ href="https://en.wikipedia.org/wiki/Cryptographic_hash_function">sha1
hashes</a> alongside the software on their website, so users can
verify that they downloaded the file without any errors. These
"checksums" help you answer the question "Did I download this file
@@ -60,7 +60,7 @@
<hr>
<p>You need to have GnuPG installed before
you can verify signatures. Download it from <a
- href="http://gpg4win.org/download.html">http://gpg4win.org/download.html</a>.</p>
+ href="https://gpg4win.org/download.html">https://gpg4win.org/download.html</a>.</p>
<p>Once it's installed, use GnuPG to import the key that signed your
package. Since GnuPG for Windows is a command-line tool, you will need
to use <i>cmd.exe</i>. Unless you edit your PATH environment variable,
@@ -80,7 +80,6 @@
uid Tor Browser Developers (signing key) <torbrowser@xxxxxxxxxxxxxx>
sub 4096R/F65C2036 2014-12-15
sub 4096R/D40814E0 2014-12-15
- sub 4096R/589839A3 2014-12-15
</pre>
<p>To verify the signature of the package you downloaded, you will need
to download the ".asc" file as well. Assuming you downloaded the
@@ -96,8 +95,7 @@
<p>Currently valid subkey fingerprints are:
<pre>
5242 013F 02AF C851 B1C7 36B8 7017 ADCE F65C 2036
- BA1E E421 BBB4 5263 180E 1FC7 2E1A C68E D408 14E0
- 05FA 4425 3F6C 19A8 B7F5 18D4 2D00 0988 5898 39A3</pre></p>
+ BA1E E421 BBB4 5263 180E 1FC7 2E1A C68E D408 14E0</pre></p>
<p>
Notice that there is a warning because you haven't assigned a trust
index to this person. This means that GnuPG verified that the key made
@@ -110,7 +108,7 @@
<p>You need to have GnuPG installed before you can verify
signatures. If you are using Mac OS X, you can install it from <a
- href="http://www.gpgtools.org/">http://www.gpgtools.org/</a>. If you
+ href="https://www.gpgtools.org/">https://www.gpgtools.org/</a>. If you
are using Linux, then it's probably you already have GnuPG in your
system, as most Linux distributions come with it preinstalled.
</p>
@@ -133,17 +131,14 @@
Key fingerprint = EF6E 286D DA85 EA2A 4BA7 DE68 4E2C 6E87 9329 8290
uid Tor Browser Developers (signing key) <torbrowser@xxxxxxxxxxxxxx>
sub 4096R/F65C2036 2014-12-15
- sub 4096R/D40814E0 2014-12-15
- sub 4096R/589839A3 2014-12-15
- </pre>
-
+ sub 4096R/D40814E0 2014-12-15</pre>
<p>To verify the signature of the package you downloaded, you will need
to download the ".asc" file as well. Assuming you downloaded the
- package and its signature to your Desktop, run:</p>
+ package and its signature to your Downloads folder, run:</p>
<strong>For Mac OS X users</strong>:<br />
- <pre>gpg --verify ~/Desktop/TorBrowser-<version-torbrowserbundleosx64>-osx64_en-US.dmg{.asc*,}</pre>
-
+ <pre>gpg --verify ~/Downloads/TorBrowser-<version-torbrowserbundleosx64>-osx64_en-US.dmg{.asc*,}</pre>
+
<strong>For Linux users</strong> (change 32 to 64 if you have the 64-bit package):<br />
<pre>gpg --verify ~/Desktop/tor-browser-linux32-<version-torbrowserbundlelinux32>_en-US.tar.xz{.asc*,}</pre>
@@ -157,8 +152,7 @@
Primary key fingerprint: EF6E 286D DA85 EA2A 4BA7 DE68 4E2C 6E87 9329 8290</pre> <p> Currently valid subkey fingerprints are:
<pre>
5242 013F 02AF C851 B1C7 36B8 7017 ADCE F65C 2036
- BA1E E421 BBB4 5263 180E 1FC7 2E1A C68E D408 14E0
- 05FA 4425 3F6C 19A8 B7F5 18D4 2D00 0988 5898 39A3</pre></p>
+ BA1E E421 BBB4 5263 180E 1FC7 2E1A C68E D408 14E0</pre></p>
<p>
Notice that there is a warning because you haven't assigned a trust
index to this person. This means that GnuPG verified that the key made
@@ -177,7 +171,7 @@
</p>
<p>See <a
- href="http://www.gnupg.org/documentation/">http://www.gnupg.org/documentation/</a>
+ href="https://www.gnupg.org/documentation/">https://www.gnupg.org/documentation/</a>
to learn more about GnuPG.</p>
<hr>
@@ -204,14 +198,16 @@
file, and the <tt>sha256sums-unsigned-build.txt.asc</tt> signature file.
They can all be found in the same directory under
<a href="https://www.torproject.org/dist/torbrowser/">
- https://www.torproject.org/dist/torbrowser/</a>, for example in '4.5.1'
- for Tor Browser 4.5.1.</li>
+ https://www.torproject.org/dist/torbrowser/</a>, for example in '<version-torbrowserbundlelinux32>'
+ for Tor Browser <version-torbrowserbundlelinux32>.</li>
+ <li>In case your operating system is adding the .txt extension
+ automatically to the SHA256 sums signature file strip it again by running
+ <pre>mv sha256sums-unsigned-build.txt.asc.txt sha256sums-unsigned-build.txt.asc</pre>
<li>Retrieve the signers' GPG keys. This can be done from the command
line by entering something like
<pre>gpg --keyserver keys.mozilla.org --recv-keys 0x4E2C6E8793298290</pre>
(This will bring you the public part of the Tor Browser developers'
- signing key. Other
- developers' key IDs can be found on
+ signing key. Other developers' key IDs can be found on
<a href="<page docs/signing-keys>">this
page</a>.)</li>
<li>Verify the sha256sums-unsigned-build.txt file by executing this
@@ -230,7 +226,7 @@
Windows you can use the <a href="http://md5deep.sourceforge.net/">
hashdeep utility</a> and run
<pre>C:\location\where\you\saved\hashdeep -c sha256sum <TOR BROWSER FILE NAME>.exe</pre>
- On Mac or Linux you can run <pre>sha256sum <TOR BROWSER FILE NAME>.dmg</pre> or <pre>sha256sum <TOR BROWSER FILE NAME>.tar.gz</pre> without having to download a utility.</li>
+ On Mac or Linux you can run <pre>shasum -a 256 <TOR BROWSER FILE NAME>.dmg</pre> or <pre>sha256sum <TOR BROWSER FILE NAME>.tar.gz</pre> without having to download a utility.</li>
<li>You will see a string of letters and numbers.</li>
<li>Open <tt>sha256sums-unsigned-build.txt</tt> in a text editor.</li>
<li>Locate the name of the Tor Browser file you downloaded.</li>
@@ -241,7 +237,7 @@
</ul>
<p><a href="https://github.com/isislovecruft/scripts/blob/master/verify-gitian-builder-signatures">Scripts</a>
- to <a href="http://tor.stackexchange.com/questions/648/how-to-verify-tor-browser-bundle-tbb-3-x">automate</a>
+ to <a href="https://tor.stackexchange.com/questions/648/how-to-verify-tor-browser-bundle-tbb-3-x">automate</a>
these steps have been written, but to use them you will need to modify
them yourself with the latest Tor Browser filename.</p>
@@ -263,6 +259,7 @@
<pre>
cd /path/to/MAR/file
unzip /path/to/gitian-builder/inputs/mar-tools-linux64.zip
+ export LD_LIBRARY_PATH=/path/to/MAR/file/mar-tools
mar-tools/signmar -r your-signed-mar-file.mar your-unsigned-mar-file.mar</pre>
<p>Now you can compare the SHA256 sum of <tt>your-unsigned-mar-file.mar</tt>
with the one provided in the <tt>sha265sums-unsigned-build.txt</tt> or
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits