mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-01-11 23:39:38 -05:00
Copyedit; wrap text
This commit is contained in:
parent
29ed6e6e9b
commit
3bee60ec01
@ -25,8 +25,8 @@ even if it looks trivial at first sight.
|
|||||||
|
|
||||||
Digital signatures can prove both **authenticity** and **integrity** to a
|
Digital signatures can prove both **authenticity** and **integrity** to a
|
||||||
reasonable degree of certainty. **Authenticity** ensures that a given file was
|
reasonable degree of certainty. **Authenticity** ensures that a given file was
|
||||||
indeed created by the person who signed it (i.e., that a
|
indeed created by the person who signed it (i.e., that a third party did not
|
||||||
third party did not forge it). **Integrity** ensures that the contents of the file have not been
|
forge it). **Integrity** ensures that the contents of the file have not been
|
||||||
tampered with (i.e., that a third party has not undetectably altered its
|
tampered with (i.e., that a third party has not undetectably altered its
|
||||||
contents *en route*).
|
contents *en route*).
|
||||||
|
|
||||||
@ -35,9 +35,10 @@ malicious. In fact, there is nothing that could stop someone from signing a
|
|||||||
malicious program (and it happens from time to time in reality).
|
malicious program (and it happens from time to time in reality).
|
||||||
|
|
||||||
The point is that we must decide who we will trust (e.g., Linus Torvalds,
|
The point is that we must decide who we will trust (e.g., Linus Torvalds,
|
||||||
Microsoft, or the Qubes Project) and assume that if a trusted party signed a given file, then it should not be malicious or negligently buggy. The
|
Microsoft, or the Qubes Project) and assume that if a trusted party signed a
|
||||||
decision of whether to trust any given party is beyond the scope of digital
|
given file, then it should not be malicious or negligently buggy. The decision
|
||||||
signatures. It's more of a social and political decision.
|
of whether to trust any given party is beyond the scope of digital signatures.
|
||||||
|
It's more of a social and political decision.
|
||||||
|
|
||||||
Once we decide to trust certain parties, digital signatures are
|
Once we decide to trust certain parties, digital signatures are
|
||||||
useful, because they make it possible for us to limit our trust only to those
|
useful, because they make it possible for us to limit our trust only to those
|
||||||
@ -116,7 +117,9 @@ Now, there are several ways to get the QMSK.
|
|||||||
$ gpg2 --import /usr/share/qubes/qubes-master-key.asc
|
$ gpg2 --import /usr/share/qubes/qubes-master-key.asc
|
||||||
```
|
```
|
||||||
|
|
||||||
- If you're on Fedora, you can get it in the [distribution-gpg-keys](https://github.com/xsuchy/distribution-gpg-keys) package:
|
- If you're on Fedora, you can get it in the
|
||||||
|
[distribution-gpg-keys](https://github.com/xsuchy/distribution-gpg-keys)
|
||||||
|
package:
|
||||||
|
|
||||||
```shell_session
|
```shell_session
|
||||||
$ dnf install distribution-gpg-keys
|
$ dnf install distribution-gpg-keys
|
||||||
@ -281,7 +284,7 @@ follow the instructions in this section carefully and consult the
|
|||||||
|
|
||||||
## How to import and authenticate release signing keys
|
## How to import and authenticate release signing keys
|
||||||
|
|
||||||
Every Qubes OS release is signed by a **release signing key (RSK)**, which is
|
Every Qubes OS release is signed by a **release signing key (RSK)**, which is,
|
||||||
in turn, signed by the Qubes Master Signing Key (QMSK).
|
in turn, signed by the Qubes Master Signing Key (QMSK).
|
||||||
|
|
||||||
Before we proceed, you must first complete the following prerequisite steps:
|
Before we proceed, you must first complete the following prerequisite steps:
|
||||||
@ -339,13 +342,14 @@ sig! DDFA1A3E36879494 2017-03-08 Qubes Master Signing Key
|
|||||||
gpg: 2 good signatures
|
gpg: 2 good signatures
|
||||||
```
|
```
|
||||||
|
|
||||||
This is just an example, so the output you receive will not look exactly the
|
This is just an example, so the output you receive may not look exactly the
|
||||||
same. What matters is the line that shows that the QMSK signs this key
|
same. What matters is the line with a `sig!` prefix showing that the QMSK has
|
||||||
with a `sig!` prefix. This verifies the authenticity of the
|
signed this key. This verifies the authenticity of the RSK. Note that the `!`
|
||||||
RSK. Note that the `!` flag after the `sig` tag is important because it means
|
flag after the `sig` tag is important because it means that the key signature
|
||||||
that the key signature is valid. A `sig-` prefix would indicate a bad signature, and `sig%` would mean that gpg encountered an error while verifying the
|
is valid. A `sig-` prefix would indicate a bad signature, and `sig%` would mean
|
||||||
signature. It is not necessary to independently verify the authenticity of the
|
that gpg encountered an error while verifying the signature. It is not
|
||||||
RSK, since you already verified the authenticity of the QMSK.
|
necessary to independently verify the authenticity of the RSK, since you
|
||||||
|
already verified the authenticity of the QMSK.
|
||||||
|
|
||||||
As a final sanity check, make sure the RSK is in your keyring with the correct
|
As a final sanity check, make sure the RSK is in your keyring with the correct
|
||||||
trust level:
|
trust level:
|
||||||
@ -385,13 +389,13 @@ Each Qubes ISO is accompanied by a set of **cryptographic hash values**
|
|||||||
contained in a plain text file ending in `.DIGESTS`, which can find on the
|
contained in a plain text file ending in `.DIGESTS`, which can find on the
|
||||||
[downloads](/downloads/) page alongside the ISO. This file contains the output
|
[downloads](/downloads/) page alongside the ISO. This file contains the output
|
||||||
of running several different cryptographic hash functions on the ISO (a process
|
of running several different cryptographic hash functions on the ISO (a process
|
||||||
known as "hashing") to obtain alphanumeric outputs known as "hash
|
known as "hashing") to obtain alphanumeric outputs known as "hash values" or
|
||||||
values" or "digests."
|
"digests."
|
||||||
|
|
||||||
One convenient property of hash values is that they can be generated on any
|
One convenient property of hash values is that they can be generated on any
|
||||||
computer. This means, for example, that you can download a Qubes ISO on one
|
computer. This means, for example, that you can download a Qubes ISO on one
|
||||||
computer, hash it, then visually compare that hash value to the one you generated
|
computer, hash it, then visually compare that hash value to the one you
|
||||||
or have saved on a different computer.
|
generated or have saved on a different computer.
|
||||||
|
|
||||||
In addition to the `.DIGESTS` files on the [downloads](/downloads/) page
|
In addition to the `.DIGESTS` files on the [downloads](/downloads/) page
|
||||||
alongside each ISO, and you can always find all the digest files for every
|
alongside each ISO, and you can always find all the digest files for every
|
||||||
|
Loading…
Reference in New Issue
Block a user