Copyedit; wrap text

This commit is contained in:
Andrew David Wong 2021-11-30 03:12:56 -08:00
parent 29ed6e6e9b
commit 3bee60ec01
No known key found for this signature in database
GPG Key ID: 8CE137352A019A17

View File

@ -25,8 +25,8 @@ even if it looks trivial at first sight.
Digital signatures can prove both **authenticity** and **integrity** to a Digital signatures can prove both **authenticity** and **integrity** to a
reasonable degree of certainty. **Authenticity** ensures that a given file was reasonable degree of certainty. **Authenticity** ensures that a given file was
indeed created by the person who signed it (i.e., that a indeed created by the person who signed it (i.e., that a third party did not
third party did not forge it). **Integrity** ensures that the contents of the file have not been forge it). **Integrity** ensures that the contents of the file have not been
tampered with (i.e., that a third party has not undetectably altered its tampered with (i.e., that a third party has not undetectably altered its
contents *en route*). contents *en route*).
@ -35,9 +35,10 @@ malicious. In fact, there is nothing that could stop someone from signing a
malicious program (and it happens from time to time in reality). malicious program (and it happens from time to time in reality).
The point is that we must decide who we will trust (e.g., Linus Torvalds, The point is that we must decide who we will trust (e.g., Linus Torvalds,
Microsoft, or the Qubes Project) and assume that if a trusted party signed a given file, then it should not be malicious or negligently buggy. The Microsoft, or the Qubes Project) and assume that if a trusted party signed a
decision of whether to trust any given party is beyond the scope of digital given file, then it should not be malicious or negligently buggy. The decision
signatures. It's more of a social and political decision. of whether to trust any given party is beyond the scope of digital signatures.
It's more of a social and political decision.
Once we decide to trust certain parties, digital signatures are Once we decide to trust certain parties, digital signatures are
useful, because they make it possible for us to limit our trust only to those useful, because they make it possible for us to limit our trust only to those
@ -116,7 +117,9 @@ Now, there are several ways to get the QMSK.
$ gpg2 --import /usr/share/qubes/qubes-master-key.asc $ gpg2 --import /usr/share/qubes/qubes-master-key.asc
``` ```
- If you're on Fedora, you can get it in the [distribution-gpg-keys](https://github.com/xsuchy/distribution-gpg-keys) package: - If you're on Fedora, you can get it in the
[distribution-gpg-keys](https://github.com/xsuchy/distribution-gpg-keys)
package:
```shell_session ```shell_session
$ dnf install distribution-gpg-keys $ dnf install distribution-gpg-keys
@ -281,7 +284,7 @@ follow the instructions in this section carefully and consult the
## How to import and authenticate release signing keys ## How to import and authenticate release signing keys
Every Qubes OS release is signed by a **release signing key (RSK)**, which is Every Qubes OS release is signed by a **release signing key (RSK)**, which is,
in turn, signed by the Qubes Master Signing Key (QMSK). in turn, signed by the Qubes Master Signing Key (QMSK).
Before we proceed, you must first complete the following prerequisite steps: Before we proceed, you must first complete the following prerequisite steps:
@ -339,13 +342,14 @@ sig! DDFA1A3E36879494 2017-03-08 Qubes Master Signing Key
gpg: 2 good signatures gpg: 2 good signatures
``` ```
This is just an example, so the output you receive will not look exactly the This is just an example, so the output you receive may not look exactly the
same. What matters is the line that shows that the QMSK signs this key same. What matters is the line with a `sig!` prefix showing that the QMSK has
with a `sig!` prefix. This verifies the authenticity of the signed this key. This verifies the authenticity of the RSK. Note that the `!`
RSK. Note that the `!` flag after the `sig` tag is important because it means flag after the `sig` tag is important because it means that the key signature
that the key signature is valid. A `sig-` prefix would indicate a bad signature, and `sig%` would mean that gpg encountered an error while verifying the is valid. A `sig-` prefix would indicate a bad signature, and `sig%` would mean
signature. It is not necessary to independently verify the authenticity of the that gpg encountered an error while verifying the signature. It is not
RSK, since you already verified the authenticity of the QMSK. necessary to independently verify the authenticity of the RSK, since you
already verified the authenticity of the QMSK.
As a final sanity check, make sure the RSK is in your keyring with the correct As a final sanity check, make sure the RSK is in your keyring with the correct
trust level: trust level:
@ -385,13 +389,13 @@ Each Qubes ISO is accompanied by a set of **cryptographic hash values**
contained in a plain text file ending in `.DIGESTS`, which can find on the contained in a plain text file ending in `.DIGESTS`, which can find on the
[downloads](/downloads/) page alongside the ISO. This file contains the output [downloads](/downloads/) page alongside the ISO. This file contains the output
of running several different cryptographic hash functions on the ISO (a process of running several different cryptographic hash functions on the ISO (a process
known as "hashing") to obtain alphanumeric outputs known as "hash known as "hashing") to obtain alphanumeric outputs known as "hash values" or
values" or "digests." "digests."
One convenient property of hash values is that they can be generated on any One convenient property of hash values is that they can be generated on any
computer. This means, for example, that you can download a Qubes ISO on one computer. This means, for example, that you can download a Qubes ISO on one
computer, hash it, then visually compare that hash value to the one you generated computer, hash it, then visually compare that hash value to the one you
or have saved on a different computer. generated or have saved on a different computer.
In addition to the `.DIGESTS` files on the [downloads](/downloads/) page In addition to the `.DIGESTS` files on the [downloads](/downloads/) page
alongside each ISO, and you can always find all the digest files for every alongside each ISO, and you can always find all the digest files for every