diff --git a/project-security/verifying-signatures.md b/project-security/verifying-signatures.md index 8d6a4a7d..2a483f01 100644 --- a/project-security/verifying-signatures.md +++ b/project-security/verifying-signatures.md @@ -375,11 +375,11 @@ by the QMSK: ```shell_session $ gpg2 --check-signatures "Qubes OS Release X Signing Key" -pub rsa4096 2017-03-06 [SC] - 5817A43B283DE5A9181A522E1848792F9E2795E9 +pub rsa4096 YYYY-MM-DD [SC] + XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX uid [ full ] Qubes OS Release X Signing Key -sig!3 1848792F9E2795E9 2017-03-06 Qubes OS Release X Signing Key -sig! DDFA1A3E36879494 2017-03-08 Qubes Master Signing Key +sig!3 XXXXXXXXXXXXXXXX YYYY-MM-DD Qubes OS Release X Signing Key +sig! DDFA1A3E36879494 YYYY-MM-DD Qubes Master Signing Key gpg: 2 good signatures ``` @@ -397,9 +397,9 @@ As a final sanity check, make sure the RSK is in your keyring with the correct trust level: ```shell_session -$ gpg2 -k "Qubes OS Release" -pub rsa4096 2017-03-06 [SC] - 5817A43B283DE5A9181A522E1848792F9E2795E9 +$ gpg2 -k "Qubes OS Release X Signing Key" +pub rsa4096 YYYY-MM-DD [SC] + XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX uid [ full ] Qubes OS Release X Signing Key ``` @@ -533,7 +533,7 @@ $ gpg2 -v --verify Qubes-RX-x86_64.iso.DIGESTS gpg: armor header: Hash: SHA256 gpg: armor header: Version: GnuPG v2 gpg: original file name='' -gpg: Signature made Tue 20 Sep 2016 10:37:03 AM PDT using RSA key ID 03FA5082 +gpg: Signature made