Add warning about key verification (#431)

This commit is contained in:
Andrew David Wong 2017-10-27 21:21:26 -05:00
parent 60929fac5e
commit fb4e74416b
No known key found for this signature in database
GPG Key ID: 8CE137352A019A17

View File

@ -180,6 +180,10 @@ The steps can be summarised as:
### Get Kali Linux GPG key ### ### Get Kali Linux GPG key ###
**CAUTION:** Before proceeding, please carefully read [On Digital Signatures and Key Verification][qubes-verifying-signatures].
This website cannot guarantee that any PGP key you download from the Internet is authentic.
Always obtain a trusted key fingerprint via other channels, and always check any key you download against your trusted copy of the fingerprint.
This step is required since by (security) default a TemplateVM do not have a This step is required since by (security) default a TemplateVM do not have a
direct Internet connectivity. Users understanding the risks of enabling such direct Internet connectivity. Users understanding the risks of enabling such
access can change this configuration in firewall settings for the TemplateVM. access can change this configuration in firewall settings for the TemplateVM.
@ -193,8 +197,8 @@ access can change this configuration in firewall settings for the TemplateVM.
2. **DO NOT TURN OFF** the DispVM, the `kali-key.asc` file will be copied to 2. **DO NOT TURN OFF** the DispVM, the `kali-key.asc` file will be copied to
the Kali Linux template in a further step. the Kali Linux template in a further step.
3. Make sure the key ID is the valid one listed on the [Kali website]. Ideally, 3. Make sure the key is the authentic Kali key.
verify the fingerprint through other channels as recommended on that link. See the [Kali website] for further advice and instructions on verification.
### Create a Debian 9.0 (Stretch) template ### ### Create a Debian 9.0 (Stretch) template ###
@ -309,6 +313,7 @@ Notes
Thanks to the people in [the discussion thread](https://github.com/QubesOS/qubes-issues/issues/1981). Thanks to the people in [the discussion thread](https://github.com/QubesOS/qubes-issues/issues/1981).
[qubes-verifying-signatures]: /security/verifying-signatures/
[qubes-pentesting]: /doc/pentesting/ [qubes-pentesting]: /doc/pentesting/
[qubes-blackarch]: /doc/pentesting/blackarch/ [qubes-blackarch]: /doc/pentesting/blackarch/
[qubes-ptf]: /doc/pentesting/ptf/ [qubes-ptf]: /doc/pentesting/ptf/
@ -317,7 +322,7 @@ Thanks to the people in [the discussion thread](https://github.com/QubesOS/qubes
[kali]: https://www.kali.org/ [kali]: https://www.kali.org/
[kali-vbox]: https://www.offensive-security.com/kali-linux-vmware-virtualbox-image-download/ [kali-vbox]: https://www.offensive-security.com/kali-linux-vmware-virtualbox-image-download/
[kali website]: https://docs.kali.org/introduction/download-official-kali-linux-images. [kali website]: https://docs.kali.org/introduction/download-official-kali-linux-images
[PTF]: https://www.trustedsec.com/may-2015/new-tool-the-pentesters-framework-ptf-released/ [PTF]: https://www.trustedsec.com/may-2015/new-tool-the-pentesters-framework-ptf-released/