<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<atom:link href="https://dev1galaxy.org/extern.php?action=feed&amp;tid=2390&amp;type=rss" rel="self" type="application/rss+xml" />
		<title><![CDATA[Dev1 Galaxy Forum / [Solved] image verification: bad signature]]></title>
		<link>https://dev1galaxy.org/viewtopic.php?id=2390</link>
		<description><![CDATA[The most recent posts in [Solved] image verification: bad signature.]]></description>
		<lastBuildDate>Mon, 01 Oct 2018 19:43:30 +0000</lastBuildDate>
		<generator>FluxBB</generator>
		<item>
			<title><![CDATA[Re: [Solved] image verification: bad signature]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=12117#p12117</link>
			<description><![CDATA[<p>It&#039;s not working for me today, either. I can --search-keys with my email address and get a list of my public keys. I can&#039;t get the fingerprints and I can&#039;t --recv-keys. Also can&#039;t --refresh-keys on my main machine - I get &quot;keyserver error&quot; with that.</p><p>Searching my email address on the web interface at pgp.mit.edu also fails with:</p><div class="quotebox"><blockquote><div><p>Proxy Error</p><p>The proxy server received an invalid response from an upstream server.<br />The proxy server could not handle the request GET /pks/lookup.</p><p>Reason: Error reading from remote server</p></div></blockquote></div><p>The problem is with them, not with us.</p>]]></description>
			<author><![CDATA[dummy@example.com (fsmithred)]]></author>
			<pubDate>Mon, 01 Oct 2018 19:43:30 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=12117#p12117</guid>
		</item>
		<item>
			<title><![CDATA[Re: [Solved] image verification: bad signature]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=12110#p12110</link>
			<description><![CDATA[<p>Hello </p><p>I cannot retrieve the fingerprint anymore, while it worked two days ago. I have tried your GPG key and Katolaz&#039;s.&#160; </p><div class="codebox"><pre><code>gpg --fingerprint GPGkey/email address
gpg: error reading key: no public key</code></pre></div>]]></description>
			<author><![CDATA[dummy@example.com (HextorBRX)]]></author>
			<pubDate>Mon, 01 Oct 2018 10:10:47 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=12110#p12110</guid>
		</item>
		<item>
			<title><![CDATA[Re: [Solved] image verification: bad signature]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=12090#p12090</link>
			<description><![CDATA[<p>Yeah, I get the &quot;unknown option&quot; message in jessie, but not in ascii. The option is not mentioned in the jessie man page but is in the ascii man page.</p>]]></description>
			<author><![CDATA[dummy@example.com (fsmithred)]]></author>
			<pubDate>Sat, 29 Sep 2018 12:04:20 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=12090#p12090</guid>
		</item>
		<item>
			<title><![CDATA[Re: [Solved] image verification: bad signature]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=12088#p12088</link>
			<description><![CDATA[<p>Ok, it makes sense. </p><p>I am surprised <strong>--ignore-missing</strong> returns &quot;unrecognized option&quot;. Do you have jessie installed? </p><div class="codebox"><pre><code>sha256sum --ignore-missing -c SHA256SUMS</code></pre></div><p><a href="https://ibb.co/iW5h49" rel="nofollow">https://ibb.co/iW5h49</a><br />They use the same option in the Wiki: <a href="https://friendsofdevuan.org/doku.php/devuan_doc:howtos:general_install_information#differences_from_debian" rel="nofollow">https://friendsofdevuan.org/doku.php/de … rom_debian</a></p><div class="codebox"><pre><code>sha256sum -c SHA256SUMS</code></pre></div><p><a href="https://ibb.co/ca7qrp" rel="nofollow">https://ibb.co/ca7qrp</a></p>]]></description>
			<author><![CDATA[dummy@example.com (HextorBRX)]]></author>
			<pubDate>Sat, 29 Sep 2018 03:38:46 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=12088#p12088</guid>
		</item>
		<item>
			<title><![CDATA[Re: [Solved] image verification: bad signature]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=12084#p12084</link>
			<description><![CDATA[<p>These two do the same thing. With the first one, it assumes you mean to use the file with the same name minus the .asc.</p><div class="codebox"><pre><code>gpg --verify SHA256SUMS.asc
gpg --verify SHA256SUMS.asc SHA256SUMS </code></pre></div><p>This didn&#039;t work:</p><div class="codebox"><pre><code>$ sha256sum --ignore-missing -c SHA256SUMS
sha256sum: unrecognized option &#039;--ignore-missing&#039;
Try &#039;sha256sum --help&#039; for more information.</code></pre></div><p>To check a signed iso, I&#039;d do this.</p><div class="codebox"><pre><code>gpg --verify isofile.iso.asc</code></pre></div><p>You could also use a different keyserver. I use MIT because it&#039;s just up the road from here, and I can remember pgp.mit.edu.</p>]]></description>
			<author><![CDATA[dummy@example.com (fsmithred)]]></author>
			<pubDate>Fri, 28 Sep 2018 19:07:33 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=12084#p12084</guid>
		</item>
		<item>
			<title><![CDATA[Re: [Solved] image verification: bad signature]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=12081#p12081</link>
			<description><![CDATA[<p>I copy and paste the correct procedure since the devuan-devs.gpg method is used in the Wiki and the Release Notes: <a href="https://friendsofdevuan.org/doku.php/devuan_doc:howtos:general_install_information#differences_from_debian" rel="nofollow">https://friendsofdevuan.org/doku.php/de … rom_debian</a> <br />Feel free to add some commands if I have missed any. Thanks again.</p><div class="codebox"><pre><code>sha256sum --ignore-missing -c SHA256SUMS
sha256sum &lt;isoname&gt; 
open SHA256SUMS.txt with a text editor and compare the checksums

install the &quot;dirmngr&quot; package
gpg --fingerprint &lt;key-id&gt; https://devuan.org/os/team/
gpg --keyserver=pgp.mit.edu --recv-keys &quot;wholefingerprint&quot;
gpg --verify SHA256SUMS.asc
double-check that the fingerprint of the key matches that of the developer reported on https://devuan.org/os/team
gpg --verify SHA256SUMS.asc SHA256SUMS 
gpg --verify SHA256SUMS.asc &lt;isoname&gt; only if the ISO is signed, which is not the case 

alternative (not recommended)
gpg --import devuan-devs.gpg
gpg --no-default-keyring --keyring ./devuan-devs.gpg --verify SHA256SUMS.asc</code></pre></div>]]></description>
			<author><![CDATA[dummy@example.com (HextorBRX)]]></author>
			<pubDate>Fri, 28 Sep 2018 15:34:21 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=12081#p12081</guid>
		</item>
		<item>
			<title><![CDATA[Re: [Solved] image verification: bad signature]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=12078#p12078</link>
			<description><![CDATA[<div class="quotebox"><cite>HextorBRX wrote:</cite><blockquote><div><p>Is there a way to find the whole fingerprint beforehand? It only appears in the installer-iso README.txt (I have checked them all).</p><p>Edit: fetching the public key via the trusted keyserver requires the following package: <strong>dirmngr</strong></p></div></blockquote></div><p>If you have the key ID, you can get the fingerprint with </p><div class="codebox"><pre><code>gpg --fingerprint &lt;key-id&gt;</code></pre></div><p>Oh, if you don&#039;t have the key ID, you can use the email address. Try it with mine, and you&#039;ll get a list.</p><p>I noticed that about dirmngr in ascii. That must be new - I don&#039;t have that package installed in jessie and gpg has always worked right.</p>]]></description>
			<author><![CDATA[dummy@example.com (fsmithred)]]></author>
			<pubDate>Fri, 28 Sep 2018 13:23:04 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=12078#p12078</guid>
		</item>
		<item>
			<title><![CDATA[Re: [Solved] image verification: bad signature]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=12077#p12077</link>
			<description><![CDATA[<div class="quotebox"><blockquote><div><p>Did you try that?</p></div></blockquote></div><p><a href="https://ibb.co/nHZbwp" rel="nofollow">https://ibb.co/nHZbwp</a><br /><a href="https://linuxmint.com/verify.php" rel="nofollow">https://linuxmint.com/verify.php</a> gpg --keyserver keyserver.ubuntu.com --recv-key &quot;27DE B156 44C6 B3CF 3BD7&#160; D291 300F 846B A25B AE09&quot;</p><p>I got the whole fingerprint when I verified the signature: <strong>gpg --verify SHA256SUMS.asc</strong> or <strong>gpg --no-default-keyring --keyring ./devuan-devs.gpg --verify SHA256SUMS.asc</strong> after importing devuan-devs.gpg</p><p>Is there a way to find the whole fingerprint beforehand? It only appears in the installer-iso README.txt (I have checked them all).</p><p>Edit: fetching the public key via the trusted keyserver requires the following package: <strong>dirmngr</strong></p>]]></description>
			<author><![CDATA[dummy@example.com (HextorBRX)]]></author>
			<pubDate>Fri, 28 Sep 2018 13:06:26 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=12077#p12077</guid>
		</item>
		<item>
			<title><![CDATA[Re: [Solved] image verification: bad signature]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=12076#p12076</link>
			<description><![CDATA[<p>&#039;Cause it&#039;s too much to type, and I got lucky and saw my own name when I used just eight characters. If someone else&#039;s name showed up, I&#039;d use 16. I&#039;m not sure if using the whole fingerprint number works with --recv-keys. Did you try that?</p>]]></description>
			<author><![CDATA[dummy@example.com (fsmithred)]]></author>
			<pubDate>Fri, 28 Sep 2018 10:49:03 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=12076#p12076</guid>
		</item>
		<item>
			<title><![CDATA[Re: [Solved] image verification: bad signature]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=12075#p12075</link>
			<description><![CDATA[<p>I understand everything except the public key part. </p><p><span class="bbu">You do that</span>: <br />fsmithred: <strong>gpg --keyserver=pgp.mit.edu --recv-keys 094C5620 </strong><br />Katolaz: <strong>gpg --keyserver=pgp.mit.edu --recv-keys 0B5F062F</strong></p><div class="quotebox"><blockquote><div><p>Since it&#039;s possible for two keys to have the same ID, the fingerprint gives you a more reliable indicator of whether it&#039;s the right key or not.</p></div></blockquote></div><p><span class="bbu">Then, why don&#039;t you do this instead? </span><br />fsmithred: <strong>gpg --keyserver=pgp.mit.edu --recv-keys &quot;67F5 0132 1627 1E85 C251&#160; E480 A738 23D3 094C 5620&quot;</strong></p>]]></description>
			<author><![CDATA[dummy@example.com (HextorBRX)]]></author>
			<pubDate>Fri, 28 Sep 2018 10:35:21 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=12075#p12075</guid>
		</item>
		<item>
			<title><![CDATA[Re: [Solved] image verification: bad signature]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=12059#p12059</link>
			<description><![CDATA[<p>I&#039;ll tell you what I know. The digits before the key ID in the fingerprint are, well... the fingerprint. Since it&#039;s possible for two keys to have the same ID, the fingerprint gives you a more reliable indicator of whether it&#039;s the right key or not. I don&#039;t know how that gets calculated.</p><p>This will get my public key from a public keyserver.</p><div class="codebox"><pre><code>gpg --keyserver=pgp.mit.edu --recv-keys 094c5620</code></pre></div><p>Here&#039;s what I do to verify. I can&#039;t guarantee that it&#039;s right, but the output looks good.</p><div class="codebox"><pre><code>$ gpg --verify SHA256SUMS.asc 
gpg: assuming signed data in `SHA256SUMS&#039;
gpg: Signature made Wed 06 Jun 2018 05:49:36 PM EDT using RSA key ID 094C5620
gpg: Good signature from &quot;fsmithred (aka fsr) &lt;fsmithred@gmail.com&gt;&quot;</code></pre></div><p>We don&#039;t sign the isos. We sign the SHA256SUMS file. If the checksum on the iso matched what&#039;s in the file we signed, it&#039;s good.</p><p>If I try to verify KatolaZ&#039;s signature on a computer that doesn&#039;t already have his public key, I get this (using the SHASUMS from the installer isos):</p><div class="codebox"><pre><code>$ gpg --verify SHA256SUMS.asc 
gpg: assuming signed data in &#039;SHA256SUMS&#039;
gpg: Signature made Wed 06 Jun 2018 06:55:55 PM UTC
gpg:                using DSA key 8E59D6AA445EFDB4A1533D5A5F20B3AE0B5F062F
gpg: Can&#039;t check signature: No public key</code></pre></div>]]></description>
			<author><![CDATA[dummy@example.com (fsmithred)]]></author>
			<pubDate>Thu, 27 Sep 2018 19:01:36 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=12059#p12059</guid>
		</item>
		<item>
			<title><![CDATA[[Solved] image verification: bad signature]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=12056#p12056</link>
			<description><![CDATA[<p>Hello </p><p>I read &quot;bad signature&quot; for every image I download when I run <em>gpg --verify SHA256SUMS nameoftheiso</em> </p><p>Here is what I do, in that order: <br /><span class="bbu">Verify the integrity of SHA256SUMS</span><br />sha256sum --ignore-missing -c SHA256SUMS<br /><span class="bbu">Verify the integrity of the ISO by comparing the output with that of the SHA256SUMS.txt</span><br />sha256sum nameoftheiso<br /><span class="bbu">Download and import the public key from <a href="https://files.devuan.org/" rel="nofollow">https://files.devuan.org/</a></span><br />gpg --import devuan-devs.gpg<br /><span class="bbu">Verify the signature</span><br />gpg --no-default-keyring --keyring ./devuan-devs.gpg --verify SHA256SUMS.asc <br />double-check that the fingerprint of the key matches that of the developer reported on <a href="https://devuan.org/os/team" rel="nofollow">https://devuan.org/os/team</a>&#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; <br /><span class="bbu">Verify that SHA256SUMS is signed by one of the devs</span><br />gpg --verify SHA256SUMS.asc SHA256SUMS<br /><span class="bbu">Verify that the ISO is signed by one of the devs</span><br />gpg --verify SHA256SUMS.asc nameoftheiso</p><p>There are quite a few things I would like to understand. <br />Firstly, I would like to understand why the last command returns &quot;bad signature&quot;. That would be great!<br /><a href="https://ibb.co/hvADrp" rel="nofollow">https://ibb.co/hvADrp</a><br />Secondly, I would like to know the &quot;correct procedure&quot; to import the public key. I quote the Release Notes: </p><div class="quotebox"><blockquote><div><p>The &#039;devuan-devs.gpg&#039; keyring is provided only for convenience. The most correct procedure to verify that the signatures are authentic is by downloading the relevant public keys from a trusted keyserver</p></div></blockquote></div><p>So far, I have always downloaded the devuan-devs.gpg from the Devuan Download Zone. <br />Thirdly, I do not quite understand the primary key fingerprint on the screenshot below, more particularly the following numbers before the developer&#039;s GPG key: 67F5 0132 1627 1E85 C251&#160; &#160;E480<br /><a href="https://ibb.co/fyyGBp" rel="nofollow">https://ibb.co/fyyGBp</a></p><div class="quotebox"><blockquote><div><p>The &#039;devuan-devs.gpg&#039; keyring is provided only for convenience. The most correct procedure to verify that the signatures are authentic is by downloading the relevant public keys from a trusted keyserver, double-check that the fingerprint of the key matches that of the developer reported on <a href="https://devuan.org/os/team" rel="nofollow">https://devuan.org/os/team</a> and then use that key for verification.</p></div></blockquote></div><p>Am I doing this right? I wonder <img src="https://dev1galaxy.org/img/smilies/smile.png" width="15" height="15" alt="smile" /> </p><p>Many thanks</p>]]></description>
			<author><![CDATA[dummy@example.com (HextorBRX)]]></author>
			<pubDate>Thu, 27 Sep 2018 15:29:58 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=12056#p12056</guid>
		</item>
	</channel>
</rss>
