Skip to content

Commit f5f2c3f

Browse files
committed
installation: update signature checking information
- we are now using minisign for improved compatibility - minisign-signed files means 'signify -C' doesn't work anymore, so remove that guidance; we can still use 'sha256 -C' if available, though - minisign workaround didn't work, and isn't necessary any more
1 parent cf94d12 commit f5f2c3f

1 file changed

Lines changed: 40 additions & 21 deletions

File tree

src/installation/index.md

Lines changed: 40 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -67,9 +67,10 @@ on the image to ensure they haven't been tampered with.
6767
Current images are signed using a signify key that is specific to the release.
6868
If you're on Void already, you can obtain the keys from the `void-release-keys`
6969
package, which will be downloaded using your existing XBPS trust relationship
70-
with your mirror. You will also need a copy of
71-
[signify(1)](https://man.voidlinux.org/signify.1); on Void this is provided by
72-
the `outils` package.
70+
with your mirror and package signatures. You will also need a copy of
71+
[signify(1)](https://man.voidlinux.org/signify.1) or
72+
[minisign(1)](https://man.voidlinux.org/minisign.1); on Void, these are provided
73+
by the `outils` or `minisign` packages, respectively.
7374

7475
To obtain `signify` when using a Linux distribution or operating system other
7576
than Void Linux:
@@ -81,37 +82,55 @@ than Void Linux:
8182
distribution.
8283
- Install `signify-osx` with homebrew in macOS.
8384

84-
If you can't obtain `signify` for some reason (e.g. you are on Windows and can't
85-
use WSL or MinGW), you can use
86-
[minisign(1)](https://man.voidlinux.org/minisign.1) to verify the file.
85+
The `minisign` executable is usually provided by a package of the same name, and
86+
can also be installed on Windows, even without WSL or MinGW.
8787

8888
If you are not currently using Void Linux, it will also be necessary to obtain
8989
the appropriate signing key from our Git repository
9090
[here](https://github.com/void-linux/void-packages/tree/master/srcpkgs/void-release-keys/files/).
9191

9292
Once you've obtained the key, you can verify your image with the `sha256sum.sig`
93-
file. The following example demonstrates the verification of the GCP musl
94-
filesystem from the 20191109 release:
93+
and `sha256sum.txt` files. First, you need to verify the authenticity of the
94+
`sha256sum.txt` file.
95+
96+
The following examples demonstrate the verification of the `sha256sum.txt` file
97+
for the 20210930 images. Firstly, with `signify`:
9598

9699
```
97-
$ signify -C -p /etc/signify/void-release-20191109.pub -x sha256sum.sig void-GCP-musl-PLATFORMFS-20191109.tar.xz
100+
$ signify -V -p /etc/signify/void-release-20210930.pub -x sha256sum.sig -m sha256sum.txt
98101
Signature Verified
99-
void-GCP-musl-PLATFORMFS-20191109.tar.xz: OK
100102
```
101103

102-
If the verification process does not produce the expected "OK" status, do not
103-
use it! Please alert the Void Linux team of where you got the image and how you
104-
verified it, and we will follow up on it.
104+
And secondly, with `minisign`:
105+
106+
```
107+
$ minisign -V -p /etc/signify/void-release-20210930.pub -x sha256sum.sig -m sha256sum.txt
108+
Signature and comment signature verified
109+
Trusted comment: timestamp:1634597366 file:sha256sum.txt
110+
```
105111

106-
For verification with `minisign`, it is necessary to rename the `sha256sum.sig`
107-
file to `sha256sum.txt.minisig` and remove the first line from the `.pub`
108-
release key. The following example demonstrates the verification of the
109-
`sha256sum.txt` file from the 20191109 release:
112+
Finally, you need to verify that the checksum for your image matches the one in
113+
the `sha256sum.txt` file. This can be done with the
114+
[sha256(1)](https://man.voidlinux.org/md5.1) utility, again from the `outils`
115+
package, as demonstrated below for the 20210930 `x86_64` image:
110116

111117
```
112-
$ minisign -Vm sha256sum.txt -f -p void-release-20191109.pub
113-
void-release-20191109.pub: Success
118+
$ sha256 -C sha256sum.txt void-live-x86_64-20210930.iso
119+
(SHA256) void-live-x86_64-20210930.iso: OK
114120
```
115121

116-
The same warning as above applies. If the verification process isn't successful,
117-
do not use the file - warn the Void Linux team about it.
122+
Alternatively, if the `sha256` utility isn't available to you, you can compute
123+
the SHA256 hash of the file, e.g. using
124+
[sha256sum(1)](https://man.voidlinux.org/sha256sum.1), and compare it to the
125+
value contained in `sha256sum.txt`:
126+
127+
```
128+
$ sha256sum void-live-x86_64-20210930.iso
129+
45b75651eb369484e1e63ba803a34e9fe8a13b24695d0bffaf4dfaac44783294 void-live-x86_64-20210930.iso
130+
$ grep void-live-x86_64-20210930.iso sha256sum.txt
131+
SHA256 (void-live-x86_64-20210930.iso) = 45b75651eb369484e1e63ba803a34e9fe8a13b24695d0bffaf4dfaac44783294
132+
```
133+
134+
If the verification process does not produce the expected "OK" status, do not
135+
use it! Please alert the Void Linux team of where you got the image and how you
136+
verified it, and we will follow up on it.

0 commit comments

Comments
 (0)