How to verify downloaded kernel integrity (with *.sign files?)
Linux - GeneralThis Linux forum is for general Linux questions and discussion.
If it is Linux Related and doesn't seem to fit in any other forum then this is the place.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
OK thanks, I tried again and still got the same error so I went to the website and copied/pasted the public key, and imported it using gpg. I know I have to 'gpg --verify ... ' now, but I can't figure out the command to use the stored key as the argument (instead of a filename...).
Thanks for your help
Code:
$ gpg --list-keys
/root/.gnupg/pubring.gpg
--------------------------------
pub 1024D/517D0F0E 2000-10-10 Linux Kernel Archives Verification Key <ftpadmin@kernel.org>
sub 4086G/E50A8F2A 2000-10-10
Originally posted by lowpro2k3 I know I have to 'gpg --verify ... ' now, but I can't figure out the command to use the stored key as the argument (instead of a filename...).
You use the command from my first post. The argument is the signature and the file to verify, not the public key.
i've a related question that already goes down this thread....
how about verifying the public key itself and making sure that whatever has been imported does indeed originate from the linux kernel archive and is not some forged man-in-the-middle key ?
i know , i sound paranoid , but i'm curious to know , btw i've read about this in theory (CA and web of trust) but don't know how to make practical use of such things ..etc
It surely is not easy to be sured, but one way is to contact somebody of the kernel development team and ask him/her to tell you the fingerprint of the public key, either by phone or a real mail by post services, or by some other secure way.
You can also verify the key by the fingerprint with someone who has done the verification already.
But you have also to be sure that the person is really the one you think s/he is!
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.