From b0c622da7c0a8bdabb33d63fd0c2d7c2b9df02ef Mon Sep 17 00:00:00 2001 From: Alex Legler Date: Thu, 2 Apr 2015 11:09:31 +0200 Subject: Initial version --- downloads/signatures/index.html | 74 +++++++++++++++++++++++++++++++++++++++++ 1 file changed, 74 insertions(+) create mode 100644 downloads/signatures/index.html (limited to 'downloads/signatures') diff --git a/downloads/signatures/index.html b/downloads/signatures/index.html new file mode 100644 index 0000000..4b12a62 --- /dev/null +++ b/downloads/signatures/index.html @@ -0,0 +1,74 @@ +--- +title: 'Release Media Signatures' +navtitle: 'Signatures' +nav1: downloads +nav2: signatures +nav2-show: true +--- + +

+ Our current releases are signed with either of these keys or any sub keys: +

+ + + + + + + + + + + + + + + + + + + + + + + + + + +
Key ID/Type/FingerprintDescriptionCreatedExpired
0xBB572E0E2D182910 (4096-bit RSA)
+ 13EB BDBE DE7A 1277 5DFD B1BA BB57 2E0E 2D18 2910
Gentoo Linux Release Engineering (Automated Weekly Release Key)2009-08-252015-08-24
0xDB6B8C1F96D8BF6D (4096-bit RSA)
+ DCD0 5B71 EAB9 4199 527F 44AC DB6B 8C1F 96D8 BF6D
Gentoo Portage Snapshot Signing Key (Automated Signing Key)2011-11-252015-11-24
0x9E6438C817072058 (1024-bit DSA)
+ D99E AC73 79A8 50BC E47D A5F2 9E64 38C8 1707 2058
Gentoo Linux Release Engineering (Gentoo Linux Release Signing Key)2004-07-202016-08-13
+ +
+
+
+
+

Verifying Files

+
+
+

To verify downloaded files are not tampered with, you need the .DIGESTS file matching your release and the matching key from the table above.

+ +

Fetch the key:

+ +

gpg --keyserver hkps.pool.sks-keyservers.net --recv-keys <key id>

+ +

Verify the DIGESTS file:

+ +

gpg --verify <foo.DIGESTS.asc>

+ +

Verify the download matches the digests. At least one of the following will exist:

+ +

sha512sum -c <foo.DIGESTS.asc>

+

sha256sum -c <foo.DIGESTS.asc>

+

sha1sum -c <foo.DIGESTS.asc>

+ +
+ +
+ Detailed instructions are available in the Gentoo Handbook. +
+
+
+
+
\ No newline at end of file -- cgit v1.2.3