mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #1525] Please add a .sig file #1019
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#1019
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @elhanan on GitHub (Sep 3, 2017).
Original GitHub issue: https://github.com/netblue30/firejail/issues/1525
I'm unable to use your public key to verify firejail or firetools because you don't make a .sig file available for download. Is there another way to verify firejail and firetools than using a .sig file? 'sha256sum' merely tells me I downloaded the file without error. But it does not provide any security assurance. So the 'sha256sum's are not enough for me. I need a security assurance that the programs came from you by providing a .sig file along with your public key. Will you please provide me a .sig file or tell me how to use your public key without one?
@SkewedZeppelin commented on GitHub (Sep 3, 2017):
All the releases on SourceForge have .asc files alongside them.
https://sourceforge.net/projects/firejail/files/firejail/
The key itself is F951164995F5C4006A73411E2CCB36ADFC5849A7
http://keys.gnupg.net/pks/lookup?op=vindex&fingerprint=on&search=0x2CCB36ADFC5849A7
Import it using
gpg --keyserver keys.gnupg.net --recv-keys F951164995F5C4006A73411E2CCB36ADFC5849A7To verify download the package of choice and the versioned .asc then run the following
Fair warning, some downloaders seem to mangle the ~ in filenames, Chrom* for example will replace it with a hyphen.
@elhanan commented on GitHub (Sep 4, 2017):
Thank you, that worked perfectly. Do I need to run sha256sum separately on the .rpm or .deb packages, or does the sha256sum --check on the .asc file do that for me? I've only ever verified packages using .sig files before. So sorry for being in the dark. No wonder searching the GNU docs didn't help me; I was searching for .sig instructions. Thanks again.
@SkewedZeppelin commented on GitHub (Sep 4, 2017):
If you open up the .asc in any text editor it'll show you what files it has hashes for
@elhanan commented on GitHub (Oct 21, 2017):
Yes, of course. I knew that. But what I was trying to say was do I have to open it in any text editor to verify it myself, or does the commands you helped me with verify that the hashes of the programs match the ones in the file that I can check manually? So basically, do I need to open that file in a text editor if I already ran those commands?