-
Notifications
You must be signed in to change notification settings - Fork 181
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Sign releases on github #761
Comments
I see that a checksum file is provided, but it is not signed. Nor does it include previous versions. A solution to this ticket would be to sign the releases directly or to sign a checksum file, but a cryptographic signature (made by some private key that is not uploaded to any publishing infrastructure) is necessary to provide cryptographic authenticty verification of the releases. And the verification process should be documented, as described in the OP above. |
Curiously I see that the footer of the official dangerzone website lists the fingerprint of the official release signing key, and it links to the key on the keyserver:
But, again, there's no documentation on how to download the actual release's signatures and verify them. If this is currently possible, then it should be documented and linked-to from the downloads page. |
That's a very nice dig, thanks a lot for opening this issue. Ok, here's what's going on with regards to hashing/signing our artifacts:
The above steps should be enough for the majority of our users, who will not check signatures/hashes of artifacts. I agree though that we can go one step further and sign them ourselves with the key we use for signing Linux packages. We can try to do so in the next release. |
@maltfield Until the next release, here's a signed checksum file for 0.6.0:
As you've already pointed out, the public key is here: https://keys.openpgp.org/vks/v1/by-fingerprint/DE28AB241FA48260FAC9B8BAA7C9B38522604281 |
Add a section for our end-users in INSTALL.md, that explains how to verify that our Dangerzone assets have been signed by our advertised signing key. This section explains what are the .asc files that users see next to our release assets, and how they can verify each asset individually using GPG. Closes #761
Add a section for our end-users in INSTALL.md, that explains how to verify that our Dangerzone assets have been signed by our advertised signing key. This section explains what are the .asc files that users see next to our release assets, and how they can verify each asset individually using GPG. Closes #761
Add a section for our end-users in INSTALL.md, that explains how to verify that our Dangerzone assets have been signed by our advertised signing key. This section explains what are the .asc files that users see next to our release assets, and how they can verify each asset individually using GPG. It is heavily inspired by a similar section for OnionShare. Closes #761
Add a section for our end-users in INSTALL.md, that explains how to verify that our Dangerzone assets have been signed by our advertised signing key. This section explains what are the .asc files that users see next to our release assets, and how they can verify each asset individually using GPG. It is heavily inspired by a similar section for OnionShare. Closes #761
Add a section for our end-users in INSTALL.md, that explains how to verify that our Dangerzone assets have been signed by our advertised signing key. This section explains what are the .asc files that users see next to our release assets, and how they can verify each asset individually using GPG. It is heavily inspired by a similar section for OnionShare. Closes #761
We have some good news on this front. We have updated our 0.6.0 release page with signatures for our assets. Also, we now have a section in our installation guide on how to verify these signatures. Finally, once Dangerzone 0.6.1 is out, our https://dangerzone.rocks site will be updated to link to those instructions (see freedomofpress/dangerzone.rocks#37). Thanks again @maltfield for giving us the nudge to improve our security posture here 🙂 . |
Description
Currently it is not possible to verify the authenticity or cryptographic integrity of the downloads from github.com because the releases are not cryptographically signed.
This makes it hard for dangerzone users to safely obtain the dangerzone software.
Steps to Reproduce
This is also an issue on github.com
Releases
.dmg
and.msi
files, but no signaturesExpected behavior: [What you expected to happen]
A few things are expected:
SHA256SUMS.asc
file) along with the release itselfActual behavior: [What actually happened]
There's just literally no information on verifying downloads, and it appears that it is not possible to do so.
Versions
Everything, all versions
The text was updated successfully, but these errors were encountered: