Actions

Download the Whonix ™ Signing Key for VirtualBox, Source Code and APT Repository

From Whonix



Keysigning.jpg

Introduction[edit]

Since all Whonix ™ VirtualBox releases are signed with the same key, it is unnecessary to verify the key every time a new release is announced. Trust in the key might gradually increase over time, but cryptographic signatures must still be verified every time a new release is downloaded.

This page is strongly related to the Placing Trust in Whonix ™ page.

notice Digital signatures can increase security but this requires knowledge. Learn more about digital software signature verification.

Download the OpenPGP Key[edit]

Optional: Complete the steps below if unfamiliar with GnuPG or if they haven't already been performed.

Have GnuPG initialize your user data folder. [1]

gpg --fingerprint

Set warning free permissions.

chmod --recursive og-rwx ~/.gnupg

1. Securely download Patrick Schleizer's (adrelanos') OpenPGP key. [2] [3]

derivative.asc

2. Store the key as derivative.asc.

3. Check fingerprints/owners without importing anything. [4]

gpg --keyid-format long --import --import-options show-only --with-fingerprint derivative.asc

4. Verify the output.

The most important check is confirming the key fingerprint exactly matches the output below. [5]

      Key fingerprint = 916B 8D99 C38E AF5E 8ADC  7A2A 8D66 066A 2EEA CCDA

The message gpg: key 8D66066A2EEACCDA: 104 signatures not checked due to missing keys is related to the The OpenPGP Web of Trust. Advanced users can learn more about this below.

warning Warning:

Do not continue if the fingerprint does not match! This risks using infected or erroneous files! The whole point of verification is to confirm file integrity.

5. Import the key.

gpg --import derivative.asc

The output should include the key was imported.

gpg: Total number processed: 1
gpg:               imported: 1

If the Whonix ™ signing key was already imported in the past, the output should include the key is unchanged.

gpg: Total number processed: 1
gpg:              unchanged: 1

If the following message appears at the end of the output.

gpg: no ultimately trusted keys found

This extra message does not relate to the Whonix ™ signing key itself, but instead usually means the user has not created an OpenPGP key yet, which is of no importance when verifying virtual machine images.

Analyze the other messages as usual.

6. Advanced users can check Web of Trust further below for better security.

7. Complete the Whonix ™ verification steps.

If verifying Whonix ™ images, navigate to the relevant verification page below to finish the process:

Advanced Users[edit]

OpenPGP Web of Trust[edit]

A few people have signed Patrick Schleizer's (adrelanos') OpenPGP key in The OpenPGP Web of Trust.

Jan Dittberner [6] (Debian Developer) [7] signed Patrick's key. So did intrigeri (Tails developer, Debian Developer); Peter Palfrader (Debian Developer); Richard King; and Michael Carbone (accessnow.org).

Users relying on Debian or one of the many Debian derivatives (like Ubuntu) already trust apt, the APT repository of the relevant distribution. This means the Debian keyring can be installed as a trusted source for obtaining Jan's, intrigeri's or Peter's key, to check their signature on Patrick's key.

1. Update the package lists.

sudo apt update

2. Install the Debian keyring.

sudo apt install debian-keyring

3. Extract a signer's key from the Debian keyring and import it into your own keyring.

Here is an example using Jan's key.

gpg --no-default-keyring --keyring /usr/share/keyrings/debian-keyring.gpg --armor --export B2FF1D95CE8F7A22DF4CF09BA73E0055558FB8DD | gpg --import

4. Optional: Try to establish a better trust path to the signer by checking signatures on the signer's key.

Check signatures on Patrick's key.

gpg --check-sigs 916B8D99C38EAF5E8ADC7A2A8D66066A2EEACCDA

The output of the above command should show signatures on Patrick's key, which should include the signer's signature.

Download the signify Key[edit]

Info Advanced users only!

[8]

untrusted comment: Patrick Schleizer adrelanos@riseup.net signify public key
RWQ6KRormNEETq+M8IysxRe/HAWlqZRlO8u7ACIiv5poAW0ztsirOjCQ

Further Reading[edit]

Troubleshooting[edit]

When a GPG error is encountered, first try a web search for the relevant error. The security stackexchange website [archive] can also help to resolve GPG problems. Describe the problem thoroughly, but be sure it is GPG-related and not specific to Whonix ™.

More help resources are available on the Support page.

See Also[edit]

License[edit]

Whonix ™ Main/Project Signing Key wiki page Copyright (C) Amnesia <amnesia at boum dot org>
Whonix ™ Main/Project Signing Key wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP <adrelanos@whonix.org>

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it under certain conditions; see the wiki source code for details.

Footnotes[edit]

  1. This will fix eventual gpg: WARNING: unsafe ownership warnings.
  2. curl --tlsv1.3 --proto =https --max-time 180 --output derivative.asc https://www.whonix.org/derivative.asc

  3. https://forums.whonix.org/t/gpg-show-key-warning-gpg-warning-no-command-supplied-trying-to-guess-what-you-mean/7859 [archive]
  4. Minor changes in the output such as new uids (email addresses) or newer expiration dates are inconsequential.
  5. http://www.dittberner.info/de/content/jan-dittberner [archive]
  6. https://qa.debian.org/developer.php?login=Jan+Dittberner [archive]
  7. -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA512
    
    untrusted comment: Patrick Schleizer adrelanos@riseup.net signify public key
    RWQ6KRormNEETq+M8IysxRe/HAWlqZRlO8u7ACIiv5poAW0ztsirOjCQ
    -----BEGIN PGP SIGNATURE-----
    
    iQKTBAEBCgB9FiEEbpebKKbzfEO+MK+hy41Qu3e7PEgFAl7vdyhfFIAAAAAALgAo
    aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDZF
    OTc5QjI4QTZGMzdDNDNCRTMwQUZBMUNCOEQ1MEJCNzdCQjNDNDgACgkQy41Qu3e7
    PEhVGw/+NtlBOVGoCS+wo9PssSoWVjHH6SfUFuHHGw6uF+tGoz8LowBDJykCWFrS
    UqTPBjxs9e9k8mLqKbvRYLS4MPjs0KP9Nx8kknsHx+t/EArqJ8fIR2Bs8ibVs51e
    LTU+0rP/uK/gimFVR36z9aZbmLvI9n8YrhIO1pZU97bC42h4rDDi/4qSnXHY9wFA
    56AYlgJwOO35aFM/I6eNuOdbqEgutcT5LG2S+BwO3Kg2BuoI+PcVUWjdYcjLJq+n
    8jjkBvLnCPe50CZBGKhd+rkJEd5+OXryxBqJwkRT/vJTfxvzyi8Gsm1cyKbBW1xJ
    YuKB1eY4ABegUa7N3OdUslEEZ3VvgWBqfepUMmNYLjaG8IQ8agYQwSbPnoh4pikq
    WbXFLI6VD/Kz9LkSB7i1GCyj+9GqNwsP7hJPxCUcERYH5dZJsxiX/uuH5cvFM4da
    VwABMrC3w7XTXFTXK/iZDuD8CZPNU3qPiFT4j3xJ48zZxglVFb7sRmmASJajmuJ6
    cv/ZTrNQgVfHsqw0+F9qPr4GZquoGoFpvxIdvPHe1U+uWt2AoLV+f4qvLlPlx7J8
    huftzcpkEKdHE5SKICCUrt3TxQ7JqFXyZBcgh2AaM9p8cqiOY5noLp1tAHzf1dQH
    DTrwKtgBPBUQhwtO0pw4PmeuBqjyzNzYHC68dYrsuKup5Jj+LNw=
    =3/Gv
    -----END PGP SIGNATURE-----
    


Fosshost is sponsors Kicksecure ™ stage server 100px
Fosshost About Advertisements

Search engines: YaCy | Qwant | ecosia | MetaGer | peekier | Whonix ™ Wiki


Follow: 1024px-Telegram 2019 Logo.svg.png Iconfinder Apple Mail 2697658.png Twitter.png Facebook.png Rss.png Reddit.jpg 200px-Mastodon Logotype (Simple).svg.png

Support: Discourse logo.png

Donate: Donate Bank Wire Paypal Bitcoin accepted here Monero accepted here Contribute

Whonix donate bitcoin.png Monero donate Whonix.png United Federation of Planets 1000px.png

Twitter-share-button.png Facebook-share-button.png Telegram-share.png link=mailto:?subject=Main/Project Signing Key&body=../Main/Project_Signing_Key link=https://reddit.com/submit?url=../Main/Project_Signing_Key&title=Main/Project Signing Key link=https://news.ycombinator.com/submitlink?u=../Main/Project_Signing_Key&t=Main/Project Signing Key link=https://mastodon.technology/share?message=Main/Project Signing Key%20../Main/Project_Signing_Key&t=Main/Project Signing Key

We are looking for contributors and developers.

https link onion link Priority Support | Investors | Professional Support

Whonix | © ENCRYPTED SUPPORT LP | Heckert gnu.big.png Freedom Software / Osi standard logo 0.png Open Source (Why?)

The personal opinions of moderators or contributors to the Whonix ™ project do not represent the project as a whole.

By using our website, you acknowledge that you have read, understood and agreed to our Privacy Policy, Cookie Policy, Terms of Service, and E-Sign Consent.