Actions

Verify Virtual Machine Images on the Command Line

From Whonix

< VirtualBox



notice Digital signatures can increase security but this requires knowledge. Learn more about digital software signature verification.

In order to verify the Whonix ™ image, GnuPG must be installed. GnuPG is the common OpenPGP implementation for Linux: it is installed by default in Debian, Ubuntu, Whonix ™ and many other distributions.

1. Import the signing key.

Refer the the more secure, detailed Whonix ™ Signing Key instructions.

derivative.asc

2. Download the cryptographic (OpenPGP) signature corresponding to the virtual machine image you want to verify.

3. Save the signature in the same folder as the virtual machine image.

Whonix ™ VirtualBox CLI:

Whonix ™ VirtualBox XFCE:

Alternatively press the [Expand] button next to the "Free Download" button on the download page VirtualBox/CLI or VirtualBox/XFCE. [1]

4. Start the cryptographic verification.

This process can take several minutes.

cd [the directory in which you downloaded the .ova and the .asc]

gpg --verify-options show-notations --verify Whonix-*.ova.asc Whonix-*.ova

5. Check the output of the verification step.

If the virtual machine image is correct, the output will inform that the signature is good:

gpg: Signature made Mon 19 Jan 2015 11:45:41 PM CET using RSA key ID 77BB3C48
gpg: Good signature from "Patrick Schleizer <adrelanos@riseup.net>" [unknown]
gpg: Signature notation: issuer-fpr@notations.openpgp.fifthhorseman.net=6E979B28A6F37C43BE30AFA1CB8D50BB77BB3C48
gpg: Signature notation: file@name=Whonix-16.0.3.7.ova
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 916B 8D99 C38E AF5E 8ADC  7A2A 8D66 066A 2EEA CCDA
     Subkey fingerprint: 6E97 9B28 A6F3 7C43 BE30  AFA1 CB8D 50BB 77BB 3C48

This output might be followed by a warning as follows.

gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.

The above "gpg: WARNING" can be ignored since it does not alter the validity of the signature related to the downloaded key. Rather, this warning refers to the level of trust placed in the developers signing key and the web of trust. To remove this warning, the developers signing key must be personally signed with your own key.

warning Check the GPG signature timestamp makes sense. For example, if you previously saw a signature from 2021 and now see a signature from 2020, then this might be a targeted rollback (downgrade) or indefinite freeze attack. [2]

The first line includes the signature creation timestamp; see the example below.

gpg: Signature made Mon 19 Jan 2015 11:45:41 PM CET using RSA key ID 77BB3C48

warning Note: OpenPGP signatures sign files, but not file names. [3]

The file@name OpenPGP notation in Whonix ™ release signatures describes the file name. This helps to confirm that the file name has not been tampered with; see the example below.

gpg: Signature notation: file@name=Whonix-16.0.3.7.ova

If the Virtual Machine image is not correct, the output will inform that the signature is bad:

gpg: Signature made Sun Nov 25 21:48:54 2012 UTC
gpg:                using RSA key 77BB3C48
gpg: BAD signature from "Patrick Schleizer <adrelanos@riseup.net>"

Ambox warning pn.svg.png Do not continue if verification fails! This risks using infected or erroneous files! The whole point of verification is to confirm file integrity. This page is strongly related to the pages Placing Trust in Whonix ™ and Verifying Software Signatures.

Troubleshooting[edit]

When a GPG error is encountered, first try a web search for the relevant error. The security stackexchange website [archive] can also help to resolve GPG problems. Describe the problem thoroughly, but be sure it is GPG-related and not specific to Whonix ™.

More help resources are available on the Support page.

Footnotes[edit]

  1. This expands the download table with links to signatures. If you enabled noscript / disabled javascript this will not be necessary.
  2. As defined by TUF: Attacks and Weaknesses:
  3. https://lists.gnupg.org/pipermail/gnupg-users/2015-January/052185.html [archive]

License[edit]

Whonix ™ VirtualBox/Verify the virtual machine images using the command line wiki page Copyright (C) Amnesia <amnesia at boum dot org>
Whonix ™ VirtualBox/Verify the virtual machine images using the command line wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP <adrelanos@whonix.org>

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it under certain conditions; see the wiki source code for details.



Fosshost is sponsors Kicksecure ™ stage server 100px
Fosshost About Advertisements

Search engines: YaCy | Qwant | ecosia | MetaGer | peekier | Whonix ™ Wiki


Follow: 1024px-Telegram 2019 Logo.svg.png Iconfinder Apple Mail 2697658.png Twitter.png Facebook.png Rss.png Reddit.jpg 200px-Mastodon Logotype (Simple).svg.png

Support: Discourse logo.png

Donate: Donate Bank Wire Paypal Bitcoin accepted here Monero accepted here Contribute

Whonix donate bitcoin.png Monero donate Whonix.png United Federation of Planets 1000px.png

Twitter-share-button.png Facebook-share-button.png Telegram-share.png link=mailto:?subject=VirtualBox/Verify the virtual machine images using the command line&body=../VirtualBox/Verify_the_virtual_machine_images_using_the_command_line link=https://reddit.com/submit?url=../VirtualBox/Verify_the_virtual_machine_images_using_the_command_line&title=VirtualBox/Verify the virtual machine images using the command line link=https://news.ycombinator.com/submitlink?u=../VirtualBox/Verify_the_virtual_machine_images_using_the_command_line&t=VirtualBox/Verify the virtual machine images using the command line link=https://mastodon.technology/share?message=VirtualBox/Verify the virtual machine images using the command line%20../VirtualBox/Verify_the_virtual_machine_images_using_the_command_line&t=VirtualBox/Verify the virtual machine images using the command line

Follow us on Twitter.png Twitter / Facebook.png Facebook.

https link onion link Priority Support | Investors | Professional Support

Whonix | © ENCRYPTED SUPPORT LP | Heckert gnu.big.png Freedom Software / Osi standard logo 0.png Open Source (Why?)

The personal opinions of moderators or contributors to the Whonix ™ project do not represent the project as a whole.

By using our website, you acknowledge that you have read, understood and agreed to our Privacy Policy, Cookie Policy, Terms of Service, and E-Sign Consent.