-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

On 2018-01-01 10:44, Kyle Breneman wrote:
> I have successfully verified the fingerprint for the Qubes Master 
> Signing Key.  I have verified the Release 3 ISO signature using
> the Qubes Release 3 Signing Key. How do I verify that the Release
> 3 signing key is good? Do I somehow use the Qubes Master Signing
> Key to verify the authenticity of the Release 3 Signing Key?

Yes. The Release 3 Signing Key is signed by the Qubes Master Signing
Key, and you can check this signature in order to verify that the
Release 3 Signing Key is authentic.

> If so, please explain how to do this with gpg4win? Thanks!
> 

I don't use gpg4win, so I'm afraid I can't provide instructions for
that program. However, I can show you how to do it in GnuPG (on
Linux). Perhaps gpg4win has a way to accept GnuPG commands, or perhaps
this will help you search for the equivalent gpg4win instructions.

Here's how I'd do it in GnuPG:

======

$ gpg2 --check-signatures C52261BE0A823221D94CA1D1CB11CA1D03FA5082
pub   rsa4096 2014-11-19 [SC]
      C52261BE0A823221D94CA1D1CB11CA1D03FA5082
uid           [  full  ] Qubes OS Release 3 Signing Key
sig!3        CB11CA1D03FA5082 2014-11-19  Qubes OS Release 3 Signing Key
sig!         DDFA1A3E36879494 2014-11-19  Qubes Master Signing Key

gpg: 2 good signatures

$ gpg2 --fingerprint DDFA1A3E36879494
pub   rsa4096 2010-04-01 [SC]
      427F 11FD 0FAA 4B08 0123  F01C DDFA 1A3E 3687 9494
uid           [ultimate] Qubes Master Signing Key

======

First, we check the signatures on the Release 3 Signing Key and find
that there are two good signatures: one from the Release 3 Signing Key
itself and one from a key named "Qubes Master Signing Key." Since
anyone can create a key with this name, we then check that the full
fingerprint of the key claiming to be the Qubes Master Signing Key
matches the fingerprint we've obtained and verified through multiple
independent channels.

In this case, the signature check shows us the long-form ID of each
signing key, which is probably not easy to forge (much harder than the
short-form, at least), but it's still safer to check the full
fingerprint.

Since I've already set the trust level of the Qubes Master Signing Key
to "ultimate" in this keyring, the Release 3 Signing Key automatically
has a trust level of "full" (given the default trust model) because
it's signed by the Qubes Master Signing Key.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-----BEGIN PGP SIGNATURE-----
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=NqUe
-----END PGP SIGNATURE-----

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a4e63d86-2bf3-b4c7-4d95-dd9e6a7ee001%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.

Reply via email to