Verifying signatures for Qubes OS
NOTE: For all of the commands below, using gpg
seems to work just as well as gpg2
.
gpg2 --fetch-keys https://keys.qubes-os.org/keys/qubes-master-signing-key.asc
gpg2 -k
gpg2 --fingerprint <QMSK_ID>
gpg2 --edit-key <QMSK_ID>
The above command opens a little GPG REPL. In there, do:
fpr
trust
q
And then confirm that the trust level was applied correctly:
gpg2 -k "Qubes Master Signing Key"
gpg2 --keyserver-options no-self-sigs-only,no-import-clean --import path/to/qubes-release-X-signing-key.asc
gpg2 --check-signatures "Qubes OS Release X Signing Key"
gpg2 -k "Qubes OS Release X Signing Key"
.DIGESTS
file's actual filename.sha512sum -c path/to/Qubes-X-x86_64.iso.DIGESTS
You should see something like:
Qubes-X-x86_64.iso: OK
sha512sum: WARNING: 23 lines are improperly formatted
.DIGESTS
file was signed by the release signing key:gpg2 -v --verify path/to/Qubes-X-x86_64.iso.DIGESTS