• Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Campbell Ritchie
  • Jeanne Boyarsky
  • Ron McLeod
  • Paul Clapham
  • Liutauras Vilda
Sheriffs:
  • paul wheaton
  • Rob Spoor
  • Devaka Cooray
Saloon Keepers:
  • Stephan van Hulst
  • Tim Holloway
  • Carey Brown
  • Frits Walraven
  • Tim Moores
Bartenders:
  • Mikalai Zaikin

PGP verifying Tomcat release

 
Ranch Hand
Posts: 192
  • Number of slices to send:
    Optional 'thank-you' note:
Hello. I have done this before but for some reason I'm stumped. I am trying to verify Tomcat zip download. I donloaded the zip and the pgp link (asc file). On the command line in the GPG executable directory, I enter...

gpg --verify   apache-tomcat-9.0.84-windows-x64.zip.asc   apache-tomcat-9.0.84-windows-x64.zip

and it returns

gpg: Signature made 12/7/2023 2:23:44 PM Eastern Standard Time
gpg: using RSA key 48F8..blah...blah
gpg: Can't check signature: No public key

is there something up with what I downloaded? thank you.
 
Marshal
Posts: 4533
572
  • Number of slices to send:
    Optional 'thank-you' note:
It looks like the issue is that you no not have the corresponding public key for the private key used to sign the package.

I'm not sure who/what are the trusted sources for these keys, but as a test, I imported the public key from the pgpkeys.mit.edu keyserver, and I was able to verify the package (but not able to verify the public key).

 
Thomas Griffith
Ranch Hand
Posts: 192
  • Number of slices to send:
    Optional 'thank-you' note:
Hi. Did it take forever to return that key? I tried that command line as well as a search on the mit site web interface and everything just hangs then fails.
 
Thomas Griffith
Ranch Hand
Posts: 192
  • Number of slices to send:
    Optional 'thank-you' note:
ok, I think I imported 1 key. Had a character off. I'll try to verify again.

Where is the imported key stored?
 
Saloon Keeper
Posts: 27868
196
  • Number of slices to send:
    Optional 'thank-you' note:
This might help: http://www.pmsas.pr.gov.br/wp-content/?id=coderanch-1z0-809&exam=t/544066/application-servers/verify-Tomcat-files-PGP

Also, I think the code-signing keys are here: https://downloads.apache.org/tomcat/tomcat-9/KEYS
 
Thomas Griffith
Ranch Hand
Posts: 192
  • Number of slices to send:
    Optional 'thank-you' note:
ok, thank you for the help, guys. With those links and https://www.apache.org/info/verification.html I was able to get it down to where Ron was and need to verify if that signer is real. I think there is a list somewhere mapping public key with signer name.
 
Thomas Griffith
Ranch Hand
Posts: 192
  • Number of slices to send:
    Optional 'thank-you' note:
Hello. I was just coming back to this and was wondering if anybody was having trouble with the verifying the public key signer step...i,e, searching http://pgpkeys.mit.edu/ to match fingerprint from downloaded public key with web of trust fingerprint on the mit server?

I tried searching "Remy", "remm@apache.org" and various segments of the fingerprint below...

Primary key fingerprint: 48F8 E69F 6390 C9F2 5CFE  DCD2 6824 8959 359E 722B

It keeps timing out/throwing Exception raised/etc. I thought I remembered at this step the mit server is supposed to return a list of public keys and fingerprints and you find the match to verify.

thank you.
 
Tim Holloway
Saloon Keeper
Posts: 27868
196
  • Number of slices to send:
    Optional 'thank-you' note:
I got kind of curious about this myself this morning. It has been a long time since I meddled with that stuff so some refreshing was in order.

I got to thinking about the chain of trust on my own gpg key and realized that I probably haven't got it on file on any of the public key repositories. But you should be able to trust it because you can download it from a secured URL whose chain of trust goes through LetsEncrypt.

In much the same way you should be able to trust files downloaded directly from https://tomcat.apache.org/download-90.cgi. It's SSL-secured by the master apache.org LetsEncrypt cert until March 2024 so in order to corrupt the files you download from there, the actual Tomcat website would have to be compromised, which I don't think has ever happened.

Now on the other hand, if you want to import the Tomcat code-signers keys, you just have to import the KEYS file from the Tomcat site (which, again, is SSL-secured).

The instructions given are out of date, however as they pertain to pgp and pgp is no longer supplied for Linux due, I think, to its proprietary nature. So instead of this command:

Do this, instead:

That's assuming that you used your browser to save https://tomcat.apache.org/download-90.cgi as ~/Desktop/KEYS. Adjust the filename and path to suit your convenience. You may be able to pull straight from the URL if you RTFM but this was an experiment that worked, so good enough for me.

The gpg utility will take pretty much any text file in because it is looking for armor blocks. Any lines outside of those blocks is simply ignored.

Now my keyring contains these additions:pub   dsa1024 2004-09-12 [SC]
     DCFD35E0BF8CA7344752DE8B6FB21E8933C60243
uid           [ unknown] Mark E D Thomas <markt@apache.org>
uid           [ unknown] Mark E D Thomas <med.thomas@virgin.net>
uid           [ unknown] Mark E D Thomas <mark.thomas@springsource.com>
sub   elg2048 2004-09-12 [E]

pub   rsa4096 2009-09-18 [SC]
     A9C5DF4D22E99998D9875A5110C01C5A2F6059E7
uid           [ unknown] Mark E D Thomas <markt@apache.org>
sub   rsa4096 2009-09-18 [E]

pub   rsa4096 2019-05-05 [SC]
     48F8E69F6390C9F25CFEDCD268248959359E722B
uid           [ unknown] Remy Maucherat <remm@apache.org>
sub   rsa4096 2019-05-05 [E]

and I should be able to run gpg verify on my downloads.
 
Don't get me started about those stupid light bulbs.
reply
    Bookmark Topic Watch Topic
  • New Topic
vceplus-200-125    | boson-200-125    | training-cissp    | actualtests-cissp    | techexams-cissp    | gratisexams-300-075    | pearsonitcertification-210-260    | examsboost-210-260    | examsforall-210-260    | dumps4free-210-260    | reddit-210-260    | cisexams-352-001    | itexamfox-352-001    | passguaranteed-352-001    | passeasily-352-001    | freeccnastudyguide-200-120    | gocertify-200-120    | passcerty-200-120    | certifyguide-70-980    | dumpscollection-70-980    | examcollection-70-534    | cbtnuggets-210-065    | examfiles-400-051    | passitdump-400-051    | pearsonitcertification-70-462    | anderseide-70-347    | thomas-70-533    | research-1V0-605    | topix-102-400    | certdepot-EX200    | pearsonit-640-916    | itproguru-70-533    | reddit-100-105    | channel9-70-346    | anderseide-70-346    | theiia-IIA-CIA-PART3    | certificationHP-hp0-s41    | pearsonitcertification-640-916    | anderMicrosoft-70-534    | cathMicrosoft-70-462    | examcollection-cca-500    | techexams-gcih    | mslearn-70-346    | measureup-70-486    | pass4sure-hp0-s41    | iiba-640-916    | itsecurity-sscp    | cbtnuggets-300-320    | blogged-70-486    | pass4sure-IIA-CIA-PART1    | cbtnuggets-100-101    | developerhandbook-70-486    | lpicisco-101    | mylearn-1V0-605    | tomsitpro-cism    | gnosis-101    | channel9Mic-70-534    | ipass-IIA-CIA-PART1    | forcerts-70-417    | tests-sy0-401    | ipasstheciaexam-IIA-CIA-PART3    | mostcisco-300-135    | buildazure-70-533    | cloudera-cca-500    | pdf4cert-2v0-621    | f5cisco-101    | gocertify-1z0-062    | quora-640-916    | micrcosoft-70-480    | brain2pass-70-417    | examcompass-sy0-401    | global-EX200    | iassc-ICGB    | vceplus-300-115    | quizlet-810-403    | cbtnuggets-70-697    | educationOracle-1Z0-434    | channel9-70-534    | officialcerts-400-051    | examsboost-IIA-CIA-PART1    | networktut-300-135    | teststarter-300-206    | pluralsight-70-486    | coding-70-486    | freeccna-100-101    | digitaltut-300-101    | iiba-CBAP    | virtuallymikebrown-640-916    | isaca-cism    | whizlabs-pmp    | techexams-70-980    | ciscopress-300-115    | techtarget-cism    | pearsonitcertification-300-070    | testking-2v0-621    | isacaNew-cism    | simplilearn-pmi-rmp    | simplilearn-pmp    | educationOracle-1z0-809    | education-1z0-809    | teachertube-1Z0-434    | villanovau-CBAP    | quora-300-206    | certifyguide-300-208    | cbtnuggets-100-105    | flydumps-70-417    | gratisexams-1V0-605    | ituonline-1z0-062    | techexams-cas-002    | simplilearn-70-534    | pluralsight-70-697    | theiia-IIA-CIA-PART1    | itexamtips-400-051    | pearsonitcertification-EX200    | pluralsight-70-480    | learn-hp0-s42    | giac-gpen    | mindhub-102-400    | coursesmsu-CBAP    | examsforall-2v0-621    | developerhandbook-70-487    | root-EX200    | coderanch-1z0-809    | getfreedumps-1z0-062    | comptia-cas-002    | quora-1z0-809    | boson-300-135    | killtest-2v0-621    | learncia-IIA-CIA-PART3    | computer-gcih    | universitycloudera-cca-500    | itexamrun-70-410    | certificationHPv2-hp0-s41    | certskills-100-105    | skipitnow-70-417    | gocertify-sy0-401    | prep4sure-70-417    | simplilearn-cisa    |
http://www.pmsas.pr.gov.br/wp-content/    | http://www.pmsas.pr.gov.br/wp-content/    |