diff --git a/docs/en/verifying-signatures.wml b/docs/en/verifying-signatures.wml index 89522d42..da1f4ebb 100644 --- a/docs/en/verifying-signatures.wml +++ b/docs/en/verifying-signatures.wml @@ -207,8 +207,9 @@ for TBB 3.6.1.
  • Retrieve the signers' GPG keys. This can be done from the command line by entering something like -
    gpg --keyserver keys.mozilla.org --recv-keys 0x29846B3C683686CC
    - (This will bring you developer Mike Perry's public key. Other +
    gpg --keyserver keys.mozilla.org --recv-keys 0x4E2C6E8793298290
    + (This will bring you the public part of the Tor Browser developers' + signing key. Other developers' key IDs can be found on this page.)
  • @@ -216,6 +217,13 @@
    gpg --verify <NAME OF THE SIGNATURE FILE>.asc sha256sums.txt
  • You should see a message like "Good signature from <DEVELOPER NAME>". If you don't, there is a problem. Try these steps again.
  • +
  • If you want to verify a Windows Tor Browser package you need to first + strip off the authenticode signature of it. One tool that can be used for + this purpose is osslsigncode. Assuming you + have built it on a Linux computer you can enter +
    /path/to/your/osslsigncode remove-signature \
    +        /path/to/your/<TOR BROWSER FILE NAME>.exe <TOR BROWSER FILE NAME>.exe
  • Now you can take the sha256sum of the Tor Browser package. On Windows you can use the hashdeep utility and run