For me, it’s not enough to verify the integrity of an ISO – I also have to verify its authenticity (or at least verify the checksum file) with GPG. I don’t know why, but just need to see that “Good signature” message before I feel safe installing Linux.

I notice, though, that the download pages of some prominent distros (Pop_OS!, openSUSE, etc) just give you a checksum, probably because they feel that anything else is unnecessary. This makes me shy away from installing them, which is a shame because I’d like to give some of those distros a try on bare metal.

Am I being paranoid when it comes to installing Linux?

  • AzureDiamond@sh.itjust.works
    link
    fedilink
    arrow-up
    1
    ·
    1 year ago

    Oh you are absolutely right about it being much harder to compromise the distro website as well as a key server. And as much as I am aware of the concept of the web of trust, I still do not get how you securely draw a relation between a key on a third party website and the publisher of a distro?

    I just checked for OpenSuse and Fedora. Both link to their keys on their own website, which both target files on their own domain. And even if they linked to a third party, what is stopping an attacker, who already managed to swap the iso and checksum file to also change the link to the key server?

    You are right about already imported keys. But why would someone, who does not already have distro xyz installed, have the keys of the publisher of distro xyz imported?

    Thanks in advance for the discussion!

    • lemmyvore@feddit.nl
      link
      fedilink
      English
      arrow-up
      2
      ·
      edit-2
      1 year ago

      how you securely draw a relation between a key on a third party website and the publisher of a distro?

      You publish the master GPG key in a DNS record for the website you download from, and you sign the DNS records with DNSSEC. (Yes I know, ironically the TLS cert for the page with the explanation has expired last month…) You can also use DNS records to enable autodiscovery of the GPG keyserver hosting the relevant master key.

      Once you have one GPG key you can trust you can use it to verify downloads as well as other GPG keys.

      Unfortunately most Linux distros don’t use DNS records. Most of them publish the GPG key on the same page as the checksum, which can be compromised just the same, you are correct. Some of them publish their key on a separate keyserver, but to find that key you need to know its fingerprint or its associated email address… and if those are provided via the download page then you’re back to square one. 😆