1 # SOME DESCRIPTIVE TITLE
2 # Copyright (C) YEAR Free Software Foundation, Inc.
3 # This file is distributed under the same license as the PACKAGE package.
4 # FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
9 "Project-Id-Version: PACKAGE VERSION\n"
10 "POT-Creation-Date: 2015-01-25 10:14+0100\n"
11 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
12 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
13 "Language-Team: LANGUAGE <LL@li.org>\n"
16 "Content-Type: text/plain; charset=UTF-8\n"
17 "Content-Transfer-Encoding: 8bit\n"
21 msgid "[[!meta title=\"Trusting Tails signing key\"]]\n"
26 "We will present you three techniques from the easiest to the safest. Again, "
27 "none of them is a perfect and magic solution. Feel free to explore them "
28 "according to your possibilities and technical skills."
33 "Note that since all Tails releases are signed with the same key, you will "
34 "not have to verify the key every time and the trust you might progressively "
35 "build in it will be built once and for all. Still, you will have to check "
36 "the ISO image every time you download a new one!"
41 msgid "Correlates several downloads of Tails signing key"
46 "A simple technique to increase the trust you can put in Tails signing key "
47 "would be to download it several times, from several locations, several "
48 "computers, possibly several countries, etc."
53 "For example you could save them every time with a different name in the same "
54 "directory on a USB stick. Then run the following command from a terminal to "
55 "check whether all the keys are identical:"
61 " cd [your download directory]\n"
62 " diff -qs --from-file tails-signing*.key\n"
66 msgid "This command would output something like this:"
72 " Files tails-signing-desktop.key and tails-signing-laptop.key are identical\n"
73 " Files tails-signing-desktop.key and tails-signing-library.key are identical\n"
74 " Files tails-signing-desktop.key and tails-signing-seattle.key are identical\n"
79 "You would then need to check that every line reports identical key files."
84 "If at least a key differs from the rest, the command would output "
91 " Files tails-signing-desktop.key and tails-signing-laptop.key are identical\n"
92 " Files tails-signing-desktop.key and tails-signing-library.key are identical\n"
93 " Files tails-signing-desktop.key and tails-signing-seattle.key differ\n"
98 "You could also use this technique to compare keys downloaded by your friends "
99 "or other people you trust."
104 msgid "Using the OpenPGP Web of Trust"
109 "If you want to be extra cautious and really authenticate Tails signing key "
110 "in a stronger way than what standard HTTPS offers you, you will need to use "
111 "the OpenPGP Web of Trust."
116 "One of the inherent problems of standard HTTPS is that the trust we usually "
117 "put on a website is defined by certificate authorities: a hierarchical and "
118 "closed set of companies and governmental institutions approved by web "
119 "browser vendors. This model of trust has long been criticized and proved "
120 "several times to be vulnerable to attacks [[as explained on our warning page|"
121 "about/warning#man-in-the-middle]]."
126 "We believe instead that users should be given the final say when trusting a "
127 "website, and that designation of trust should be done on the basis of human "
133 "The OpenPGP [[!wikipedia Web_of_Trust desc=\"Web of Trust\"]] is a "
134 "decentralized trust model based on OpenPGP keys. Let's see that with an "
141 "*You're a friend of Alice and really trust her way of managing OpenPGP keys.\n"
142 "You're trusting Alice's key.*\n"
148 "*Furthermore, Alice met Bob, a Tails developer, in a conference, and signed\n"
149 "Bob's key. Alice is trusting Bob's key.*\n"
155 "*Bob is a Tails developer who directly owns the Tails signing key. Bob fully\n"
156 "trusts Tails signing key.*\n"
161 "This scenario creates a trust path from you to Tails signing key that could "
162 "allow you to trust it without having to depend on certificate authorities."
167 "This trust model is not perfect either and requires both caution and "
168 "intelligent supervision by users. The technical details of creating, "
169 "managing and trusting OpenPGP keys is outside of the scope of this document."
174 "We also acknowledge that not everybody might be able to create good trust "
175 "path to Tails signing key since it based on a network of direct human "
176 "relationships and the knowledge of quite complex tools such as OpenPGP."
181 msgid "Check Tails signing key against the Debian keyring"
186 "Following the previous scenario, when Alice met Bob, a Tails developer, she "
187 "could have made a new signature on Tails signing key with her own key to "
188 "certify this trust relationship and make it public. Tails signing key would "
189 "now come along with a signature made by Alice."
195 "Tails signing key is actually already signed by the keys of several official\n"
196 "developers of Debian, the operating system on which Tails is based. Debian makes\n"
197 "an extensive use of OpenPGP and you can download the keys of all Debian\n"
198 "developers by installing the <code>debian-keyring</code> package. You can then\n"
199 "verify the signatures those developers made with their own key on Tails signing\n"
204 msgid "To download the Debian keyring you can do:"
209 msgid " sudo apt-get install debian-keyring\n"
214 "To get a list of the signatures made by other people on Tails signing key "
220 msgid " gpg --keyid-format long --list-sigs 1202821CBE2CD9C1\n"
224 msgid "You will get something like this:"
230 " pub 4096R/1202821CBE2CD9C1 2010-10-07 [expires: 2015-04-30]\n"
231 " uid Tails developers (signing key) <tails@boum.org>\n"
232 " sig 3 1202821CBE2CD9C1 2011-04-16 Tails developers (signing key) <tails@boum.org>\n"
233 " sig BACE15D2A57498FF 2011-04-16 [User ID not found]\n"
234 " sig CCD2ED94D21739E9 2011-06-12 [User ID not found]\n"
235 " uid T(A)ILS developers (signing key) <amnesia@boum.org>\n"
236 " sig 3 1202821CBE2CD9C1 2010-10-07 Tails developers (signing key) <tails@boum.org>\n"
237 " sig BACE15D2A57498FF 2010-10-07 [User ID not found]\n"
238 " sig 8CBF9A322861A790 2010-12-24 [User ID not found]\n"
239 " sig 7EF27D76B2177E1F 2010-12-27 [User ID not found]\n"
240 " sig CCD2ED94D21739E9 2010-12-29 [User ID not found]\n"
241 " sig AC0EC35285821C42 2011-03-22 [User ID not found]\n"
242 " sig C2DEE7F336042734 2010-10-24 [User ID not found]\n"
247 "The lines ending with '[User ID not found]' are signatures made by keys you "
248 "still don't have in your keyring. You could try to search for them in the "
249 "Debian keyring by their key ID: the 16 digit code between the 'sig' tag and "
250 "the date. You could for example do:"
255 msgid " gpg --keyring=/usr/share/keyrings/debian-keyring.gpg --list-key CCD2ED94D21739E9\n"
260 "If this signature corresponds to a key in the Debian keyring you will get "
261 "something like this:"
267 " pub 4096R/CCD2ED94D21739E9 2007-06-02 [expires: 2015-02-26]\n"
268 " uid Daniel Kahn Gillmor <dkg@fifthhorseman.net>\n"
269 " uid Daniel Kahn Gillmor <dkg@openflows.com>\n"
270 " uid [jpeg image of size 3515]\n"
271 " uid Daniel Kahn Gillmor <dkg@debian.org>\n"
272 " uid Daniel Kahn Gillmor <dkg@aclu.org>\n"
273 " sub 4096R/0xC61BD3EC21484CFF 2007-06-02 [expires: 2015-02-26]\n"
274 " sub 2048R/0x125868EA4BFA08E4 2008-06-19 [expires: 2015-02-26]\n"
275 " sub 4096R/0xA52401B11BFDFA5C 2013-03-12 [expires: 2015-03-12]\n"
276 " sub 2432R/0xDC104C4E0CA757FB 2013-09-11 [expires: 2014-09-11]\n"
280 msgid "You can then import it in your own keyring by doing:"
285 msgid " gpg --keyring=/usr/share/keyrings/debian-keyring.gpg --export CCD2ED94D21739E9 | gpg --import\n"
290 "Now you can try to verify the signature made by this new key on Tails "
291 "signing key by doing:"
296 msgid " gpg --keyid-format long --check-sigs 1202821CBE2CD9C1\n"
301 "On the output, the status of the verification is indicated by a flag "
302 "directly following the \"sig\" tag. A \"!\" indicates that the signature has "
303 "been successfully verified, a \"-\" denotes a bad signature and a \"%\" is "
304 "used if an error occurred while checking the signature (e.g. a non supported "
305 "algorithm). For example, in the following output the signature of Daniel "
306 "Kahn Gillmor on Tails signing key has been successfully verified:"
312 " pub 4096R/1202821CBE2CD9C1 2010-10-07 [expires: 2015-04-30]\n"
313 " uid Tails developers (signing key) <tails@boum.org>\n"
314 " sig!3 1202821CBE2CD9C1 2011-04-16 Tails developers (signing key) <tails@boum.org>\n"
315 " sig! CCD2ED94D21739E9 2013-05-05 Daniel Kahn Gillmor <dkg@fifthhorseman.net>\n"
320 msgid " 3 signatures not checked due to missing keys\n"
325 msgid "Get into the Web of Trust!"
330 "Since the Web of Trust is actually based on human relationships and real-"
331 "life interactions the best would be to start establishing contacts with "
332 "people knowledgeable about OpenPGP, start using it yourself and build trust "
333 "relationships in order to find your own trust path to Tails signing key."
338 "You could start by contacting a local [[!wikipedia Linux_User_Group desc=\"%s"
339 "\"]] or other Tails enthusiasts near you and exchange about their OpenPGP "
345 msgid "Further reading on OpenPGP"
348 #. type: Bullet: '- '
349 msgid "[[!wikipedia GnuPG desc=\"Wikipedia: %s\"]], a free OpenPGP software"
352 #. type: Bullet: '- '
353 msgid "[[Apache: How To OpenPGP|http://www.apache.org/dev/openpgp.html]]"
356 #. type: Bullet: '- '
358 "[[Debian: Keysigning|http://www.debian.org/events/keysigning]], a tutorial "
359 "on signing keys of other people"
362 #. type: Bullet: '- '
364 "[[rubin.ch: Explanation of the web of trust of PGP|http://www.rubin.ch/pgp/"
365 "weboftrust.en.html]]"
368 #. type: Bullet: '- '
370 "[[Gpg4win: Certificate inspection|http://www.gpg4win.org/doc/en/gpg4win-"
371 "compendium_16.html]], instructions to manage key trust with Gpg4win"
374 #. type: Bullet: '- '
375 msgid "<!-- l10n placeholder for language-specific link -->"