mirror of https://github.com/OISF/suricata
You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
86 lines
3.6 KiB
ReStructuredText
86 lines
3.6 KiB
ReStructuredText
9 months ago
|
Verifying Suricata Source Distribution Files
|
||
|
============================================
|
||
|
|
||
|
Once the Suricata release distribution file has been downloaded, the PGP
|
||
|
signature should be verified. This can be done using the GPG application and
|
||
|
is usually available on Linux/BSD systems without having to manually install
|
||
|
any additional packages. For Mac or Windows systems installation packages can
|
||
|
be found at `<https://gnupg.org/>`_.
|
||
|
|
||
|
Verification Steps
|
||
|
------------------
|
||
|
|
||
|
These verification steps are for general guidance, the exact process and
|
||
|
commands may vary between operating systems.
|
||
|
|
||
|
Downloading the Signature File
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
|
||
|
The signature file needs to be downloaded as well as the distribution file.
|
||
|
Both files can be found at `<https://suricata.io/download/>`_.
|
||
|
|
||
|
Importing the OISF Signing Key
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
|
||
|
Once both the signature file and Suricata distribution files are obtained, the
|
||
|
OISF signing key should be imported to the local gpg keyring. This can be done
|
||
|
by running the following command::
|
||
|
|
||
|
$ gpg --receive-keys 2BA9C98CCDF1E93A
|
||
|
|
||
|
The above command should produce output similar to the following::
|
||
|
|
||
|
gpg: key 2BA9C98CCDF1E93A: public key "Open Information Security Foundation
|
||
|
(OISF) <releases@openinfosecfoundation.org>" imported
|
||
|
gpg: Total number processed: 1
|
||
|
gpg: imported: 1
|
||
|
|
||
|
Verifying the Suricata Distribution File
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
|
||
|
To verify the contents of the Suricata distribution file the following command
|
||
|
could be ran on the Suricata 7.0.5 distribution file::
|
||
|
|
||
|
$ gpg --verify suricata-7.0.5.tar.gz.sig suricata-7.0.5.tar.gz
|
||
|
|
||
|
Depending on the trust level assigned to the OISF signing keys, something
|
||
|
similar to the following output should be seen::
|
||
|
|
||
|
$ gpg --verify suricata-7.0.5.tar.gz.sig suricata-7.0.5.tar.gz
|
||
|
gpg: Signature made Tue 23 Apr 2024 11:58:56 AM UTC
|
||
|
gpg: using RSA key B36FDAF2607E10E8FFA89E5E2BA9C98CCDF1E93A
|
||
|
gpg: checking the trustdb
|
||
|
gpg: marginals needed: 3 completes needed: 1 trust model: pgp
|
||
|
gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u
|
||
|
gpg: next trustdb check due at 2025-08-06
|
||
|
gpg: Good signature from "Open Information Security Foundation (OISF)
|
||
|
<releases@openinfosecfoundation.org>" [ultimate]
|
||
|
|
||
|
This indicates a valid signature and that the signing key is trusted.
|
||
|
|
||
|
.. note:: If output from the `--verify` command is similar to the following::
|
||
|
|
||
|
gpg: Signature made Tue 23 Apr 2024 11:58:56 AM UTC
|
||
|
gpg: using RSA key B36FDAF2607E10E8FFA89E5E2BA9C98CCDF1E93A
|
||
|
gpg: Can't check signature: No public key
|
||
|
|
||
|
This indicates that the OISF signing key was not imported to the local GPG
|
||
|
keyring.
|
||
|
|
||
|
.. note:: If output from the `--verify` command is similar to the following::
|
||
|
|
||
|
gpg: Signature made Tue 23 Apr 2024 11:58:56 AM UTC
|
||
|
gpg: using RSA key B36FDAF2607E10E8FFA89E5E2BA9C98CCDF1E93A
|
||
|
gpg: Good signature from "Open Information Security Foundation (OISF)
|
||
|
<releases@openinfosecfoundation.org>" [unknown]
|
||
|
gpg: WARNING: This key is not certified with a trusted signature!
|
||
|
gpg: There is no indication that the signature belongs to the owner.
|
||
|
Primary key fingerprint: B36F DAF2 607E 10E8 FFA8 9E5E 2BA9 C98C CDF1 E93A
|
||
|
|
||
|
This indicates that the OISF signing key was imported and the signatures are
|
||
|
valid, but either the keys have not been marked as trusted OR the keys are
|
||
|
possibly a forgery.
|
||
|
|
||
|
If there are questions regarding the validity of the downloaded file, the
|
||
|
OISF team can be reached at `security @ oisf.net` (remove the spaces between
|
||
|
the `@` before sending).
|