[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
01/01: doc: Explain authentication in "System Installation".
From: |
Ludovic Courtès |
Subject: |
01/01: doc: Explain authentication in "System Installation". |
Date: |
Tue, 26 Jul 2016 13:09:12 +0000 (UTC) |
civodul pushed a commit to branch master
in repository guix.
commit debc6360e111e8efc8a938b2aef28e5b3616ada8
Author: Ludovic Courtès <address@hidden>
Date: Tue Jul 26 15:07:29 2016 +0200
doc: Explain authentication in "System Installation".
Suggested by Vincent Legoll <address@hidden>.
* doc/guix.texi (OPENPGP-SIGNING-KEY-ID): New constant.
(Binary Installation): Use it.
(USB Stick Installation): Copy and adjust the authentication bit from
"Binary Installation".
---
doc/guix.texi | 27 ++++++++++++++++++++++++++-
1 file changed, 26 insertions(+), 1 deletion(-)
diff --git a/doc/guix.texi b/doc/guix.texi
index 9fb125d..8ab4522 100644
--- a/doc/guix.texi
+++ b/doc/guix.texi
@@ -9,6 +9,9 @@
@include version.texi
address@hidden Identifier of the OpenPGP key used to sign tarballs and such.
address@hidden OPENPGP-SIGNING-KEY-ID 090B11993D9AEBB5
+
@copying
Copyright @copyright{} 2012, 2013, 2014, 2015, 2016 Ludovic address@hidden
Copyright @copyright{} 2013, 2014, 2016 Andreas address@hidden
@@ -374,6 +377,7 @@ Download the binary tarball from
where @var{system} is @code{x86_64-linux} for an @code{x86_64} machine
already running the kernel Linux, and so on.
address@hidden The following is somewhat duplicated in ``System Installation''.
Make sure to download the associated @file{.sig} file and to verify the
authenticity of the tarball against it, along these lines:
@@ -386,11 +390,12 @@ If that command fails because you do not have the
required public key,
then run this command to import it:
@example
-$ gpg --keyserver pgp.mit.edu --recv-keys 090B11993D9AEBB5
+$ gpg --keyserver pgp.mit.edu --recv-keys @value{OPENPGP-SIGNING-KEY-ID}
@end example
@noindent
and rerun the @code{gpg --verify} command.
address@hidden end authentication part
@item
As @code{root}, run:
@@ -6134,6 +6139,26 @@ for a GNU/Linux system on Intel/AMD-compatible 64-bit
CPUs;
for a 32-bit GNU/Linux system on Intel-compatible CPUs.
@end table
address@hidden start duplication of authentication part from ``Binary
Installation''
+Make sure to download the associated @file{.sig} file and to verify the
+authenticity of the image against it, along these lines:
+
address@hidden
+$ wget ftp://alpha.gnu.org/gnu/guix/address@hidden@var{system}.xz.sig
+$ gpg --verify address@hidden@var{system}.xz.sig
address@hidden example
+
+If that command fails because you do not have the required public key,
+then run this command to import it:
+
address@hidden
+$ gpg --keyserver pgp.mit.edu --recv-keys @value{OPENPGP-SIGNING-KEY-ID}
address@hidden example
+
address@hidden
+and rerun the @code{gpg --verify} command.
address@hidden end duplication
+
This image contains a single partition with the tools necessary for an
installation. It is meant to be copied @emph{as is} to a large-enough
USB stick.