swift 13/08/03 15:03:03 Modified: hb-install-stage.xml Log: Fix bug #470750 - Add instructions for gpg verification of stage digest, thanks to Roman Zilka
Revision Changes Path 1.133 xml/htdocs/doc/en/handbook/hb-install-stage.xml file : http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/doc/en/handbook/hb-install-stage.xml?rev=1.133&view=markup plain: http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/doc/en/handbook/hb-install-stage.xml?rev=1.133&content-type=text/plain diff : http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/doc/en/handbook/hb-install-stage.xml?r1=1.132&r2=1.133 Index: hb-install-stage.xml =================================================================== RCS file: /var/cvsroot/gentoo/xml/htdocs/doc/en/handbook/hb-install-stage.xml,v retrieving revision 1.132 retrieving revision 1.133 diff -u -r1.132 -r1.133 --- hb-install-stage.xml 2 Jan 2013 19:06:51 -0000 1.132 +++ hb-install-stage.xml 3 Aug 2013 15:03:03 -0000 1.133 @@ -4,7 +4,7 @@ <!-- The content of this document is licensed under the CC-BY-SA license --> <!-- See http://creativecommons.org/licenses/by-sa/2.5 --> -<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/handbook/hb-install-stage.xml,v 1.132 2013/01/02 19:06:51 swift Exp $ --> +<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/handbook/hb-install-stage.xml,v 1.133 2013/08/03 15:03:03 swift Exp $ --> <sections> @@ -13,8 +13,8 @@ describe how you extract the stage3 archive and configure Portage. </abstract> -<version>18</version> -<date>2012-12-09</date> +<version>19</version> +<date>2013-08-03</date> <section> <title>Installing a Stage Tarball</title> @@ -152,10 +152,20 @@ <p> Then compare the output of these commands with the value registered in the -.DIGESTS files that can be found on the mirrors as well. The values need to +<path>.DIGESTS(.asc)</path> files that can be found on the mirrors as well. The values need to match, otherwise the downloaded file might be corrupt (or the digests file is). </p> +<p> +Just like with the ISO file, you can also verify the cryptographic signature of +the <path>.DIGESTS.asc</path> file using <c>gpg</c> to make sure the checksums +have not been tampered with: +</p> + +<pre caption="Validating the checksums using gpg"> +# <i>gpg --verify <keyval id="stage3" />.DIGESTS.asc</i> +</pre> + </body> </subsection> <subsection>