Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Privacy
  3. How important is it to verify a signature (of say Mullvad Browser)?

How important is it to verify a signature (of say Mullvad Browser)?

Scheduled Pinned Locked Moved Privacy
privacy
19 Posts 10 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • zdhzm2pgp@lemmy.mlZ This user is from outside of this forum
    zdhzm2pgp@lemmy.mlZ This user is from outside of this forum
    [email protected]
    wrote on last edited by
    #1

    Because it's kind of hard! Even if I follow their instructions. Maybe I'm just dumb . . . 🙁

    dsklnsadog@lemmy.dbzer0.comD neptr@lemmy.blahaj.zoneN davel@lemmy.mlD X K 8 Replies Last reply
    0
    • System shared this topic on
    • zdhzm2pgp@lemmy.mlZ [email protected]

      Because it's kind of hard! Even if I follow their instructions. Maybe I'm just dumb . . . 🙁

      dsklnsadog@lemmy.dbzer0.comD This user is from outside of this forum
      dsklnsadog@lemmy.dbzer0.comD This user is from outside of this forum
      [email protected]
      wrote on last edited by
      #2

      The important is to do it the first time. Then just upgrade the app.

      A 1 Reply Last reply
      0
      • zdhzm2pgp@lemmy.mlZ [email protected]

        Because it's kind of hard! Even if I follow their instructions. Maybe I'm just dumb . . . 🙁

        neptr@lemmy.blahaj.zoneN This user is from outside of this forum
        neptr@lemmy.blahaj.zoneN This user is from outside of this forum
        [email protected]
        wrote on last edited by
        #3

        It is important if you care. They sign releases with the same Tor Browser key. Instructions are found on this page: https://mullvad.net/en/help/verifying-mullvad-browser-signature

        You need 2 files (both are on the download page):

        • Browser file
        • Signature file

        The basic process is as follows:

        1. Obtain signing key.
        2. Verify browser using signature file.

        Note: Ignore warning about the key not being signed with a trusted key (we skip an unnecessary step for a begineer walkthrough)

        You can double check everything I said by looking at their instructions.

        zdhzm2pgp@lemmy.mlZ 1 Reply Last reply
        0
        • zdhzm2pgp@lemmy.mlZ [email protected]

          Because it's kind of hard! Even if I follow their instructions. Maybe I'm just dumb . . . 🙁

          davel@lemmy.mlD This user is from outside of this forum
          davel@lemmy.mlD This user is from outside of this forum
          [email protected]
          wrote on last edited by
          #4

          Depending on your threat model, not very important. What are the chances that 1) someone will have hacked Mullvad’s server and installed a compromised version of the browser, and 2) you happen to download the compromised version before the hack is discovered and mitigated?

          zdhzm2pgp@lemmy.mlZ C 2 Replies Last reply
          0
          • neptr@lemmy.blahaj.zoneN [email protected]

            It is important if you care. They sign releases with the same Tor Browser key. Instructions are found on this page: https://mullvad.net/en/help/verifying-mullvad-browser-signature

            You need 2 files (both are on the download page):

            • Browser file
            • Signature file

            The basic process is as follows:

            1. Obtain signing key.
            2. Verify browser using signature file.

            Note: Ignore warning about the key not being signed with a trusted key (we skip an unnecessary step for a begineer walkthrough)

            You can double check everything I said by looking at their instructions.

            zdhzm2pgp@lemmy.mlZ This user is from outside of this forum
            zdhzm2pgp@lemmy.mlZ This user is from outside of this forum
            [email protected]
            wrote on last edited by
            #5

            Right, and I got two different RSA keys . . .

            1 Reply Last reply
            0
            • davel@lemmy.mlD [email protected]

              Depending on your threat model, not very important. What are the chances that 1) someone will have hacked Mullvad’s server and installed a compromised version of the browser, and 2) you happen to download the compromised version before the hack is discovered and mitigated?

              zdhzm2pgp@lemmy.mlZ This user is from outside of this forum
              zdhzm2pgp@lemmy.mlZ This user is from outside of this forum
              [email protected]
              wrote on last edited by
              #6

              That's kind of what I figured, although after following Mullvad Browser's instructions for verification, I did get two different RSA keys, if that means anything . . .

              1 Reply Last reply
              0
              • davel@lemmy.mlD [email protected]

                Depending on your threat model, not very important. What are the chances that 1) someone will have hacked Mullvad’s server and installed a compromised version of the browser, and 2) you happen to download the compromised version before the hack is discovered and mitigated?

                C This user is from outside of this forum
                C This user is from outside of this forum
                [email protected]
                wrote on last edited by
                #7

                Right. The risk is low, but nonzero.

                You'll want to make sure that the key you're validating is provided through another trusted channel, so that an attacker can't provide a bad download and have you check it against their bad key too.

                1 Reply Last reply
                0
                • zdhzm2pgp@lemmy.mlZ [email protected]

                  Because it's kind of hard! Even if I follow their instructions. Maybe I'm just dumb . . . 🙁

                  X This user is from outside of this forum
                  X This user is from outside of this forum
                  [email protected]
                  wrote on last edited by
                  #8

                  Signature verification protects you against malicious actors. Generally its not critical, but if you're worried about the source you're getting software from, then I highly recommend that you verify the signature. Ideally, you're given an asc file with the distribution and assuming you have PGP installed (and have a key), it's pretty easy.

                  First you want to import the public key they are saying that they use to sign all of their distributions;

                  gpg --auto-key-locate nodefault,wkd --locate-keys [email protected]
                  

                  Once it's in your keyring, you sign it with your own key;

                  gpg --sign-key [email protected]
                  

                  This is you telling the keyring that you trust this exact signing key, so now when you verify anything using that signing key (no matter where you get it from) you'll get a little message saying "hey, we know who this is, this is probably safe!";

                  $ gpg --verify mullvad-browser-linux-x86_64-13.0.4.tar.xz.asc
                  gpg: assuming signed data in 'mullvad-browser-linux-x86_64-13.0.4.tar.xz'
                  gpg: Signature made Thu Nov 23 11:24:40 2023 CET
                  gpg:                using RSA key 613188FC5BE2176E3ED54901E53D989A9E2D47BF
                  gpg: Good signature from "Tor Browser Developers (signing key) <[email protected]>" [full]
                  

                  In all reality, signing archives like this isn't really necessary anymore. In the early days of the internet when resources were scarce and web-servers didn't have 100% uptime, people mainly got software from FTP servers that weren't up all the time. So you have to search and hunt for software and sometimes get it from random places. This was a way for you to ensure that even though you didn't get it from an official source, that the software you were about to put on your machine wasn't messed with.

                  These days you're gonna get it directly from Mullvad--but even so, using signing keys protects you from MITM attacks, so that's always cool. lol.

                  zdhzm2pgp@lemmy.mlZ 1 Reply Last reply
                  0
                  • X [email protected]

                    Signature verification protects you against malicious actors. Generally its not critical, but if you're worried about the source you're getting software from, then I highly recommend that you verify the signature. Ideally, you're given an asc file with the distribution and assuming you have PGP installed (and have a key), it's pretty easy.

                    First you want to import the public key they are saying that they use to sign all of their distributions;

                    gpg --auto-key-locate nodefault,wkd --locate-keys [email protected]
                    

                    Once it's in your keyring, you sign it with your own key;

                    gpg --sign-key [email protected]
                    

                    This is you telling the keyring that you trust this exact signing key, so now when you verify anything using that signing key (no matter where you get it from) you'll get a little message saying "hey, we know who this is, this is probably safe!";

                    $ gpg --verify mullvad-browser-linux-x86_64-13.0.4.tar.xz.asc
                    gpg: assuming signed data in 'mullvad-browser-linux-x86_64-13.0.4.tar.xz'
                    gpg: Signature made Thu Nov 23 11:24:40 2023 CET
                    gpg:                using RSA key 613188FC5BE2176E3ED54901E53D989A9E2D47BF
                    gpg: Good signature from "Tor Browser Developers (signing key) <[email protected]>" [full]
                    

                    In all reality, signing archives like this isn't really necessary anymore. In the early days of the internet when resources were scarce and web-servers didn't have 100% uptime, people mainly got software from FTP servers that weren't up all the time. So you have to search and hunt for software and sometimes get it from random places. This was a way for you to ensure that even though you didn't get it from an official source, that the software you were about to put on your machine wasn't messed with.

                    These days you're gonna get it directly from Mullvad--but even so, using signing keys protects you from MITM attacks, so that's always cool. lol.

                    zdhzm2pgp@lemmy.mlZ This user is from outside of this forum
                    zdhzm2pgp@lemmy.mlZ This user is from outside of this forum
                    [email protected]
                    wrote on last edited by
                    #9

                    Thank you for taking the time to write all that! I did do what you described, but the RSA key I got at the end was different from what Mullvad's webpage says, which is the same as what you put, I think: 6131 . . . etc.

                    X 1 Reply Last reply
                    0
                    • zdhzm2pgp@lemmy.mlZ [email protected]

                      Thank you for taking the time to write all that! I did do what you described, but the RSA key I got at the end was different from what Mullvad's webpage says, which is the same as what you put, I think: 6131 . . . etc.

                      X This user is from outside of this forum
                      X This user is from outside of this forum
                      [email protected]
                      wrote on last edited by
                      #10

                      Good signature from "Tor Browser Developers (signing key) <[email protected]>" [full]

                      Did you see this notification at all when you verified the key signature?

                      zdhzm2pgp@lemmy.mlZ 1 Reply Last reply
                      0
                      • X [email protected]

                        Good signature from "Tor Browser Developers (signing key) <[email protected]>" [full]

                        Did you see this notification at all when you verified the key signature?

                        zdhzm2pgp@lemmy.mlZ This user is from outside of this forum
                        zdhzm2pgp@lemmy.mlZ This user is from outside of this forum
                        [email protected]
                        wrote on last edited by
                        #11

                        Yes, I got:

                        Good signature from "Tor Browser Developers (signing key) <[email protected]>" [full]

                        Does that mean it's ok? Maybe Mullvad just needs to update their website?

                        1 Reply Last reply
                        0
                        • zdhzm2pgp@lemmy.mlZ [email protected]

                          Because it's kind of hard! Even if I follow their instructions. Maybe I'm just dumb . . . 🙁

                          K This user is from outside of this forum
                          K This user is from outside of this forum
                          [email protected]
                          wrote on last edited by
                          #12

                          If it is hard, it is usually unnecessary. Unless it is a critical software (like a firmware update), or you suspect that somebody manipilates your traffic (which is highly unlikely on https sites)

                          S 1 Reply Last reply
                          0
                          • zdhzm2pgp@lemmy.mlZ [email protected]

                            Because it's kind of hard! Even if I follow their instructions. Maybe I'm just dumb . . . 🙁

                            zdhzm2pgp@lemmy.mlZ This user is from outside of this forum
                            zdhzm2pgp@lemmy.mlZ This user is from outside of this forum
                            [email protected]
                            wrote on last edited by
                            #13

                            From Mullvad support:

                            1 Reply Last reply
                            0
                            • K [email protected]

                              If it is hard, it is usually unnecessary. Unless it is a critical software (like a firmware update), or you suspect that somebody manipilates your traffic (which is highly unlikely on https sites)

                              S This user is from outside of this forum
                              S This user is from outside of this forum
                              [email protected]
                              wrote on last edited by
                              #14

                              Not necessarily traffic. Often download sites use mirrors to serve you the download. Sometimes those links are provided via a CDN which can be forced to comply to LEA or some other static hosted mirrors which are often hosted by others. The second part is more likely on community managed software.

                              So either traffic or the server/CDN behind the link. Happened before.

                              1 Reply Last reply
                              0
                              • zdhzm2pgp@lemmy.mlZ [email protected]

                                Because it's kind of hard! Even if I follow their instructions. Maybe I'm just dumb . . . 🙁

                                A This user is from outside of this forum
                                A This user is from outside of this forum
                                [email protected]
                                wrote on last edited by
                                #15

                                You should always verify signature and hash for any software you are installing but also keep in mind that if someone was really trying to send you a malicious download then there's good chance that they will also deliver you a malicious signing key and hash. And there is really no good solution. If it is critical you can try to get signings keys from different places and with different IPs and maybe even different devices but pick and choose how long do you want to go down this rabbit hole.

                                1 Reply Last reply
                                0
                                • dsklnsadog@lemmy.dbzer0.comD [email protected]

                                  The important is to do it the first time. Then just upgrade the app.

                                  A This user is from outside of this forum
                                  A This user is from outside of this forum
                                  [email protected]
                                  wrote on last edited by
                                  #16

                                  That's a bad advice you don't know how they are updating it. If it is added in the repo then package manager will check the signing key but if it is an in app update then that may not be verifying the new package and if someone is doing MITM they can switch it up

                                  dsklnsadog@lemmy.dbzer0.comD 1 Reply Last reply
                                  0
                                  • A [email protected]

                                    That's a bad advice you don't know how they are updating it. If it is added in the repo then package manager will check the signing key but if it is an in app update then that may not be verifying the new package and if someone is doing MITM they can switch it up

                                    dsklnsadog@lemmy.dbzer0.comD This user is from outside of this forum
                                    dsklnsadog@lemmy.dbzer0.comD This user is from outside of this forum
                                    [email protected]
                                    wrote on last edited by
                                    #17

                                    I don’t think it’s bad advice for most people. Maybe it’s just bad advice for your treat model

                                    A 1 Reply Last reply
                                    0
                                    • dsklnsadog@lemmy.dbzer0.comD [email protected]

                                      I don’t think it’s bad advice for most people. Maybe it’s just bad advice for your treat model

                                      A This user is from outside of this forum
                                      A This user is from outside of this forum
                                      [email protected]
                                      wrote on last edited by
                                      #18

                                      Yeah I guess so. Due to SSL if you want to perform successful MITM you'll need to have control of DNS and must have rootCA installed on there system/browser. And if it is a supply chain attack where source it self corrupted then there is no hope.

                                      1 Reply Last reply
                                      0
                                      • zdhzm2pgp@lemmy.mlZ [email protected]

                                        Because it's kind of hard! Even if I follow their instructions. Maybe I'm just dumb . . . 🙁

                                        communism@lemmy.mlC This user is from outside of this forum
                                        communism@lemmy.mlC This user is from outside of this forum
                                        [email protected]
                                        wrote on last edited by
                                        #19

                                        What's your OS and how are you installing it? It'd be normal for a package manager to check this for you.

                                        1 Reply Last reply
                                        0
                                        • System shared this topic on
                                        Reply
                                        • Reply as topic
                                        Log in to reply
                                        • Oldest to Newest
                                        • Newest to Oldest
                                        • Most Votes


                                        • Login

                                        • Login or register to search.
                                        • First post
                                          Last post
                                        0
                                        • Categories
                                        • Recent
                                        • Tags
                                        • Popular
                                        • World
                                        • Users
                                        • Groups