From a nerd perspective it would be interesting to find signed statements like:
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA512Checking that we are in possession the private key for $keyid.. Succeeded. Mounting .dmg image $tb_image_with_version_string.. Succeeded.Checking that TorBrowser.app is present.. Succeeded.TorBrowser.app has version: $version_stringTorBrowser.app has sha256 checksum: $sum_tbSigning TorBrowser.app.. Succeeded.Signature file has sha256 checksum: $sum_tb_sig-----BEGIN PGP SIGNATURE-----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puUy-----END PGP SIGNATURE-----
Then everyone with the necessary skills could download this statement from our website and verify it:
$ curl $tbo_url > tb_osx_version_statement.txt $ gpg --auto-key-retrieve --verify tb_osx_version_statement.txt gpg: Signature made Sun 26 Aug 2018 01:46:48 AM CESTgpg: using RSA key 93564DED85468D9AC290360512EE7D7071112056gpg: key 12EE7D7071112056: public key "traumschule <traumschuleriebau@riseup.net>" importedgpg: Total number processed: 1gpg: imported: 1gpg: Good signature from "traumschule <traumschuleriebau@riseup.net>" [unknown]gpg: WARNING: This key is not certified with a trusted signature!gpg: There is no indication that the signature belongs to the owner.Primary key fingerprint: 9356 4DED 8546 8D9A C290 3605 12EE 7D70 7111 2056
and be happy that there is a trustpath for the downloaded file.
(think yourself the tbo signing key here instead. it would be also good to integrate timestamps, to protect against attackers redoing this process for older versions.)
From a user perspective only a detach-clearsigned shaX.sum file with sums for the .dmg and the signature file is interesting because it is automatically processable and supplies useful output:
$ wget $url_to_tba_osx_version.xz; tar xf $tba_osx_version.xz; cd tba_osx_version$ sha256sum -c sha256.sumtb_osx_version.dmg: OKtb_osx_version.dmg.asc: OK$ gpg --auto-key-retrieve --verify tb_osx_version.dmg.asc
just read over comment:4:ticket:20254 and it doesn't sound fun, not even sure, if I want to be a part of it. Sorry, gk, for meddling with your ticket so much. Don't know if the new parent makes sense for you, but probably more than the previous one.