123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354 |
- .. _support:
- Support
- =======
- Support and Services
- --------------------
- Please see https://www.borgbackup.org/ for free and paid support and service options.
- .. _security-contact:
- Security
- --------
- In case you discover a security issue, please use this contact for reporting it privately
- and please, if possible, use encrypted E-Mail:
- Thomas Waldmann <tw@waldmann-edv.de>
- GPG Key Fingerprint: 6D5B EF9A DD20 7580 5747 B70F 9F88 FB52 FAF7 B393
- The public key can be fetched from any GPG keyserver, but be careful: you must
- use the **full fingerprint** to check that you got the correct key.
- Verifying signed releases
- -------------------------
- `Releases <https://github.com/borgbackup/borg/releases>`_ are signed with the same GPG key and a .asc file is provided for each binary.
- To verify a signature, the public key needs to be known to GPG. It can be imported into the local keystore from a keyserver with the fingerprint::
- gpg --recv-keys "6D5B EF9A DD20 7580 5747 B70F 9F88 FB52 FAF7 B393"
- If GPG successfully imported the key, the output should be (among other things): 'Total number processed: 1'.
- To verify for example the signature of the borg-linux64 binary::
- gpg --verify borg-linux64.asc
- GPG outputs if it finds a good signature. The output should look similar to this::
- gpg: Signature made Sat 30 Dec 2017 01:07:36 PM CET using RSA key ID 51F78E01
- gpg: Good signature from "Thomas Waldmann <email>"
- gpg: aka "Thomas Waldmann <email>"
- gpg: aka "Thomas Waldmann <email>"
- gpg: aka "Thomas Waldmann <email>"
- gpg: WARNING: This key is not certified with a trusted signature!
- gpg: There is no indication that the signature belongs to the owner.
- Primary key fingerprint: 6D5B EF9A DD20 7580 5747 B70F 9F88 FB52 FAF7 B393
- Subkey fingerprint: 2F81 AFFB AB04 E11F E8EE 65D4 243A CFA9 51F7 8E01
- If you want to make absolutely sure that you have the right key, you need to verify it via another channel and assign a trust-level to it.
|