Windows 10 will reach EOS (end of support) on October 14, 2025. For more information, see this article.

Prohledat stránky podpory

Vyhněte se podvodům. Za účelem poskytnutí podpory vás nikdy nežádáme, abyste zavolali nebo poslali SMS na nějaké telefonní číslo nebo abyste sdělili své osobní údaje. Jakékoliv podezřelé chování nám prosím nahlaste pomocí odkazu „Nahlásit zneužití“.

Zjistit více

How to verify offline Firefox installer using its .asc file

  • 4 odpovědi
  • 0 má tento problém
  • 32 zobrazení
  • Poslední odpověď od xyz123abcf-u-k

more options

I have downoloaed Firefox offline installer (a .xz file) from here:

https://download-installer.cdn.mozilla.net/pub/firefox/releases/139.0b9/linux-x86_64/en-GB/

I have also downloaded a .asc file, presumably a pgp signature.

Now both files are saved locally in my computer.

Assuming Linux latest release, how do I verify the contents of the offline installer file (.xz) from the Linux Terminal? I have install gpg tools. And commands like ```gpg``` are available.

What I did so far:

 gpg --show-keys --with-fingerprint firefox-139.0b9.tar.xz.asc

with this output:

 gpg: no valid OpenPGP data found.

Do you really want us to verify the contents of the installers you provide? A sha256 sum would be great, though not as secure, for when the GPG predictably fails for the ordinary user due to its huge and useless complexity and bureaucracy.

I have downoloaed Firefox offline installer (a .xz file) from here: https://download-installer.cdn.mozilla.net/pub/firefox/releases/139.0b9/linux-x86_64/en-GB/ I have also downloaded a .asc file, presumably a pgp signature. Now both files are saved locally in my computer. Assuming Linux latest release, how do I verify the contents of the offline installer file (.xz) from the Linux Terminal? I have install gpg tools. And commands like ```gpg``` are available. What I did so far: gpg --show-keys --with-fingerprint firefox-139.0b9.tar.xz.asc with this output: gpg: no valid OpenPGP data found. Do you really want us to verify the contents of the installers you provide? A sha256 sum would be great, though not as secure, for when the GPG predictably fails for the ordinary user due to its huge and useless complexity and bureaucracy.

Zvolené řešení

If you haven't done so already, you need to import Mozilla's gpg key for signing releases: https://blog.mozilla.org/security/2025/04/01/updated-gpg-key-for-signing-firefox-releases-2/

Save the key and import it into your gpg keyring using

 gpg --import <filename>
 

Then you can do

 gpg --verify firefox-139.0b9.tar.xz.asc firefox-139.0b9.tar.xz
Přečíst dotaz v kontextu 👍 1

Všechny odpovědi (4)

more options

Zvolené řešení

If you haven't done so already, you need to import Mozilla's gpg key for signing releases: https://blog.mozilla.org/security/2025/04/01/updated-gpg-key-for-signing-firefox-releases-2/

Save the key and import it into your gpg keyring using

 gpg --import <filename>
 

Then you can do

 gpg --verify firefox-139.0b9.tar.xz.asc firefox-139.0b9.tar.xz

Pomohla vám tato odpověď?

more options

Thank you pernt,

I have followed your reply to import the keys 1. download the PUBLIC KEY from the site you mentioned into a local file 2. gpg --import <localPKfile>

That was succesful. Then I tried to verify:

gpg --verify firefox-139.0b9.tar.xz.asc firefox-139.0b9.tar.xz

and it says

gpg: Signature made Fri May 16 15:04:42 2025 EEST gpg: using RSA key 09BEED63F3462A2DFFAB3B875ECB6497C1A20256 gpg: Good signature from "Mozilla Software Releases <release@mozilla.com>" [unknown] gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner. Primary key fingerprint: 14F2 6682 D091 6CDD 81E3 7B6D 61B7 B526 D98F 0353

    Subkey fingerprint: 09BE ED63 F346 2A2D FFAB  3B87 5ECB 6497 C1A2 0256

Is this a good sign?

Does it mean that the local file, its asc signature and the keys fetched for mozilla all agree but there is no way to know that the local file belongs to mozilla?

Pomohla vám tato odpověď?

more options

> Is this a good sign?

Yes. It confirms that the signature is valid and from a key in your keyring, probably the one you imported.

> WARNING: This key is not certified with a trusted signature! Does it mean that the local file, its asc signature and the keys fetched for mozilla all agree but there is no way to know that the local file belongs to mozilla?

The warning means that the imported key is not signed locally by you. Simply importing it does not do that for you.

You can search online for commands to run, but basically what you might want to do is list your keys, then look at the fingerprint for the Mozilla key, compare it to the fingerprint on a trusted Mozilla source (probably their website), and if if matches you can sign it. After doing so you should not see that warning anymore.

You can also skip this if you are comfortable with the verification you have performed without having signed Mozilla's key locally.

Upravil uživatel pernt dne

Pomohla vám tato odpověď?

more options

thank you pernt, very helpful.

Pomohla vám tato odpověď?

Položit dotaz

Pro přidání odpovědi se musíte přihlásit ke svému účtu. Pokud dosud nemáte účet, položte nový dotaz.