2005-03-19 05:26:58 +03:00
|
|
|
\A{pgpkeys} PuTTY download keys and signatures
|
|
|
|
|
2015-09-02 20:24:39 +03:00
|
|
|
\I{verifying new versions}We create \i{GPG signatures} for all the PuTTY
|
2005-03-19 05:26:58 +03:00
|
|
|
files distributed from our web site, so that users can be confident
|
|
|
|
that the files have not been tampered with. Here we identify
|
|
|
|
our public keys, and explain our signature policy so you can have an
|
|
|
|
accurate idea of what each signature guarantees.
|
|
|
|
This description is provided as both a web page on the PuTTY site, and
|
|
|
|
an appendix in the PuTTY manual.
|
|
|
|
|
2005-04-05 23:36:25 +04:00
|
|
|
As of release 0.58, all of the PuTTY executables contain fingerprint
|
|
|
|
material (usually accessed via the \i\c{-pgpfp} command-line
|
|
|
|
option), such that if you have an executable you trust, you can use
|
|
|
|
it to establish a trust path, for instance to a newer version
|
|
|
|
downloaded from the Internet.
|
2005-03-19 05:26:58 +03:00
|
|
|
|
2019-03-16 02:15:07 +03:00
|
|
|
As of release 0.67, the Windows executables and installer also contain
|
|
|
|
built-in signatures that are automatically verified by Windows' own
|
|
|
|
mechanism (\q{\i{Authenticode}}). The keys used for that are different,
|
|
|
|
and are not covered here.
|
|
|
|
|
2005-03-19 05:26:58 +03:00
|
|
|
(Note that none of the keys, signatures, etc mentioned here have
|
|
|
|
anything to do with keys used with SSH - they are purely for verifying
|
|
|
|
the origin of files distributed by the PuTTY team.)
|
|
|
|
|
|
|
|
\H{pgpkeys-pubkey} Public keys
|
|
|
|
|
2016-02-27 11:52:45 +03:00
|
|
|
We maintain multiple keys, stored with different levels of security
|
|
|
|
due to being used in different ways. See \k{pgpkeys-security} below
|
|
|
|
for details.
|
2005-03-19 05:26:58 +03:00
|
|
|
|
2016-02-27 11:52:45 +03:00
|
|
|
The keys we provide are:
|
2005-03-19 05:26:58 +03:00
|
|
|
|
2015-09-02 20:24:39 +03:00
|
|
|
\dt Snapshot Key
|
2005-03-19 05:26:58 +03:00
|
|
|
|
2015-09-02 20:24:39 +03:00
|
|
|
\dd Used to sign routine development builds of PuTTY: nightly
|
|
|
|
snapshots, pre-releases, and sometimes also custom diagnostic builds
|
|
|
|
we send to particular users.
|
2005-03-19 05:26:58 +03:00
|
|
|
|
2015-09-02 20:24:39 +03:00
|
|
|
\dt Release Key
|
2005-03-19 05:26:58 +03:00
|
|
|
|
2015-09-02 20:24:39 +03:00
|
|
|
\dd Used to sign manually released versions of PuTTY.
|
2005-03-19 05:26:58 +03:00
|
|
|
|
2016-02-27 11:52:45 +03:00
|
|
|
\dt Secure Contact Key
|
|
|
|
|
|
|
|
\dd An encryption-capable key suitable for people to send confidential
|
|
|
|
messages to the PuTTY team, e.g. reports of vulnerabilities.
|
|
|
|
|
2015-09-02 20:24:39 +03:00
|
|
|
\dt Master Key
|
2005-03-19 05:26:58 +03:00
|
|
|
|
2016-02-27 11:52:45 +03:00
|
|
|
\dd Used to tie all the above keys into the GPG web of trust. The
|
|
|
|
Master Key signs all the other keys, and other GPG users have signed
|
2015-09-02 20:24:39 +03:00
|
|
|
it in turn.
|
2005-03-19 05:26:58 +03:00
|
|
|
|
2016-02-27 11:52:45 +03:00
|
|
|
The current issue of those keys are available for download from the
|
|
|
|
PuTTY website, and are also available on PGP keyservers using the key
|
|
|
|
IDs listed below.
|
2005-03-19 05:26:58 +03:00
|
|
|
|
2018-08-25 16:36:25 +03:00
|
|
|
\dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/master-2018.asc}{\s{Master Key} (2018)}
|
2015-09-02 20:24:39 +03:00
|
|
|
|
2018-08-25 16:36:25 +03:00
|
|
|
\dd RSA, 4096-bit. Key ID: \cw{76BC7FE4EBFD2D9E}. Fingerprint:
|
|
|
|
\cw{24E1\_B1C5\_75EA\_3C9F\_F752\_\_A922\_76BC\_7FE4\_EBFD\_2D9E}
|
2015-09-02 20:24:39 +03:00
|
|
|
|
2018-08-25 16:36:25 +03:00
|
|
|
\dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/release-2018.asc}{\s{Release Key} (2018)}
|
2015-09-02 20:24:39 +03:00
|
|
|
|
2018-08-25 16:36:25 +03:00
|
|
|
\dd RSA, 3072-bit. Key ID: \cw{6289A25F4AE8DA82}. Fingerprint:
|
|
|
|
\cw{E273\_94AC\_A3F9\_D904\_9522\_\_E054\_6289\_A25F\_4AE8\_DA82}
|
2015-09-02 20:24:39 +03:00
|
|
|
|
2018-08-25 16:36:25 +03:00
|
|
|
\dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/snapshot-2018.asc}{\s{Snapshot Key} (2018)}
|
2016-02-27 11:52:45 +03:00
|
|
|
|
2018-08-25 16:36:25 +03:00
|
|
|
\dd RSA, 3072-bit. Key ID: \cw{38BA7229B7588FD1}. Fingerprint:
|
|
|
|
\cw{C92B\_52E9\_9AB6\_1DDA\_33DB\_\_2B7A\_38BA\_7229\_B758\_8FD1}
|
2016-02-27 11:52:45 +03:00
|
|
|
|
2018-08-25 16:36:25 +03:00
|
|
|
\dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/contact-2018.asc}{\s{Secure Contact Key} (2018)}
|
2015-09-02 20:24:39 +03:00
|
|
|
|
2018-08-25 16:36:25 +03:00
|
|
|
\dd RSA, 3072-bit. Key ID: \cw{657D487977F95C98}. Fingerprint:
|
|
|
|
\cw{A680\_0082\_2998\_6E46\_22CA\_\_0E43\_657D\_4879\_77F9\_5C98}
|
2005-03-19 05:26:58 +03:00
|
|
|
|
|
|
|
\H{pgpkeys-security} Security details
|
|
|
|
|
|
|
|
The various keys have various different security levels. This
|
|
|
|
section explains what those security levels are, and how far you can
|
|
|
|
expect to trust each key.
|
|
|
|
|
2015-09-02 20:24:39 +03:00
|
|
|
\S{pgpkeys-snapshot} The Development Snapshots key
|
2005-03-19 05:26:58 +03:00
|
|
|
|
2015-09-02 20:24:39 +03:00
|
|
|
The Development Snapshots private key is stored \e{without a
|
|
|
|
passphrase}. This is necessary, because the snapshots are generated
|
|
|
|
every night without human intervention, so nobody would be able to
|
|
|
|
type a passphrase.
|
2005-03-19 05:26:58 +03:00
|
|
|
|
2015-09-02 20:24:39 +03:00
|
|
|
The snapshots are built and signed on a team member's home computers,
|
|
|
|
before being uploaded to the web server from which you download them.
|
2005-03-19 05:26:58 +03:00
|
|
|
|
2015-09-02 20:24:39 +03:00
|
|
|
Therefore, a signature from the Development Snapshots key \e{DOES}
|
|
|
|
protect you against:
|
2005-03-19 05:26:58 +03:00
|
|
|
|
|
|
|
\b People tampering with the PuTTY binaries between the PuTTY web site
|
|
|
|
and you.
|
|
|
|
|
2015-09-02 20:24:39 +03:00
|
|
|
\b The maintainers of our web server attempting to abuse their root
|
|
|
|
privilege to tamper with the binaries.
|
2005-03-19 05:26:58 +03:00
|
|
|
|
2015-09-02 20:24:39 +03:00
|
|
|
But it \e{DOES NOT} protect you against:
|
2005-03-19 05:26:58 +03:00
|
|
|
|
2015-09-02 20:24:39 +03:00
|
|
|
\b People tampering with the binaries before they are uploaded to our
|
|
|
|
download servers.
|
2005-03-19 05:26:58 +03:00
|
|
|
|
2015-09-02 20:24:39 +03:00
|
|
|
\b People tampering with the build machines so that the next set of
|
|
|
|
binaries they build will be malicious in some way.
|
2005-03-19 05:26:58 +03:00
|
|
|
|
2015-09-02 20:24:39 +03:00
|
|
|
\b People stealing the unencrypted private key from the build machine
|
|
|
|
it lives on.
|
2005-03-19 05:26:58 +03:00
|
|
|
|
2015-09-02 20:24:39 +03:00
|
|
|
Of course, we take all reasonable precautions to guard the build
|
|
|
|
machines. But when you see a signature, you should always be certain
|
|
|
|
of precisely what it guarantees and precisely what it does not.
|
2005-03-19 05:26:58 +03:00
|
|
|
|
2015-09-02 20:24:39 +03:00
|
|
|
\S{pgpkeys-release} The Releases key
|
2005-03-19 05:26:58 +03:00
|
|
|
|
2015-09-02 20:24:39 +03:00
|
|
|
The Releases key is more secure: because it is only used at release
|
|
|
|
time, to sign each release by hand, we can store it encrypted.
|
2005-03-19 05:26:58 +03:00
|
|
|
|
2015-09-02 20:24:39 +03:00
|
|
|
The Releases private key is kept encrypted on the developers' own
|
|
|
|
local machines. So an attacker wanting to steal it would have to also
|
|
|
|
steal the passphrase.
|
2005-03-19 05:26:58 +03:00
|
|
|
|
2016-02-27 11:52:45 +03:00
|
|
|
\S{pgpkeys-contact} The Secure Contact Key
|
|
|
|
|
|
|
|
The Secure Contact Key is stored with a similar level of security to
|
|
|
|
the Release Key: it is stored with a passphrase, and no automated
|
|
|
|
script has access to it.
|
|
|
|
|
2005-03-19 05:26:58 +03:00
|
|
|
\S{pgpkeys-master} The Master Keys
|
|
|
|
|
2015-09-02 20:24:39 +03:00
|
|
|
The Master Key signs almost nothing. Its purpose is to bind the other
|
|
|
|
keys together and certify that they are all owned by the same people
|
|
|
|
and part of the same integrated setup. The only signatures produced by
|
|
|
|
the Master Key, \e{ever}, should be the signatures on the other keys.
|
2005-03-19 05:26:58 +03:00
|
|
|
|
2015-09-02 20:24:39 +03:00
|
|
|
The Master Key is especially long, and its private key and passphrase
|
|
|
|
are stored with special care.
|
2005-03-19 05:26:58 +03:00
|
|
|
|
2015-09-02 20:24:39 +03:00
|
|
|
We have collected some third-party signatures on the Master Key, in
|
|
|
|
order to increase the chances that you can find a suitable trust path
|
|
|
|
to them.
|
2005-03-19 05:26:58 +03:00
|
|
|
|
|
|
|
We have uploaded our various keys to public keyservers, so that
|
|
|
|
even if you don't know any of the people who have signed our
|
|
|
|
keys, you can still be reasonably confident that an attacker would
|
|
|
|
find it hard to substitute fake keys on all the public keyservers at
|
|
|
|
once.
|
2015-09-02 20:24:39 +03:00
|
|
|
|
|
|
|
\H{pgpkeys-rollover} Key rollover
|
|
|
|
|
2018-08-25 16:36:25 +03:00
|
|
|
Our current keys were generated in August 2018.
|
|
|
|
|
|
|
|
Each new Master Key is signed with the old one, to show that it really
|
|
|
|
is owned by the same people and not substituted by an attacker.
|
2016-02-27 11:52:45 +03:00
|
|
|
|
2018-08-25 16:36:25 +03:00
|
|
|
Each new Master Key also signs the previous Release Keys, in case
|
|
|
|
you're trying to verify the signatures on a release prior to the
|
|
|
|
rollover and can find a chain of trust to those keys from any of the
|
|
|
|
people who have signed our new Master Key.
|
2015-09-02 20:24:39 +03:00
|
|
|
|
2018-08-25 16:36:25 +03:00
|
|
|
Each release is signed with the Release Key that was current at the
|
|
|
|
time of release. We don't go back and re-sign old releases with newly
|
|
|
|
generated keys.
|
2015-09-02 20:24:39 +03:00
|
|
|
|
2018-08-25 16:36:25 +03:00
|
|
|
The details of all previous keys are given here.
|
|
|
|
|
|
|
|
\s{Key generated in 2016} (when we first introduced the Secure Contact Key)
|
|
|
|
|
|
|
|
\dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/contact-2016.asc}{\s{Secure Contact Key} (2016)}
|
|
|
|
|
|
|
|
\dd RSA, 2048-bit. Main key ID: \cw{2048R/8A0AF00B} (long version:
|
|
|
|
\cw{2048R/C4FCAAD08A0AF00B}). Encryption subkey ID:
|
|
|
|
\cw{2048R/50C2CF5C} (long version: \cw{2048R/9EB39CC150C2CF5C}).
|
|
|
|
Fingerprint:
|
|
|
|
\cw{8A26\_250E\_763F\_E359\_75F3\_\_118F\_C4FC\_AAD0\_8A0A\_F00B}
|
|
|
|
|
|
|
|
\s{Keys generated in the 2015 rollover}
|
|
|
|
|
|
|
|
\dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/master-2015.asc}{\s{Master Key} (2015)}
|
|
|
|
|
|
|
|
\dd RSA, 4096-bit. Key ID: \cw{4096R/04676F7C} (long version:
|
|
|
|
\cw{4096R/AB585DC604676F7C}). Fingerprint:
|
|
|
|
\cw{440D\_E3B5\_B7A1\_CA85\_B3CC\_\_1718\_AB58\_5DC6\_0467\_6F7C}
|
|
|
|
|
|
|
|
\dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/release-2015.asc}{\s{Release Key} (2015)}
|
|
|
|
|
|
|
|
\dd RSA, 2048-bit. Key ID: \cw{2048R/B43434E4} (long version:
|
|
|
|
\cw{2048R/9DFE2648B43434E4}). Fingerprint:
|
|
|
|
\cw{0054\_DDAA\_8ADA\_15D2\_768A\_\_6DE7\_9DFE\_2648\_B434\_34E4}
|
|
|
|
|
|
|
|
\dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/snapshot-2015.asc}{\s{Snapshot Key} (2015)}
|
|
|
|
|
|
|
|
\dd RSA, 2048-bit. Key ID: \cw{2048R/D15F7E8A} (long version:
|
|
|
|
\cw{2048R/EEF20295D15F7E8A}). Fingerprint:
|
|
|
|
\cw{0A3B\_0048\_FE49\_9B67\_A234\_\_FEB6\_EEF2\_0295\_D15F\_7E8A}
|
2015-09-02 20:24:39 +03:00
|
|
|
|
2018-08-25 16:36:25 +03:00
|
|
|
\s{Original keys generated in 2000} (two sets, RSA and DSA)
|
2015-09-02 20:24:39 +03:00
|
|
|
|
2017-05-07 18:29:01 +03:00
|
|
|
\dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/master-rsa.asc}{\s{Master Key} (original RSA)}
|
2015-09-02 20:24:39 +03:00
|
|
|
|
|
|
|
\dd RSA, 1024-bit. Key ID: \cw{1024R/1E34AC41} (long version:
|
|
|
|
\cw{1024R/9D5877BF1E34AC41}). Fingerprint:
|
|
|
|
\cw{8F\_15\_97\_DA\_25\_30\_AB\_0D\_\_88\_D1\_92\_54\_11\_CF\_0C\_4C}
|
|
|
|
|
2017-05-07 18:29:01 +03:00
|
|
|
\dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/master-dsa.asc}{\s{Master Key} (original DSA)}
|
2015-09-02 20:24:39 +03:00
|
|
|
|
|
|
|
\dd DSA, 1024-bit. Key ID: \cw{1024D/6A93B34E} (long version:
|
|
|
|
\cw{1024D/4F5E6DF56A93B34E}). Fingerprint:
|
|
|
|
\cw{313C\_3E76\_4B74\_C2C5\_F2AE\_\_83A8\_4F5E\_6DF5\_6A93\_B34E}
|
|
|
|
|
2017-05-07 18:29:01 +03:00
|
|
|
\dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/release-rsa.asc}{\s{Release Key} (original RSA)}
|
2015-09-02 20:24:39 +03:00
|
|
|
|
|
|
|
\dd RSA, 1024-bit. Key ID: \cw{1024R/B41CAE29} (long version:
|
|
|
|
\cw{1024R/EF39CCC0B41CAE29}). Fingerprint:
|
|
|
|
\cw{AE\_65\_D3\_F7\_85\_D3\_18\_E0\_\_3B\_0C\_9B\_02\_FF\_3A\_81\_FE}
|
|
|
|
|
2017-05-07 18:29:01 +03:00
|
|
|
\dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/release-dsa.asc}{\s{Release Key} (original DSA)}
|
2015-09-02 20:24:39 +03:00
|
|
|
|
|
|
|
\dd DSA, 1024-bit. Key ID: \cw{1024D/08B0A90B} (long version:
|
|
|
|
\cw{1024D/FECD6F3F08B0A90B}). Fingerprint:
|
|
|
|
\cw{00B1\_1009\_38E6\_9800\_6518\_\_F0AB\_FECD\_6F3F\_08B0\_A90B}
|
|
|
|
|
2017-05-07 18:29:01 +03:00
|
|
|
\dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/snapshot-rsa.asc}{\s{Snapshot Key} (original RSA)}
|
2015-09-02 20:24:39 +03:00
|
|
|
|
|
|
|
\dd RSA, 1024-bit. Key ID: \cw{1024R/32B903A9} (long version:
|
|
|
|
\cw{1024R/FAAED21532B903A9}). Fingerprint:
|
|
|
|
\cw{86\_8B\_1F\_79\_9C\_F4\_7F\_BD\_\_8B\_1B\_D7\_8E\_C6\_4E\_4C\_03}
|
|
|
|
|
2017-05-07 18:29:01 +03:00
|
|
|
\dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/snapshot-dsa.asc}{\s{Snapshot Key} (original DSA)}
|
2015-09-02 20:24:39 +03:00
|
|
|
|
|
|
|
\dd DSA, 1024-bit. Key ID: \cw{1024D/7D3E4A00} (long version:
|
|
|
|
\cw{1024D/165E56F77D3E4A00}). Fingerprint:
|
|
|
|
\cw{63DD\_8EF8\_32F5\_D777\_9FF0\_\_2947\_165E\_56F7\_7D3E\_4A00}
|