Verifying software downloads on Linux, Windows, and macOS
April 09, 2020 / adminSecurity, Technical
Don’t care what’s behind the scenes? Skip straight to software verification tutorials for macOS, Linux, and Windows.
Back in the day, software used to arrive in the form of floppy discs, MiniDiscs, and CD-ROMs. But now, it’s all about the download. Everything is downloaded: the apps you use to keep in touch with your family, the video games you use to wind down after work, and probably even the web browser you’re using to read this article.
But this introduces a problem — how do you make sure all this software you’re downloading is authentic?
Well, first thing’s first: you should always make sure you’re downloading software from a trusted source. For Session (and most open-source projects), all our official releases can be found on our GitHub and our website, https://getsession.org. If you really want to, you can even check Session’s code and compile it yourself. That way, you know exactly what your computer is running.
For the rest of us, you can do something called hash verification. Hash-what, you ask? Well, you can apply a cryptographic hashing algorithm to a piece of information — such as a computer program — and it’ll generate a functionally unique hash. This means that if two different people can generate the same hash, they can verify that they’ve both got the exact same information.
256 bits of data on the wall: SHA-256
One of the most commonly used hashing algorithm families is the ingeniously named Secure Hash Algorithm 2 (SHA-2), which contains the hashing function SHA-256 (more on that later).
But, the biggest reason hashes are important is because they’re one-way tickets: you can use any data to generate a hash, but you never use a hash to generate data.
This means that, for example, if you and a Session developer can generate matching hashes using a version of Session, you’ll know for sure your version is exactly the same as the one shipped by the developer.
Signed, sealed, delivered: Public key encryption
So, you compared the hash of your version of Session with a hash published by a Session developer, and they matched! Great, but… how do you know it’s really a Session dev that sent you that hash? Verifying online identities can be tricky, but in this case it’s doable using public key encryption — like the one Session uses in its decentralised friend request system.
GNU Privacy Guard (GPG) allows for the secure transmission of information, and we can use it to verify both the origin of a message, and that its contents haven’t been altered.
Using GPG encryption, you can sign a piece of information — like a message containing a hash. Once you’ve done that, anybody that has your GPG public key can check to see if it was the real you that signed the message.
That’s why we always publish signed hashes with all of our releases — so you can rest easy knowing your copy of Session hasn’t been tinkered with. You can find them on our GitHub, or at https://getsession.org/download.
Here’s how you can use those signed hashes to verify your downloads. The process is slightly different depending on which operating system you’re using, so we’ve included guides for Windows, Linux, and MacOS.
Verifying files using GPG on Windows
If you prefer, we’ve also created a video tutorial for verifying files using GPG on Windows.
0. Download a copy of Session, and then find a message that looks like this:
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
The following hashes have been signed for verification using keejef's GPG keys located in the loki core repository at https://github.com/loki-project/loki-core/blob/master/utils/gpg_keys/KeeJef.asc.
SHA256 Hashes
latest-linux.yml 1c529ec13984163337b750af6a11492fc3007d34cc35f3d52dcacebfbf04c685 latest-mac.yml 424583aebbf6ad7bf1c1703f4590206c68cc24724e9e53e39941fa53f9d2aef4 latest.yml 51ccf1a9a156709f99cff89f606540e7bd8ac8761ed005295d79261c08111f1e session-messenger-desktop-linux-amd64-1.0.6.deb 4a2f8832887cd901bf091d6122aa20d9f6317db62b922407b5e9ebbf72cb439c session-messenger-desktop-linux-x86_64-1.0.6.AppImage 43abf0d0aedf200c14a853070965142d3fdbe39b26e4186e1814418612f9f8b5 session-messenger-desktop-mac-1.0.6.dmg 04128f0e2ba8568ffde61a68ddf27b8753064823683ab9fa9889857bc27fb98e session-messenger-desktop-mac-1.0.6.dmg.blockmap d91d444071c9e9941a04c75831172b9341703a31ddd6cce5f0394e8f6f5499b5 session-messenger-desktop-mac-1.0.6.zip a17ad640ba619a55ee77b99e6051ba5ac7066cc973099a61c29fec488026c9f2 session-messenger-desktop-win-1.0.6.exe 0f4b0231ea0db7a2179311ea014dfb30364bd787ddc94af41c4340bc0687b609 session-messenger-desktop-win-1.0.6.exe.blockmap b7bf63565caed4ca60e3d68893786b333f622554e9c4a3ade3f909da7ea1f5d7 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQEcBAEBCgAGBQJeiBa0AAoJEKyXFIlc5F1VL/cH/iyfqB9a1T9PDFOPTSFrAfWg OOC2na/vlBDuI5a7wY71ZkWXIgFln/hmJTotU0L9d35HqD9/DEBhjDhftceOKrzt h/RdQrm5YIBRdwdmEhXrTGfN2GVs0MpHobfc++InOR/E+pJ8+lvIXvX4WqO2cQJl fJWcJ02l2qoE5sC7VkQ71uEhggP7fsXlCT+yqAr01sr8Z8RAZ2snOzN97cejFUXF /E8L4amIE2/EkXvWBps+Q82AuuOLilkV00r+lAmqgStiDAEhtPSYA/lq2d9HzE8x utx4NbHOOysJgaPjU+iL/IaAeOaapX1Ejs2zM37+3wJdJ4MnVUCm9fI2v9sbV3s= =o45M -----END PGP SIGNATURE-----
It’s always located with the release notes on GitHub and under the Signatures button at https://getsession.org. Here’s everything else you’ll need to do:
1. Download and install a trusted GPG utility such as gpg4usb.
2. Find the public key that signed your download. The public keys of all of our developers are on our GitHub. In this example, the PGP signed message says this at the top:
The following hashes have been signed for verification using keejef’s GPG keys located in the oxen core repository at https://github.com/oxen-io/oxen-core/blob/master/utils/gpg_keys/KeeJef.asc.
Follow the link in this message.
3. Copy the entire PGP public key block to your clipboard.
4. In gpg4usb, click ‘Import Key’ > ‘Clipboard’.
5. The key import details should appear in a pop-up window. Click ‘OK’. The name of whoever owns the key should appear in the right-hand window.
6. Tick the checkbox next to this name.
7. Copy the entire PGP signed message and PGP signature from step 0.
8. Paste it into the text-box in the left-hand window of gpg4usb.
9. Click ‘verify’.
10. If the message was signed by the key you imported, a green bar at the bottom of the text-box will appear with the message ‘Text was completely signed by: Kee Jefferys’.
We’ve now successfully verified that the hashes posted with the release were uploaded by Kee — a trusted developer for Session.
Now we need to check that the hash of your local file matches the hash that Kee generated.
11. Open a command line — such as Command Prompt, which comes pre-installed with Windows.
12. Type the following into your command line:
certUtil -hashfile your_file_path_here sha256
13. Hit enter. Your command line should generate a SHA256 hash.
14. Compare the hash you generated with the one published in Kee’s signed message. If they match, you’ve successfully verified that your files are the same.
Done!
Verifying files using GPG on Linux
If you prefer, we’ve also created a video tutorial for verifying files using GPG on Linux.
0. Download a copy of Session, and then find a message that looks like this:
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
The following hashes have been signed for verification using keejef's GPG keys located in the loki core repository at https://github.com/loki-project/loki-core/blob/master/utils/gpg_keys/KeeJef.asc.
SHA256 Hashes
latest-linux.yml 1c529ec13984163337b750af6a11492fc3007d34cc35f3d52dcacebfbf04c685 latest-mac.yml 424583aebbf6ad7bf1c1703f4590206c68cc24724e9e53e39941fa53f9d2aef4 latest.yml 51ccf1a9a156709f99cff89f606540e7bd8ac8761ed005295d79261c08111f1e session-messenger-desktop-linux-amd64-1.0.6.deb 4a2f8832887cd901bf091d6122aa20d9f6317db62b922407b5e9ebbf72cb439c session-messenger-desktop-linux-x86_64-1.0.6.AppImage 43abf0d0aedf200c14a853070965142d3fdbe39b26e4186e1814418612f9f8b5 session-messenger-desktop-mac-1.0.6.dmg 04128f0e2ba8568ffde61a68ddf27b8753064823683ab9fa9889857bc27fb98e session-messenger-desktop-mac-1.0.6.dmg.blockmap d91d444071c9e9941a04c75831172b9341703a31ddd6cce5f0394e8f6f5499b5 session-messenger-desktop-mac-1.0.6.zip a17ad640ba619a55ee77b99e6051ba5ac7066cc973099a61c29fec488026c9f2 session-messenger-desktop-win-1.0.6.exe 0f4b0231ea0db7a2179311ea014dfb30364bd787ddc94af41c4340bc0687b609 session-messenger-desktop-win-1.0.6.exe.blockmap b7bf63565caed4ca60e3d68893786b333f622554e9c4a3ade3f909da7ea1f5d7 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQEcBAEBCgAGBQJeiBa0AAoJEKyXFIlc5F1VL/cH/iyfqB9a1T9PDFOPTSFrAfWg OOC2na/vlBDuI5a7wY71ZkWXIgFln/hmJTotU0L9d35HqD9/DEBhjDhftceOKrzt h/RdQrm5YIBRdwdmEhXrTGfN2GVs0MpHobfc++InOR/E+pJ8+lvIXvX4WqO2cQJl fJWcJ02l2qoE5sC7VkQ71uEhggP7fsXlCT+yqAr01sr8Z8RAZ2snOzN97cejFUXF /E8L4amIE2/EkXvWBps+Q82AuuOLilkV00r+lAmqgStiDAEhtPSYA/lq2d9HzE8x utx4NbHOOysJgaPjU+iL/IaAeOaapX1Ejs2zM37+3wJdJ4MnVUCm9fI2v9sbV3s= =o45M -----END PGP SIGNATURE-----
It’s always located with the release notes on GitHub and under the Signatures button at https://getsession.org. Here’s everything else you’ll need to do:
1. Find the public key that signed your download. The public keys of all of our developers are on our GitHub. In this example, the PGP signed message says this at the top:
The following hashes have been signed for verification using keejef’s GPG keys located in the loki core repository at https://github.com/oxen-io/oxen-core/blob/master/utils/gpg_keys/KeeJef.asc.
2. Copy the entire PGP public key block to your clipboard.
3. Open your command line — such as Terminal.
4. Type the following and then hit enter:
gpg --import
5. Paste your clipboard and hit enter.
6. Press ctrl+d, this will import the key you’ve just pasted. Some information should appear about the owner of the key.
7. Copy the entire PGP signed message and PGP signature from step 0 to your clipboard.
8. Go back to your command line, type the following, and hit enter:
gpg --verify
9. Paste your clipboard and hit enter.
10. Press Ctrl+D, this will verify that the key you imported signed this message. A message should appear containing ‘good signature’. If it says bad signature, the key you imported did not sign the message.
Hopefully, we’ve now successfully verified that the hashes posted with the release were uploaded by Kee — a trusted developer for Session.
Now we need to check that the hash of your local file matches the hash that Kee generated.
11. In your command line, type the following and hit enter:
sha256sum your_file_path_here
12. A SHA256 hash will appear in your command line. Compare the hash you have generated to the one published in Kee’s signed message. If they match, you’ve successfully verified that your files are the same.
Done!
Verifying files using GPG on MacOS
If you prefer, we’ve also created a video tutorial for verifying files using GPG on MacOS.
0. Download a copy of Session, and then find a message that looks like this:
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
The following hashes have been signed for verification using keejef's GPG keys located in the loki core repository at https://github.com/loki-project/loki-core/blob/master/utils/gpg_keys/KeeJef.asc.
SHA256 Hashes
latest-linux.yml 1c529ec13984163337b750af6a11492fc3007d34cc35f3d52dcacebfbf04c685 latest-mac.yml 424583aebbf6ad7bf1c1703f4590206c68cc24724e9e53e39941fa53f9d2aef4 latest.yml 51ccf1a9a156709f99cff89f606540e7bd8ac8761ed005295d79261c08111f1e session-messenger-desktop-linux-amd64-1.0.6.deb 4a2f8832887cd901bf091d6122aa20d9f6317db62b922407b5e9ebbf72cb439c session-messenger-desktop-linux-x86_64-1.0.6.AppImage 43abf0d0aedf200c14a853070965142d3fdbe39b26e4186e1814418612f9f8b5 session-messenger-desktop-mac-1.0.6.dmg 04128f0e2ba8568ffde61a68ddf27b8753064823683ab9fa9889857bc27fb98e session-messenger-desktop-mac-1.0.6.dmg.blockmap d91d444071c9e9941a04c75831172b9341703a31ddd6cce5f0394e8f6f5499b5 session-messenger-desktop-mac-1.0.6.zip a17ad640ba619a55ee77b99e6051ba5ac7066cc973099a61c29fec488026c9f2 session-messenger-desktop-win-1.0.6.exe 0f4b0231ea0db7a2179311ea014dfb30364bd787ddc94af41c4340bc0687b609 session-messenger-desktop-win-1.0.6.exe.blockmap b7bf63565caed4ca60e3d68893786b333f622554e9c4a3ade3f909da7ea1f5d7 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQEcBAEBCgAGBQJeiBa0AAoJEKyXFIlc5F1VL/cH/iyfqB9a1T9PDFOPTSFrAfWg OOC2na/vlBDuI5a7wY71ZkWXIgFln/hmJTotU0L9d35HqD9/DEBhjDhftceOKrzt h/RdQrm5YIBRdwdmEhXrTGfN2GVs0MpHobfc++InOR/E+pJ8+lvIXvX4WqO2cQJl fJWcJ02l2qoE5sC7VkQ71uEhggP7fsXlCT+yqAr01sr8Z8RAZ2snOzN97cejFUXF /E8L4amIE2/EkXvWBps+Q82AuuOLilkV00r+lAmqgStiDAEhtPSYA/lq2d9HzE8x utx4NbHOOysJgaPjU+iL/IaAeOaapX1Ejs2zM37+3wJdJ4MnVUCm9fI2v9sbV3s= =o45M -----END PGP SIGNATURE-----
It’s always located with the release notes on GitHub and under the Signatures button at https://getsession.org. Here’s everything else you’ll need to do:
1. Download and install GPGSuite.
2. Find the public key that signed your download. The public keys of all of our developers are on our GitHub. In this example, the PGP signed message says this at the top:
The following hashes have been signed for verification using keejef’s GPG keys located in the loki core repository at https://github.com/oxen-io/oxen-core/blob/master/utils/gpg_keys/KeeJef.asc.
3. Click ‘RAW’, and then save the .asc file to your computer.
4. Open your command line (such as Terminal), type the following, and hit enter:
gpg --import your_.asc_file_path_here
5. Right click the ‘gpg: key’ that appears, and then click copy.
6. Type the following into your command line, then hit enter:
gpg --fingerprint paste_gpg_key_here
7. You’ve now imported a GPG key. Some information should appear about the owner of the key.
8. Copy the entire PGP signed message and PGP signature from step 0 to your clipboard.
9. Type this into your command line and hit enter:
gpg --verify
10. Paste your clipboard, hit enter, then hit ctrl+d. A message should appear containing ‘good signature’. If it says bad signature, the key you imported did not sign the message.
Hopefully, we’ve now successfully verified that the hashes posted with the release were uploaded by Kee — a trusted developer for Session.
Now we need to check that the hash of your local file matches the hash that Kee generated.
11. In your command line, type the following and hit enter:
shasum -a 256 your_file_path_here
12. A SHA256 hash will appear in your command line. Compare the hash you have generated to the one published in Kee’s signed message. If they match, you’ve successfully verified that your files are the same.
Done!
Verifying software with GPG: Done!
There is a lot to learn in the world of public key encryption. Really, this article just brushes the surface of what you can accomplish with these tools.
Verifying the software you’re downloading is always important, especially if you’re dealing with something that is going to handle sensitive information — like a private messaging app. Now you can make sure your version of Session is the same as the version we shipped, and relax knowing that nobody in the world can snoop on your messages.
Three reasons to choose a decentralised private messaging app
December 25, 2024 / Session
How to stay safe on Session
December 18, 2024 / Session
The Privacy Risks of Digital IDs: What You Need to Know
November 26, 2024 / Session
Session User Survey: What Drives You to Join Online Communities?
October 21, 2024 / Wesley Sukh
Celebrating Global Encryption Day
October 20, 2024 / Session
Introducing the Session Technology Foundation
October 15, 2024 / Session