You are not logged in.
Offline
Because you should use the PGP signature to check validity, the checksums are only used to check integrity.
Sakura:-
Mobo: MSI MAG X570S TORPEDO MAX // Processor: AMD Ryzen 9 5950X @4.9GHz // GFX: AMD Radeon RX 5700 XT // RAM: 32GB (4x 8GB) Corsair DDR4 (@ 3000MHz) // Storage: 1x 3TB HDD, 6x 1TB SSD, 2x 120GB SSD, 1x 275GB M2 SSD
Making lemonade from lemons since 2015.
Offline
Because you should use the PGP signature to check validity, the checksums are only used to check integrity.
Can you please elaborate?
Offline
If a malicious actor did manage to replace the iso file with a file that had the same md5 and/or sha1 fingerprint, the file would not pass the PGP signature check.
Sakura:-
Mobo: MSI MAG X570S TORPEDO MAX // Processor: AMD Ryzen 9 5950X @4.9GHz // GFX: AMD Radeon RX 5700 XT // RAM: 32GB (4x 8GB) Corsair DDR4 (@ 3000MHz) // Storage: 1x 3TB HDD, 6x 1TB SSD, 2x 120GB SSD, 1x 275GB M2 SSD
Making lemonade from lemons since 2015.
Offline
the file would not pass the PGP signature check.
Wait what's it with PGP? Isn't this command check checksums?
gpg --keyserver-options auto-key-retrieve --verify archlinux-version-x86_64.iso.sig
Offline
No, it checks the PGP signature that WorMzy mentioned.
Last edited by schard (2022-03-03 14:00:54)
Inofficial first vice president of the Rust Evangelism Strike Force
Offline
Or the https://wiki.archlinux.org/title/Instal … _signature …
md5/sha1 mismatches tell you that the download was crippled and on some inferior OS which usually don't have any pgp/gpg installation but the md5 in the files context menu, it's still much MUCH better than nothing.
Offline