Jump to: navigation, search

Template:Verify the virtual machine images using the command line

You need to have GnuPG installed. GnuPG is the common OpenPGP implementation for Linux: it is installed by default under Debian, Ubuntu, Whonix and many other distributions.

Import the signing key, refer to the Whonix Signing Key instructions.

Now, download the cryptographic (OpenPGP) signature corresponding to the virtual machine images you want to verify and save it in the same folder as the virtual machine images:

[[{{{download_signature_link}}}|Download Whonix Signature]]

Then, start the cryptographic verification, it can take several minutes.


If the Virtual Machine image is correct the output will tell you that the signature is good:


This might be followed by a warning saying:

gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.

This doesn't alter the validity of the signature according to the key you downloaded. This warning rather has to do with the trust that you put in Whonix signing key and the web of trust. To remove this warning you would have to personally sign Whonix signing key with your own key.

The first line includes the signature creation timestamp. Example.

gpg: Signature made Mon 19 Jan 2015 11:45:41 PM CET using RSA key ID 77BB3C48

To help you check, that the file name has not been tampered with, beginning from Whonix version 9.6 and above, by convention, the file@name OpenPGP notation includes the file name. See example below.


If the Virtual Machine image is not correct the output will tell you that the signature is bad:

gpg: Signature made Sun Nov 25 21:48:54 2012 UTC
gpg:                using RSA key 77BB3C48
gpg: BAD signature from "Patrick Schleizer <adrelanos@riseup.net>"

Repeat these steps for Whonix-Workstation as well.



If you encounter an error with GPG, first try a web search with the relevant error text. Additionally, the security stackexchange siteis able to help with GPG problems. Describe your problem thoroughly, but be sure that your question is GPG related and not Whonix specific.

More help resources are on the Support page.


  1. Defined as per TUF: Attacks and Weaknesses:
  2. http://lists.gnupg.org/pipermail/gnupg-users/2015-January/052185.html


Whonix Verify_the_virtual_machine_images_using_the_command_line wiki page Copyright (C) Amnesia <amnesia at boum dot org> Whonix Verify_the_virtual_machine_images_using_the_command_line wiki page Copyright (C) 2012 -2014 Patrick Schleizer <adrelanos@riseup.net>

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code. This is free software, and you are welcome to redistribute it under certain conditions; see the wiki source code for details.

Random News:

Do you know our Documentation, Technical Design and Developer Portal already?

Impressum | Datenschutz | Haftungsausschluss

https | (forcing) onion
Share: Twitter | Facebook | Google+
This is a wiki. Want to improve this page? Help welcome, volunteer contributions are happily considered! See Conditions for Contributions to Whonix, then Edit! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation. Whonix (g+) is a licensee of the Open Invention Network. Unless otherwise noted above, content of this page is copyrighted and licensed under the same Free (as in speech) license as Whonix itself.