Verify VirtualBox Virtual Machine Images on the Command Line
Instructions for OpenPGP Verification of Whonix ™ VirtualBox on the Command Line
In order to verify the Whonix ™ image, GnuPG must be installed. GnuPG is the common OpenPGP implementation for Linux: it is installed by default in Debian, Ubuntu, Whonix ™ and many other distributions.
1. Import the signing key.
Refer the the more secure, detailed Whonix ™ Signing Key instructions.
2. Download the cryptographic (OpenPGP) signature corresponding to the virtual machine image you want to verify.
3. Save the signature in the same folder as the virtual machine image.
Whonix ™ VirtualBox CLI:
Whonix ™ VirtualBox XFCE:
Alternatively press the
[Expand] button next to the "Download" button on the download page VirtualBox or VirtualBox. 
4. Start the cryptographic verification.
This process can take several minutes.
cd [the directory in which you downloaded the .ova and the .asc]
gpg --verify-options show-notations --verify Whonix-*.ova.asc Whonix-*.ova
5. Check the output of the verification step.
If the file is verified successfully, the output will include
Good signature, which is the most important thing to check.
Should look similar to the following example.
gpg: Good signature from "Patrick Schleizer <firstname.lastname@example.org>" [unknown] gpg: Signature notation: email@example.com=6E979B28A6F37C43BE30AFA1CB8D50BB77BB3C48 gpg: Signature notation: file@name=Whonix-184.108.40.206.ova gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner. Primary key fingerprint: 916B 8D99 C38E AF5E 8ADC 7A2A 8D66 066A 2EEA CCDASubkey fingerprint: 6E97 9B28 A6F3 7C43 BE30 AFA1 CB8D 50BB 77BB 3C48
gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner.
This message does not alter the validity of the signature related to the downloaded key. Rather, this warning refers to the level of trust placed in the Whonix ™ signing key and the web of trust. To remove this warning, the Whonix ™ signing key must be personally signed with your own key.
The first line includes the signature creation timestamp; see the example below.
gpg: Signature made Mon 19 Jan 2015 11:45:41 PM CET using RSA key ID 77BB3C48
file@name OpenPGP notation in Whonix ™ release signatures describes the file name. This helps to confirm that the file name has not been tampered with; see the example below.
gpg: Signature notation: file@name=Whonix-220.127.116.11.ova
If the Virtual Machine image is not correct, the output will inform that the signature is bad:
gpg: Signature made Sun Nov 25 21:48:54 2012 UTC gpg: using RSA key 77BB3C48 gpg: BAD signature from "Patrick Schleizer <firstname.lastname@example.org>"
When a GPG error is encountered, first try a web search for the relevant error. The security stackexchange website can also help to resolve GPG problems. Describe the problem thoroughly, but be sure it is GPG-related and not specific to Whonix ™.
More help resources are available on the Support page.
- ↑ As defined by TUF: Attacks and Weaknesses:
- ↑ https://lists.gnupg.org/pipermail/gnupg-users/2015-January/052185.html
Whonix ™ VirtualBox/Verify the virtual machine images using Linux wiki page Copyright (C) Amnesia <amnesia at boum dot org>
Whonix ™ VirtualBox/Verify the virtual machine images using Linux wiki page Copyright (C) 2012 - 2022 ENCRYPTED SUPPORT LP <
This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it under certain conditions; see the wiki source code for details.
We believe security software like Whonix needs to remain open source and independent. Would you help sustain and grow the project? Learn more about our 10 year success story and maybe DONATE!