blob: c5d94bf8728ab1ad672c60d432be1b6ded7e8d12 [file] [log] [blame] [view]
## Verifying checksums
It is essential that you verify the integrity of the downloaded
files using the PGP and MD5/SHA512 signatures. MD5/SHA512 verification ensures the
file was not corrupted during the download process. PGP verification
ensures that the file came from a certain person.
To verify the MD5 signature on the files, you need to use a program
called _md5_ or _md5sum_, which is
included in many unix distributions. It is also available as part of
[GNU Textutils](http://www.gnu.org/software/textutils/textutils.html).
Windows users can get binary md5 programs from [here](http://www.fourmilab.ch/md5/),
[here](http://www.pc-tools.net/win32/freeware/console/), or
[here](http://www.slavasoft.com/fsum/).
To verify the SHA512 signature on the files, you need to use a program called
e.g. _sha, shasum, sha512sum_ which is included in many unix distributions, MacOS
and Windows.
## Verifying signatures
Signature verification ensures that the file came from a certain person. We strongly recommend
you verify your downloads.
The PGP signatures can be verified using tools that implement the [OpenPGP](http://www.pgpi.org/) standard, such as
[GnuPG](http://www.gnupg.org/). First download the Apache MyFaces
[KEYS](https://www.apache.org/dist/myfaces/KEYS) as well as the _asc_ signature file
for the particular distribution. It is important that you get these files from the ultimate
trusted source - the main ASF distribution site, rather than from a mirror.
Then, to verify the signatures through the gpg command line, use the following command:
```
% gpg --import KEYS
% gpg --verify myfaces-core-X.Y.Z-bin.tar.gz.asc myfaces-core-X.Y.Z-bin.tar.gz
```
More can be read about verifying downloads [here](https://www.apache.org/info/verification.html#CheckingSignatures).