123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286 |
- \A{pgpkeys} PuTTY download keys and signatures
- \I{verifying new versions}We create \i{GPG signatures} for all the PuTTY
- files distributed from our web site, so that users can be confident
- that the files have not been tampered with. Here we identify
- our public keys, and explain our signature policy so you can have an
- accurate idea of what each signature guarantees.
- This description is provided as both a web page on the PuTTY site, and
- an appendix in the PuTTY manual.
- As of release 0.58, all of the PuTTY executables contain fingerprint
- material (usually accessed via the \i\c{-pgpfp} command-line
- option), such that if you have an executable you trust, you can use
- it to establish a trust path, for instance to a newer version
- downloaded from the Internet.
- As of release 0.67, the Windows executables and installer also contain
- built-in signatures that are automatically verified by Windows' own
- mechanism (\q{\i{Authenticode}}). The keys used for that are different,
- and are not covered here.
- See \k{faq-checksums} in the FAQ for some gotchas when verifying
- checksums and signatures.
- (Note that none of the keys, signatures, etc mentioned here have
- anything to do with keys used with SSH - they are purely for verifying
- the origin of files distributed by the PuTTY team.)
- \H{pgpkeys-pubkey} Public keys
- We maintain multiple keys, stored with different levels of security
- due to being used in different ways. See \k{pgpkeys-security} below
- for details.
- The keys we provide are:
- \dt Snapshot Key
- \dd Used to sign routine development builds of PuTTY: nightly
- snapshots, pre-releases, and sometimes also custom diagnostic builds
- we send to particular users.
- \dt Release Key
- \dd Used to sign manually released versions of PuTTY.
- \dt Secure Contact Key
- \dd An encryption-capable key suitable for people to send confidential
- messages to the PuTTY team, e.g. reports of vulnerabilities.
- \dt Master Key
- \dd Used to tie all the above keys into the GPG web of trust. The
- Master Key signs all the other keys, and other GPG users have signed
- it in turn.
- The current issue of those keys are available for download from the
- PuTTY website, and are also available on PGP keyservers using the key
- IDs listed below.
- \dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/master-2023.asc}{\s{Master Key} (2023)}
- \dd RSA, 4096-bit. Key ID: \cw{B15D9EFC216B06A1}. Fingerprint:
- \cw{28D4\_7C46\_55E7\_65A6\_D827\_AC66\_B15D\_9EFC\_216B\_06A1}
- \dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/release-2023.asc}{\s{Release Key} (2023)}
- \dd RSA, 3072-bit. Key ID: \cw{1993D21BCAD1AA77}. Fingerprint:
- \cw{F412\_BA3A\_A30F\_DC0E\_77B4\_E387\_1993\_D21B\_CAD1\_AA77}
- \dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/snapshot-2023.asc}{\s{Snapshot Key} (2023)}
- \dd RSA, 3072-bit. Key ID: \cw{10625E553F53FAAD}. Fingerprint:
- \cw{74CC\_6DD9\_ABA7\_31D4\_C5A0\_C2D0\_1062\_5E55\_3F53\_FAAD}
- \dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/contact-2023.asc}{\s{Secure Contact Key} (2023)}
- \dd RSA, 3072-bit. Key ID: \cw{1559F6A8929F5EFC}. Fingerprint:
- \cw{01F5\_A2B1\_1388\_D64B\_707F\_897F\_1559\_F6A8\_929F\_5EFC}
- \H{pgpkeys-security} Security details
- The various keys have various different security levels. This
- section explains what those security levels are, and how far you can
- expect to trust each key.
- \S{pgpkeys-snapshot} The Development Snapshots key
- The Development Snapshots private key is stored \e{without a
- passphrase}. This is necessary, because the snapshots are generated
- every night without human intervention, so nobody would be able to
- type a passphrase.
- The snapshots are built and signed on a team member's home computers,
- before being uploaded to the web server from which you download them.
- Therefore, a signature from the Development Snapshots key \e{DOES}
- protect you against:
- \b People tampering with the PuTTY binaries between the PuTTY web site
- and you.
- \b The maintainers of our web server attempting to abuse their root
- privilege to tamper with the binaries.
- But it \e{DOES NOT} protect you against:
- \b People tampering with the binaries before they are uploaded to our
- download servers.
- \b People tampering with the build machines so that the next set of
- binaries they build will be malicious in some way.
- \b People stealing the unencrypted private key from the build machine
- it lives on.
- Of course, we take all reasonable precautions to guard the build
- machines. But when you see a signature, you should always be certain
- of precisely what it guarantees and precisely what it does not.
- \S{pgpkeys-release} The Releases key
- The Releases key is more secure: because it is only used at release
- time, to sign each release by hand, we can store it encrypted.
- The Releases private key is kept encrypted on the developers' own
- local machines. So an attacker wanting to steal it would have to also
- steal the passphrase.
- \S{pgpkeys-contact} The Secure Contact Key
- The Secure Contact Key is stored with a similar level of security to
- the Release Key: it is stored with a passphrase, and no automated
- script has access to it.
- \S{pgpkeys-master} The Master Keys
- The Master Key signs almost nothing. Its purpose is to bind the other
- keys together and certify that they are all owned by the same people
- and part of the same integrated setup. The only signatures produced by
- the Master Key, \e{ever}, should be the signatures on the other keys.
- The Master Key is especially long, and its private key and passphrase
- are stored with special care.
- We have collected some third-party signatures on the Master Key, in
- order to increase the chances that you can find a suitable trust path
- to them.
- We have uploaded our various keys to public keyservers, so that
- even if you don't know any of the people who have signed our
- keys, you can still be reasonably confident that an attacker would
- find it hard to substitute fake keys on all the public keyservers at
- once.
- \H{pgpkeys-rollover} Key rollover
- Our current keys were generated in July 2023.
- Each new Master Key is signed with the old one, to show that it really
- is owned by the same people and not substituted by an attacker.
- Each new Master Key also signs the previous Release Keys, in case
- you're trying to verify the signatures on a release prior to the
- rollover and can find a chain of trust to those keys from any of the
- people who have signed our new Master Key.
- Each release is signed with the Release Key that was current at the
- time of release. We don't go back and re-sign old releases with newly
- generated keys.
- The details of all previous keys are given here.
- \s{Keys generated in the 2021 rollover}
- \dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/master-2021.asc}{\s{Master Key} (2021)}
- \dd RSA, 3072-bit. Key ID: \cw{DD4355EAAC1119DE}. Fingerprint:
- \cw{A872\_D42F\_1660\_890F\_0E05\_223E\_DD43\_55EA\_AC11\_19DE}
- \dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/release-2021.asc}{\s{Release Key} (2021)}
- \dd RSA, 3072-bit. Key ID: \cw{E4F83EA2AA4915EC}. Fingerprint:
- \cw{2CF6\_134B\_D3F7\_7A65\_88EB\_D668\_E4F8\_3EA2\_AA49\_15EC}
- \dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/snapshot-2021.asc}{\s{Snapshot Key} (2021)}
- \dd RSA, 3072-bit. Key ID: \cw{B43979F89F446CFD}. Fingerprint:
- \cw{1FD3\_BCAC\_E532\_FBE0\_6A8C\_09E2\_B439\_79F8\_9F44\_6CFD}
- \dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/contact-2021.asc}{\s{Secure Contact Key} (2021)}
- \dd RSA, 3072-bit. Key ID: \cw{012C59D4211BD62A}. Fingerprint:
- \cw{E30F\_1354\_2A04\_BE0E\_56F0\_5801\_012C\_59D4\_211B\_D62A}
- \s{Keys generated in the 2018 rollover}
- \dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/master-2018.asc}{\s{Master Key} (2018)}
- \dd RSA, 4096-bit. Key ID: \cw{76BC7FE4EBFD2D9E}. Fingerprint:
- \cw{24E1\_B1C5\_75EA\_3C9F\_F752\_\_A922\_76BC\_7FE4\_EBFD\_2D9E}
- \dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/release-2018.asc}{\s{Release Key} (2018)}
- \dd RSA, 3072-bit. Key ID: \cw{6289A25F4AE8DA82}. Fingerprint:
- \cw{E273\_94AC\_A3F9\_D904\_9522\_\_E054\_6289\_A25F\_4AE8\_DA82}
- \dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/snapshot-2018.asc}{\s{Snapshot Key} (2018)}
- \dd RSA, 3072-bit. Key ID: \cw{38BA7229B7588FD1}. Fingerprint:
- \cw{C92B\_52E9\_9AB6\_1DDA\_33DB\_\_2B7A\_38BA\_7229\_B758\_8FD1}
- \dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/contact-2018.asc}{\s{Secure Contact Key} (2018)}
- \dd RSA, 3072-bit. Key ID: \cw{657D487977F95C98}. Fingerprint:
- \cw{A680\_0082\_2998\_6E46\_22CA\_\_0E43\_657D\_4879\_77F9\_5C98}
- \s{Key generated in 2016} (when we first introduced the Secure Contact Key)
- \dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/contact-2016.asc}{\s{Secure Contact Key} (2016)}
- \dd RSA, 2048-bit. Main key ID: \cw{2048R/8A0AF00B} (long version:
- \cw{2048R/C4FCAAD08A0AF00B}). Encryption subkey ID:
- \cw{2048R/50C2CF5C} (long version: \cw{2048R/9EB39CC150C2CF5C}).
- Fingerprint:
- \cw{8A26\_250E\_763F\_E359\_75F3\_\_118F\_C4FC\_AAD0\_8A0A\_F00B}
- \s{Keys generated in the 2015 rollover}
- \dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/master-2015.asc}{\s{Master Key} (2015)}
- \dd RSA, 4096-bit. Key ID: \cw{4096R/04676F7C} (long version:
- \cw{4096R/AB585DC604676F7C}). Fingerprint:
- \cw{440D\_E3B5\_B7A1\_CA85\_B3CC\_\_1718\_AB58\_5DC6\_0467\_6F7C}
- \dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/release-2015.asc}{\s{Release Key} (2015)}
- \dd RSA, 2048-bit. Key ID: \cw{2048R/B43434E4} (long version:
- \cw{2048R/9DFE2648B43434E4}). Fingerprint:
- \cw{0054\_DDAA\_8ADA\_15D2\_768A\_\_6DE7\_9DFE\_2648\_B434\_34E4}
- \dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/snapshot-2015.asc}{\s{Snapshot Key} (2015)}
- \dd RSA, 2048-bit. Key ID: \cw{2048R/D15F7E8A} (long version:
- \cw{2048R/EEF20295D15F7E8A}). Fingerprint:
- \cw{0A3B\_0048\_FE49\_9B67\_A234\_\_FEB6\_EEF2\_0295\_D15F\_7E8A}
- \s{Original keys generated in 2000} (two sets, RSA and DSA)
- \dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/master-rsa.asc}{\s{Master Key} (original RSA)}
- \dd RSA, 1024-bit. Key ID: \cw{1024R/1E34AC41} (long version:
- \cw{1024R/9D5877BF1E34AC41}). Fingerprint:
- \cw{8F\_15\_97\_DA\_25\_30\_AB\_0D\_\_88\_D1\_92\_54\_11\_CF\_0C\_4C}
- \dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/master-dsa.asc}{\s{Master Key} (original DSA)}
- \dd DSA, 1024-bit. Key ID: \cw{1024D/6A93B34E} (long version:
- \cw{1024D/4F5E6DF56A93B34E}). Fingerprint:
- \cw{313C\_3E76\_4B74\_C2C5\_F2AE\_\_83A8\_4F5E\_6DF5\_6A93\_B34E}
- \dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/release-rsa.asc}{\s{Release Key} (original RSA)}
- \dd RSA, 1024-bit. Key ID: \cw{1024R/B41CAE29} (long version:
- \cw{1024R/EF39CCC0B41CAE29}). Fingerprint:
- \cw{AE\_65\_D3\_F7\_85\_D3\_18\_E0\_\_3B\_0C\_9B\_02\_FF\_3A\_81\_FE}
- \dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/release-dsa.asc}{\s{Release Key} (original DSA)}
- \dd DSA, 1024-bit. Key ID: \cw{1024D/08B0A90B} (long version:
- \cw{1024D/FECD6F3F08B0A90B}). Fingerprint:
- \cw{00B1\_1009\_38E6\_9800\_6518\_\_F0AB\_FECD\_6F3F\_08B0\_A90B}
- \dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/snapshot-rsa.asc}{\s{Snapshot Key} (original RSA)}
- \dd RSA, 1024-bit. Key ID: \cw{1024R/32B903A9} (long version:
- \cw{1024R/FAAED21532B903A9}). Fingerprint:
- \cw{86\_8B\_1F\_79\_9C\_F4\_7F\_BD\_\_8B\_1B\_D7\_8E\_C6\_4E\_4C\_03}
- \dt \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/keys/snapshot-dsa.asc}{\s{Snapshot Key} (original DSA)}
- \dd DSA, 1024-bit. Key ID: \cw{1024D/7D3E4A00} (long version:
- \cw{1024D/165E56F77D3E4A00}). Fingerprint:
- \cw{63DD\_8EF8\_32F5\_D777\_9FF0\_\_2947\_165E\_56F7\_7D3E\_4A00}
|