Trying to install OSSEC on a fresh Debian 12 system.
I would like to verify the package before running the installer on my system.
While there is a GPG-signature provided for the .tar.gz file found on https://www.ossec.net/download-ossec/ , there is no apparent pointer where/how to get the corresponding public key used in the signature (https://github.com/ossec/ossec-hids/releases/download/3.7.0/ossec-hids-3.7.0.tar.gz.asc)
A simple gpg --recv-key for the key-ID gives an "contains no user ID" error (see below).
Any ideas where I might find the corresponding key?
Suggestion: to include the public key used for signing next to the signature-file in https://www.ossec.net/download-ossec/ or supply a CLI one-liner how to import it in a somewhat trustworthy manner.
For inspiration: here is how Linux Mint and The Tor Project guides their users to import GPG-keys and verify signatures.
user@host:~/Downloads$ gpg --verify ossec-hids-3.7.0.tar.gz.asc
gpg: assuming signed data in 'ossec-hids-3.7.0.tar.gz'
gpg: Signature made Mon 17 Jan 2022 05:09:10 PM CET
gpg: using RSA key B50FB1947A0AE31145D05FADEE1B0E6B2D8387B7
gpg: Can't check signature: No public key
user@host:~/Downloads$ gpg --recv-key B50FB1947A0AE31145D05FADEE1B0E6B2D8387B7
gpg: key EE1B0E6B2D8387B7: new key but contains no user ID - skipped
gpg: Total number processed: 1
gpg: w/o user IDs: 1
Trying to install OSSEC on a fresh Debian 12 system.
I would like to verify the package before running the installer on my system.
While there is a GPG-signature provided for the .tar.gz file found on https://www.ossec.net/download-ossec/ , there is no apparent pointer where/how to get the corresponding public key used in the signature (https://github.com/ossec/ossec-hids/releases/download/3.7.0/ossec-hids-3.7.0.tar.gz.asc)
A simple
gpg --recv-keyfor the key-ID gives an "contains no user ID" error (see below).Any ideas where I might find the corresponding key?
Suggestion: to include the public key used for signing next to the signature-file in https://www.ossec.net/download-ossec/ or supply a CLI one-liner how to import it in a somewhat trustworthy manner.
For inspiration: here is how Linux Mint and The Tor Project guides their users to import GPG-keys and verify signatures.