Verify the signature of the AWS Backint agent and installer for SAP HANA
The source file of AWS Backint agent (aws-backint-agent.tar.gz
) and AWS Backint
installer (install-aws-backint-agent
) supports signature verification. You
can use a public key to verify that the downloaded source file and AWS Backint installer
are original and unmodified. You can find the AWS Backint installer in your
/tmp
directory or any other location where you have downloaded the
installer. You can find the source file (aws-backint-agent.tar.gz
) of AWS Backint agent
under <installation directory>/aws-backint-agent/package/
.
Automatic signature verification
To enable automatic signature verification during agent installation, see the parameter descriptions at Install AWS Backint agent using AWS Backint installer — interactive mode (Step 6k).
To verify the AWS Backint agent package on a Linux server
-
Download the public key.
shell$ wget https://s3.amazonaws.com/awssap-backint-agent/binary/public-key/aws-backint-agent.gpg
-
(Optional) For AWS GovCloud (US-East) or AWS GovCloud (US-West), download one of the following keys.
shell$ wget https://awssap-backint-agent-us-gov-east-1.s3.us-gov-east-1.amazonaws.com/binary/public-key/aws-backint-agent.gpg
shell$ wget https://awssap-backint-agent-us-gov-west-1.s3.us-gov-west-1.amazonaws.com/binary/public-key/aws-backint-agent.gpg
-
Import the public key into your keyring.
shell$ gpg --import aws-backint-agent.gpg gpg: key 1E65925B: public key "AWS Backint Agent" imported gpg: Total number processed: 1 gpg: imported: 1 (RSA: 1)
Make a note of the key value, as you will need it in the next step. In the preceding example, the key value is
1E65925B
. -
Verify the fingerprint by running the following command.
shell$ gpg --fingerprint 1E65925B pub 2048R/1E65925B 2020-03-18 Key fingerprint = BD35 7A5F 1AE9 38A0 213A 82A8 80D8 5C5E 1E65 925B uid [ unknown] AWS Backint Agent
The fingerprint should be equal to the following:
BD35 7A5F 1AE9 38A0 213A 82A8 80D8 5C5E 1E65 925B
If the fingerprint string doesn't match, don't install the agent. Contact Amazon Web Services.
After you have verified the fingerprint, you can use it to verify the signature of the AWS Backint agent binary.
-
Download the signature files for the source file and the installer.
shell$ wget https://s3.amazonaws.com/awssap-backint-agent/binary/latest/aws-backint-agent.sig shell$ wget https://s3.amazonaws.com/awssap-backint-agent/binary/latest/install-aws-backint-agent.sig
-
(Optional) For AWS GovCloud (US-East) and AWS GovCloud (US-West), download the signature files from one of the following locations.
shell$ wget https://awssap-backint-agent-us-gov-east-1.s3.us-gov-east-1.amazonaws.com/binary/latest/aws-backint-agent.sig shell$ wget https://awssap-backint-agent-us-gov-east-1.s3-us-gov-east-1.amazonaws.com/binary/latest/install-aws-backint-agent.sig
shell$ wget https://awssap-backint-agent-us-gov-west-1.s3.us-gov-west-1.amazonaws.com/binary/latest/aws-backint-agent.sig shell$ wget https://awssap-backint-agent-us-gov-west-1.s3-us-gov-west-1.amazonaws.com/binary/latest/install-aws-backint-agent.sig
-
To verify the signature, run
gpg --verify
against theaws-backint-agent.tar.gz
source file andinstall-aws-backint-agent
installer.shell$ gpg --verify aws-backint-agent.sig aws-backint-agent.tar.gz gpg: Signature made Fri 08 May 2020 12:24:48 AM UTC using RSA key ID 1E65925B gpg: Good signature from "AWS Backint Agent" [unknown] gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner. Primary key fingerprint: BD35 7A5F 1AE9 38A0 213A 82A8 80D8 5C5E 1E65 925B shell$ gpg --verify install-aws-backint-agent.sig install-aws-backint-agent gpg: Signature made Fri 08 May 2020 12:15:40 AM UTC using RSA key ID 1E65925B gpg: Good signature from "AWS Backint Agent" [unknown] gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner. Primary key fingerprint: BD35 7A5F 1AE9 38A0 213A 82A8 80D8 5C5E 1E65 925B
If the output includes the phrase
BAD signature
, check whether you performed the procedure correctly. If you continue to get this response, contact Amazon Web Services and avoid using the downloaded files.Note
A key is trusted only if you or someone you trust has signed it. If you receive a warning about trust, this doesn't mean that the signature is invalid. Instead, it means that you have not verified the public key.