Verify the signature of the AWSTOE installation download
This section describes the recommended process for verifying the validity of the installation download for AWSTOE on Linux, macOS and Windows based operating systems.
Topics
Verify the signature of the AWSTOE installation download on Linux or macOS
This topic describes the recommended process for verifying the validity of the installation download for the AWSTOE on Linux-based or macOS operating systems.
Whenever you download an application from the internet, we recommend that you authenticate the identity of the software publisher. Also, check that the application is not altered or corrupted since it was published. This protects you from installing a version of the application that contains a virus or other malicious code.
If, after running the steps in this topic, you determine that the software for the
AWSTOE application is altered or corrupted, do not run the installation file. Instead,
contact AWS Support For more information about your support options, see
AWS Support
AWSTOE files for Linux-based and macOS operating systems are signed using
GnuPG
, an open source implementation of the Pretty Good Privacy
(OpenPGP) standard for secure digital signatures. GnuPG
(also known as
GPG
) provides authentication and integrity checking through a
digital signature. Amazon EC2 publishes a public key and signatures that you can use to
verify the downloaded Amazon EC2 CLI tools. For more information about PGP
and GnuPG
(GPG
), see http://www.gnupg.org
The first step is to establish trust with the software publisher. Download the public key of the software publisher, check that the owner of the public key is who they claim to be, and then add the public key to your keyring. Your keyring is a collection of known public keys. After you establish the authenticity of the public key, you can use it to verify the signature of the application.
Topics
Installing the GPG tools
If your operating system is Linux, Unix, or macOS, the GPG tools are likely already installed. To test whether the tools are installed on your system, type gpg at a command prompt. If the GPG tools are installed, you see a GPG command prompt. If the GPG tools are not installed, you see an error message stating that the command cannot be found. You can install the GnuPG package from a repository.
To install GPG tools, select the operating system that matches your instance.
Authenticating and importing the public key
The next step in the process is to authenticate the AWSTOE public key and add
it as a trusted key in your GPG
keyring.
To authenticate and import the AWSTOE public key
-
Obtain a copy of our public
GPG
build key by doing one of the following:-
Download the key from
https://awstoe-
<region>
.s3.<region>
.amazonaws.com/assets/awstoe.gpg. For example, https://awstoe-us-east-1.s3.us-east-1.amazonaws.com/latest/assets/awstoe.gpg. -
Copy the key from the following text and paste it into a file called
awstoe.gpg
. Make sure to include everything that follows:-----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v2 mQENBF8UqwsBCACdiRF2bkZYaFSDPFC+LIkWLwFvtUCRwAHtD8KIwTJ6LVn3fHAU GhuK0ZH9mRrqRT2bq/xJjGsnF9VqTj2AJqndGJdDjz75YCZYM+ocZ+r5HSJaeW9i S5dykHj7Txti2zHe0G5+W0v7v5bPi2sPHsN7XWQ7+G2AMEPTz8PjxY//I0DvMQns Sle3l9hz6wCClz1l9LbBzTyHfSm5ucTXvNe88XX5Gmt37OCDM7vfli0Ctv8WFoLN 6jbxuA/sV71yIkPm9IYp3+GvaKeT870+sn8/JOOKE/U4sJV1ppbqmuUzDfhrZUaw 8eW8IN9A1FTIuWiZED/5L83UZuQs1S7s2PjlABEBAAG0GkFXU1RPRSA8YXdzdG9l QGFtYXpvbi5jb20+iQE5BBMBCAAjBQJfFKsLAhsDBwsJCAcDAgEGFQgCCQoLBBYC AwECHgECF4AACgkQ3r3BVvWuvFJGiwf9EVmrBR77+Qe/DUeXZJYoaFr7If/fVDZl 6V3TC6p0J0Veme7uXleRUTFOjzbh+7e5sDX19HrnPquzCnzfMiqbp4lSoeUuNdOf FcpuTCQH+M+sIEIgPno4PLl0Uj2uE1o++mxmonBl/Krk+hly8hB2L/9n/vW3L7BN OMb1Ll9PmgGPbWipcT8KRdz4SUex9TXGYzjlWb3jU3uXetdaQY1M3kVKE1siRsRN YYDtpcjmwbhjpu4xm19aFqNoAHCDctEsXJA/mkU3erwIRocPyjAZE2dnlkL9ZkFZ z9DQkcIarbCnybDM5lemBbdhXJ6hezJE/b17VA0t1fY04MoEkn6oJg== =oyze -----END PGP PUBLIC KEY BLOCK-----
-
-
At a command prompt in the directory where you saved awstoe.gpg, use the following command to import the AWSTOE public key into your keyring.
gpg --import awstoe.gpg
The command returns results that are similar to the following:
gpg: key F5AEBC52: public key "AWSTOE <awstoe@amazon.com>" imported gpg: Total number processed: 1 gpg: imported: 1 (RSA: 1)
Make a note of the key value; you need it in the next step. In the preceding example, the key value is
F5AEBC52
. -
Verify the fingerprint by running the following command, replacing key-value with the value from the preceding step:
gpg --fingerprint
key-value
This command returns results similar to the following:
pub 2048R/F5AEBC52 2020-07-19 Key fingerprint = F6DD E01C 869F D639 15E5 5742 DEBD C156 F5AE BC52 uid [ unknown] AWSTOE <awstoe@amazon.com>
Additionally, the fingerprint string should be identical to
F6DD E01C 869F D639 15E5 5742 DEBD C156 F5AE BC52
, as shown in the preceding example. Compare the key fingerprint that is returned to the one published on this page. They should match. If they don't match, do not install the AWSTOE installation script, and contact AWS Support.
Verify the signature of the package
After you install the GPG
tools, authenticate and import the
AWSTOE public key, and verify that the public key is trusted, you are ready to
verify the signature of the installation script.
To verify the installation script signature
-
At a command prompt, run the following command to download the application binary:
curl -O https://awstoe-
<region>
.s3.<region>
.amazonaws.com/latest/linux/<architecture>
/awstoeFor example:
curl -O https://awstoe-us-east-1.s3.us-east-1.amazonaws.com/latest/linux/amd64/awstoe
Supported values for
architecture
can beamd64
,386
, andarm64
. -
At a command prompt, run the following command to download the signature file for the corresponding application binary from the same S3 key prefix path:
curl -O https://awstoe-
<region>
.s3.<region>
.amazonaws.com/latest/linux/<architecture>
/awstoe.sigFor example:
curl -O https://awstoe-us-east-1.s3.us-east-1.amazonaws.com/latest/linux/amd64/awstoe.sig
Supported values for
architecture
can beamd64
,386
, andarm64
. -
Verify the signature by running the following command at a command prompt in the directory where you saved
awstoe.sig
and the AWSTOE installation file. Both files must be present.gpg --verify ./awstoe.sig ~/awstoe
The output should look something like the following:
gpg: Signature made Mon 20 Jul 2020 08:54:55 AM IST using RSA key ID F5AEBC52 gpg: Good signature from "AWSTOE awstoe@amazon.com" [unknown] gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner. Primary key fingerprint: F6DD E01C 869F D639 15E5 5742 DEBD C156 F5AE BC52
If the output contains the phrase
Good signature from "AWSTOE <awstoe@amazon.com>"
, it means that the signature has successfully been verified, and you can proceed to run the AWSTOE installation script.If the output includes the phrase
BAD signature
, check whether you performed the procedure correctly. If you continue to get this response, do not run the installation file that you downloaded previously, and contact AWS Support.
The following are details about the warnings that you might see:
-
WARNING: This key is not certified with a trusted signature! There is no indication that the signature belongs to the owner. Ideally, you would visit an AWS office and receive the key in person. However, you would most likely download it from a website. In this case, the website is an AWS website.
-
gpg: no ultimately trusted keys found. This means that the specific key is not "ultimately trusted" by you, or by other people that you trust.
For more information, see http://www.gnupg.org
Verify the signature of the AWSTOE installation download on Windows
This topic describes the recommended process for verifying the validity of the installation file for the AWS Task Orchestrator and Executor application on Windows-based operating systems.
Whenever you download an application from the internet, we recommend that you authenticate the identity of the software publisher and check that the application is not altered or corrupted since it was published. This protects you from installing a version of the application that contains a virus or other malicious code.
If, after running the steps in this topic, you determine that the software for the AWSTOE application is altered or corrupted, do not run the installation file. Instead, contact AWS Support.
To verify the validity of the downloaded awstoe binary on Windows-based operating systems, make sure that the thumbprint of its Amazon Services LLC signer certificate is equal to this value:
F8 83 11 EE F0 4A A2 91 E3 79 21 BA 6B FC AF F8 19 92 12 D7
Note
During the roll-out window for a new binary, your signer certificate might not match the new thumbprint. If your signer certificate doesn't match, verify that the thumbprint value is:
5B 77 F4 F0 C3 7A 8B 89 D9 A7 8F 54 B6 85 11 CE 9E A3 BF 17
To verify this value, perform the following procedure:
-
Right-click the downloaded
awstoe.exe
, and open the Properties window. -
Choose the Digital Signatures tab.
-
From the Signature List, choose Amazon Services LLC, and then choose Details.
-
Choose the General tab, if not already selected, and then choose View Certificate.
-
Choose the Details tab, and then choose All in the Show dropdown list, if not already selected.
-
Scroll down until you see the Thumbprint field and then choose Thumbprint. This displays the entire thumbprint value in the lower window.
-
If the thumbprint value in the lower window is identical to the following value:
F8 83 11 EE F0 4A A2 91 E3 79 21 BA 6B FC AF F8 19 92 12 D7
then your downloaded AWSTOE binary is authentic and can be safely installed.
-
If the thumbprint value in the lower details window is not identical to the previous value, do not run
awstoe.exe
.
-