Validate signature for Red Hat agent installer

Overview

This article shows you how to verify the signature of the Red Hat Enterprise Linux (RHEL) agent installer file using Red Hat Package Manager (RPM) and CrashPlan's public GPG key.

Considerations

This article assumes you have basic familiarity with Linux commands and managing RHEL packages.

Before you begin

Download the Linux agent from the CrashPlan console:

  1. Sign in to the CrashPlan console.
  2. Navigate to Administration > Agent Management > Downloads.
  3. Click the download icon for the appropriate RHEL package.
  4. Note the saved location and filename of the .rpm package.

Steps

  1. Copy the CrashPlan public key below and save it as a text file.
-----BEGIN PGP PUBLIC KEY BLOCK-----
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=TDPz
-----END PGP PUBLIC KEY BLOCK-----
  1. Run this command to import the CrashPlan public key to your local RPM database. Replace /path/to/key with the path of the key file created above:
    rpm --import /path/to/key
  2. Run this command to verify the signature of the agent installer package. Replace example.rpm with the filename of the downloaded CrashPlan agent package:
    rpm --checksig example.rpm

    A response like md5 ok, digests signatures OK, or digests ok indicates successful verification and that the package has not been corrupted or tampered with.

External resources

Was this article helpful?
0 out of 0 found this helpful

Articles in this section

See more