Starting from VeraCrypt version 1.23, we will be using a new PGP key for signing release files and for securing communication to VeraCrypt email address. The transition statement can be found at https://veracrypt.fr/pgp-key-transition-2018-09-12.txt which is signed with both the old key and the new key.
The main difference between the old key and the new key is that now we have a separation between encryption key and signature key instead of a single key that performs both.
Below is a reproduction of the transition statement which contain all needed information:
-----BEGIN PGP SIGNED MESSAGE-----Hash:SHA512OpenPGP Key Transition Statement for VeraCrypt TeamDate:September 12th 2018WehavecreatedanewOpenPGPkeyandwillbetransitioningawayfromouroldkey.Theoldkeyhasnotbeencompromisedandwillcontinuetobevalidforsometime,butwepreferallfuturecorrespondencetobeencryptedtothenewkey,andwillbemakingsignatureswiththenewkeygoingforwardstartingfrom1.23release.Wewouldlikethisnewkeytobere-integratedintotheweboftrust.Thismessageissignedbybothkeystocertifythetransition.Ournewandoldkeysaresignedbyeachother.Ifyouhavesignedouroldkey,wewouldappreciatesignaturesonournewkeyaswell,providedthatyoursigningpolicypermitsthatwithoutre-authenticatingus.Theoldkey,whichwearetransitioningawayfrom,is:pubrsa4096/54DDD3932014-06-27Keyfingerprint=993B7D7E8E413809828F0F29EB559C7C54DDD393Thenewkey,towhichwearetransitioning,is:pubrsa4096/680D16DE2018-09-11Keyfingerprint=5069A233D55A0EEB174A5FC3821ACD02680D16DETheentirenewkeymaybedownloadedfrom:https://www.idrix.fr/VeraCrypt/VeraCrypt_PGP_public_key.ascTheoldkeycanbedownloadedfrom:https://www.idrix.fr/VeraCrypt/VeraCrypt_PGP_public_key_2014.ascTofetchthefullnewkeyfromapublickeyserverusingGnuPG,run:gpg--keyserverkeys.gnupg.net--recv-key5069A233D55A0EEB174A5FC3821ACD02680D16DEIfyoualreadyknowmyoldkey,youcannowverifythatthenewkeyissignedbytheoldone:gpg--check-sigs5069A233D55A0EEB174A5FC3821ACD02680D16DEIfyouaresatisfiedthatyou'vegottherightkey,andtheUserIDsmatchwhatyouexpect,wewouldappreciateitifyouwouldsignourkey:gpg--sign-key5069A233D55A0EEB174A5FC3821ACD02680D16DEYoucanuploadyoursignaturestoapublickeyserverdirectly:gpg--keyserverkeys.gnupg.net--send-key5069A233D55A0EEB174A5FC3821ACD02680D16DEIfyou'dlikeanyfurtherverificationorhaveanyquestionsaboutthetransitionpleasecontactusdirectly.Toverifytheintegrityofthisstatement:wget-q-O-https://veracrypt.fr/pgp-key-transition-2018-09-12.txt|gpg--verifyVeraCryptTeam-----BEGINPGPSIGNATURE-----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=fW+O-----END PGP SIGNATURE-----
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
I don't know how you performed the check but you are mistaken because
the new key is indeed signed with the old key (I performed the key
ceremony myself!).
You can check this on all key servers. For example: https://pgp.mit.edu/pks/lookup?op=vindex&search=0x821ACD02680D16DE
In the link above, you will see that the old key has signed the new key
the same day it was created.
Starting from VeraCrypt version 1.23, we will be using a new PGP key for signing release files and for securing communication to VeraCrypt email address. The transition statement can be found at https://veracrypt.fr/pgp-key-transition-2018-09-12.txt which is signed with both the old key and the new key.
Thanks man have been using veracrypt since always its insanely good
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
@alex2048:
Yes, the key 0x607E5A7AD030D38E5E5C2CA502C30AE90FAE4A6F is mine and I created it on 2018. It is associated with my 3 main email addresses. For example, you can check it using the query URL below which will return the same key: https://keys.openpgp.org/search?q=mounir.idrassi%40idrix.fr
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
Starting from VeraCrypt version 1.23, we will be using a new PGP key for signing release files and for securing communication to VeraCrypt email address. The transition statement can be found at https://veracrypt.fr/pgp-key-transition-2018-09-12.txt which is signed with both the old key and the new key.
The main difference between the old key and the new key is that now we have a separation between encryption key and signature key instead of a single key that performs both.
Below is a reproduction of the transition statement which contain all needed information:
Honestly, I prefer an SHA-256 hash. That's very easy to check, either from within Windows or using 7-zip.
Windows Command Prompt:
certutil -hashfile C:\path\to\software.zip SHA256
Windows PowerShell:
Get-FileHash -Algorithm SHA256 -Path C:\path\to\software.zip
If you're concerned about key integrity, there are ways of doing so on a read-only server with high security.
It doesn't seem that the new key is signed by the old one...
I don't know how you performed the check but you are mistaken because
the new key is indeed signed with the old key (I performed the key
ceremony myself!).
You can check this on all key servers. For example:
https://pgp.mit.edu/pks/lookup?op=vindex&search=0x821ACD02680D16DE
In the link above, you will see that the old key has signed the new key
the same day it was created.
Moreover, you can also check this locally by running the following
command on the public key available at
https://www.idrix.fr/VeraCrypt/VeraCrypt_PGP_public_key.asc:
gpg --list-packets VeraCrypt_PGP_public_key.asc | grep "signature packet"
One of the line will be :
:signature packet: algo 1, keyid EB559C7C54DDD393
which indicates that the old key (whose 64-bit ID is EB559C7C54DDD393)
has signed the new key.
I hope this clarifies any doubts you may have.
I'm unsure what I did wrong too: it all checks out today. Thank you!
Thanks man have been using veracrypt since always its insanely good
Btw, which PGP key is this one:
607E5A7AD030D38E5E5C2CA502C30AE90FAE4A6F
Is this Mounir's personal key ?
@alex2048:
Yes, the key 0x607E5A7AD030D38E5E5C2CA502C30AE90FAE4A6F is mine and I created it on 2018. It is associated with my 3 main email addresses. For example, you can check it using the query URL below which will return the same key:
https://keys.openpgp.org/search?q=mounir.idrassi%40idrix.fr
Thanks Mounir,
and congratulation for all your great work!
Good work
Nice work!