Distribution signatures

All Yenta distributions, both binaries and source, are cryptographically signed so you can be assured that you are getting the same bits that are being distributed. This helps guard against having malicious code inserted into a distribution.

You are invited to check the signature on any given file yourself, after you've downloaded it. The examples that follow assume PGP 2.6.2 for UNIX, but other versions of PGP or GPG should work similarly.

If you've just downloaded the binary named yenta and its corresponding signature file yenta.asc, just type pgp yenta.asc yenta. It should produce, among other output, a line that looks like this:

Good signature from user "Leonard N. Foner's signing key for software distributions <foner-distributions@media.mit.edu>".

If, on the other hand, something has gone wrong with the distribution, you'll see this:

Bad signature from user "Leonard N. Foner's signing key for software distributions <foner-distributions@media.mit.edu>".
If you see this, please contact bug-yenta@media.mit.edu and let us know where you got this binary. It may be tampered with; it is more likely that it was incorrectly downloaded (for example, not in binary mode) or that it was somehow damaged. However, if someone is tampering with distributions, we should know about it, so please let us know if you can't seem to verify signatures. But please try to rule out problems in downloading first.

Keys used

Yenta binaries are currently signed with the key below. This key is used only to sign Yenta binaries. It is not used to encrypt email, nor is it used to comment on sources in Yvette.
Type bits/keyID    Date       User ID
pub  1024/F912BAE1 1999/03/31 Leonard N. Foner's signing key for software distributions <foner-distributions@media.mit.edu>
          Key fingerprint =  6E 2C EA F8 2F 06 0C 04  6A 30 0F BE 39 12 4B 0B 

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.2

mQCPAzcBz1UAAAEEALdRdPsMNJhehWFJ01/2XJSHVLfWeJC8q5uAhrf8JDFnh8KQ
ndYwq+Tw6xO7DFySkw6L0cUEgLvMp3+X4j9sreD+E2LKTJbfxvRVrxWW/SRpB4MS
JKLq/0Mrsy30s2DyQEAbYsAgpa7wyTlXHpKUMcq0kjZOPEds5rWhEN35ErrhABEB
AAG0XUxlb25hcmQgTi4gRm9uZXIncyBzaWduaW5nIGtleSBmb3Igc29mdHdhcmUg
ZGlzdHJpYnV0aW9ucyA8Zm9uZXItZGlzdHJpYnV0aW9uc0BtZWRpYS5taXQuZWR1
PokAlQMFEDcB0rUWTkBy6UXSfQEBVVAD/1OJu4SyhZoMpmaKRF9DLv9FZdIKKwQO
vwVQnxum8W89wKvChvTVDS/C+0RKz+v/9GCm/2k7pL4wtUn4eqT5efTjZ1watKW0
VhFVgZbKnv8FnYRC6AqhtVPUGQnNEpOaJaLlv20+//xWXR34bxWr9kUVIzGqz3aX
6GS7dL5pCj2m
=oeCT
-----END PGP PUBLIC KEY BLOCK-----
If you'd like to verify a Yvette comment that I've made (and only me; other maintainers will have different keys), the key I'm using is below.
Type bits/keyID    Date       User ID
pub  1024/0D1D651D 1999/03/31 Leonard N. Foner's Yvette-review key <foner-yvette@media.mit.edu>
          Key fingerprint =  7F 67 68 FA 96 21 AE CB  82 6B 6A 74 11 57 7E 03 

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.2

mQCPAzcBz8kAAAEEANN2or1Tgo4bid19dwTJqDzQYq5UJDHOsyTfvh0woXQAoay3
gKGwIfdVZWA/f1tH34Zxo4ZUd3spCIEFKdlhcv6zCqFOVjJaZYZJfNRmMFYsY+Ke
GWd95WAjS8ZauGw7b8Q+aFO4Kex66BF/ggD0elRC9ZIoWs0o2NYJ7nANHWUdABEB
AAG0QUxlb25hcmQgTi4gRm9uZXIncyBZdmV0dGUtcmV2aWV3IGtleSA8Zm9uZXIt
eXZldHRlQG1lZGlhLm1pdC5lZHU+iQCVAwUQNwHSmhZOQHLpRdJ9AQEEjwP/ciy5
f4Y7uTLxOvmKTxZLUs6ljRc1YN4T5dhFpvxkp+qVLZRN/ctQxRDqHxyyVfnEcWlw
60/9jPQEvZK5xesU1Ul3oVRqk5AikUjYqs0Rah+FKXGrLMz10d7TeNXmBgp3jKTd
momldK0XIOU+NYJHNFQLxLQILun3wlCThMlsL5g=
=wjem
-----END PGP PUBLIC KEY BLOCK-----
Both of the above keys are signed by my personal key, which is on file at major keyservers, and has been signed by various well-known keys:
Type bits/keyID    Date       User ID
pub  1024/E945D27D 1994/09/24 Leonard N. Foner <foner@media.mit.edu>
          Key fingerprint =  47 9E 45 DF F4 3C FE 0A  8D B4 03 5E 90 50 EE 96 

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.2
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=6T0T
-----END PGP PUBLIC KEY BLOCK-----

Lenny Foner
Last modified: Wed Mar 31 20:47:34 EST 1999