Aembit cryptographically signs all binary releases which enables you to cryptographically verify the authenticity of those releases.
To verify binary release signatures, Aembit suggests using gpg
and shasum
to verify GPG signatures and file
integrity.
Prerequisites
Section titled “Prerequisites”Before verifying binary release signatures, you must:
-
Have
gpg
(GNU Privacy Guard) installed.Expand to see steps to install
To installgpg
gpg
, select a tab for your OS and follow the instructions:Debian:
Terminal window apt install gnupgRHEL:
Terminal window yum install gnupg2Terminal window brew install gnupgPowerShell:
Terminal window winget install GnuPG.GnuPGChocolatey:
Terminal window choco install gpg4winOr, if you’re using WSL, follow the Linux/WSL tab’s instructions.
-
Have
shasum
installed.shasum
is pre-installed on most operating systems. -
Import Aembit’s public GPG key (you must have
gpg
installed for this command to work):Terminal window curl "https://keybase.io/aembit/pgp_keys.asc" | gpg --import
Available releases
Section titled “Available releases”Here’s a list of all available Aembit binary releases:
Verify a release
Section titled “Verify a release”The following example shows how to verify the release signature for Agent Proxy. Though, you can swap the release name and version to any of the other available releases.
To verify the Agent Proxy release, follow these steps using the gpg
and shasum
commands. Select the tab that matches your operating system and architecture:
Download the Agent Proxy release version from the Agent Proxy Releases page along with the matching checksum files.
Alternatively, you can download these files using
curl
, swapping out the highlighted release version with the version you're verifying:Terminal window curl -O https://releases.aembit.io/agent_proxy/1.23.3002/linux/amd64/aembit_agent_proxy_linux_amd64_1.23.3002.tar.gzcurl -O https://releases.aembit.io/agent_proxy/1.23.3002/linux/amd64/aembit_agent_proxy_linux_amd64_1.23.3002.tar.gz.sha256curl -O https://releases.aembit.io/agent_proxy/1.23.3002/linux/amd64/aembit_agent_proxy_linux_amd64_1.23.3002.tar.gz.sha256.sigImport Aembit's public GPG key from Keybase into
gpg
:Terminal window curl "https://keybase.io/aembit/pgp_keys.asc" | gpg --importVerify Agent Proxy's checksum integrity and authenticity with
gpg
:Terminal window gpg --verify aembit_agent_proxy_linux_amd64_1.23.3002.tar.gz.sha256.sig aembit_agent_proxy_linux_amd64_1.23.3002.tar.gz.sha256If you don't have
gpg
installed, see Verifying Aembit binary release signatures prerequisites.Your output should look similar to the following and include the highlighted line:
Terminal window gpg --verify aembit_agent_proxy_linux_amd64_1.23.3002.tar.gz.sha256.sig aembit_agent_proxy_linux_amd64_1.23.3002.tar.gz.sha256gpg: Signature made Wed Sep 18 10:13:57 2024 PDTgpg: using RSA key EA3D8D2FDAC6BD8137163D00D655E64729BC67D7gpg: Good signature from "Aembit, Inc. <keybase@aembit.io>" [unknown]...As long as you see
Good signature...
, you know that the checksum files are valid and authentic.Verify the integrity of the Agent Proxy file you downloaded using
shasum
:Terminal window shasum -a 256 aembit_agent_proxy_linux_amd64_1.23.3002.tar.gz.sha256If
shasum
returns a match, you know the file is intact and matches Aembit's original. The long hex string is the SHA256 hash that both your file and the checksums file agree on. No output would mean the checksums don't match.
Download the Agent Proxy release version from the Agent Proxy Releases page along with the matching checksum files.
Alternatively, you can download these files using
curl
, swapping out the highlighted release version with the version you're verifying:Terminal window curl -O https://releases.aembit.io/agent_proxy/1.23.3002/windows/amd64/aembit_agent_proxy_windows_amd64_1.23.3002.msicurl -O https://releases.aembit.io/agent_proxy/1.23.3002/windows/amd64/aembit_agent_proxy_windows_amd64_1.23.3002.msi.sha256curl -O https://releases.aembit.io/agent_proxy/1.23.3002/windows/amd64/aembit_agent_proxy_windows_amd64_1.23.3002.msi.sha256.sigImport Aembit's public GPG key from Keybase into
gpg
:Terminal window curl "https://keybase.io/aembit/pgp_keys.asc" | gpg --importVerify Agent Proxy's checksum integrity and authenticity with
gpg
:Terminal window gpg --verify aembit_agent_proxy_windows_amd64_1.23.3002.msi.sha256.sig aembit_agent_proxy_windows_amd64_1.23.3002.msi.sha256If you don't have
gpg
installed, see Verifying Aembit binary release signatures prerequisites.Your output should look similar to the following and include the highlighted line:
Terminal window gpg --verify aembit_agent_proxy_windows_amd64_1.23.3002.msi.sha256.sig aembit_agent_proxy_windows_amd64_1.23.3002.msi.sha256gpg: Signature made Wed Sep 18 10:13:57 2024 PDTgpg: using RSA key EA3D8D2FDAC6BD8137163D00D655E64729BC67D7gpg: Good signature from "Aembit, Inc. <keybase@aembit.io>" [unknown]...As long as you see
Good signature...
, you know that the checksum files are valid and authentic.Verify the integrity of the Agent Proxy file you downloaded using
shasum
:Terminal window shasum -a 256 aembit_agent_proxy_windows_amd64_1.23.3002.msi.sha256If
shasum
returns a match, you know the file is intact and matches Aembit's original. The long hex string is the SHA256 hash that both your file and the checksums file agree on. No output would mean the checksums don't match.
Verify specific releases
Section titled “Verify specific releases”Use the commands from the following sections to verify specific releases. You can verify all releases with the same GPG key.
The commands should look similar to the following examples, where you swap out the highlighted version with the specific version that you want to verify.
Aembit Agent
Section titled “Aembit Agent”Release: Aembit Agent 1.17.0
Downloads: Aembit Agent Releases page
Verification commands:
# Verify checksum integrity and authenticitygpg --verify aembit_1.17.0_SHA256SUMS.sig aembit_1.17.0_SHA256SUMS
# Verify file integritygrep $(shasum -a 256 aembit_1.17.0_linux_x64.zip) aembit_1.17.0_SHA256SUMS
Swap highlighted version with your target version if different from latest.
Agent Controller
Section titled “Agent Controller”Release: Agent Controller 1.23.2263
Downloads: Agent Controller Releases page
Verification commands:
# Verify checksum integrity and authenticitygpg --verify aembit_agent_controller_linux_x64_1.23.2263.tar.gz.sha256.sig aembit_agent_controller_linux_x64_1.23.2263.tar.gz.sha256
# Verify file integrityshasum -a 256 aembit_agent_controller_linux_x64_1.23.2263.tar.gz.sha256
Swap highlighted version with your target version if different from latest.
Agent Proxy
Section titled “Agent Proxy”Release: Agent Proxy 1.23.3002
Downloads: Agent Proxy Releases page
Verification commands:
# Verify checksum integrity and authenticitygpg --verify aembit_agent_proxy_linux_x64_1.23.3002.tar.gz.sha256.sig aembit_agent_proxy_linux_x64_1.23.3002.tar.gz.sha256
# Verify file integrityshasum -a 256 aembit_agent_proxy_linux_x64_1.23.3002.tar.gz.sha256
Swap highlighted version with your target version if different from latest.
Aembit Edge Virtual Appliance
Section titled “Aembit Edge Virtual Appliance”Release: Aembit Edge Virtual Appliance 1.18.64
Downloads: Aembit Edge Virtual Appliance Releases page
Verification commands:
# Verify checksum integrity and authenticitygpg --verify aembit_edge_virtual_appliance_1.18.64.ova.sha256.sig aembit_edge_virtual_appliance_1.18.64.ova.sha256
# Verify file integrityshasum -a 256 aembit_edge_virtual_appliance_1.18.64.ova.sha256
Swap highlighted version with your target version if different from latest.