Validating the Image
- A MITM attack could rewrite the sig. Must verify the .sig is legitimate
- First validate the .sig:
- If the Tails author is in your GPG web of trust, GPG can validate the .sig
- Otherwise, download .sig from different computers, different networks
- Run sha256sum against all .sig files, make sure they match
- (Optional) Import the Tails signing key from https://tails.boum.org/tails-signing.key:
$ cat tails-signing.key | gpg --keyid-format long --import
gpg: key 1202821CBE2CD9C1: public key "Tails developers
(signing key) " imported
gpg: Total number processed: 1
gpg: imported: 1 (RSA: 1)
Use GPG to verify the signature against the ISO:
$ gpg --keyid-format long --verify tails-i386-1.0.1.iso.sig tails-i386-1.0.1.iso
gpg: Signature made Sun 08 Jun 2014 12:32:53 PM PDT using RSA key ID BE2CD9C1
gpg: Good signature from "Tails developers (signing key) "
gpg: aka "T(A)ILS developers (signing key) "
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 0D24 B36A A9A2 A651 7878 7645 1202 821C BE2C D9C1
Install the Image
- DVD: Just burn the ISO to a DVD
- USB: more involved
- Install syslinux
- Insert USB drive and identify its device name (say /dev/sdc)
- Use isohybrid to modify the ISO to a usb-ready image:
$ cp tails-i386-1.0.1.iso tails-i386-1.0.1-isohybrid.iso
$ isohybrid tails-i386-1.0.1-isohybrid.iso --entry 4 --type 0x1c
Use dd to image YOURDEVICE (such as /dev/sdc) with the ISO:
$ sudo dd if=tails-i386-1.0.1-isohybrid.iso of=YOURDEVICE bs=1M
Note: To use a persistent volume, you need to create Tails from an existing Tails disk.