Recently, I downloaded several public keys with gpg, in order to fix Debian package system after upgrading to Stretch. The commands were:
# gpg --recv-keys EF0F382A1A7B6500 # gpg --recv-keys 8B48AD6246925553 # gpg --recv-keys 7638D0442B90D010 Those keys were correctly imported into my GPG keyring. However, I would like to check if they have not been tampered within the process. If I check one of these keys with this command
# gpg --check-sigs 8B48AD6246925553 I could state that it contains one valid signature, according to the process output:
gpg: 1 good signature gpg: 25 signatures not checked due to missing keys pub rsa4096 2012-04-27 [SC] [caduca: 2020-04-25] A1BD8E9D78F7FE5C3E65D8AF8B48AD6246925553 uid [desconocida] Debian Archive Automatic Signing Key (7.0/wheezy) <[email protected]> sig!3 8B48AD6246925553 2012-04-27 Debian Archive Automatic Signing Key (7.0/wheezy) <[email protected]> The literal sig!3 indicates that the signature is good, but trusting marginally Listing signatures related with this key gives me this result:
# gpg --list-sigs 8B48AD6246925553 pub rsa4096 2012-04-27 [SC] [caduca: 2020-04-25] A1BD8E9D78F7FE5C3E65D8AF8B48AD6246925553 uid [desconocida] Debian Archive Automatic Signing Key (7.0/wheezy) <[email protected]> sig 3 715ED6A07E7B8AC9 2012-04-27 [ID de usuario no encontrado] sig 040BA4EB3B7F81DA 2016-02-16 [ID de usuario no encontrado] ... (up to 25 signatures not checked) My question is: Does GPG check the new downloaded key and its signatures against an older (and previously existing) key on my system? Is there a way that I can validate that signature with ID 715ED6A07E7B8AC9 is valid? (I could compute a hash on any file and compare it with a fresh Debian installation on another computer)