Hello guys, I’m using Arch as a newbie. Learning about it. But worried about a thing. When I was creating the bootable media for install it, I downloaded the .iso and .iso.sig from any mirror that is near. I followed the things about verification of .iso but I got some errors and gave up. Just used the iso I didn’t verificated. I am using the OS that iso installed. There is nothing wrong with usage. I can access all the things about Arch, not had any problems and any performance issues. No special internet usage, no broken things etc. but I’m a bit worried about is there any malicious software such as keyloggers, mining softwares… Can I verify my Arch after the installation? Can I see if there is any software malicious via htop-bpytop? Should I create the bootable media again with verification and reinstall my Arch?

  • blackstrat@lemmy.fwgx.uk
    link
    fedilink
    arrow-up
    0
    ·
    1 month ago

    Should you trust something that failed verification? No. That’s the whole point. It’s not what you think it is.

    • bitahcold@lemmy.worldOP
      link
      fedilink
      arrow-up
      0
      ·
      1 month ago

      I mean fail as error. Like, I did something wrong at commands. I haven’t verificated the iso about its valid or not. That’s the thing I’m worried about. I asked can I verify with other ways without the iso. But I decided to do clean re-install. Thanks for comment. Goodbye.

  • BaalInvoker@lemmy.eco.br
    link
    fedilink
    arrow-up
    0
    ·
    1 month ago

    Just verify the iso you downloaded. If the signature is correct, the iso is safe.

    You can simply $ sha256sum the iso file and verify.

    But honestly, you’re probably safe. I wouldn’t be worried in your place.

  • lemmyreader@lemmy.ml
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 month ago

    When I was creating the bootable media for install it, I downloaded the .iso and .iso.sig from any mirror that is near. I followed the things about verification of .iso but I got some errors and gave up.

    There’s two different things. The checksum and the GnuPG signature. If you used the GnuPG method to check the signature I can imagine you got a warning because of the GnuPG key owner trust and that’s actually expected behavior and should not worry you. Normally when you exchange GnuPG keys with a person in real life, you can compare key fingerprints and after that you would set the owner trust yourself for their key, but with downloaded iso images this is a different use case though if you really want you can set the owner trust to make the warning go away.

    • bitahcold@lemmy.worldOP
      link
      fedilink
      arrow-up
      0
      ·
      edit-2
      1 month ago

      Oh, I didn’t know that. I just downloaded iso and iso.sig then used gpg commands. The thing I’m worried about is, maliciousy chance of the iso. I probably used German or French mirror to download the iso. Then, failed the verification. I am using unverificated iso’s Arch Linux now. Can I know if I had any tracker, keylogger or mining software etc. ? Usage is normal and smooth as how it have to be. But idk… Just worried. I still have the same bootable USB that the iso was extracted into. I have a FreeDOS unnecessary PC. Can I verificate the bootable by executing any verification command while I’m at the installation process? Or, can I verify or check my operating system’s originality at post-installation era of my main PC? Thanks for comment.

      • lemmyreader@lemmy.ml
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 month ago

        Oh, I didn’t know that. I just downloaded iso and iso.sig then used gpg commands. The thing I’m worried about is, maliciousy chance of the iso. I probably used German or French mirror to download the iso. Then, failed the verification.

        Suggesting the following for the archlinux-2024.05.01-x86_64.iso :

        • Put your downloaded iso file and the sig file in ~/Downloads/ if you haven’t done so.
        • From your Arch Linux installation install the Sequoia sq tool : sudo pacman -S sequoia-sq
        • Continue with the following commands : cd ~/Downloads
        • sq network wkd fetch pierre@archlinux.org -o release-key.pgp
        • sq verify --signer-file release-key.pgp --detached archlinux-2024.05.01-x86_64.iso.sig archlinux-2024.05.01-x86_64.iso

        This should unlike with the GnuPG method give no warnings or errors.

        • bitahcold@lemmy.worldOP
          link
          fedilink
          arrow-up
          0
          ·
          edit-2
          1 month ago

          So sorry for labor. There is a lacking information by me. I created the bootable at my previous OS, so there is no same .iso file. Only extracted version on my USB and installed version that is running on my PC. Can I see the mirror source from the extracted version?

          • lemmyreader@lemmy.ml
            link
            fedilink
            English
            arrow-up
            0
            ·
            1 month ago

            Like the other commenter said you are probably fine. If you still worry, backup your /home and go for a fresh install and restore /home.