Yubico aims to cryptographically sign all software that it distributes. We use three different techniques to achieve this.
Source code releases are usually signed by an OpenPGP key of one of Yubico’s developers. Some ZIP files containing Windows executables are also signed using OpenPGP.
Following are the keys for Yubico developers who are currently releasing code.
Klas Lindfors <klas@yubico.com>
0A3B 0262 BCA1 7053 07D5 FF06 BCA0 0FD4 B216 8C0A
Dain Nilsson <dain@yubico.com>
20EE 325B 86A8 1BCB D3E5 6798 F043 6709 6FBA 95E8
Alessio Di Mauro <alessio@yubico.com>
B70D 62AA 6A31 AD6B 9E4F 9F4B DC88 8892 5D25 CA7A
Jean Paul Galea <jeanpaul@yubico.com>
B604 2E2B D1FD BC2B CA85 88B2 FF8D 3B45 B7B8 75A9
Emil Lundberg <emil@yubico.com>
57A9 DEED 4C6D 962A 923B B691 816F 3ED9 9921 835E
Trevor Bentley <trevor@yubico.com>
2685 83B6 4786 F50F 8074 56DA 8CED 3A80 D41C 0DCB
Aveen Ismail <aveen.ismail@yubico.com>
1D73 08B0 055F 5AEF 3694 4A8F 27A9 C24D 9588 EA0F
Alessandro Carlo Chirico <alessandro.chirico@yubico.com>
355C 8C01 86CC 96CB A49F 9CD8 DAA1 7C29 5391 4D9D
Dennis Fokin <dennis.fokin@yubico.com>
9E88 5C03 02F9 BB91 6752 9C2D 5CBA 11E6 ADC7 BCD1
Konstantinos Georgantas <kostas@yubico.com>
7FBB 6186 9574 96D5 8C75 1AC2 0E77 7DD8 5755 AA4A
Ludvig Michaelsson <ludvig.michaelsson@yubico.com>
78D9 97D5 3E9C 0A2A 2053 92ED 14A1 9784 723C 9988
Adam Velebil <adam.velebil@yubico.com>
AF51 1D2C BC0F 973E 5D30 8054 325C 8E4A E2E6 437D
Elias Bonnici <elias.bonnici@yubico.com>
C28E D375 3F01 B4B0 97A1 B306 948B 29C5 F1E0 63ED
Following are the keys for developers who have released code in the past.
Tommaso De Orchi <tom@yubico.com>
FF8A F719 AE58 2818 1B89 4D83 1CE3 9268 A097 3948
Dag Heyman <dag@yubico.com>
8D0B 4EBA 9345 254B CEC0 E843 514F 078F F4AB 24C3
Nigel Williams <nigel.williams@yubico.com>
1DC4 BA28 7252 5B3F 2FE8 207F 5D9C 760A 3FB5 1707
Simon Josefsson <simon@yubico.com>
9AA9 BDB1 1BB1 B99A 2128 5A33 0664 A769 5426 5E8C
Henrik Stråth <henrik@yubico.com>
DCB9 04FA B343 CFA7 1907 6EF7 9EA9 0242 958E 0658
Pedro Martelletto <pedro@yubico.com>
EE90 AE0D 1977 4C83 8662 8FAA B428 949E F791 4718
The list above lists primary key fingerprints, but GnuPG may print a
subkey fingerprint if you attempt to verify a signature made with an
unknown key. You can use gpg --recv-keys
to download the necessary
key.
Caution
|
Regardless of how you download keys, you must always verify that signatures were made by one of the keys listed above. See below for an example of how to to this. |
Example of downloading key by subkey ID:
gpg --verify yubioath-desktop-5.0.5.tar.gz.sig gpg: assuming signed data in 'yubioath-desktop-5.0.5.tar.gz' gpg: Signature made tor 15 apr 2021 16:23:47 CEST gpg: using RSA key D6919FBF48C484F3CB7B71CD870B88256690D8BC gpg: Can't check signature: No public key gpg --recv-keys D6919FBF48C484F3CB7B71CD870B88256690D8BC gpg: key 5CBA11E6ADC7BCD1: public key "Dennis Fokin <dennis.fokin@yubico.com>" imported gpg: Total number processed: 1 gpg: imported: 1
Example of verifying signature:
gpg --verify yubioath-desktop-5.0.5.tar.gz.sig gpg: assuming signed data in 'yubioath-desktop-5.0.5.tar.gz' gpg: Signature made tor 15 apr 2021 16:23:47 CEST gpg: using RSA key D6919FBF48C484F3CB7B71CD870B88256690D8BC gpg: Good signature from "Dennis Fokin <dennis.fokin@yubico.com>" [unknown] gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner. Primary key fingerprint: 9E88 5C03 02F9 BB91 6752 9C2D 5CBA 11E6 ADC7 BCD1 Subkey fingerprint: D691 9FBF 48C4 84F3 CB7B 71CD 870B 8825 6690 D8BC
Make sure that gpg reports Good signature
AND that the Primary key
fingerprint
is listed above. You can safely ignore the warning key is
not certified with a trusted signature
if you have manually verified
the primary key fingerprint.
Our Windows executables are signed with one of the following code signing certificates, issued by DigiCert:
SHA256 Fingerprint
|
|
SHA256 Fingerprint
|
|
SHA256 Fingerprint
|
|
Earlier Windows software may be signed with one of the following certificates:
SHA256 Fingerprint
|
|
SHA256 Fingerprint
|
|
SHA256 fingerprint
|
|
SHA256 fingerprint
|
|
SHA256 fingerprint
|
|
SHA256 fingerprint
|
|
SHA256 fingerprint
|
|
SHA256 fingerprint
|
|
Our Mac executables are signed with a Yubico code signing certificate, issued by Apple.
SHA256 fingerprint
|
|
Our Mac installers are signed with a Yubico code signing certificate, issued by Apple.
SHA256 fingerprint
|
|
Earlier Mac software may be signed with one of the following certificates:
SHA256 fingerprint
|
|
SHA256 fingerprint
|
|
SHA256 fingerprint
|
|