Part of being safe on the Internet is making sure you know what you are downloading.. so let’s make sure that you’re downloading those Wireshark repositories using what I published, and not what someone else might have exchanged them with in the meantime.
So here goes, firstly create a key, and export the public block, importing it into the RPM tool
gpg --gen-key gpg --export -a publisher > RPM-GPG-KEYemail@example.com sudo cp RPM-GPG-KEYfirstname.lastname@example.org /etc/pki/rpm-gpg/ sudo rpm --import RPM-GPG-KEYemail@example.com
Now configure RPM so that it can find the keys, and then re-sign the created RPMs, and update the repository information.
echo "%_signature gpg" > ~/.rpmmacros echo "%_gpg_name publisher" >> ~/.rpmmacros cd wireshark-2.2.4/packaging/rpm/RPMS/x86_64 rpm --resign *.rpm createrepo --update .
And then enable the
gpgkey options in the repository file information. This is now updated in Building a Wireshark for CentOS 7, so everything should be using the published key versions now.