curl / Docs / Releases / Verify

Verify

Do not trust, verify!

Signed releases

Every curl release is shipped as a set of tarballs. They all have the exact same content but use different archivers, visible by the different file extensions used.

Each tarball is signed by the curl release manager Daniel. The digital signatures for each tarball are always provided. The digital signatures can be used to verify that the tarballs were produced by Daniel.

If the curl website were breached and fake curl releases were provided, they could be detected using these signatures.

Daniel's public GPG key: 27ED EAF2 2F3A BCEB 50DB 9A12 5CC9 08FD B71E 12C2

Reproducible releases

The curl project ships reproducible releases. This means that everyone is able - and encouraged - to independently verify the contents of every curl release. Verify that it contains exactly the bits that are supposed to be in the release and nothing extra.

The curl releases are generated using a Docker image to make it easy to get an identical setup. To verify an existing curl release, we provide a convenient script that generates a new curl release from source code and then compares this newly generated release tarball with the tarball file you downloaded from curl.se.

Invoke it like this:

./scripts/verify-release curl-8.19.0.tar.xz

By verifying the release tarballs, you verify that Daniel does not infect the release on purpose or involuntarily because of anything malicious running in his setup.

Verify the verify

Of course you should not blindly trust the verification script. It is short and simple and should be quick to verify. Or you write your own script that you trust, to do the same job.

Source code

How do you then verify that what is in git is fine to build a product from?

In the curl project we verify the source code in multiple ways, and one way to gain trust is to verify and review our testing procedures.