Verifying cryptographic signatures
Verifying packages
APT repositories (for Debian and Ubuntu), starting from Debian 13 (trixie) and from Ubuntu 24.04 LTS, are signed with either of the following GPG keys:
pub ed25519 2024-09-03 [SC]
1CBF71E00FF0A5577A4EA6984B8D8EC2F8BE4647
uid Gramine Project signing key (2024a)
pub ed25519 2024-07-04 [SC]
71807D6094DDF649D9591A53B951298EB73C9392
uid Gramine Project signing key (2024b)
Older Debian and Ubuntu releases are signed with the following key:
pub ed25519 2021-02-17 [SC]
EA3C2D624681AC968521587A5EE1171912234070
uid Gramine Project signing key (2021)
uid Graphene Library OS signing key (2021)
RPM packages, for RHEL derivatives up to version 9 of the respective
distribution (.el9
), are signed with the following key:
pub rsa4096 2021-10-29 [SC]
F3FFBE5FC0477DB46E4851E737B04F03659B87AF
uid Gramine Project signing key, RPM (2021)
We expect to sign .el10
packages with the following keys:
pub rsa4096 2024-09-03 [SC]
AB6A3E8D7000D03ADAD447270DECAAD7765E4B3F
uid Gramine Project signing key, RPM (2024a)
pub rsa4096 2024-07-04 [SC]
302BDEFEA069FA50BFE449BEA5C4FF471AC36540
uid Gramine Project signing key, RPM (2024b)
Verification of the signatures for the packages happens automatically during
repository metadata update or package installation process, and skipping this
verification needs to be done intentionally. Package installation
instructions describe downloading those keys and
copying them to system’s directory, but if you want to trust the key long-term,
you should download this key only once, verify it and keep local, trusted copy
yourself (for example by checking in the file into version control system). For
each reinstall, you should then copy the key from your local store (for example,
in Dockerfile
you should COPY
it, not RUN wget -O ...
).
All the release keys are also available in keys/
subdirectory of the main
project’s git tree.