-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 To ensure the image has not been corrupted in transmit or tampered with, perform the following two steps to cryptographically verify image integrity: 1. Verify the authenticity of this file by checking that it is signed with our GPG release key: $ curl https://keybase.io/turnkeylinux/pgp_keys.asc | gpg --import $ gpg --list-keys --with-fingerprint release@turnkeylinux.com pub 2048R/A16EB94D 2008-08-15 [expires: 2023-08-12] Key fingerprint = 694C FF26 795A 29BA E07B 4EB5 85C2 5E95 A16E B94D uid Turnkey Linux Release Key $ gpg --verify turnkey-gitlab-15.4-stretch-amd64.ova.hash gpg: Signature made using RSA key ID A16EB94D gpg: Good signature from "Turnkey Linux Release Key " For extra credit you can validate the key's authenticity at: https://keybase.io/turnkeylinux 2. Recalculate the image hash and make sure it matches your choice of hash below. $ sha256sum turnkey-gitlab-15.4-stretch-amd64.ova 521afbc69e027980a993b49f4a8ff81ca0602be7dbf79a60760ea825ea20b00e turnkey-gitlab-15.4-stretch-amd64.ova $ sha512sum turnkey-gitlab-15.4-stretch-amd64.ova 4dd851968e02b056b23c96f2ba6bb20162eebec834b1c6d6dc263ec5dcc15192a01c5df4364161895bfb26dca8d671a626c83568300640103fbe9124b29e5405 turnkey-gitlab-15.4-stretch-amd64.ova Note, you can compare hashes automatically:: $ sha256sum -c turnkey-gitlab-15.4-stretch-amd64.ova.hash turnkey-gitlab-15.4-stretch-amd64.ova: OK $ sha512sum -c turnkey-gitlab-15.4-stretch-amd64.ova.hash turnkey-gitlab-15.4-stretch-amd64.ova: OK -----BEGIN PGP SIGNATURE----- iQEzBAEBCAAdFiEEaUz/JnlaKbrge061hcJelaFuuU0FAl0TG/8ACgkQhcJelaFu uU3IQAgAsyCTa2S2ESUwGOsfO5FA8L7njszmy5v5TZxnfb3bbOI81hYJ0VSUc1dH 5S5lr73h8ixdhM3hpdrT5e60+LpOGEEvzBsqNd9zPJZqIO0bSlT36COzeaobpO0K 2o0pQax+oxTZxipW1jQFalStHJmJRxaNw2VXxPJMgtd8dT6LnQJQqqLsJGbNRpd1 Wp53wUdJDOKJHXHYtrBlooV7NEtJsTG5mIM2hxPsUe3K+RNb0CHDiNTa8CcpaAoH s4VWQyi1wKnPwPpgteBADcyG/OTCyYtKO7yHA5hyO+8nk+eqOE68ZxggPXDpptOL ZtkvA369VWzuG4/nwJD2tVTAZWDNUw== =jmmT -----END PGP SIGNATURE-----