Skip to main content
Menu

Signature verification

Every Rasid image carries a Sigstore Cosign signature and an in-toto attestation. Both are issued by Rasid’s self-hosted signing chain — Fulcio at fulcio.rasid.cc and Rekor at rekor.rasid.cc. Verification touches only Rasid-operated infrastructure.

Install Cosign

Cosign is a small Go binary. Install with your package manager, or grab a release from the upstream Sigstore project (Apache 2.0).

Verify by signature

cosign verify images.rasid.cc/postgres:17 \
  --key https://rasid.cc/.well-known/rasid-cosign.pub

The --key flag points Cosign at Rasid’s published verification key. The signature is co-recorded on Rasid’s Rekor transparency log, so a successful verification means the signature is both cryptographically valid AND publicly logged.

If the command exits 0, the image was signed by Rasid. If it exits non-zero, do not run it.

Verify the build attestation

cosign verify-attestation images.rasid.cc/postgres:17 \
  --type slsaprovenance \
  --key https://rasid.cc/.well-known/rasid-cosign.pub

This proves not just that we signed the image, but the SLSA-level-3 build provenance attached to it. The attestation is in-toto v1.0 with SLSA provenance v1.0.

Verify offline

For air-gapped environments, see the enterprise tier — we ship offline bundles with Rasid’s verification key and Rekor transparency-log entries pre-fetched, so verification works without any network access.