ASF Artifacts Distribution Platform

mod_python-3.0.0-BETA.tgz

Download mod_python-3.0.0-BETA.tgz (128.06 KBytes)

Useful references:
How to verify this release

Each official software release at the ASF is digitally signed with a detached PGP signature, as well as accompanying checksum files for extra verification. You can verify the PGP signatures using PGP or GPG.

Verifying the PGP signature

To verify the PGP signature, you will need the following files:

  1. The release artifact itself: mod_python-3.0.0-BETA.tgz
  2. The httpd release signing key list: httpd.txt
  3. The detached signature file: mod_python-3.0.0-BETA.tgz.asc

Make sure you get these files from the official apache.org release distribution service, rather than from a mirror, as we cannot verify the authenticity of mirrors.

Once you have all the needed files, you can verify the release artifact as follows:

 % pgpk -a httpd.txt
 % pgpv mod_python-3.0.0-BETA.tgz.asc
 OR
 % pgp -ka httpd.txt
 % pgp mod_python-3.0.0-BETA.tgz.asc
 OR
 % gpg --import httpd.txt
 % gpg --verify mod_python-3.0.0-BETA.tgz.asc mod_python-3.0.0-BETA.tgz
 

Verifying the checksum files

If you're unable to verify the PGP signatures, you can instead verify the checksums on the files. However, PGP signatures are superior to checksums, and we recommend you verify using PGP whenever possible.

The following checksum files are available for this release:

When multiple checksums are available, we recommend you use the strongest checksum algorithm found. In order of strength, they are: sha512, sha256, sha1, md5

Verifying SHA1, SHA256, and SHA512 checksums

Most Unix systems have a program called shasum included in their core distribution, which can be used here. To verify a checksum file, download it to the same directory as the relase artifact you downloaded, and run: shasum -c [checksum-filename]

The shasum program should emit the following response: mod_python-3.0.0-BETA.tgz: OK. If the program indicates any errors or warnings, there may be authenticity issues with the artifact, and you should let us know at security@apache.org.

On Windows you can use the following command in a command line window to generate a checksum for the artifact, for instance: certutil -hashfile <filename> SHA512.

You can then compare this checksum value to the value in the checksum file.

Verifying MD5 checksums

Some older artifacts may only have an MD5 checksum file associated with it. As MD5 is now considered a weak algorithm, we strongly advise that users verify such artifacts using the PGP method described above. Should you have a need to verify the MD5 checksum file, you can use the Unix program md5sum in a similar manner to how SHA checksums are verified: md5sum -c [checksum-filename]. The response from the md5sum program is similar to that of the shasum program, and an OK response should always be expected.

mod_python-3.0.0-BETA2.tgz

Download mod_python-3.0.0-BETA2.tgz (203.43 KBytes)

Useful references:
How to verify this release

Each official software release at the ASF is digitally signed with a detached PGP signature, as well as accompanying checksum files for extra verification. You can verify the PGP signatures using PGP or GPG.

Verifying the PGP signature

To verify the PGP signature, you will need the following files:

  1. The release artifact itself: mod_python-3.0.0-BETA2.tgz
  2. The httpd release signing key list: httpd.txt
  3. The detached signature file: mod_python-3.0.0-BETA2.tgz.asc

Make sure you get these files from the official apache.org release distribution service, rather than from a mirror, as we cannot verify the authenticity of mirrors.

Once you have all the needed files, you can verify the release artifact as follows:

 % pgpk -a httpd.txt
 % pgpv mod_python-3.0.0-BETA2.tgz.asc
 OR
 % pgp -ka httpd.txt
 % pgp mod_python-3.0.0-BETA2.tgz.asc
 OR
 % gpg --import httpd.txt
 % gpg --verify mod_python-3.0.0-BETA2.tgz.asc mod_python-3.0.0-BETA2.tgz
 

Verifying the checksum files

If you're unable to verify the PGP signatures, you can instead verify the checksums on the files. However, PGP signatures are superior to checksums, and we recommend you verify using PGP whenever possible.

The following checksum files are available for this release:

When multiple checksums are available, we recommend you use the strongest checksum algorithm found. In order of strength, they are: sha512, sha256, sha1, md5

Verifying SHA1, SHA256, and SHA512 checksums

Most Unix systems have a program called shasum included in their core distribution, which can be used here. To verify a checksum file, download it to the same directory as the relase artifact you downloaded, and run: shasum -c [checksum-filename]

The shasum program should emit the following response: mod_python-3.0.0-BETA2.tgz: OK. If the program indicates any errors or warnings, there may be authenticity issues with the artifact, and you should let us know at security@apache.org.

On Windows you can use the following command in a command line window to generate a checksum for the artifact, for instance: certutil -hashfile <filename> SHA512.

You can then compare this checksum value to the value in the checksum file.

Verifying MD5 checksums

Some older artifacts may only have an MD5 checksum file associated with it. As MD5 is now considered a weak algorithm, we strongly advise that users verify such artifacts using the PGP method described above. Should you have a need to verify the MD5 checksum file, you can use the Unix program md5sum in a similar manner to how SHA checksums are verified: md5sum -c [checksum-filename]. The response from the md5sum program is similar to that of the shasum program, and an OK response should always be expected.

mod_python-3.0.0-BETA3.tgz

Download mod_python-3.0.0-BETA3.tgz (208.13 KBytes)

Useful references:
How to verify this release

Each official software release at the ASF is digitally signed with a detached PGP signature, as well as accompanying checksum files for extra verification. You can verify the PGP signatures using PGP or GPG.

Verifying the PGP signature

To verify the PGP signature, you will need the following files:

  1. The release artifact itself: mod_python-3.0.0-BETA3.tgz
  2. The httpd release signing key list: httpd.txt
  3. The detached signature file: mod_python-3.0.0-BETA3.tgz.asc

Make sure you get these files from the official apache.org release distribution service, rather than from a mirror, as we cannot verify the authenticity of mirrors.

Once you have all the needed files, you can verify the release artifact as follows:

 % pgpk -a httpd.txt
 % pgpv mod_python-3.0.0-BETA3.tgz.asc
 OR
 % pgp -ka httpd.txt
 % pgp mod_python-3.0.0-BETA3.tgz.asc
 OR
 % gpg --import httpd.txt
 % gpg --verify mod_python-3.0.0-BETA3.tgz.asc mod_python-3.0.0-BETA3.tgz
 

Verifying the checksum files

If you're unable to verify the PGP signatures, you can instead verify the checksums on the files. However, PGP signatures are superior to checksums, and we recommend you verify using PGP whenever possible.

The following checksum files are available for this release:

When multiple checksums are available, we recommend you use the strongest checksum algorithm found. In order of strength, they are: sha512, sha256, sha1, md5

Verifying SHA1, SHA256, and SHA512 checksums

Most Unix systems have a program called shasum included in their core distribution, which can be used here. To verify a checksum file, download it to the same directory as the relase artifact you downloaded, and run: shasum -c [checksum-filename]

The shasum program should emit the following response: mod_python-3.0.0-BETA3.tgz: OK. If the program indicates any errors or warnings, there may be authenticity issues with the artifact, and you should let us know at security@apache.org.

On Windows you can use the following command in a command line window to generate a checksum for the artifact, for instance: certutil -hashfile <filename> SHA512.

You can then compare this checksum value to the value in the checksum file.

Verifying MD5 checksums

Some older artifacts may only have an MD5 checksum file associated with it. As MD5 is now considered a weak algorithm, we strongly advise that users verify such artifacts using the PGP method described above. Should you have a need to verify the MD5 checksum file, you can use the Unix program md5sum in a similar manner to how SHA checksums are verified: md5sum -c [checksum-filename]. The response from the md5sum program is similar to that of the shasum program, and an OK response should always be expected.

mod_python-3.0.0-BETA4.tgz

Download mod_python-3.0.0-BETA4.tgz (206.35 KBytes)

Useful references:
How to verify this release

Each official software release at the ASF is digitally signed with a detached PGP signature, as well as accompanying checksum files for extra verification. You can verify the PGP signatures using PGP or GPG.

Verifying the PGP signature

To verify the PGP signature, you will need the following files:

  1. The release artifact itself: mod_python-3.0.0-BETA4.tgz
  2. The httpd release signing key list: httpd.txt
  3. The detached signature file: mod_python-3.0.0-BETA4.tgz.asc

Make sure you get these files from the official apache.org release distribution service, rather than from a mirror, as we cannot verify the authenticity of mirrors.

Once you have all the needed files, you can verify the release artifact as follows:

 % pgpk -a httpd.txt
 % pgpv mod_python-3.0.0-BETA4.tgz.asc
 OR
 % pgp -ka httpd.txt
 % pgp mod_python-3.0.0-BETA4.tgz.asc
 OR
 % gpg --import httpd.txt
 % gpg --verify mod_python-3.0.0-BETA4.tgz.asc mod_python-3.0.0-BETA4.tgz
 

Verifying the checksum files

If you're unable to verify the PGP signatures, you can instead verify the checksums on the files. However, PGP signatures are superior to checksums, and we recommend you verify using PGP whenever possible.

The following checksum files are available for this release:

When multiple checksums are available, we recommend you use the strongest checksum algorithm found. In order of strength, they are: sha512, sha256, sha1, md5

Verifying SHA1, SHA256, and SHA512 checksums

Most Unix systems have a program called shasum included in their core distribution, which can be used here. To verify a checksum file, download it to the same directory as the relase artifact you downloaded, and run: shasum -c [checksum-filename]

The shasum program should emit the following response: mod_python-3.0.0-BETA4.tgz: OK. If the program indicates any errors or warnings, there may be authenticity issues with the artifact, and you should let us know at security@apache.org.

On Windows you can use the following command in a command line window to generate a checksum for the artifact, for instance: certutil -hashfile <filename> SHA512.

You can then compare this checksum value to the value in the checksum file.

Verifying MD5 checksums

Some older artifacts may only have an MD5 checksum file associated with it. As MD5 is now considered a weak algorithm, we strongly advise that users verify such artifacts using the PGP method described above. Should you have a need to verify the MD5 checksum file, you can use the Unix program md5sum in a similar manner to how SHA checksums are verified: md5sum -c [checksum-filename]. The response from the md5sum program is similar to that of the shasum program, and an OK response should always be expected.

windll-b3-a2.0.43-p2.2.1.zip

Download windll-b3-a2.0.43-p2.2.1.zip (24.72 KBytes)

Useful references:
How to verify this release

Each official software release at the ASF is digitally signed with a detached PGP signature, as well as accompanying checksum files for extra verification. You can verify the PGP signatures using PGP or GPG.

Verifying the PGP signature

To verify the PGP signature, you will need the following files:

  1. The release artifact itself: windll-b3-a2.0.43-p2.2.1.zip
  2. The httpd release signing key list: httpd.txt
  3. The detached signature file: windll-b3-a2.0.43-p2.2.1.zip.asc

Make sure you get these files from the official apache.org release distribution service, rather than from a mirror, as we cannot verify the authenticity of mirrors.

Once you have all the needed files, you can verify the release artifact as follows:

 % pgpk -a httpd.txt
 % pgpv windll-b3-a2.0.43-p2.2.1.zip.asc
 OR
 % pgp -ka httpd.txt
 % pgp windll-b3-a2.0.43-p2.2.1.zip.asc
 OR
 % gpg --import httpd.txt
 % gpg --verify windll-b3-a2.0.43-p2.2.1.zip.asc windll-b3-a2.0.43-p2.2.1.zip
 

Verifying the checksum files

If you're unable to verify the PGP signatures, you can instead verify the checksums on the files. However, PGP signatures are superior to checksums, and we recommend you verify using PGP whenever possible.

The following checksum files are available for this release:

When multiple checksums are available, we recommend you use the strongest checksum algorithm found. In order of strength, they are: sha512, sha256, sha1, md5

Verifying SHA1, SHA256, and SHA512 checksums

Most Unix systems have a program called shasum included in their core distribution, which can be used here. To verify a checksum file, download it to the same directory as the relase artifact you downloaded, and run: shasum -c [checksum-filename]

The shasum program should emit the following response: windll-b3-a2.0.43-p2.2.1.zip: OK. If the program indicates any errors or warnings, there may be authenticity issues with the artifact, and you should let us know at security@apache.org.

On Windows you can use the following command in a command line window to generate a checksum for the artifact, for instance: certutil -hashfile <filename> SHA512.

You can then compare this checksum value to the value in the checksum file.

Verifying MD5 checksums

Some older artifacts may only have an MD5 checksum file associated with it. As MD5 is now considered a weak algorithm, we strongly advise that users verify such artifacts using the PGP method described above. Should you have a need to verify the MD5 checksum file, you can use the Unix program md5sum in a similar manner to how SHA checksums are verified: md5sum -c [checksum-filename]. The response from the md5sum program is similar to that of the shasum program, and an OK response should always be expected.

windll-b4-a2.0.43-p2.2.1.zip

Download windll-b4-a2.0.43-p2.2.1.zip (24.73 KBytes)

Useful references:
How to verify this release

Each official software release at the ASF is digitally signed with a detached PGP signature, as well as accompanying checksum files for extra verification. You can verify the PGP signatures using PGP or GPG.

Verifying the PGP signature

To verify the PGP signature, you will need the following files:

  1. The release artifact itself: windll-b4-a2.0.43-p2.2.1.zip
  2. The httpd release signing key list: httpd.txt
  3. The detached signature file: windll-b4-a2.0.43-p2.2.1.zip.asc

Make sure you get these files from the official apache.org release distribution service, rather than from a mirror, as we cannot verify the authenticity of mirrors.

Once you have all the needed files, you can verify the release artifact as follows:

 % pgpk -a httpd.txt
 % pgpv windll-b4-a2.0.43-p2.2.1.zip.asc
 OR
 % pgp -ka httpd.txt
 % pgp windll-b4-a2.0.43-p2.2.1.zip.asc
 OR
 % gpg --import httpd.txt
 % gpg --verify windll-b4-a2.0.43-p2.2.1.zip.asc windll-b4-a2.0.43-p2.2.1.zip
 

Verifying the checksum files

If you're unable to verify the PGP signatures, you can instead verify the checksums on the files. However, PGP signatures are superior to checksums, and we recommend you verify using PGP whenever possible.

The following checksum files are available for this release:

When multiple checksums are available, we recommend you use the strongest checksum algorithm found. In order of strength, they are: sha512, sha256, sha1, md5

Verifying SHA1, SHA256, and SHA512 checksums

Most Unix systems have a program called shasum included in their core distribution, which can be used here. To verify a checksum file, download it to the same directory as the relase artifact you downloaded, and run: shasum -c [checksum-filename]

The shasum program should emit the following response: windll-b4-a2.0.43-p2.2.1.zip: OK. If the program indicates any errors or warnings, there may be authenticity issues with the artifact, and you should let us know at security@apache.org.

On Windows you can use the following command in a command line window to generate a checksum for the artifact, for instance: certutil -hashfile <filename> SHA512.

You can then compare this checksum value to the value in the checksum file.

Verifying MD5 checksums

Some older artifacts may only have an MD5 checksum file associated with it. As MD5 is now considered a weak algorithm, we strongly advise that users verify such artifacts using the PGP method described above. Should you have a need to verify the MD5 checksum file, you can use the Unix program md5sum in a similar manner to how SHA checksums are verified: md5sum -c [checksum-filename]. The response from the md5sum program is similar to that of the shasum program, and an OK response should always be expected.