"Reproducible build" definition in OpenSSF glossary

Leo Wandersleb Leo at LeoWandersleb.de
Sun Jun 29 13:58:24 UTC 2025


Hi Ismael,

I think we're talking past each other. Even in the OS world, binaries are 
distributed - through apt, snap stores, flatpak, etc. When a maintainer uploads 
a .deb or someone publishes a snap, those binaries need verification.

The point of post-hoc/forensic reproducibility is being able to verify ANY 
binary matches its claimed source, regardless of whether the build system was 
designed for reproducibility. This is just as relevant for OS packages as 
anything else.

Many packaging systems (like snaps) weren't designed with reproducibility in 
mind. Post-hoc techniques are often the only way to verify what users are 
actually installing.

Reproducibility is fundamentally about transferable trust - whether that's 
between OS maintainers or between any developer and their users.

Best regards,

Leo

On 6/29/25 15:01, Ismael Luceno wrote:
> El 29 de junio de 2025 12:23:56 UTC, Leo Wandersleb <Leo at LeoWandersleb.de> escribió:
>> *2. Post-hoc/Forensic Reproducibility*Artifacts that can be reproduced even when the original author didn't specifically design for it. At walletscrutiny.com, we often reverse-engineer build processes, figure out the exact build environment, and successfully reproduce binaries that were never intended to be reproducible. This is equally valuable for security verification.
>  From the perspective of an OS this doesn't make sense because we shouldn't be taking any binaries ever, we're comparing builds among us, perhaps even just in the time domain, but definitely not with upstreams.




More information about the rb-general mailing list