-
-
Notifications
You must be signed in to change notification settings - Fork 113
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Verify method implemented #59
base: master
Are you sure you want to change the base?
Conversation
Thank you for the PR. I understand that this compares the digest of the file and the one in the signatures, but does it check the validity of the certificate chain? |
@ebourg No it does not but if you could tell me if this is the way to approach verification, I'll try and add checking the validity of the certificate chain |
@aravindarc The code has been refactored to support several file formats. Do you think you could rebase your PR on top of the latest changes? The |
@ebourg Yes I'll try to change as you say and also validate the certificate chain. |
Hey. I copied the proposed code and use it to verify that our binaries are properly signed before releasing them. This works fine, the only thing I changed is to add a check for whether the used certificate is self-signed. I just copied the isSelfSigned() method from AuthenticodeSigner and verify the X509Certificate using this... |
c6795d2
to
51bb816
Compare
Is the only task for this PR resolving merge conflicts? If this feature is added to Jsign, I can switch from osslsigncode to Jsign. Then, I can implement APPX signing (#81). Context: I use osslsigncode for signing and verification of .exe files. I want to also sign APPX files, but this is not implemented in osslsigncode (or in Jsign). I'd rather implement APPX signing in Jsign than in osslsigncode, but that would only make sense if I use Jsign for signing and verifying .exe files. (I don't want to use both Jsign and osslsigncode.) |
No I don't think I'll merge the PR, I'm working on another design that provides a detailed verification report. |
Hi,
Is there anything that could be done to validate the MSI files as well with this? |
ba14af0
to
71988ef
Compare
fe788dc
to
41500fd
Compare
4e45861
to
f68f4da
Compare
I'd like to ask about the status, progress of said that design, and whether its completely stalled. |
A verification method has been implemented, which is in the TODO list.
After I couldn't find the cause of the exception:
Exception in thread "main" java.lang.NullPointerException
at org.bouncycastle.cms.CMSSignedData$1.write(Unknown Source)
pointed by issue #42, implemented this verify method.
This is a shallow verify, if the exe file contains a chain of certificates, only the leaf certificates and their counter-signatures are verified.
Check this to understand the implementation.