-
-
Notifications
You must be signed in to change notification settings - Fork 112
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Using SHA256 with Authenticode #19
Comments
Hi, I had the same issue and fixed it as followed with the master branch:
Regards |
To complete my concerns: Here is how to get the alias name from the pfx file: keytool is shipped with java |
Thanks @fishermans! But I think the description you gave ends up using SHA1 and an Authenticode timestamp to timestamp the files. Starting January 1st, 2017, Windows isn't going to accept these anymore. Here's another way of looking at it. The top line is what I think your example does, which will stop working on 1/1/2017. The second line is what JSign is going to need to do if it's still going to work in 9 months. I think it's going to require fixing #7, but all this stuff is mostly magic to me.
|
Unfortunately yes. But this is still working as long as the alg is set to sha256. |
It is working until January 2017, in 9 months. Then it will stop working, because that's when windows requires sha256 timestamping. |
Will this also affect signed executables timestamped before this date? |
According to the Microsoft PKI blog:
To me, this sounds like it will affect the executables signed before this date as well. But even in the best case scenario where it will continue to accept old timestamps, we only have 9 months. |
Nedtwigg, I agree with you. For my understanding all signed exe files even those that are already signed before Jan. 2017 won't be safe anymore. I hope that someone could help us getting timestamping with RFC3161 mode working soon. I am unfortunately not able to do this. As a workaround I would switch to signtool and maven ant plugin. |
Nothing but thanks to @ebourg and the other contributors! This tool has let my little one-man-shop ship a desktop application to Win/Mac/Linux all on one teensy linux box, and I've done nothing to help get this stuff done! Crypto is magic insofar as I can tell. But I think this valuable tool only has a few more months to live before we'll have to switch to signtool. |
I confirm that a SHA256 signature with a SHA1 authenticode timestamp works. So this issue is actually a duplicate of the issue #7, jsign doesn't support RFC3161 timestamps yet. |
I can get jsign and signtool to work for SHA-1 signing as follows:
But for SHA-256, signtool works but JSign fails.
In the case of SHA-256, JSign completes without error, and the executable gets a little bigger, but Windows 10 fails to recognize the cert. It does recognize the cert when signed by signtool.
I'm using the latest code from master, which seems to include SHA-256 and RFC3161. I get the same behavior if I update to BouncyCastle 1.53. Is this related to Issue #7? Any tips?
The text was updated successfully, but these errors were encountered: