Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Rip off attempt???

Rip off attempt???

Scheduled Pinned Locked Moved The Lounge
data-structurescryptographyquestion
26 Posts 11 Posters 3 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • P Pete OHanlon

    Comodo? Prepare to jump through hoops.

    I was brought up to respect my elders. I don't respect many people nowadays.
    CodeStash - Online Snippet Management | My blog | MoXAML PowerToys | Mole 2010 - debugging made easier

    G Offline
    G Offline
    glennPattonWork3
    wrote on last edited by
    #9

    Just read it all the comments at the bottom basically say that. I mean that is the last thing I think in this project...(I hope!)

    1 Reply Last reply
    0
    • G glennPattonWork3

      Hang on I might have found something on Intel.....

      D Offline
      D Offline
      DaveAuld
      wrote on last edited by
      #10

      I went with GlobalSign, ~100ukp, so much more painless experience than Comondo or whatever they were called).

      Dave Find Me On: Web|Facebook|Twitter|LinkedIn


      Folding Stats: Team CodeProject

      G 1 Reply Last reply
      0
      • P Pete OHanlon

        Comodo? Prepare to jump through hoops.

        I was brought up to respect my elders. I don't respect many people nowadays.
        CodeStash - Online Snippet Management | My blog | MoXAML PowerToys | Mole 2010 - debugging made easier

        D Offline
        D Offline
        DaveAuld
        wrote on last edited by
        #11

        Pete O'Hanlon wrote:

        Prepare to jump through hoops.

        That doesn't begin to explain the challenge with that lot!

        Dave Find Me On: Web|Facebook|Twitter|LinkedIn


        Folding Stats: Team CodeProject

        1 Reply Last reply
        0
        • D DaveAuld

          I went with GlobalSign, ~100ukp, so much more painless experience than Comondo or whatever they were called).

          Dave Find Me On: Web|Facebook|Twitter|LinkedIn


          Folding Stats: Team CodeProject

          G Offline
          G Offline
          glennPattonWork3
          wrote on last edited by
          #12

          It's just that it seems a bit off you or the company buy VS2008 use it on XP for years no problem have to upgrade to Win7 (due to dead PC) find this!:mad:

          L 1 Reply Last reply
          0
          • G glennPattonWork3

            Hi All, I have created an installer for my application when its run it comes up with Publisher Unknown. Digging around on MSDN it appears to use a command SignTool, which I tried in a Console/Dos Window it comes back as "'signtool' is not recognized as an internal or external command, operable program or batch file. Or you have typed rubbish. Stack Overflow you need a code signing certificate which is available for $179 a year or $499. Is this right so do I send my flaming box of dog do to MicroSharft now or what? Glenn

            C Offline
            C Offline
            Clifford Nelson
            wrote on last edited by
            #13

            I think the situaton with Apple phones is even worse.

            1 Reply Last reply
            0
            • G glennPattonWork3

              It's just that it seems a bit off you or the company buy VS2008 use it on XP for years no problem have to upgrade to Win7 (due to dead PC) find this!:mad:

              L Offline
              L Offline
              Lost User
              wrote on last edited by
              #14

              If only there was a way to disable driver signature enforcement[^]..

              1 Reply Last reply
              0
              • G glennPattonWork3

                Hi All, I have created an installer for my application when its run it comes up with Publisher Unknown. Digging around on MSDN it appears to use a command SignTool, which I tried in a Console/Dos Window it comes back as "'signtool' is not recognized as an internal or external command, operable program or batch file. Or you have typed rubbish. Stack Overflow you need a code signing certificate which is available for $179 a year or $499. Is this right so do I send my flaming box of dog do to MicroSharft now or what? Glenn

                L Offline
                L Offline
                LloydA111
                wrote on last edited by
                #15

                Did you not try doing a

                cd

                to the EXE's directory and then running it again?

                       .-.
                      |o,o|
                   ,| \_\\=/\_      .-""-.
                   ||/\_/\_\\\_\\    /\[\] \_ \_\\
                   |\_/|(\_)|\\\\  \_|\_o\_LII|\_
                      \\.\_./// / | ==== | \\
                      |\\\_/|"\` |\_| ==== |\_|
                      |\_|\_|    ||" ||  ||
                      |-|-|    ||LI  o ||
                      |\_|\_|    ||'----'||
                     /\_/ \\\_\\  /\_\_|    |\_\_\\
                
                G 1 Reply Last reply
                0
                • G glennPattonWork3

                  Hi All, I have created an installer for my application when its run it comes up with Publisher Unknown. Digging around on MSDN it appears to use a command SignTool, which I tried in a Console/Dos Window it comes back as "'signtool' is not recognized as an internal or external command, operable program or batch file. Or you have typed rubbish. Stack Overflow you need a code signing certificate which is available for $179 a year or $499. Is this right so do I send my flaming box of dog do to MicroSharft now or what? Glenn

                  P Offline
                  P Offline
                  peterchen
                  wrote on last edited by
                  #16

                  signtool is part of the platform SDK. You can use it to "self-sign" your executables, mainly to test the signing process (and dependent processes). You usually pay for a certificate needed to sign the executable. When you sign your binaries, your customers know they got exactly the executable you signed. It does not make a guarantee about the quality or validity of your work. Tampering with the executable voids the signature. For unsigned executables, "trust rating" (which determines whether your users are warned about it being "potentially unsafe") is accumulated only for that one binary. for a signed executable, trust rating is accumulated over all binaries from the same publisher (i.e. you). In addition, your customers can schoose to "always trust" your files. Group policy allows various restrictions based on the signature status of binaries - the most common is requiring device drivers to be signed.


                  It's not exactly wrong to call the verification process a moneymaking scheme. It usually consists of you faxing personal and business details to the Certificate Authority (CA), and they calling you back for a check of those facts. The only other job they have is to keep their root certificates safe. The process is usually described as "chain of trust", though it's more a chain of finger pointing. Microsoft issues root certificate to CA's and preinstalls those (the public key, to be specific) with windows. This is the only place where actual trust happens: Microsoft trusts the CA's that they keep their private keys safe, and don't let you register a company name like "Mircosoft" or "This Is Google, Dude, Trust Me" that might mislead end users of your identity. CA's use their certificate to issue a certificate to you. You use the certificate to sign the executable. This could actually go on much deeper. The reverse is the fingerpointing: - "This exe is what glennPattonWork created if this certificate is valid" - "This certificate is valid if it's not expired, wasn't revoked, and the certificate it was created with is valid" - "This certificate is a root certificate, so Microsoft trusts those guys". Certificates can be limited in purpose, usually those allowing you to sign a kernel driver are more expensive and require more effort.

                  ORDER BY what user wants

                  G 1 Reply Last reply
                  0
                  • G glennPattonWork3

                    But the client wants an MSI 'done properly' to avoid any problems :|

                    D Offline
                    D Offline
                    Dan Neely
                    wrote on last edited by
                    #17

                    Then renegotiate the contract to add a line item to buy a Security Theater Certificate for the installer. :rolleyes:

                    Did you ever see history portrayed as an old man with a wise brow and pulseless heart, waging all things in the balance of reason? Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful? --Zachris Topelius Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies. -- Sarah Hoyt

                    1 Reply Last reply
                    0
                    • G glennPattonWork3

                      But the client wants an MSI 'done properly' to avoid any problems :|

                      J Offline
                      J Offline
                      jschell
                      wrote on last edited by
                      #18

                      glennPattonWork wrote:

                      But the client wants an MSI 'done properly' to avoid any problems

                      Then it is a commercial venture and someone should just pay for it.

                      G 1 Reply Last reply
                      0
                      • J jschell

                        glennPattonWork wrote:

                        But the client wants an MSI 'done properly' to avoid any problems

                        Then it is a commercial venture and someone should just pay for it.

                        G Offline
                        G Offline
                        glennPattonWork3
                        wrote on last edited by
                        #19

                        Yeah, but they won't pay :rolleyes:

                        1 Reply Last reply
                        0
                        • L LloydA111

                          Did you not try doing a

                          cd

                          to the EXE's directory and then running it again?

                                 .-.
                                |o,o|
                             ,| \_\\=/\_      .-""-.
                             ||/\_/\_\\\_\\    /\[\] \_ \_\\
                             |\_/|(\_)|\\\\  \_|\_o\_LII|\_
                                \\.\_./// / | ==== | \\
                                |\\\_/|"\` |\_| ==== |\_|
                                |\_|\_|    ||" ||  ||
                                |-|-|    ||LI  o ||
                                |\_|\_|    ||'----'||
                               /\_/ \\\_\\  /\_\_|    |\_\_\\
                          
                          G Offline
                          G Offline
                          glennPattonWork3
                          wrote on last edited by
                          #20

                          Sadly yes! :sigh:

                          1 Reply Last reply
                          0
                          • P peterchen

                            signtool is part of the platform SDK. You can use it to "self-sign" your executables, mainly to test the signing process (and dependent processes). You usually pay for a certificate needed to sign the executable. When you sign your binaries, your customers know they got exactly the executable you signed. It does not make a guarantee about the quality or validity of your work. Tampering with the executable voids the signature. For unsigned executables, "trust rating" (which determines whether your users are warned about it being "potentially unsafe") is accumulated only for that one binary. for a signed executable, trust rating is accumulated over all binaries from the same publisher (i.e. you). In addition, your customers can schoose to "always trust" your files. Group policy allows various restrictions based on the signature status of binaries - the most common is requiring device drivers to be signed.


                            It's not exactly wrong to call the verification process a moneymaking scheme. It usually consists of you faxing personal and business details to the Certificate Authority (CA), and they calling you back for a check of those facts. The only other job they have is to keep their root certificates safe. The process is usually described as "chain of trust", though it's more a chain of finger pointing. Microsoft issues root certificate to CA's and preinstalls those (the public key, to be specific) with windows. This is the only place where actual trust happens: Microsoft trusts the CA's that they keep their private keys safe, and don't let you register a company name like "Mircosoft" or "This Is Google, Dude, Trust Me" that might mislead end users of your identity. CA's use their certificate to issue a certificate to you. You use the certificate to sign the executable. This could actually go on much deeper. The reverse is the fingerpointing: - "This exe is what glennPattonWork created if this certificate is valid" - "This certificate is valid if it's not expired, wasn't revoked, and the certificate it was created with is valid" - "This certificate is a root certificate, so Microsoft trusts those guys". Certificates can be limited in purpose, usually those allowing you to sign a kernel driver are more expensive and require more effort.

                            ORDER BY what user wants

                            G Offline
                            G Offline
                            glennPattonWork3
                            wrote on last edited by
                            #21

                            Kinda what I was thinking, but from the look of it Microsoft trusts you if you give them money, so an evil person could cought up the money and write malware, get caught certificate revoked but does this send a Certificate revoked message to everyone who has it installed (like those certificate expired things that land occasionally on my machines)..........

                            L P G 3 Replies Last reply
                            0
                            • G glennPattonWork3

                              Kinda what I was thinking, but from the look of it Microsoft trusts you if you give them money, so an evil person could cought up the money and write malware, get caught certificate revoked but does this send a Certificate revoked message to everyone who has it installed (like those certificate expired things that land occasionally on my machines)..........

                              L Offline
                              L Offline
                              Lost User
                              wrote on last edited by
                              #22

                              You can make your own certificates and sign your own code, then install your certificate in the trusted root on the machine. The user will see a 'do you want to install this certificate from xxx' so they know it is from you. I do this a lot in the kernel for test code, and there is a doc KMCS_walkthrough.doc that explains the process. And yes, et the SDK, it is free and has all the tools you need.

                              ============================== Nothing to say.

                              G 1 Reply Last reply
                              0
                              • G glennPattonWork3

                                Kinda what I was thinking, but from the look of it Microsoft trusts you if you give them money, so an evil person could cought up the money and write malware, get caught certificate revoked but does this send a Certificate revoked message to everyone who has it installed (like those certificate expired things that land occasionally on my machines)..........

                                P Offline
                                P Offline
                                peterchen
                                wrote on last edited by
                                #23

                                As I said: there's actually not much trust involved, just identity. The signature merely guarantees the file is the same file someone calling himself "NotTheRussianMafia!" uploaded to tot4llyvirusfreew4rez.com. As I understand, revocation is tested when the certificate is verified, and likely a revocation list is also included in windows updates. So yes, if you are not online and not patching windows, the revocation will not reach you. maybe more[^]

                                ORDER BY what user wants

                                1 Reply Last reply
                                0
                                • G glennPattonWork3

                                  Kinda what I was thinking, but from the look of it Microsoft trusts you if you give them money, so an evil person could cought up the money and write malware, get caught certificate revoked but does this send a Certificate revoked message to everyone who has it installed (like those certificate expired things that land occasionally on my machines)..........

                                  G Offline
                                  G Offline
                                  GenJerDan
                                  wrote on last edited by
                                  #24

                                  To get the cert, you have to prove who you are. And at that address. And listed in a business directory at that address. And they'd really, really like you to have a Dun & Bradstreet number (but it's not mandatory).

                                  YouTube and My Mu[sic], Films and Windows Programs, etc.

                                  1 Reply Last reply
                                  0
                                  • G glennPattonWork3

                                    Hi All, I have created an installer for my application when its run it comes up with Publisher Unknown. Digging around on MSDN it appears to use a command SignTool, which I tried in a Console/Dos Window it comes back as "'signtool' is not recognized as an internal or external command, operable program or batch file. Or you have typed rubbish. Stack Overflow you need a code signing certificate which is available for $179 a year or $499. Is this right so do I send my flaming box of dog do to MicroSharft now or what? Glenn

                                    G Offline
                                    G Offline
                                    GenJerDan
                                    wrote on last edited by
                                    #25

                                    Cheaper here.[^] And even cheaper here.[^]

                                    YouTube and My Mu[sic], Films and Windows Programs, etc.

                                    1 Reply Last reply
                                    0
                                    • L Lost User

                                      You can make your own certificates and sign your own code, then install your certificate in the trusted root on the machine. The user will see a 'do you want to install this certificate from xxx' so they know it is from you. I do this a lot in the kernel for test code, and there is a doc KMCS_walkthrough.doc that explains the process. And yes, et the SDK, it is free and has all the tools you need.

                                      ============================== Nothing to say.

                                      G Offline
                                      G Offline
                                      glennPattonWork3
                                      wrote on last edited by
                                      #26

                                      Hmmm, it's Friday afternoon, lets play! :laugh:

                                      1 Reply Last reply
                                      0
                                      Reply
                                      • Reply as topic
                                      Log in to reply
                                      • Oldest to Newest
                                      • Newest to Oldest
                                      • Most Votes


                                      • Login

                                      • Don't have an account? Register

                                      • Login or register to search.
                                      • First post
                                        Last post
                                      0
                                      • Categories
                                      • Recent
                                      • Tags
                                      • Popular
                                      • World
                                      • Users
                                      • Groups