Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • Cybersecurity
    • Mobile

    How Can We Improve Code Signing?

    Written by

    Larry Seltzer
    Published May 9, 2008
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      I’ve always been a fan of code signing. It seems clear to me that trust is a major issue for code you bring onto your system, and digital signatures can improve trust.

      But it’s also clear that code signing is a messed-up process. On popular general-purpose computers it’s used widely only on Windows, and nowhere near as widely as it might. Certain aspects of code signing on Windows, especially certificate revocation, are a mess.

      On mobile platforms it is widespread, even mandatory on many platforms, as providers use it to control what code can be run on their networks. But everyone has different rules and different technologies, and the result is a confusing and expensive mess for the poor software developer who wants to deliver code on multiple platforms.

      Melih Abdulhayoglu, CEO and chief security architect of Comodo, wants to fix code signing. Abdulhayoglu (tell you what-let’s call him Melih) was the original force behind the CA/Browser Forum and EV-SSL (Extended Validation Secure Sockets Layer), which sets standards for the issuance of a new class of SSL (Secure Sockets Layer) certificate and rules for how browsers should behave for sites which have them. He wants to create a similar group to create standards to improve code signing.

      Melih sees two stages of this process: The first, just as with EV-SSL, is to set standards for the issuance of a new class of code certificates. The identity of the applicants for these certificates, as with EV-SSL, would be strictly scrutinized, and perhaps restricted to certain classes of organizations. For example, unlike the old type of SSL certificates, EV-SSL cannot be held by individuals.

      Once again, there would have to be some new prominent behavior for the user to see that a file was signed with this new class of certificate, analogous to the green browser bar for EV-SSL. It doesn’t matter exactly what it is; what matters is that it’s eye catching and implemented consistently.

      But Melih wants to go a step further. When code signing was devised back in the mid-90’s, malware authors wanted to do whatever they could to hide their identities. You could reasonably assume that signed code was safe code, even though the theory of it never argued for such a conclusion. Now malware authors, especially adware vendors, buy code signing certs.

      Therefore, he wants the content of the files to be checked for malicious content. The first thing that I thought of was uploading it to VirusTotal, but there are many different kinds of checks that could be performed. All of these checks run some risk of false positives and false negatives. Just recently Mozilla announced that a virus infection in their Vietnamese language pack had slipped through-even though it was scanned for viruses at upload time. Happens all the time when malware is new.

      Is this really a mess that certificate authorities want to get into? I totally understand the motivation for checking the files, but it’s so obviously imperfect. It’s inevitable that malware will get through the process. At the same time, perfectly innocent programs will be misidentified as malicious. Not a good situation.

      Another approach you could take for safety besides scanning files is a reputation system, similar to the ones developing for e-mail senders. Comodo is trying to build a general one on their UserTrust network, but I’m leery. (Please let me know what you think of UserTrust in the comment area below.)

      There is more that can be done for code signing standards. The biggest improvement is that there also needs to be standards for revocation of certificates. Revocation is the messiest part of the code-certificate mess. There are two problems with revocation: There needs to be standards for what constitutes a revocable offense. All CAs (certificate authenticators) have policies for this that you agree to when you buy a certificate, but they are inconsistent and arguably unspecific. So an EV-Code Signing system could make that more consistent.

      The second problem is that revocation needs to be more powerful. Windows only checks if a program certificate is revoked at install time. Once the program is installed, if its certificate is revoked, Windows won’t know. This is why, in the case of Atsiv, a program that bypassed 64-bit Vista’s requirement that kernel-mode code be digitally signed, Microsoft dealt with it partly by issuing a Windows Defender signature for it.

      The cert was revoked by VeriSign, but that only dealt with new installs. Why doesn’t Windows check at load time as well? If it’s just about performance I’m unimpressed. A standard for when and how revocation checks are to be performed would help too.

      I don’t agree with Melih on all of these issues, but we both believe in the ability of code signing to improve security and trust. Getting a standards group working on these issues could help to clarify which ideas make sense.

      Security Center Editor Larry Seltzer has worked in and written about the computer industry since 1983.

      For insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzer’s blog Cheap Hack

      Larry Seltzer
      Larry Seltzer
      Larry Seltzer has been writing software for and English about computers ever since—,much to his own amazement— He was one of the authors of NPL and NPL-R, fourth-generation languages for microcomputers by the now-defunct DeskTop Software Corporation. (Larry is sad to find absolutely no hits on any of these +products on Google.) His work at Desktop Software included programming the UCSD p-System, a virtual machine-based operating system with portable binaries that pre-dated Java by more than 10 years.For several years, he wrote corporate software for Mathematica Policy Research (they're still in business!) and Chase Econometrics (not so lucky) before being forcibly thrown into the consulting market. He bummed around the Philadelphia consulting and contract-programming scenes for a year or two before taking a job at NSTL (National Software Testing Labs) developing product tests and managing contract testing for the computer industry, governments and publication.In 1991 Larry moved to Massachusetts to become Technical Director of PC Week Labs (now eWeek Labs). He moved within Ziff Davis to New York in 1994 to run testing at Windows Sources. In 1995, he became Technical Director for Internet product testing at PC Magazine and stayed there till 1998.Since then, he has been writing for numerous other publications, including Fortune Small Business, Windows 2000 Magazine (now Windows and .NET Magazine), ZDNet and Sam Whitmore's Media Survey.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×