Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • IT Management
    • Networking

    Whos In Charge of Code Signing?

    By
    Larry Seltzer
    -
    August 30, 2007
    Share
    Facebook
    Twitter
    Linkedin

      When a code signing signature is revoked, who revokes it? The certificate authority, of course. Obvious, one would think, unless the evil presence of Microsoft is detected. At that point, some think, everyone elses free will melts away and they do Redmonds bidding irrespective of their own interests.

      So it was in the case of Atsiv. I beat this story to death in a prior column and not one, but two blogs. But the short summary of it is that 64-bit Vista requires that kernel code, including device drivers, be digitally signed with a code signing certificate issued by a trusted certificate authority. Linchpin Labs wrote Atsiv, a program which uses a custom loader to load unsigned drivers into kernel space. Microsoft responded by “working with VeriSign” to revoke the certificate and by adding a signature to Windows Defender for Atsiv, effectively declaring it to be malware.

      /zimages/1/28571.gifThe shutdown of Vista validation under Microsofts Windows Genuine Advantage program has been fixed. Click here to read more.

      The actual language Microsoft used about the revocation of the certificate was this:

      Microsoft has worked with partners in the code signing certification authority ecosystem to assess the Atsiv issue. VeriSign has revoked the code signing key used to sign the Atsiv kernel driver, which means the code signing key will no longer be considered valid.
      And yet I have read in several places, including from Linchpin Labs themselves, about how Microsoft revoked the certificate: “the fact Microsoft has taken it upon itself to revoke the Atsiv certificate based on its own definition for malware sets a concerning precedent, one that should not be ignored.”

      The fact is that anyone can rat out anyone else for abuse of a code signing certificate by filling out the form on this page. And according to VeriSign, this is exactly what Microsoft did. Someone from Microsoft filled out this specific form, and they took action on it.

      VeriSign admits, as anyone might have guessed, that the fact that the report came from Microsoft got their attention. This might have put this report at the front of the queue, but did it change the standards against which Atsiv was judged? Come to think of it, what are those standards? The form itself gives vague guidelines about code being “malicious” or “harmful,” and a few specific examples (spyware, phishing, MITM, misleading descriptions).

      So I asked VeriSign what their standards were and specifically why they dropped the bomb on Atsiv. Here are some of the things they consider:

      • The name of the code being signed
      • The behavior of the code
      • Methods of distributing the code
      • Disclosures made to recipients of the code
      • Any additional allegations made about the code

      Based on my exchanges with VeriSign, it appears they decided Atsiv was malicious and/or harmful based on Microsofts claims that it was and the fact that Microsoft created a Windows Defender signature. Other anti-malware products also have signatures for Atsiv, such as Symantec, and Im pretty sure that Symantec made its classification before Microsoft did. This doesnt make Atsiv malware, but it means that it wasnt bullied into it by Microsoft, as if such a thing were reasonable to suspect. Im sure VeriSign would treat a malware report from Symantec or McAfee with the same urgency and standards as one from Microsoft.

      VeriSign could very easily determine on their own that Atsiv is “harmful” if only because its designed to help users bypass the code signing requirement. Its not hard to imagine that VeriSign agrees with Microsoft on the importance of code signing. Add to this the fact that Microsoft and Symantec both consider Atsiv to be malicious and who is VeriSign to disagree?

      Finally, as for the idea that Microsoft bullies anyone and everyone to do as they please, I just dont see how it works against VeriSign. Especially with respect to code signing, its VeriSign that has all the leverage in the relationship. Code signing is actually more important as a business to Microsoft than to VeriSign. Im sure VeriSign takes it very seriously and hopes to grow it to be good money, but right now its puny next to its SSL certificate business.

      So if you hear about a cert being revoked and want to know whos responsible, the answer is easy. Only the CA can revoke it and you shouldnt bother going any further.

      Security Center Editor Larry Seltzer has worked in and written about the computer industry since 1983.

      /zimages/1/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers blog Cheap Hack

      More from Larry Seltzer

      Larry Seltzer
      Larry Seltzer has been writing software for and English about computers ever since—,much to his own amazement—,he graduated from the University of Pennsylvania in 1983.He was one of the authors of NPL and NPL-R, fourth-generation languages for microcomputers by the now-defunct DeskTop Software Corporation. (Larry is sad to find absolutely no hits on any of these +products on Google.) His work at Desktop Software included programming the UCSD p-System, a virtual machine-based operating system with portable binaries that pre-dated Java by more than 10 years.For several years, he wrote corporate software for Mathematica Policy Research (they're still in business!) and Chase Econometrics (not so lucky) before being forcibly thrown into the consulting market. He bummed around the Philadelphia consulting and contract-programming scenes for a year or two before taking a job at NSTL (National Software Testing Labs) developing product tests and managing contract testing for the computer industry, governments and publication.In 1991 Larry moved to Massachusetts to become Technical Director of PC Week Labs (now eWeek Labs). He moved within Ziff Davis to New York in 1994 to run testing at Windows Sources. In 1995, he became Technical Director for Internet product testing at PC Magazine and stayed there till 1998.Since then, he has been writing for numerous other publications, including Fortune Small Business, Windows 2000 Magazine (now Windows and .NET Magazine), ZDNet and Sam Whitmore's Media Survey.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×