Loading... |
Reply to author |
Edit post |
Move post |
Delete this post |
Delete this post and replies |
Change post date |
Print post |
Permalink |
Raw mail |
![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Hi,
In our quest to have safer software, our release department asked me if the native DLL files (for JOGL 2.4.0) were available with digital signatures? This would allow us to better verify the origin of these files. Is this something that is already available, or could be added to the build pipeline? In a second question they also asked about compiling with the GS compiler switch: https://learn.microsoft.com/en-us/cpp/build/reference/gs-buffer-security-check?view=msvc-170 But I am no C expert, and am not sure if an equivalent exists for non-Windows or non-Visual Studio environments. It would also impact performance a bit, but there are gains in the safer software department. Any feedback on the above would be much appreciated, Thanks |
Loading... |
Reply to author |
Edit post |
Move post |
Delete this post |
Delete this post and replies |
Change post date |
Print post |
Permalink |
Raw mail |
![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Administrator
|
Hi Lerzeel,
I could offer contracting services to your company to discuss these issues and perhaps helping to resolve it. A short answer .. digital signatures with a CA are not the solution for trust. However, I do have signed the sha of the delivered releases. ~Sven |
Loading... |
Reply to author |
Edit post |
Move post |
Delete this post |
Delete this post and replies |
Change post date |
Print post |
Permalink |
Raw mail |
![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Administrator
|
In reply to this post by Lerzeel
Hello
As far as I know, they aren't. I might be wrong, Sven can confirm. Digital signatures aren't a guarantee of security. Several years ago, a criminal stole a digital signature and used it to sign a malicious program containing a virus that used the same name than my game to confuse end users. You can build JogAmp by yourself and sign it, you don't need us to provide libraries with signed signatures. Don't forget that code signing certificates aren't free of charge. Maybe -fstack-protector-strong would do the job with gcc but again, Sven knows better than me. The last time I had to compile the C code of JOGL under Windows, I used gcc, Visual Studio isn't supported out of the box and it's ok for me, it's not necessary, supporting it would cause some problems. Best regards.
Julien Gouesse | Personal blog | Website
|
Loading... |
Reply to author |
Edit post |
Move post |
Delete this post |
Delete this post and replies |
Change post date |
Print post |
Permalink |
Raw mail |
![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Administrator
|
(I was first lol)
.. reminds me of our feature Source Certification Contract (SCC), which is tracked as well here. Current status is that we are able to verify the strong sha at runtime... |
Loading... |
Reply to author |
Edit post |
Move post |
Delete this post |
Delete this post and replies |
Change post date |
Print post |
Permalink |
Raw mail |
![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Thanks for the feedback! With this I have enough information to talk to our release department and evaluate our options.
|
Loading... |
Reply to author |
Edit post |
Move post |
Delete this post |
Delete this post and replies |
Change post date |
Print post |
Permalink |
Raw mail |
![]() ![]() ![]() ![]() ![]() ![]() ![]() |
In the 2.4.0 download folder, there is a sha512sum.txt.sig file for sha512sum.txt. Where do we find the public key required to verify with gpg?
|
Loading... |
Reply to author |
Edit post |
Move post |
Delete this post |
Delete this post and replies |
Change post date |
Print post |
Permalink |
Raw mail |
![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Administrator
|
Loading... |
Reply to author |
Edit post |
Move post |
Delete this post |
Delete this post and replies |
Change post date |
Print post |
Permalink |
Raw mail |
![]() ![]() ![]() ![]() ![]() ![]() ![]() |
This post was updated on May 10, 2023; 10:15pm.
Thank you. I could verify using the asc file you provided, but the asc file obtained from the key server did not work.
I did the following. First, with no key imported yet, from git bash shell (on windows): gpg --verify sha512sum.txt.sig sha512sum.txt This reports "using RSA key C8CBB09E831BD6BA1F1EEADD845EBB9EA1F57735" and, as expected "Can't check signature: No public key" I look up C8CBB09E831BD6BA1F1EEADD845EBB9EA1F57735 at hkps://keys.openpgp.org and download 4503DD006E3D7A269E57E10E8B9B030F8ED60127.asc. Import using "gpg --import 4503DD006E3D7A269E57E10E8B9B030F8ED60127.asc", but gpg reports "8B9B030F8ED60127: no user ID", "gpg --list-keys" does not show a new entry, and gpg verify fails. Similary, running gpg --recv-keys as follow: gpg --keyserver hkps://keys.openpgp.org --recv-keys C8CBB09E831BD6BA1F1EEADD845EBB9EA1F57735 also gives the "8B9B030F8ED60127: no user ID" message. I'm not a gpg expert so perhaps I'm doing it wrong. But importing sgothel-gpg-0x8ED60127.asc and then verifying worked fine. |
Loading... |
Reply to author |
Edit post |
Move post |
Delete this post |
Delete this post and replies |
Change post date |
Print post |
Permalink |
Raw mail |
![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Administrator
|
My fault, I didn't confirm my email address w/ https://keys.openpgp.org/
.. a new feature to avoid attacks pumping keyserver with 'funny keys'. See my test below, working now:
|
Loading... |
Reply to author |
Edit post |
Move post |
Delete this post |
Delete this post and replies |
Change post date |
Print post |
Permalink |
Raw mail |
![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Works on my end too, thanks!
|
Free forum by Nabble | Edit this page |