Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Code signing for XCA releases #478

Open
tushev opened this issue Oct 18, 2023 · 4 comments
Open

Code signing for XCA releases #478

tushev opened this issue Oct 18, 2023 · 4 comments

Comments

@tushev
Copy link

tushev commented Oct 18, 2023

Hi,

I would like to ask you to consider signing the binaries and installer - not to get rid of AV warnings, but for authenticity reasons.

AuthentiCode signatures, unfortunately, cost some money ($29/yr + $60 for card+reader = $89 at Certum OpenSource Signing).

But even (detached) GPG signatures would be OK.
I (and probably many others) would like to be sure that the binaries are really coming from (and authorized by) you.

@chris2511
Copy link
Owner

SHA256 sums of all released binaries are always available here

@chris2511
Copy link
Owner

I used the certum signing cert in the past, but they changed the token and I have to buy a new token, again ...
No one told me that open source software can be so expensive - for the author... 🤷

@tushev
Copy link
Author

tushev commented Feb 27, 2024

Thank you for your reply! Yes, sadly, the price makes quite a barrier.

GPG, on the other hand, is free. If you could sign binary-hashes.json with your GPG key, those concerned would be capable to actually prove that binaries are coming from you. Please consider this if possible.


P.S. Just FYI, there's also https://about.signpath.io/product/open-source , they sign 'significant' OSS projects for free, but they require a CI pipeline in which they integrate themselves. Personally I did not bother with setting it for my OSS projects (yet).

@dtklein
Copy link

dtklein commented Apr 12, 2024

@chris2511, I value proof of provenance and tamper-resistance for security-sensitive software, such as XCA. If the price of smart cards and readers is a barrier to getting and using a code-signing certificate to provide this, please contact me privately, and I will see what needs to be done to help you with this.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants