sandstorm-io / vagrant-spk

Packaging tool for Sandstorm, a self-hosting platform for web apps!
Apache License 2.0
55 stars 29 forks source link

Windows: vagrant-spk.exe (and/or other EXEs in the install) should be signed #172

Open paulproteus opened 8 years ago

paulproteus commented 8 years ago

Explains @ocdtrekkie on IRC:

Also, Windows SmartScreen hates your app because it isn't signed and probably because of some of the things it does.

Relevant thoughts:

kentonv commented 8 years ago

Hmm, but what's the point of code signing if we're not signing the Python scripts?

paulproteus commented 8 years ago

@kentonv the only point of this would be to make the Windows SmartScreen warning go away. If doing the signing would add no security but would remove Windows' security theater, I'd be OK with that.

ocdtrekkie commented 8 years ago

You actually have to click like an Advanced/More info text to even get the "Run anyway" prompt.

kentonv commented 8 years ago

Hooray security theater.

ocdtrekkie commented 8 years ago

Well, presumably, for EXE's that are self-contained, the signing method isn't security theater.

For the sake of vagrant-spk, signing it avoids a scary warning that some people will not know how to get around (and some group policies actually disable bypassing it), so it's also not security theater, merely ease of use.

"Security theater" indicates it's being done just to make people "feel safer", and that's not why it should be signed.

kentonv commented 8 years ago

@ocdtrekkie The thing is, if someone has signed a Python interpreter that interprets unsigned code, then anyone else can build malware on top of that, thereby avoiding the signature checker. And so the whole purpose of requiring signatures is defeated. It doesn't matter that signatures on legitimate code are in fact checking the whole executable, because it's the illegitimate code we want to catch, and again, anyone can build malware on that one signed Python interpreter.