-
Notifications
You must be signed in to change notification settings - Fork 575
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Possible unsigned DLL files? #10395
Comments
Yes.
Yes, for lack of anyone interested in setting up an automated process to sign anything for Windows. We do that for macOS already, but it's very simple, I personally have no idea how that'd work for Windows, nor any interest, so if that's something really desired then someone particularly motivated would need to come up with a practical plan of actions and implement it. |
No interest here to implement it, but these are the required steps in a nutshell:
|
We don't have any certificate for macOS.
We don't have any Windows SDK.
We can't run Windows executables. |
Is this something one could potentially run through wine? |
That'd address only the last point. |
I imagine getting a certificate is annoying but not hard. But the other two points are hard - getting Windows SDK, just to get signtool.exe and then run Wine. Just wanted to understand the steps. Thanks. |
There is also this, eliminating the need to run a windows exe: https://github.com/mtrojnar/osslsigncode |
That looks very interesting (and the page mentions that Wine wouldn't work), thanks! But need to resolve the problem with the certificate and figuring out the infrastructure stuff (how to sign the files on Yggdrasil in a safe way). We don't have any certificate for macOS, just running |
I believe @DilumAluthge or @staticfloat might be able to point to our certificates we sign our windows binaries with. The part about getting it done in a safe way is probably the part that needs work. |
Do any other open source ecosystems sign their DLLs? @GregPlowman Does Conda do this - any insights on how you deal with other ecosystems would be valuable. |
In my opinion, it's not really feasible or useful to try and codesign everything for Windows. Microsoft doesn't require it, and while certain antivirus vendors may use it as a mark against a file, I'm not aware of any opensource ecosystem similar to ours that signs things like this (for instance, the The purpose of a code signature is that the owner of the signature is vouching for the safety of a particular This is in sharp contrast to Julia itself where we do claim ultimate responsibility over it and every Finally, the macOS signing we do is not the same kind of signing that we're talking about here. Most of the time when people talk about code signing on macOS you must create a developer certificate with Apple and the same kinds of issues I mention above come into play. However macOS 12+ has a hard requirement that all binary objects be signed by something in order to be loadable at all. To allow for things such as In summary, I don't think we should do this. |
I'm an end user, so I can't comment directly, except to say that our environment is generally restrictive. I have asked for a response from our corporate IT security. The explanation from |
Within our corporate environment (Windows) we have received alerts from anti-malware software (Cortex) regarding suspicious DLL files.
The report indicates these files are not signed, which contributed to their detection as potential security concerns.
My questions are:
libodbccr-2.dll
is used inunixODBC_jll
ODBC -> unixODBC_jll
libboost_system.dll
andlibboost_date_time.dll
are used inboost_jll
SCIP -> SCIP_jll -> boost_jll
SCIP -> SCIP_PaPILO_jll -> boost_jll
Output from versioninfo()
The text was updated successfully, but these errors were encountered: