TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Mike N.
from: Rich
date: 2006-09-08 09:02:20
subject: Re: Code signing

From: "Rich" 

This is a multi-part message in MIME format.

------=_NextPart_000_1102_01C6D325.7EB52810
Content-Type: text/plain;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

    Why did you edit away part of my reply and the statements to which =
they respond that make clear that the subject is not what you spin in =
your message.  I'll remind you in case you have something to say on =
topic.  Note that the signing to which you refer is a great example of =
where the user can make a trust decision.

Rich

    "Rich"  wrote in message news:4500ee78$1{at}w3.nls.net...
       No.  You look at the signing certificate to see if you trust both =
the signing party and the certification path.  If you do not, do not =
trust the signed entity.  If something is not signed, you don't have = even
this option.  How do you choose what to trust?

       The average Joe relies on the identity of the signing party alone =
and assumes that the certification authorities that are not distrusted =
have been vetted.

       In practice, have you ever known this to be a problem with signed =
code?  How much actual malware do you hear of that is signed?  I can't =
think of any that wasn't some PR stunt by someone that signed a demo =
which he released under his own name anyway.

    Rich

      "Antti Kurenniemi" 
wrote in message =
news:450054c1{at}w3.nls.net...

      The concept of "signed" executables / activex / whatnot makes me =
want to=20
      slap someone every time I see it mentioned. Yeah, sure, it's =
signed - now=20
      what? Should I visit Redmond to ask someone if they really signed =
this, or=20
      if this is just a trick - a message box saying this executable is =
signed?=20
      The rate at which these new "improvements" keep popping up is such =
that no=20
      average Joe can ever really know if he's being fooled or if it =
really is=20
      legit...


      Antti Kurenniemi




  "Mike N."  wrote in message =
news:pnj2g29u6tgjufkn0s6vmuher5quibj0f0{at}4ax.com...
  On Thu, 7 Sep 2006 21:13:07 -0700, "Rich"  wrote:

  >   In practice, have you ever known this to be a problem with signed =
code? =20
  >How much actual malware do you hear of that is signed? =20
  >I can't think of any that wasn't some PR stunt by someone that signed =
a=20
  >demo which he released under his own name anyway.

     Adware uses this quite frequently to get in.

  =
http://www.symantec.com/avcenter/reference/techniques.of.adware.and.spywa=
re.pdf#search=3D%22%22signed%20activex%22%20adware%22

    Check out page 10 from spazbox.net

   The dialer below qualifies as malware.  Although you get a prompt =
because
  of date expiration, the certificate chain is not shown, so it's not =
clear
  if there would have been a warning before -
  =
http://www.symantec.com/security_response/print_writeup.jsp?docid=3D2004-=
121917-5031-99

     It's clear that signing is only an extra step for malware writers, =
not
  an obstacle.   If it becomes necessary to sign malware - under Vista =
for
  example, there is no reason to expect that it won't be signed.
------=_NextPart_000_1102_01C6D325.7EB52810
Content-Type: text/html;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable








   
Why did you edit =
away part of my=20
reply and the statements to which they respond that make clear that the = subject=20
is not what you spin in your message.  I'll remind you in case you = have=20
something to say on topic.  Note that the signing to which you =
refer is a=20
great example of where the user can make a trust decision.
 
Rich
 

  
"Rich" <{at}> wrote in message news:4500ee78$1{at}w3.nls.net... No. You look at = the signing=20 certificate to see if you trust both the signing party and the = certification=20 path. If you do not, do not trust the signed entity. If=20 something is not signed, you don't have even this option. How = do you=20 choose what to trust? The average Joe relies = on the=20 identity of the signing party alone and assumes that the = certification=20 authorities that are not distrusted have been vetted. In practice, have you = ever known=20 this to be a problem with signed code? How much actual malware = do you=20 hear of that is signed? I can't think of any that wasn't some = PR stunt=20 by someone that signed a demo which he released under his own name=20 anyway. Rich "Antti Kurenniemi" <NOantti{at}SPAManttikPLEASE.com=">mailto:NOantti{at}SPAManttikPLEASE.com">NOantti{at}SPAManttikPLEASE.com= >=20 wrote in message news:450054c1{at}w3.nls.net...The=20 concept of "signed" executables / activex / whatnot makes me want = to=20 slap someone every time I see it mentioned. Yeah, sure, it's = signed -=20 now what? Should I visit Redmond to ask someone if they really = signed=20 this, or if this is just a trick - a message box saying this=20 executable is signed? The rate at which these new = "improvements" keep=20 popping up is such that no average Joe can ever really know if = he's=20 being fooled or if it really is legit...Antti=20 Kurenniemi "Mike N." <mike{at}u-spam-u-die.net>">mailto:mike{at}u-spam-u-die.net">mike{at}u-spam-u-die.net> = wrote in=20 message news:pnj2g29u6tg= jufkn0s6vmuher5quibj0f0{at}4ax.com...On=20 Thu, 7 Sep 2006 21:13:07 -0700, "Rich" <{at}>=20 wrote:> In practice, have you ever known this = to be a=20 problem with signed code? >How much actual malware do you = hear of=20 that is signed? >I can't think of any that wasn't some PR = stunt=20 by someone that signed a >demo which he released under his own = name=20 anyway. Adware uses this quite frequently to get=20 in.http://www.symantec.com/avcenter/reference/techniques.of.adware.a= nd.spyware.pdf#search=3D%22%22signed%20activex%22%20adware%22">http://www= .symantec.com/avcenter/reference/techniques.of.adware.and.spyware.pdf#sea= rch=3D%22%22signed%20activex%22%20adware%22 =20 Check out page 10 from spazbox.net The dialer below = qualifies as=20 malware. Although you get a prompt becauseof date = expiration, the=20 certificate chain is not shown, so it's not clearif there would = have been=20 a warning before -http://www.symantec.com/security_response/print_writeup.jsp?docid= =3D2004-121917-5031-99">http://www.symantec.com/security_response/print_w= riteup.jsp?docid=3D2004-121917-5031-99 =20 It's clear that signing is only an extra step for malware writers, = notan=20 obstacle. If it becomes necessary to sign malware - under = Vista=20 forexample, there is no reason to expect that it won't be=20 signed. ------=_NextPart_000_1102_01C6D325.7EB52810-- --- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270 5030/786
@PATH: 379/45 1 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.