Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Feature Request]: code signing (yes, again) #687

Open
mrkazoodle opened this issue Sep 4, 2024 · 6 comments
Open

[Feature Request]: code signing (yes, again) #687

mrkazoodle opened this issue Sep 4, 2024 · 6 comments
Labels
enhancement New feature or request stale

Comments

@mrkazoodle
Copy link

The request

Hi,

Please look into code signing again.

There is a Linux foundation project for code signing: https://www.sigstore.dev/

Here's the announcement on Google's security blog a couple of years ago:
https://security.googleblog.com/2021/03/introducing-sigstore-easy-code-signing.html?m=1

There are some big companies backing this project, and they aim to be the let's encrypt for code signing, so it seems to me like a real opportunity to finally add this much requested feature.

Thanks in advance

Is your feature request related to a problem?

No response

Additional information

No response

@mrkazoodle mrkazoodle added the enhancement New feature or request label Sep 4, 2024
Copy link
Contributor

github-actions bot commented Oct 5, 2024

This issue is stale because it has been open for 30 days with no activity.

@github-actions github-actions bot added the stale label Oct 5, 2024
@mrkazoodle
Copy link
Author

Hi,

I'm glad the response was not an immediate no, but no response at all is not very positive either... 😐

@Romanitho
Copy link
Owner

Hi,

We are not against code signing. But it is not our priority :/

@github-actions github-actions bot removed the stale label Oct 6, 2024
@mrkazoodle
Copy link
Author

Hi, I understand it doesn't add any functionality, but probably this would help with anti viruses: we use avast (business), and it doesn't like it.
This was also probably the reason that a fork existed for intune
Probably it is better when using applocker, to only run signed code (we're not using that yet, but planning to).

@AndrewDemski-ad-gmail-com
Copy link
Contributor

Hi,
AppLocker does not mind if a script file is signed using approved cert of approved by file hash.
However setting your security levels too high may break PowerShell-based tool such as this one.

Please do not start from limiting the language mode. That will basically castrate your Helpdesk, IT-Ops and scripted solutions you may not know to have in your company.
That will be the worst kind of ice-bucket challenge you can think of.

You've been warned.
Good Luck

Copy link
Contributor

This issue is stale because it has been open for 30 days with no activity.

@github-actions github-actions bot added the stale label Nov 24, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request stale
Projects
None yet
Development

No branches or pull requests

3 participants