~~NOTOC~~
====== Szenario 8.2: Code signieren ======
**Kategorie:** [[.:start|Digitale Signaturen]] \\
**Komplexität:** ⭐⭐⭐⭐ (Hoch) \\
**Voraussetzungen:** Code-Signing-Zertifikat \\
**Geschätzte Zeit:** 20-30 Minuten
----
===== Beschreibung =====
Dieses Szenario beschreibt das **Signieren von Code und Executables** mit Post-Quantum-sicheren Algorithmen. Code Signing ermöglicht:
* **Authentifizierung** des Software-Herausgebers
* **Integritätsschutz** gegen Manipulation
* **Vertrauenswürdigkeit** für Endnutzer
* **Compliance** mit Sicherheitsrichtlinien
**Unterstützte Formate:**
* Windows Authenticode (EXE, DLL, MSI)
* PowerShell Scripts (.ps1)
* NuGet Packages (.nupkg)
* Java JAR Files
* macOS Code Signature
----
===== Workflow =====
flowchart LR
CODE[Executable/DLL] --> HASH[Authenticode Hash]
HASH --> SIGN[ML-DSA + RSA Signatur]
KEY[Code-Signing Key] --> SIGN
SIGN --> TS[Timestamp hinzufügen]
TSA[TSA Server] --> TS
TS --> OUTPUT[Signierte Datei]
style SIGN fill:#e8f5e9
style TS fill:#fff3e0
----
===== Code-Beispiel: Authenticode Signierung =====
using WvdS.Security.Cryptography.X509Certificates.Extensions.PQ;
using System.Security.Cryptography;
using var ctx = PqCryptoContext.Initialize();
// Code-Signing-Zertifikat und Schlüssel laden
var codeSignCert = ctx.LoadCertificate("codesign.crt.pem");
var codeSignKey = ctx.LoadPrivateKey("codesign.key.pem", "KeyPassword!");
// Authenticode-Signatur erstellen
var signatureOptions = new AuthenticodeSignatureOptions
{
Certificate = codeSignCert,
PrivateKey = codeSignKey,
HashAlgorithm = HashAlgorithmName.SHA256,
TimestampUrl = "http://timestamp.digicert.com",
TimestampHashAlgorithm = HashAlgorithmName.SHA256,
Mode = CryptoMode.Hybrid,
Description = "MyApp - Sichere Anwendung",
DescriptionUrl = "https://myapp.example.com"
};
// EXE signieren
var inputPath = "MyApp.exe";
var outputPath = "MyApp-signed.exe";
ctx.SignAuthenticode(inputPath, outputPath, signatureOptions);
Console.WriteLine($"Code signiert: {outputPath}");
Console.WriteLine($" Signer: {codeSignCert.Subject}");
Console.WriteLine($" Timestamp: {signatureOptions.TimestampUrl}");
----
===== Windows SignTool Integration =====
public class SignToolWrapper
{
public void Sign(string filePath, string pfxPath, string password, string timestampUrl)
{
var process = new Process
{
StartInfo = new ProcessStartInfo
{
FileName = "signtool.exe",
Arguments = $"sign " +
$"/fd SHA256 " +
$"/f \"{pfxPath}\" " +
$"/p \"{password}\" " +
$"/tr \"{timestampUrl}\" " +
$"/td SHA256 " +
$"/d \"Signed with PQ-Crypto\" " +
$"\"{filePath}\"",
RedirectStandardOutput = true,
RedirectStandardError = true,
UseShellExecute = false
}
};
process.Start();
process.WaitForExit();
if (process.ExitCode != 0)
{
var error = process.StandardError.ReadToEnd();
throw new InvalidOperationException($"SignTool failed: {error}");
}
Console.WriteLine($"Signiert: {filePath}");
}
public bool Verify(string filePath)
{
var process = new Process
{
StartInfo = new ProcessStartInfo
{
FileName = "signtool.exe",
Arguments = $"verify /pa /v \"{filePath}\"",
RedirectStandardOutput = true,
UseShellExecute = false
}
};
process.Start();
process.WaitForExit();
return process.ExitCode == 0;
}
}
----
===== PowerShell Script signieren =====
public class PowerShellSigner
{
public void SignScript(string scriptPath, X509Certificate2 cert)
{
// PowerShell CMS Signatur hinzufügen
var scriptContent = File.ReadAllText(scriptPath);
// Signatur-Block erstellen
var signatureBlock = CreatePowerShellSignature(scriptContent, cert);
// Signatur an Script anhängen
var signedContent = scriptContent + Environment.NewLine + signatureBlock;
File.WriteAllText(scriptPath, signedContent);
Console.WriteLine($"PowerShell Script signiert: {scriptPath}");
}
private string CreatePowerShellSignature(string content, X509Certificate2 cert)
{
using var ctx = PqCryptoContext.Initialize();
// Hash des Scripts
var hash = SHA256.HashData(Encoding.UTF8.GetBytes(content));
// CMS Signatur
var contentInfo = new ContentInfo(hash);
var signedCms = new SignedCms(contentInfo, true);
var signer = new CmsSigner(cert);
signedCms.ComputeSignature(signer);
// Base64-codierter Signatur-Block
var signatureBase64 = Convert.ToBase64String(signedCms.Encode());
return $@"
# SIG # Begin signature block
# {signatureBase64}
# SIG # End signature block";
}
}
----
===== NuGet Package signieren =====
public class NuGetSigner
{
public async Task SignPackage(
string packagePath,
X509Certificate2 cert,
AsymmetricAlgorithm privateKey,
string timestampUrl)
{
using var ctx = PqCryptoContext.Initialize();
// NuGet Package öffnen
using var package = new ZipArchive(File.Open(packagePath, FileMode.Open), ZipArchiveMode.Update);
// .signature.p7s erstellen
var signatureEntry = package.CreateEntry(".signature.p7s");
// Package-Hash berechnen (ohne Signatur-Entry)
var packageHash = ComputePackageHash(package);
// CMS Signatur
var contentInfo = new ContentInfo(packageHash);
var signedCms = new SignedCms(contentInfo, true);
var signer = new CmsSigner(cert)
{
DigestAlgorithm = new Oid("2.16.840.1.101.3.4.2.1"),
IncludeOption = X509IncludeOption.WholeChain
};
signedCms.ComputeSignature(signer, mode: CryptoMode.Hybrid);
// Timestamp hinzufügen
await AddTimestamp(signedCms, timestampUrl);
// Signatur schreiben
using var signatureStream = signatureEntry.Open();
signatureStream.Write(signedCms.Encode());
Console.WriteLine($"NuGet Package signiert: {packagePath}");
}
}
----
===== Dual-Signatur (Legacy + PQ) =====
Für Übergangszeit: Beide Signaturen parallel
public class DualSignature
{
public void SignWithDualSignature(string exePath, SigningCredentials credentials)
{
using var ctx = PqCryptoContext.Initialize();
// 1. Erste Signatur: SHA-1 (für Windows XP/Vista Kompatibilität)
ctx.SignAuthenticode(exePath, exePath, new AuthenticodeSignatureOptions
{
Certificate = credentials.LegacyCert,
PrivateKey = credentials.LegacyKey,
HashAlgorithm = HashAlgorithmName.SHA1,
TimestampUrl = credentials.TimestampUrl,
AppendSignature = false // Erste Signatur
});
// 2. Zweite Signatur: SHA-256 + PQ (für moderne Systeme)
ctx.SignAuthenticode(exePath, exePath, new AuthenticodeSignatureOptions
{
Certificate = credentials.PqCert,
PrivateKey = credentials.PqKey,
HashAlgorithm = HashAlgorithmName.SHA256,
Mode = CryptoMode.Hybrid,
TimestampUrl = credentials.TimestampUrl,
AppendSignature = true // Zweite Signatur anhängen
});
Console.WriteLine("Dual-Signatur erstellt (SHA-1 + SHA-256/PQ)");
}
}
----
===== Timestamp-Server =====
^ Anbieter ^ URL ^ Protokoll ^
| DigiCert | http://timestamp.digicert.com | RFC 3161 |
| Sectigo | http://timestamp.sectigo.com | RFC 3161 |
| GlobalSign | http://timestamp.globalsign.com | RFC 3161 |
| SSL.com | http://ts.ssl.com | RFC 3161 |
**WICHTIG:** Ohne Timestamp ist die Signatur nach Zertifikatsablauf ungültig!
----
===== Branchenspezifische Anforderungen =====
^ Branche ^ Standard ^ Anforderungen ^
| **Windows** | Authenticode | EV-Zertifikat für SmartScreen |
| **Automotive** | UNECE R156 | Firmware-Signierung, HSM |
| **Healthcare** | DiGAV | Qualifizierte Signatur |
| **Industrie** | IEC 62443 | SPS-Firmware |
----
===== Verwandte Szenarien =====
^ Beziehung ^ Szenario ^ Beschreibung ^
| **Voraussetzung** | [[de:int:pqcrypt:szenarien:zertifikate:codesign_cert|3.3 Code-Signing Cert]] | Zertifikat erstellen |
| **Wichtig** | [[.:timestamp|8.3 Zeitstempel]] | Langzeit-Gültigkeit |
| **Verwandt** | [[.:signatur_verifizieren|8.4 Signatur verifizieren]] | Prüfung |
----
<< [[.:dokument_signieren|← 8.1 Dokument signieren]] | [[.:start|↑ Signaturen-Übersicht]] | [[.:timestamp|8.3 Zeitstempel →]] >>
{{tag>szenario signatur code authenticode powershell nuget}}
----
//Wolfgang van der Stille @ EMSR DATA d.o.o. - Post-Quantum Cryptography Professional//