从可执行文件中读取多个签名

15

我正在尝试编写代码来从DLL或EXE中读取签名(证书)。大多数DLL或EXE只有一个签名,我的代码可以正确地读取与此签名相关的所有证书。更具体地说,它读取签名证书、其颁发者(非根证书)、计数器签名证书(带有时间戳)以及其颁发者(非根证书)。我有两个样本程序,一个是C++,一个是C#,它们都返回相同的证书。这是C#代码,C++代码要长100倍:)

static void Main(string[] args)
{
    X509Certificate2Collection collection = new X509Certificate2Collection();
    collection.Import(args[0]);
}

但是有一些DLL具有两个签名,如文件属性/数字签名中所示,例如C:\ Program Files(x86)\ Microsoft SQL Server \ 80 \ Tools \ Binn \ msvcr71.dll:

msvcr71.dll的文件属性和数字签名

对于这个DLL,我的代码只读取与第一个签名相关联的证书。

我还尝试使用signtool,它返回与我的代码相同的信息:第一个证书(及其路径)和计数签名(及其路径)。但也请注意末尾的错误。

C:\Windows>signtool verify /d /v "C:\Program Files (x86)\Microsoft SQL Server\80\Tools\Binn\msvcr71.dll"

Verifying: C:\Program Files (x86)\Microsoft SQL Server\80\Tools\Binn\msvcr71.dll
Signature Index: 0 (Primary Signature)
Hash of file (sha1): 33BBCCF6326276B413A1ECED1BF7842A6D1DDA07

Signing Certificate Chain:
Issued to: Microsoft Root Certificate Authority
Issued by: Microsoft Root Certificate Authority
Expires:   Sun May 09 19:28:13 2021
SHA1 hash: CDD4EEAE6000AC7F40C3802C171E30148030C072

    Issued to: Microsoft Code Signing PCA
    Issued by: Microsoft Root Certificate Authority
    Expires:   Wed Jan 25 19:32:32 2017
    SHA1 hash: FDD1314ED3268A95E198603BA8316FA63CBCD82D

        Issued to: Microsoft Corporation
        Issued by: Microsoft Code Signing PCA
        Expires:   Fri Feb 01 18:49:17 2013
        SHA1 hash: 8849D1C0F147A3C8327B4038783AEC3E06C76F5B

The signature is timestamped: Sat Feb 11 14:03:12 2012
Timestamp Verified by:
Issued to: Microsoft Root Certificate Authority
Issued by: Microsoft Root Certificate Authority
Expires:   Sun May 09 19:28:13 2021
SHA1 hash: CDD4EEAE6000AC7F40C3802C171E30148030C072

    Issued to: Microsoft Time-Stamp PCA
    Issued by: Microsoft Root Certificate Authority
    Expires:   Sat Apr 03 09:03:09 2021
    SHA1 hash: 375FCB825C3DC3752A02E34EB70993B4997191EF

        Issued to: Microsoft Time-Stamp Service
        Issued by: Microsoft Time-Stamp PCA
        Expires:   Thu Oct 25 16:42:17 2012
        SHA1 hash: FC33104FAE31FB538749D5F2D17FA0ECB819EAE5

SignTool Error: The signing certificate is not valid for the requested usage.
    This error sometimes means that you are using the wrong verification
    policy. Consider using the /pa option.

Number of files successfully Verified: 0
Number of warnings: 0
Number of errors: 1

我有两个问题: - 第二个签名的目的是什么 - 如何阅读它(到目前为止只有Windows资源管理器文件属性对话框可以显示它)。

谢谢!


你看到这些双重签名的原因是因为微软正在废弃 SHA-1 签名,因为 SHA-1 的冲突抵抗能力不足。它们仍然留在今天是为了向后兼容性。 - ahmd0
链接相关答案:https://dev59.com/AnNA5IYBdhLWcg3wI6Z4 - zett42
4个回答

19

经过一番探索和尝试,我发现函数WinVerifyTrust可以读取多个嵌入式证书。请忽略函数名称,它可用于许多事情,是一个通用函数。

WinVerifyTrust将结构WINTRUST_DATA作为其输入/输出参数之一。文档称它是IN,但它也用于返回信息。

WINTRUST_DATA有一个字段pSignatureSettings,它是指向另一个结构WINTRUST_SIGNATURE_SETTINGS的指针。该结构具有控制WinVerifyTrust返回信息的字段dwFlags

首先,您调用WinVerifyTrust并使用WINTRUST_SIGNATURE_SETTINGS :: dwFlags = WSS_GET_SECONDARY_SIG_COUNT来获取次要签名的数量,该数量在字段WINTRUST_SIGNATURE_SETTINGS::cSecondarySigs中返回。请注意,如果您的文件有2个签名,则cSecondarySigs将为1。

然后在循环中for (int i = 0; i <= cSecondarySigs; i++),您使用WINTRUST_SIGNATURE_SETTINGS :: dwFlags = WSS_VERIFY_SPECIFICWINTRUST_SIGNATURE_SETTINGS :: dwIndex = i调用WinVerifyTrust

在每个WinVerifyTrust调用之后,您可以通过此调用序列从WINTRUST_DATA :: hWVTStateData获取证书信息(包括计数签名):

WTHelperProvDataFromStateData(hWVTStateData);
WTHelperGetProvSignerFromChain(...);
WTHelperGetProvCertFromChain(...);

我没有深入研究 .NET API,但似乎它只能读取第一个签名。请注意,WINTRUST_SIGNATURE_SETTINGS 似乎是读取多个签名的关键,在 Windows 8 中添加,因此在旧操作系统中您将无法读取它,至少不能使用 MS API。


1
这正是我一直在寻找的。谢谢! - Martin Costello

7

扩展Dima的答案,我想提供一个示例代码,演示如何检查所有嵌入式(和嵌套的)叶子(不在证书链中间)证书。

BOOL CheckCertificateIssuer(HANDLE hWVTStateData, const std::set<CString> &stValidIssuers)
{
    CRYPT_PROVIDER_DATA *pCryptProvData = WTHelperProvDataFromStateData(hWVTStateData);
    CRYPT_PROVIDER_SGNR *pSigner = WTHelperGetProvSignerFromChain(pCryptProvData, 0, FALSE, 0);
    CRYPT_PROVIDER_CERT *pCert = WTHelperGetProvCertFromChain(pSigner, 0);

    CString sIssuer;
    int nLength = CertGetNameString(pCert->pCert, CERT_NAME_SIMPLE_DISPLAY_TYPE, CERT_NAME_ISSUER_FLAG, NULL, NULL, 0);
    if (!nLength)
    {
        ASSERT(FALSE && "Cannot get the length of the Issuer string");
        return FALSE;
    }

    if (!CertGetNameString(pCert->pCert, CERT_NAME_SIMPLE_DISPLAY_TYPE, CERT_NAME_ISSUER_FLAG, NULL, sIssuer.GetBuffer(nLength), nLength))
    {
        ASSERT(FALSE && "Cannot get the Issuer string");
        return FALSE;
    }
    sIssuer.ReleaseBuffer(nLength);
    if (stValidIssuers.find(sIssuer) == stValidIssuers.end())
    {
        ASSERT(FALSE && "Certificate issuer is invalid");
        return FALSE;
    }
    return TRUE;
}
BOOL CheckCertificate(CString filename)
{
    std::set<CString> stValidIssuers;
    stValidIssuers.insert(L"VeriSign Class 3 Code Signing 2010 CA");
    stValidIssuers.insert(L"Symantec Class 3 SHA256 Code Signing CA");

    bool UseStrongSigPolicy = false;

    DWORD Error = ERROR_SUCCESS;
    bool WintrustCalled = false;
    GUID GenericActionId = WINTRUST_ACTION_GENERIC_VERIFY_V2;
    WINTRUST_DATA WintrustData = {};
    WINTRUST_FILE_INFO FileInfo = {};
    WINTRUST_SIGNATURE_SETTINGS SignatureSettings = {};
    CERT_STRONG_SIGN_PARA StrongSigPolicy = {};

    // Setup data structures for calling WinVerifyTrust
    WintrustData.cbStruct = sizeof(WINTRUST_DATA);
    WintrustData.dwStateAction = WTD_STATEACTION_VERIFY;
    WintrustData.dwUIChoice = WTD_UI_NONE;
    WintrustData.fdwRevocationChecks = WTD_REVOKE_NONE;
    WintrustData.dwUnionChoice = WTD_CHOICE_FILE;

    FileInfo.cbStruct = sizeof(WINTRUST_FILE_INFO_);
    FileInfo.pcwszFilePath = filename;
    WintrustData.pFile = &FileInfo;

    //
    // First verify the primary signature (index 0) to determine how many secondary signatures
    // are present. We use WSS_VERIFY_SPECIFIC and dwIndex to do this, also setting
    // WSS_GET_SECONDARY_SIG_COUNT to have the number of secondary signatures returned.
    //
    SignatureSettings.cbStruct = sizeof(WINTRUST_SIGNATURE_SETTINGS);
    SignatureSettings.dwFlags = WSS_GET_SECONDARY_SIG_COUNT | WSS_VERIFY_SPECIFIC;
    SignatureSettings.dwIndex = 0;
    WintrustData.pSignatureSettings = &SignatureSettings;

    if (UseStrongSigPolicy != false)
    {
        StrongSigPolicy.cbSize = sizeof(CERT_STRONG_SIGN_PARA);
        StrongSigPolicy.dwInfoChoice = CERT_STRONG_SIGN_OID_INFO_CHOICE;
        StrongSigPolicy.pszOID = szOID_CERT_STRONG_SIGN_OS_CURRENT;
        WintrustData.pSignatureSettings->pCryptoPolicy = &StrongSigPolicy;
    }
    BOOL bResult = E_NOT_SET;
    TRACE(L"Verifying primary signature... ");
    Error = WinVerifyTrust(NULL, &GenericActionId, &WintrustData);
    WintrustCalled = true;
    if (Error == ERROR_SUCCESS)
    {
        if (CheckCertificateIssuer(WintrustData.hWVTStateData, stValidIssuers))
        {
            if (bResult == E_NOT_SET)
                bResult = TRUE;
        }
        else
        {
            bResult = FALSE;
        }

        TRACE(L"Success!\n");

        TRACE(L"Found %d secondary signatures\n", WintrustData.pSignatureSettings->cSecondarySigs);

        // Now attempt to verify all secondary signatures that were found
        for (DWORD x = 1; x <= WintrustData.pSignatureSettings->cSecondarySigs; x++)
        {
            TRACE(L"Verify secondary signature at index %d... ", x);

            // Need to clear the previous state data from the last call to WinVerifyTrust
            WintrustData.dwStateAction = WTD_STATEACTION_CLOSE;
            Error = WinVerifyTrust(NULL, &GenericActionId, &WintrustData);
            if (Error != ERROR_SUCCESS)
            {
                //No need to call WinVerifyTrust again
                WintrustCalled = false;
                TRACE(L"%s", utils::error::getText(Error));
                ASSERT(FALSE);
                break;
            }

            WintrustData.hWVTStateData = NULL;

            // Caller must reset dwStateAction as it may have been changed during the last call
            WintrustData.dwStateAction = WTD_STATEACTION_VERIFY;
            WintrustData.pSignatureSettings->dwIndex = x;
            Error = WinVerifyTrust(NULL, &GenericActionId, &WintrustData);
            if (Error != ERROR_SUCCESS)
            {
                TRACE(L"%s", utils::error::getText(Error));
                ASSERT(FALSE);
                break;
            }

            if (CheckCertificateIssuer(WintrustData.hWVTStateData, stValidIssuers))
            {
                if (bResult == E_NOT_SET)
                    bResult = TRUE;
            }
            else
            {
                bResult = FALSE;
            }


            TRACE(L"Success!\n");
        }
    }
    else
    {
        TRACE(utils::error::getText(Error));
        ASSERT(FALSE);
    }

    //
    // Caller must call WinVerifyTrust with WTD_STATEACTION_CLOSE to free memory
    // allocate by WinVerifyTrust
    //
    if (WintrustCalled != false)
    {
        WintrustData.dwStateAction = WTD_STATEACTION_CLOSE;
        WinVerifyTrust(NULL, &GenericActionId, &WintrustData);
    }

    return bResult;

}

0

看一下

The signature is timestamped: Sat Feb 11 14:03:12 2012

并且

Issued to: Microsoft Time-Stamp Service

我认为第二个签名/证书用于时间戳文件。 微软可能有两个不同的组织单位,其中一个签署代码以确认其完整性,另一个(稍后)使用自己的证书再次签署代码,专门用于安全时间戳文件。

证书可以创建并分配给特定用途。 用于时间戳的证书可以标记为这样,因此signtool遇到时间戳证书时可能会出现错误,因为默认情况下它期望用于代码真实性/完整性验证而不是用于时间戳的证书。


不,数字签名选项卡中的第二个证书不仅仅是时间戳。每个签名(总共两个)都有6个与之关联的证书:3个用于为签名创建路径,另外3个用于时间戳,正如signtool的输出所示。我确实同意可以使用两个或更多的签名(问题是如何读取它们?),但时间戳签名必须在签名时应用,时间戳证书的整个目的就是确保签名的时间。 - Dima
不太确定您的观点是什么。我们似乎都明白有两个签名,其中一个用于验证二进制文件的作者身份(“颁发给:Microsoft代码签名PCA”),另一个用于建立可信时间戳(“颁发给:Microsoft时间戳服务”)。这两个签名具有不同的目的,并且可能由MS组织内的不同实体创建。当然,每个签名都带有时间戳,但由时间戳授权机构颁发的可信时间戳与“普通”签名具有不同的含义,请参见维基百科链接。 - JimmyB
在屏幕截图的第二个选项卡中,有两个签名,一个是sha1,另一个是sha256。Signtool和我的代码只能读取其中一个,即sha1。这个签名(sha1)与6个证书相关联,在signtool输出中显示。我可以查看与sha256关联的另外6个证书,通过文件属性对话框(如果您使用详细信息按钮进行深入钻取),但signtool和我的代码都无法显示它们。换句话说:如果将时间戳签名(计数签名)视为单独的签名,则此DLL具有4个签名。但是,signtool只能显示2个。 - Dima

0

最新版本的SignTool.exe可以处理多个签名。

一种方法是使用/ds开关。这让您选择签名索引。

更好的方法是,这里有一个很棒的C#示例,它将读取并验证多个签名。 对可执行文件进行两次代码签名


网页内容由stack overflow 提供, 点击上面的
可以查看英文原文,
原文链接