Skip to main content

Notice: this Wiki will be going read only early in 2024 and edits will no longer be possible. Please see: https://gitlab.eclipse.org/eclipsefdn/helpdesk/-/wikis/Wiki-shutdown-plan for the plan.

Jump to: navigation, search

Difference between revisions of "JAR Signing"

 
(23 intermediate revisions by 6 users not shown)
Line 1: Line 1:
== Overview ==
+
#REDIRECT[[IT_Infrastructure_Doc#CBI_Maven_signing_plugin]]
We are working towards signing Eclipse builds.  The goal of signing is to allow users to verify that the content they obtain from eclipse.org and subsequently execute does indeed come from that source. Signing in a nutshell works as follows:
+
 
+
# Eclipse builds produce content in various forms (zips, update JARS)
+
# The Eclipse Foundation produces a signature of the build content using its private key (signature = private key + content)
+
# User downloads build content and signatures from eclipse.org or from mirrors
+
# The Eclipse Foundation makes available a [http://en.wikipedia.org/wiki/Public_key_infrastructure public key] for verifying signatures
+
# User consults some trusted authority to verify that the public key does indeed belong to the Eclipse Foundation
+
# Verification is performed on the user's machine (signature + public key = hash of content)
+
 
+
== Signing ==
+
 
+
=== What gets signed? ===
+
 
+
By default, every JAR pushed to an update site will be signed.  This includes JARs nested at arbitrary depth within other JARs. Some JARs may be excluded if there are technical or legal reasons why they cannot be signed.  In standalone zip distribtions, all JARed plugins will be signed, and un-JARed plugins will not be signed.
+
 
+
=== How is signing done? ===
+
 
+
Signing is performed using the JDK's [http://java.sun.com/j2se/1.5.0/docs/tooldocs/solaris/jarsigner.html jarsigner]. This tool signs JARs by producing a separate signature for every file in the JAR.  The signatures are put in the MANIFEST.MF file and in a separate signature file in the META-INF directory.  For optimization purposes, the signature of the MANIFEST.MF with all embedded signatures is also computed and placed in the signature file.
+
 
+
=== Where is signing done? ===
+
 
+
A critical part of the security behind signing is that the private keys used to produce the signatures are held in a secure location and never transmitted or accessible via a network. To accomplish this, the signing must be done on a secure machine that has access to the private key.  The Eclipse Foundation has set up a machine with a signing script.  The build will upload content to be signed to this machine, and a script is run to perform the signing.  Access to this machine will be given to trusted parties that want to perform signing.
+
 
+
=== When is signing done? ===
+
 
+
Signing can either be done manually or as part of an automated build process.  The Eclipse project build scripts created signed builds using the following steps:
+
 
+
# Checkout source from eclipse.org CVS repositories to build machine
+
# Run build and produce a single ZIP of all plugins in update site form (all plugins in JARs)
+
# Send build output to eclipse.org for signing
+
# Send signed build to update site
+
# Copy zip of signed JARs back to the build machine, and package standalone zips
+
# Copy standalone zips to test machines for automated testing
+
 
+
Currently the Eclipse project build machine is located remote from the Eclipse Foundation servers.  This means the Eclipse source has to be transferred across the Internet, and the build output needs to be transferred back to Foundation machines for signing.  These two major network bottlenecks could be removed by also using Eclipse Foundation machines for building.
+
 
+
=== What public key (certificate) do we use? ===
+
 
+
The Eclipse Foundation [https://bugs.eclipse.org/bugs/show_bug.cgi?id=130943 has purchased] a signing certificate from Verisign.  Content made available on Eclipse.org will be signed with the foundation certificate.  Note this doesn't preclude other parties from later signing the JARs with their own certificates.
+
 
+
=== Where are the signatures stored? ===
+
 
+
The signatures are stored in the JAR file, both in the MANIFEST.MF, and in a separate signature file (currently Eclipse_.sf).
+
 
+
== Verification ==
+
 
+
=== When does verification happen? ===
+
 
+
Verification can happen any time.  The common times to perform verification are:
+
* During update.  Minimally, verification happens at the time the client obtains the signed content.  The Eclipse update mechanism will perform verification of any update JARs that are signed, and will prompt the user for confirmation if the certificate used for signing is not trusted. 
+
* At load-time.  It is sometimes desirable to perform verification at load time when classes are loaded from a JAR.  The default Java class loader performs this verification automatically for any signed JAR on the classpath.  The Eclipse class loader can also be configured to perform load-time verification, but it is optional.
+
* Manual user verification.  The Eclipse about dialog will be augmented to show what plugins are signed.  From this dialog the user should be able to manually perform verification of signed content if desired.
+
 
+
== Miscellaneous links ==
+
 
+
=== Eclipse Bugzilla reports ===
+
 
+
{|
+
|-
+
! Done || Description
+
|-
+
|
+
| [https://bugs.eclipse.org/bugs/show_bug.cgi?id=43889 OSGi Bundle signing bug report]
+
|-
+
|
+
| [https://bugs.eclipse.org/bugs/show_bug.cgi?id=78208 Runtime signing support]
+
|-
+
|
+
| [https://bugs.eclipse.org/bugs/show_bug.cgi?id=94461 Signing indicator in About dialog]
+
|-
+
| [[Image:check.gif]]
+
| [https://bugs.eclipse.org/bugs/show_bug.cgi?id=130943 Purchasing signing certificates]
+
|-
+
| [[Image:check.gif]]
+
| [https://bugs.eclipse.org/bugs/show_bug.cgi?id=132046 Signing script to signal completion]
+
|-
+
| [[Image:check.gif]]
+
| [https://bugs.eclipse.org/bugs/show_bug.cgi?id=132048 Starting signing immediately after signing script is called]
+
|-
+
| [[Image:check.gif]]
+
| [https://bugs.eclipse.org/bugs/show_bug.cgi?id=134264 Bug for installing Java 1.5 on signing server]
+
|-
+
|
+
| [https://bugs.eclipse.org/bugs/show_bug.cgi?id=135044 Bug for installing Improved signing/packing application on signing server]
+
|-
+
|
+
| [https://bugs.eclipse.org/bugs/show_bug.cgi?id=130383 Bug for using OSGi verification during update]
+
|}
+
 
+
=== Other signing links ===
+
 
+
* [https://www.verisign.com/products-services/security-services/code-signing/digital-ids-code-signing/index.html Verisign code signing products]
+
* [http://java.sun.com/j2se/1.5.0/docs/guide/security/time-of-signing.html Sun docs on timestamps in signatures]
+
* [http://opentsa.org/ Web site of open source time stamp protocol implementation]
+
* [http://www.digistamp.com/ Time stamping service]
+
 
+
[[Category:Equinox]]
+

Latest revision as of 04:10, 27 November 2020

Back to the top