Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Look into code signing #322

Open
Pathoschild opened this issue Jul 8, 2017 · 3 comments
Open

Look into code signing #322

Pathoschild opened this issue Jul 8, 2017 · 3 comments
Assignees
Labels
enhancement This is a general improvement that can be addressed with specific development changes.

Comments

@Pathoschild
Copy link
Owner

Consider code-signing SMAPI releases to reduce antivirus false positives.

@Pathoschild Pathoschild added the enhancement This is a general improvement that can be addressed with specific development changes. label Jul 8, 2017
@Pathoschild Pathoschild added this to the 2.0 milestone Jul 8, 2017
@Pathoschild Pathoschild self-assigned this Jul 8, 2017
@Pathoschild
Copy link
Owner Author

Ideally SMAPI should use a code-signing certificate that Linux/Mac/Windows will recognise by default, and isn't too expensive. Some options:

@Pathoschild Pathoschild modified the milestones: 2.0, 2.1 Sep 25, 2017
@Pathoschild Pathoschild removed this from the 2.1 milestone Oct 22, 2017
@Pathoschild Pathoschild added this to the 2.6 milestone Mar 17, 2018
@Pathoschild
Copy link
Owner Author

I'll go with KSoftware. A quick review of the main candidates per discussion with @vaindil:

  • DigiCert is 'as low as' $178/year, which is pretty expensive. They allow unlimited reissues, but that's not necessary since I have careful backups.
  • Certum is only €28.00/year (plus one-time kit purchase), but it's tied to a physical device which I'd rather not manage.
  • KSoftware is $84/year, with discounts for longer terms. Pricier than Certum, but no physical device to manage. They have good reviews online.

Note that this only applies to Windows. Linux is generally opposed to code signing (see [1] [2] [3]). Mac has code signing, but it doesn't seem to have much relevance (and I'd need to figure out how to do it from Linux).

@Pathoschild
Copy link
Owner Author

Certificate ordered from KSoftware, pending verification from Comodo.

@Pathoschild Pathoschild modified the milestones: 2.6, 3.0 Jul 27, 2018
@Pathoschild Pathoschild removed this from the 3.0 milestone Apr 16, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement This is a general improvement that can be addressed with specific development changes.
Projects
None yet
Development

No branches or pull requests

1 participant