Code signing #4337
Replies: 9 comments 17 replies
-
Avast...the spyware antivirus company https://antivirus-review.com/blog/avast-programs-spy-on-their-users Let us know if it helps once you get it implemented |
Beta Was this translation helpful? Give feedback.
-
You get what you pay for. I don't use the free version. I use Avast CloudCare- which utilizes their Business Premium endpoint. Very different product. Everything that is free is 'free' for a reason. |
Beta Was this translation helpful? Give feedback.
-
We have just renewed our certificate from comodosslstore.com, £175 for 3 years, We havent had any problems with norton only their new stupid data protector tool which blocks meshcentral from accessing the registry (grrr) but thankfully doesnt stop its functioning as it still works 100% I also don't codesign with meshcentral as Norton still detects it as a virus |
Beta Was this translation helpful? Give feedback.
-
That's similar to what I paid for my Sectigo cert (which is also Comodo from what I understand). $180 US for 3 years for the OV cert. |
Beta Was this translation helpful? Give feedback.
-
That is very, very odd. I wonder if Ylian can comment on why it may be doing that? I don't know a lot about code signing (actually I know very little as this is my first go at it). I am more familiar with SSL certificates in general though. I wonder if the difference is with the SHA level? Like maybe authenticode-js is using a lower version of SHA (like SHA256) whereas EZSignit is using SHA384? That's really the only thing I could think of which might be different? |
Beta Was this translation helpful? Give feedback.
-
I am really not sure why there would be a difference between Authenticode-JS and CodeSign. Authenticode-JS makes use of SHA2-386 by default. In general with MeshCentral I try to use one higher than the industry accepted cryptography. There are on discussion on that being a good way to go in case there is a quantum computer that can start eating at the low end crypto, the larger keys will buy some time to switch. Anyway, back to code signing... What Bryan and I found when testing code signing of the agent with anti-virus is that it's super important to also change the metadata of the agent. This is the strings you see when you right-click, select "properties" on the agent in Windows and go to the detail tab. If you sign and change the Metadata, you have a agent that is a lot more individualized and less likely to trigger an anti-virus. This is why it's been high priority to edit that in Authenticode-JS. Changing these strings are equal or more complicate that code signing, it's really a huge pain, but you can add the following in the "domains" section of the config.json:
In some cases, only changing this may fix the anti-virus issue, no need for a trusted cert. This said, I always worry that changing these strings would generate an invalid executable, so I have not turned this on by default. It does seem to work, but I would recommend to check that the "meshcentral-data/signedagents" can be run before deploying the agent. In any case, changing the metadata and signing with a trusted cert is certainly the best. If using a trusted code signing cert, you should also add this line in the "settings" section of the config.json:
(or watch this video if using your own signing tool). This will make it so your signed agent can't be used to connect to any other server and so, protects the reputation of your code signing cert. Lastly, you can use a different signing tool and that is fine, you can still use Authenticode-JS to change the file metadata, test that the executable runs and then sign it using the other tool. Sometime in the future, I will improve Authenticode-JS to also change the executable icon. That will make is more on brand and help individualize the agent some more. |
Beta Was this translation helpful? Give feedback.
-
So I wanted to post an update. For about 2 weeks this signed agent was working well in Avast. Avast was happy with it and not flagging it. Until today. Today I started getting alerts that meshagent.exe was being detected on various devices as a Win64:Malware-gen infection and it was being removed once again. |
Beta Was this translation helpful? Give feedback.
-
Hello all, Seems to me (IMHO) that concerning avast we should be reporting the Agent as a false positive - probably already done though. They should fix it themselves. Otherwise drop Avast and go Avira ? just MHO here. I would also like to add that I am willing to be a tester for any changes if need be. |
Beta Was this translation helpful? Give feedback.
-
Shockingly, I was able to get Avast to remove my signed agent from the definition database. So now it's not being seen as a virus. But I'm sure it won't last as, every time I've got them to do this in the past, it ends up showing back up as an infection a few months or so later. Hopefully, now that it's signed and branded, maybe that won't happen. |
Beta Was this translation helpful? Give feedback.
-
Has anyone here purchased a code signing certificate and have signed your agents with it? I started the process of buying a certificate today and will be getting my agents signed with it once it is verified and active.
I'm REALLY hoping it will help to prevent antivirus vendors (namely Avast) from seeing it as malware and removing it from my devices.
Avast released an update today that contains a bug that I had alerted them about a month or so ago. That bug means the policies I have in place to prevent Avast from acting on meshagent.exe and the service no longer are honored. So now almost all of my devices are dropping out of MeshCentral (which is a HUGE issue).
Just wondering if anyone else has signed their agents with a verified cert and if helped, at all, with antivirus vendors flagging it?
Beta Was this translation helpful? Give feedback.
All reactions