-
Notifications
You must be signed in to change notification settings - Fork 41
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Codesigned Sublime Text Binaries #6581
Comments
According to https://forum.sublimetext.com/t/build-4189-has-bad-signature/74876/6, if signatures were missing, they have been fixed in the meanwhile. |
@deathaxe That was only the Linux packages, and it wasn't that the signature was missing but that it was invalid. |
This issue is about Windows, isn't it? OPs |
Yea, so the fix for the issue on the forum doesn't apply because that was purely related to Linux. Nothing was changed regarding the Windows binaries. Still unclear what's going on here, so I think it's best to keep it open for now. |
Problem description
The current Sublime binaries are not codesigned.
This is causing issues with Windows Information Protection policies as every binary is now accepted on hash base.
Every update to this binary causes the hash to change and a new policy to have to be created in order to access information protected content.
Preferred solution
All Sublime Text binaries signed with a code signing key from Sublime HQ so that the policy can be written on the 'publisher' instead of the hash.
Alternatives
The alternative would be to keep using the hashes.
Additional Information
An example of the sublime_text binary for this purpose:
PS C:\Program Files\Sublime Text> Get-AppLockerFileInformation .\sublime_text.exe | fl
Path : %PROGRAMFILES%\SUBLIME TEXT\SUBLIME_TEXT.EXE
Publisher :
Hash : SHA256 0x6B6B53AEDCDEE13A19D33363FF9ED48A1549463647567C93E12F5260F7AA911F
AppX : False
The text was updated successfully, but these errors were encountered: