Using Fortanix Data Security Manager with Microsoft CNG Provider and SignTool

Introduction

Fortanix Data Security Manager (DSM) has state-of-the-art code signing solution that offers the following capabilities:

  1. FIPS 140-2 level 3 assurance for private key protection.
  2. Supports all types of asymmetric keys, signing, and hashing algorithms used for code signing. It also supports signing just the hash.
  3. Code signing in large enterprises often requires verification of metadata associated with the data being signed as well as access control around the use of keys. These checks can easily be performed in a secure environment using plugins in Fortanix DSM.
  4. Code signing keys are very sensitive, and their use should be tightly controlled. Fortanix DSM provides elaborate quorum-based policies to be configured for these keys which require approval from M of N administrators before the signing operation is performed. These approvals can be obtained in an asynchronous and distributed fashion.
  5. Strict role-based-access-control, quorum-based approval workflows, automation, and audit logs for all code signing operations.
  6. Support of 100% for REST APIs, KMIP, PKCS11, JCE, Microsoft CAPI, and CNG for easy integration with your existing DevOps tooling.
  7. Code signing is future proof in Fortanix DSM. Post-quantum algorithms, such as LMS, are already supported and can be used for code signing. 1.1.png
                                                                     Figure 1: Code signing solution

Microsoft’s SignTool is a prominent tool used in a Microsoft environment to sign and verify the authenticity of code developed for the Microsoft platforms. Fortanix KMS CNG Provider makes it easy to securely store sensitive objects/keys required during the sign and verify processes, a native feature provided by Fortanix DSM for enterprise-level code-signing capabilities.

Preparing the Build Server/Code-Signing Workstation

The Server/Workstation that will be running the SignTool must have the following installed:

Fortanix Data Security Manager Configuration

Fortanix DSM will require appropriate groups and apps to be pre-created before Microsoft CNG and SignTool code-signing integration may begin.

  1. Create an appropriate group that will be managing the security objects within the account: 3.1.png
                                                                     Figure 3: Create group
     
  2. Create a new App in Fortanix DSM that will provide an API Key that will be used to authenticate when communicating using CNG provider (take note of the API Key):
    4.1.png
                                             Figure 4: Create app and copy API key
     
  3. On the Build Server/Code-Signing Workstation, Fortanix KMS CNG Provider requires a couple of configuration variables, which will be stored in the registry:
    • Fortanix DSM Endpoint
    • Fortanix DSM API Key
    The following two commands will store the correct values in the registry (you may also choose a user to store the entries in your user registry instead of HKLM): 5.1.png
                                             Figure 5: Configuration Variables
     
  4. Check if these values are correctly set in the registry:
    6.1.png
                                                                     Figure 6: Check the registry
     
  5. Confirm Fortanix KMS CNG Provider can communicate properly with Fortanix DSM:
    7.1.png
                                                           Figure 7: Confirm the communication

Generate or Import the Private Key and Certificate

Securing the Private Keys and Certificates are the most critical tasks to ensure codes cannot be maliciously signed by offending parties. Fortanix supports two main methods in generating/importing and securing the appropriate Security Objects:

  • Generate the Private Key using Fortanix DSM UI, create a Certificate Sign Request from SignTool, and then import the Certificate into Fortanix DSM once signed by a trusted Certificate Authority.
  • Generate a Self-Signed Certificate by automatically creating the Private Key in Fortanix DSM through PowerShell. Then import the Certificate securely into Fortanix DSM.

Method 1 - Generate Private Key on Fortanix Data Security Manager / Generate CSR Using Certreq.exe

This method will generate the Private Key and Certificate sign request from Fortanix DSM and certreq.exe. Upon receiving a signed certificate from the trusted Certificate Authority, the certificate can then be imported into Fortanix DSM.

  1. Create a new security object that will be the Private Key and assign it to the appropriate group (in this example, we will call the security object - wincryptoapp): 8.1.png
                                                  Figure 8: Create new security object
     
  2. You can also generate the key using PowerShell: CNG_26.png
                                                  Figure 9: Create new security object
    Once the PowerShell command runs, you will notice that the key has been created in the Fortanix DSM UI:
    CNG_21.png
                                                         Figure 10: Key created
     
  3. Generate the Certificate Sign Request using the private key using the SignTool:
    1. Create a new file called inf in a temporary directory.
    2. Replace the following content into the file:
      1. KeyContainer: Name of the security object created previously/Private Key.
      2. ProviderName: Based on the provider name when installing the Fortanix CNG Provider.
          9.1.png
                                                      Figure 11: Generate key using PowerShell
         
    3. Type the following command to generate the Certificate Sign Request: 10.1.png
                                                  
    4. This will command will now generate a request.csr Certificate Sign Request file and should be sent to the trusted Certificate Authority to receive a signed Certificate.
       
  4. Once the signed Certificate is received, you can import the certificate into Fortanix DSM.
    11.1.png
                                                  Figure 12: Import signed certificate
     
  5. Keep a copy of the certificate on the server where the SignTool will be run from (the certificate can be exported from Fortanix DSM at any time).

Method 2 - Generate Self-Signed Certificate Locally Using PowerShell and Fortanix Data Security Manager

  1. Launch PowerShell and create a new key as well as a self-signed certificate.
    $cert = New-SelfSignedCertificate -Subject "NewIIS2" -type codesigningcert -provider "Fortanix KMS CNG Provider" -certstorelocation Cert:\LocalMachine\My
    Cd Cert:\LocalMachine\My
    Cert:\LocalMachine\My> Get-ChildItem | Format-Table Subject, FriendlyName, Thumbprint – autosize
    CNG_22a.png
                                                                     Figure 13: Create new key
     
  2. The Private Key should have been created within Fortanix DSM.
    CNG_23.png
                                                                 Figure 14: Key created
     
  3. Export the certificate and key into a file.CNG_24.png
                                                          Figure 15: Export certificate and key
     
    1. Import the certificate into Fortanix DSM:
      CNG_25.png
                                                       Figure 16: Import the certificate and key

Code-Signing Integration (Directly from Workstation)

  1. Verify no other signatures are present on the file that will be signed:
    12.1.png
                            Figure 17: Verify signature
  2. Open a command prompt. Locate the file SignTool that is appropriate for your code (for example: x64, x86, and so on).
    13.1.png
                                                  Figure 18: Locate SignTool
     
  3. Verify that the key you wish to use to sign the code is available in the remote CNG provider: Fortanix Data Security Manager.
    14.1.png
                                                  Figure 19: Verify the key
     
  4. The following command will sign the code specified in the SignTool and require the following parameters at a minimum to successfully run the SignTool:
    • CSP: The CNG provider you wish to use for the sign operation.
    • KC: Key Container (also known as an alias) that will be used for the sign operation.
    • File: Certificate generated from the Private Key stored in Fortanix DSM.
    • Code to sign. 15.1.png
                                                    Figure 20: Sign the code
      If using a certificate already stored in the certstore, you may also omit the CSP and KC parameters. CNG_27.png
                                                    Figure 21: Omit the CSP and KC
       
  5. Once the file has been signed, Fortanix DSM will log an event within the audit log to signify the private key was used to sign the code:
    16.1.png
                                                   Figure 22: Event log
      17.1.png
                                                  Figure 23: Signature details

Verify Signed Code

The signed Code can also be verified using SignTool.

If a self-signed certificate is used, then it must be installed on the Server / Workstation you wish to verify from as it will not have a trusted root CA chain in the certificate. The use of a self-signed certificate should only be used in a test environment. The procedure to test is as follows:

  1. If you do not have the certificate readily available, download the certificate from Fortanix DSM.
  2. Right-click the downloaded/existing certificate file and install the Certificate. Ensure it is imported into the Trusted Root Certification Authority (in this example certificate fyoo was used): 18.1.png
                                                             Figure 24: Self-signed certificate
     
  3. The following command will verify the code using SignTool and require the following parameters at a minimum to successfully run the SignTool:
    19.1.png
                                                  Figure 25: Verify the code and run SignTool

Frequently Asked Questions

  1. How do I validate the supported algorithms and modes using Fortanix KMS CNG Provider?
  • You can view all of the supported methods, algorithms, and modes with Fortanix DSM using the CNG provider by running a csptest: 20.1.png
                                                  Figure 26: Validate supported algorithms

Comments

Please sign in to leave a comment.

Was this article helpful?
0 out of 0 found this helpful