Spectra Assure
Community
Docs
passEverything is awesome!
Scanned: 15 days ago

System.Security.Cryptography.Xml

Provides classes to support the creation and validation of XML digital signatures. The classes in this namespace implement the World Wide Web Consortium Recommendation, "XML-Signature Syntax and Processing", described at http://www.w3.org/TR/xmldsig-core/. Commonly Used Types: System.Security.Cryptography.Xml.CipherData System.Security.Cryptography.Xml.CipherReference System.Security.Cryptography.Xml.DataObject System.Security.Cryptography.Xml.DataReference System.Security.Cryptography.Xml.DSAKeyValue System.Security.Cryptography.Xml.EncryptedData System.Security.Cryptography.Xml.EncryptedKey System.Security.Cryptography.Xml.EncryptedReference System.Security.Cryptography.Xml.EncryptedType System.Security.Cryptography.Xml.EncryptedXml System.Security.Cryptography.Xml.EncryptionMethod System.Security.Cryptography.Xml.EncryptionProperty System.Security.Cryptography.Xml.EncryptionPropertyCollection System.Security.Cryptography.Xml.KeyInfo System.Security.Cryptography.Xml.KeyInfoClause System.Security.Cryptography.Xml.KeyInfoEncryptedKey System.Security.Cryptography.Xml.KeyInfoName System.Security.Cryptography.Xml.KeyInfoNode System.Security.Cryptography.Xml.KeyInfoRetrievalMethod System.Security.Cryptography.Xml.KeyInfoX509Data System.Security.Cryptography.Xml.KeyReference System.Security.Cryptography.Xml.Reference System.Security.Cryptography.Xml.ReferenceList System.Security.Cryptography.Xml.RSAKeyValue System.Security.Cryptography.Xml.Signature System.Security.Cryptography.Xml.SignedInfo System.Security.Cryptography.Xml.SignedXml System.Security.Cryptography.Xml.Transform System.Security.Cryptography.Xml.TransformChain System.Security.Cryptography.Xml.XmlDecryptionTransform System.Security.Cryptography.Xml.XmlDsigBase64Transform System.Security.Cryptography.Xml.XmlDsigC14NTransform System.Security.Cryptography.Xml.XmlDsigC14NWithCommentsTransform System.Security.Cryptography.Xml.XmlDsigEnvelopedSignatureTransform System.Security.Cryptography.Xml.XmlDsigExcC14NTransform System.Security.Cryptography.Xml.XmlDsigExcC14NWithCommentsTransform System.Security.Cryptography.Xml.XmlDsigXPathTransform System.Security.Cryptography.Xml.XmlDsigXsltTransform System.Security.Cryptography.Xml.XmlLicenseTransform
License: Permissive (MIT)
Published: 8 months ago


SAFE Assessment

Compliance

Licenses
No license compliance issues
Secrets
No sensitive information found

Security

Vulnerabilities
No known vulnerabilities detected
Hardening
No application hardening issues

Threats

Tampering
No evidence of software tampering
Malware
No evidence of malware inclusion
List of software quality issues with the number of affected components.
Policies
Info
Count
Category

Problem

Digital signatures are applied to applications, packages and documents as a cryptographically secured authenticity record. Signatures verify the origin and the integrity of the object they apply to. The integrity validation relies on the cryptographic strength of the encryption and the hash verification algorithm. If either of the two is considered weak by current standards, there is a chance the signed object could be maliciously modified, without triggering the integrity failure check.

Prevalence in NuGet community

0 packages
found in
Top 100
38 packages
found in
Top 1k
315 packages
found in
Top 10k
733240 packages
in community

Next steps

Create signatures with strong ECC key-length of at least 224 bits, or RSA key-length of at least 2048 bits, and use SHA256 as the hashing algorithm. While encryption key-length upgrade does require you to obtain a new certificate, the hashing algorithm can freely be selected during signing.
With Microsoft SignTool, you can specify the hashing algorithm using the /fd SHA256 parameter.

Problem

Digital signatures are applied to applications, packages and documents as a cryptographically secured authenticity record. Signatures are made using digital certificates, which can either be purchased from certificate authorities or be self-issued. When a certificate is purchased from a certificate authority, the subject that requests it goes through an identity validation process. Depending on the certificate type, those checks can be basic or extended. Confirming the subject identity is a multi-step process, and the requesting subject can be mapped to its legal entity name only through extended validation of submitted documents. Extended identity validation typically costs more, and it takes longer for a certificate to be issued when this process is correctly followed.

Prevalence in NuGet community

0 packages
found in
Top 100
27 packages
found in
Top 1k
292 packages
found in
Top 10k
732229 packages
in community

Next steps

Consider the benefits of acquiring extended validation certificates. Operating systems tend to be more trusting of software packages signed in this way. Certain security warnings and prompts might also be automatically suppressed. This reduces the number of support tickets for organizations that opt to use extended validation certificates.

This website uses cookies to ensure the best website experience. By continuing to use this website you are giving your consent to cookies being used. Detailed information about our use of cookies is here.