Re: [DOTNET] Howto secure class libraries

2002-04-22 Thread Brian G. Vallelunga
Thanks for the information, this looks interesting... >>It's hackable via the Reflection libraries. See [1] for an example of this. To prevent callers from being able to modify your privates, you need to add the following: [assembly: ReflectionPermission(SecurityAction.RequestRefuse, Flags = R

Re: [DOTNET] Howto secure class libraries

2002-04-22 Thread Jason Bock
On Mon, 22 Apr 2002 15:11:07 -0400, Brian G. Vallelunga <[EMAIL PROTECTED]> wrote: >Curious say that each method checked a class-wide global variable to >see if it could run. Now, this global variable would be set to true, if >the user had successfully authenticated himself. > >Even with ILDa

Re: [DOTNET] Howto secure class libraries

2002-04-22 Thread Sievert, James A
> Curious say that each method checked a class-wide global > variable to see if it could run. Now, this global variable > would be set to true, if the user had successfully > authenticated himself. > > Even with ILDasm, there wouldn't be anyway to change the > value of the variable at all, as

Re: [DOTNET] Howto secure class libraries

2002-04-22 Thread Marsh, Drew
I wrote: > Mark your assemblies with the > StrongNameIdentityPermissionAttribute using > SecurityAction.LinkDemand and your public key. Ooops! SecurityAction.LinkDemand is at the method level. Use SecurityAction.RequestMinimum instead if you're going to mark the whole assembly with the attribute

Re: [DOTNET] Howto secure class libraries

2002-04-22 Thread Brian G. Vallelunga
Joe Reich [mailto:[EMAIL PROTECTED]] Sent: Monday, April 22, 2002 3:05 PM To: [EMAIL PROTECTED] Subject: Re: [DOTNET] Howto secure class libraries That's why I said keep honest people honest. I maintain that 99% of users don't even bother, and 90% of that last 01% will give up when they see

Re: [DOTNET] Howto secure class libraries

2002-04-22 Thread Joe Reich
hing else...so nevermind. > -Original Message- > From: Jason Bock [mailto:[EMAIL PROTECTED]] > Sent: Monday, April 22, 2002 2:36 PM > To: [EMAIL PROTECTED] > Subject: Re: [DOTNET] Howto secure class libraries > > >On Mon, 22 Apr 2002 14:26:15 -0400, Joe Reich > &g

Re: [DOTNET] Howto secure class libraries

2002-04-22 Thread Marsh, Drew
Peter Meinl [mailto:[EMAIL PROTECTED]] wrote: > We want to ensure that our DLLs on client PCs can only be > called by our EXE. Mark your assemblies with the StrongNameIdentityPermissionAttribute using SecurityAction.LinkDemand and your public key. Then just sign your EXE(s) with the same key. As

Re: [DOTNET] Howto secure class libraries

2002-04-22 Thread Sullivan, Dan
Check out the StrongNameIdentityPermission sample at http://www.develop.com/devresources/default.aspx Dan -Original Message- From: Peter Meinl [mailto:[EMAIL PROTECTED]] Sent: Monday, April 22, 2002 2:21 PM To: [EMAIL PROTECTED] Subject: [DOTNET] Howto secure class libraries We want

Re: [DOTNET] Howto secure class libraries

2002-04-22 Thread Jason Bock
On Mon, 22 Apr 2002 14:26:15 -0400, Joe Reich <[EMAIL PROTECTED]> wrote: >Create each class with a password as part of the constructor? > >Really you're only trying to keep the honest people honest here right? >How super effective does this have to be..? That's too easy to break via ILDasm (assu

Re: [DOTNET] Howto secure class libraries

2002-04-22 Thread Joe Reich
, 2002 2:21 PM > To: [EMAIL PROTECTED] > Subject: [DOTNET] Howto secure class libraries > > > We want to ensure that our DLLs on client PCs > can only be called by our EXE. > > We must protect these DLLs because they access > WebServices (we plan to use certificate m

[DOTNET] Howto secure class libraries

2002-04-22 Thread Peter Meinl
We want to ensure that our DLLs on client PCs can only be called by our EXE. We must protect these DLLs because they access WebServices (we plan to use certificate mapping and create the certificate using X509Certificate.CreateFromSignedFile("MyDll.dll")) and an SQL Server (we hardcode uer/pwd or