S
Softwaremaker
Dear Fellows,
i have been playing around with strong-naming my assemblies for the past
couple of days and I must say I found out something that is rather
disturbing.
Here are my questions :-
1) I want my assemblies to be called and referenced by my client apps only.
What is the proper way to do it ?
2) After I signed off my assembly with a strong name...I actually can
reverse-engineer the IL code out from the assembly with ILDASM, then what i
did was changed some IL code within the assembly and then take out the
public key token from the IL File
.publickey = (00 24 00 00 04 80 00 00 94 00 00 00 06 02 00 ....) // Delete
this value
Once i do that, i re-assemble it with ILASM Command and then deploy it. The
calling client app can then reference the tampered-with assembly as if
nothing has happened. Of couse, if i do not delete the .publickey string
value as shown above, an exception will occur during loading...
So, what is the proper way to tamper-proof the assembly ? Or this is by
design and the only way is to obfuscate the code ?
Any advice is appreciated. Thank you.
--
Thank you very much
Warmest Regards,
Softwaremaker (WilliamT)
Software Architect
+++++++++++++++++++
i have been playing around with strong-naming my assemblies for the past
couple of days and I must say I found out something that is rather
disturbing.
Here are my questions :-
1) I want my assemblies to be called and referenced by my client apps only.
What is the proper way to do it ?
2) After I signed off my assembly with a strong name...I actually can
reverse-engineer the IL code out from the assembly with ILDASM, then what i
did was changed some IL code within the assembly and then take out the
public key token from the IL File
.publickey = (00 24 00 00 04 80 00 00 94 00 00 00 06 02 00 ....) // Delete
this value
Once i do that, i re-assemble it with ILASM Command and then deploy it. The
calling client app can then reference the tampered-with assembly as if
nothing has happened. Of couse, if i do not delete the .publickey string
value as shown above, an exception will occur during loading...
So, what is the proper way to tamper-proof the assembly ? Or this is by
design and the only way is to obfuscate the code ?
Any advice is appreciated. Thank you.
--
Thank you very much
Warmest Regards,
Softwaremaker (WilliamT)
Software Architect
+++++++++++++++++++