WSUSUpdateAdmin there is another thing to be aware of. Infrarecorder before they got a company to pay for signing certificate to have one users did not have to modify system to use they were using self signing. Its just the simple reality if you cannot run a self signing system there is no point investing in a commerical certificate. If you lose the private key off a commerical certificate it gets invalidated and you have to pay again.
This is why I am so annoyed with you with the point of view of wait until someone pays for a certificate. No one in there right mind will pay for a digital signature for a project until project shows it can manage digital signature securely.
http://sourceforge.net/projects/osslsigncode/ I forgot to mention the signing when setup does not require a windows computer.
WSUSUpdateAdmin the other problem here. I will only sign files I have built myself and audited myself. This is the problem. If you wish for me to sign I will have to find the time to take over maintainership of the project or made a complete sub branch. This seams like over kill when a little education and getting processes in place to sign new files and create validation solutions can solve the problem.
Becides there are a nice list issues that have to be addressed before I could even consider signing wsusupdate.
You cannot directly sign cmd or vbs scripts those require using catlogs or something to reduce particular areas into a exe.
http://bat2exe.net/ and
http://sourceforge.net/projects/htwoo/ might work but I don't have a windows machine to see if the likes of the client directory still works when turned into a single exe file. This is also a question for end users. Do they want a wrapper program that validates the vbs,cmd,txt..... or do they want compacted to exe.
Required stages.
1) Getting maintainer of project able to manage signing keys at least self signed. Even if it possible means changing maintainer.
2) Patches to trully make the system validate and be secure. Validating does not only prevent man in middle. You make a iso a few sectors die you also want the system to stop not do random commands. This is altering the client/update.cmd to update.exe and other alterations to au3 to validate items. These patches really cannot be done without certificates to validate against.
3) Final stage ask for money to use a simpler for end user with a commerical certificate. Because by this point the project can demostrate its secure and will put the certificate to good use.
Preventing tampering and damage takes time and careful planning. WSUSUpdateAdmin currently anyone can alter your archive to be hostile without leaving behind clear evidence. Of course I am not wishing to prevent users from customising and building own versions. Supporting self signed I put so high because just like you a lot of people will not be able to afford commerical certificates who wish to modify.
Unsigned is what I have the big issue with. Self signed should be min standard these days. If at some point a person wanted todo .deb or rpm packages for Linux they would be required to maintain signing certificates anyhow. Windows developers producing binaries have got off light.
wsusoffline is not some program that will run in a limtied user account that cannot do major system damage. Its the exact other way over. wsusoffline damaged could really do some serous harm to a system. wsusoffline lacks validation on its own files so is more able to malfunction. MITM issue is only the tip of a iceberg basically, The MITM only exists because validation solutions are not in place. Vaildation solutions prevent a more broad range of issues.
Yes it one thing to say you are not responsable for the damage. Is another thing to show the due care to make odds of damage as low as possible.