You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
Sander van Grieken acde8cd0b7 add apt --allow-downgrades in more places. 2 years ago
..
gpg_keys build-wine: don't use gpg keyservers 6 years ago
Dockerfile add apt --allow-downgrades in more places. 2 years ago
README.md win build: add instructions to investigate reproducibility failure 3 years ago
README_windows.md README: add Windows- & macOS-specific "how to run from source" readmes 3 years ago
apt.preferences wine build: build win-iconv-mingw-w64-dev, instead of using debian sid 2 years ago
apt.sources.list rerun freeze_container_distro.sh and update docker base images for debian buster and bullseye 2 years ago
build-electrum-git.sh use debian makensis instead of windows makensis executable through wine (#8057) 2 years ago
build.sh win build: clear $CONTRIB_WINE/dist between builds 2 years ago
deterministic.spec build win/mac: do not pass custom args to pyinstaller; use envvars 2 years ago
electrum.nsi use debian makensis instead of windows makensis executable through wine (#8057) 2 years ago
make_win.sh CI: cache more in Windows build 2 years ago
prepare-wine.sh binaries: update python and openssl 2 years ago
sign.sh contrib: reformat most shell scripts 2 years ago
unsign.sh contrib: reformat most shell scripts 2 years ago

README.md

Windows binaries

These binaries should be reproducible, meaning you should be able to generate binaries that match the official releases.

This assumes an Ubuntu (x86_64) host, but it should not be too hard to adapt to another similar system.

  1. Install Docker

    See contrib/docker_notes.md.

    Note: older versions of Docker might not work well (see #6971). If having problems, try to upgrade to at least docker 20.10.

  2. Build Windows binaries

    $ ./build.sh
    

    If you want reproducibility, try instead e.g.:

    $ ELECBUILD_COMMIT=HEAD ELECBUILD_NOCACHE=1 ./build.sh
    
  3. The generated binaries are in ./contrib/build-wine/dist.

Code Signing

Electrum Windows builds are signed with a Microsoft Authenticode™ code signing certificate in addition to the GPG-based signatures.

The advantage of using Authenticode is that Electrum users won't receive a Windows SmartScreen warning when starting it.

The release signing procedure involves a signer (the holder of the certificate/key) and one or multiple trusted verifiers:

Signer Verifier
Build .exe files using make_win.sh
Sign .exe with ./sign.sh
Upload signed files to download server
Build .exe files using make_win.sh
Compare files using unsign.sh
Sign .exe file using gpg -b
Signer and verifiers:
Upload signatures to 'electrum-signatures' repo, as $version/$filename.$builder.asc

Verify Integrity of signed binary

Every user can verify that the official binary was created from the source code in this repository. To do so, the Authenticode signature needs to be stripped since the signature is not reproducible.

This procedure removes the differences between the signed and unsigned binary:

  1. Remove the signature from the signed binary using osslsigncode or signtool.
  2. Set the COFF image checksum for the signed binary to 0x0. This is necessary because pyinstaller doesn't generate a checksum.
  3. Append null bytes to the unsigned binary until the byte count is a multiple of 8.

The script unsign.sh performs these steps.

FAQ

How to investigate diff between binaries if reproducibility fails?

pyi-archive_viewer is needed, for that run $ pip install pyinstaller. As a first pass overview, run:

pyi-archive_viewer -l electrum-*.exe1 > f1
pyi-archive_viewer -l electrum-*.exe2 > f2
diff f1 f2 > d
cat d

Then investigate manually:

$ pyi-archive_viewer electrum-*.exe1
? help