
- (SecCertificateRef)certRefFromDernamed:(Nsstring*)derfilename resultingDataRef:(CFDataRef*)dataRefPtr{ Nsstring *thePath = [[NSBundle mainBundle] pathForResource:derfilename ofType:@"der"]; NSData *certData = [[NSData alloc] initWithContentsOffile:thePath]; CFDataRef certDataRef = (__brIDge_retained CFDataRef)certData; SecCertificateRef cert = SecCertificateCreateWithData(NulL,certDataRef); *dataRefPtr = certDataRef; return cert;}- (voID)connection:(NSURLConnection *)connection willSendRequestForAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge {if (connection == self.connection) { BOol trusted = NO; if ([challenge.protectionSpace.authenticationMethod isEqualToString:NSURLAuthenticationMethodServerTrust]) { SecPolicyRef policyRef = SecPolicyCreateBasicX509(); SecCertificateRef cert1; CFDataRef certData1; cert1 = [self certRefFromDernamed:@"some3rdpartycacert" resultingDataRef:&certData1]; SecCertificateRef certArray[1] = { cert1 }; CFArrayRef certArrayRef = CFArrayCreate(NulL,(voID *)certArray,1,NulL); SecTrustRef serverTrust = challenge.protectionSpace.serverTrust; SecTrustSetAnchorCertificates(serverTrust,certArrayRef); SecTrustResultType trustResult; SecTrustEvaluate(serverTrust,&trustResult); trusted = (trustResult == kSecTrustResultUnspecifIEd); CFRelease(certArrayRef); CFRelease(policyRef); CFRelease(cert1); CFRelease(certData1); } if (trusted) { [challenge.sender useCredential:[NSURLCredential credentialForTrust:challenge.protectionSpace.serverTrust] forAuthenticationChallenge:challenge]; } else { [challenge.sender performDefaultHandlingForAuthenticationChallenge:challenge]; }}} 而且trustResult总是kSecTrustResultRecoverableTrustFailure.
证书本身有点问题.根据服务器上的curl cert主题名称与我正在连接的url不匹配.我已经联系了第三方公司,他们告诉我,我需要在我的代码中接受这个url不匹配.问题是我不知道如何在iOS上这样做.我可以完全绕过证书检查(通过简单地假设trusted = YES并调用useCredential)或完全失败.从安全角度来看,第一种解决方案显然是错误的,并且容易发生MITM攻击.
这是CURL输出(我在这里使用了相同证书的PEM版本):
ukaszs-iMac:Preferences lukasz$ curl --verbose --cacert ~/Desktop/some3rdpartycacert.txt https://dev-service.some3rdparty.com:50101/* About to connect() to dev-service.some3rdparty.com port 50101 (#0)* Trying XXX.XXX.XXX.XXX...* connected* Connected to dev-service.some3rdparty.com (XXX.XXX.XXX.XXX) port 50101 (#0)* successfully set certificate verify locations:* CAfile: /Users/lukasz/Desktop/some3rdpartycacert.txt CApath: none* SSLv3,TLS handshake,ClIEnt hello (1):* SSLv3,Server hello (2):* SSLv3,CERT (11):* SSLv3,Request CERT (13):* SSLv3,Server finished (14):* SSLv3,ClIEnt key exchange (16):* SSLv3,TLS change cipher,Finished (20):* SSLv3,Finished (20):* SSL connection using AES256-SHA* Server certificate:* subject: C=CA; ST=Ontario; O=Some 3rdParty Corporation; CN=otherpage.some3rdparty.com; emailAddress=noc@some3rdparty.com* start date: 2013-10-30 16:52:14 GMT* expire date: 2013-10-30 16:52:14 GMT* SSL: certificate subject name 'otherpage.some3rdparty.com' does not match target host name 'dev-service.some3rdparty.com'* Closing connection #0* SSLv3,TLS alert,ClIEnt hello (1):curl: (51) SSL: certificate subject name 'otherpage.some3rdparty.com' does not match target host name 'dev-service.some3rdparty.com'
那么,如何忽略iOS上的这个特殊错误?
解决方法 您需要使用实际主机名创建特殊策略,然后从中创建和评估serverTrust.大致:SecPolicyRef policyRef = SecPolicyCreateSSL(true,CFSTR("otherpage.some3rdparty.com"));Osstatus status;SecTrustRef serverTrust;status = SecTrustCreateWithCertificates(certificatesFromOriginalServerTrust,policyRef,& serverTrust);// noErr == status?status = SecTrustSetAnchorCertificates(serverTrust,certArrayRef);// noErr == status?SecTrustResultType trustResult;status = SecTrustEvaluate(serverTrust,&trustResult);// noErr == status?if(kSecTrustResultProceed == trustResult || kSecTrustResultUnspecifIEd == trustResult) { // all good} 附:您没有使用您创建的政策.
我刚刚找到了一个更完整的解释here.
总结以上是内存溢出为你收集整理的ios – 对于具有不匹配主题名称的自签名CA,使用kSecTrustResultRecoverableTrustFailure时,SecTrustEvaluate失败全部内容,希望文章能够帮你解决ios – 对于具有不匹配主题名称的自签名CA,使用kSecTrustResultRecoverableTrustFailure时,SecTrustEvaluate失败所遇到的程序开发问题。
如果觉得内存溢出网站内容还不错,欢迎将内存溢出网站推荐给程序员好友。
欢迎分享,转载请注明来源:内存溢出
微信扫一扫
支付宝扫一扫
评论列表(0条)