CRL and OCSP behavior of iOS / Security.Framework? -
i'm trying figure out ios' policy when verifying certificates using security.framework regarding revocation of certificates. cannot find information in docs ios. in context of ipad project i'm working on @ moment, there reason demand checking revocation status certs. ideas on how force crl / ocsp checking during cert verification using security.framework? or need "fall back" openssl accomplish this?
it seems on mac os x 10.6 crl / ocsp checks done optionally , have turned on manually through keychain access.
martijn
i have answer question apple guys, posted full answer here:
details on ssl/tls certificate revocation mechanisms on ios
to sum up, there several things keep in mind ocsp implementation on ios:
- ocsp policy cannot configured @ moment
- it works ev certificates only
- high-level stuff, such nsurlconnection or uiwebview use tls security policy, uses ocsp
- sectrustevaluate blocking network operation
- it works "best attempt" - if ocsp server cannot contacted, trust evaluation not fail
Comments
Post a Comment