CRL and OCSP behavior of iOS / Security.Framework? -


i'm trying figure out ios' policy when verifying certificates using security.framework regarding revocation of certificates. cannot find information in docs ios. in context of ipad project i'm working on @ moment, there reason demand checking revocation status certs. ideas on how force crl / ocsp checking during cert verification using security.framework? or need "fall back" openssl accomplish this?

it seems on mac os x 10.6 crl / ocsp checks done optionally , have turned on manually through keychain access.

martijn

i have answer question apple guys, posted full answer here:

details on ssl/tls certificate revocation mechanisms on ios

to sum up, there several things keep in mind ocsp implementation on ios:

  • ocsp policy cannot configured @ moment
  • it works ev certificates only
  • high-level stuff, such nsurlconnection or uiwebview use tls security policy, uses ocsp
  • sectrustevaluate blocking network operation
  • it works "best attempt" - if ocsp server cannot contacted, trust evaluation not fail

Comments

Popular posts from this blog

php - What is the difference between $_SERVER['PATH_INFO'] and $_SERVER['ORIG_PATH_INFO']? -

fortran - Function return type mismatch -

queue - mq_receive: message too long -