-
Notifications
You must be signed in to change notification settings - Fork 120
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CA mode does not work with iOS #14
Comments
FWIW, this incompatibility, plus the fact that he prefers python to C++, seems to be the reason why Hubert wrote iSniff. In his 28C3 lightning talk about iSniff, at 2:17, he mentions what he thinks is the technical reason for the incompatibility. https://github.com/hubert3/iSniff |
Fix extracted from the above: certificate/AuthorityCertificateManager.cpp:
seems to work for us, no side effects yet. |
My guess is that the missing X509v3 extensions are the problem. |
Can you try this patch? If it works for you, I'll submit a pull request. |
Not in the Office today. Will try it tomorrow bye, ju Am 31.01.2012 um 19:20 schrieb Daniel Roethlisberger [email protected]:
|
D'oh, sslsniff has been generating version 4 certificates:
The version passed to X509_set_version() is zero-based, that is, an argument of 3 corresponds to X509v4. Not what we want. The fix: droe/sslsniff@1b64bc6 The full changeset which adds a standard set of v3 extensions including the server cert's subjectAltName: Feedback welcome. |
We have a test environment with sslsniff in CA mode, that works fine with Firefox on Linux/Windows.
When we try to use it with iOS we don't get a connection to the server. Safari simply complains that it cannot make a secure connection to the server. Targeted mode seems to work though.
I am willing to provide more details but I have not yet found a way to get any meaningfull output from Safari.
The text was updated successfully, but these errors were encountered: