美文网首页网络https双向认证
iOS客户端https连接双向认证

iOS客户端https连接双向认证

作者: ZLEIi | 来源:发表于2017-03-24 13:07 被阅读596次

从iOS10开始,必须强制使用https,利用系统自带的NSURLSession网络请求,设置代理

如果是https连接,会调用一下代理,允许所有请求

- (void)URLSession:(NSURLSession*)session task:(NSURLSessionTask*)task didReceiveChallenge:(NSURLAuthenticationChallenge*)challenge completionHandler:(void(^)(NSURLSessionAuthChallengeDisposition,NSURLCredential*_Nullable))completionHandler {

NSURLCredential*credential = [NSURLCredentialcredentialForTrust:challenge.protectionSpace.serverTrust];

completionHandler(NSURLSessionAuthChallengeUseCredential, credential);

}

以上是允许所有请求,这样做比较危险,中间人可以截取请求信息,下面做身份验证,服务器要配置SSL连接,创建证书参考:mac上apache创建服务器与iOS的双向认证证书,把服务器证书server.cer 和 客户端证书client.p12导入到项目


// 收到身份验证
- (void)URLSession:(NSURLSession *)session task:(NSURLSessionTask *)task didReceiveChallenge:(NSURLAuthenticationChallenge *)challenge completionHandler:(void (^)(NSURLSessionAuthChallengeDisposition, NSURLCredential * _Nullable))completionHandler {
    
    NSURLProtectionSpace *space = [challenge protectionSpace];
    NSString *host = space.host;
    NSLog(@"host:%@,",host);
    
    BOOL receivesCredentialSecurely = space.receivesCredentialSecurely;
    NSLog(@"iScreadentialSecurely:%@",@(receivesCredentialSecurely));
    
    NSString *authenticationMethod = space.authenticationMethod;
    NSLog(@"authenticationMethod:%@",authenticationMethod);
    
    NSString *protocol = space.protocol;
    NSLog(@"protocol:%@",protocol);
    
    NSInteger port = space.port;
    NSLog(@"port:%@",@(port));
    
    SecTrustRef trus = space.serverTrust;
    NSLog(@"trus:%@",trus);
    
    // 如果服务器主机是192.168.1.122才验证
    if([host isEqualToString:@"192.168.1.122"] && receivesCredentialSecurely) {
        // 认证方法:客户端认证
        if ([authenticationMethod isEqualToString:@"NSURLAuthenticationMethodClientCertificate"] ) {
            NSString *p12Path = [[NSBundle mainBundle] pathForResource:@"client" ofType:@"p12"];
            NSData * p12Data = [NSData dataWithContentsOfFile:p12Path];
            
            [self authClientCerData:p12Data cerPass:@"123456" space:space success:^(NSURLCredential *credential) {
                completionHandler(NSURLSessionAuthChallengeUseCredential, credential);
            } failure:^(NSString *errorMsg) {
                // 验证失败
                NSLog(@"errorMsg = %@",errorMsg);
                completionHandler(NSURLSessionAuthChallengeCancelAuthenticationChallenge,nil);
            }];
            
            
            
            //验证服务器证书------------------------------------------
        } else if([authenticationMethod isEqualToString:@"NSURLAuthenticationMethodServerTrust"]) {
            
            NSString *path = [[NSBundle mainBundle] pathForResource:@"server_client.cer" ofType:nil];
            NSData *cerData = [[NSData alloc] initWithContentsOfFile:path];
            [self authServerCerData:cerData space:space success:^{
                // 验证成功
                NSURLCredential *credential = [NSURLCredential credentialForTrust:space.serverTrust];
                completionHandler(NSURLSessionAuthChallengeUseCredential, credential);
            } failure:^(NSString *errorMsg) {
                // 验证失败
                NSLog(@"errorMsg = %@",errorMsg);
                completionHandler(NSURLSessionAuthChallengeCancelAuthenticationChallenge,nil);
            }];
        } else {
           // 其他服务器连接取消连接
            completionHandler(NSURLSessionAuthChallengeCancelAuthenticationChallenge,nil);
        }
    }
}

客户端验证服务器证书具体步骤


// 认证服务器证书
-(void)authServerCerData:(NSData *)cerData space:(NSURLProtectionSpace *)space success:(void(^)())success failure:(void(^)(NSString *errorMsg))failure {
    if(![space.authenticationMethod isEqualToString:@"NSURLAuthenticationMethodServerTrust"]) {
        if (failure) {
            failure([[NSString alloc] initWithFormat:@"服务器认证方法不为'NSURLAuthenticationMethodServerTrust',authenticationMethod='%@'",space.authenticationMethod]);
        }
        
        return;
    }
    SecTrustRef serverTrust = space.serverTrust;
    if(serverTrust == nil) {
        if (failure) {
            failure(@"space.serverTurst == nil");
        }
        
        return;
    }
    
    // 读取证书
    if (cerData == nil) {
        if (failure) {
            failure(@"证书数据为空");
        }
        
        return;
    }
    
    SecCertificateRef cerRef = SecCertificateCreateWithData(NULL, (__bridge CFDataRef)cerData);
    if(cerRef == nil) {
        if (failure) {
            failure(@"不能读取证书信息,请检查证书名称");
        }
        
        return;
    }
    
    NSArray *caArray = @[(__bridge id)cerRef];
     //将读取的证书设置为服务端帧数的根证书
    OSStatus status = SecTrustSetAnchorCertificates(serverTrust, (__bridge CFArrayRef)caArray);
    if(!(status == errSecSuccess)) {
        if (failure) {
            failure([[NSString alloc] initWithFormat:@"设置为服务端帧数的根证书失败,status=%@",@(status)]);
        }
        
        return;
    }
    
    SecTrustResultType result = -1;
    //验证服务器的证书是否可信(有可能通过联网验证证书颁发机构)
    status = SecTrustEvaluate(serverTrust, &result);
    if(!(status == errSecSuccess)) {
        if (failure) {
            failure([[NSString alloc] initWithFormat:@"服务器证书验证失败,status=%@",@(status)]);
        }
        
        return;
    }
    // result返回结果,是否信任
    BOOL allowConnect = ((result == kSecTrustResultUnspecified) || (result == kSecTrustResultProceed));
    if(!allowConnect) {
        if (failure) {
            failure(@"不是信任的连接");
        }
         
        return;
    }
    // 全部通过验证
    if (success) {
        success();
    }  
}


服务器认证客户端证书


// 服务器认证客户端证书
-(void)authClientCerData:(NSData *)cerData cerPass:(NSString *)pass space:(NSURLProtectionSpace *)space success:(void(^)(NSURLCredential *credential))success failure:(void(^)(NSString *errorMsg))failure {
    if(![space.authenticationMethod isEqualToString:@"NSURLAuthenticationMethodClientCertificate"]) {
        failure([[NSString alloc] initWithFormat:@"服务器认证方法不为'NSURLAuthenticationMethodClientCertificate',authenticationMethod='%@'",space.authenticationMethod]);
        return;
    }

    // 读取证书
    if (cerData == nil) {
        if (failure) {
            failure(@"证书数据为空");
        }
        
        return;
    }
    
    CFDataRef inPKCS12Data = (__bridge CFDataRef)cerData;
    
    SecIdentityRef identity = NULL;
    
    OSStatus status = [self extractIdentity:inPKCS12Data identity:&identity pass:pass];
    if(status != 0 || identity == NULL) {
        if(failure) {
            failure([[NSString alloc] initWithFormat:@"提取身份失败,status=%@",@(status)]);
        }
        return;

    }
    
    SecCertificateRef certificate = NULL;
    SecIdentityCopyCertificate (identity, &certificate);
    const void *certs[] = {certificate};
    CFArrayRef arrayOfCerts = CFArrayCreate(kCFAllocatorDefault, certs, 1, NULL);
    
    // NSURLCredentialPersistenceForSession:创建URL证书,在会话期间有效
    NSURLCredential *credential = [NSURLCredential credentialWithIdentity:identity certificates:(__bridge NSArray*)arrayOfCerts persistence:NSURLCredentialPersistenceForSession];
    if (success) {
        success(credential);
    }
    
    if(certificate) {
        CFRelease(certificate);
    }
    
    if (arrayOfCerts) {
        CFRelease(arrayOfCerts);
        
    }
    return;
}

// 提取身份identity
- (OSStatus)extractIdentity:(CFDataRef)inP12Data identity:(SecIdentityRef*)identity pass:(NSString *)pass {
    
    CFStringRef password = (__bridge CFStringRef)(pass);//证书密码
    const void *keys[] = { kSecImportExportPassphrase };
    const void *values[] = { password };
    
    CFDictionaryRef options = CFDictionaryCreate(NULL, keys, values, 1, NULL, NULL);
    
    CFArrayRef items = CFArrayCreate(NULL, 0, 0, NULL);
    OSStatus securityError = SecPKCS12Import(inP12Data, options, &items);
    if (securityError == 0)
    {
        CFDictionaryRef ident = CFArrayGetValueAtIndex(items,0);
        const void *tempIdentity = NULL;
        tempIdentity = CFDictionaryGetValue(ident, kSecImportItemIdentity);
        *identity = (SecIdentityRef)tempIdentity;
    }
    
    if (options) {
        CFRelease(options);
    }
    
    return securityError;
}


相关文章

  • iOS客户端https连接双向认证

    从iOS10开始,必须强制使用https,利用系统自带的NSURLSession网络请求,设置代理 如果是http...

  • iOS HTTPS 双向认证

    iOS HTTPS 双向认证 @(iOS)[网络,HTTPS] 搞了半天,记录一下,坑很多。双向认证,就是在访问网...

  • https双向认证 iOS客户端处理

    写在前面: 1.相关https具体内容本篇就不再描述。 2.前几天公司项目要求配置https双向认证,由于是银行业...

  • https双向认证 iOS客户端处理

    写在前面: 1.相关https具体内容本篇就不再描述。 2.前几天公司项目要求配置https双向认证,由于是银行业...

  • iOS https 双向认证

    /** 一.非浏览器应用(iOS app)与服务器AFNetworking HTTPS ssl认证 虽然是HTTP...

  • iOS HTTPS双向认证

    一般情况下对于HTTPS,如果公司申请认证之后,客户端是不需要做什么操作。但是如果是自建证书,没有通过CA认证的话...

  • HTTPS双向认证

    双向认证,顾名思义,客户端和服务器端都需要验证对方的身份,在建立HTTPS连接的过程中,握手的流程比单向认证多了几...

  • iOS_HTTPS认证

    HTTPS认证 单向认证:指客户端验证服务端的身份,服务端不验证客户端身份双向认证:指客户端验证服务端身份,服务端...

  • iOS中的安全与加密

    iOS中的安全与加密 一。HTTPS双向认证 Charles是大家所熟悉的抓包工具,如果网络请求未经过双向认证,那...

  • iOS中的HTTPS认证

    一、HTTPS认证 1. 会话认证机制 iOS 中会话认证机制共有四种,大体分为两种类型: 单向认证双向认证; N...

网友评论

    本文标题:iOS客户端https连接双向认证

    本文链接:https://www.haomeiwen.com/subject/kszxottx.html