• <ul id="cgeq2"></ul>
  • 歡迎您光臨深圳塔燈網絡科技有限公司!
    電話圖標 余先生:13699882642

    網站百科

    為您解碼網站建設的點點滴滴

    iOS使用自簽名證書實現HTTPS請求

    發表日期:2016-09 文章編輯:小燈 瀏覽次數:2749

    由于蘋果規定2017年1月1日以后,所有APP都要使用HTTPS進行網絡請求,否則無法上架,因此研究了一下在iOS中使用HTTPS請求的實現。相信大家對HTTPS都或多或少有些了解,這里我就不再介紹了,主要功能就是將傳輸的報文進行加密,提高安全性。

    1、證書準備

    證書分為兩種,一種是花錢向認證的機構購買的證書,服務端如果使用的是這類證書的話,那一般客戶端不需要做什么,用HTTPS進行請求就行了,蘋果內置了那些受信任的根證書的。另一種是自己制作的證書,使用這類證書的話是不受信任的(當然也不用花錢買),因此需要我們在代碼中將該證書設置為信任證書。

    我這邊使用的是xca來制作了根證書,制作流程請參考http://www.2cto.com/Article/201411/347512.html,由于xca無法導出.jsk的后綴,因此我們只要制作完根證書后以.p12的格式導出就行了,之后的證書制作由命令行來完成。自制一個批處理文件,添加如下命令:

    set ip=%1%
    md %ip%
    keytool -importkeystore -srckeystore ca.p12 -srcstoretype PKCS12 -srcstorepass 123456 -destkeystore ca.jks -deststoretype JKS -deststorepass 123456
    keytool -genkeypair -alias server-%ip% -keyalg RSA -keystore ca.jks -storepass 123456 -keypass 123456 -validity 3650 -dname "CN=%ip%, OU=ly, O=hik, L=hz, ST=zj, C=cn"
    keytool -certreq -alias server-%ip% -storepass 123456 -file %ip%\server-%ip%.certreq -keystore ca.jks
    keytool -gencert -alias ca -storepass 123456 -infile %ip%\server-%ip%.certreq -outfile %ip%\server-%ip%.cer -validity 3650 -keystore ca.jks?
    keytool -importcert -trustcacerts -storepass 123456 -alias server-%ip% -file %ip%\server-%ip%.cer -keystore ca.jks
    keytool -delete -keystore ca.jks -alias ca -storepass 123456

    將上面加粗的ca.p12改成你導出的.p12文件的名稱,123456改為你創建證書的密碼。

    然后在文件夾空白處按住ctrl+shift點擊右鍵,選擇在此處打開命令窗口,在命令窗口中輸入“start.bat ip/域名”來執行批處理文件,其中start.bat是添加了上述命令的批處理文件,ip/域名即你服務器的ip或者域名。執行成功后會生成一個.jks文件和一個以你的ip或域名命名的文件夾,文件夾中有一個.cer的證書,這邊的.jks文件將在服務端使用.cer文件將在客戶端使用,到這里證書的準備工作就完成了。

    2、服務端配置

    由于我不做服務端好多年,只會使用Tomcat,所以這邊只講下Tomcat的配置方法,使用其他服務器的同學請自行查找設置方法。

    打開tomcat/conf目錄下的server.xml文件將HTTPS的配置打開,并進行如下配置:

    <Connector URIEncoding="UTF-8" protocol="org.apache.coyote.http11.Http11NioProtocol" port="8443" maxThreads="200" scheme="https" secure="true" SSLEnabled="true" sslProtocol="TLSv1.2" sslEnabledProtocols="TLSv1.2" keystoreFile="${catalina.base}/ca/ca.jks" keystorePass="123456" clientAuth="false" SSLVerifyClient="off" netZone="你的ip或域名"/>

    keystoreFile是你.jks文件放置的目錄,keystorePass是你制作證書時設置的密碼,netZone填寫你的ip或域名。注意蘋果要求協議要TLSv1.2以上

    3、iOS端配置

    首先把前面生成的.cer文件添加到項目中,注意在添加的時候選擇要添加的targets。

    1.使用NSURLSession進行請求

    代碼如下:

    NSString *urlString = @"https://xxxxxxx";
    NSURL *url = [NSURL URLWithString:urlString];
    NSMutableURLRequest *request = [NSMutableURLRequest requestWithURL:url cachePolicy:NSURLRequestReloadIgnoringCacheData timeoutInterval:10.0f];
    NSURLSession *session = [NSURLSession sessionWithConfiguration:[NSURLSessionConfiguration defaultSessionConfiguration] delegate:self delegateQueue:[NSOperationQueue mainQueue]];
    NSURLSessionDataTask *task = [session dataTaskWithRequest:request];
    [task resume];

    需要實現NSURLSessionDataDelegate中的URLSession:didReceiveChallenge:completionHandler:方法來進行證書的校驗,代碼如下:

    - (void)URLSession:(NSURLSession *)session didReceiveChallenge:(NSURLAuthenticationChallenge *)challenge
    ?completionHandler:(void (^)(NSURLSessionAuthChallengeDisposition disposition, NSURLCredential * _Nullable credential))completionHandler {
    ??? NSLog(@"證書認證");
    ??? if ([[[challenge protectionSpace] authenticationMethod] isEqualToString: NSURLAuthenticationMethodServerTrust]) {
    ??????? do
    ??????? {
    ??????????? SecTrustRef serverTrust = [[challenge protectionSpace] serverTrust];
    ??????????? NSCAssert(serverTrust != nil, @"serverTrust is nil");
    ??????????? if(nil == serverTrust)
    ??????????????? break; /* failed */
    ??????????? /**
    ???????????? *? 導入多張CA證書(Certification Authority,支持SSL證書以及自簽名的CA),請替換掉你的證書名稱
    ???????????? */
    ??????????? NSString *cerPath = [[NSBundle mainBundle] pathForResource:@"ca" ofType:@"cer"];//自簽名證書
    ??????????? NSData* caCert = [NSData dataWithContentsOfFile:cerPath];

    ??????????? NSCAssert(caCert != nil, @"caCert is nil");
    ??????????? if(nil == caCert)
    ??????????????? break; /* failed */
    ???????????
    ??????????? SecCertificateRef caRef = SecCertificateCreateWithData(NULL, (__bridge CFDataRef)caCert);
    ??????????? NSCAssert(caRef != nil, @"caRef is nil");
    ??????????? if(nil == caRef)
    ??????????????? break; /* failed */
    ???????????
    ??????????? //可以添加多張證書
    ??????????? NSArray *caArray = @[(__bridge id)(caRef)];
    ???????????
    ??????????? NSCAssert(caArray != nil, @"caArray is nil");
    ??????????? if(nil == caArray)
    ??????????????? break; /* failed */
    ???????????
    ??????????? //將讀取的證書設置為服務端幀數的根證書
    ??????????? OSStatus status = SecTrustSetAnchorCertificates(serverTrust, (__bridge CFArrayRef)caArray);
    ??????????? NSCAssert(errSecSuccess == status, @"SecTrustSetAnchorCertificates failed");
    ??????????? if(!(errSecSuccess == status))
    ??????????????? break; /* failed */
    ???????????
    ??????????? SecTrustResultType result = -1;
    ??????????? //通過本地導入的證書來驗證服務器的證書是否可信
    ??????????? status = SecTrustEvaluate(serverTrust, &result);
    ??????????? if(!(errSecSuccess == status))
    ??????????????? break; /* failed */
    ??????????? NSLog(@"stutas:%d",(int)status);
    ??????????? NSLog(@"Result: %d", result);
    ???????????
    ??????????? BOOL allowConnect = (result == kSecTrustResultUnspecified) || (result == kSecTrustResultProceed);
    ??????????? if (allowConnect) {
    ??????????????? NSLog(@"success");
    ??????????? }else {
    ??????????????? NSLog(@"error");
    ??????????? }

    ??????????? /* kSecTrustResultUnspecified and kSecTrustResultProceed are success */
    ??????????? if(! allowConnect)
    ??????????? {
    ??????????????? break; /* failed */
    ??????????? }
    ???????????
    #if 0
    ??????????? /* Treat kSecTrustResultConfirm and kSecTrustResultRecoverableTrustFailure as success */
    ??????????? /*?? since the user will likely tap-through to see the dancing bunnies */
    ??????????? if(result == kSecTrustResultDeny || result == kSecTrustResultFatalTrustFailure || result == kSecTrustResultOtherError)
    ??????????????? break; /* failed to trust cert (good in this case) */
    #endif
    ???????????
    ??????????? // The only good exit point
    ??????????? NSLog(@"信任該證書");
    ???????????
    ??????????? NSURLCredential *credential = [NSURLCredential credentialForTrust:challenge.protectionSpace.serverTrust];
    ??????????? completionHandler(NSURLSessionAuthChallengeUseCredential,credential);
    ??????????? return [[challenge sender] useCredential: credential
    ????????????????????????? forAuthenticationChallenge: challenge];
    ???????????
    ??????? }
    ??????? while(0);
    ??? }
    ???
    ??? // Bad dog
    ??? NSURLCredential *credential = [NSURLCredential credentialForTrust:challenge.protectionSpace.serverTrust];
    ??? completionHandler(NSURLSessionAuthChallengeCancelAuthenticationChallenge,credential);
    ??? return [[challenge sender] cancelAuthenticationChallenge: challenge];
    }

    此時即可成功請求到服務端。

    注:調用SecTrustSetAnchorCertificates設置可信任證書列表后就只會在設置的列表中進行驗證,會屏蔽掉系統原本的信任列表,要使系統的繼續起作用只要調用SecTrustSetAnchorCertificates方法,第二個參數設置成NO即可。

    2.使用AFNetworking進行請求

    AFNetworking首先需要配置AFSecurityPolicy類,AFSecurityPolicy類封裝了證書校驗的過程。

    /**
    ?AFSecurityPolicy分三種驗證模式:
    ?AFSSLPinningModeNone:只是驗證證書是否在信任列表中
    ?AFSSLPinningModeCertificate:該模式會驗證證書是否在信任列表中,然后再對比服務端證書和客戶端證書是否一致
    ?AFSSLPinningModePublicKey:只驗證服務端證書與客戶端證書的公鑰是否一致
    */

    AFSecurityPolicy *securityPolicy = [AFSecurityPolicy policyWithPinningMode:AFSSLPinningModeCertificate];
    ??? securityPolicy.allowInvalidCertificates = YES;//是否允許使用自簽名證書
    ??? securityPolicy.validatesDomainName = NO;//是否需要驗證域名,默認YES

    ??? AFHTTPSessionManager *_manager = [AFHTTPSessionManager manager];
    ??? _manager.responseSerializer = [AFHTTPResponseSerializer serializer];
    ??? _manager.securityPolicy = securityPolicy;
    ??? //設置超時
    ??? [_manager.requestSerializer willChangeValueForKey:@"timeoutinterval"];
    ??? _manager.requestSerializer.timeoutInterval = 20.f;
    ??? [_manager.requestSerializer didChangeValueForKey:@"timeoutinterval"];
    ??? _manager.requestSerializer.cachePolicy = NSURLRequestReloadIgnoringCacheData;
    ??? _manager.responseSerializer.acceptableContentTypes? = [NSSet setWithObjects:@"application/xml",@"text/xml",@"text/plain",@"application/json",nil];
    ?
    ??? __weak typeof(self) weakSelf = self;
    ??? [_manager setSessionDidReceiveAuthenticationChallengeBlock:^NSURLSessionAuthChallengeDisposition(NSURLSession *session, NSURLAuthenticationChallenge *challenge, NSURLCredential *__autoreleasing *_credential) {
    ???????
    ??????? SecTrustRef serverTrust = [[challenge protectionSpace] serverTrust];
    ??????? /**
    ???????? *? 導入多張CA證書
    ???????? */
    ??????? NSString *cerPath = [[NSBundle mainBundle] pathForResource:@"ca" ofType:@"cer"];//自簽名證書
    ??????? NSData* caCert = [NSData dataWithContentsOfFile:cerPath];
    ??????? NSArray *cerArray = @[caCert];
    ??????? weakSelf.manager.securityPolicy.pinnedCertificates = cerArray;
    ???????
    ??????? SecCertificateRef caRef = SecCertificateCreateWithData(NULL, (__bridge CFDataRef)caCert);
    ??????? NSCAssert(caRef != nil, @"caRef is nil");
    ???????
    ??????? NSArray *caArray = @[(__bridge id)(caRef)];
    ??????? NSCAssert(caArray != nil, @"caArray is nil");
    ???????
    ??????? OSStatus status = SecTrustSetAnchorCertificates(serverTrust, (__bridge CFArrayRef)caArray);
    ??????? SecTrustSetAnchorCertificatesOnly(serverTrust,NO);
    ??????? NSCAssert(errSecSuccess == status, @"SecTrustSetAnchorCertificates failed");
    ???????
    ??????? NSURLSessionAuthChallengeDisposition disposition = NSURLSessionAuthChallengePerformDefaultHandling;
    ??????? __autoreleasing NSURLCredential *credential = nil;
    ??????? if ([challenge.protectionSpace.authenticationMethod isEqualToString:NSURLAuthenticationMethodServerTrust]) {
    ??????????? if ([weakSelf.manager.securityPolicy evaluateServerTrust:challenge.protectionSpace.serverTrust forDomain:challenge.protectionSpace.host]) {
    ??????????????? credential = [NSURLCredential credentialForTrust:challenge.protectionSpace.serverTrust];
    ??????????????? if (credential) {
    ??????????????????? disposition = NSURLSessionAuthChallengeUseCredential;
    ??????????????? } else {
    ??????????????????? disposition = NSURLSessionAuthChallengePerformDefaultHandling;
    ??????????????? }
    ??????????? } else {
    ??????????????? disposition = NSURLSessionAuthChallengeCancelAuthenticationChallenge;
    ??????????? }
    ??????? } else {
    ??????????? disposition = NSURLSessionAuthChallengePerformDefaultHandling;
    ??????? }
    ???????
    ??????? return disposition;
    ??? }];

    上述代碼通過給AFHTTPSessionManager重新設置證書驗證回調來自己驗證證書,然后將自己的證書加入到可信任的證書列表中,即可通過證書的校驗。

    由于服務端使用.jks是一個證書庫,客戶端獲取到的證書可能不止一本,我這邊獲取到了兩本,具體獲取到基本可通過SecTrustGetCertificateCount方法獲取證書個數,AFNetworking在evaluateServerTrust:forDomain:方法中,AFSSLPinningMode的類型為AFSSLPinningModeCertificate和AFSSLPinningModePublicKey的時候都有校驗服務端的證書個數與客戶端信任的證書數量是否一樣,如果不一樣的話無法請求成功,所以這邊我就修改他的源碼,當有一個校驗成功時即算成功。

    當類型為AFSSLPinningModeCertificate時

    return trustedCertificateCount == [serverCertificates count] - 1;

    為AFSSLPinningModePublicKey時

    return trustedPublicKeyCount > 0 && ((self.validatesCertificateChain) || (!self.validatesCertificateChain && trustedPublicKeyCount >= 1));

    去掉了第二塊中的trustedPublicKeyCount == [serverCertificates count]的條件。

    這邊使用的AFNetworking的版本為2.5.3,如果其他版本有不同之處請自行根據實際情況修改。

    demo地址:https://github.com/fengling2300/networkTest


    本頁內容由塔燈網絡科技有限公司通過網絡收集編輯所得,所有資料僅供用戶學習參考,本站不擁有所有權,如您認為本網頁中由涉嫌抄襲的內容,請及時與我們聯系,并提供相關證據,工作人員會在5工作日內聯系您,一經查實,本站立刻刪除侵權內容。本文鏈接:http://www.juherenli.com/20385.html
    相關開發語言
     八年  行業經驗

    多一份參考,總有益處

    聯系深圳網站公司塔燈網絡,免費獲得網站建設方案及報價

    咨詢相關問題或預約面談,可以通過以下方式與我們聯系

    業務熱線:余經理:13699882642

    Copyright ? 2013-2018 Tadeng NetWork Technology Co., LTD. All Rights Reserved.    

    久久久精品2019免费观看| 99亚洲精品卡2卡三卡4卡2卡| 2022免费国产精品福利在线| 99精品人妻无码专区在线视频区| 久久se精品一区精品二区| 四虎精品影库4HUTV四虎| 亚洲精品9999久久久久无码| 99热精品在线免费观看| 亚洲精品国产成人片| 美女免费精品高清毛片在线视 | 97精品伊人久久大香线蕉| 久久综合精品国产二区无码 | 亚洲国产成人综合精品| 青青草原精品99久久精品66| 亚洲日韩精品一区二区三区| 国产精品V亚洲精品V日韩精品| 精品国产丝袜自在线拍国| 国产亚洲精品影视在线| 91国内揄拍国内精品情侣对白 | 精品无码人妻久久久久久| 国产成人精品免费视频软件| 国产精品久久久久三级| 日韩精品福利片午夜免费观着| 91麻精品国产91久久久久| 无码精品久久久天天影视| 国产精品丝袜黑色高跟鞋| 最新国产成人精品2024| 久久精品成人影院| 亚洲国产综合精品一区在线播放 | 黑人粗长大战亚洲女2021国产精品成人免费视频 | 国产精品亚洲片夜色在线| 中文字幕亚洲综合精品一区| 久久久久无码精品国产不卡 | 亚洲欧美日韩国产精品一区| 国产精品久久免费| 2021国内精品久久久久久影院| 玖玖精品在线视频| 国产精品久久久久久影院| 国产成人愉拍精品| 精品麻豆国产色欲色欲色欲www| 真实国产精品vr专区|