IOS mobileconfig walkarounds

I searched several sites for any intellect when setting up an iPhone over the air with mobileconfig files and got stuck at some point ...: / this is what I found: http://cryptopath.wordpress.com/2010/01/29/iphone- certificate-flaws / but this part is beyond my understanding.

Using the openssl smime and P12 that you received from Verisign, sign the mobileconfig file , including the full CA chain , and put it on a public HTTP server

If I understand correctly what I need to do:
1) get a certificate from Verisign (received it based on key.pem and request.pem generated from openssl)
2) create the .mobileconfig file in the iPhone configuration utility (do I need to have all the settings completed or enough to just have this file?)
3) and ... what is this CA chain?

In addition, I found the material here: http://www.rootmanager.com/iphone-ota-configuration/iphone-ota-setup-with-signed-mobileconfig.html
Here I am also stuck in this chain ... no one knows / doesn’t know, a step-by-step solution for noobs like me is desirable ;;) (the most demanded is obviously the solution for creating all the certificate material, because later this is a rather fascinating guide )

+6
source share
1 answer

Original CA Circuit Summary: Say you have a security certificate stating that you are example.com. But no one will believe you. This way you get signed by someone you trust (Verisign in your example above). Now I believe that you are example.com, because Verisign guarantees you by signing a certificate.

Verisign does not usually sign it with its primary β€œroot” certificate. Instead, they sign it with a second-tier CA, and the second-tier CA will be signed with a root certificate that I trust.

What the certificate chain is: you (example.com) are signed by a second-tier CA, which is signed by the root CA.

So, when you give me your certificate, you also need to provide the whole chain so that I can check it to the very top and see if I really trust you.

So, the following command accepts your .mobileconfig file and signs it with your certificate. And I trust your signature as long as you provide the whole chain.

Files:
* company.mobileconfig <- your .mobileconfig file that you created * signed.mobileconfig <- a signed file that is created after the command
* server.crt <- your certificate that you received from a trusted CA
* server.key <- your private key file that comes with the above certificate (keep safe)
* cert-chain.crt <- any certificates are in the chain to the top-level CA that people trust

Command:

openssl smime -sign -in company.mobileconfig -out signed.mobileconfig -signer server.crt -inkey server.key -certfile cert-chain.crt -outform der -nodetach 
+11
source

Source: https://habr.com/ru/post/908429/


All Articles