I have written a WebSocket client using Apple Network Framework in C++. I use a sec_protocol_options_set_verify_block
to customize the server SSL certificate trust evaluation. This includes logic to append a revocation policy to the trust object like this:
If CRL checks are set to HARD i.e kSecRevocationRequirePositiveResponse
bit is set. Then the evaluation always fails with Trust evaluation result - kSecTrustResultRecoverableTrustFailure
and the revocation result is FALSE. The error code is -67635 corresponding to errSecIncompleteCertRevocationCheck
. But weirdly the error message printed is '"leafCert","CACert" certificates do not meet pinning requirements'
. This does not match up to the error code seen.
These are placeholder names for my self signed server
certificates. The root is added to the Keychain and marked trusted in the keychain. If I put CRL checks to SOFT, no CRL check takes place but the trust evaluation succeeds.
Putting the error message anomaly aside. If I run WireShark traces on the server machine where the CRL distribution point is also located, I do not see any HTTP requests coming in for the CRL list. I have checked the CRL DP URL in a browser and it is reachable.
Is there something wrong with the policy creation process? Why is it not at least trying to access the CRL DP?
Weirdly when I try to visit websites hosted by digicert.com which server revoked certificates from their CAs, I can see the OCSP messages going to http://ocsp.digicert.com. The application correctly recognizes the revoked certificate and fails the TLS trust evaluation.
Good. Now we have a baseline for the situation and we know that it does work.
Regarding:
I tried two leaf certificate with my new root CA and still no OCSP messages on the WireShark traces.
Here is my theory on what is happening in this case; since the CA certificates are not in the system trust store then trust evaluation can be done locally as opposed to going to the server to see if the certificate chain has been revoked. For example, OCSP is most likely being done on a chain that exists in the trust store to see if since adding to trust store that a certificate in the chain has been revoked. In this case though, there is no need to go to the OCSP server because the system can see if your chain is trusted manually by the user because the user would have to override the trust settings locally to ensure a custom CA certificate is trusted. Then, going to the OCSP server would be an extra network call if the user already manually set the chain as trusted. This is my interpretation on what is happening, if you do see something else happening I would encourage you to open a bug report.