c# - What checks has Mono performed when System.Net.ServerCertificateValidationCallback is triggered? -
i'm trying secure connection server in mono (actually monotouch) application. therefore have hooked system.net.servercertificatevalidationcallback(object sender, x509certificate certificate, x509chain chain, sslpolicyerrors sslpolicyerrors)
is callback supposed trigger error in case of man-in-the-middle attack? or case not detected if fake certificate's name matches real one?
is check identical how microsoft implements it?
the callback allow customize behaviour of application wrt ssl/tls results. common customization discussed in article: using trusted roots respectfully
the basic validation done system.net.servicepointmanager (link mono sources). differ bit per platform. monotouch it's call ios see if certificate(s) valid. additional, https specific, checks done on top of (to match rfc requirements http on ssl/tls).
is callback supposed trigger error in case of man-in-the-middle attack?
any error reported. includes invalid signatures of certificates ne used mitm attack. otoh errors more benign (e.g. expiration dates).
or case not detected if fake certificate's name matches real one?
https rfc requires certificate name (generally cn) match name of web site - iow detected (as long can trust dns - that's true every implementation ;-).
is check identical how microsoft implements it?
microsoft not document in details. follow x.509 checks , https rfc should pretty close.
Comments
Post a Comment