On Mon, Dec 24, 2012 at 3:54 AM, Jeffrey Walton <noloa...@gmail.com> wrote:

> On Mon, Dec 24, 2012 at 5:49 AM, Dan Kaminsky <d...@doxpara.com> wrote:
> > Remarkably tricky to do well, though.
> Do it like Apple: perform your updates over HTTP. Make it a feature so
> an organization trying to manage an non-organizational MacBook can
> provide DNS and the Update Service. And don't sign the catalogs (TAR
> balls fetched before the signed update). No problems ;)
>
> What I can't understand: when it was applied against in-App purchases
> (StoreKit), Apple cried foul.
>
> http://z6mag.com/technology/apple/free-apps-for-ipad-iphone-security-flaw-in-ios-goes-unfixed-by-apple-1612248.html
>
> It would be funny if it wasn't true: "Apple has now added a 'unique
> identifier' field to receipts, and given developers tools so they
> could verify digital receipts on their own server. However, this only
> works if the developer runs the receipt through their server first.
> Apps that connect directly to the Apple App Store server are still
> vulnerable to the hack."
>
> Instead of taking advantage of the pre-exisiting relationship between
> the StoreKit API and Apple Servers by pinning the certificate (similar
> to SSH's StrictHostKeyCheck), Apple pushed it on developers. Amazing.
>

Like I said:  Remarkably tricky to do well

Autoupdating third party apps is still an unsolved problem, save for the
web where you redownload the client every time (a *wildly successful*
approach, as it happens).  iOS's third party app updating is a hilariously
broken experience.
_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

Reply via email to