Difference between revisions of "Misuse of enterprise and developer certificates"

From The iPhone Wiki
Jump to: navigation, search
(more detail)
(sorting examples into sections)
Line 10: Line 10:
   
 
== Examples ==
 
== Examples ==
* [[Pangu]] - uses a revoked enterprise certificate to help inject the jailbreak, which is removed after the jailbreak is complete.
 
 
* [http://www.iosemulatorspot.com/ iOSEmulatorSpot], [http://www.jbwithoutjb.weebly.com/ JBWithoutJB], and [http://nojailbreakapps.weebly.com/ NoJailbreakApps] redistribute various apps developed by other people, mostly without permission.
 
* [http://www.iosemulatorspot.com/ iOSEmulatorSpot], [http://www.jbwithoutjb.weebly.com/ JBWithoutJB], and [http://nojailbreakapps.weebly.com/ NoJailbreakApps] redistribute various apps developed by other people, mostly without permission.
 
* Some piracy sites and tools distribute cracked App Store apps that have been re-signed using developer certificates.
 
* Some piracy sites and tools distribute cracked App Store apps that have been re-signed using developer certificates.
* [http://torrentfreak.com/popcorn-time-releases-jailbreak-free-ios-app-150407/ "Popcorn Time releases iOS app tomorrow, no jailbreak needed"], April 7, 2015
 
   
== External links ==
+
=== Zeusmos, January 2013 ===
   
* [http://thenextweb.com/apple/2013/01/01/low-down-dirty-iphone-app-pirates/ "New services bypass Apple DRM to allow pirated iOS app installs without jailbreaking on iPhone, iPad"] (TheNextWeb, January 2013): "It’s unclear exactly how Zeusmos achieves its goal, but judging from the pricing and the correlation between UDIDRegistrations, it appears to utilize a developer licensing certificate to install ‘cracked’ apps which have had their DRM (copy protection) stripped."
+
[http://thenextweb.com/apple/2013/01/01/low-down-dirty-iphone-app-pirates/ "New services bypass Apple DRM to allow pirated iOS app installs without jailbreaking on iPhone, iPad"] (TheNextWeb, January 2013): "It’s unclear exactly how Zeusmos achieves its goal, but judging from the pricing and the correlation between UDIDRegistrations, it appears to utilize a developer licensing certificate to install ‘cracked’ apps which have had their DRM (copy protection) stripped."
  +
* [http://www.forbes.com/sites/emmawoollacott/2013/04/19/when-criminals-exploit-apples-own-app-distribution-system-what-hope-is-there-of-stamping-out-piracy/ "When Criminals Exploit Apple's Own App Distribution System, What Hope Is There Of Stamping Out Piracy?"] (Forbes, April 2013): "Remarkably, the site is powered by Apple’s own enterprise app distribution system, designed to allow large organizations to provide internal apps to staff. What KuaiYong has done is buy one license and then distribute apps to its customers on the pretext that they’re the company’s own staff."
 
  +
=== KuaiYong, April 2013 ===
* [http://www.examiner.com/article/chinese-website-allows-pirating-of-ios-apps-no-jailbreaking-required "Chinese website allows pirating of iOS apps, no jailbreaking required"] (Examiner, April 2013): "[Kuaiyong] uses Apple's own enterprise app deployment technology."
 
  +
  +
[http://www.forbes.com/sites/emmawoollacott/2013/04/19/when-criminals-exploit-apples-own-app-distribution-system-what-hope-is-there-of-stamping-out-piracy/ "When Criminals Exploit Apple's Own App Distribution System, What Hope Is There Of Stamping Out Piracy?"] (Forbes, April 2013): "Remarkably, the site is powered by Apple’s own enterprise app distribution system, designed to allow large organizations to provide internal apps to staff. What KuaiYong has done is buy one license and then distribute apps to its customers on the pretext that they’re the company’s own staff."
  +
  +
[http://www.examiner.com/article/chinese-website-allows-pirating-of-ios-apps-no-jailbreaking-required "Chinese website allows pirating of iOS apps, no jailbreaking required"] (Examiner, April 2013): "[Kuaiyong] uses Apple's own enterprise app deployment technology."
  +
  +
=== Pangu, June 2014 ===
  +
  +
[[Pangu]] uses an expired enterprise certificate to help inject the jailbreak, which is removed after the jailbreak is complete.
  +
  +
[http://www.idownloadblog.com/2014/06/24/ios-7-1-1-jailbreak-uses-expired-enterprise-certificate-loophole/ "iOS 7.1.1 jailbreak uses expired enterprise certificate loophole"] (iDownloadBlog, June 2014): "According to his tweets, MuscleNerd says that the most unique part of the Pangu jailbreak is that it uses an expired enterprise certificate as an injection vector. He adds that enterprise certificates are something that have been out of bounds for the iPhone Dev Team, due to legal reasons, but he is glad that this method was used rather than the Pangu team burning through something more native and powerful."
  +
  +
=== Popcorn Time, April 2015 ===
  +
  +
[http://torrentfreak.com/popcorn-time-releases-jailbreak-free-ios-app-150407/ "Popcorn Time releases iOS app tomorrow, no jailbreak needed"] (TorrentFreak, April 7, 2015): "'All a user will need to do to get Popcorn Time on a non jailbroken iOS device is to download the ‘iOS installer’ to his desktop computer, connect his iOS device to the computer with a USB cable, and then just follow simple instructions that will download the app on the iOS device.'"
  +
  +
[http://www.wired.com/2015/04/popcorn-times-piracy-app-sneaking-onto-iphones/ "How Popcorn Time’s Piracy App Is Sneaking Onto iPhones"] (Wired, April 8, 2015): "But the iOS Installer developer does hint that its workaround exploits 'the ability Apple gives to enterprises to install apps on their workers devices.' To those familiar with Apple’s security measures, that sounds like Popcorn Time is using Apple’s iOS Developer Enterprise Program...The Popcorn-Time.se developer confirmed in an email that the team is in fact using revoked or expired enterprise certificates for the installation, though it’s not exactly clear how merely putting the phone into airplane mode can trick it into accepting those old and invalid certificates."

Revision as of 17:25, 8 April 2015

There is some distribution of apps outside the App Store using provisioning profiles and enterprise certificates, which allows those apps to be installed on non-jailbroken iOS devices. This violates Apple's developer agreements.

Some of them used an expired provisioning profile that required the user to set the device's time back to 2012 before installing the app (the "date trick"). The ability to use expired profiles like that was fixed with iOS 8.1.

There is speculation that these misused enterprise certificates sometimes come from companies that got the certificates from Apple for a seemingly-legitimate purpose, then mysteriously "went out of business" and started up again using those enterprise certificates for shadier purposes.

It's not known how often iOS checks to see whether an enterprise certificate has been revoked. It's possible that iOS doesn't check very often.

Related, there are also people who sell access to normal iOS developer certificates, which allow you to self-sign apps to install them on non-jailbroken iOS devices, meant for developers working on apps. These certificates cost $99/year from Apple, but each certificate can be associated with 100 devices, so people sometimes sell some of those "UDID slots".

Examples

  • iOSEmulatorSpot, JBWithoutJB, and NoJailbreakApps redistribute various apps developed by other people, mostly without permission.
  • Some piracy sites and tools distribute cracked App Store apps that have been re-signed using developer certificates.

Zeusmos, January 2013

"New services bypass Apple DRM to allow pirated iOS app installs without jailbreaking on iPhone, iPad" (TheNextWeb, January 2013): "It’s unclear exactly how Zeusmos achieves its goal, but judging from the pricing and the correlation between UDIDRegistrations, it appears to utilize a developer licensing certificate to install ‘cracked’ apps which have had their DRM (copy protection) stripped."

KuaiYong, April 2013

"When Criminals Exploit Apple's Own App Distribution System, What Hope Is There Of Stamping Out Piracy?" (Forbes, April 2013): "Remarkably, the site is powered by Apple’s own enterprise app distribution system, designed to allow large organizations to provide internal apps to staff. What KuaiYong has done is buy one license and then distribute apps to its customers on the pretext that they’re the company’s own staff."

"Chinese website allows pirating of iOS apps, no jailbreaking required" (Examiner, April 2013): "[Kuaiyong] uses Apple's own enterprise app deployment technology."

Pangu, June 2014

Pangu uses an expired enterprise certificate to help inject the jailbreak, which is removed after the jailbreak is complete.

"iOS 7.1.1 jailbreak uses expired enterprise certificate loophole" (iDownloadBlog, June 2014): "According to his tweets, MuscleNerd says that the most unique part of the Pangu jailbreak is that it uses an expired enterprise certificate as an injection vector. He adds that enterprise certificates are something that have been out of bounds for the iPhone Dev Team, due to legal reasons, but he is glad that this method was used rather than the Pangu team burning through something more native and powerful."

Popcorn Time, April 2015

"Popcorn Time releases iOS app tomorrow, no jailbreak needed" (TorrentFreak, April 7, 2015): "'All a user will need to do to get Popcorn Time on a non jailbroken iOS device is to download the ‘iOS installer’ to his desktop computer, connect his iOS device to the computer with a USB cable, and then just follow simple instructions that will download the app on the iOS device.'"

"How Popcorn Time’s Piracy App Is Sneaking Onto iPhones" (Wired, April 8, 2015): "But the iOS Installer developer does hint that its workaround exploits 'the ability Apple gives to enterprises to install apps on their workers devices.' To those familiar with Apple’s security measures, that sounds like Popcorn Time is using Apple’s iOS Developer Enterprise Program...The Popcorn-Time.se developer confirmed in an email that the team is in fact using revoked or expired enterprise certificates for the installation, though it’s not exactly clear how merely putting the phone into airplane mode can trick it into accepting those old and invalid certificates."