Security.framework: Provide API to determine the Apple-supplied set of default trust anchors

Originator:rsleevi
Number:rdar://25640562 Date Originated:4/9/2016
Status:Open Resolved:
Product:iOS SDK Product Version:9.3.1 (13E238)
Classification:Feature (New) Reproducible:Always
 
Summary:
On OS X, one can determine if a given Root Certificate is part of the Apple-supplied set by invoking SecTrustSettingsCopyCertificates with the kSecTrustSettingsDomainSystem. This can be distinguished from other forms of trust anchors (such as administratively configured or user-configured)

On iOS, no such API exists. As such, after certificate validation succeeds from SecTrustEvaluate, one cannot determine if the overall result was due to an MDM-supplied trust anchor or a trust anchor provided by Apple.

iOS users can set their own custom anchors ( SecTrustSetAnchorCertificates[Only] ) and then retrieve them (SecTrustCopyCustomAnchorCertificates), but that provides no means to see the Apple-supplied set (nor the set in securityd).

This is useful for applications which want to impose policies on publicly trusted CAs (where here, the definition is "in the default OS set from Apple"), without negatively impacting enterprise users. HPKP pinning is one example. Enforcing the Baseline Requirements via application policy is another.

Steps to Reproduce:
1. Attempt to obtain the list of Apple-provided roots (that is, the contents of the "Trust Store" listed in Settings -> General -> About) via programmatic means

Expected Results:
Expected: The set of certificates is returned as a CFArrayRef

Actual Results:
Actual: No such API exists.

Version:
iOS 9.3.1 (13E238)

Notes:


Configuration:
iPhone 6s

Comments


Please note: Reports posted here will not necessarily be seen by Apple. All problems should be submitted at bugreport.apple.com before they are posted here. Please only post information for Radars that you have filed yourself, and please do not include Apple confidential information in your posts. Thank you!