(no title)
ZeWaren | 2 years ago
I NEED to be able to add my root cert to the list of certified authorities.
I don't need to change anything to the system provided list. I just need to add mine. It's my device, I'd like to be able to change anything if I want to.
agwa|2 years ago
What is unlikely to work is installing your own CA and using it to intercept traffic between apps and the app-makers' servers. That sucks - you should be able to inspect what your own device is doing - but your use case of using a private PKI for your self-hosted software is definitely supported.
Brian_K_White|2 years ago
charcircuit|2 years ago
It's insecure. If you are a bank app you doesn't want other people to be able to steal the users password by installing a new certificate.
gh02t|2 years ago
jeroenhd|2 years ago
8organicbits|2 years ago
[1] https://www.getlocalcert.net/
Hackbraten|2 years ago
severino|2 years ago
jeroenhd|2 years ago
Browsers opt in, or in the case of Firefox, can be configured through hidden settings to opt in. Many other apps don't, though.
If you're trying to intercept traffic or use apps that should opt in but don't, the system store could be altered with root access so that these apps still trusted the certificates you're trying to inject. However, most apps worth their salt implement certificate pinning, so that's hardly reliable anymore. It's Arnold workaround that works on some apps but not on most.
Furthermore, Google Chrome and derivatives require certificates to be logged publicly so malicious CAs can't mess with random domains. Your private CA isn't logged in the public record, so adding the certificate to the system store actually breaks HTTPS for many browsers. You can add the cert to both stores to make it work, but it's kind of a hack.
On iOS loading certificates is easier, but you'll still need to work around certificate pinning if you want to intercept HTTPS traffic.