I am trying to mitigate SSL bypassing on a jailbroken iOS. I am unable to find any good work around as Mobile Substrate and SSL kill switch are able to bypass SSL.
I have tried two things:
- SSL Pinning
- Detect jailbreak and stop the application
Both can be cracked. My application handles confidential data so securing from SSL kill switch and mobile substrate is necessary.
Edit: Thanks everyone for your wonderful responses. I recently came across a security project OWASP, containing the top risks developers ignore during the developement phases. So my checklist got a whole lot bigger:
- Weak Server Side Controls
- Insecure Data Storage
- Insufficient Transport Layer Protection
- Unintended Data Leakage
- Poor Authorization and Authentication
- Broken Cryptography
- Client Side Injection
- Security Decisions Via Untrusted Inputs
- Improper Session Handling
- Lack of Binary Protections
They also have a cheatsheet for iOS security testing. So taking all the security measurements are a head ache and i don't think my employer is ready for it since its a time consuming effort. So from the list I am choosing:
- Securing data storage
- TLS(Authorization and Authentication i.e. 2 way SSL)
- Binary protection
Any opinion in this regard as if securing these 3 will be enough? Also the application I am working on is an e-banking application if someone is wordering.