How to determine at run-time if app is for development, app store or ad hoc distribution?
The easiest way to check is to look at embedded.mobileprovision
([[NSBundle mainBundle] pathForResource:@"embedded.mobileprovision" ofType:nil]
):
- It's a bit of a pain to parse since it's a signed plist (PKCS#7 signed data, according to
openssl asn1parse -inform der
), but a bad hack is to just look for<plist
and</plist>
. - Development contains UDIDs and
<key>get-task-allow</key><true/>
- Ad Hoc distribution contains UDIDs (and get-task-allow=false)
- App Store distribution contains no UDIDs.
The other thing you can check is the entitlements embedded in the executable (otool -l
lists it as LC_CODE_SIGNATURE
). Parsing this is even more tedious (you need to parse the Mach-O header and load commands, and for "universal" binaries which are now the default, you'll need to check the currently-loaded architecture or all architectures).
- Development builds contain
<key>get-task-allow</key><true/>
- Ad Hoc and App Store builds contain
<key>get-task-allow</key><false/>
I don't think the entitlements distinguish between Ad Hoc and App Store builds.
Apart from those and the certificate it's signed with, there's no difference between Development/Ad Hoc/App Store apps (there are a few other things in the entitlements/provisioning profile, but nothing more reliable that I can think of).
Security considerations
Neither of these are that difficult to circumvent. For the first method, the app could just "swizzle" -[NSBundle pathForResource:ofType:]
. The second method is a bit more difficult depending on what API you use to read the file.
openssl asn1parse -inform DEM -in *Mobile_Provision_File* -strparse 54
is the easiest way to access the data that I've found.
EDIT:
security cms -D -i *Mobile_Provision_File*
is actually easier. The openssl command leaves some garbage in the output.
I've extracted an embedded.mobileprovision file and pasted into an online ASN.1 viewer (e.g. http://www.geocities.co.jp/SiliconValley-SanJose/3377/asn1JS.html), and that's what a got:
SEQUENCE {
OBJECTIDENTIFIER 1.2.840.113549.1.7.2 (signedData)
[0] {
SEQUENCE {
INTEGER 1
SET {
SEQUENCE {
OBJECTIDENTIFIER 1.3.14.3.2.26
NULL
}
}
SEQUENCE {
OBJECTIDENTIFIER 1.2.840.113549.1.7.1 (data)
[0] {
OCTETSTRING 3c3f786d6c20766 ... 6c6973743e0a
}
}
[0] {
SEQUENCE {
SEQUENCE {
[0] {
INTEGER 2
}
... [much more]
With this and some ASN.1 knowledge, your explanation makes perfect sense.
The interesting part is the octet string starting 3c3f786d6c. That's the XML part in Apple's property list format that contains all the answers about the distribution type (developer, ad-hoc, App Store).