github.com/psiphon-labs/psiphon-tunnel-core@v2.0.28+incompatible/MobileLibrary/iOS/USAGE.md (about)

     1  # Using the Psiphon iOS Library
     2  
     3  ## Overview
     4  
     5  Psiphon Library for iOS enables you to easily embed Psiphon in your iOS app.
     6  You can then tunnel requests through Psiphon, ensuring that your app can't be
     7  blocked by censors.
     8  
     9  The Psiphon Library is available as a XCFramework bundle `.xcframework` that can be easily included
    10  in your project using these instructions.
    11  
    12  ## Requirements
    13  
    14  Psiphon Library for iOS requires Xcode 11 or above.
    15  If using CocoaPods, CocoaPods version 1.10 or greater is required.
    16  
    17  ## Using the Library in your App
    18  
    19  **First step:** Review the sample app, located under `SampleApps`.
    20  This code is a canonical guide for integrating the Library.
    21  
    22  **Second step:** Review the comments in [`PsiphonTunnel.h`](PsiphonTunnel/PsiphonTunnel/PsiphonTunnel.h). They describe the interface and delegate requirements.
    23  
    24  ### Setting up your project
    25  
    26  1. Get the latest iOS release from the project's [Releases](https://github.com/Psiphon-Labs/psiphon-tunnel-core/releases) page.
    27  
    28  2. Add `PsiphonTunnel.xcframework` to project (drag into project tree).
    29  
    30  3. In the "General" settings for the target, set "Deployment Target" to 9.3.
    31  
    32  4. In the "Build Settings" for the target, under "Build Options", set "Enable Bitcode" to "No".
    33  
    34  5. In the "Build Settings" for the target, click the `+` at the top, then "Add User-Defined Setting". Name the new setting `STRIP_BITCODE_FROM_COPIED_FILES` and set it to `NO`.
    35  
    36  6. In the "Build Phases" for the target, add a "Copy Files" phase. Set "Destination" to "Frameworks". Add `PsiphonTunnel.xcframework` to the list. Ensure "Code Sign on Copy" is checked.
    37  
    38  ## Compiling and testing
    39  
    40  The following architecture targets are compiled into the Library's framework binary: `arm64`, and `x86_64`. This means that the Library can run on phones or in a simulator (on a 64-bit host system).
    41  
    42  When run in a simulator, there may be errors shown in the device log. This does not seem to affect the execution of the app (or Library).
    43  
    44  
    45  ## Online Certificate Status Protocol (OCSP) Leaks
    46  
    47  ### Background
    48  
    49  On iOS, requests which use HTTPS can trigger remote certificate revocation checks. Currently, the OS does this automatically by making plaintext HTTP [OCSP requests](https://en.wikipedia.org/wiki/Online_Certificate_Status_Protocol).
    50  
    51  Unfortunately, these OCSP requests do not respect [connection proxy dictionary settings](https://developer.apple.com/documentation/foundation/nsurlsessionconfiguration/1411499-connectionproxydictionary?language=objc) or [NSURLProtocol](https://developer.apple.com/documentation/foundation/nsurlprotocol) subclasses; they are likely performed out of process. The payload in each plaintext OCSP request leaks the identity of the certificate that is being validated.
    52  
    53  The risk is that an observer can [map the certificate's serial number back to the certificate](https://github.com/OnionBrowser/OnionBrowser/issues/178#issue-437802301) to find more information about the website or server being accessed.
    54  
    55  ### Fix
    56  
    57  A fix has been implemented in both sample apps: [TunneledWebRequest](SampleApps/TunneledWebRequest) and [TunneledWebView](SampleApps/TunneledWebView). This is done by implementing [URLSession:task:didReceiveChallenge:completionHandler:](https://developer.apple.com/documentation/foundation/nsurlsessiontaskdelegate/1411595-urlsession?language=objc) of the [NSURLSessionTaskDelegate](https://developer.apple.com/documentation/foundation/nsurlsessiontaskdelegate) protocol; this allows us to control how revocation checking is performed.
    58  
    59  This allows us to perform OCSP requests manually and ensure that they are tunneled. See the comments in [OCSPAuthURLSessionDelegate.h](https://github.com/Psiphon-Labs/OCSPCache/blob/b945a5784cd88ed5693a62a931617bd371f3c9a8/OCSPCache/Classes/OCSPAuthURLSessionDelegate.h) and both sample apps for a reference implementation.
    60  
    61  OCSPAuthURLSessionDelegate is part of [OCSPCache](https://github.com/Psiphon-Labs/OCSPCache), which is a CocoaPod developed for constructing OCSP requests and caching OCSP responses.
    62  
    63  
    64  ## Proxying a web view
    65  
    66  `WKWebView` _cannot_ be proxied. `UIWebView` _can_ be. Some [googling](https://www.google.ca/search?q=uiwebview+nsurlprotocol+proxy) should provide many example of how to do this. Here is some extensive information for [Objective-C](https://www.raywenderlich.com/59982/nsurlprotocol-tutorial) and [Swift](https://www.raywenderlich.com/76735/using-nsurlprotocol-swift).
    67  
    68  We have provided a reference implementation for proxying `UIWebView` in [TunneledWebView](SampleApps/TunneledWebView). The shortcomings of this implementation are discussed in [SampleApps/TunneledWebView/README.md](SampleApps/TunneledWebView/README.md#-caveats-).
    69  
    70  ## Other notes
    71  
    72  If you encounter an app crash due to `SIGPIPE`, please let us know. This occurs in the debugger, but it's not clear if it happens in a production app (or is a problem). If you encounter a `SIGPIPE` breakpoint while running under the debugger, follow [these instructions](https://plus.google.com/113241179738681655641/posts/BmMiY8mpsB7) to disable it.