Skip Links

Is iOS jailbreaking an enterprise security threat?

The answer is ‘yes,’ ‘no’ and ‘maybe’

By , Network World
December 17, 2010 08:02 AM ET
Jeremy Allen

Network World - Jailbreaking a smartphone means fiddling with its OS so you can load the applications of your choice, bypassing the requirement to download digitally signed apps only from, say, Apple’s iTunes App Store. Opinions tend to be binary: Either jailbreaking is an unalloyed act of end user liberation and empowerment, or it’s the Digital Apocalypse.

Recently, Apple quietly and without explanation disabled a new API, introduced in iOS 4.0, intended to be used in discovering whether an iOS device had been jailbroken. Software vendors of mobile management applications insist they can, and do, use other techniques to discover that.

Apple’s decision sparked a new round of debate over jailbreaking, but without shifting the binary terms in which the debate has been framed. We went into more details about jailbreaking and the enterprise with Jeremy Allen, a principal consultant with Intrepidus Group, a New York City consulting firm specializing in mobile security. Allen has a background in security and application development, and he focuses on iOS and applications that run on it.

Some will argue that jailbreaking iOS is a right, not a risk. How do you see it?

My general thought on it is that, as shipped, iOS devices add a lot of security due to the code signing of everything on the device. When you live and play in the "Walled Garden of Steve" as I have seen it called, you get a lot of benefits for that...The problem I have is that, usually, big organizations don't let users have administrative privileges on corporate-owned devices [e.g. laptops], so why would we be letting users have them on a corporate-owned iPad?

What does code signing bring to the table for mobile security?

Code signing is a pretty giant roadblock to malware.

On a Windows PC, when you download a program from the Internet, you get a popup that tells you “publisher: unknown” or “publisher: Adobe” and so on. Windows figures that out through code-signing – the code publisher gets a certificate from Verisign, and “signs” the code. That lets you, as the developer, prove you’re the author of the code and that it’s trustworthy.

For iOS devices, you as a developer get a certificate signed by Apple. When the code is downloaded, Apple will lookup the code and make sure it’s properly rooted to the certificate. For iOS devices, if the code signing is not from Apple, and Apple only, you can’t run it. It creates a secure playground. By forcing any code that you want to run on the mobile device to be [first] signed from Apple, you can eliminate a lot of problems.

So what does jailbreaking actually do?

It disables most of the code signing checks.

Apple offers [in iOS] public and private APIs. Any apps in the App Store use only the public APIs. Private APIs aren’t necessarily secret but only Apple can use them, and Apple can change them at any time.

Jailbreaking lets you use the private APIs. Then, you can implement things like multitasking in iOS 3.0 [before Apple partly enabled it in 4.0]. You have more control over the apps you write. And you can put anything you want on your iPhone. At bottom, it’s a Unix device. [So] you can install SSH [Secure Shell] and tunnel into your phone and use it, for example, for tethering. You can change the graphical look and feel of the iPhone pretty significantly.

Our Commenting Policies
Latest News
rssRss Feed
View more Latest News