Iphone - Hardly Pushing :P
:confused:I have h@cktivat3d iphone 2g running 3.0, I have not installed any push fix since there are too many problems reported. I selected subfolders and inbox to sync with my phone but I noticed that via using the fetch feature the subfolders in email do not get sync'ed. Is push feature required to sync subfolders? since fetch doesnt do the needful
Apple May Be Blocking Push Notifications in Unlocked iPhones
Apple May Be Blocking Push Notifications in Unlocked iPhones - unlocked iphone - Gizmodo
We don't have confirmation on this beyond the word of a Czech-based developer who has tested it, but apparently Apple is blocking push notification services in unofficially unlocked iPhones. However, we have tested it and it works.
The developer says the following:
According to technical documentation, every Push application has to request the unique token from the Apple's APNS servers to identify the device it's running on. Thanks to that token, APNS servers always know which device is yours. The token can be understood as an IP address — the server has to know where to send the notification and for which application. APNS can also change your token regularly for higher reliability, so it's critical that the application requests the token again on every start (or when enabling the Push feature) to replace the old one if new token is forced by APNS.
On any unlocked iPhone, the application requesting the token is stuck. APNS does not provide any response at all and the application can either cancel the request completely by automatic timeout or let user wait with the proggress bar forever. Either way, the user will never receive any Push message, because APNS has not provided the token.
However, I have an unlocked iPhone here in Spain and the push notification works perfectly—for example, with AIM. The catch, however, may be that my JesusPhone is using the official Movistar network, not a different one.
Whatever is the case, can Apple legally block these push services to people running iPhones on non-official networks? Would they be interested in doing this on purpose—since unlocked iPhones is such a small percentage of units? Or maybe it's just a technical glitch?
According to the developer, it doesn't matter: They argue that Apple has all the right to block services for these users—since they don't use the official carrier—even while it's hurting its ratings. However, they are asking Apple to provide a way to inform users with unlocked phones about why they don't get push services using third-party applications.
So is becoming more apparent that the token can't be "hacked" as it can be changed by the server at any time. :fail
This won't be fix...anytime soon.
I don't believe "Jailbreaking" is the problem, Unlocking the phone is. I don't believe there is a way for the Dev-Team to hack or fix this. PUSH on unlocked phones might be out of the question.
AppleInsider | Hack can open up iPhone to push messaging exploit Apple's PNS Security
As AppleInsider exclusively reported back in February, Apple's Push Notification Service (PNS) is based on XMPP Publish-Subscribe, an open specification for delivering updated feeds of information using Jabber-style instant messages.
In order to secure the delivery of these messages, Apple uses SSL certificates to securely authenticate the client with the service, similar to how HTTPS websites authenticate themselves to visitors to enable SSL-secured banking, shopping, or other transactions. The iPhone automatically generates itself a private and public key pair, and uses these to register itself with Apple's PNS servers and secure all of its subsequent transactions. The private key and public certificate work together to act as identifying credentials, like a user name and password.
Without having such a mechanism for authenticated identity in place, the iPhone would be deluged by marketers sending push message spam to users, just as spammers have long targeted email, SMS, and Microsoft's Windows Messaging popups, none of which included any inherent security in their designs. Apple's security system prevents users from receiving push message notifications from anyone apart from the system and applications the user explicitly approves. The security layer also prevents malicious users from intercepting messages and it secures users from receiving fake messages to obtain their location or wipe their phone, while enabling users to perform those actions themselves from MobileMe after authenticating. Users don't need to know anything about the underlying certificates used to secure these communications; everything is designed to "just work." Putting the break in jailbreak
Jailbreaking the iPhone involves working around Apple's security system to enable the device to run unsigned software. The iPhone's applications, just like its PNS communications, are encrypted using security certificates to prevent tampering, spoofing, or spying by malicious third parties. Destroying the application security layer of the iPhone does not itself automatically break PNS, but (when combined with an "unofficial activation" required to use it with unofficial service providers) results in the system having no legitimate certificates to use in performing push notifications. Essentially, if the phone is not properly activated as intended through iTunes, the user's credentials for signing into Apple's PNS messaging servers (which are generated by the device itself in normal conditions) are broken along with the application security layer. Dev team hackers trying to get jailbroken, alternatively activated phones to work with PNS allegedly made the mistake of adding an existing certificate to "fix" the problem. The hack simply identifies the new jailbroken phone to Apple as another phone that already exists, enabling messages to be sent to the wrong device.
Users who don't jailbreak their iPhone won't experience any problems with messages being broadcast to random other users. But those who tamper with the iPhone's security system will have to figure out how to generate SSL authentication keys appropriately to enable the phone to work with PNS messages correctly.