

It's also worth noting that I've spotted(when observing the actual traffic with Wireshark) that the server requires the client to send his certificate.Ĭommon Name XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX (UUID) (0), result=5Īpr 27 15:42:07 Ivans-MacBook-Pro.local apsd: Untrusted peer, closing connection immediately (0), result=5 retrying with system rootsĪpr 27 15:42:07 Ivans-MacBook-Pro.local apsd: Failed to evaluate trust: No error. (0), result=5 retrying with revocation checking optionalĪpr 27 15:42:07 Ivans-MacBook-Pro.local apsd: failed to evaluate trust: No error. And this is what I got in the logs: Apr 27 15:42:07 Ivans-MacBook-Pro.local apsd: CFNetwork SSLHandshake failed (-9807)Īpr 27 15:42:07 Ivans-MacBook-Pro.local apsd: Failed to evaluate trust: No error. I then tried to perform a man in the middle attack using a self signed certificate. However using Wireshark I see that the communication between apsd and Apple's server continues. Which I suppose is because Apple did not create a certificate including a wildcard in the common name. Namely "This certificate is not valid(host name mismatch)". Trying: in the browser however shows that there is an issue related to the server certificate.

It seems it is appearing for at least half a year now.Īpsd is a constantly running Apple Push Notification service daemonĪnd it connects to one of the following servers on random:Įvery so often(to check for updates I guess) I've googled it and there are many other users that pasted their logs(many times not even related with that issue) on net that had that message. Recently( more info) I've spotted a strange message in the logs on my quite recent, fresh installation of OS X Mavericks 10.9.2 Apr 27 15:26:47 Ivans-MacBook-Pro.local apsd: Unrecognized leaf certificate
