Skip to content

Latest commit

 

History

History
313 lines (238 loc) · 17.5 KB

apple_trust_stores_hot_topic_bkup.md

File metadata and controls

313 lines (238 loc) · 17.5 KB
layout navtitle title pubDate collection permalink description
default
Federal Common Policy CA Removal from Apple Trust Stores Impact
Federal Common Policy CA Removal from Apple Trust Stores Impact
June 8, 2018
announcements
announcements/applepkichanges/
Upcoming changes regarding Apple's Root Certificate Program could impact your agency. The Federal PKI Policy Authority has elected to remove our U.S. Government Root CA certificate (Federal Common Policy CA) from the Apple Operating System Trust Stores. This change will impact government users of Apple iOS, macOS, and tvOS, starting in **September-October 2018**. <br><br> This change will cause government users to receive errors when encountering instances of a Federal PKI CA-issued certificate. You can mitigate the impact for government intranets and government-furnished equipment by using configuration management tools for federal devices.

MY CHANGED VERSION. LACHELLE WAS MAKING CHANGES AT THE SAME TIME, SO THIS VERSION WAS NOT COMMITTED. REVIEWED HER CHANGES WITH RYAN AND AGREED.

Upcoming changes regarding Apple's Root Certificate Program could impact your agency. The Federal PKI Policy Authority (FPKIPA) has elected to remove our U.S. Government Root CA certificate (Federal Common Policy CA [FCPCA/COMMON]) from Apple's pre-installed Operating System Trust Stores.

{% include alert-info.html content="This announcement will be updated as more information and additional procedures become available. Please watch for updates from the Federal PKI listservs, ICAM listservs, and the ICAM Subcommittee." %}

Starting in September-October 2018, government users of Apple iOS, macOS, and tvOS devices will receive errors when encountering instances of a Federal PKI CA-issued certificate. You can mitigate the impact for government intranets and government-furnished equipment by using configuration management tools for federal devices.

{% include alert-info.html content="The FPKIPA has also elected to remove the Federal Common Policy CA root certificate from Microsoft's Certificate Trust List." %}

How Does This Work?

Apple currently distributes the Federal Common Policy CA (FCPCA/COMMON) through its pre-installed Operating System Trust Stores for iOS, macOS, and tvOS.

Three root CA certificate types reside in Apple's Trust Stores:

  • Trusted Certificates — Trusted certificates that establish a chain of trust.
  • Always Ask — Untrusted certificates that are not blocked. If a resource (e.g., website or signed email) chains to one of these certificates, the Apple Operating System will ask you to choose whether or not to trust it.
  • Blocked — Potentially compromised certificates that will never be trusted.

These certificate types are stored within Apple Keychains:

  • Login Keychain — Certificates associated with a user account logged into a device.
  • System Keychain — Certificates associated with all user accounts on a device (similar to the Microsoft Windows' Local Machine certificate store).
  • System Roots Keychain — Includes Apple's pre-installed, trusted root CA certificates. COMMON will be removed from this Keychain.

What Will Be Impacted?

These Apple Operating System versions will be impacted:

macOS iOS tvOS
High Sierra (10.13) iOS11 tvOS11

Government users will receive errors on government-furnished equipment if any of these are true:

  1. Logging into a government network with a PIV credential
  2. Authenticating to a government Virtual Private Network (VPN) endpoint with a PIV credential
  3. Authenticating to an internet-facing, government collaboration portal with a PIV credential
  4. Browsing with Safari, Chrome, or Edge (iOS) to a government intranet website that uses a Federal PKI CA-issued TLS/SSL certificate
  5. Opening an Apple Mail or Microsoft Outlook email that was digitally signed using a Federal PKI CA-issued certificate
  6. Opening a Microsoft Office document that was digitally signed with a Federal PKI CA-issued certificate

This change will also impact Federal Government partners that rely on COMMON—for example, a Department of Defense employee sending a digitally signed email to a business partner.

You can mitigate the risk to government missions, intranets, applications, and government-furnished equipment.

{% include alert-info.html content="If you are unsure whether your applications will be affected, email us at [email protected]." %}

What Should I Do?

These procedures are intended for Enterprise Administrators and/or Network Engineers.

macOS — Download COMMON Options

You will need to download the COMMON root CA certificate and install it on government-furnished Apple devices by using one of these options:

When downloading the COMMON root CA certificate, you'll need to verify that it contains these details:

Federal Common Policy CA (FCPCA/COMMON) Certificate Details
Federal Common Policy CA
(sometimes shown as U.S. Government Common Policy)
http://http.fpki.gov/fcpca/fcpca.crt
Distinguished Name cn=Federal Common Policy CA, ou=FPKI, o=U.S. Government, c=US
SHA-1 Thumbprint 90 5f 94 2f d9 f2 8f 67 9b 37 81 80 fd 4f 84 63 47 f6 45 c1
SHA-256 Thumbprint 89 4e bc 0b 23 da 2a 50 c0 18 6b 7f 8f 25 ef 1f 6b 29 35 af 32 a9 45 84 ef 80 aa f8 77 a3 a0 6e

{% include alert-warning.html content="You should never install a root certificate without verifying it." %}

Note:  For all options, replace {DOWNLOAD_LOCATION} with your preferred file download location (e.g., /Users/Sam.Jackson/Downloads).

Option 1. Download COMMON Using a Web Browser

  1. Open your web browser.

  2. Navigate to the COMMON root CA certificate{:target="_blank"}.

  3. When prompted, save the certificate file to your download location.

  4. Click the Spotlight icon and search for terminal.

  5. Double-click the Terminal icon (black monitor icon with white ">_") to open a window.

  6. Verify that the certificate's hash matches the SHA-256 Thumbprint in the certificate details:

    $ shasum -a 256 {DOWNLOAD_LOCATION}/fcpca.crt
    

Option 2. Download COMMON Using Terminal

  1. Click the Spotlight icon and search for terminal.

  2. Double-click the Terminal icon (black monitor icon with white ">_") to open a window.

  3. Download a copy of the COMMON root CA certificate:

    $ curl -o {DOWNLOAD_LOCATION}/fcpca.crt "http://http.fpki.gov/fcpca/fcpca.crt"
    
  4. Verify that the certificate's hash matches the SHA-256 Thumbprint in the certificate details:

    $ shasum -a 256 {DOWNLOAD_LOCATION}/fcpca.crt
    

Option 3. Email Us

To request an out-of-band copy of the COMMON root CA certificate to download, email us at [email protected].

macOS — Install COMMON Options

You can install COMMON in your macOS device's Trust Store by using one of these options:

Option 1. Install COMMON Using an Apple Configuration Profile

These procedures are intended for Enterprise Administrators.

You can create Apple Configuration Profiles (XML files) to distribute trusted root certificates across an Enterprise's Apple devices. A Ready-To-Use Apple Configuration Profile is also presented in this section for installing COMMON.

Create Configuration Profiles to Install COMMON

One way to create a Configuration Profile for macOS, iOS, and tvOS is by using Apple's free Configurator 2 application:

  1. Download and install Configurator 2 from the Apple App Store.
  2. Open Configurator and click File -> New Profile.
  3. Under General, enter a unique profile Name. ("Federal Common Policy Certification Authority Profile" was used for the below example.)
  4. Enter a unique profile Identifier. ("FCPCA-0001" was used for the below example.)
  5. Browse to local certificate copies on your device. Select those that you'd like to add to the profile. (For the below example, a copy of the Federal Common Policy CA root certificate was used.)
  6. Click File -> Save to save your profile to a preferred file location.
  7. Close Configurator 2.
Ready-To-Use Configuration Profile To Install COMMON

The example configuration profile below (created with Configurator 2) will install COMMON as a trusted root CA for both macOS and iOS. Before using the profile, you should verify its suitability for your agency.

To repurpose the profile, save it with a .mobileconfig extension.

For more information, see: Apple Configuration Profile Reference{:target="_blank"}

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<dict>
	<key>PayloadContent</key>
	<array>
		<dict>
			<key>PayloadCertificateFileName</key>
			<string>fcpca.crt</string>
			<key>PayloadContent</key>
			<data>
			MIIEYDCCA0igAwIBAgICATAwDQYJKoZIhvcNAQELBQAwWTELMAkG
			A1UEBhMCVVMxGDAWBgNVBAoTD1UuUy4gR292ZXJubWVudDENMAsG
			A1UECxMERlBLSTEhMB8GA1UEAxMYRmVkZXJhbCBDb21tb24gUG9s
			aWN5IENBMB4XDTEwMTIwMTE2NDUyN1oXDTMwMTIwMTE2NDUyN1ow
			WTELMAkGA1UEBhMCVVMxGDAWBgNVBAoTD1UuUy4gR292ZXJubWVu
			dDENMAsGA1UECxMERlBLSTEhMB8GA1UEAxMYRmVkZXJhbCBDb21t
			b24gUG9saWN5IENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB
			CgKCAQEA2HX7NRY0WkG/Wq9cMAQUHK14RLXqJup1YcfNNnn4fNi9
			KVFmWSHjeavUeL6wLbCh1bI1FiPQzB6+Duir3MPJ1hLXp3JoGDG4
			FyKyPn66CG3G/dFYLGmgA/Aqo/Y/ISU937cyxY4nsyOl4FKzXZbp
			sLjFxZ+7xaBugkC7xScFNknWJidpDDSPzyd6KgqjQV+NHQOGgxXg
			VcHFmCye7Bpy3EjBPvmE0oSCwRvDdDa3ucc2Mnr4MrbQNq4iGDGM
			UHMhnv6DOzCIJOPpwX7e7ZjHH5IQip9bYi+dpLzVhW86/clTpyBL
			qtsgqyFOHQ1O5piF5asRR12dP8QjwOMUBm7+nQIDAQABo4IBMDCC
			ASwwDwYDVR0TAQH/BAUwAwEB/zCB6QYIKwYBBQUHAQsEgdwwgdkw
			PwYIKwYBBQUHMAWGM2h0dHA6Ly9odHRwLmZwa2kuZ292L2ZjcGNh
			L2NhQ2VydHNJc3N1ZWRCeWZjcGNhLnA3YzCBlQYIKwYBBQUHMAWG
			gYhsZGFwOi8vbGRhcC5mcGtpLmdvdi9jbj1GZWRlcmFsJTIwQ29t
			bW9uJTIwUG9saWN5JTIwQ0Esb3U9RlBLSSxvPVUuUy4lMjBHb3Zl
			cm5tZW50LGM9VVM/Y0FDZXJ0aWZpY2F0ZTtiaW5hcnksY3Jvc3ND
			ZXJ0aWZpY2F0ZVBhaXI7YmluYXJ5MA4GA1UdDwEB/wQEAwIBBjAd
			BgNVHQ4EFgQUrQx6dVzl85jEeZgOrCj9l/TnAvwwDQYJKoZIhvcN
			AQELBQADggEBAI9z2uF/gLGH9uwsz9GEYx728Yi3mvIRte9UrYpu
			GDco71wb5O9Qt2wmGCMiTR0mRyDpCZzicGJxqxHPkYnos/UqoEfA
			FMtOQsHdDA4b8Idb7OV316rgVNdF9IU+7LQd3nyKf1tNnJaK0KIy
			n9psMQz4pO9+c+iR3Ah6cFqgr2KBWfgAdKLI3VTKQVZHvenAT+0g
			3eOlCd+uKML80cgX2BLHb94u6b2akfI8WpQukSKAiaGMWMyDeiYZ
			dQKlDn0KJnNR6obLB6jI/WNaNZvSr79PMUjBhHDbNXuaGQ/lj/Rq
			DG8z2esccKIN47lQA2EC/0rskqTcLe4qNJMHtyznGI8=
			</data>
			<key>PayloadDescription</key>
			<string>Adds a CA root certificate</string>
			<key>PayloadDisplayName</key>
			<string>Federal Common Policy CA</string>
			<key>PayloadIdentifier</key>
			<string>com.apple.security.root.1EB75E7D-C3BC-46C2-AF42-51D80A2E12FC</string>
			<key>PayloadType</key>
			<string>com.apple.security.root</string>
			<key>PayloadUUID</key>
			<string>1EB75E7D-C3BC-46C2-AF42-51D80A2E12FC</string>
			<key>PayloadVersion</key>
			<integer>1</integer>
		</dict>
	</array>
	<key>PayloadDisplayName</key>
	<string>Federal Common Policy Certification Authority Profile</string>
	<key>PayloadIdentifier</key>
	<string>FCPCA-0001</string>
	<key>PayloadRemovalDisallowed</key>
	<false/>
	<key>PayloadType</key>
	<string>Configuration</string>
	<key>PayloadUUID</key>
	<string>AAD17D9A-DA41-4197-9F0F-3C3C6B4512F9</string>
	<key>PayloadVersion</key>
	<integer>1</integer>
</dict>
</plist>
Distribute Apple Configuration Profiles To Install COMMON

Use any of these options to distribute your configuration profiles:

  1. Via Apple's free Configurator 2 application with devices connected via USB
  2. In an email message
  3. On a webpage
  4. Over-the-air profile delivery and configuration{:target="_blank"}
  5. Over-the-air using a Mobile Device Management server{:target="_blank"}

Option 2. Install COMMON Using Command Line

  1. Install the COMMON root CA certificate as a Trusted Root:

    $ sudo security add-trusted-cert -d -r trustRoot -k "/Library/Keychains/System.keychain" {DOWNLOAD_LOCATION}/fcpca.crt
    

Option 3. Install COMMON Using Apple Keychain

  1. Browse to your downloaded copy of the COMMON root CA certificate.
  2. Double-click on the file.
  3. When prompted, enter your password to install the certificate.

Non-administrative users may follow the steps above to install COMMON in the Login Keychain, which is specific to their accounts. This will not impact other user accounts on a device.

iOS — Install COMMON Options

You can install COMMON in your iOS device's Trust Store by using one of these options:

Option 1. Install COMMON Using Safari Web Browser

  1. Open Safari.
  2. Navigate to the COMMON root CA certificate{:target="_blank"}

System message appears: The website is trying to open Settings to show you a configuration profile. Do you want to allow this?

  1. Click Allow.

The COMMON Configuration Profile appears.

  1. Click More Details and then the COMMON certificate entry.
  2. Scroll down to Fingerprints and verify the certificate's SHA-256 hash.
  3. At top left of screen, click Back and Install Profile. Then, click Install (top right).
  4. When prompted, enter your device passcode.
  5. Click Install (top right), and Install again.
  6. Click Done.

Next, you'll need to enable full trust for COMMON:

  1. From the iOS device's Home screen, go to Settings -> General -> About -> Certificate Trust Settings.
  2. Beneath Enable Full Trust for Root Certificates, toggle ON for the Federal Common Policy CA entry.
  3. When certificate appears, click Continue.
  4. You can now successfully navigate to an intranet site whose TLS certificate was issued by a Federal PKI CA.

Option 2. Install COMMON Using Apple Configuration Profile

You can use the macOS configuration profile procedures above to install COMMON on iOS devices: Apple Configuration Profiles.

tvOS — Install COMMON Options

If you would like to install COMMON on tvOS government-furnished equipment, email us at [email protected].

Frequently Asked Questions

  1. Now is the time
  2. And now is the time
  3. Now is always the time

1.  Is PIV network login impacted?

Yes.

2.  What versions are affected?

Please see What Will Be Impacted?.

Additional Resources

  1. COMMON Removal from Microsoft Certificate Trust List){:target="_blank"}.
  2. macOS Available Trusted Root Certificates List{:target="_blank"}
  3. iOS Available Trusted Root Certificates List{:target="_blank"}
  4. tvOS Available Trusted Root Certificates{:target="_blank"}
  5. Apple Keychains{:target="_blank"}
  6. Apple Configuration Profile Reference{:target="_blank"}
  7. Over-the-Air Profile Delivery and Configuration{:target="_blank"}
  8. Mobile Device Management Best Practices{:target="_blank"}