layout | navtitle | title | pubDate | collection | permalink | description |
---|---|---|---|---|---|---|
default |
Federal Common Policy CA Removal from Apple Trust Stores Impact |
Federal Common Policy CA Removal from Apple Trust Stores Impact |
June 8, 2018 |
announcements |
announcements/applepkichanges/ |
Upcoming changes regarding Apple's Root Certificate Program could impact your agency. The Federal PKI Policy Authority has elected to remove our U.S. Government Root CA certificate (Federal Common Policy CA) from the Apple Operating System Trust Stores. This change will impact government users of Apple iOS, macOS, and tvOS, starting in **September-October 2018**. <br><br> This change will cause government users to receive errors when encountering instances of a Federal PKI CA-issued certificate. You can mitigate the impact for government intranets and government-furnished equipment by using configuration management tools for federal devices. |
MY CHANGED VERSION. LACHELLE WAS MAKING CHANGES AT THE SAME TIME, SO THIS VERSION WAS NOT COMMITTED. REVIEWED HER CHANGES WITH RYAN AND AGREED.
Upcoming changes regarding Apple's Root Certificate Program could impact your agency. The Federal PKI Policy Authority (FPKIPA) has elected to remove our U.S. Government Root CA certificate (Federal Common Policy CA [FCPCA/COMMON]) from Apple's pre-installed Operating System Trust Stores.
{% include alert-info.html content="This announcement will be updated as more information and additional procedures become available. Please watch for updates from the Federal PKI listservs, ICAM listservs, and the ICAM Subcommittee." %}
Starting in September-October 2018, government users of Apple iOS, macOS, and tvOS devices will receive errors when encountering instances of a Federal PKI CA-issued certificate. You can mitigate the impact for government intranets and government-furnished equipment by using configuration management tools for federal devices.
{% include alert-info.html content="The FPKIPA has also elected to remove the Federal Common Policy CA root certificate from Microsoft's Certificate Trust List." %}
- How Does this Work?
- What Will Be Impacted?
- What Should I Do?
- Frequently Asked Questions
- Additional Resources
Apple currently distributes the Federal Common Policy CA (FCPCA/COMMON) through its pre-installed Operating System Trust Stores for iOS, macOS, and tvOS.
Three root CA certificate types reside in Apple's Trust Stores:
- Trusted Certificates — Trusted certificates that establish a chain of trust.
- Always Ask — Untrusted certificates that are not blocked. If a resource (e.g., website or signed email) chains to one of these certificates, the Apple Operating System will ask you to choose whether or not to trust it.
- Blocked — Potentially compromised certificates that will never be trusted.
These certificate types are stored within Apple Keychains:
- Login Keychain — Certificates associated with a user account logged into a device.
- System Keychain — Certificates associated with all user accounts on a device (similar to the Microsoft Windows' Local Machine certificate store).
- System Roots Keychain — Includes Apple's pre-installed, trusted root CA certificates. COMMON will be removed from this Keychain.
These Apple Operating System versions will be impacted:
macOS | iOS | tvOS |
---|---|---|
High Sierra (10.13) | iOS11 | tvOS11 |
Government users will receive errors on government-furnished equipment if any of these are true:
- Logging into a government network with a PIV credential
- Authenticating to a government Virtual Private Network (VPN) endpoint with a PIV credential
- Authenticating to an internet-facing, government collaboration portal with a PIV credential
- Browsing with Safari, Chrome, or Edge (iOS) to a government intranet website that uses a Federal PKI CA-issued TLS/SSL certificate
- Opening an Apple Mail or Microsoft Outlook email that was digitally signed using a Federal PKI CA-issued certificate
- Opening a Microsoft Office document that was digitally signed with a Federal PKI CA-issued certificate
This change will also impact Federal Government partners that rely on COMMON—for example, a Department of Defense employee sending a digitally signed email to a business partner.
You can mitigate the risk to government missions, intranets, applications, and government-furnished equipment.
{% include alert-info.html content="If you are unsure whether your applications will be affected, email us at [email protected]." %}
These procedures are intended for Enterprise Administrators and/or Network Engineers.
You will need to download the COMMON root CA certificate and install it on government-furnished Apple devices by using one of these options:
- Option 1. Download COMMON Using a Web Browser
- Option 2. Download COMMON Using Terminal
- Option 3. Email Us
When downloading the COMMON root CA certificate, you'll need to verify that it contains these details:
Federal Common Policy CA (FCPCA/COMMON) | Certificate Details |
---|---|
Federal Common Policy CA (sometimes shown as U.S. Government Common Policy) |
http://http.fpki.gov/fcpca/fcpca.crt |
Distinguished Name | cn=Federal Common Policy CA, ou=FPKI, o=U.S. Government, c=US |
SHA-1 Thumbprint | 90 5f 94 2f d9 f2 8f 67 9b 37 81 80 fd 4f 84 63 47 f6 45 c1 |
SHA-256 Thumbprint | 89 4e bc 0b 23 da 2a 50 c0 18 6b 7f 8f 25 ef 1f 6b 29 35 af 32 a9 45 84 ef 80 aa f8 77 a3 a0 6e |
{% include alert-warning.html content="You should never install a root certificate without verifying it." %}
Note: For all options, replace {DOWNLOAD_LOCATION} with your preferred file download location (e.g., /Users/Sam.Jackson/Downloads
).
-
Open your web browser.
-
Navigate to the COMMON root CA certificate{:target="_blank"}.
-
When prompted, save the certificate file to your download location.
-
Click the Spotlight icon and search for terminal.
-
Double-click the Terminal icon (black monitor icon with white ">_") to open a window.
-
Verify that the certificate's hash matches the SHA-256 Thumbprint in the certificate details:
$ shasum -a 256 {DOWNLOAD_LOCATION}/fcpca.crt
-
Click the Spotlight icon and search for terminal.
-
Double-click the Terminal icon (black monitor icon with white ">_") to open a window.
-
Download a copy of the COMMON root CA certificate:
$ curl -o {DOWNLOAD_LOCATION}/fcpca.crt "http://http.fpki.gov/fcpca/fcpca.crt"
-
Verify that the certificate's hash matches the SHA-256 Thumbprint in the certificate details:
$ shasum -a 256 {DOWNLOAD_LOCATION}/fcpca.crt
To request an out-of-band copy of the COMMON root CA certificate to download, email us at [email protected].
You can install COMMON in your macOS device's Trust Store by using one of these options:
- Option 1. Install COMMON Using an Apple Configuration Profile
- Option 2. Install COMMON Using Command Line
- Option 3. Install COMMON Using Apple Keychain
These procedures are intended for Enterprise Administrators.
You can create Apple Configuration Profiles (XML files) to distribute trusted root certificates across an Enterprise's Apple devices. A Ready-To-Use Apple Configuration Profile is also presented in this section for installing COMMON.
- Create Configuration Profiles to Install COMMON
- Ready-To-Use Configuration Profile To Install COMMON
- Distribute Configuration Profiles To Install COMMON
One way to create a Configuration Profile for macOS, iOS, and tvOS is by using Apple's free Configurator 2 application:
- Download and install Configurator 2 from the Apple App Store.
- Open Configurator and click File -> New Profile.
- Under General, enter a unique profile Name. ("Federal Common Policy Certification Authority Profile" was used for the below example.)
- Enter a unique profile Identifier. ("FCPCA-0001" was used for the below example.)
- Browse to local certificate copies on your device. Select those that you'd like to add to the profile. (For the below example, a copy of the Federal Common Policy CA root certificate was used.)
- Click File -> Save to save your profile to a preferred file location.
- Close Configurator 2.
The example configuration profile below (created with Configurator 2) will install COMMON as a trusted root CA for both macOS and iOS. Before using the profile, you should verify its suitability for your agency.
To repurpose the profile, save it with a .mobileconfig
extension.
For more information, see: Apple Configuration Profile Reference{:target="_blank"}
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<dict>
<key>PayloadContent</key>
<array>
<dict>
<key>PayloadCertificateFileName</key>
<string>fcpca.crt</string>
<key>PayloadContent</key>
<data>
MIIEYDCCA0igAwIBAgICATAwDQYJKoZIhvcNAQELBQAwWTELMAkG
A1UEBhMCVVMxGDAWBgNVBAoTD1UuUy4gR292ZXJubWVudDENMAsG
A1UECxMERlBLSTEhMB8GA1UEAxMYRmVkZXJhbCBDb21tb24gUG9s
aWN5IENBMB4XDTEwMTIwMTE2NDUyN1oXDTMwMTIwMTE2NDUyN1ow
WTELMAkGA1UEBhMCVVMxGDAWBgNVBAoTD1UuUy4gR292ZXJubWVu
dDENMAsGA1UECxMERlBLSTEhMB8GA1UEAxMYRmVkZXJhbCBDb21t
b24gUG9saWN5IENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB
CgKCAQEA2HX7NRY0WkG/Wq9cMAQUHK14RLXqJup1YcfNNnn4fNi9
KVFmWSHjeavUeL6wLbCh1bI1FiPQzB6+Duir3MPJ1hLXp3JoGDG4
FyKyPn66CG3G/dFYLGmgA/Aqo/Y/ISU937cyxY4nsyOl4FKzXZbp
sLjFxZ+7xaBugkC7xScFNknWJidpDDSPzyd6KgqjQV+NHQOGgxXg
VcHFmCye7Bpy3EjBPvmE0oSCwRvDdDa3ucc2Mnr4MrbQNq4iGDGM
UHMhnv6DOzCIJOPpwX7e7ZjHH5IQip9bYi+dpLzVhW86/clTpyBL
qtsgqyFOHQ1O5piF5asRR12dP8QjwOMUBm7+nQIDAQABo4IBMDCC
ASwwDwYDVR0TAQH/BAUwAwEB/zCB6QYIKwYBBQUHAQsEgdwwgdkw
PwYIKwYBBQUHMAWGM2h0dHA6Ly9odHRwLmZwa2kuZ292L2ZjcGNh
L2NhQ2VydHNJc3N1ZWRCeWZjcGNhLnA3YzCBlQYIKwYBBQUHMAWG
gYhsZGFwOi8vbGRhcC5mcGtpLmdvdi9jbj1GZWRlcmFsJTIwQ29t
bW9uJTIwUG9saWN5JTIwQ0Esb3U9RlBLSSxvPVUuUy4lMjBHb3Zl
cm5tZW50LGM9VVM/Y0FDZXJ0aWZpY2F0ZTtiaW5hcnksY3Jvc3ND
ZXJ0aWZpY2F0ZVBhaXI7YmluYXJ5MA4GA1UdDwEB/wQEAwIBBjAd
BgNVHQ4EFgQUrQx6dVzl85jEeZgOrCj9l/TnAvwwDQYJKoZIhvcN
AQELBQADggEBAI9z2uF/gLGH9uwsz9GEYx728Yi3mvIRte9UrYpu
GDco71wb5O9Qt2wmGCMiTR0mRyDpCZzicGJxqxHPkYnos/UqoEfA
FMtOQsHdDA4b8Idb7OV316rgVNdF9IU+7LQd3nyKf1tNnJaK0KIy
n9psMQz4pO9+c+iR3Ah6cFqgr2KBWfgAdKLI3VTKQVZHvenAT+0g
3eOlCd+uKML80cgX2BLHb94u6b2akfI8WpQukSKAiaGMWMyDeiYZ
dQKlDn0KJnNR6obLB6jI/WNaNZvSr79PMUjBhHDbNXuaGQ/lj/Rq
DG8z2esccKIN47lQA2EC/0rskqTcLe4qNJMHtyznGI8=
</data>
<key>PayloadDescription</key>
<string>Adds a CA root certificate</string>
<key>PayloadDisplayName</key>
<string>Federal Common Policy CA</string>
<key>PayloadIdentifier</key>
<string>com.apple.security.root.1EB75E7D-C3BC-46C2-AF42-51D80A2E12FC</string>
<key>PayloadType</key>
<string>com.apple.security.root</string>
<key>PayloadUUID</key>
<string>1EB75E7D-C3BC-46C2-AF42-51D80A2E12FC</string>
<key>PayloadVersion</key>
<integer>1</integer>
</dict>
</array>
<key>PayloadDisplayName</key>
<string>Federal Common Policy Certification Authority Profile</string>
<key>PayloadIdentifier</key>
<string>FCPCA-0001</string>
<key>PayloadRemovalDisallowed</key>
<false/>
<key>PayloadType</key>
<string>Configuration</string>
<key>PayloadUUID</key>
<string>AAD17D9A-DA41-4197-9F0F-3C3C6B4512F9</string>
<key>PayloadVersion</key>
<integer>1</integer>
</dict>
</plist>
Use any of these options to distribute your configuration profiles:
- Via Apple's free Configurator 2 application with devices connected via USB
- In an email message
- On a webpage
- Over-the-air profile delivery and configuration{:target="_blank"}
- Over-the-air using a Mobile Device Management server{:target="_blank"}
-
Install the COMMON root CA certificate as a Trusted Root:
$ sudo security add-trusted-cert -d -r trustRoot -k "/Library/Keychains/System.keychain" {DOWNLOAD_LOCATION}/fcpca.crt
- Browse to your downloaded copy of the COMMON root CA certificate.
- Double-click on the file.
- When prompted, enter your password to install the certificate.
Non-administrative users may follow the steps above to install COMMON in the Login Keychain, which is specific to their accounts. This will not impact other user accounts on a device.
You can install COMMON in your iOS device's Trust Store by using one of these options:
- Option 1. Install COMMON Using Safari Web Browser
- Option 2. Install COMMON Using Apple Configuration Profile
- Open Safari.
- Navigate to the COMMON root CA certificate{:target="_blank"}
System message appears: The website is trying to open Settings to show you a configuration profile. Do you want to allow this?
- Click Allow.
The COMMON Configuration Profile appears.
- Click More Details and then the COMMON certificate entry.
- Scroll down to Fingerprints and verify the certificate's SHA-256 hash.
- At top left of screen, click Back and Install Profile. Then, click Install (top right).
- When prompted, enter your device passcode.
- Click Install (top right), and Install again.
- Click Done.
Next, you'll need to enable full trust for COMMON:
- From the iOS device's Home screen, go to Settings -> General -> About -> Certificate Trust Settings.
- Beneath Enable Full Trust for Root Certificates, toggle ON for the Federal Common Policy CA entry.
- When certificate appears, click Continue.
- You can now successfully navigate to an intranet site whose TLS certificate was issued by a Federal PKI CA.
You can use the macOS configuration profile procedures above to install COMMON on iOS devices: Apple Configuration Profiles.
If you would like to install COMMON on tvOS government-furnished equipment, email us at [email protected].
- Now is the time
- And now is the time
- Now is always the time
Yes.
Please see What Will Be Impacted?.
- COMMON Removal from Microsoft Certificate Trust List){:target="_blank"}.
- macOS Available Trusted Root Certificates List{:target="_blank"}
- iOS Available Trusted Root Certificates List{:target="_blank"}
- tvOS Available Trusted Root Certificates{:target="_blank"}
- Apple Keychains{:target="_blank"}
- Apple Configuration Profile Reference{:target="_blank"}
- Over-the-Air Profile Delivery and Configuration{:target="_blank"}
- Mobile Device Management Best Practices{:target="_blank"}