[EAS] FW: New Sage Update
Sean Donelan
sean at donelan.com
Thu Sep 6 00:33:20 CDT 2018
On Wed, 5 Sep 2018, Ed Czarnecki wrote:
> It is a "digital cert thing" not so much an "IPAWS thing." And to be fair
> to FEMA IPAWS, they have provided the certs as soon as they got them from
> their source. For whatever reason, certs tend to be generated a month or
> less before expiration date.
Yes, the Federal PKI community is a bit of bizzaro world. They are very
dedicated people who care a lot about PKI. But sometimes their decisions
drive everyone else in government a bit crazy. For example, they are
removing the Federal Common Policy CA from Microsoft, Apple and Android
trust lists, which means IT people have to make a change on millions
of federal laptops, computers and smart phones. If you think EAS
broadcasters are complaining, you should hear the moaning and whining from
the government IT folks ;-)
Trilithic got lucky this time, and doesn't require change to their
certificate store. Trilithic uses the stand-alone IdenTrust Global
Common Root CA instead of the cross-signed version with the Federal Common
Policy CA. The stand-alone IdenTrust cert doesn't expire until 2034. It
works, but doing it that way will likely make the Federal PKI community
cranky.
> We're hoping we all can move towards an automated approach to certificate
> updating (FEMA together with the EAS manufacturing community). We
> understand it's troublesome for the EAS community (whether it's one small
> station with a contract engineer, or a major cable operation with hundreds
> of sites to update). It's also not so great for EAS manufacturers, who need
> to defer other priorities, not to mention handle the hundreds of related
> emails and calls.
In theory, xmldsigned messages, i.e. the CAP XML message distributed by
IPAWS, can include the entire intermediate cert chain used to sign the CAP
message. This would ensure receipients received the same (and complete)
intermediate certificate chain used by the signer. Similar to how
different websites exchange intermediate CA chains with browsers now
instead of loading intermediate CAs in certificate trust stores. Most
certificate trust stores, e.g. Microsoft, Apple, Android only include
Root CAs now.
Alert originators would get the intermediate CA chain at the same time
they obtained their signing certificate. The alert origination software
would add the intermediate CAs as part of the xmldsignature.
But that would require likely alert origination software changes, EAS and
public IPAWS-OPEN client software changes, and lots of testing by
everyone involved.
More information about the EAS
mailing list