Skip to content

Instructions/scripts for installing root CA for SeaNet web services + CAC for other DOD sites

Notifications You must be signed in to change notification settings

audreytoskin/dod-root-ca-and-cac

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

19 Commits
 
 
 
 
 
 
 
 

Repository files navigation

DOD Root CA and CAC software installation

How to install the root Certificate Authority certificates and Common Access Card / smart card software needed to access US Department Of Defense websites.

Ideally, you should install the root CA certs system-wide on your machine; we have separate instructions below for Windows and Linux. If you don't have administrator privileges on your machine, though, you can at least import the certificates into your web browser, as described in the third main section.

Certain developer build tools may require additional configuration to use the DOD certificates, but that is outside the scope of this document.

For Linux systems

Red Hat family of distributions

Root CA

To install the DOD root CA certificates, you'll also need to install a few certificate management tools:

sudo dnf install -y nss-tools openssl

See the latest "PKI CA Certificate bundle" for DOD PKI, here: https://public.cyber.mil/pki-pke/tools-configuration-files/. The following commands will install the certificates for you, but if Cyber Exchange bumps the version numbers or otherwise renames the files in the Zip archive, you might need to adjust the commands' file paths slightly.

cd ~/Downloads/
wget https://dl.dod.cyber.mil/wp-content/uploads/pki-pke/zip/unclass-certificates_pkcs7_DoD.zip
unzip ./unclass-certificates_pkcs7_DoD.zip
cd ./certificates_pkcs7_v5_13_dod/
sudo openssl pkcs7 -print_certs -inform der -in ./certificates_pkcs7_v5_13_dod_der.p7b -out /etc/pki/ca-trust/source/anchors/DoD_Certs.pem
sudo update-ca-trust

mkdir -p "$HOME/.pki/nssdb"
chmod 'u=rwX,g=,o=' --recursive "$HOME/.pki/nssdb/"
sudo mkdir -p /etc/pki/nssdb
for cert in ./*.p7b
do
    certutil -A -d "sql:${HOME}/.pki/nssdb/" -t TC -n "DOD CA $( basename $cert .p7b )" -i "$cert"
    sudo certutil -A -d "sql:/etc/pki/nssdb/" -t TC -n "DOD CA $( basename $cert .p7b )" -i "$cert"
done

And if you use any Java applications,

keytool -importcert -file /etc/pki/ca-trust/source/anchors/DoD_Certs.pem -cacerts -keypass changeit -storepass changeit -noprompt -alias dod-root-ca

Continue to install CAC software below, before rebooting.

CAC

Fedora users can stick with the distro-default repos, but *Enterprise Linux users will need to enable the Fedora EPEL repo, if you don't have it already.

# For EL8...
sudo dnf install -y "https://dl.fedoraproject.org/pub/epel/epel-release-latest-8.noarch.rpm"
# For EL9...
sudo dnf install -y "https://dl.fedoraproject.org/pub/epel/epel-release-latest-9.noarch.rpm"

And if you're on CentOS Stream, then also enable EPEL Next:

sudo dnf install -y epel-next-release

After that you can install CAC software like any other package:

sudo dnf install -y esc opensc pcsc-lite pcsc-tools
sudo systemctl enable --now pcscd.service

You can test to see if the computer properly recognizes your inserted CAC by running

pcsc_scan

It should fairly quickly list a reader, and card attributes, something like

 Reader 0: Broadcom Corp xxxxx [Contacted SmartCard] (xxxxxxxxxxxxxx) 00 00
  Card state: Card inserted, Shared Mode,
  ATR: XX XX XX XX XX XX XX XX XX XX XX XX XX XX XX

ATR: XX XX XX XX XX XX XX XX XX XX XX XX XX XX XX
+ TS = ...
+ T0 = ...
  TA(1) = ...

Hit Ctrl+C to end the scan.

Reboot.

For Windows

Root CA

Download the InstallRoot installer for Windows from DOD Cyber Exchange --- use the search bar in the Tools section of the page to filter for "InstallRoot Windows".

https://public.cyber.mil/pki-pke/tools-configuration-files/

There you should see both

  • InstallRoot 5.6 NIPR 64-bit Windows Installer (if you are admin on your machine)
  • InstallRoot 5.6 NIPR Non-Administrator 64-bit Windows Installer

Run whichever installer is appropriate for you, follow the instructions for "Install DoD Certificates" at first launch, and then continue to installing CAC software below before you reboot.

If you don't have the necessary permissions to run even the non-admin installer, ideally you should submit a ticket to your help desk, asking them to run the latest InstallRoot (or otherwise add DOD Root CA 3, 4, 5, and 6) for you... But you could import into your browser in the meanwhile, in the section further down.

CAC

Your organization might commonly provide licensed copies of ActivID ActivClient, by HID Global --- if so, you maybe ought to use that, provided by your IT department.

Otherwise, you can get OpenSC for free. Go to the latest release page, and download and run the .msi installer --- most likely you'd want OpenSC-*_win64.msi, and possibly also OpenSC-*_win32.msi for working with legacy applications. (The "light" installers have less features, and for typical PC/workstation users, you probably don't need that tradeoff so there's no point.)

Afterward, you can confirm it's working by inserting into your smartcard reader, and running these commands in PowerShell.

# Test the driver support.
C:\Windows\SysWOW64\certutil.exe -scinfo
# Test PKCS#11 support.
"C:\Program Files\OpenSC Project\OpenSC\tools\pkcs11-tool.exe" --login --test

After installing the certificates and CAC software, you may want to reboot.

Browser-specific settings on desktop/laptop

If you don't have permissions to properly install the root CA at all, you can at least import certificates into your web browser. Go to the Cyber Exchange PKI-PKE home page and click on "New DoD PKI CAs released".

https://public.cyber.mil/pki-pke/

Direct download link:

https://dl.dod.cyber.mil/wp-content/uploads/pki-pke/zip/unclass-certificates_pkcs7_DoD.zip

Unpack the Zip file, and import the contained certificates in each web browser you use.

  • Mozilla Firefox
    1. In the top-right of the window, click on the ≡ menu > Settings.
    2. In the left side-bar, click on Privacy & Security.
    3. Scroll down to the Certificates section, and click View Certificates...
    4. On the Authorities tab, click the Import button.
    5. You probably only need the certificate chain file certificates_pkcs7_v5_13_dod_der.p7b, but Cyber Exchange occasionally changes how the files are formatted, so I just attempt to import all certificates (one at a time) just in case. This is redundant and the browser will mention some certificates were already imported with one of the previous files. Click OK to close the dialog when you're done.
    6. On Linux,if you're manually importing the DOD root CA, you may also need to import the CAC software module:
      1. Back on Settings > Privacy & Security > Certificates, also click on Security Devices.
      2. Click Load.
      3. Enter something descriptive like "OpenSC CAC module" in the Module Name field.
      4. Copy/paste or navigate to the path /usr/lib64/opensc-pkcs11.so for Module Filename.
      5. Click OK to close all dialogs.
    7. Restart your browser and/or reboot.
  • Google Chrome
    1. In the top-right of the window, click on the ⫶ menu > Settings.
    2. In the left side-bar click on Privacy and Security.
    3. In the Privacy and Security section, click on the Security row.
    4. Scroll down and click on Manage Certificates.
    5. On the Authorities tab, click the Import button.
    6. You probably only need the certificate chain file certificates_pkcs7_v5_13_dod_der.p7b, but Cyber Exchange occasionally changes how the files are formatted, so I just attempt to import all certificates (one at a time) just in case. This is redundant and the browser will mention some certificates were already imported with one of the previous files.
    7. Restart your browser and/or reboot.
  • Microsoft Edge
    1. In the top-right of the window, click on the ⋯ menu > Settings.
    2. In the left side-bar, click on Privacy, Search, and Services.
    3. Scroll down to the Security section, and click on Manage Certificates.
    4. On the Trusted Root Certificate Authorities tab, click on Import...
    5. You probably only need the certificate chain file certificates_pkcs7_v5_13_dod_der.p7b, but Cyber Exchange occasionally changes how the files are formatted, so I just attempt to import all certificates (one at a time) just in case. This is redundant and the browser will mention some certificates were already imported with one of the previous files.
    6. Restart your browser and/or reboot.

About

Instructions/scripts for installing root CA for SeaNet web services + CAC for other DOD sites

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published