Re-Hashed: How to Trust Manually Installed Root Certificates in iOS 10.3
1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)

Re-Hashed: How to Trust Manually Installed Root Certificates in iOS 10.3

Apple Tweaked Trust Settings for Profiles, Here’s How to Trust Manually Installed Root Certificates in iOS 10.3.

Apple has introduced a change to how root certificates manually installed via profiles are trusted, requiring an additional explicit action.

Users on iOS 10.3 (and later) who install custom profiles will need to dive into the settings menu to manually turn on trust for any included root certificates. Because it’s rather easy to install a profile, this is an important security measure that makes it slightly harder for a user to inadvertently trust a new root which could then issue device-trusted certificates for any website or service.

Roots installed with Apple Configurator or Mobile Device Management (dedicated tools for enterprise deployment) will still be automatically trusted.

trust manually installed root certificates in iOS

The Security Risk of Profiles

Profiles are configuration files which make it easy to deploy custom settings to an iPhone or iPad. These profiles can contain information needed to access a network or configure email accounts.

Corporations and universities use profiles to easily deploy the settings needed to get a new device onto their network. Consumer-facing services like Xfinity Wifi and Manhattan’s LinkNYC use profiles to allow users to get on their public wifi.

trust manually installed root certificates in iOSBut many users may not realize how powerful profiles can be. Many profiles, such as this one used by Comcast’s Xfinity Wifi, contain root certificates which can be used to establish secure connections.

Trusting a malicious root is one of those nuclear-level “game over” scenarios. In fact, Chromium (the open-source project Google’s Chrome is based on) acknowledges that if an attacker can install a root onto your device, there is nothing the browser can do to protect you.

On Windows and OSX, that is a reasonable. Trusting a root on Windows, for instance, takes quite a few steps including downloading the root, opening the file on your computer, and then going through an import wizard.

On iOS, it is a different story. In Safari, just clicking a button on a webpage can prompt a system dialog to install a custom “profile” which can include root certificates for your device to trust. While this still requires explicit user action, the simplicity of iOS makes it much easier for a user to naively follow this process thinking its the normal or proper thing to do.

This could be used maliciously. After a user installs a profile, the new certificates could be used in a man-in-the-middle attack. This has always been a known vulnerability, but has not been of major concern because while feasible, it’s impractical in most attack scenarios.

While this was not a serious security risk, it’s still good to see Apple adding one more level of ‘are you sure’ checks before allowing a root certificate to run wild.

How Do You Trust Manually Installed Root Certificates in iOS?

If your users are on iOS 10.3, they will need to follow the following steps to trust a certificate included in a profile

  1. Ensure they have installed the profile on their device.
  2. Open Settings.
  3. Navigate to General and then About.
  4. Select Certificate Trust Settings.
  5. Each root that has been installed via a profile will be listed below the heading Enable Full Trust For Root Certificates. Users can toggle on/off trust for each root.

If you are dealing with a large number of organization-controlled devices, you may want to consider using Apple Configurator or Mobile Device Management. Both of these tools are geared towards enterprise, and will automatically trust any included certificates.

Re-Hashed is a regular feature on Hashed Out where we feature an older article that some of our newer readers may not have had an opportunity to read yet. We also take a few minutes to update it as needed. We hope you enjoy, and thanks for reading!