You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Get valid LE intermediate certs to tak client zip, in deployments using LE to sign certs.
What I expected
Working connection using ATAK, WinTAK and iTAK.
What I got
Working connection with iTAK, scratch DataSync; ATAK & WinTAK giving errors.
Why
ATAK and WinTAK has to be explicitly told on what LE intermediate CAs they trust for connection (apparently - working to confirm this, at least on Fall 2023 when working on it, this seem to be the case).
Starting from June 2024, LE started to use the RN10 intermediate CA. Thus new deployments got RN10-signed certs in them. The outcome is a mismatch between server and ATAK client trusted certs: server presents LE RN10 while client trusts LE RN3. This problem is/was not evident on any cli or iTAK as for those (for iTAK, apparently) trust whatever certs system trusts.
Error flow
When loading takclientzip to ATAK or WinTAK, I expected a working connection. Instead got the error (on ATAK, similar on WinTAK):
Remote host's certificate not trusted; check truststore
Loading takclientzip to iTAK, everything worked well.
Trying manually to connect using openssl, got to the CoT stream aswell and found that server presents LE RN10 intermediate CA:
Examining client certs, there is LE RN3 cert present.
How to Fix
We need to make python-tak-rmapi templates zip to work so, that all relevant LE intermediate CA chains get inside the client zip / the selection is somehow sane instead of fixed files "dropped" here.
The text was updated successfully, but these errors were encountered:
Bug
Get valid LE intermediate certs to tak client zip, in deployments using LE to sign certs.
What I expected
Working connection using ATAK, WinTAK and iTAK.
What I got
Working connection with iTAK, scratch DataSync; ATAK & WinTAK giving errors.
Why
ATAK and WinTAK has to be explicitly told on what LE intermediate CAs they trust for connection (apparently - working to confirm this, at least on Fall 2023 when working on it, this seem to be the case).
Python-tak-rmapi, at the moment of finding the bug, got the LE intermediate CA to be dropped into the zip, from here: https://github.com/pvarki/python-tak-rmapi/tree/613a9ff56194bd2661771ae25057a9072a2e54fd/src/takrmapi/templates. In there is/was just the LE's "RN3" intermediate CA: https://github.com/pvarki/python-tak-rmapi/blob/613a9ff56194bd2661771ae25057a9072a2e54fd/src/takrmapi/templates/isrg-r3_x1.pem.
Starting from June 2024, LE started to use the RN10 intermediate CA. Thus new deployments got RN10-signed certs in them. The outcome is a mismatch between server and ATAK client trusted certs: server presents LE RN10 while client trusts LE RN3. This problem is/was not evident on any cli or iTAK as for those (for iTAK, apparently) trust whatever certs system trusts.
Error flow
How to Fix
We need to make python-tak-rmapi templates zip to work so, that all relevant LE intermediate CA chains get inside the client zip / the selection is somehow sane instead of fixed files "dropped" here.
The text was updated successfully, but these errors were encountered: