MDM systems and the devices they manage do not always provide the necessary level of transparency for troubleshooting unexpected issues. Deploying certificates via SCEP is often one such case, where we may encounter multiple black boxes:
- Generation of the SCEP configuration for a managed device by the MDM.
- The SCEP client on the managed device generates a CSR and sends it to the CA via a SCEP PKIOperation HTTP POST message.
- The CA and its process to generate and sign the certificate.
It can be very useful to inspect exactly what the client sends to the server. For PKIOperation, the SCEP client uses a CMS/PKCS#7 payload with an inner envelope encrypted using the public key from one of the certificates provided by the server in the GetCACert message. If you have access to the corresponding private key, the message can be easily intercepted and decrypted.
😞 This method won’t work if the SCEP server disregards the RFC 8894 Section 7.10 recommendation to use plain HTTP and instead places the entire exchange inside a TLS transport tunnel – HTTPS.
‼️The guide uses openssl
command. While the subcommands are pretty standard they might not work on LibreSSL variant (which Apple ships with macOS). You may need to install pure OpenSSL.
(1) Use Wireshark or a similar tool to capture the network traffic when the SCEP client requests a certificate from the SCEP server. Interception can be performed on either the client or the server. Locate an HTTP POST message with $operation=PKIOperation
in the URL and extract the binary content of the packet into a file – payload.p7b
.
You can display certificate data by using following openssl
command:
openssl pkcs7 -inform DER -in payload.p7b -print_certs -text
(2) Convert the binary DER format into PEM base64. openssl
expects PEM by default so we won’t have explicitly define DER with -inform DER
for each command.
openssl pkcs7 -inform DER -outform PEM -in payload.p7b -out payload.p7m
(3) Parse the payload.p7m
file to see all data not just certificates:
openssl asn1parse -in payload.p7m
Look for inner PKCS7 envelope defined as pkcs7-data
:
0:d=0 hl=4 l=3029 cons: SEQUENCE
4:d=1 hl=2 l= 9 prim: OBJECT :pkcs7-signedData
15:d=1 hl=4 l=3014 cons: cont [ 0 ]
19:d=2 hl=4 l=3010 cons: SEQUENCE
23:d=3 hl=2 l= 1 prim: INTEGER :01
26:d=3 hl=2 l= 15 cons: SET
28:d=4 hl=2 l= 13 cons: SEQUENCE
30:d=5 hl=2 l= 9 prim: OBJECT :sha256
41:d=5 hl=2 l= 0 prim: NULL
43:d=3 hl=4 l=1514 cons: SEQUENCE
47:d=4 hl=2 l= 9 prim: OBJECT :pkcs7-data
58:d=4 hl=4 l=1499 cons: cont [ 0 ]
62:d=5 hl=4 l=1495 prim: OCTET STRING [HEX DUMP]:3080060..0000000000000
(4) We are interested in the hexadecimal data, which in this example starts at offset 62. This is the encrypted inner PKCS#7 envelope containing the CSR and usually the SCEP challenge secret. Extract this data into a separate file.
openssl asn1parse -in payload.p7m -strparse 62 -out inner_payload.p7m
(5) Decrypt the inner PKCS7 envelope by using the SCEP server certificate and private key.
openssl smime -decrypt -in inner_payload.p7m -inform DER -recip scep_server_certificate.crt -inkey scep_server_certificate.key -out inner_payload_decrypted.p7m
(6) And finally read the CSR (Make sure to use OpenSSL and not LibreSSL for this one).
openssl req -in inner_payload_decrypted.p7m -noout -text