Active Directory Certificate Services cannot verify certificate chain - Bad Cert Issuer "Base CRL (08)"
hi,
installing adcs enteprise issuing ca running on win2008 r2. windows ca sub ca, offline root ca has issued ca certificate.
when trying "install ca certificate" error message displayed:
active directory certificate services cannot verify certificate chain. wish ignore error , continue? revocation function unable check revication because revication server offline. 0x80092013 (-2146885613)
using certutil -verify -urlfetch wincacert.crt shows there´s cdp problem
----------------------------------------
certcontext[0][0]: dwinfostatus=102 dwerrorstatus=1000040
element.dwinfostatus = cert_trust_has_key_match_issuer (0x2)
element.dwinfostatus = cert_trust_has_preferred_issuer (0x100)
element.dwerrorstatus = cert_trust_revocation_status_unknown (0x40)
element.dwerrorstatus = cert_trust_is_offline_revocation (0x1000000)
---------------- certificate cdp ----------------
bad cert issuer "base crl (08)" time: 0
[0.0] http://crl.domain.com/rootca.crl
bad cert issuer "base crl (08)" time: 0
[1.0] ldap:///cn=rootca,cn=root,cn=cdp,cn=public%20key%20services,cn=services,cn=configura
revocation function unable check revocation because revocation server offline. 0x80092013 (-2146885613)
------------------------------------
revocation check skipped -- server offline
cert ca certificate
error: verifying leaf certificate revocation status returned revocation function unable check revocation because revocation server offline. 0x80092013 (-2146885613)
certutil: revocation function unable check revocation because revocation server offline.
certutil: -verify command completed successfully.
----------------------------------------
in internet explorer, can type in http://crl.domain.com/rootca.crl and download crl, seems reachable.
have imported root ca certificate , crl local certificate store + published them to ad.
suggestions? welcome!
regards, daniel
www.twitter.com/danielullmark
we opened case ms support.
from ms support: issuer field of ca certificate has cert_rdn_utf8_string encoding format while crl signed certificate (appears identical but) has cert_rdn_printable_string encoding format
during certificate chain validation (from end entity trusted root) keyid used create certificate chain , works independently of subject , issuer codification (printablestring or utf8)
during status validation, binary comparison made between certificate issuer , crl issuer, both field must use same codification in order match (printablestring or utf8)
we must re-issue , re-publish crls root ca , make sure encoding of issuer field matches
www.twitter.com/danielullmark
Windows Server > Security
Comments
Post a Comment