Unable to download Root CRL
'Reference: http://social.technet.microsoft.com/Forums/en-US/winserversecurity/thread/589fe93d-c2ec-4075-ad2a-648da0276587 Well, I have the certificate services running on my subordinate CA. The service itself started with no error. However, it looks like the CRL cannot be found in Active Directory, even though the operation completed successfully (using commands noted in link above). This is what I am seeing in Server Manger: https://skydrive.live.com/#cid=6A45A7206EF72D57&id=6A45A7206EF72D57%21416 This is the URL in question: ldap:///CN=MyNet-Root-CA,CN=AIA,CN=Public%20Key%20Services,CN=Services,DC=UnavailableConfigDN?cACertificate?base?objectClass=certificationAuthority
February 13th, 2012 11:26pm

so you can take a look at the location by either the Enterprise PKI MMC snap-in, or go directly using ADSI Edit. You can also use CERTUTIL -URL agains an issued certificate. You just need to check what is happening. Also make sure that your CA is really configured to publish CRLs to that path - seeing the path in a certificate does not necessarily mean the CA is configured to publish to the path iself automatically - go into Extensions tab of the AD CS and select the CRL Distribution Points from the drop-down. ondrej.
Free Windows Admin Tool Kit Click here and download it now
February 14th, 2012 3:43am

This is what ADSIEdit shows for the AIA location: Name Class Distinguished Name CN=mynet-issuing-CA certificationAuthority CN=mynet-issuing-CA,CN=AIA,CN=Public Key Services,CN=Services,CN=Configuration,DC=mynet,DC=int CN=MyNet-Root-CA certificationAuthority CN=MyNet-Root-CA,CN=AIA,CN=Public Key Services,CN=Services,CN=Configuration,DC=mynet,DC=int And for the CDP location (CA1 is the root CA and CA2 is the issuing CA): Name Class Distinguished Name CN=MyNet-Root-CA cRLDistributionPoint CN=MyNet-Root-CA,CN=CA1,CN=CDP,CN=Public Key Services,CN=Services,CN=Configuration,DC=mynet,DC=int Name Class Distinguished Name CN=mynet-issuing-CA cRLDistributionPoint CN=mynet-issuing-CA,CN=CA2,CN=CDP,CN=Public Key Services,CN=Services,CN=Configuration,DC=mynet,DC=int Here are the paths as defined on the CA: ,CN=AIA,CN=Public">ldap:///CN=<CATruncatedName>,CN=AIA,CN=Public Key Services,CN=Services,<ConfigurationContainer><CAObjectClass> Here is the error message in the App log (Event Viewer): Event ID 66 Active Directory Certificate Services could not publish a Base CRL for key 0 to the following location: ldap:///CN=MyNet-Root-CA,CN=CA1,CN=CDP,CN=Public Key Services,CN=Services,DC=UnavailableConfigDN. The specified server cannot perform the requested operation. 0x8007003a (WIN32: 58). Active Directory Certificate Services could not publish a Delta CRL for key 0 to the following location: ldap:///CN=MyNet-Root-CA,CN=CA1,CN=CDP,CN=Public Key Services,CN=Services,DC=UnavailableConfigDN. Operation aborted 0x80004004 (-2147467260).
February 16th, 2012 6:00am

When I published the root cert and the CRLs to Active Directory, I got the error below but after adding the NetBIOS name of the server, I thought I was OK: DsPublish commands ldap:///CN=MyNet-Root-CA,CN=Certification Authorities,CN=Public Key Services,CN=Services,CN=Configuration,DC=mynet,DC=int?cACertificate Certificate added to DS store. ldap:///CN=MyNet-Root-CA,CN=AIA,CN=Public Key Services,CN=Services,CN=Configuration,DC=mynet,DC=int?cACertificate Certificate added to DS store. CertUtil: -dsPublish command completed successfully. If the following error is encountered when publishing the CRL to Active Directory, proceed as follows (indicate the NetBIOS name of the root CA). <br> C:\RootCertnCRL>certutil -dspublish -f MyNet-Root-CA.crl ldap:///CN=MyNet-Root-CA,CN=CA1,CN=CDP,CN=Public Key Services,CN=Services,DC=UnavailableConfigDN?certificateRevocationList?base?objectClass=cRLDistributionPoint ?certificateRevocationList ldap: 0xa: 0000202B: RefErr: DSID-031006E0, data 0, 1 access point ref 1: 'unavailableconfigdn' CertUtil: -dsPublish command FAILED: 0x8007202b (WIN32: 8235) CertUtil: A referral was returned from the server. C:\RootCertnCRL>certutil -dspublish -f MyNet-Root-CA.crl CA1 ldap:///CN=MyNet-Root-CA,CN=CA1,CN=CDP,CN=Public Key Services,CN=Services,CN=Configuration,DC=mynet,DC=int?certificateRevocationList Base CRL added to DS store. CertUtil: -dsPublish command completed successfully. ############################################################################ This workaround is deceiving! It allows the command to succeed but you end up with the wrong DN! -> DC=UnavailableConfigDN? ############################################################################
Free Windows Admin Tool Kit Click here and download it now
February 16th, 2012 6:02am

I found this and tried what follows: On Tuesday, January 13, 2009 8:24 PM Brian Komar \(MVP\) wrote: Hi,This is definitely an incorrect configuration. Hi, This is definitely an incorrect configuration. You need to check two separate objects issued by the root CA. 1) The CRL. If the CRL does not have the correct location, you need to ensure that the post -configuration script on the root CA correctly ran the certutil -setreg CA\DSConfigDN CN=Configuration,DC=testad4,DC=test,DC=com command. [...] If you do a certutil -getreg ca\DSConfigDN at the root CA, what value is shown? Ensure that it matches the defined DN, and then publish a new CRL. You must publish a new CRL before it will read the new DN value and replace the %%6 value in the CRLPublicationURLs registry entry. 2) The subordinate CA certificates. Since you include the LDAP URL in your subordinate CA certificate issued by the root CA, look at the AIA extension of the subordinate CA certificate. Does the URL show up as the correct DN or as UnavailableConfigDN. If it Unavailable ConfigDN, then you will have to re-issue the subordinate CA certificate (and all other lower certificates). http://www.derkeiler.com/Newsgroups/microsoft.public.security/2010-04/msg00046.html So I did what follows in an attempt to correct the DN: C:\>certutil -getreg ca\DSConfigDN HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CertSvc\Configuration\MyNet -Root-CA\DSConfigDN: CertUtil: -getreg command FAILED: 0x80070002 (WIN32: 2) CertUtil: The system cannot find the file specified. C:\>certutil -setreg ca\DSConfigDN CN=Configuration,DC=mynet,DC=int SYSTEM\CurrentControlSet\Services\CertSvc\Configuration\MyNet-Root-CA\DSConfigDN : New Value: DSConfigDN REG_SZ = CN=Configuration,DC=mynet,DC=int CertUtil: -setreg command completed successfully. The CertSvc service may need to be restarted for changes to take effect. C:\>net stop certsvc The Active Directory Certificate Services service is stopping. The Active Directory Certificate Services service was stopped successfully. C:\>net start certsvc The Active Directory Certificate Services service is starting. The Active Directory Certificate Services service was started successfully. C:\>certutil -getreg ca\DSConfigDN HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CertSvc\Configuration\MyNet -Root-CA\DSConfigDN: DSConfigDN REG_SZ = CN=Configuration,DC=mynet,DC=int CertUtil: -getreg command completed successfully. ###################################################### But I cannot republish the CRL! I right click on "Revoked Certificates" | All Tasks | Publish Error! "The specified server cannot perform the requested operation. 0x8007003a (WIN32: 58)
February 16th, 2012 6:42am

Does the URL show up as the correct DN or as UnavailableConfigDN. If it Unavailable ConfigDN, then you will have to re-issue the subordinate CA certificate (and all other lower certificates). UnavailableConfigDN...
Free Windows Admin Tool Kit Click here and download it now
February 16th, 2012 7:15am

OK, it's (past) 1 AM but I finally triumphed. Used certutil -setreg command to correct DN (on root CA I think - getting tired). Then completely redid SubCA with transfer of root CA cert and CRLs and import to Store and AD. STILL ended up with a red error icon because I opted not to install CA Web Enrollment and for some reason there was a Delta CRL at the bottom of the hierarchy that wanted a http distribtion point. So I just added that role service to make it happy - and no more red!
February 16th, 2012 9:11am

OK, it's (past) 1 AM but I finally triumphed. Used certutil -setreg command to correct DN. Then completely redid SubCA with transfer of root CA cert and CRLs and import to Store and AD. STILL ended up with a red error icon because I opted not to install CA Web Enrollment and for some reason there was a Delta CRL at the bottom of the hierarchy that wanted a http distribtion point. So I just added that role service to make it happy - and no more red!
Free Windows Admin Tool Kit Click here and download it now
February 16th, 2012 9:11am

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics