Usage of CrossCertificateDistributionPoint extension during certificate chain building in Windows XP and Server 2008
Hello,
I am experimenting with the CrossCertificateDistributionPoint extension in Root CA certificates, but I am wondering how this extension is managed during the chain bulding process. I have the following environment:
- offline root CA, renewing with new key pairs and with CrossCertificateDistributionPointExtensions defined in CAPolicy.inf. The URLs are updated at each key renew to reflect the name changes; so, with the third renew (certificate numbered (3))
, the CAPolicy.inf section is
[CrossCertificateDistributionPointsExtension]
SyncDeltaTime = 600
URL = http://myURL.local/root/ccdp/MyCAName(3-2).crt
URL = http://myURL.local/root/ccdp/MyCAName(3-4).crt
- online AD-integrated issuing CA; this system is also used with IIS for HTTP AIA, CDP and CCDP
- one windows XP client
- one windows server 2008 R2 used as a client
With root certificate #2, I have issued an Issuing CA certificate, and then an end-entity certificate. Then, I renewd the Root CA certificate and deployed this only certificate to the clients, removing previous certificates, so that there is not a direct
trust from the end-entity certificates a root certificate, but cross cert is needed. The cert is published in the enterprise store, via AD publication.
I have found the following behaviours when opening the end-entity certificate:
- Windows XP reads the CCDP extension from the distributed Root certificate #3, downloads the available cross cert and builds a correct chain from the root cert to the end-entity certificate. The result is as expected, although there is a drawback: this
behaviour is replicated every time a chain building is needed, so when I use Internet Explorer to open a public HTTPS site with a Verisign chain, the chaining engine tries to download the cross-certs. And if the HTTP server is not available, there is a 15
seconds timeout before proceeding.
- Windows server 2008 R2 does not download the cross cert, and builds a chain that terminates in a non-trusted certificate. (Additionally, when I try from the domain controller, the behaviour is slighty different: the chain is built using the
issuing CA certificate and the Root CA certifcate #3, which has not issued the Issuin CA cert, so I got a chain up to a trusted anchor but with a signing error).
I have looked for the available information on the certificate chaining process, either for WinXP and for newer systems, but I found no clear answer for this behaviour. At least, I can understand the Windows XP behaviour (looks for all possible chains using
all Root certs available and then finds the best one), but cannot understand how Windows server works.
Anyone has found this behaviour and knowns how to have windows server 2008 check the CCDP extension?
Thank you
Roberto
May 17th, 2012 9:42am
Hi,
The cross certificate distribution point (CCDP) extension identifies where cross certificates related to a particular certificate can be obtained and how often that location is updated. Windows XP and later operating systems use this extension for the discovery
of cross-certificates that might be used during the path discovery and chain building process.
For details:
Windows Server 2008 R2 CAPolicy.inf Syntax
http://blogs.technet.com/b/askds/archive/2009/10/15/windows-server-2008-r2-capolicy-inf-syntax.aspx
How CA Certificates Work
http://technet.microsoft.com/en-us/library/cc737264(v=ws.10).aspx
Cross-Certification Distribution Point Extensions
http://social.technet.microsoft.com/wiki/contents/articles/4954.certificate-status-and-revocation-checking.aspx#CRL_Distribution_Point_Extensions
Hope this helps!
Best regards
Elytis Cheng
TechNet Subscriber Support
If you are
TechNet Subscription user and have any
feedback on our support quality, please send your feedback here.Elytis Cheng
TechNet Community Support
Free Windows Admin Tool Kit Click here and download it now
May 18th, 2012 2:00am
Hi,
Unfortunately, this does not help.
I already know what CCDP is and what is reported on those links. As you can read from my post, the problem is HOW clients effectively use this information during chain building; for example:
- why Windows XP always looks for a cross certificate from a private enterprise CA when tries to connect to a public SSL web server protected with a Verisign certificate that ends up to a trusted Verisign root? This means a 15 seconds delay due to
timeout before opening any SSL-protected web page if the CCDP is not available or reachable;
- why Windows server 2008 R2 does never look for cross certificates in CCDP URLs and ends up building untrusted chains?
It seems that check of CCDP ha been dropped; is that correct?
Thank you
May 18th, 2012 5:48am
Hello,
Thank you for your post.
This is a quick note to let you know that we are performing research on this issue.
Best Regards
Elytis Cheng
Elytis Cheng
TechNet Community Support
Free Windows Admin Tool Kit Click here and download it now
May 29th, 2012 5:17am
Thank you,
I am available if you need a more detailed description of my findings, or some further testing.
Regards
May 29th, 2012 5:31am
Hello,
I have collected the two logs; unfortunately, the WinXP one is partially written in italian.
Some hints:
the leaf certificate has serial ending "00 0a"the issuing CA cert (available as enterprise CA) has serial ending "00 0b"the root CA of the issuing CA has serial ending "b5 65" and is NOT published on Active Directorythe rekeyd root CA has serial ending "ea 96" and is published on AD
The certutil.exe installed on the winXP machine is taken from the Windows server 2003 Admin Pack SP2 (WindowsServer2003-KB340178-SP2-x86-ITA.msi)
I have launched certutil as local administrator, so any LDAP search on AD is not authenticated.
The IIS hosting CDP, AIA and CCDP via HTTP is up, running and reachable via Internet explorer from the two machines.
From WinXP:
402.203.0: 0x80070057 (WIN32: 87): ..CertCli Version
Autorit emittente:
CN=CUSTOMER NAME Holding CA
OU=CUSTOMER NAME
O=CUSTOMER ORG
C=IT
Soggetto:
CN=prova.domain.it
Numero di serie certificato: 11784f6e00010000000a
dwFlags = CA_VERIFY_FLAGS_DUMP_CHAIN (0x40000000)
ChainFlags = CERT_CHAIN_REVOCATION_CHECK_CHAIN_EXCLUDE_ROOT (0x40000000)
HCCE_LOCAL_MACHINE
CERT_CHAIN_POLICY_BASE
-------- CERT_CHAIN_CONTEXT --------
ChainContext.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
ChainContext.dwRevocationFreshnessTime: 2 Weeks, 17 Hours, 24 Minutes, 19 Seconds
SimpleChain.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
SimpleChain.dwRevocationFreshnessTime: 2 Weeks, 17 Hours, 24 Minutes, 19 Seconds
CertContext[0][0]: dwInfoStatus=102 dwErrorStatus=0
Issuer: CN=CUSTOMER NAME Holding CA, OU=CUSTOMER NAME, O=CUSTOMER ORG, C=IT
Subject: CN=prova.domain.it
Serial: 11784f6e00010000000a
Template: 1.3.6.1.4.1.311.21.8.4898197.2237363.10046605.8424177.6578076.198.7372262.433957
77 54 47 75 9b 1c 4b ac 42 23 a7 51 be 73 bf 02 91 7b 99 e1
Element.dwInfoStatus = CERT_TRUST_HAS_KEY_MATCH_ISSUER (0x2)
Element.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
---------------- AIA certificato ----------------
319.1656.0: 0x8007052b (WIN32: 1323): ldap:///CN=CUSTOMER%20NAME%20Holding%20CA,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=domain,DC=local?cACertificate?base?objectClass=certificationAuthority
319.1656.0: 0x80070194 (WIN32: 404): http://pki.domain.it:88/hbl/cert/CUSTOMER%20NAME%20Holding%20CA(1).crt
Operazione non riuscita "AIA" Ora: 0
Errore durante il recupero dell'URL: Impossibile aggiornare la password. Il valore fornito per la password corrente non corrisponde. 0x8007052b (WIN32: 1323)
ldap:///CN=CUSTOMER%20NAME%20Holding%20CA,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=domain,DC=local?cACertificate?base?objectClass=certificationAuthority
Operazione non riuscita "AIA" Ora: 0
Errore durante il recupero dell'URL: Errore 0x80070194 (WIN32: 404)
http://pki.domain.it:88/hbl/cert/CUSTOMER%20NAME%20Holding%20CA(1).crt
---------------- CDP certificato ----------------
319.1862.0: 0x8007052b (WIN32: 1323): ldap:///CN=CUSTOMER%20NAME%20Holding%20CA(1),CN=HBL-CA,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=domain,DC=local?certificateRevocationList?base?objectClass=cRLDistributionPoint
319.2099.0: 0x8007052b (WIN32: 1323): ldap:///CN=CUSTOMER%20NAME%20Holding%20CA(1),CN=HBL-CA,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=domain,DC=local?deltaRevocationList?base?objectClass=cRLDistributionPoint
Operazione non riuscita "CDP" Ora: 0
Errore durante il recupero dell'URL: Impossibile aggiornare la password. Il valore fornito per la password corrente non corrisponde. 0x8007052b (WIN32: 1323)
ldap:///CN=CUSTOMER%20NAME%20Holding%20CA(1),CN=HBL-CA,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=domain,DC=local?certificateRevocationList?base?objectClass=cRLDistributionPoint
Verificato "Base CRL (25)" Ora: 0
[1.0] http://pki.domain.it:88/hbl/crl/CUSTOMER%20NAME%20Holding%20CA(1).crl
Operazione non riuscita "CDP" Ora: 0
Errore durante il recupero dell'URL: Impossibile aggiornare la password. Il valore fornito per la password corrente non corrisponde. 0x8007052b (WIN32: 1323)
[1.0.0] ldap:///CN=CUSTOMER%20NAME%20Holding%20CA(1),CN=HBL-CA,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=domain,DC=local?deltaRevocationList?base?objectClass=cRLDistributionPoint
Verificato "Delta CRL (25)" Ora: 0
[1.0.1] http://pki.domain.it:88/hbl/crl/CUSTOMER%20NAME%20Holding%20CA(1)+.crl
---------------- CDP Base CRL ----------------
319.1862.0: 0x8007052b (WIN32: 1323): ldap:///CN=CUSTOMER%20NAME%20Holding%20CA(1),CN=HBL-CA,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=domain,DC=local?deltaRevocationList?base?objectClass=cRLDistributionPoint
Operazione non riuscita "CDP" Ora: 0
Errore durante il recupero dell'URL: Impossibile aggiornare la password. Il valore fornito per la password corrente non corrisponde. 0x8007052b (WIN32: 1323)
ldap:///CN=CUSTOMER%20NAME%20Holding%20CA(1),CN=HBL-CA,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=domain,DC=local?deltaRevocationList?base?objectClass=cRLDistributionPoint
OK "Delta CRL (25)" Ora: 0
[1.0] http://pki.domain.it:88/hbl/crl/CUSTOMER%20NAME%20Holding%20CA(1)+.crl
--------------------------------
CRL 25:
Issuer: CN=CUSTOMER NAME Holding CA, OU=CUSTOMER NAME, O=CUSTOMER ORG, C=IT
7b 9e 1b e5 30 04 d0 5c 60 d1 6e e3 64 2a 85 ce 03 ed ad 47
Delta CRL 25:
Issuer: CN=CUSTOMER NAME Holding CA, OU=CUSTOMER NAME, O=CUSTOMER ORG, C=IT
62 95 c8 21 5e ca 4c c1 68 49 1a 11 c9 44 e6 7a 53 95 94 e5
Application[0] = 1.3.6.1.5.5.7.3.1 Autenticazione server
CertContext[0][1]: dwInfoStatus=102 dwErrorStatus=0
Issuer: CN=CUSTOMER NAME Root CA, O=CUSTOMER ORG, OU=CUSTOMER NAME, C=IT
Subject: CN=CUSTOMER NAME Holding CA, OU=CUSTOMER NAME, O=CUSTOMER ORG, C=IT
Serial: 119ff57900020000000b
c5 f1 ba 9b a8 23 2e 41 ef 05 9b 75 66 b1 b4 f9 c1 1b b1 c6
Element.dwInfoStatus = CERT_TRUST_HAS_KEY_MATCH_ISSUER (0x2)
Element.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
---------------- AIA certificato ----------------
319.1656.0: 0x8007052b (WIN32: 1323): ldap:///CN=CUSTOMER%20NAME%20Root%20CA,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=domain,DC=local?cACertificate?base?objectClass=certificationAuthority
319.1046.0: 0x80092012 (-2146885614)
Operazione non riuscita "AIA" Ora: 0
Errore durante il recupero dell'URL: Impossibile aggiornare la password. Il valore fornito per la password corrente non corrisponde. 0x8007052b (WIN32: 1323)
ldap:///CN=CUSTOMER%20NAME%20Root%20CA,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=domain,DC=local?cACertificate?base?objectClass=certificationAuthority
Nessun CRL "Certificato (0)" Ora: 0
[1.0] http://pki.domain.it:88/root/cert/CUSTOMER%20NAME%20Root%20CA(2).crt
---------------- CDP certificato ----------------
319.1862.0: 0x8007052b (WIN32: 1323): ldap:///CN=CUSTOMER%20NAME%20Root%20CA(2),CN=ROOT-CA,%20CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=domain,DC=local?certificateRevocationList?base?objectClass=cRLDistributionPoint
Operazione non riuscita "CDP" Ora: 0
Errore durante il recupero dell'URL: Impossibile aggiornare la password. Il valore fornito per la password corrente non corrisponde. 0x8007052b (WIN32: 1323)
ldap:///CN=CUSTOMER%20NAME%20Root%20CA(2),CN=ROOT-CA,%20CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=domain,DC=local?certificateRevocationList?base?objectClass=cRLDistributionPoint
Verificato "Base CRL (6)" Ora: 0
[1.0] http://pki.domain.it:88/root/crl/CUSTOMER%20NAME%20Root%20CA(2).crl
---------------- CDP Base CRL ----------------
Nessun URL "Nessuna" Ora: 0
--------------------------------
CRL 6:
Issuer: CN=CUSTOMER NAME Root CA, O=CUSTOMER ORG, OU=CUSTOMER NAME, C=IT
24 ce 16 77 84 c9 d6 9f 3b 62 11 d9 68 a7 6e 84 85 53 24 1b
CertContext[0][2]: dwInfoStatus=102 dwErrorStatus=0
Issuer: CN=CUSTOMER NAME Root CA, O=CUSTOMER ORG, OU=CUSTOMER NAME, C=IT
Subject: CN=CUSTOMER NAME Root CA, O=CUSTOMER ORG, OU=CUSTOMER NAME, C=IT
Serial: 11ac73a700030000000e
Template: CrossCA
8d d3 0e df 68 dd d2 73 d8 89 a5 d8 b8 42 31 c7 42 80 19 a0
Element.dwInfoStatus = CERT_TRUST_HAS_KEY_MATCH_ISSUER (0x2)
Element.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
---------------- AIA certificato ----------------
319.1046.0: 0x80092012 (-2146885614)
Nessun CRL "Certificato (0)" Ora: 0
[0.0] http://pki.domain.it:88/root/cert/CUSTOMER%20NAME%20Root%20CA(3).crt
---------------- CDP certificato ----------------
Verificato "Base CRL (6)" Ora: 0
[0.0] http://pki.domain.it:88/root/crl/CUSTOMER%20NAME%20Root%20CA(3).crl
---------------- CDP Base CRL ----------------
Nessun URL "Nessuna" Ora: 0
--------------------------------
CRL 6:
Issuer: CN=CUSTOMER NAME Root CA, O=CUSTOMER ORG, OU=CUSTOMER NAME, C=IT
bc 7f 6f f2 b5 e7 0e 51 ff 80 7e 3b 36 18 38 22 f7 2e 1f f5
Issuance[0] = 1.3.6.1.4.1.39449.1.1.2
CertContext[0][3]: dwInfoStatus=10c dwErrorStatus=0
Issuer: CN=CUSTOMER NAME Root CA, O=CUSTOMER ORG, OU=CUSTOMER NAME, C=IT
Subject: CN=CUSTOMER NAME Root CA, O=CUSTOMER ORG, OU=CUSTOMER NAME, C=IT
Serial: 2afa9770b7d748b140e07ca6e66fea96
95 f4 26 10 5a 27 c2 43 6a 87 32 99 1c 22 8c 30 24 8b 35 06
Element.dwInfoStatus = CERT_TRUST_HAS_NAME_MATCH_ISSUER (0x4)
Element.dwInfoStatus = CERT_TRUST_IS_SELF_SIGNED (0x8)
Element.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
---------------- AIA certificato ----------------
Nessun URL "Nessuna" Ora: 0
---------------- CDP certificato ----------------
Nessun URL "Nessuna" Ora: 0
--------------------------------
Issuance[0] = 1.3.6.1.4.1.39449.1.1.2
Exclude leaf cert:
58 29 d9 7d a3 48 0f a2 b9 6d 23 8a 77 88 d8 f8 35 db cd bf
Full chain:
cb e1 99 22 fd 78 4c 30 28 7d 14 16 cb d8 0a 76 26 19 f8 64
------------------------------------
Criteri di rilascio verificati: Nessuna
Criteri di applicazione verificati:
1.3.6.1.5.5.7.3.1 Autenticazione server
Controllo di revoca certificato foglia superato
CertUtil: - Esecuzione comando verify riuscita.
From Win2k8R2:
Issuer:
CN=CUSTOMER NAME Holding CA
OU=CUSTOMER NAME
O=CUSTOMER ORG
C=IT
Subject:
CN=prova.domain.it
Cert Serial Number: 11784f6e00010000000a
dwFlags = CA_VERIFY_FLAGS_CONSOLE_TRACE (0x20000000)
dwFlags = CA_VERIFY_FLAGS_DUMP_CHAIN (0x40000000)
ChainFlags = CERT_CHAIN_REVOCATION_CHECK_CHAIN_EXCLUDE_ROOT (0x40000000)
HCCE_LOCAL_MACHINE
CERT_CHAIN_POLICY_BASE
-------- CERT_CHAIN_CONTEXT --------
ChainContext.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
ChainContext.dwErrorStatus = CERT_TRUST_IS_UNTRUSTED_ROOT (0x20)
ChainContext.dwErrorStatus = CERT_TRUST_REVOCATION_STATUS_UNKNOWN (0x40)
ChainContext.dwErrorStatus = CERT_TRUST_IS_OFFLINE_REVOCATION (0x1000000)
SimpleChain.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
SimpleChain.dwErrorStatus = CERT_TRUST_IS_UNTRUSTED_ROOT (0x20)
SimpleChain.dwErrorStatus = CERT_TRUST_REVOCATION_STATUS_UNKNOWN (0x40)
SimpleChain.dwErrorStatus = CERT_TRUST_IS_OFFLINE_REVOCATION (0x1000000)
CertContext[0][0]: dwInfoStatus=102 dwErrorStatus=1000040
Issuer: CN=CUSTOMER NAME Holding CA, OU=CUSTOMER NAME, O=CUSTOMER ORG, C=IT
NotBefore: 5/17/2012 1:11 AM
NotAfter: 5/17/2014 1:11 AM
Subject: CN=prova.domain.it
Serial: 11784f6e00010000000a
Template: 1.3.6.1.4.1.311.21.8.4898197.2237363.10046605.8424177.6578076.198.7372262.433957
77 54 47 75 9b 1c 4b ac 42 23 a7 51 be 73 bf 02 91 7b 99 e1
Element.dwInfoStatus = CERT_TRUST_HAS_KEY_MATCH_ISSUER (0x2)
Element.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
Element.dwErrorStatus = CERT_TRUST_REVOCATION_STATUS_UNKNOWN (0x40)
Element.dwErrorStatus = CERT_TRUST_IS_OFFLINE_REVOCATION (0x1000000)
---------------- Certificate AIA ----------------
Failed "AIA" Time: 0
Error retrieving URL: Logon failure: unknown user name or bad password. 0x8007052e (WIN32: 1326)
ldap:///CN=CUSTOMER%20NAME%20Holding%20CA,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=domain,DC=local?cACertificate?base?objectClass=certificationAuthority
Failed "AIA" Time: 0
Error retrieving URL: Error 0x80190194 (-2145844844)
http://pki.domain.it:88/hbl/cert/CUSTOMER%20NAME%20Holding%20CA(1).crt
---------------- Certificate CDP ----------------
Failed "CDP" Time: 0
Error retrieving URL: Logon failure: unknown user name or bad password. 0x8007052e (WIN32: 1326)
ldap:///CN=CUSTOMER%20NAME%20Holding%20CA(1),CN=HBL-CA,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=domain,DC=local?certificateRevocationList?base?objectClass=cRLDistributionPoint
Verified "Base CRL (19)" Time: 10
[1.0] http://pki.domain.it:88/hbl/crl/CUSTOMER%20NAME%20Holding%20CA(1).crl
Failed "CDP" Time: 0
Error retrieving URL: Logon failure: unknown user name or bad password. 0x8007052e (WIN32: 1326)
[1.0.0] ldap:///CN=CUSTOMER%20NAME%20Holding%20CA(1),CN=HBL-CA,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=domain,DC=local?deltaRevocationList?base?objectClass=cRLDistributionPoint
Verified "Delta CRL (19)" Time: 10
[1.0.1] http://pki.domain.it:88/hbl/crl/CUSTOMER%20NAME%20Holding%20CA(1)+.crl
---------------- Certificate OCSP ----------------
Unsuccessful "OCSP" Time: 11
[0.0] http://pki.domain.it:88/OCSP
--------------------------------
Application[0] = 1.3.6.1.5.5.7.3.1 Server Authentication
CertContext[0][1]: dwInfoStatus=102 dwErrorStatus=1000040
Issuer: CN=CUSTOMER NAME Root CA, O=CUSTOMER ORG, OU=CUSTOMER NAME, C=IT
NotBefore: 5/17/2012 1:04 AM
NotAfter: 5/17/2018 1:14 AM
Subject: CN=CUSTOMER NAME Holding CA, OU=CUSTOMER NAME, O=CUSTOMER ORG, C=IT
Serial: 119ff57900020000000b
c5 f1 ba 9b a8 23 2e 41 ef 05 9b 75 66 b1 b4 f9 c1 1b b1 c6
Element.dwInfoStatus = CERT_TRUST_HAS_KEY_MATCH_ISSUER (0x2)
Element.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
Element.dwErrorStatus = CERT_TRUST_REVOCATION_STATUS_UNKNOWN (0x40)
Element.dwErrorStatus = CERT_TRUST_IS_OFFLINE_REVOCATION (0x1000000)
---------------- Certificate AIA ----------------
Failed "AIA" Time: 0
Error retrieving URL: Logon failure: unknown user name or bad password. 0x8007052e (WIN32: 1326)
ldap:///CN=CUSTOMER%20NAME%20Root%20CA,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=domain,DC=local?cACertificate?base?objectClass=certificationAuthority
Verified "Certificate (0)" Time: 10
[1.0] http://pki.domain.it:88/root/cert/CUSTOMER%20NAME%20Root%20CA(2).crt
---------------- Certificate CDP ----------------
Failed "CDP" Time: 0
Error retrieving URL: Logon failure: unknown user name or bad password. 0x8007052e (WIN32: 1326)
ldap:///CN=CUSTOMER%20NAME%20Root%20CA(2),CN=ROOT-CA,%20CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=domain,DC=local?certificateRevocationList?base?objectClass=cRLDistributionPoint
Verified "Base CRL (06)" Time: 10
[1.0] http://pki.domain.it:88/root/crl/CUSTOMER%20NAME%20Root%20CA(2).crl
---------------- Certificate OCSP ----------------
No URLs "None" Time: 0
--------------------------------
CertContext[0][2]: dwInfoStatus=10c dwErrorStatus=20
Issuer: CN=CUSTOMER NAME Root CA, O=CUSTOMER ORG, OU=CUSTOMER NAME, C=IT
NotBefore: 5/17/2012 12:42 AM
NotAfter: 5/17/2022 12:52 AM
Subject: CN=CUSTOMER NAME Root CA, O=CUSTOMER ORG, OU=CUSTOMER NAME, C=IT
Serial: 720cb5d4a4088d9c46fd93fe8f18b565
77 b3 95 23 62 70 95 66 aa ee ff f2 5b fa d5 f5 12 14 39 cf
Element.dwInfoStatus = CERT_TRUST_HAS_NAME_MATCH_ISSUER (0x4)
Element.dwInfoStatus = CERT_TRUST_IS_SELF_SIGNED (0x8)
Element.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
Element.dwErrorStatus = CERT_TRUST_IS_UNTRUSTED_ROOT (0x20)
---------------- Certificate AIA ----------------
No URLs "None" Time: 0
---------------- Certificate CDP ----------------
No URLs "None" Time: 0
---------------- Certificate OCSP ----------------
No URLs "None" Time: 0
--------------------------------
Issuance[0] = 1.3.6.1.4.1.39449.1.1.2
Exclude leaf cert:
70 7c cf bf fc 0c d7 8f 0b cd 22 ef d5 fb 14 14 69 a3 84 43
Full chain:
d4 a2 ba ed 0f 32 ed df 0f 81 81 31 bb 40 01 22 a9 c6 6e 3b
Issuer: CN=CUSTOMER NAME Holding CA, OU=CUSTOMER NAME, O=CUSTOMER ORG, C=IT
NotBefore: 5/17/2012 1:11 AM
NotAfter: 5/17/2014 1:11 AM
Subject: CN=prova.domain.it
Serial: 11784f6e00010000000a
Template: 1.3.6.1.4.1.311.21.8.4898197.2237363.10046605.8424177.6578076.198.7372262.433957
77 54 47 75 9b 1c 4b ac 42 23 a7 51 be 73 bf 02 91 7b 99 e1
A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider. 0x800b0109 (-2146762487)
------------------------------------
Verifies against UNTRUSTED root
Leaf certificate revocation check passed
CertUtil: -verify command completed successfully.
Regards
Free Windows Admin Tool Kit Click here and download it now
May 31st, 2012 1:47pm
No, that certificate is not present in Intermediate certification authorities (I also checked the current user store).
The only certificates present (in the enterprise physical container, as expected) are the Root CA (serial ending ea96) and the Issuing CA (serial ending 000b).
The same applies for the winXP machine.
June 1st, 2012 5:59am
is there any update?Please remember to click Mark as Answer on the post that helps you, and to click Unmark as Answer if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread.
Free Windows Admin Tool Kit Click here and download it now
June 3rd, 2012 11:21pm
Hello,
Sorry for the delay, I could try the registry patch only now. Unfortunately, nothing changes.
This is the key I added:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\SystemCertificates\ChainEngine]
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\SystemCertificates\ChainEngine\Config]
"Options"=dword:00000004
Then restarted the server and reopened the leaf certificate. The result is the same: the chain is built but terminates in a non-trusted root.
I checked network traffic with wireshark and also checked IIS logs; no cross certificate is downloaded.
Regards
June 4th, 2012 3:31am
if the suggestion does not work, I think it is hard to troubleshoot this issue by forum. I suggest you open a case for it.
Please remember to click Mark as Answer on the post that helps you, and to click Unmark as Answer if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread.
Free Windows Admin Tool Kit Click here and download it now
June 4th, 2012 4:17am
Well, my customer decided to give up with CCDP, so I really do not need to open a case. I think I gave enough information to reproduce the issue, and I think this looks like a bug - or, simply, Microsoft decided to abandon the support to the CCDP extension.
Anyway, I will add it to my personal W2k8r2 "bugs & undocumented" list.
Regards
June 4th, 2012 6:05am


