What's the history of the Root CA? Root CA was off for a long time and it was turned on because of SubOrdinate CA has to be renewed.
If there is a subordinate that is needing renewal, I would suspect the CAs have been around for a while. That's correct.
Is it possible the Root CA was migrated from another OS in the past? No, it's not. the servers were built from the scratch.
A few details would help. Can you provide the following details?
1) certutil -getreg ca
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CertSvc\Configuration\xxxxxxxxRootCA:
Keys:
CSP
EncryptionCSP
ExitModules
PolicyModules
Values:
DSConfigDN REG_SZ = CN=Configuration,DC=xxxxxx,DC=xxx
DSDomainDN REG_SZ = DC=xxxxxx,DC=xxx
ViewAgeMinutes REG_DWORD = 10 (16)
ViewIdleMinutes REG_DWORD = 8
CAType REG_DWORD = 3
ENUM_STANDALONE_ROOTCA -- 3
UseDS REG_DWORD = 1
ForceTeletex REG_DWORD = 12 (18)
ENUM_TELETEX_AUTO -- 2
ENUM_TELETEX_UTF8 -- 10 (16)
SignedAttributes REG_MULTI_SZ =
0: RequesterName
EKUOIDsForPublishExpiredCertInCRL REG_MULTI_SZ =
0: 1.3.6.1.5.5.7.3.3 Code Signing
1: 1.3.6.1.4.1.311.61.1.1 Kernel Mode Code Signing
CommonName REG_SZ = xxxxxxxxRootCA
Enabled REG_DWORD = 1
PolicyFlags REG_DWORD = 0
CertEnrollCompatible REG_DWORD = 0
CRLEditFlags REG_DWORD = 100 (256)
EDITF_ENABLEAKIKEYID -- 100 (256)
CRLFlags REG_DWORD = 2
CRLF_DELETE_EXPIRED_CRLS -- 2
InterfaceFlags REG_DWORD = 641 (1601)
IF_LOCKICERTREQUEST -- 1
IF_NOREMOTEICERTADMINBACKUP -- 40 (64)
IF_ENFORCEENCRYPTICERTREQUEST -- 200 (512)
IF_ENFORCEENCRYPTICERTADMIN -- 400 (1024)
EnforceX500NameLengths REG_DWORD = 1
SubjectTemplate REG_MULTI_SZ =
0: Mail
1: CommonName
2: OrganizationalUnit
3: Organization
4: Locality
5: State
6: DomainComponent
7: Country
ClockSkewMinutes REG_DWORD = a (10)
LogLevel REG_DWORD = 3
HighSerial REG_DWORD = 16 (22)
CAServerName REG_SZ = xxxxxxxxx.xxxxxxxx.xxx
ValidityPeriod REG_SZ = Years
ValidityPeriodUnits REG_DWORD = 1
KRACertHash REG_MULTI_SZ =
KRACertCount REG_DWORD = 0
KRAFlags REG_DWORD = 0
CRLPublicationURLs REG_MULTI_SZ =
0: 65:C:\Windows\system32\CertSrv\CertEnroll\%3%8%9.crl
CSURL_SERVERPUBLISH -- 1
CSURL_SERVERPUBLISHDELTA -- 40 (64)
1: 79:ldap:///CN=%7%8,CN=%2,CN=CDP,CN=Public Key Services,CN=Services,%6%10
CSURL_SERVERPUBLISH -- 1
CSURL_ADDTOCERTCDP -- 2
CSURL_ADDTOFRESHESTCRL -- 4
CSURL_ADDTOCRLCDP -- 8
CSURL_SERVERPUBLISHDELTA -- 40 (64)
2: 0:http://%1/CertEnroll/%3%8%9.crl
3: 0:file://%1/CertEnroll/%3%8%9.crl
4: 6:http://yyyyyyyyyy.yyyyyyyy.yyy/certdata/%3%8%9.crl
CSURL_ADDTOCERTCDP -- 2
CSURL_ADDTOFRESHESTCRL -- 4
CRLPeriod REG_SZ = Years
CRLPeriodUnits REG_DWORD = 5
CRLOverlapPeriod REG_SZ = Hours
CRLOverlapUnits REG_DWORD = 0
CRLDeltaPeriod REG_SZ = Days
CRLDeltaPeriodUnits REG_DWORD = 0
CRLDeltaOverlapPeriod REG_SZ = Minutes
CRLDeltaOverlapUnits REG_DWORD = 0
CAXchgValidityPeriod REG_SZ = Weeks
CAXchgValidityPeriodUnits REG_DWORD = 1
CAXchgOverlapPeriod REG_SZ = Days
CAXchgOverlapPeriodUnits REG_DWORD = 1
MaxIncomingMessageSize REG_DWORD = 10000 (65536)
MaxIncomingAllocSize REG_DWORD = 10000 (65536)
CACertPublicationURLs REG_MULTI_SZ =
0: 1:C:\Windows\system32\CertSrv\CertEnroll\%1_%3%4.crt
CSURL_SERVERPUBLISH -- 1
1: 3:ldap:///CN=%7,CN=AIA,CN=Public Key Services,CN=Services,%6%11
CSURL_SERVERPUBLISH -- 1
CSURL_ADDTOCERTCDP -- 2
2: 0:http://%1/CertEnroll/%1_%3%4.crt
3: 0:file://%1/CertEnroll/%1_%3%4.crt
4: 2:http://yyyyyyyyyyy.yyyyyyyyy.yyy/certdata/%1%3%4.crt
CSURL_ADDTOCERTCDP -- 2
CACertHash REG_MULTI_SZ =
0: nn nn nn nn nn nn nn nn nn nn nn nn nn nn nn nn nn nn nn nn
Security REG_BINARY =
Allow CA Administrator BUILTIN\Administrators
Allow Certificate Manager BUILTIN\Administrators
Allow CA Administrator xxxxxxxxxx\Domain Admins
Allow Certificate Manager xxxxxxxxxx\Domain Admins
Allow CA Administrator xxxxxxxxxxx\Enterprise Admins
Allow Certificate Manager xxxxxxxxxxxx\Enterprise Admins
Allow Enroll NT AUTHORITY\Authenticated Users
SetupStatus REG_DWORD = 1
SETUP_SERVER_FLAG -- 1
CRLNextPublish REG_BINARY = 6/26/2019 11:24 AM
CAXchgCertHash REG_MULTI_SZ =
0: nn nn nn nn nn nn nn nn nn nn nn nn nn nn nn nn nn nn nn nn
AuditFilter REG_DWORD = 7f (127)
CertUtil: -getreg command completed successfully.
2) Debug logs: certutil -setreg ca\debug
0xffffffe3 try to start certificate services provide
contents of %windir%\certsrv.log
========================================================================
Opened Log: 7/25/2015 3:57 PM 38.996s
GMT - 4.00
certca.dll: 6.3:9600.17415 retail
certsrv.exe: 6.3:9600.17480 retail
503.1861.0:<2015/7/25, 15:57:39>: 0x0 (WIN32: 0)
508.1341.0:<2015/7/25, 15:57:39>: 0x2 (WIN32: 2 ERROR_FILE_NOT_FOUND): DBMaxReadSessionCount
468.129.0:<2015/7/25, 15:57:39>: 0x80070002 (WIN32: 2 ERROR_FILE_NOT_FOUND)
437.625.0:<2015/7/25, 15:57:39>: 0x80070002 (WIN32: 2 ERROR_FILE_NOT_FOUND): OfficerRights
437.625.0:<2015/7/25, 15:57:39>: 0x80070002 (WIN32: 2 ERROR_FILE_NOT_FOUND): EnrollmentAgentRights
437.625.0:<2015/7/25, 15:57:39>: 0x80070002 (WIN32: 2 ERROR_FILE_NOT_FOUND): RoleSeparationEnabled
CertSrv: Opening Database C:\Windows\system32\CertLog\xxxxxxxxxxxxxxRootCA.edb
CertSrv: Database open
420.385.0:<2015/7/25, 15:57:40>: 0x2 (WIN32: 2 ERROR_FILE_NOT_FOUND)
452.722.0:<2015/7/25, 15:57:40>: 0x80090016 (-2146893802 NTE_BAD_KEYSET): xxxxxxxxxxxxxxRootCA
513.761.0:<2015/7/25, 15:57:40>: 0x80090016 (-2146893802 NTE_BAD_KEYSET)
513.8999.0:<2015/7/25, 15:57:40>: 0x80090016 (-2146893802 NTE_BAD_KEYSET): xxxxxxxxxxxxxxRootCA
513.9034.0:<2015/7/25, 15:57:40>: 0x80090016 (-2146893802 NTE_BAD_KEYSET)
452.722.0:<2015/7/25, 15:57:40>: 0x80090016 (-2146893802 NTE_BAD_KEYSET): xxxxxxxxxxxxxxRootCA
513.761.0:<2015/7/25, 15:57:40>: 0x80090016 (-2146893802 NTE_BAD_KEYSET)
513.8999.0:<2015/7/25, 15:57:40>: 0x80090016 (-2146893802 NTE_BAD_KEYSET): xxxxxxxxxxxxxxRootCA
513.9031.0:<2015/7/25, 15:57:40>: 0x80090016 (-2146893802 NTE_BAD_KEYSET)
513.9440.0:<2015/7/25, 15:57:40>: 0x80090016 (-2146893802 NTE_BAD_KEYSET)
513.12895.0:<2015/7/25, 15:57:40>: 0x80090016 (-2146893802 NTE_BAD_KEYSET)
508.2108.0:<2015/7/25, 15:57:40>: 0x80090016 (-2146893802 NTE_BAD_KEYSET)
503.1324.0:<2015/7/25, 15:57:40>: 0x80090016 (-2146893802 NTE_BAD_KEYSET)
503.1876.0:<2015/7/25, 15:57:40>: 0x80090016 (-2146893802 NTE_BAD_KEYSET)
503.1571.0:<2015/7/25, 15:57:40>: 0x80090016 (-2146893802 NTE_BAD_KEYSET)
517.270.0:<2015/7/25, 15:57:40>: 0x80090016 (-2146893802 NTE_BAD_KEYSET)
503.2141.0:<2015/7/25, 15:57:40>: 0x80090016 (-2146893802 NTE_BAD_KEYSET)
503.2205.0:<2015/7/25, 15:57:40>: 0x80090016 (-2146893802 NTE_BAD_KEYSET)
CertSrv: Exit Status = Keyset does not exist 0x80090016 (-2146893802 NTE_BAD_KEYSET)
certutil -delreg ca\debug
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CertSvc\Configuration\xxxxxxxxxxRootCA\debug:
Old Value:
debug REG_DWORD = ffffffe3 (-29)
CertUtil: -delreg command completed successfully.
The CertSvc service may need to be restarted for changes to take effect.
-
Edited by
caracos
10 hours 49 minutes ago