Invalid issuance policies problem
Hi, I have a problem with my new pki hierarchy. It consists from standalone windows 2008 se root ca and enterprise windows 2008 r2 ee issuing ca. root ca was installed using the following capolicy.inf: [Version] Signature= "$Windows NT$" [Certsrv_Server] [CRLDistributionPoint] Empty=True [AuthorityInformationAccess] Empty=True [PolicyStatementExtension] Policies = LegalPolicy [LegalPolicy] OID = 1.3.6.1.4.1.50000.1.1.1 URL = "http://www.company.com/cps" Issuing CA was installed using following capolicy.inf: [Version] Signature= "$Windows NT$" [PolicyStatementExtension] Policies = LegalPolicy [LegalPolicy] OID = 1.3.6.1.4.1.50000.1.2.1 URL = "http://www.company.com/cps" Right after I installed issuing ca I noticed an error on certificate generation based on caexchange template: Active Directory Certificate Services could not create an encryption certificate. Requested by COMPANY\user Invalid Issuance Policies: 1.3.6.1.4.1.50000.1.2.1. The certificate has invalid policy. 0x800b0113 (-2146762477). What can cause such an error? Different OID for issuing ca? I've found the following thread: http://social.msdn.microsoft.com/Forums/en/biztalkgeneral/thread/741bbe77-20c9-4a46-bc45-5becacaa5164 And I've tried this workaround: Run the following command at the CA and restart the CA service · certutil –setreg CA\CRLFlags +CRLF_IGNORE_INVALID_POLICIES net stop certsvc net start certsvc · Try to issue an end-entity certificate with Issuance Policies Error dissapeared and certificate based on CAExchange template was generated. But I want to know root cause of this problem. What exactly is wrong with my issuing ca? What is right way to correct this? Thanks.
February 17th, 2010 7:51pm

You have restricted the valid issuance policies at the root to 1.3.6.1.4.1.50000.1.1.1At the policy CA, you have tried to assert the issuance policy 1.3.6.1.4.1.50000.1.2.1, which does not match the policy asserted at the root.What you need to do, is at the root CA, do one of two things:1) Do not assert CP/CPS OIDS. 2) Assert both OIDS[PolicyStatementExtension]Policies = LegalPolicy1,LegalPolicy2[LegaPolicy1]OID = 1.3.6.1.4.1.50000.1.1.1URL = "http://www.company.com/cps"[LegaPolicy2]OID = 1.3.6.1.4.1.50000.1.2.1URL = "http://www.company.com/cps"Brian
Free Windows Admin Tool Kit Click here and download it now
February 17th, 2010 10:16pm

Thanks Brian for great answer. But I still have a question. If I'll assert both oid's at the root level - is it enough to assert OID = 1.3.6.1.4.1.50000.1.2.1 at the issuing ca level (in capolicy.inf)? Or will I be forced to assert the same two oid's and at issuing ca level? Thanks.
February 18th, 2010 9:52am

It really depends on your policies.You can honestly assert both, one, or the other- What are you attempting to do at the issuing CA- What issuance policy are you asserting- What is the difference between the two issuance policies?- Is there a difference?Brian
Free Windows Admin Tool Kit Click here and download it now
February 18th, 2010 9:59am

As for now I'm doing tests with my test PKI infrastructure. What I've did till now: I modified root ca Capolicy.inf file and specified both policies in there. I renewed my root CA using the same key. Certificate Policies field in root ca certificate got updated. So now I'm going to install new enterprise issuing ca and I want specify only: OID = 1.3.6.1.4.1.50000.1.2.1 URL = "http://www.company.com/cps" in it's capolicy.inf file. I want to know if there will be no errors I've encountered earlier with only one oid specified. So I asked you if is it enough to specify only one OID at lower ca level? Because in our environment root ca is tied with one cps and issuing ca is tied with other cps. So I want these differences to be reflected in CAs certificates.
February 18th, 2010 11:03am

Joson,that is incorrect. We have deployed numerous PKIs with multiple assurance levels.Contact me offline for more infoBrian
Free Windows Admin Tool Kit Click here and download it now
February 22nd, 2010 5:32pm

Just to add some reference. We have deployed several PKIs for the US Federal BridgeIn the US federal bridge, the CAs can assert up to Five different assurance levels (CP OIDS).See section 1.5 http://www.va.gov/proj/vapki/documents/FBCA_CP_v1_04_100500.docHere is the declared OIDs for certificate policy from a DOD issuing CA: [1]Certificate Policy:Policy Identifier=2.16.840.1.101.3.2.1.12.1 [2]Certificate Policy:Policy Identifier=2.16.840.1.101.3.2.1.12.2 [3]Certificate Policy:Policy Identifier=2.16.840.1.101.3.2.1.12.3So in this example, tey have chosen to do rudimentary, Basic, and Medium assurance levels. Joson, even in the link that you posted, the issuing CA asserts *two* issuance policy OIDs, and is allowed to do it because the intermdiate CA in their example asserts the AllIssuancePolicy OID (2.5.29.32.0)The two OIDs asserted in your example link are:[Version]Signature= "$Windows NT$"[PolicyStatementExtension]Policies = LegalPolicy, LimitedUsePolicy[LegalPolicy]OID = 1.1.1.1.1.1.1.1.1[LimitedUsePolicy]OID = 2.2.2.2.2.2.2.2.2Thanks,Brian
February 22nd, 2010 5:50pm

Thanks for your correction, Brian.Hi Rimvydas,How are you? We've not heard back from you in a few days and wanted to check the current status of the issue. If you need further assistance, please do not hesitate to respond back.Thanks.This posting is provided "AS IS" with no warranties, and confers no rights.
Free Windows Admin Tool Kit Click here and download it now
February 25th, 2010 8:40am

Hi All, i get the same error (Active Directory Certificate Services could not create an encryption certificate. Requested by COMPANY\user Invalid Issuance Policies: 1.3.6.1.4.1.x. The certificate has invalid policy. 0x800b0113 (-2146762477).) on a three tier ca hierarchy, i only defined the PolicyStatementExtension on the Policy CA. All CAs are Windows 2008 R2. [PolicyStatementExtension] Policies = LegalPolicy Critical = 0 [LegalPolicy] OID = 1.3.6.1.4.1.x (x=real number) URL = "http://www.company.com/cps" Notice = "Policy Information" Do i need to configure the PolicyStatementExtension on the Issuing CA? Any idea? Thanks Jochen
March 29th, 2010 2:03pm

Do i need to configure the PolicyStatementExtension on the Issuing CA? Any idea? Yes, with Server 2008 R2 it now enforces the issuance policies on subordinate CAs. So if you assert an issuance Policy oID in a policy CA, you must assert all or some of the issuance policies in the subordinate CA. Brian
Free Windows Admin Tool Kit Click here and download it now
March 29th, 2010 4:43pm

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics