OCSP PKIView error and certsrv-url unsucessful
Hello Everyone, i've seen this post lots of times but i still can't figure out what the heck is goin on with this ocsp configuration basically i have my windows 2003 Domain test.com 1 standalone Root CA on windows 2008 R2 2 enterprise CAs on windows 2008 R2 on each of those CA servers i installed an OCSP array member that i configured with one Revocation configuration for each CA i have. i used simple DNS round robin to access one or the other array member. everything seems to go on smoothly until i endup with PKI view below   and the certutil -url below  can anyone help please ? thanksHitch Bardawil
April 20th, 2012 10:53am

hello Kurt, thanks for your time, i kept on trying, and finally by just deleting both revocation rules and recreating them seems that the pkiview error disappears very weird since i have to do it a couple of times before it worked out... thanks you Hitch Bardawil
Free Windows Admin Tool Kit Click here and download it now
April 20th, 2012 11:55am

Glad you got it working - strange issue. I have seen PKIView show that revocation wasn't working before, but everything was actually fine. I wouldn't have expected that you would get the other errors though. Anyways, that is good. I proposed your post as the answer, since it was essentially a try again fix. I did want to mention that the way you are setting this revocation up is a bit unexpected. Typically, people who are using OCSP have a large number of expected revocations. Since the CAs are used for issuing certificates, people typically separate the revocation role from the issuance role. Meaning that you would use a separate web server (or servers in your case) to run OCSP. This keeps the revocation lookup traffic off of the CA. This is also the same for CDP hosted on a Web server. As a matter of fact, you might choose to use the Web server hosting the CDP as the same one running OCSP. My guess is that you are just doing this in a lab for testing purposes right now. I am just mentioning this as as design item for a production implementation. Anyways, glad you got it working!
April 20th, 2012 12:24pm

Can you give more details about your OCSP configuration, signing certificates and revocation config? /Hasain
Free Windows Admin Tool Kit Click here and download it now
April 20th, 2012 1:17pm

Hi Kurt, Just wanted to pipe in here. I agree with everything you have stated except " you might choose to use the Web server hosting the CDP as the same one running OCSP" This would not be one of my recommendations. Remember that the default behavior for Windows Vista and later clients is to first use OCSP for revocation checking, and if not available, fall back to CDP/AIA revocation checking. If you put the OCSP responder on the same servers hosting the CDP/AIA, you are setting up a single point of failure. If the server fails, then you cannot access both OCSP and CDP/AIA. Brian
April 20th, 2012 2:03pm

Good point! Thanks for adding that bit of information for the design perspective.
Free Windows Admin Tool Kit Click here and download it now
April 20th, 2012 2:24pm

Thanks Kurt. I hope I did not sound correcting, just wanted to add to the discussion ;-) Brian
April 20th, 2012 3:30pm

I spoke with the product team PM and there are a couple of outstanding questions here: 1. What do you mean by "stop working"? 2. Are you saying that when you add the URL for OCSP on the second issuing CA that is when it stops showing up appropriately in PKI View?
Free Windows Admin Tool Kit Click here and download it now
April 20th, 2012 6:48pm

Ensure that you did not make the mistake of selecting Include in the AIA of Issued Certificates: http://social.technet.microsoft.com/wiki/contents/articles/1587.active-directory-certificate-services-ad-cs-public-key-infrastructure-pki-frequently-asked-questions-faq.aspx#PKIViewOCSP
April 20th, 2012 7:01pm

i made sure the checkbox was not selected during my configuration, but i still cannot solve this problem ... i turned on the CAPI logs and found those errors : CAPI2 event ID 11 and 41 with the below details RevocationResult The revocation function was unable to check revocation because the revocation server was offline. hope this help you figure out the damned problem :s Hitch Bardawil
Free Windows Admin Tool Kit Click here and download it now
April 21st, 2012 4:52am

hello Kurt, thanks for your time, i kept on trying, and finally by just deleting both revocation rules and recreating them seems that the pkiview error disappears very weird since i have to do it a couple of times before it worked out... thanks you Hitch Bardawil
April 21st, 2012 5:05am

Hello, thanks for helping, i have 2 enterprise subordinate PKIs on which i installed the OCSP ROLE so that i have a array member on each pki server i configured two Revocation configuration: one for each CA the revocation configuration is pretty standard: Browse the CA in Active Directoryautomatically select a signing certificateuse the default ocsp template in ad added the computer accounts to the ocsp template i basically followed the technet tutorial to the letter here is the certutil -verify - urlfetch result in case it might help Issuer: CN=AFD-PKI-Technique DC=dev DC=active Subject: CN=afd.dev.Active Cert Serial Number: 1cd8b3e6000100000010 dwFlags = CA_VERIFY_FLAGS_CONSOLE_TRACE (0x20000000) dwFlags = CA_VERIFY_FLAGS_DUMP_CHAIN (0x40000000) ChainFlags = CERT_CHAIN_REVOCATION_CHECK_CHAIN_EXCLUDE_ROOT (0x40000000) HCCE_LOCAL_MACHINE CERT_CHAIN_POLICY_BASE -------- CERT_CHAIN_CONTEXT -------- ChainContext.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100) ChainContext.dwRevocationFreshnessTime: 1 Days, 3 Minutes, 3 Seconds SimpleChain.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100) SimpleChain.dwRevocationFreshnessTime: 1 Days, 3 Minutes, 3 Seconds CertContext[0][0]: dwInfoStatus=102 dwErrorStatus=0 Issuer: CN=AFD-PKI-Technique, DC=dev, DC=active NotBefore: 16/04/2012 14:57 NotAfter: 16/04/2014 14:57 Subject: CN=afd.dev.Active Serial: 1cd8b3e6000100000010 Template: AFD Web Server c7 40 0b d2 b7 50 00 d3 00 55 43 3a d8 b1 bb 75 ce a6 39 52 Element.dwInfoStatus = CERT_TRUST_HAS_KEY_MATCH_ISSUER (0x2) Element.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100) ---------------- Certificate AIA ---------------- Wrong Issuer "Certificate (0)" Time: 0 [0.0] ldap:///CN=AFD-PKI-Technique,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=dev,DC=active?cACertificate?base?objectClass=certificationAuthority Verified "Certificate (1)" Time: 0 [0.1] ldap:///CN=AFD-PKI-Technique,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=dev,DC=active?cACertificate?base?objectClass=certificationAuthority ---------------- Certificate CDP ---------------- Verified "Base CRL (0a)" Time: 0 [0.0] ldap:///CN=AFD-PKI-Technique(1),CN=FRPARDEV168,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=dev,DC=active?certificateRevocationList?base?objectClass=cRLDistributionPoint ---------------- Base CRL CDP ---------------- No URLs "None" Time: 0 ---------------- Certificate OCSP ---------------- Unsuccessful "OCSP" Time: 0 [0.0] http://ocsp.dev.active/ocsp -------------------------------- CRL 0a: Issuer: CN=AFD-PKI-Technique, DC=dev, DC=active f4 ec d9 5e 60 36 4b 19 67 02 b4 66 36 e7 ba 5d 45 8f e7 19 Application[0] = 1.3.6.1.5.5.7.3.1 Server Authentication CertContext[0][1]: dwInfoStatus=102 dwErrorStatus=0 Issuer: CN=AFD-ROOT-CA, DC=dev, DC=active NotBefore: 13/04/2012 17:45 NotAfter: 13/04/2032 14:50 Subject: CN=AFD-PKI-Technique, DC=dev, DC=active Serial: 18565f0c00000000000a Template: SubCA 39 9e dd 92 97 e7 30 32 18 33 11 1b d7 23 73 00 94 76 04 60 Element.dwInfoStatus = CERT_TRUST_HAS_KEY_MATCH_ISSUER (0x2) Element.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100) ---------------- Certificate AIA ---------------- Verified "Certificate (0)" Time: 0 [0.0] ldap:///CN=AFD-ROOT-CA,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=dev,DC=active?cACertificate?base?objectClass=certificationAuthority ---------------- Certificate CDP ---------------- Verified "Base CRL (02)" Time: 0 [0.0] ldap:///CN=AFD-ROOT-CA,CN=FRPARDEV167,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=dev,DC=active?certificateRevocationList?base?objectClass=cRLDistributionPoint ---------------- Base CRL CDP ---------------- No URLs "None" Time: 0 ---------------- Certificate OCSP ---------------- Verified "OCSP" Time: 0 [0.0] http://ocsp.dev.active/ocsp -------------------------------- CRL 02: Issuer: CN=AFD-ROOT-CA, DC=dev, DC=active d2 08 3a ac b5 57 b5 b3 eb 2d 91 83 f7 ca 24 fc 92 58 ea be CertContext[0][2]: dwInfoStatus=10c dwErrorStatus=0 Issuer: CN=AFD-ROOT-CA, DC=dev, DC=active NotBefore: 13/04/2012 14:40 NotAfter: 13/04/2032 14:50 Subject: CN=AFD-ROOT-CA, DC=dev, DC=active Serial: 61da541b9714d3bb4d4dcc18ea7690af Template: CA 26 6e b3 04 3e 72 ad 18 82 77 0c a0 29 af 6c 7e 84 16 ef 4a Element.dwInfoStatus = CERT_TRUST_HAS_NAME_MATCH_ISSUER (0x4) Element.dwInfoStatus = CERT_TRUST_IS_SELF_SIGNED (0x8) Element.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100) ---------------- Certificate AIA ---------------- No URLs "None" Time: 0 ---------------- Certificate CDP ---------------- No URLs "None" Time: 0 ---------------- Certificate OCSP ---------------- No URLs "None" Time: 0 -------------------------------- Exclude leaf cert: 51 1b 7d ba e2 57 c5 3c 9c a5 80 17 50 fa 6c 1d 47 6a bb fd Full chain: c2 50 c6 59 d3 04 2d 76 05 0e c8 f1 ba 67 ec 5b dc d3 56 b4 ------------------------------------ Verified Issuance Policies: None Verified Application Policies: 1.3.6.1.5.5.7.3.1 Server Authentication Leaf certificate revocation check passed CertUtil: -verify command completed successfully. thanks Hitch Bardawil
Free Windows Admin Tool Kit Click here and download it now
April 21st, 2012 5:21am

hey guyz, just wanted to add somthing i just noticed, as i old you before my ocsp scenario involves two PKI servers : PKI 1: is for delivering technical certificates PKI 2: Is for user certificates I configured each of those servers as an OCSP Array. when i add the revocation configuration for my PKI 1 , everything is fine however when i add the revocation conviguration of the second PKI this is when everything stop working... Hitch Bardawil
April 21st, 2012 5:58am

thanks for the great advice guyz ! Hitch Bardawil
Free Windows Admin Tool Kit Click here and download it now
April 25th, 2012 7:36am

Hello Guys, sorry to bother you with the same issue again but i left the OCSP for a Few days and when i came back the PKI View Error is back :s any idea on the reason ??? thanks ! Hitch Bardawil
May 2nd, 2012 5:50am

no ideas ? anyone ? :sHitch Bardawil
Free Windows Admin Tool Kit Click here and download it now
May 3rd, 2012 10:18am

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics