Windows 7 Client not checking CRL
Hi @all, We have a Windows Server 2008 R2 Enterprise CA which issued a Webserver certificate for a IIS 7.5. If I revoke the certificate in the CA MMC and rebuild the CRL, Windows 7 clients with IE9 (CRL checking in IE is enabled) can still access the website without any error message that the certificate has been revoked. The Windows 7 clients have the correct CRL, the CRL cache is empty. If i try to open the website with Firefox on the same windows 7 clients, I get the message that the certificate has been revoked. The same on a Windows XP machine and a Windows Server 2008 R2. We are not using OCSP. So my question is: Is this problem with the CRL check specific on Windows 7 clients? If this is the case are there any settings which has to be configured to get the CRL check working on Windows 7 clients? Thanks in advanceregards Marc Grote aka Jens Baier - www.it-training-grote.de - www.forefront-tmg.de - www.nt-faq.de
July 26th, 2011 7:14am

try to invalidate all existing CRLs and check again: certutil –getreg chain\ChainCacheResyncFiletime @now I believe that the problem is with cached CRL. My weblog: http://en-us.sysadmins.lv PowerShell PKI Module: http://pspki.codeplex.com Windows PKI reference: on TechNet wiki
Free Windows Admin Tool Kit Click here and download it now
July 26th, 2011 8:53am

Hi, we already tried this without luck :-( Any other hints?regards Marc Grote aka Jens Baier - www.it-training-grote.de - www.forefront-tmg.de - www.nt-faq.de
July 26th, 2011 9:53am

try to invalidate all existing CRLs and check again: certutil –setreg chain\ChainCacheResyncFiletime @now I believe that the problem is with cached CRL. My weblog: http://en-us.sysadmins.lv PowerShell PKI Module: http://pspki.codeplex.com Windows PKI reference: on TechNet wiki
Free Windows Admin Tool Kit Click here and download it now
July 26th, 2011 3:47pm

Hi Marc, Replace the -getreg with -setreg in the command for a test. Then, all cached entries will be invalidated immediately. certutil -setreg chain\ChainCacheResyncFiletime @now For more information, please refer to: http://blogs.technet.com/b/pki/archive/2007/09/13/how-to-refresh-the-crl-cache-on-windows-vista.aspx Hope this helps. Regards, Bruce Forum Support Please remember to mark the replies as answers if they help and unmark them if they provide no help. If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com.
July 27th, 2011 3:21am

Hi Bruce, thank you very much for the quick response but we already did that what the blog post said, but with no luck.regards Marc Grote aka Jens Baier - www.it-training-grote.de - www.forefront-tmg.de - www.nt-faq.de
Free Windows Admin Tool Kit Click here and download it now
July 27th, 2011 3:31am

Most applications cache the current CRL and won't download it again until the one that is currently cached reaches the end of its validity period. This is PKI functioning as designed per the latest RFC. If you're worried about this, you may want to think about reducing your CRL validity period or implementing OCSP instead.
July 29th, 2011 2:33pm

Most applications cache the current CRL and won't download it again until the one that is currently cached reaches the end of its validity period. This is PKI functioning as designed per the latest RFC. If you're worried about this, you may want to think about reducing your CRL validity period or implementing OCSP instead. Please remember that OCSP responses are cached as well depending on the NetxUpdate and NextPublish fields in the OCSP response, for more information please read the TechNet articles about "Pre-Fetching" http://technet.microsoft.com/de-de/library/ee619723(WS.10).aspx and "How Certificate Revocation Works" http://technet.microsoft.com/de-de/library/ee619754(WS.10).aspx /Hasain
Free Windows Admin Tool Kit Click here and download it now
July 29th, 2011 9:01pm

Most applications cache the current CRL and won't download it again until the one that is currently cached reaches the end of its validity period. This is PKI functioning as designed per the latest RFC. If you're worried about this, you may want to think about reducing your CRL validity period or implementing OCSP instead. Please remember that OCSP responses are cached as well depending on the NetxUpdate and NextPublish fields in the OCSP response, for more information please read the TechNet articles about "Pre-Fetching" http://technet.microsoft.com/de-de/library/ee619723(WS.10).aspx and "How Certificate Revocation Works" http://technet.microsoft.com/de-de/library/ee619754(WS.10).aspx /Hasain Topic starter already has tried to invalidate all cached CRLs/OCSP responses.My weblog: http://en-us.sysadmins.lv PowerShell PKI Module: http://pspki.codeplex.com Windows PKI reference: on TechNet wiki
July 30th, 2011 5:11am

Please try to enable notifications when Internet Explorer cannot reach the certificate revocation service, the default behavior is to consider an inaccessible CRL as a "false positive" and not display any errors/warnings. To enable the notification search for FEATURE_WARN_ON_SEC_CERT_REV_FAILED in this TechNet article http://msdn.microsoft.com/en-us/library/ee330735(v=vs.85).aspx /Hasain
Free Windows Admin Tool Kit Click here and download it now
July 30th, 2011 5:46am

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics