Hi,
I've reviewed an awful lot of posts but nothing seems to be helping on the issue I have. I'll explain the background - there was/is a two-tier PKI with Standalone Offline Root and Enterprise Issuing CA. Issuing CA running 2008 R2. Smart cards were
working fine. This was setup many years ago and since then the Root CA has been lost (before my time here - possibly deleted, lost during Datacentre migration - it doesn't matter how, but it's gone so I'm unable to update the CRL).
The CRL certificate expired and smartcards failed to login. Other certs have a warning, but continue to function atm.
I have stood up a new two-tier PKI with 2012 R2, offline root and enterprise issuing CA. I've removed the templates from the old issuing CA and enabled them on the new Issuing CA. All certs except Smart Cards are working.
PKIView is all good, CDP & AIA are all available with no errors on the new PKI.
Certutil -enterprise -verifystore NTAuth displays the certificate (and the previous Root, and the one before that!)
================ Certificate 2 ================
Serial Number: 41000000027aa36b1fa6fe556c000000000002
Issuer: CN=Root-CA
NotBefore: 28/11/2014 17:37
NotAfter: 28/11/2024 16:53
Subject: CN=Issuing-CA1, dc=domain, dc=local
CA Version: V0.0
Certificate Template Name (Certificate Type): SubCA
Non-root Certificate
Template: SubCA, Subordinate Certification Authority
Cert Hash(sha1): 69 dc 5b 2d ce 03 60 9a c8 c7 65 e4 17 66 59 19 f4 f3 9b 23
No key provider information
Cannot find the certificate and private key for decryption.
-------- CERT_CHAIN_CONTEXT --------
ChainContext.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
ChainContext.dwRevocationFreshnessTime: 4 Days, 17 Minutes, 57 Seconds
SimpleChain.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
SimpleChain.dwRevocationFreshnessTime: 4 Days, 17 Minutes, 57 Seconds
CertContext[0][0]: dwInfoStatus=102 dwErrorStatus=0
Issuer: CN=Root-CA
NotBefore: 28/11/2014 17:37
NotAfter: 28/11/2024 16:53
Subject: CN=Issuing-CA1, dc=domain, dc=local
Serial: 41000000027aa36b1fa6fe556c000000000002
Template: SubCA
69 dc 5b 2d ce 03 60 9a c8 c7 65 e4 17 66 59 19 f4 f3 9b 23
Element.dwInfoStatus = CERT_TRUST_HAS_KEY_MATCH_ISSUER (0x2)
Element.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
CRL 02:
Issuer: CN=Root-CA
e2 4f 10 52 dc 51 ce 69 f3 34 84 20 8d ee 7d cb 35 6c e0 d6
CertContext[0][1]: dwInfoStatus=10c dwErrorStatus=0
Issuer: CN=Root-CA
NotBefore: 28/11/2014 16:43
NotAfter: 28/11/2024 16:53
Subject: CN=Root-CA
Serial: 7a06617d72011bbd4eca9c7045377537
a6 d0 cc ad 60 75 12 6f 93 ce 36 50 56 01 ff 7e c1 de 0e 65
Element.dwInfoStatus = CERT_TRUST_HAS_NAME_MATCH_ISSUER (0x4)
Element.dwInfoStatus = CERT_TRUST_IS_SELF_SIGNED (0x8)
Element.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
Exclude leaf cert:
78 51 c3 a3 43 70 48 34 4f 77 a6 86 aa 72 b7 cc 85 2c e6 ef
Full chain:
12 e1 0e 77 c2 7f 9e f8 dc 62 5e 15 70 1d 82 7c b9 a0 ff 5e
Issuer: CN=Root-CA
NotBefore: 28/11/2014 17:37
NotAfter: 28/11/2024 16:53
Subject: CN=Issuing-CA1, dc=domain, dc=local
Serial: 41000000027aa36b1fa6fe556c000000000002
Template: SubCA
69 dc 5b 2d ce 03 60 9a c8 c7 65 e4 17 66 59 19 f4 f3 9b 23
A certification chain processed correctly, but one of the CA certificates is not trusted by the policy provider. 0x800
------------------------------------
Certificate is NOT valid: A certification chain processed correctly, but one of the CA certificates is not trusted by
x800b0112 (-2146762478)
Certutil -verify %cert.crt% looks OK
certutil -verify c:\newdomainauthcert.cer
Issuer:
CN=Issuing-CA1
dc=domain
dc=local
Subject:
EMPTY (DNS Name=DC1.domain.local)
Cert Serial Number: 67000000407709f626c5a6a2a1000000000040
dwFlags = CA_VERIFY_FLAGS_CONSOLE_TRACE (0x20000000)
dwFlags = CA_VERIFY_FLAGS_DUMP_CHAIN (0x40000000)
ChainFlags = CERT_CHAIN_REVOCATION_CHECK_CHAIN_EXCLUDE_ROOT (0x40000000)
HCCE_LOCAL_MACHINE
CERT_CHAIN_POLICY_BASE
-------- CERT_CHAIN_CONTEXT --------
ChainContext.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
ChainContext.dwRevocationFreshnessTime: 3 Days, 22 Hours, 23 Minutes, 12 Seconds
SimpleChain.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
SimpleChain.dwRevocationFreshnessTime: 3 Days, 22 Hours, 23 Minutes, 12 Seconds
CertContext[0][0]: dwInfoStatus=102 dwErrorStatus=0
Issuer: CN=Issuing-CA1, dc=domain, dc=local
NotBefore: 02/12/2014 14:21
NotAfter: 02/12/2015 14:21
Subject:
Serial: 67000000407709f626c5a6a2a1000000000040
SubjectAltName: DNS Name=DC1.domain.local
Template: Domain Controller Authentication
c4 eb fe ac 5c a6 5b b5 37 c2 0d 59 5e 1e 7d c1 ff ac d3 85
Element.dwInfoStatus = CERT_TRUST_HAS_KEY_MATCH_ISSUER (0x2)
Element.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
CRL 12:
Issuer: CN=Issuing-CA1, dc=domain, dc=local
4c b8 cb c3 ca 25 ad 13 d2 f8 82 6d c0 ab 04 aa 8b 65 e3 c5
Delta CRL 13:
Issuer: CN=Issuing-CA1, dc=domain, dc=local
a7 cd 33 aa b2 ed 8e a7 5c 22 cf 60 98 45 d8 3b 4e 34 45 d4
Application[0] = 1.3.6.1.5.5.7.3.2 Client Authentication
Application[1] = 1.3.6.1.5.5.7.3.1 Server Authentication
Application[2] = 1.3.6.1.4.1.311.20.2.2 Smart Card Logon
CertContext[0][1]: dwInfoStatus=102 dwErrorStatus=0
Issuer: CN=Root-CA
NotBefore: 28/11/2014 17:37
NotAfter: 28/11/2024 16:53
Subject: CN=Issuing-CA1, dc=domain, dc=local
Serial: 41000000027aa36b1fa6fe556c000000000002
Template: SubCA
69 dc 5b 2d ce 03 60 9a c8 c7 65 e4 17 66 59 19 f4 f3 9b 23
Element.dwInfoStatus = CERT_TRUST_HAS_KEY_MATCH_ISSUER (0x2)
Element.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
CRL 02:
Issuer: CN=Root-CA
e2 4f 10 52 dc 51 ce 69 f3 34 84 20 8d ee 7d cb 35 6c e0 d6
CertContext[0][2]: dwInfoStatus=10c dwErrorStatus=0
Issuer: CN=Root-CA
NotBefore: 28/11/2014 16:43
NotAfter: 28/11/2024 16:53
Subject: CN=Root-CA
Serial: 7a06617d72011bbd4eca9c7045377537
a6 d0 cc ad 60 75 12 6f 93 ce 36 50 56 01 ff 7e c1 de 0e 65
Element.dwInfoStatus = CERT_TRUST_HAS_NAME_MATCH_ISSUER (0x4)
Element.dwInfoStatus = CERT_TRUST_IS_SELF_SIGNED (0x8)
Element.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
Exclude leaf cert:
66 ef a4 ea bc e8 2e 48 d1 80 81 ef 94 81 63 88 9a 6c d0 ef
Full chain:
17 08 b2 74 ee 70 70 96 68 0e 8c 9d ac 1a b0 59 a0 12 d7 69
------------------------------------
Verified Issuance Policies: None
Verified Application Policies:
1.3.6.1.5.5.7.3.2 Client Authentication
1.3.6.1.5.5.7.3.1 Server Authentication
1.3.6.1.4.1.311.20.2.2 Smart Card Logon
Leaf certificate revocation check passed
CertUtil: -verify command completed successfully.
On the DCs I am receiving the Kerberos-Key-Distribution-Center Event ID 19 & 29. I have requested new Domain Controller Authentication & Kerberos Authentication certificates for all DCs, and on the site where we are testing the logon I have
removed the old certs from the Computer\Personal store for Domain Controller Authentication/Kerberos Authentication - tried again and still it failed with the message "The system could not log you on. You cannot use a smart card to log on because smart
card logon is not supported for your user account...."
When I restart the Kerberos Key Distribution Center service I see the Event ID 29.
I've reviewed the following KB's and all have not helped:
- http://technet.microsoft.com/en-us/library/cc733944%28v=ws.10%29.aspx
- http://technet.microsoft.com/en-us/library/cc734096.aspx
Does anyone have any thoughts why this may be happening?
Thanks