ASP.NET Crash: System.Security.Cryptography.CryptographicException
This has been a busy month for blogging for me, I'm up to a whopping 8 posts this month including this one which is the most I have written in any given month (since Feb 2006)...
We have seen a few cases lately where ASP.NET apps die due to an unhandled CryptographicException when finalizing a SafeHandle. Here is the explanation of why this happens and what you can do to avoid it.
Problem description
Intermittently ASP.NET will crash with the following entries in the appication eventlog
Event Type: Error
Event Source: ASP.NET 2.0.50727.0
Event Category: None
Event ID: 1334
Date: 2007-10-31
Time: 08:10:03
User: N/A
Computer: PRATHER
Description:
An unhandled exception occurred and the process was terminated.
Application ID: /LM/w3svc/1/ROOT/TestCrypto
Process ID: 4296
Exception: System.Security.Cryptography.CryptographicException
Message: Keyset does not exist
StackTrace: at System.Security.Cryptography.CryptographicException.ThrowCryptogaphicException(Int32 hr)
at System.Security.Cryptography.SafeProvHandle._FreeCSP(IntPtr pProvCtx)
at System.Security.Cryptography.SafeProvHandle.ReleaseHandle()
at System.Runtime.InteropServices.SafeHandle.InternalFinalize()
at System.Runtime.InteropServices.SafeHandle.Dispose(Boolean disposing)
at System.Runtime.InteropServices.SafeHandle.Finalize()
For more information, see Help and Support Center at https://go.microsoft.com/fwlink/events.asp.
followed by this event
Event Type: Error
Event Source: .NET Runtime 2.0 Error Reporting
Event Category: None
Event ID: 5000
Date: 2007-10-31
Time: 08:10:03
User: N/A
Computer: PRATHER
Description:
EventType clr20r3, P1 w3wp.exe, P2 6.0.3790.3959, P3 45d6968e, P4 mscorlib, P5 2.0.0.0, P6 46693664, P7 4d78, P8 6, P9 udta330idobh2roz2ayvlcelag5agtls, P10 NIL.
For more information, see Help and Support Center at https://go.microsoft.com/fwlink/events.asp.
accompanied by this event in the system log...
Event Type: Warning
Event Source: W3SVC
Event Category: None
Event ID: 1009
Date: 2007-10-31
Time: 08:10:22
User: N/A
Computer: PRATHER
Description:
A process serving application pool 'DefaultAppPool' terminated unexpectedly. The process id was '4296'. The process exit code was '0xe0434f4d'.
For more information, see Help and Support Center at https://go.microsoft.com/fwlink/events.asp.
So we know that we have an unhandled CryptographicException in SafeProvHandle._FreeCSP while finalizing a SafeHandle, but we don't know why. On a related note, the reason the unhandled exception on the finalizer causes a process crash, and how to debug unhandled exceptions in general is described here.
It should also be noted that the callstacks for the same issue can be cryptographic exceptions in any of SafeProvHandle._FreeCSP, SafeHashHandle._FreeHash or SafeHandle._FreeHKey depending on the situation.
Cause:
A problem like this is pretty hard to track down because the correlation beteween cause and effect is not very obvious.
This problem only occurrs if you create RSACryptoServiceProviders while impersonated and dont clean up the keys of the RSACryptoProvider using the clear method while impersonated.
CspParameters cspParam = new CspParameters();
cspParam.Flags = CspProviderFlags.UseMachineKeyStore;
RSACryptoServiceProvider pair = new
RSACryptoServiceProvider(cspParam);
string keyInfo = pair.ToXmlString(false);
//... encrypt or decrypt data
What actually happens is this
- Impersonate user (either manually or through impersonate=true in web.config)
- Create a new RSACryptoServiceProvider with an Ephemeral Key like UseMachineKeyStore
- Undo impersonation (i.e. finish the request) without cleaning up the key
- The Key gets cleaned up when the finalizer runs under the process account
The problem here is that since the key is created while impersonated so it is created under the impersonated users profile. When the finalizer runs it does not run under the impersonated user so the key does not exist and you get an exception like "keyset does not exist", and since there is noone there to handle it the process exits out. Alternatively you could get an exception to the effect that the finalizer does not have permissions to delete a key or similar.
If you use a named keypair instead of the ephemeral keys, i.e. create a new CspParameter with an arbitrary KeyContainerName the problem will not occurr since the framework will not attempt to delete this when disposing of the RSACryptoServiceProvider.
To see the problem in action, put the above code in an aspx page with impersonate=true or surrounded by
System.Security.Principal.WindowsImpersonationContext impersonationContext;
impersonationContext = ((System.Security.Principal.WindowsIdentity)User.Identity).Impersonate();
...
impersonationContext.Undo();
And call GC.Collect(), GC.WaitForPendingFinalizers(), GC.Collect() in another aspx page.
Solution:
The solution to the problem is given in this blog post, essentially it comes down to
- Impersonate user
- Create a new RSACryptoServiceProvider (pair)
- Encrypt or Decrypt your data
- Call clear to release the keys (pair.Clear())
- Undo impersonation
Whenever we are dealing with objects that hold on to native resources we should follow the finalization/disposal rules in order to avoid higher than necessary memory usage and resource depletion, but in this case, not following the rules of disposing finalizable objects directly after use (by calling Close, Dispose or Clear, whichever the dispose method happens to be) causes even worse problems than just resource depletion...
Laters,
Tess
Comments
Anonymous
October 31, 2007
AJAX JSON in ASP.NET Ajax: Part 3. Server side deserialization and elaboration of JSON data returned...Anonymous
November 13, 2007
The comment has been removedAnonymous
November 14, 2007
I have to say that I just love it when people start chipping in with their own experiences and solutions since it means that my original goal of this blog (helping people with their asp.net issues) has gone one step further with people helping each other. Awesome:) thanks JasAnonymous
February 29, 2008
I have hit this error around a WCF call. The odd thing is that it makes no reference to internal certificates. It uses the following: <security mode="TransportWithMessageCredential"> <transport clientCredentialType="None" proxyCredentialType="None" realm=""/> <message clientCredentialType="UserName" algorithmSuite="Default"/> </security>Anonymous
April 26, 2008
I also observe the issue in C# prototype code similar to below. We would see the exception when exiting Main(). In my case, I am testing PKCS#8 and X.509 serialization (custom AsnKeyBuikder and AsnKeyParser classes). I'm treating the keys as temporal, so PersistKeyInCsp = false. It would have taken quite some time to track this down. Thanks for the blog Tess... Jeff Jeffrey Walton Pasadena, MDCreateDsaKeys() creates a DSA key pair, writes to disk, and then returns.
SignDsaMessage() retrieves the private key, signs a message, then writes the message and the signature on the message to disk.
VerifyDsaMessage() retrieves the public key, message and signature. It then verifies the message. internal static void Main(string[] args) { CreateDsaKeys(); SignDsaMessage(); VerifyDsaMessage(); }
Anonymous
January 16, 2009
The loss of the user's principal could also happen when Finalize code is trying to clean up resources or make calls to objects which demand some permissions. (for Windows development). For the same reason as finalizer could have released Principal when Finalize code runs. So in that case you could use something like this in the Finilize method AppDomain.CurrentDomain.SetPrincipalPolicy(PrincipalPolicy.WindowsPrincipal) before you make a call to an object which requests such permissions.Anonymous
January 18, 2009
I'm hitting this in SharePoint2007 when using Active Directory Federation Services. Somehow I don't think I'm going to be able to fix the code... Hopefully it's just a configuration issue...Anonymous
January 21, 2009
The comment has been removedAnonymous
April 02, 2009
I have had this problem with a Web Service that uses Bouncy Castle for DSA cryptography. The w3wp.exe process executing the asp.net program crashed after a System.Security.Cryptography.CryptographicException . Bouncy Castle being provided as MSIL-binary I could not apply your article's correction to the source. IN MY CASE THE SOLUTION WAS : In IIS, set the user for DefaultAppPool to be SYSTEM. Do this in IIS > (machine) > Application Pools > DefaultAppPool > Properties . Choose identity then set the user to "local system". Thus, even after "impersonnation" is finished, the garbage collector still has the necessary credentials (?) to destroy the problematic object. This can be a security problem but it was the only workaround I could find... Many thanks for this blog article !! JBAnonymous
August 23, 2009
Thank you somuch for sharing this info. It was great article. I solved error by just adding pair.Clear();Anonymous
February 02, 2010
Thanks so much for the information. I had this problem on one of my wesites and couldn't figure out what was causing the issue. Turning impersonation off did the trick for me. We are now using a different approach to the tasks that require impersonation. Thanks againAnonymous
March 24, 2011
I realize its been a year since the last comment was posted here, but please allow me to offer a hearty "thanks" to the author. This article described and explained precisely a situation we were encountering with intermittent CryptographicException problems. We found the offending code, and switched to the named key container in the CspParameter object for the solution. No more stray CryptographicExceptions!Anonymous
March 24, 2011
David, I am very happy to hear that even a year after the post it still helps people:)Anonymous
November 20, 2011
IIS => Application Pools (Recommend use Dedicated Pool) => Select Pools => Advanced Setting => Load User Profile = TrueAnonymous
April 02, 2014
Another three years and still a helpful post! Spent the the day trying to track down an intermittent CryptographicException, this post was a lifesaver =)