New AD CS 2022 Issuing won't start because the revocation server is offline, but all troubleshooting steps have passed successfully.

Jacob Knecht 21 Reputation points
2022-09-12T14:35:03.12+00:00

Hello,

I'm currently in the process of standing up a Root CA and an Issuing CA in Windows Server 2022. The Root CA setup went fine, and I have both CA server publish their certificates and CRLs to an IIS server as per Microsoft’s documentation, but I'm having an issue with the Issuing CA server. After a reboot of the server, I could not start the AD CS service with the error: "The revocation function was unable to check revocation because the revocation server was offline. 0x80092013 (-2146885613 CRYPT_E_REVOCATION_OFFLINE)." Looking into Event Viewer, I am shown multiple Event IDs 48 and 100 with the error: “Revocation status for a certificate in the chain for CA certificate 1 for Issuing CA could not be verified because a server is currently unavailable. The revocation function was unable to check revocation because the revocation server was offline. 0x80092013 (-2146885613 CRYPT_E_REVOCATION_OFFLINE).”

To begin my troubleshooting, I ran the command “certutil -setreg ca\CRLFlags +CRLF_REVCHECK_IGNORE_OFFLINE” so I could get the service running. I have doubled check both CDP and AIA locations and verified that there is no typo. Both CA servers have full access to the directory and IIS server where they publish these certificates. I have checked pkiview.msc, and all statuses show OK on both tiers.
240118-screen-shot2.png

I have also tried reissuing the Issuing CA certificate with no luck. And following this [link][2] I have tried and confirmed each step of this troubleshooting guide.

Running the command “certutil -f -urlfetch -verify "Issuing_Cert.crt" gives this output below:

Issuer:  
    CN=RootCA  
    DC=###  
    DC=###  
    DC=###  
  Name Hash(sha1): 11b88de194daf1aa86ad8181262f59e944da9b01  
  Name Hash(md5): 10f669401ff14aa501f6c1828b54e88e  
Subject:  
    CN=IssuingCA  
    DC=###  
    DC=###  
    DC=###  
  Name Hash(sha1): cec2a6328c3ccd124af25610cc2513825b952532  
  Name Hash(md5): 49e408f9d701676c219bbeae2851f4a5  
Cert Serial Number: 2b00000007f3c3bf591575b554000000000007  
  
dwFlags = CA_VERIFY_FLAGS_ALLOW_UNTRUSTED_ROOT (0x1)  
dwFlags = CA_VERIFY_FLAGS_IGNORE_OFFLINE (0x2)  
dwFlags = CA_VERIFY_FLAGS_FULL_CHAIN_REVOCATION (0x8)  
dwFlags = CA_VERIFY_FLAGS_CONSOLE_TRACE (0x20000000)  
dwFlags = CA_VERIFY_FLAGS_DUMP_CHAIN (0x40000000)  
ChainFlags = CERT_CHAIN_REVOCATION_CHECK_CHAIN (0x20000000)  
HCCE_LOCAL_MACHINE  
CERT_CHAIN_POLICY_BASE  
-------- CERT_CHAIN_CONTEXT --------  
ChainContext.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)  
  
SimpleChain.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)  
  
CertContext[0][0]: dwInfoStatus=102 dwErrorStatus=0  
  Issuer: CN=RootCA, DC=###, DC=###, DC=###  
  NotBefore: 9/9/2022 10:34 AM  
  NotAfter: 9/8/2027 10:34 AM  
  Subject: CN=Issuing CA, DC=###, DC=###, DC=###  
  Serial: 2b00000007f3c3bf591575b554000000000007  
  Template: SubCA  
  Cert: 05ccadb7ce4f6f1c92eedb59748163a7532037dd  
  Element.dwInfoStatus = CERT_TRUST_HAS_KEY_MATCH_ISSUER (0x2)  
  Element.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)  
  ----------------  Certificate AIA  ----------------  
  Verified "Certificate (0)" Time: 0 61f97870555401f3f4b9f152f4c1d40fe5e3b87b  
    [0.0] http://pki. #########/pki/rootca.crt  
  
  ----------------  Certificate CDP  ----------------  
  Verified "Base CRL (04)" Time: 0 72031475f7b9257a6052ced3e22368269fc35ad3  
    [0.0] http://pki. #########/pki/rootca.crl  
  
  ----------------  Base CRL CDP  ----------------  
  No URLs "None" Time: 0 (null)  
  ----------------  Certificate OCSP  ----------------  
  No URLs "None" Time: 0 (null)  
  --------------------------------  
    CRL 04:  
    Issuer: CN=RootCA, DC=###, DC=###, DC=###  
    ThisUpdate: 9/9/2022 8:56 AM  
    NextUpdate: 9/9/2023 9:16 PM  
    CRL: 72031475f7b9257a6052ced3e22368269fc35ad3  
  
CertContext[0][1]: dwInfoStatus=10c dwErrorStatus=0  
  Issuer: CN=RootCA, DC=###, DC=###, DC=###  
  NotBefore: 9/7/2022 4:15 PM  
  NotAfter: 9/7/2032 4:25 PM  
  Subject: CN=RootCA, DC=###, DC=###, DC=###  
  Serial: 291dd20f48c5bea24e43e065f0c1cac3  
  Template: CA  
  Cert: 61f97870555401f3f4b9f152f4c1d40fe5e3b87b  
  Element.dwInfoStatus = CERT_TRUST_HAS_NAME_MATCH_ISSUER (0x4)  
  Element.dwInfoStatus = CERT_TRUST_IS_SELF_SIGNED (0x8)  
  Element.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)  
  ----------------  Certificate AIA  ----------------  
  No URLs "None" Time: 0 (null)  
  ----------------  Certificate CDP  ----------------  
  No URLs "None" Time: 0 (null)  
  ----------------  Certificate OCSP  ----------------  
  No URLs "None" Time: 0 (null)  
  --------------------------------  
  
Exclude leaf cert:  
  Chain: 5e9ce809c8f8728ec1a65b2cad97ad21ef61f30d  
Full chain:  
  Chain: 786a3a4a2e027fbba6caa443cd090f0cb8800a55  
------------------------------------  
Verified Issuance Policies: None  
Verified Application Policies: All  
Cert is a CA certificate  
Leaf certificate revocation check passed  
CertUtil: -verify command completed successfully.  

If someone could let me know what I might be missing so I can run this service with CRL list checking back on, that would be great. [2]: https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc774550(v=ws.10)?redirectedfrom=MSDN

Windows Server
Windows Server
A family of Microsoft server operating systems that support enterprise-level management, data storage, applications, and communications.
13,289 questions
Windows Server Security
Windows Server Security
Windows Server: A family of Microsoft server operating systems that support enterprise-level management, data storage, applications, and communications.Security: The precautions taken to guard against crime, attack, sabotage, espionage, or another threat.
1,856 questions
{count} votes

Accepted answer
  1. Vadims Podāns 9,126 Reputation points MVP
    2022-09-13T07:57:53.407+00:00

    I would suggest to invalidate the local revocation cache:

    certutil -setreg chain\ChainCacheResyncFiletime @now  
    

    then clear that ignore revocation flag:

    certutil -setreg ca\CRLFlags -CRLF_REVCHECK_IGNORE_OFFLINE  
    

    and start the CA.

    3 people found this answer helpful.

1 additional answer

Sort by: Most helpful
  1. Thomas Langhans 21 Reputation points
    2023-02-15T16:31:03.0533333+00:00

    Hi, it's most likeky that crl files on the root CA server have been expired. To update them, proceed with the following steps:

    1.       Start Offline Root CA

    2.       Open Administrative Command Prompt

    3.       Type Certutil –crl

    4.       Copy new crl files to a file share

    5.       Go to Enterprise subordinate CA

    6.       Copy new crl files from file share to PKI folder and System32\Certenroll

    7.       Type certutil –dspublish *.crl (one by one)

    Good luck,

    Thomas

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.