Online Responder (OCSP) request with hashAlgorithm SHA256, response unauthorized (6)

Christophe_M 40 Reputation points
2025-02-05T08:06:54.7566667+00:00

Hi!

We faced with the problem of OCSP role on Windows Server 2019 (I also tried to rise the same role on our test Windows Server 2025 with the same result). We started updating our old Cisco devices to a new firmware and our remote vpn spokes lost their connections to HQ HUBs. I made some investigation and found in the logs of our hubs:

Feb  4 16:12:20.979: OCSP: (93333)OCSP Parse HTTP Response command
*Feb  4 16:12:20.979: OCSP: (93333)OCSP Validate DER Response command
*Feb  4 16:12:20.980: CRYPTO_PKI: OCSP response status - unauthorized.
*Feb  4 2025 19:12:20.980: %PKI-3-OCSP_RESPONSE_STATUS: OCSP response status failed
                      Reason :  unauthorized.
*Feb  4 16:12:20.980: ../VIEW_ROOT/cisco.comp/pki_ssl/src/ca/provider/revoke/ocsp/ocsp.c(4241) : E_NOT_AUTHORIZED : not authorized/identified to use service
*Feb  4 16:12:20.980: ../cert-c/source/asn1pub.c(283) : E_INVALID_PARAMETER : invalid function parameter (inputBER)
*Feb  4 16:12:20.980: CRYPTO_PKI: failed to decode OCSP response.
*Feb  4 16:12:20.980: CRYPTO_PKI: OCSP Error 0 - marking revocation status as UNKNOWN
*Feb  4 16:12:20.980: CRYPTO_PKI: (93333) OCSP revocation check is complete 0
*Feb  4 16:12:20.980: OCSP: destroying OCSP trans element
*Feb  4 16:12:20.980: PKI_REVO: Got a queue event - revocation process:Cert status - CRYPTO_INVALID_CERT
*Feb  4 2025 19:12:20.980: %PKI-3-CERTIFICATE_INVALID: Certificate chain validation has failed.:Certificate chain validation has failed.
*Feb  4 16:12:20.980: CRYPTO_PKI: (93333)chain cert was anchored to trustpoint *****_SCEP, and chain validation result was: CRYPTO_INVALID_CERT
*Feb  4 16:12:20.980: CRYPTO_PKI: (93333) Certificate validation failed
*Feb  4 16:12:20.980: CRYPTO_PKI: (93333) Removing verify context

Ok, I checked my OCSP configuration:

User's image

It looks ok. I made network dumps from old device (not updated) and new device. I found that the only one difference: OCSP Request hashAlgorithm from Cisco device. The old is 1.3.14.3.2.26 (SHA-1) and new is 2.16.840.1.101.3.4.2.1 (sha256). Please, see the screenshots below:

Old firmware request and response:

User's image

User's image

New firmware request and response:

User's image

User's image

So, we had to move to .crl links instead of OCSP. I checked a lot of articles on the Internet but there was nothing about this issue. Maybe someone got the same problem and successfully resolved it? Should we move to OCSP server from different vendor of fix something on our Windows Severs OCSP role?

Thank you!

Windows Server
Windows Server
A family of Microsoft server operating systems that support enterprise-level management, data storage, applications, and communications.
13,665 questions
Windows Server Security
Windows Server Security
Windows Server: A family of Microsoft server operating systems that support enterprise-level management, data storage, applications, and communications.Security: The precautions taken to guard against crime, attack, sabotage, espionage, or another threat.
1,902 questions
0 comments No comments
{count} votes

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.