Configuration Manager 2007 : Call to HttpSendRequestSync failed for port 443 with status code 403, text: Forbidden

A Few of my customers have been having some issue recently related to the Internet SUP and it seems to boil down to the IIS Behaviour and below is one such case .

 We have a Management Point setup to support Internet clients.
 

Everything seems to be setup correctly but somehow we see the error “Call to HttpSendRequestSync failed for port 443 with status code 403, text: Forbidden” in the MPControl.log

=============

mpcontrol.log

=============

There is only one certificate in the store. SMS_MP_CONTROL_MANAGER 1/16/2009 12:04:59 AM 4488 (0x1188)

CryptVerifyCertificateSignatureEx returned error 0x80090006. SMS_MP_CONTROL_MANAGER 1/16/2009 12:04:59 AM 4488 (0x1188)

Certificate has "SSL Client Authentication" capability. SMS_MP_CONTROL_MANAGER 1/16/2009 12:04:59 AM 4488 (0x1188)

Call to HttpSendRequestSync failed for port 443 with status code 403, text: Forbidden SMS_MP_CONTROL_MANAGER 1/16/2009 12:04:59 AM 4488 (0x1188)

Successfully performed Management Point availability check against local computer. SMS_MP_CONTROL_MANAGER 1/16/2009 12:04:59 AM 4488 (0x1188)

Initialization unsuccessfully completed within the allowed interval. SMS_MP_CONTROL_MANAGER 1/16/2009 12:04:59 AM 4488 (0x1188)

So the Prime suspect was the certificate and they seemed to have been correctly configured as per Certificate Requirements for Native Mode

https://technet.microsoft.com/en-us/library/bb680733.aspx

Apparently this is what we saw in the IIS log File

======

IIS LOG

======

2009-01-16 15:45:13 W3SVC1 xx.xx.xx.xx CCM_POST /ccm_system/request - 443 – xx.xx.xx..xx ccmhttp 403 16 2148204809

2009-01-16 15:48:05 W3SVC1 xx.xx.xx.xx CCM_POST /ccm_system/request - 443 – xx.xx.xx.xx ccmhttp 403 13 2148081683

Tracking down these two errors in IIS

403.13 Client Certificate Revoked

===============================

This error message means that the client sent a certificate, but either the certificate shows up as revoked in the issuing authority's Certificate Revocation List or the server could not retrieve a CRL from the issuing authority

By default, Internet Information Services (IIS) checks to see if the client certificate that is being presented has been revoked. It does this by downloading the client certificate's Certificate Revocation List (CRL) from a Certificate Distribution Point (CDP) that is listed as part of the client certificate. If IIS is unable to download at least one of the CRLs of the client certificate, the HTTP error message is displayed in the client's browser.

403.16 - Client certificate is un trusted or invalid

=============================================

This error message is primarily generated when the certificate that the client provided is improperly formed. It can also be generated if there are intermediate certification authorities in the certificate chain that are not trusted by the Web server.

IIS returns HTTP "403.13 Client Certificate Revoked" error message although certificate is not revoked

https://support.microsoft.com/kb/294305

 

Solution

=======

 

Sol 1:

--------

We could not reach the CDP for CRL from the Web Server in question:

Look at the certificate properties CRL Distribution Point and make sure you can reach the URL mentioned

Sol 2:

--------

Turn Off the CRL Checking on the Web Server

cscript adsutil.exe Set W3SVC\CertCheckMode 1

Restart the web services

Caution: This can pose security risk in terms of checking revoked certificate.

or Incase you have Windows 2008

Cscript ADSUTIL.VBS Set W3SVC/x/CertCheckMode 1
Where x is the number of the website – most likely 1

Note: This is not because of the SCCM but the IIS behavior

Jeevan Bisht | Support Escalation Engineer

Comments

  • Anonymous
    November 19, 2010
    Great post. One correction thought, the correct syntax is cscript adsutil.vbs  Set W3SVCCertCheckMode 1

  • Anonymous
    June 16, 2011
    The comment has been removed

  • Anonymous
    February 19, 2013
    403 16 errors in the IIS log can also be caused by this little charm: support.microsoft.com/.../en-us It boils down to Mirocsoft releasing a root certificate package with about 350 certs for client computer and marking it as update for server systems as well. ISS sends the client trying to connect through SSL a list of accepted root certificates, which has become too long and gets truncated. Solution: delete all unnecessary certificates from the store. Only a few are actually required: support.microsoft.com/.../en-us