HKEY_Local_Machine\System\CurrentControlSet\Services\KDC\CRLValidityExtensionPeriod
This seems to work on the server side (w2003 SP2), but not on the client
side (XP SP3). The client is still trying to validate the DC Cert and
displays an error on the cert validation.
Can anybody confirm the Registry key edit on the client side. Do we require
any hotfix on the client ?
thanks,
kind regards,
Claudio
certutil -sign CRLFILE.crl 3:0
This would resign for 3 days.
You must rename the updated CRL file to match the original name of the file
Then you must manually copy the CRL file to *all* CDP referenced locations.
Brian
"claudio" <cla...@discussions.microsoft.com> wrote in message
news:8778F839-B020-4A31...@microsoft.com...
I'm having the same issue and I've raised a support case with
Microsoft. I'm waiting for there response.
Darren
This is what I got back from Microsoft after a couple of weeks, I
haven't tried it yet but you can have a go:
On the Domain Controller computers.
A).
1. Start Registry editor.
2. Locate HKEY_Local_Machine\System\CurrentControlSet\Services\KDC
3. On the edit menu, click New, and then add the following registry
entry:
Value Name: CRLValidityExtensionPeriod
Value Type: DWORD
Value Data: Hours (Decimal)
Description: This DWORD value lets you to extend the CRL validity
period by a specified number of hours. When you set this value to a
non-zero value, the certificate status checking code for smart card
logons ignores any validity period errors as long as the CRL is not
expired by more than the number of specified hours. This extension of
the validity period only applies to CRLs that are used during the
evaluation of certificates used for smart card logon. For example,
this extension would apply to a certificate that is issued by a
certification authority (CA) that is populated in the NTAuth store and
to any certificates that are part of the trust chain used to verify
the NTAuth store certificate.
B).
1. Start Registry editor.
2. Locate HKEY_Local_Machine\System\CurrentControlSet\Services\KDC
3. On the edit menu, click New, and then add the following registry
entry:
Value Name: CRLTimeoutPeriod
Value Type: DWORD
Value Data: Seconds (Decimal)
Description: This DWORD value lets you to specify the CRL time-out
period to reduce false positives. The Key Distribution Center (KDC)
passes this value to the certificate policy checking code. By default,
the KDC specifies a time-out value of 90 seconds even if this registry
value is not set.
Client Computer Operating Systems.
XP
A)
1. Start Registry editor.
2. Locate HKEY_Local_Machine\System\CurrentControlSet\Services\LSA
\Kerberos
3. On the edit menu, click New, and then add the following registry
entry:
Value Name: CRLTimeoutPeriod
Value Type: DWORD
Value Data: Seconds (Decimal)
Description: This DWORD value lets you to specify the CRL time-out
period to reduce false positives. The Kerberos client passes this
value to the certificate policy checking code. By default, the
Kerberos client specifies a time-out value of 90 seconds even if this
registry value is not set.
B)
1. Start Registry editor.
2. Locate HKEY_Local_Machine\System\CurrentControlSet\Services\LSA
\Kerberos
3. On the edit menu, click New, and then add the following registry
entry:
Value Name: UseCachedCRLOnlyAndIgnoreRevocationUnknownErrors
Value Type: DWORD
Value Data: 1
Description: After you set this DWORD value to 1, the Kerberos clients
(Smartcard logon client) will ignore revocation unknown errors that
are caused by expired CRL.
Basically the location for the registry setiings on the client were
incorrect in KB887578.
Regards
Darren
I have now tested the registry settings and all works okay.
I have two possible CRL issues with third-party CAs:
- CRL of the smart card issuer (should be reachable and validated to
determine if client is allowed to logon)
- CRL of the domain controller issuer (should be reachable and
validated to determine if domain controller is trustworthy)
I use for both cases the same third-party CA. Therefore I run into
problems when the corresponding CRL is not available.
Do the registry settings apply for both CRL validation checks?
Did anybody find more documentation about the Kerberos Smartcard Login
and possible (hidden) registry settings?
I only found the basic overview in the "Secure Access Using Smart Card
Planning Guide":
http://www.microsoft.com/technet/security/guidance/networksecurity/securesmartcards/default.mspx
Thank you very much
Regards
Alex
Location: HKLM\System\CurrentControlSet\Control\Lsa\Kerberos
Value Name: UseCachedCRLOnlyAndIgnoreRevocationUnknownErrors
Value Type: DWORD
Value Data: 1
As far as your question regarding whether the fix works for both the
"DC cert CRLs" and "user cert CRLs", I would have to say yes as the
the testing I did had just a single CA which was obviously issuing
both certs.
Hope this helps, Dave
The customer reported that he had to install SP3 and it seems to work
as well with the registry settings of KB887578.
I can't verify that at the moment.
I'll keep an eye on the issue there...
Alex