Score:0

Failed verifying certificate revocation for Enterprise certificate from non-domain computer

at flag

We have a typical offline root and issuing intermediate CA Enterprise environment.

My problem is very similar to the one found here: Certificate revocation check fails for non-domain guest in spite of accessible CRL However, I have already tried the solution posted there and it has not fixed my problem. I have tested to make sure both the full and delta CRLs are accessible from non-domain computers. We recently reconfigured our CRL distribution point to remove LDAP and only use an http distribution point. During the change, we noticed this problem. It only affects non-domain computers.

As an example, we use RDP certs in our environment. There is a GPO that is configured to distribute certs to computers. Throughout the domain, these are successfully distributed and verified within the domain. If a non-domain computer tries to RDP to a domain computer, it will consistently fail to verify the certificate revocation.

If a non-domain computer is able to retrieve the CRLs and delta CRLs successfully via http, I don't know what else is required. Any assistance is appreciated.

cn flag
`If a non-domain computer tries to RDP to a domain computer, it will consistently fail to verify the certificate revocation.` Let's see the packet capture on tcp/80 from that client to the CDP during the failure. Also what is in the CAPI2 event log.
Steve G. avatar
at flag
@GregAskew Thank you for your interest in my question. The CAPI2 log on the client is empty but you weren't specific about on which system I should be looking for that log. As far as the Wireshark capture goes. It looks pretty cut and dry to me. Maybe there's something I'm missing. The capture can be found [here](https://pastebin.com/r9QpU0vK).
cn flag
The CAPI2 log is disabled by default. You may need to enable it. It should be reviewed on the system that is exhibiting the symptom.
Binky avatar
de flag
The CRL is digitally signed (allows clients to check integrity) so the client would need (at least) the certificate corresponding to the private key that created the digital signature in order to verify the signature. Likely domain-joined computers get this certificate(s) automatically, but non-domain joined ones don't. From the AD CS [docs](https://tinyurl.com/msadcrlsign): `Like Certificates, each CRL is digitally signed by the CA which has published the CRL. Also, each CRL has a validity period beyond which it is no longer valid.`
mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.