<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Certificate retrieval issue from RootCA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/certificate-retrieval-issue-from-rootca/m-p/4992827#M1107707</link>
    <description>&lt;P&gt;Can't seem to retrieve certificate from our internal RootCA. The device is a Catalyst 9300.&lt;/P&gt;&lt;P&gt;Current configuration:&lt;/P&gt;&lt;P&gt;crypto pki trustpoint ICERootCA&lt;BR /&gt;enrollment mode ra&lt;BR /&gt;enrollment url //infr-svr-cert02:80/certsrv/mscep/mscep.dll&lt;BR /&gt;revocation-check crl&lt;BR /&gt;auto-enroll 90&lt;/P&gt;&lt;P&gt;Result from doing "crypto pki authenicate ICERootCA" :&lt;/P&gt;&lt;P&gt;ICERootCA:Enrollment: SCEP&lt;BR /&gt;078950: Jan 9 15:08:22.661: CRYPTO_PKI: Setting crypto_ca_req_in_progress to TRUE&lt;BR /&gt;078951: Jan 9 15:08:22.661: CRYPTO_PKI: create crypto_pki_req_msg&lt;BR /&gt;078952: Jan 9 15:08:22.661: CRYPTO_PKI: dequeue CRYPTO_REQ_CA_CERT message to crypto_ca_req_qICERootCA:Client sending GetCACert request: GET /certsrv/mscep/mscep.dll/pkiclient.exe?operation=GetCACert&amp;amp;message=ICERootCA HTTP/1.0&lt;BR /&gt;User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Cisco PKI)&lt;BR /&gt;Host: infr-svr-cert02&lt;/P&gt;&lt;P&gt;ICERootCA:locked trustpoint ICERootCA, refcount is 1&lt;BR /&gt;078953: Jan 9 15:08:22.668: CRYPTO_PKI: http connection opened&lt;BR /&gt;078954: Jan 9 15:08:22.668: CRYPTO_PKI: Sending HTTP message&lt;/P&gt;&lt;P&gt;078955: Jan 9 15:08:22.668: CRYPTO_PKI: Reply HTTP header:&lt;BR /&gt;HTTP/1.0&lt;BR /&gt;User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Cisco PKI)&lt;BR /&gt;Host: infr-svr-cert02&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;% Error in receiving Certificate Authority certificate: status = FAIL, cert length = 0&lt;/P&gt;&lt;P&gt;INFR-NET-SWC18#ICERootCA:unlocked trustpoint ICERootCA, refcount is 0&lt;BR /&gt;078956: Jan 9 15:08:32.668: CRYPTO_PKI: status = 65535: failed to send out the pki message&lt;BR /&gt;078957: Jan 9 15:08:32.668: CRYPTO_PKI: Setting crypto_ca_req_in_progress to FALSEICERootCA:CA certificate download failed.&lt;BR /&gt;Reason : Socket send failure(Socket is not connected).&lt;BR /&gt;078958: Jan 9 15:08:32.669: CRYPTO_PKI: free crypto_pki_req_msg&lt;BR /&gt;078959: Jan 9 15:08:32.669: CRYPTO_PKI: transaction CRYPTO_REQ_CA_CERT completed&lt;/P&gt;&lt;P&gt;Any ideas why I can get certificate?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 09 Jan 2024 15:14:41 GMT</pubDate>
    <dc:creator>Jeff Horton</dc:creator>
    <dc:date>2024-01-09T15:14:41Z</dc:date>
    <item>
      <title>Certificate retrieval issue from RootCA</title>
      <link>https://community.cisco.com/t5/network-security/certificate-retrieval-issue-from-rootca/m-p/4992827#M1107707</link>
      <description>&lt;P&gt;Can't seem to retrieve certificate from our internal RootCA. The device is a Catalyst 9300.&lt;/P&gt;&lt;P&gt;Current configuration:&lt;/P&gt;&lt;P&gt;crypto pki trustpoint ICERootCA&lt;BR /&gt;enrollment mode ra&lt;BR /&gt;enrollment url //infr-svr-cert02:80/certsrv/mscep/mscep.dll&lt;BR /&gt;revocation-check crl&lt;BR /&gt;auto-enroll 90&lt;/P&gt;&lt;P&gt;Result from doing "crypto pki authenicate ICERootCA" :&lt;/P&gt;&lt;P&gt;ICERootCA:Enrollment: SCEP&lt;BR /&gt;078950: Jan 9 15:08:22.661: CRYPTO_PKI: Setting crypto_ca_req_in_progress to TRUE&lt;BR /&gt;078951: Jan 9 15:08:22.661: CRYPTO_PKI: create crypto_pki_req_msg&lt;BR /&gt;078952: Jan 9 15:08:22.661: CRYPTO_PKI: dequeue CRYPTO_REQ_CA_CERT message to crypto_ca_req_qICERootCA:Client sending GetCACert request: GET /certsrv/mscep/mscep.dll/pkiclient.exe?operation=GetCACert&amp;amp;message=ICERootCA HTTP/1.0&lt;BR /&gt;User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Cisco PKI)&lt;BR /&gt;Host: infr-svr-cert02&lt;/P&gt;&lt;P&gt;ICERootCA:locked trustpoint ICERootCA, refcount is 1&lt;BR /&gt;078953: Jan 9 15:08:22.668: CRYPTO_PKI: http connection opened&lt;BR /&gt;078954: Jan 9 15:08:22.668: CRYPTO_PKI: Sending HTTP message&lt;/P&gt;&lt;P&gt;078955: Jan 9 15:08:22.668: CRYPTO_PKI: Reply HTTP header:&lt;BR /&gt;HTTP/1.0&lt;BR /&gt;User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Cisco PKI)&lt;BR /&gt;Host: infr-svr-cert02&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;% Error in receiving Certificate Authority certificate: status = FAIL, cert length = 0&lt;/P&gt;&lt;P&gt;INFR-NET-SWC18#ICERootCA:unlocked trustpoint ICERootCA, refcount is 0&lt;BR /&gt;078956: Jan 9 15:08:32.668: CRYPTO_PKI: status = 65535: failed to send out the pki message&lt;BR /&gt;078957: Jan 9 15:08:32.668: CRYPTO_PKI: Setting crypto_ca_req_in_progress to FALSEICERootCA:CA certificate download failed.&lt;BR /&gt;Reason : Socket send failure(Socket is not connected).&lt;BR /&gt;078958: Jan 9 15:08:32.669: CRYPTO_PKI: free crypto_pki_req_msg&lt;BR /&gt;078959: Jan 9 15:08:32.669: CRYPTO_PKI: transaction CRYPTO_REQ_CA_CERT completed&lt;/P&gt;&lt;P&gt;Any ideas why I can get certificate?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2024 15:14:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/certificate-retrieval-issue-from-rootca/m-p/4992827#M1107707</guid>
      <dc:creator>Jeff Horton</dc:creator>
      <dc:date>2024-01-09T15:14:41Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate retrieval issue from RootCA</title>
      <link>https://community.cisco.com/t5/network-security/certificate-retrieval-issue-from-rootca/m-p/4992847#M1107709</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319353"&gt;@Jeff Horton&lt;/a&gt; try changing the enrollment url to &lt;STRONG&gt;&lt;A href="http://infr-svr-cert02:80/certsrv/mscep/mscep.dll" target="_blank" rel="noopener"&gt;http://infr-svr-cert02:80/certsrv/mscep/mscep.dll&lt;/A&gt;&lt;/STRONG&gt; try authenticating again.&lt;/P&gt;
&lt;P&gt;Does the logs on the CA indicate a problem? I believe the RSA keypair had to be 2048 or greater if using a Microsoft CA, otherwise it would error (the MS event logs would indicate this from memory).&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2024 15:43:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/certificate-retrieval-issue-from-rootca/m-p/4992847#M1107709</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-01-09T15:43:14Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate retrieval issue from RootCA</title>
      <link>https://community.cisco.com/t5/network-security/certificate-retrieval-issue-from-rootca/m-p/4992875#M1107710</link>
      <description>&lt;P&gt;Sorry I posted wrong configuration. The one I posted is the one I was troubleshooting around with. Actual configuation does include what you suggested. My apologies.&lt;/P&gt;&lt;P&gt;crypto pki trustpoint ICERootCA&lt;BR /&gt;enrollment mode ra&lt;BR /&gt;enrollment url &lt;A href="http://infr-svr-cert02:80/certsrv/mscep/mscep.dll" target="_blank"&gt;http://infr-svr-cert02:80/certsrv/mscep/mscep.dll&lt;/A&gt;&lt;BR /&gt;revocation-check crl&lt;BR /&gt;auto-enroll 90&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2024 16:23:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/certificate-retrieval-issue-from-rootca/m-p/4992875#M1107710</guid>
      <dc:creator>Jeff Horton</dc:creator>
      <dc:date>2024-01-09T16:23:28Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate retrieval issue from RootCA</title>
      <link>https://community.cisco.com/t5/network-security/certificate-retrieval-issue-from-rootca/m-p/4992878#M1107711</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319353"&gt;@Jeff Horton&lt;/a&gt; did you check the MS Cert services event logs for the errors and check the keypair as suggested?&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2024 16:26:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/certificate-retrieval-issue-from-rootca/m-p/4992878#M1107711</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-01-09T16:26:44Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate retrieval issue from RootCA</title>
      <link>https://community.cisco.com/t5/network-security/certificate-retrieval-issue-from-rootca/m-p/4992879#M1107712</link>
      <description>&lt;P&gt;I will check with server Admin to see if it has any logs to this issue.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2024 16:27:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/certificate-retrieval-issue-from-rootca/m-p/4992879#M1107712</guid>
      <dc:creator>Jeff Horton</dc:creator>
      <dc:date>2024-01-09T16:27:01Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate retrieval issue from RootCA</title>
      <link>https://community.cisco.com/t5/network-security/certificate-retrieval-issue-from-rootca/m-p/4992899#M1107718</link>
      <description>&lt;P&gt;I use 2048.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2024 16:56:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/certificate-retrieval-issue-from-rootca/m-p/4992899#M1107718</guid>
      <dc:creator>Jeff Horton</dc:creator>
      <dc:date>2024-01-09T16:56:46Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate retrieval issue from RootCA</title>
      <link>https://community.cisco.com/t5/network-security/certificate-retrieval-issue-from-rootca/m-p/4992902#M1107719</link>
      <description>&lt;P&gt;&lt;A href="https://community.cisco.com/t5/network-security/error-receiving-certificate-authority-certificate-status-fail/td-p/2453323" target="_blank"&gt;https://community.cisco.com/t5/network-security/error-receiving-certificate-authority-certificate-status-fail/td-p/2453323&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;your URL you use to download the CA cert. is wrong not reachable&amp;nbsp;&lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2024 17:10:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/certificate-retrieval-issue-from-rootca/m-p/4992902#M1107719</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-09T17:10:54Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate retrieval issue from RootCA</title>
      <link>https://community.cisco.com/t5/network-security/certificate-retrieval-issue-from-rootca/m-p/4992916#M1107721</link>
      <description>&lt;P&gt;as long as that server name is resolveable then that enrollment url should work, the correct format for a Microsoft WIndows CA SCEP server is - &lt;STRONG&gt;http://&amp;lt;server ip/hostname&amp;gt;/certsrv/mscep/mscep.dll&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319353"&gt;@Jeff Horton&lt;/a&gt; if you could provide the Windows CA logs when the admin provides this please.&lt;/P&gt;
&lt;P&gt;Can you also run some debugs and provide the output. &lt;STRONG&gt;debug crypto pki transactions,&lt;/STRONG&gt; &lt;STRONG&gt;debug crypto pki validation&lt;/STRONG&gt;&amp;nbsp;and &lt;STRONG&gt;debug crypto pki scep&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2024 17:33:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/certificate-retrieval-issue-from-rootca/m-p/4992916#M1107721</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-01-09T17:33:49Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate retrieval issue from RootCA</title>
      <link>https://community.cisco.com/t5/network-security/certificate-retrieval-issue-from-rootca/m-p/4992922#M1107722</link>
      <description>&lt;P&gt;Not seeing any errors on the CA server. Seems there should be some but the Admin or myself did not see any that mention the switch requesting the cert.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2024 17:38:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/certificate-retrieval-issue-from-rootca/m-p/4992922#M1107722</guid>
      <dc:creator>Jeff Horton</dc:creator>
      <dc:date>2024-01-09T17:38:48Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate retrieval issue from RootCA</title>
      <link>https://community.cisco.com/t5/network-security/certificate-retrieval-issue-from-rootca/m-p/4992923#M1107723</link>
      <description>&lt;P&gt;Try open url by any browser and check if it available or not&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2024 17:41:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/certificate-retrieval-issue-from-rootca/m-p/4992923#M1107723</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-09T17:41:02Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate retrieval issue from RootCA</title>
      <link>https://community.cisco.com/t5/network-security/certificate-retrieval-issue-from-rootca/m-p/4992924#M1107724</link>
      <description>&lt;P&gt;Current debug info:&lt;/P&gt;&lt;P&gt;ICERootCA:Enrollment: SCEP&lt;BR /&gt;079479: Jan 9 17:40:12.881: CRYPTO_PKI: Setting crypto_ca_req_in_progress to TRUE&lt;BR /&gt;079480: Jan 9 17:40:12.881: CRYPTO_PKI: create crypto_pki_req_msg&lt;BR /&gt;079481: Jan 9 17:40:12.881: CRYPTO_PKI: dequeue CRYPTO_REQ_CA_CERT message to crypto_ca_req_q&lt;BR /&gt;079482: Jan 9 17:40:12.881: CRYPTO_PKI_SCEP: Client sending GetCACert requestICERootCA:Client sending GetCACert request: GET /certsrv/mscep/mscep.dll/pkiclient.exe?operation=GetCACert&amp;amp;message=ICERootCA HTTP/1.0&lt;BR /&gt;User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Cisco PKI)&lt;BR /&gt;Host: 172.17.12.15&lt;/P&gt;&lt;P&gt;ICERootCA:locked trustpoint ICERootCA, refcount is 1&lt;BR /&gt;079483: Jan 9 17:40:12.881: CRYPTO_PKI: http connection opened&lt;BR /&gt;079484: Jan 9 17:40:12.881: CRYPTO_PKI: Sending HTTP message&lt;/P&gt;&lt;P&gt;079485: Jan 9 17:40:12.881: CRYPTO_PKI: Reply HTTP header:&lt;BR /&gt;HTTP/1.0&lt;BR /&gt;User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Cisco PKI)&lt;BR /&gt;Host: 172.17.12.15&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;% Error in receiving Certificate Authority certificate: status = FAIL, cert length = 0&lt;/P&gt;&lt;P&gt;INFR-NET-SWC18#ICERootCA:unlocked trustpoint ICERootCA, refcount is 0&lt;BR /&gt;079486: Jan 9 17:40:22.882: CRYPTO_PKI: status = 65535: failed to send out the pki message&lt;BR /&gt;079487: Jan 9 17:40:22.882: CRYPTO_PKI: Setting crypto_ca_req_in_progress to FALSEICERootCA:CA certificate download failed.&lt;BR /&gt;Reason : Socket send failure(Socket is not connected).&lt;BR /&gt;079488: Jan 9 17:40:22.883: CRYPTO_PKI: free crypto_pki_req_msg&lt;BR /&gt;079489: Jan 9 17:40:22.883: CRYPTO_PKI: transaction CRYPTO_REQ_CA_CERT completed&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2024 17:41:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/certificate-retrieval-issue-from-rootca/m-p/4992924#M1107724</guid>
      <dc:creator>Jeff Horton</dc:creator>
      <dc:date>2024-01-09T17:41:02Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate retrieval issue from RootCA</title>
      <link>https://community.cisco.com/t5/network-security/certificate-retrieval-issue-from-rootca/m-p/4992929#M1107725</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319353"&gt;@Jeff Horton&lt;/a&gt; debugs on the switch would reveal some useful information.&lt;/P&gt;
&lt;P&gt;I assume the switch can resolve the hostname infr-svr-cert02?&lt;/P&gt;
&lt;P&gt;Is there a host based firewall on the SCEP server infr-svr-cert02 that could be restricting requests from the switch?&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2024 17:42:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/certificate-retrieval-issue-from-rootca/m-p/4992929#M1107725</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-01-09T17:42:39Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate retrieval issue from RootCA</title>
      <link>https://community.cisco.com/t5/network-security/certificate-retrieval-issue-from-rootca/m-p/4992938#M1107727</link>
      <description>&lt;P&gt;yes it can resolve it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can see via the debug that the communication get setup ("079483: Jan 9 17:40:12.881: CRYPTO_PKI: http connection opened"), but the retrieval of the cert seems to be the issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2024 17:50:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/certificate-retrieval-issue-from-rootca/m-p/4992938#M1107727</guid>
      <dc:creator>Jeff Horton</dc:creator>
      <dc:date>2024-01-09T17:50:49Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate retrieval issue from RootCA</title>
      <link>https://community.cisco.com/t5/network-security/certificate-retrieval-issue-from-rootca/m-p/4992941#M1107728</link>
      <description>&lt;P&gt;Previous replies have the debug results.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2024 17:51:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/certificate-retrieval-issue-from-rootca/m-p/4992941#M1107728</guid>
      <dc:creator>Jeff Horton</dc:creator>
      <dc:date>2024-01-09T17:51:41Z</dc:date>
    </item>
  </channel>
</rss>

