07-11-2018 05:05 AM - edited 03-12-2019 05:27 AM
Hi Friends
I want to use Microsoft CA Server for authentication process in IPSec, but when I config the router and try to authenticate the router I receive the error log.
my config in router:
crypto pki trustpoint RootCA
enrollment mode ra
enrollment url http://172.18.19.12:80/certsrv/mscep/mscep.dll
password 7 1547532D550809757E6A11724A5E46202416
revocation-check none
-----------------------------
Router-B(config)#crypto pki authenticate RootCA
% Error in receiving Certificate Authority certificate: status = FAIL, cert length = 0
Router-B(config)#
Jul 11 11:37:15.031: CRYPTO_PKI: Sending CA Certificate Request:
GET /certsrv/mscep/mscep.dll/pkiclient.exe?operation=GetCACert&message=RootCA HTTP/1.0
User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Cisco PKI)
Host: 172.18.19.12
Jul 11 11:37:15.031: CRYPTO_PKI: locked trustpoint RootCA, refcount is 1
Jul 11 11:37:15.035: CRYPTO_PKI: http connection opened
Jul 11 11:37:15.035: CRYPTO_PKI: Sending HTTP message
Jul 11 11:37:15.035: CRYPTO_PKI: Reply HTTP header:
HTTP/1.0
User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Cisco PKI)
Host: 172.18.19.12
Jul 11 11:37:15.035: CRYPTO_PKI: unlocked trustpoint RootCA, refcount is 0
Jul 11 11:37:15.035: CRYPTO_PKI: locked trustpoint RootCA, refcount is 1
Jul 11 11:37:15.035: CRYPTO_PKI: unlocked trustpoint RootCA, refcount is 0
Jul 11 11:37:15.035: CRYPTO_PKI: Reply HTTP header:
HTTP/1.1 200 OK
Content-Type: application/x-x509-ca-ra-cert
Server: Microsoft-IIS/10.0
X-Powered-By: ASP.NET
Date: Wed, 11 Jul 2018 11:38:08 GMT
Connection: close
Content-Length: 2703
Content-Type indicates we have received CA and RA certificates.
Jul 11 11:37:15.035: CRYPTO_PKI:crypto_process_ca_ra_cert(trustpoint=RootCA)
Jul 11 11:37:15.039: CRYPTO_PKI: status = 0x703(E_DATA : generic data error): crypto_certc_pkcs7_extract_certs_and_crls failed
Jul 11 11:37:15.039: CRYPTO_PKI: status = 0x703(E_DATA : generic data error): crypto_pkcs7_extract_ca_cert returned
Jul 11 11:37:15.039: CRYPTO_PKI: Unable to read CA/RA certificates.
Jul 11 11:37:15.039: %PKI-3-GETCARACERT: Failed to receive RA/CA certificates.
Jul 11 11:37:15.039: CRYPTO_PKI: transaction CRYPTO_REQ_CA_CERT completed
what should I do?
best regards
07-11-2018 05:59 AM
if you do sh cry pki cert, have you actually got certs at all. error message seems inconclusive
07-13-2018 09:36 PM
Hi
I dont got any certificate in my router
07-14-2018 12:42 AM - edited 07-14-2018 12:42 AM
Is NDES role actually installed on the Windows CA or another Windows server and setup?
If yes, what are the errors in the Windows logs or under the "Certificate Authority" mmc under the Failed Requests section.
From previous experience, I encountered issues when the minimum size of the public key did not meet the minimum size specified on the certificate template. To rectify that, I created a keypair with the correct size and referenced that in the Trustpoint. E.g:-
crypto key zeroize rsa
crypto key generate rsa modulus 2048 label VPN_KEY
crypto pki trustpoint RootCA
rsakeypair VPN_KEY
HTH
07-14-2018 02:34 AM
Hi
Thank you for your reply.
Yes, NDES role installed on the Windows CA. As you said, I check the CA log in mmc consol, there is no log in "Failed Request"
I tried 1024 key size for RSA key size and I yet receive the error.
% Error in receiving Certificate Authority certificate: status = FAIL, cert length = 0
07-14-2018 02:57 AM
Are there any logs at all on the server?
This screenshot below was the mmc console I was referring to, it would display issued or failed requests. This would help to indicate where the issue is.
If there is nothing in the logs, then is the request even reaching the server?
07-14-2018 04:06 AM
Hi, I dont find any log in my CA Server.
I think, CA server has connectivity with router, because the log saies the the certificate is received but cant extract and read that.
crypto pki authenticate RootCA
Content-Type indicates we have received CA and RA certificates.
Jul 14 11:02:30.433: CRYPTO_PKI:crypto_process_ca_ra_cert(trustpoint=RootCA)
Jul 14 11:02:30.445: CRYPTO_PKI: status = 0x703(E_DATA : generic data error): crypto_certc_pkcs7_extract_certs_and_crls failed
Jul 14 11:02:30.445: CRYPTO_PKI: status = 0x703(E_DATA : generic data error): crypto_pkcs7_extract_ca_cert returned
Jul 14 11:02:30.445: CRYPTO_PKI: Unable to read CA/RA certificates.
09:04:29: %PKI-3-GETCARACERT: Failed to receive RA/CA certificates.
Jul 14 11:02:30.449: CRYPTO_PKI: transaction GetCACert completed
07-14-2018 04:41 AM
Ok, so it looks like the Cisco device cannot read the certificates in use on your Windows server. What signature algorithm are you using on your root certificates?
This link maybe related and provide some help.
HTH
07-15-2018 11:14 PM
07-16-2018 12:50 PM
07-17-2018 11:51 PM
07-18-2018 12:10 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide