Applies ToWindows Server 2008 R2 Enterprise Windows Server 2008 R2 Standard Windows Server 2008 R2 Datacenter Windows Server 2008 R2 for Itanium-Based Systems

Symptoms

On a computer that is running Windows Server 2008 R2, you use a certificate-based logon method to authenticate requests for access to one or more of the following kinds of service:

  • Wireless authentication

  • Virtual private network (VPN)

  • Smart Card-based authentication

In this situation, you cannot authenticate the requests. However, you may successfully authenticate the requests after one or more retries.Notes This issue occurs when you have an Online Certificate Status Protocol (OCSP) URL in the OCSP extension on the server-side certificate.You may experience the following two issues:

  • Event ID 29 may be logged in the System log on a domain controller. This event indicates that the currently-selected domain controller certificate is invalid and therefore blocks smart card logon. However, you may experience this issue without this event being logged.

  • A middle tier server accepts certificate based authentication and then needs to acquire a handle to the incoming credentials for impersonation. The likely scenarios for this are, but are not limited to:

    • Internet Information Server (IIS) server

    • VPN server

    • Data Access Server (DAS) server

    • NPS server

    Example event 29:

  • Log Name: System Source: Microsoft-Windows-Kerberos-Key-Distribution-Center Event ID: 29 Task Category: None Level: Warning Keywords: Classic Description: The Key Distribution Center (KDC) cannot find a suitable certificate to use for smart card logons, or the KDC certificate could not be verified. Smart card logon may not function correctly if this problem is not resolved. To correct this problem, either verify the existing KDC certificate using certutil.exe or enroll for a new KDC certificate.

Cause

This issue occurs because the locally cached Certificate Revocation List (CRL) is expired and the OSCP responder is offline.

Resolution

To resolve this issue, install the following hotfix on the affected middle tier server or on the domain controller.

Hotfix information

A supported hotfix is available from Microsoft. However, this hotfix is intended to correct only the problem that is described in this article. Apply this hotfix only to systems that are experiencing the problem described in this article. This hotfix might receive additional testing. Therefore, if you are not severely affected by this problem, we recommend that you wait for the next software update that contains this hotfix.If the hotfix is available for download, there is a "Hotfix download available" section at the top of this Knowledge Base article. If this section does not appear, contact Microsoft Customer Service and Support to obtain the hotfix. Note If additional issues occur or if any troubleshooting is required, you might have to create a separate service request. The usual support costs will apply to additional support questions and issues that do not qualify for this specific hotfix. For a complete list of Microsoft Customer Service and Support telephone numbers or to create a separate service request, visit the following Microsoft website:

http://support.microsoft.com/contactus/?ws=supportNote The "Hotfix download available" form displays the languages for which the hotfix is available. If you do not see your language, it is because a hotfix is not available for that language.

Prerequisites

To apply this hotfix, you must be running one of the following operating systems:

  • Windows Server 2008 R2

  • Windows Server 2008 R2 Service Pack 1 (SP1)

For more information about how to obtain a Windows 7 or Windows Server 2008 R2 service pack, click the following article number to view the article in the Microsoft Knowledge Base:

976932 Information about Service Pack 1 for Windows 7 and for Windows Server 2008 R2

Registry information

To apply this hotfix, you do not have to make any changes to the registry.

Restart requirement

You must restart the computer after you apply this hotfix.

Hotfix replacement information

This hotfix does not replace a previously released hotfix.

File information

The global version of this hotfix installs files that have the attributes that are listed in the following tables. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.

Windows Server 2008 R2 file information notes

Important Windows 7 hotfixes and Windows Server 2008 R2 hotfixes are included in the same packages. However, hotfixes on the Hotfix Request page are listed under both operating systems. To request the hotfix package that applies to one or both operating systems, select the hotfix that is listed under "Windows 7/Windows Server 2008 R2" on the page. Always refer to the "Applies To" section in articles to determine the actual operating system that each hotfix applies to.

  • The files that apply to a specific product, SR_Level (RTM, SPn), and service branch (LDR, GDR) can be identified by examining the file version numbers as shown in the following table.

    Version

    Product

    SR_Level

    Service branch

    6.1.760 0. 21xxx

    Windows Server 2008 R2

    RTM

    LDR

    6.1.760 1. 21xxx

    Windows Server 2008 R2

    SP1

    LDR

  • The MANIFEST files (.manifest) and the MUM files (.mum) that are installed for each environment are listed separately in the "Additional file information for Windows Server 2008 R2" section. MUM and MANIFEST files, and the associated security catalog (.cat) files, are extremely important to maintain the state of the updated components. The security catalog files, for which the attributes are not listed, are signed with a Microsoft digital signature.

For all supported x64-based versions of Windows Server 2008 R2

File name

File version

File size

Date

Time

Platform

Cryptnet.dll

6.1.7600.21149

138,752

11-Feb-2012

06:27

x64

Cryptnet.dll

6.1.7601.21921

138,752

11-Feb-2012

06:21

x64

Cryptnet.dll

6.1.7600.21149

103,424

11-Feb-2012

05:32

x86

Cryptnet.dll

6.1.7601.21921

103,424

11-Feb-2012

05:22

x86

For all supported IA-64–based versions of Windows Server 2008 R2

File name

File version

File size

Date

Time

Platform

Cryptnet.dll

6.1.7600.21149

266,752

11-Feb-2012

05:16

IA-64

Cryptnet.dll

6.1.7601.21921

266,752

11-Feb-2012

05:14

IA-64

Cryptnet.dll

6.1.7600.21149

103,424

11-Feb-2012

05:32

x86

Cryptnet.dll

6.1.7601.21921

103,424

11-Feb-2012

05:22

x86

Status

Microsoft has confirmed that this is a problem in the Microsoft products that are listed in the "Applies to" section.

More Information

The frequency of this issue depends on the availability of the OCSP server. This issue occurs when the following conditions are true:

  • A response from an OCSP URL is not received when a certificate-based logon attempt is verified.

  • None of the locally cached revocation data is time valid.

By default, Windows tries to cache and prefetch CRL certificates in advance. Sometimes, this behavior is skipped. This depends on the CRL lifetime and the presence of a NextPublish Extension. When a certificate is verified, the OCSP URL is checked first. If this verification attempt fails, Windows behaves as if it has recently tried to retrieve a CRL from a CDP point. Therefore, successive verification attempts to connect to a CRL point fail. After you install the following hotfix, the attempt to retrieve a CRL after a failed OCSP retrieval is successful.For more information about software update terminology, click the following article number to view the article in the Microsoft Knowledge Base:

824684 Description of the standard terminology that is used to describe Microsoft software updates

Additional file information

Additional file information for Windows Server 2008 R2

Additional files for all supported x64-based versions of Windows Server 2008 R2

File name

Amd64_047bbbbfdd6e8da3418389ccc596f0fc_31bf3856ad364e35_6.1.7601.21921_none_2e957a196650a594.manifest

File version

Not applicable

File size

702

Date (UTC)

11-Feb-2012

Time (UTC)

12:19

Platform

Not applicable

File name

Amd64_2806d6f4168d2765e88e5d9373bf9a95_31bf3856ad364e35_6.1.7601.21921_none_8cc20b26eca42bd3.manifest

File version

Not applicable

File size

1,048

Date (UTC)

11-Feb-2012

Time (UTC)

12:19

Platform

Not applicable

File name

Amd64_8533c7e087c9a8c9728e1de9d757b5fb_31bf3856ad364e35_6.1.7600.21149_none_1995cb01990ef133.manifest

File version

Not applicable

File size

704

Date (UTC)

11-Feb-2012

Time (UTC)

12:19

Platform

Not applicable

File name

Amd64_86778bb3da99fe6329898e5a3eba5738_31bf3856ad364e35_6.1.7601.21921_none_8cc891846384c2ea.manifest

File version

Not applicable

File size

704

Date (UTC)

11-Feb-2012

Time (UTC)

12:19

Platform

Not applicable

File name

Amd64_9c6816328add12ab044eafb482413f93_31bf3856ad364e35_6.1.7600.21149_none_3161088aee555619.manifest

File version

Not applicable

File size

702

Date (UTC)

11-Feb-2012

Time (UTC)

12:19

Platform

Not applicable

File name

Amd64_bb3bfb175d0a328820a99b7449d950ef_31bf3856ad364e35_6.1.7600.21149_none_17b0da8104d6b1ec.manifest

File version

Not applicable

File size

1,048

Date (UTC)

11-Feb-2012

Time (UTC)

12:19

Platform

Not applicable

File name

Amd64_microsoft-windows-cryptnet-dll_31bf3856ad364e35_6.1.7600.21149_none_73c6f3ea2e807779.manifest

File version

Not applicable

File size

2,282

Date (UTC)

11-Feb-2012

Time (UTC)

07:02

Platform

Not applicable

File name

Amd64_microsoft-windows-cryptnet-dll_31bf3856ad364e35_6.1.7601.21921_none_75bb183c2b9daab0.manifest

File version

Not applicable

File size

2,282

Date (UTC)

11-Feb-2012

Time (UTC)

06:50

Platform

Not applicable

File name

X86_microsoft-windows-cryptnet-dll_31bf3856ad364e35_6.1.7600.21149_none_17a8586676230643.manifest

File version

Not applicable

File size

2,280

Date (UTC)

11-Feb-2012

Time (UTC)

06:05

Platform

Not applicable

File name

X86_microsoft-windows-cryptnet-dll_31bf3856ad364e35_6.1.7601.21921_none_199c7cb87340397a.manifest

File version

Not applicable

File size

2,280

Date (UTC)

11-Feb-2012

Time (UTC)

05:52

Platform

Not applicable

Additional files for all supported IA-64–based versions of Windows Server 2008 R2

File name

Ia64_4884d8c77b8bb852a9f7d0522449c0c8_31bf3856ad364e35_6.1.7600.21149_none_791acb5ac56b3def.manifest

File version

Not applicable

File size

1,046

Date (UTC)

11-Feb-2012

Time (UTC)

12:19

Platform

Not applicable

File name

Ia64_5b3bc8046eab21b7d0d21e15e47660a0_31bf3856ad364e35_6.1.7601.21921_none_3451a477fd76986f.manifest

File version

Not applicable

File size

1,046

Date (UTC)

11-Feb-2012

Time (UTC)

12:19

Platform

Not applicable

File name

Ia64_microsoft-windows-cryptnet-dll_31bf3856ad364e35_6.1.7600.21149_none_17a9fc5c76210f3f.manifest

File version

Not applicable

File size

2,281

Date (UTC)

11-Feb-2012

Time (UTC)

06:52

Platform

Not applicable

File name

Ia64_microsoft-windows-cryptnet-dll_31bf3856ad364e35_6.1.7601.21921_none_199e20ae733e4276.manifest

File version

Not applicable

File size

2,281

Date (UTC)

11-Feb-2012

Time (UTC)

06:43

Platform

Not applicable

File name

X86_microsoft-windows-cryptnet-dll_31bf3856ad364e35_6.1.7600.21149_none_17a8586676230643.manifest

File version

Not applicable

File size

2,280

Date (UTC)

11-Feb-2012

Time (UTC)

06:05

Platform

Not applicable

File name

X86_microsoft-windows-cryptnet-dll_31bf3856ad364e35_6.1.7601.21921_none_199c7cb87340397a.manifest

File version

Not applicable

File size

2,280

Date (UTC)

11-Feb-2012

Time (UTC)

05:52

Platform

Not applicable

Need more help?

Want more options?

Explore subscription benefits, browse training courses, learn how to secure your device, and more.

Communities help you ask and answer questions, give feedback, and hear from experts with rich knowledge.