Hi, James here - I am a Support Escalation Engineer in Charlotte, NC, USA. Today I would like to talk to you about troubleshooting LDAP over SSL connectivity issues. We will be covering LDAP over SSL basics, how Subject Alternate Name’s (SAN) work, configuring Active Directory Application Mode (ADAM) for LDAP over SSL, and of course simple troubleshooting steps.
LDAP OVER SSL BASICS
In order to enable LDAP over SSL, the following server and client requirements must be met:
SERVER REQUIREMENTS
The server must have a certificate stored in the local machine store that meets the following criteria:
- Certificate Contains the Server Authentication OID: 1.3.6.1.5.5.7.3.1
- The Subject name or the first name in the SAN must match the FQDN of the host machine.
- The Certificate passes the chaining validation test.
- The host machine account has access to the private key
- Note: Typically ADAM runs under a domain account as opposed to the Local System account. In this scenario the domain account must have access to the private key. This will be covered later in the blog.
For an easy way to validate whether or not the machine has a valid certificate, we can run the following command:
Certutil –VerifyStore MY |
The output will look similar to the following:
================ Certificate 0 ================
Serial Number: 4678576700000000000e Issuer: CN=Contoso Issuing CA, DC=Contoso, DC=Com Subject: CN=ServerName.Contoso.com Certificate Template Name: Machine Non-root Certificate Template: Machine, Computer Cert Hash(sha1): d9 14 d3 cc 54 e7 02 3e a3 99 e6 31 0c 46 3d 03 81 c0 a7 cf Key Container = e08a8f744d85c46b5494c876e5a9c7c2_17012b00-a428-4a32-bb81-3d15f8bc3c10 Provider = Microsoft RSA SChannel Cryptographic Provider Private key is NOT exportable Encryption test passed Verified Issuance Policies: None Verified Application Policies: 1.3.6.1.5.5.7.3.2 Client Authentication 1.3.6.1.5.5.7.3.1 Server Authentication Certificate is valid
|
Note:
We can of course have multiple certificates in our certificate store. So the value “================ Certificate 0 ================” refers to the first certificate in the store as the index values are zero based.
We can break down the output as follows:
Subject, i.e. the name that we specify for our LDAP over SSL Connection:
Subject: ServerName.Contoso.com |
The following section lets us know that we have a valid private key:
Private key is NOT exportable
Encryption test passed
|
The following verifies the intended purpose of the certificate which is Server Authentication:
Verified Application Policies:
1.3.6.1.5.5.7.3.1 Server Authentication
|
The last section, verifies that the certificate is indeed valid. I.e. the certificate chains to a trusted issuer, is within the validity time period, and have not been revoked.
Certificate is valid |
Now we can of course run into issues at it relates to certificate validation. These will fall primarily into one of two categories, issues with the private key and issues with certificate chaining. We will cover the private key first.
Private Key
A typical error message would be:
No Key Provider Information or Missing Stored Keyset
This problem is due to a missing private key. We can confirm this by looking for the following in the Certutil output:
Cert Hash(sha1): a5 79 2f 21 82 99 4d f2 31 83 00 81 2c 84 85 3c 20 b7 5e 08
No key provider information Missing stored keyset
|
The normal cause of this problem is that the certificate request was generated on one machine and we have installed the certificate on a different machine.
When we generate a certificate request, the client generates a private key and signs the request with it. When we receive the certificate from the CA, we can verify that the certificate is based on the request that was generated by the client.
So the first step in resolving the issue is verifying which machine the certificate request was generated on. We can then go to that machine and run the following command to associate the certificate with private key container:
C:>Certutil -RepairStore MY 0
================ Certificate 0 ================ Serial Number: 334205f9000000000022 Subject: CN=MachineName.Contoso.com Non-root Certificate Cert Hash(sha1): a5 79 2f 21 82 99 4d f2 31 83 00 81 2c 84 85 3c 20 b7 5e 08 Key Container = 574d09d6-9ea4-4a64-9a2a-dc1dfabd97c9 Provider = Microsoft Enhanced Cryptographic Provider v1.0 Private key is exportable Signature test passed CertUtil: -repairstore command completed successfully.
|
We have now associated the certificate with the private key. If this command fails then it means that the private key was not located in the machine store. If we can’t locate the private key container then we will need to request a new certificate. Also, if the private key is marked as exportable we can export the certificate to the appropriate machine. If not we need a new certificate.
Certificate Validation Errors
Certificate validation is the process of verifying that the information contained in the certificate is authentic and that the certificate can only be used for its intended purpose and that the certificate is trusted.
If we have a validation issue we will see one of the following errors at the very bottom of the Certutil output:
Example 1:
A required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file. 0x800b0101 (-2146762495) ------------------------------------ Expired certificate
Example 2
Example 4
Example 5
|
Example 1, “Expired certificate”, simply means that the certificate is beyond its validity period. Now it’s possible that the system clock has been changed to an invalid date. Changing it to the correct current time will resolve the issue. However, if this is not the case then we will need to get a new certificate.
PLEASE NOTE:
You cannot renew a certificate once it has expired.
Example 2 “Certificate is REVOKED”, means that the certificate has been revoked and therefore a new certificate needs to be issued.
For examples 3 & 4 i.e. the “UNTRUSTED root” and “Revocation” errors, troubleshooting is a little more involved. The “UNTRUSTED root” error means that one of the certificates in the chain is missing from the “Intermediate Certification Authorities” container for Intermediate certificates or from the “Trusted Root Certification Authorities” for root certificates. The “Revocation” error means that either the CRL is not cached locally on the client and/or we are unable to download the CRL from one of the publication points.
Fortunately, troubleshooting these errors is straightforward. First we need to dump the certificate to a file. The syntax is as follows:
CertUtil -store CertificateStoreName CertId OutputFile |
PLEASE NOTE: For our purposes, valid certificate stores are “My”, “Trusted Root Certification Authorities”, and “Intermediate Certification Authorities”. For more information, please see the following:
Certificate stores
http://technet2.microsoft.com/windowsserver/en/library/1c4d3c02-e996-450a-bf4f-9a12d245a7eb1033.mspx?mfr=true
Example:
Certutil -store My 0 ProbCert.cer |
The next step would be to verify whether or not the certificate can access the Authority Information Access (AIA) and the Certificate Distribution Point (CDP). If we can get to at least one of the paths for each certificate in the chain, the validation test will pass. The output will look similar to the following:
Verified Issuance Policies: None
Verified Application Policies: 1.3.6.1.5.5.7.3.2 Client Authentication 1.3.6.1.5.5.7.3.1 Server Authentication Leaf certificate revocation check passed CertUtil: -verify command completed successfully.
|
If we are unable to access one of the paths, we will need to perform additional analysis of the output. In reading the output, we start at the top. Next we perform a search on the following text “CertContext”. The line will look similar to the following:
CertContext[0][0]: dwInfoStatus=102 dwErrorStatus=0 |
In this section we will see the “Subject” of the certificate i.e. the end entity that the certificate was issued to:
Subject: CN=ComputerName.Contoso.com
We will also see the Issuer of the certificate:
Issuer: CN=Contoso Issuing CA, DC=Contoso, DC=com |
Our next step is to locate the following section:
---------------- Certificate AIA ---------------- |
This section lets us know where the Issuer’s certificate is located and whether or not the client can access it. Please note that this section can contain multiple paths. The key however is that we only need to be able to access one of the paths. So in our test, the following output is fine:
---------------- Certificate AIA ----------------
Verified "Certificate (0)" Time: 0 [0.0] ldap:///CN=Contoso%20Issuing%20CA,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=Contoso,DC=Com?cACertificate?base?objectClass=certificationAuthority
Failed "AIA" Time: 0
|
As we can see, we are able to access the LDAP path to the AIA. However, we are unable to access the HTTP path. Again, since we can access one of the paths, the validation check passes. If we cannot get to either of the paths, then this will have to be resolved. In this case the proxy is blocking access to the HTTP paths.
Our next step is to perform a search for the following section:
---------------- Certificate CDP ---------------- |
The CDP path is the publication path to the certificate revocation list (CRL). The application performing the validation test checks to see whether or not the certificate has been revoked. Again, if we can access any of the paths, the validation test passes. So again in our test we can get to the LDAP paths so the validation test passes.
---------------- Certificate CDP ----------------
Verified "Base CRL (64)" Time: 0 [0.0] ldap:///CN=Contoso%20Issuing%20CA,CN=CONTOSOISSUINGCA,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=Contoso,DC=Com?certificateRevocationList?base?objectClass=cRLDistributionPoint
Verified "Delta CRL (64)" Time: 0
Failed "CDP" Time: 0
Failed "CDP" Time: 0
|
The next section we need to look for is:
---------------- Base CRL CDP ---------------- |
This section is for Delta CRLs which may or may not be available depending whether or not Delta CRLs are published. The paths are as follows:
---------------- Base CRL CDP ----------------
OK "Delta CRL (65)" Time: 0 [0.0] ldap:///CN=Contoso%20Issuing%20CA,CN=CONTOSOISSUINGCA,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=Contoso,DC=Com?deltaRevocationList?base?objectClass=cRLDistributionPoint
Failed "CDP" Time: 0
--------------------------------
|
Again we can get to the LDAP path but not the HTTP path. So, once again our validation test will pass.
This completes the validation test for this level of the certificate chain. If the issuer of the certificate is a Root Certificate then this completes the validation process. However, if this is a subordinate certificate, then we will go to the next level of the validation test. The section will look similar to the following:
CertContext[0][1]: dwInfoStatus=102 dwErrorStatus=0
Issuer: CN=Contoso Policy CA, DC=Contoso, DC=Com Subject: CN=Contoso Issuing CA, DC=Contoso, DC=Com
|
So our subject at this level is the issuer from the previous level. Again, we perform the validation test and we need to verify that we can access at least one path in the AIA section and one path in the CDP section.
Assuming that we have a three tier CA configuration, we finally get to the root.
Note:
We know that we have reached the root because we have a self-signed certificate i.e. the subject name matches the issuer name.
CertContext[0][2]: dwInfoStatus=10c dwErrorStatus=0
Issuer: CN=Contoso Root CA, DC=Contoso, DC=Com Subject: CN=Contoso Root CA, DC=Contoso, DC=Com Serial: 341f8fdd3ffce6934ee3900117eaee4e 08 85 f3 de 95 3e ac d8 78 f7 3f a8 06 0a 0f 59 bf 39 5a f6 Element.dwInfoStatus = CERT_TRUST_HAS_NAME_MATCH_ISSUER (0x4) Element.dwInfoStatus = CERT_TRUST_IS_SELF_SIGNED (0x8) Element.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100) ---------------- Certificate AIA ---------------- No URLs "None" Time: 0 ---------------- Certificate CDP ---------------- Verified "Base CRL (19)" Time: 0 [0.0] ldap:///CN=Contoso%20Root%20CA,CN=R2DOMDC1,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=Contoso,DC=Com?certificateRevocationList?base?objectClass=cRLDistributionPoint
Failed "CDP" Time: 0
|
A Windows Server 2003 Root CA does not chain the root since it’s the final authority. However, by default we include the AIA and CDP paths. Therefore, for the Root CA this can be ignored even if we have errors.
Note:
We can prevent the paths from appearing in the root by configuring a CAPolicy.inf file prior to issuing or renewing the root certificate. For more information, please see the following:
CAPolicy.inf Syntax
http://technet2.microsoft.com/windowsserver/en/library/25127c1f-4880-4764-85e8-226ce41588881033.mspx?mfr=true
So at this point we have validated the entire certificate chain. If we have errors we need to resolve them. Most of the errors will be one of the following:
- CA Cert or CRL file is missing from the publication location.
- We are unable to access the publication location due to permissions. We will most likely see an access denied error. We need to check both user and machine account permissions.
- We are unable to access the AIA or CRL due to proxy settings. Again, we need to check both user and machine proxy settings.
After fixing the errors, we need to re-run the Certutil –Verify command. If no errors are reported at the bottom of the output, then the certificate is valid.
ADAM Special Case
Validating the server certificate for an ADAM instance is exactly the same with one caveat. As stated earlier in the blog, typically ADAM runs under a domain account. The preferred method is to add the certificate to the service account store and NOT the computer store. The only time the certificate should be in the computer store is when ADAM is running under the context of the Network Service account.
If the service is running under Network Service then we will need to give the account access to the private key container.
To locate the private key container for a certificate, run the following command:
Certutil –V –Verifystore MY 0 |
Look for the following section in the output:
CERT_KEY_PROV_INFO_PROP_ID(2):
Key Container = e08a8f744d85c46b5494c876e5a9c7c2_17012b00-a428-4a32-bb81-3d15f8bc3c10 Provider = Microsoft RSA SChannel Cryptographic Provider ProviderType = c Flags = 60 KeySpec = 1
|
This key container value, “e08a8f744d85c46b5494c876e5a9c7c2_17012b00-a428-4a32-bb81-3d15f8bc3c10” is the private key container file. We can find this value under:
C:Documents and SettingsAll UsersApplication DataMicrosoftCryptoRSAMachineKeys |
We need to verify that the ADAM service account has “Read” permissions on the container.
This concludes the section on validating the server certificate. Next we will look at the client requirements.
CLIENT REQUIREMENTS
Unlike the server, the client does not require a client certificate for making the LDAP over SSL connection. However, the client does have to trust the server certificate and has to be able to verify the server’s revocation status. To verify whether or not the client trust the server certificate we need to export the server certificate to the client.
To export the certificate, run the following command on the server:
Certutil –Store My 0 ServerCert.cer |
Next we need to copy the ServerCert.cer to the client machine and run the following command:
Certutil –Verify –Urlfetch ServerCert.cer |
Please note that we will need to validate the output in the same way as we did on the server. Typically we will fail either because the chain doesn’t validate or we can’t access the CRL. The private key will not be relevant.
Note: Certutil.exe is included in the base OS for Windows Server 2003, Windows Vista, & Windows Server 2008. For Windows XP & Windows 2000 clients, we will need to make a directory and copy the following files from a Windows Server 2003 machine:
%Windir%System32Certutil.exe
%Windir%System32Certadm.dll
%Windir%System32Certcli.dll
ADDITIONAL CONSIDERATION
Subject Alternate Name (SAN)
A Subject Alternative Name (
SAN
) lets you connect to a domain controller or ADAM instance by using a name other than the computer’s FQDN. The format would be as follows:
SAN="dns=MemberServer.Contoso.com&dns=ldap.contoso.com" |
There is one caveat. The first name in the SAN has to match the FQDN of the server. The second name doesn’t matter.
LDAP over SSL Ports
By default all LDAP over SSL connections to a domain controller go over port 636. This is hardcoded and cannot be changed.
However, for ADAM we specify the port during installation. To verify which port the ADAM instance is using, we can run the following commands:
C:WINDOWSADAM>Dsdbutil
Dsdbutil: list instances
Instance Name: PKI
|
To change the ports, we can modify the following registry keys:
Final Thoughts
-
Once all errors in the validation process have been resolved on both the client and the server, we should be able to make our LDAP over SSL connections.
-
To test the connection we recommend using LDP.exe which is part of the Windows Support Tools. First try to make a connection on the server itself. If this fails, then verify the server certificate requirements using the earlier documented steps.
-
If this succeeds then we know that the server is configured properly. We can then try running LDP on the client to see if we can make the connection. Again, if it fails, then go through the client certificate requirements.
-
At this point, if we still can’t connect, then most likely the problem is not in the certificate. The problem may be that port
- We can get a network trace to verify the SSL handshake
Using these steps should resolve the majority of the LDAP over SSL connectivity issues.
ADDITIONAL RESOURCES
938703 How to troubleshoot LDAP over SSL connection problems