Details of the event with ID 34 of the source Microsoft-Windows-OnlineResponder

Event Source:Microsoft-Windows-OnlineResponder
Event ID:34 (0x22)
Event log:Application
Event type:Error
Symbolic Name:MSG_E_CACONFIG_SUBMIT_ENROLLMENT_REQUEST_FAILED
Event text (English):The Online Responder Service encountered an error while submitting the enrollment request for configuration %1 to certification authority %2. The request ID is %3.(%4)
Event text (German):An error occurred in the online responder service while submitting registration requests for configuration %1 to certification authority %2. Request ID: %3.(%4)

Parameter

The parameters contained in the event text are filled with the following fields:

  • %1: CAConfigurationId (win:UnicodeString)
  • %2: CAConfig (win:UnicodeString)
  • %3: RequestId (win:UnicodeString)
  • %4: ErrorCode (win:UnicodeString)

The Online Responder (Online Certificate Status Protocol, OCSP) is an alternative way of providing revocation status information for certificates. Entities that want to check the revocation status of a certificate do not have to download the complete list of all revoked certificates thanks to OCSP, but can make a specific request for the certificate in question to the online responder. For a more detailed description, see the article "Basics Online Responder (Online Certificate Status Protocol, OCSP)„.

Example events

The Online Responder Service encountered an error while submitting the enrollment request for configuration ADCS Labor Issuing CA 2 (0) to certification authority CA03.intra.adcslabor.de\ADCS Labor Issuing CA 2. The request ID is -1.(The RPC server is unavailable. 0x800706ba (WIN32: 1722 RPC_S_SERVER_UNAVAILABLE))
The Online Responder Service encountered an error while submitting the enrollment request for configuration ADCS Labor Issuing CA 1 (Key 0) to certification authority CA02.intra.adcslabor.de\ADCS Labor Issuing CA 1. The request ID is 165.(The permissions on the certificate template do not allow the current user to enroll for this type of certificate. 0x80094012 (-2146877422 CERTSRV_E_TEMPLATE_DENIED))
The Online Responder Service encountered an error while submitting the enrollment request for configuration ADCS Labor Issuing CA 2 (0) to certification authority CA03.intra.adcslabor.de\ADCS Labor Issuing CA 2. The request ID is 95.(The encryption type requested is not supported by the KDC. 0x80090342 (-2146892990 SEC_E_KDC_UNKNOWN_ETYPE))
The Online Responder Service encountered an error while submitting the enrollment request for configuration ADCS Labor Issuing CA 2 (0) to certification authority CA03.intra.adcslabor.de\ADCS Labor Issuing CA 2. The request ID is -1.(The directory service encountered an internal failure. 0x800720ee (WIN32: 8430 ERROR_DS_INTERNAL_FAILURE))

Description

Do you know TameMyCerts? TameMyCerts is an add-on for the Microsoft certification authority (Active Directory Certificate Services). It extends the function of the certification authority and enables the Application of regulationsto realize the secure automation of certificate issuance. TameMyCerts is unique in the Microsoft ecosystem, has already proven itself in countless companies around the world and is available under a free license. It can downloaded via GitHub and can be used free of charge. Professional maintenance is also offered.

This event occurs when the online responder is unable to request a new signing certificate for an online configuration. As a result, the signature certificate currently in use will expire in the foreseeable future and cause the revocation configuration to fail. See also article "Effects of the failure of the online responder (OCSP) on the verification of the revocation status of a certificate„.

The encryption type requested is not supported by the KDC. 0x80090342 (-2146892990 SEC_E_KDC_UNKNOWN_ETYPE)

Means, mutatis mutandis, that no Kerberos authentication is possible at the certificate authority because the encryption algorithm used is not known.

Can be used by the Patch from November 2022 can be triggered. This changed the standard encryption algorithms for domain controllers and forgot to include the Advanced Encryption Standard (AES), making Kerberos authentication no longer possible in hardened environments.

Safety assessment

The security assessment is based on the three dimensions of confidentiality, integrity and availability.

If no new signature certificate can be applied for before the one currently in use expires, the revocation configuration will fail. This endangers the availability of the service.

Related links:

External sources

en_USEnglish