Details of the event with ID 53 of the source Microsoft-Windows-CertificationAuthority

Event Source:Microsoft-Windows-CertificationAuthority
Event ID:53 (0x35)
Event log:Application
Event type:Warning
Symbolic Name:MSG_DN_CERT_DENIED_WITH_INFO
Event text (English):Active Directory Certificate Services denied request %1 because %2. The request was for %3. Additional information: %4
Event text (German):The request %1 was rejected because %2. The request was for %3. More information: %4

Parameter

The parameters contained in the event text are filled with the following fields:

  • %1: RequestId (win:UnicodeString)
  • %2: Reason (win:UnicodeString)
  • %3: SubjectName (win:UnicodeString)
  • %4: AdditionalInformation (win:UnicodeString)

Example events

Active Directory Certificate Services denied request 146 because The public key does not meet the minimum size required by the specified certificate template. 0x80094811 (-2146875375 CERTSRV_E_KEY_LENGTH).  The request was for CN=TestNDESCert.  Additional information: Denied by Policy Module
Active Directory Certificate Services denied request 168 because The permissions on the certificate template do not allow the current user to enroll for this type of certificate. 0x80094012 (-2146877422 CERTSRV_E_TEMPLATE_DENIED). The request was for INTRA\WEB01$. Additional information: Denied by Policy Module
Active Directory Certificate Services denied request 799 because An internal error occurred. 0x80090020 (-2146893792 NTE_FAIL).  The request was for INTRA\CLIENT01$.  Additional information: Error Constructing or Publishing Certificate
Active Directory Certificate Services denied request 798 because Invalid Signature. 0x80090006 (-2146893818 NTE_BAD_SIGNATURE).  The request was for INTRA\CLIENT01$.  Additional information: Error Constructing or Publishing Certificate
Active Directory Certificate Services denied request 797 because The security token does not have storage space available for an additional container. 0x80090023 (-2146893789 NTE_TOKEN_KEYSET_STORAGE_FULL).  The request was for INTRA\CLIENT01$.  Additional information: Error Constructing or Publishing Certificate
Active Directory Certificate Services denied request 795 because The device that is required by this cryptographic provider is not ready for use. 0x80090030 (-2146893776 NTE_DEVICE_NOT_READY).  The request was for INTRA\CLIENT01$.  Additional information: Error Constructing or Publishing Certificate
Active Directory Certificate Services denied request 788 because Incorrect password. 0x80090033 (-2146893773 NTE_INCORRECT_PASSWORD).  The request was for INTRA\CLIENT01$.  Additional information: Error Constructing or Publishing Certificate
Active Directory Certificate Services denied request 782 because The signature of the certificate cannot be verified. 0x80096004 (-2146869244 TRUST_E_CERT_SIGNATURE).  The request was for INTRA\CLIENT01$.  Additional information: Error Constructing or Publishing Certificate
Active Directory Certificate Services denied request 777 because The parameter is incorrect. 0x80090027 (-2146893785 NTE_INVALID_PARAMETER).  The request was for INTRA\CLIENT01$.  Additional information: Error Constructing or Publishing Certificate
Active Directory Certificate Services denied request 356 because An attempt was made to open a Certification Authority database session, but there are already too many active sessions. The server may need to be configured to allow additional sessions. 0x8009400f (-2146877425 CERTSRV_E_NO_DB_SESSIONS). The request was for INTRA\CLIENT1$. Additional information: Denied by Policy Module
Active Directory Certificate Services denied request 838 because Bad Length. 0x80090004 (-2146893820 NTE_BAD_LEN). The request was for INTRA\CLIENT01$. Additional information: Error Constructing or Publishing Certificate
Active Directory Certificate Services denied request 34 because The certificate has invalid policy. 0x800b0113 (-2146762477 CERT_E_INVALID_POLICY).  The request was for INTRA\CLIENT4$.  Additional information: Error Constructing or Publishing Certificate Invalid Issuance Policies: 1.3.6.1.4.1.311.21.31
Active Directory Certificate Services denied request 12 because The request does not support private key attestation as defined in the certificate template. 0x8009481a (-2146875366 CERTSRV_E_KEY_ATTESTATION). The request was for INTRA\CLIENT01$. Additional information: Denied by Policy Module
Active Directory Certificate Services denied request 157 because The request contains no certificate template information. 0x80094801 (-2146875391 CERTSRV_E_NO_CERT_TYPE). The request was for CN=WEB02. Additional information: Denied by Policy Module 0x80094801, The request does not contain a certificate template extension or the CertificateTemplate request attribute.
Active Directory Certificate Services denied request 152 because The requested certificate template is not supported by this CA. 0x80094800 (-2146875392 CERTSRV_E_UNSUPPORTED_CERT_TYPE). The request was for O=ADCS Labor, CN=www.adcslabor.de. Additional information: Denied by Policy Module 0x80094800, The request was for a certificate template that is not supported by the Active Directory Certificate Services policy: 1.3.6.1.4.1.311.21.8.6301991.2938543.412570.1725121.735828.231.14577106.8832112(ADCS Lab Web Server).
Active Directory Certificate Services denied request 165405 because The RPC server is unavailable. 0x800706ba (WIN32: 1722 RPC_S_SERVER_UNAVAILABLE). The request was for INTRA\DC01$. Additional information: Denied by Policy Module
Active Directory Certificate Services denied request 57 because The certification authority's certificate contains invalid data. 0x80094005 (-2146877435 CERTSRV_E_INVALID_CA_CERTIFICATE). The request was for CN=Invalid Path Length CA. Additional information: Denied by Policy Module
Active Directory Certificate Services denied request 8 because The certificate template renewal period is longer than the certificate validity period. The template should be reconfigured or the CA certificate renewed. 0x80094814 (-2146875372 CERTSRV_E_CERT_TYPE_OVERLAP). The request was for CN=Rudi Ratlos. Additional information: Denied by Policy Module Renewing a certificate with the ADCSLaborBenutzer2 Certificate Template failed because the renewal overlap period is longer than the certificate validity period.
Active Directory Certificate Services denied request 699 because The request is missing a required private key for archival by the server. 0x80094804 (-2146875388 CERTSRV_E_ARCHIVED_KEY_REQUIRED). The request was for CN=Testuser, E=testuser@adcslabor.de. Additional information: Denied by Policy Module
Active Directory Certificate Services denied request 110791 because One or more signatures did not include the required application or issuance policies. The request is missing one or more required valid signatures. 0x8009480b (-2146875381 CERTSRV_E_SIGNATURE_REJECTED).  The request was for CN=www.bla.de.  Additional information: Denied by Policy Module 0x8009480b, The ADCSLaborWebServer Certificate Template requires 1 signatures, but only 0 were accepted.
Active Directory Certificate Services denied request 110823 because The request is missing required signature policy information. 0x80094809 (-2146875383 CERTSRV_E_SIGNATURE_POLICY_REQUIRED).  The request was for CN=Peter Pan.  Additional information: Denied by Policy Module
Active Directory Certificate Services denied request 12345 because Write lock failed due to outstanding write lock 0xc800044e (ESE: -1102 JET_errWriteConflict).  The request was for INTRA\rudi.  Additional information: Denied by Policy Module Resubmitted by INTRA\Administrator
Active Directory Certificate Services denied request 525317 because The specified time is invalid. 0x8007076d (WIN32: 1901 ERROR_INVALID_TIME).  The request was for CN=somewebsite.intra.adcslabor.de.  Additional information: Denied by Policy Module
Active Directory Certificate Services denied request 821 because The DNS name is unavailable and cannot be added to the Subject Alternate name. 0x8009480f (-2146875377 CERTSRV_E_SUBJECT_DNS_REQUIRED).  The request was for CN=pki.adcslabor.de.  Additional information: Denied by Policy Module Resubmitted by INTRA\Administrator.
Active Directory Certificate Services denied request 12345 because The specified server cannot perform the requested operation. 0x8007003a (WIN32: 58 ERROR_BAD_NET_RESP). The request was for INTRA\rudi. Additional information: Denied by Policy Module 0x8007003a, The Active Directory containing the Certification Authority could not be contacted.
Active Directory Certificate Services denied request 1234 because An internal consistency check failed. 0x8009002d (-2146893779 NTE_INTERNAL_ERROR). The request was for INTRA\CLIENT01$. Additional information: Error Constructing or Publishing Certificate
Active Directory Certificate Services denied request 12345 because Bad Data. 0x80090005 (-2146893819 NTE_BAD_DATA). The request was for CN=Rudi Ratlos. Additional information: Error Constructing or Publishing Certificate Resubmitted by INTRA\Administrator
Active Directory Certificate Services denied request 12345 because The EMail name is unavailable and cannot be added to the Subject or Subject Alternate name. 0x80094812 (-2146875374 CERTSRV_E_SUBJECT_EMAIL_REQUIRED). The request was for INTRA\rudi. Additional information: Denied by Policy Module
Active Directory Certificate Services denied request 7040 because The parameter is incorrect. 0x80070057 (WIN32: 87 ERROR_INVALID_PARAMETER).  CN=WEB01.intra.adcslabor.de.  Additional information: Denied by Policy Module
Active Directory Certificate Services denied request 12345 because The request contains conflicting template information. 0x80094802 (-2146875390 CERTSRV_E_TEMPLATE_CONFLICT). The request was for CN=test.adcslabor.de. Additional information: Denied by Policy Module 0x80094802, The request specifies conflicting certificate templates: 1.3.6.1.4.1.311.21.8.6301991.2938543.412570.1725121.735828.231.4136173.9322655(ADCSLaborWebServer)/ADCSLaborWebServer.
Active Directory Certificate Services denied request 1049 because The user name or password is incorrect. 0x8007052e (WIN32: 1326 ERROR_LOGON_FAILURE).  The request was for INTRA\WEB02$.  Additional information: Denied by Policy Module 0x8007052e, Active Directory Certificate Services could not connect to the global catalog server.  CN=WEB02,OU=Server,OU=ADCSLabor Computer,DC=intra,DC=adcslabor,DC=de

Description

Error codes that are usually part of normal Certification Authority operation:

  • The public key does not meet the minimum size required by the specified certificate template. 0x80094811 (-2146875375 CERTSRV_E_KEY_LENGTH).
  • The permissions on the certificate template do not allow the current user to enroll for this type of certificate. 0x80094012 (-2146877422 CERTSRV_E_TEMPLATE_DENIED).
  • The request contains no certificate template information. 0x80094801 (-2146875391 CERTSRV_E_NO_CERT_TYPE).
  • The requested certificate template is not supported by this CA. 0x80094800 (-2146875392 CERTSRV_E_UNSUPPORTED_CERT_TYPE).
  • The request contains conflicting template information. 0x80094802 (-2146875390 CERTSRV_E_TEMPLATE_CONFLICT).
  • The request is missing a required private key for archival by the server. 0x80094804 (-2146875388 CERTSRV_E_ARCHIVED_KEY_REQUIRED).
  • The DNS name is unavailable and cannot be added to the Subject Alternate name. 0x8009480f (-2146875377 CERTSRV_E_SUBJECT_DNS_REQUIRED)

Error codes that may indicate a misconfiguration of the certification authority:

  • The certificate has invalid policy. 0x800b0113 (-2146762477 CERT_E_INVALID_POLICY).
  • The request does not support private key attestation as defined in the certificate template. 0x8009481a (-2146875366 CERTSRV_E_KEY_ATTESTATION).
  • The RPC server is unavailable. 0x800706ba (WIN32: 1722 RPC_SERVER_UNAVAILABLE).
  • The certificate template renewal period is longer than the certificate validity period. The template should be reconfigured or the CA certificate renewed. 0x80094814 (-2146875372 CERTSRV_E_CERT_TYPE_OVERLAP).

Error codes that may indicate Active Directory, network, or certificate template misconfiguration:

  • The EMail name is unavailable and cannot be added to the Subject or Subject Alternate name. 0x80094812 (-2146875374 CERTSRV_E_SUBJECT_EMAIL_REQUIRED).
  • The request is missing required signature policy information. 0x80094809 (-2146875383 CERTSRV_E_SIGNATURE_POLICY_REQUIRED).
  • The specified server cannot perform the requested operation. 0x8007003a (WIN32: 58 ERROR_BAD_NET_RESP).
  • Incorrect password. 0x80090033 (-2146893773 NTE_INCORRECT_PASSWORD).
  • The user name or password is incorrect. 0x8007052e (WIN32: 1326 ERROR_LOGON_FAILURE).

Error codes that may indicate a malfunction of the certification authority:

  • The certification authority's certificate contains invalid data. 0x80094005 (-2146877435 CERTSRV_E_INVALID_CA_CERTIFICATE).
  • An internal error occurred. 0x80090020 (-2146893792 NTE_FAIL).
  • Invalid Signature. 0x80090006 (-2146893818 NTE_BAD_SIGNATURE).
  • The security token does not have storage space available for an additional container. 0x80090023 (-2146893789 NTE_TOKEN_KEYSET_STORAGE_FULL).
  • The device that is required by this cryptographic provider is not ready for use. 0x80090030 (-2146893776 NTE_DEVICE_NOT_READY)
  • The signature of the certificate cannot be verified. 0x80096004 (-2146869244 TRUST_E_CERT_SIGNATURE).
  • The parameter is incorrect. 0x80090027 (-2146893785 NTE_INVALID_PARAMETER).
  • An attempt was made to open a Certification Authority database session, but there are already too many active sessions. The server may need to be configured to allow additional sessions. 0x8009400f (-2146877425 CERTSRV_E_NO_DB_SESSIONS).
  • Bad Length. 0x80090004 (-2146893820 NTE_BAD_LEN).
  • Bad Data. 0x80090005 (-2146893819 NTE_BAD_DATA).

Often the cause is a malfunction of the hardware security module.

Error code NTE_BAD_DATA

If a SafeNet Hardware Security Module (HSM) is used, this error can occur if the network connection to the HSM is lost and the certification authority can no longer access the private key.

See article "Certificate request fails with error message "Bad Data. 0x80090005 (-2146893819 NTE_BAD_DATA)."„.

In the same context, events no. 86, 88 and 130 occur.

Error code CERTSRV_E_TEMPLATE_CONFLICT

Occurs if the submitted certificate request includes a Certificate Template Information extension that designates a certificate template for issuance, but a different certificate template is selected when submitting the certificate request.

Error code CERTSRV_E_TEMPLATE_DENIED

Occurs when the requesting user or computer is not authorized to request a certificate for this certificate template.

This can also occur with autoenrollment or application through the Microsoft Management Console (MMC) if the authorization to apply is through a security group and the applying user or computer has not yet re-logged in since being added to the group (for computers, this requires a reboot).

The reason is that the client-side authorization check is done using a directory query, but the actual authentication is done using a Kerberos ticket, in which the group membership is not yet mapped.

Error code CERTSRV_E_NO_CERT_TYPE

This error occurs, when a certificate request has been sent to the certification authoritybut no specification about the desired certificate template was made.

The certificate template is mandatory information. It must be specified either via an attribute within the certificate request or during submission.

When submitting the certificate request using certreq.exe, the desired certificate request can be specified with the -attrib argument:

certreq -attrib "CertificateTemplate:{name-of-the-certificate-template}" -submit {certificate-request}.req

Error code CERTSRV_E_UNSUPPORTED_CERT_TYPE

This error occurs when a certificate request was sent to the certification authority, which contains an attribute for the certificate template or which was specified when the certificate request was submitted.but this is either incorrect (e.g. typing error) or the desired certificate template was not published on this certification authority (e.g. because the certificate request was sent to the wrong certification authority).

Also occurs when the certificate authority does not have read permission on a published certificate template. By default, the certificate authority obtains read permission through the Authenticated Users entry in the certificate template's security settings.

Error code CERTSRV_E_KEY_LENGTH

This error occurs if the key length within the certificate request is smaller than the minimum size defined in the certificate template. This can occur especially with manually generated certificate requests.

The solution is to select an appropriate key size as early as the application stage and thus when generating the key pair. Alternatively, the key size can be reduced in the certificate template. Please note, that the key algorithm used is not verified by the certification authority's policy modulei.e., a certificate template with a low key length that accepts both RSA and ECC keys is technically feasible.

Error code CERTSRV_E_KEY_ATTESTATION

This error occurs when Trusted Platform Module (TPM) Key Attestation is configured, and a certificate request is received for which either no corresponding endorsement key or no certification authority certificate corresponding to the endorsement certificate is stored on the certification authority. See also article "Configuring the Trusted Platform Module (TPM) Key Attestation„.

Error code RPC_S_SERVER_UNAVAILABLE

This error occurs when a certificate is requested for a domain controller, the certificate template contains the flag CT_FLAG_SUBJECT_ALT_REQUIRE_DOMAIN_DNS and the certificate authority cannot connect to the domain controller via RPC named pipes. See article "Requesting a certificate for domain controller fails with error message "The RPC server is unavailable. 0x800706ba (WIN32: 1722 RPC_SERVER_UNAVAILABLE)".„.

Error code CERT_E_INVALID_POLICY

This error occurs if the certificate request or the certificate template contains an Enhanced Key Usage (EKU) or an Issuance Policy that is not permitted for the certification authority - i.e. that the requested policy OID is not present in the certification authority certificate and thus may not be issued by it.

This can occur in the following cases, among others:

Error code CERTSRV_E_INVALID_CA_CERTIFICATE

Basically, this error occurs when the certification authority certificate has a certificate policy (Issuance Policy) or restriction (Application Policy) or a path length constraint that conflicts with the requested certificate. Examples may include:

  • The certification authority certificate has a path length constraint and a subordinate certification authority certificate is requested
  • The certificate policy (issuance policy) on a root certification authority was changed when the certification authority certificate was renewed

See article "Certificate authority certificate request fails with error message "The certification authority's certificate contains invalid data. 0x80094005 (-2146877435 CERTSRV_E_INVALID_CA_CERTIFICATE)".„.

Error code NTE_INTERNAL_ERROR

Occurs, among other things, when there is a problem accessing a private key of the certification authority (e.g. in case of problems with a hardware security module, (especially if the Cavium Key Storage Provider of the AWS CloudHSM is used).

See also Events 100 and 130.

Error code CERTSRV_E_SUBJECT_EMAIL_REQUIRED

Occurs when the underlying certificate template is configured to write an email address in the subject of the issued certificate, but the requesting user account does not have an email address stored in Active Directory.

This can occur with administrative accounts, among others, as they often do not have a configured email address. If there is a certificate template that has configured the addition of an email address, it will always (according to the rules of the AutoEnrollment process) tries to apply for a certificate, which will fail and thus (depending on the number of accounts affected) result in a enormous growth of the Certification Authority database can lead.

Error code CERTSRV_E_NO_DB_SESSIONS

Occurs when there are too many concurrent connections to the certificate authority database - usually because a very large number of certificate requests are being processed.

See article "Certificate or revocation list issuance fails with error code CERTSRV_E_NO_DB_SESSIONS„.

May also indicate a Denial of Service (DoS) attack.

Error code JET_errWriteConflict

Occurs when there are too many concurrent connections to the certificate authority database - usually because a very large number of certificate requests are being processed.

See also error code CERTSRV_E_NO_DB_SESSIONS.

For more information see article "Certificate or revocation list issuance fails with error code CERTSRV_E_NO_DB_SESSIONS„.

May also indicate a Denial of Service (DoS) attack.

Error code CERTSRV_E_CERT_TYPE_OVERLAP

Occurs when the timely renewal of the certification authority certificate was missed. Towards the end of the validity of the certification authority certificate, the issued certificates are truncated in their validity periods (see Event no. 97) and finally certificates are requested which would be valid for a shorter period than the renewal period configured in the certificate template (if this would exceed the remaining validity of the certification authority certificate).

Error code CERTSRV_E_SIGNATURE_REJECTED

Occurs when a certificate template requires a signature (Issuance Requirements tab) and this signature cannot be verified, for example...

  • if the certification authority that issued the signature certificate is not approved for Enhanced Key Usage or Issuance Policy for this purpose (e.g. due to constraints in the certification authority certificate)
  • if the certification authority that issued the signature certificate does not have a trust status on the issuing certification authority

It is also important for understanding here that the signature certificate can be issued by another certification authority. It will be accepted as long as it is classified as trustworthy.

Error code CERTSRV_E_SIGNATURE_POLICY_REQUIRED

Occurs when the certificate template requires the certificate request to have a certificate enrollment agent signature, but the submitted certificate request does not contain one.

See also article "Certificate request fails with error message "The request is missing required signature policy information. 0x80094809 (-2146875383 CERTSRV_E_SIGNATURE_POLICY_REQUIRED)".„.

Error code CERTSRV_E_SUBJECT_DNS_REQUIRED

Occurs when a certificate template (usually for computer certificates) is configured to form the Subject Distinguished Name or the Subject Alternative Name from the Active Directory and to enter the DNS name of the requester in the issued certificate. The error message states that the requesting account does not have a DNS name (the dNSHostName attribute on the Active Directory object is not populated).

Also occurs when an administrator manually submits a certificate request against such a certificate template (a user account usually does not have a dNSHostName attribute).

Error code CERT_E_INVALID_POLICY

Attempts have been made to issue a certificate that would have Restrictions on the Extended Key Usage of the Certification Authority Certificate (Qualified Subordination, also Enhanced Key Usage Constraints) is violated.

The certification authority certificate contains a list of allowed Enhanced Key Usages that the reported Enhanced Key Usage does not contain. The enhanced key usages are taken from the certificate template and overwrite any attributes in the certificate request.

Error code ERROR_INVALID_TIME

Occurs when the EDITF_ATTRIBUTEENDDATE flag is enabled on the certification authority to To be able to issue certificates with a shortened validity period, and an invalid date was requested in the certificate request.

Safety assessment

The security assessment is based on the three dimensions of confidentiality, integrity and availability.

Events with error codes that indicate a malfunction of the certification authority can be an indication that availability is impaired.

The error code CERT_E_INVALID_POLICY may indicate an attack attempt and should possibly be alerted.

Microsoft rating

Microsoft evaluates this event in the Securing Public Key Infrastructure (PKI) Whitepaper with a severity score of "Low".

Related links:

External sources

16 thoughts on “Details zum Ereignis mit ID 53 der Quelle Microsoft-Windows-CertificationAuthority”

Comments are closed.

en_USEnglish