CARVIEW |
Navigation Menu
Error 0x80070520 #30
-
I'm not sure if this is a Simple-ACME issue, a LetsEncrypt issue or something else, but I first noticed it after upgrading from Win-ACME. |
Beta Was this translation helpful? Give feedback.
All reactions
Replies: 4 comments · 6 replies
-
This sounds like a private key permission problem. Are you acquiring the certificates on a different machine then importing them on a new machine? Are you running as administrator and which certificate store are you importing to (it needs to be the machine store either under My or Web Administration). Which version of windows is the target machine running and has it ever been upgrade from an older version of windows? You can analyze a PFX file using the certutil utility, this will let you test the PFX password etc ( |
Beta Was this translation helpful? Give feedback.
All reactions
-
The affected machine was Server 2016, never had an in-place upgrade. Certs are imported to the WebHosting store. Other than upgrading SimpleACME, my install script has been unchanged for years. However the problem seems to have gone away on its own, which is very odd. I wonder if LetsEncrypt changed something about how they issue certs and then reverted? |
Beta Was this translation helpful? Give feedback.
All reactions
-
Other things to look out for would be accidentally using an Elliptic Curve private key where you previously used RSA, normally that should be ok but some older version of Windows do have trouble. LE do change some aspect of certificates (CRLs added/changed, OCPS stapling support has been removed, different intermediate issuers) but this does sounds like a private key problem. If you just run the app on the target machine instead of importing with your own script that would remove one variable. Some windows updates can have an effect on certs, but I assume you're just using latest updates. |
Beta Was this translation helpful? Give feedback.
All reactions
-
Apologies for the slow reply, these aren't getting emailed to me for some reason. Unfortunately the problem has come back on its own and is now affecting a lot more certs. I'm copying the PFX file up to the target machine, and then using PSRemoting to import and install it. Is there some mechanism that renders the private key unreadable if you do that? As I understand it the private key is embedded in the PFX and then you just need the password to read it? |
Beta Was this translation helpful? Give feedback.
All reactions
-
I'm not sure about this specific issue, but I have experience with Powershell Remoting and I can tell you that remoting to a server (even with an admin credential) gives you less access rights then using the same credential locally. I've run into this not only with certificate stores, but also GAC (global assembly cache), Windows Update, and other subsystems. The weird thing here is that thing presumably worked before and now they don't anymore. Have you been able to pin this to any specific software version? |
Beta Was this translation helpful? Give feedback.
All reactions
-
So I installed OpenSSL onto the box that is generating the certs, and there I'm struggling to even read them:
|
Beta Was this translation helpful? Give feedback.
All reactions
-
Ok more investigating, and I think I've found the common factor: Server 2016
I'm guessing that the cached PFX file has changed to AES-256 at some point and so is breaking on the older boxes. Probably because Simple-ACME is running on Server 2019 and so thinks this won't be a problem! |
Beta Was this translation helpful? Give feedback.
All reactions
-
There sure is! The setting you'll need to modify is https://simple-acme.com/reference/settings#ProtectionMode |
Beta Was this translation helpful? Give feedback.
All reactions
-
Woohoo! that fixed it! Thank you so much! I think there might be a discrepancy between the documentation and the software:
I didn't have the ProtectionMode setting in my settings.json at all, because my config pre-dates this, and it's reverted to "default" not "legacy". I suspect the intent of setting it like this should also include the case where the setting is completely missing. I see that RC2-40 is no-longer considered secure, althrough it's probably not the end of the world since all the decryption keys are on this box anyway, are there any other algorithms that are but can still be used on server 2016. Most of the stuff I saw when trying to debug this said to use 3DES, but I see that's not supported here and also not secure. I guess I need to push for getting rid of Server 2016! :D |
Beta Was this translation helpful? Give feedback.
All reactions
-
True, the empty value is interpreted differently for the cache folder than for store plugins (central ssl and pfxfile) but the doc is copy-pasted. I thought this extra default protection for the cache would be safe enough, but you found an edge case with the remoting π. I'll have to think a bit about possibly changing this though. |
Beta Was this translation helpful? Give feedback.
There sure is!
The setting you'll need to modify is https://simple-acme.com/reference/settings#ProtectionMode