Webinar: PKI Insights - The Most Common Misconfigurations in Today's PKI
Schedule a Demo
Blog April 2, 2010 Certulil -verify -urlfetch, Certulil Bug, PKI, PKI environment, Windows 2016, Windows Server 2016

Certutil Bug in Windows Server 2016 Fails to Enumerate Issuance, Application Policies and OIDs

by Mark B Cooper

Recently one of our colleagues at nCipher in England related to us an issue reported by one of its customers using the certutil -verify -urlfetch command against an issued end-entity certificate on Windows Server 2016 (Build 1607). Running the command with no extra options, the command indicates a failure in the output (see figure below). During the verification process, the Issuance and Application policies that were enforced by the Issuing CA were not enumerated and verified. Of course, now the customer thought that the certificate was bad, based on a failure to show any customized policies that should have been there, as indeed they were on other certs on other machines from the same Issuing CA.

Person sitting at a laptop while viewing the PKI Spotlight Dashboard.

Expand Your PKI Visibility

Discover why seeing is securing with revolutionary PKI monitoring and alerting.

Learn More About PKI Spotlight®

Here is the last section of the results from a test certificate on the same build of Windows 2016 to confirm this. I issued a certificate from a CA where High Assurance and a Legal Issuance policy, as well as EKUS, were specified on the template. Note that the chain verification was not processed as well.

Exclude leaf cert:
  Chain: cbc725c16415046c35d3bc4512653a3e009fe32b
Full chain:
  Chain: 25973944a354bde631b436aa7450cea2560bc0e1
Issuer: CN=Contoso CA2, DC=contoso, DC=com
  NotBefore: 3/7/2019 10:07 AM
  NotAfter: 3/6/2020 10:07 AM
  Subject: CN=Rosie Cardel, CN=Users, DC=contoso, DC=com
  Serial: 1800000007e993271849e6eac1000000000007
  SubjectAltName: Other Name:Principal Name=Rosie@contoso.com
  Template: Contoso User
  Cert: 9da2e8296a7ce657bc7d6affc876d00feaed19d8
Cannot find object or property. 0x80092004 (-2146885628 CRYPT_E_NOT_FOUND)
CertUtil: -verify command FAILED: 0x80092004 (-2146885628 CRYPT_E_NOT_FOUND)
CertUtil: Cannot find object or property.

However, running the certutil utility copied from a Windows 2012 R2 Server (6.3.9600) and against the same test certificate, the command completed successfully and verified the policies. (See below).

Exclude leaf cert:
Full chain:
Verified Issuance Policies: Legal Policy Contoso High Assurance
Verified Application Policies: Secure Email Encrypting File System Client Authentication

The customer was naturally confused and reached out to Microsoft explaining the issue and the steps he’d taken, and its response confirmed that there is an issue with the certutil.exe utility in Windows Server 2016 (Build 1607). To verify this, the customer ran the certutil utility copied from both Windows 10 and a Windows 2019 Server with positive and expected results on the Windows 2016 Server. The Issuance and Application policies are checked.

Here is the reproduced result I got when using certutil from a Windows Server 2019 (Build 1809):

Exclude leaf cert:
  Chain: 5d91311146315511376942db29a5a58792f3bf25
Full chain:
  Chain: 0a04947a08d2ba59e5d15eca8473150629878a7e
Verified Issuance Policies: Legal Policy
Verified Application Policies: Secure Email Encrypting File System Client Authentication
Leaf certificate revocation check passed
CertUtil: -verify command completed successfully.  

So, Microsoft’s response was a workaround when using certutil on Windows Server 2016 (Build 1607) for the -verify switch. They suggest you should copy the certutil (and the accompanying certutil.exe.mui) file from the System32 folder on either a Windows Server 2012 R2, Windows Server 2019 or Windows 10 machine. Place the files and the certificate file you’re wanting to check in a separate folder and run it from there. The second method, though not recommended, would be to copy the cert file to one of those machines into any folder there and run the certutil -verify command from there.

Microsoft said that only the 1607 version of Windows Server 2016 had this issue. The two last SAC (Semi-Annual-Channel) releases (1709 and 1803) are Server Core and these were not tested for this article. Microsoft support also noted there wouldn’t be any fix or patch coming for this short of the next release. So, for the long haul, it appears the best way to keep your certutil utility in top shape going forward is to copy a good pair of the files to your 2016 servers where needed. A little something to add to your day!

Related Resources

  • Blog Graphic with a gold background with the Globee Awards Gold Winner logo for Public Key Infrastructure PKI Cybersecurity.
    May 10, 2024

    Globee Awards Gold Winner in PKI Cybersecurity!

    PKI, PKI Spotlight
  • Blog a shield with a lock on it representing pki and certificates with several other locks and cybersecurity components in the background
    May 1, 2024

    Strengthening Security with Centralized MFA Integration

    MFA, PKI, PKI Spotlight
  • Blog
    April 29, 2024

    PKI Insights Recap – PKI Posture Management for Digital Certificates

    Digital Certificates, PKI, PKI Insights

Mark B Cooper

President & Founder at PKI Solutions, Leading PKI Cybersecurity Subject Matter Expert, Author, Speaker, Trainer, Microsoft Certified Master.

View All Posts by Mark B Cooper


Leave a Reply

Your email address will not be published. Required fields are marked *