Root Certificate Update Solution – Windows Server 2008

certificate-authorityssl-certificatewindows-server-2008

We have an application attempting to run licensing checks via http over the web. The machines this software resides on are Server 2008 vm's with no domain configured.

While tracking what is happening via Fiddler2, after the initial tunnel to the secure site, this Root Certificate update attempt happens and we have this external traffic blocked, so it comes up with:

Request Header: GET /msdownload/update/v3/static/trustedr/en/authrootstl.cab HTTP/1.1

HTTP/1.1 502 Fiddler - DNS Lookup Failed
Date: Thu, 09 Apr 2015 15:30:19 GMT
Content-Type: text/html; charset=UTF-8
Connection: close
Cache-Control: no-cache, must-revalidate
Timestamp: 11:30:19.171

[Fiddler] DNS Lookup for "www.download.windowsupdate.com" failed.     System.Net.Sockets.SocketException No such host is known 

The root of the problem is that it can't seem to decrypt the data to read the licensing to be validated. Is there a way I can manually install the certificates?

I have tried:

Installing the file (msdownload/update/v3/static/trustedr/en/authrootstl.cab) manually by extracting > right clicking the authroot file and "Install CTL".

After doing this, I now get the following GET request:

`GET "/fcpca/caCertsIssuedByfcpca.p7c HTTP/1.1"`

Which of course if blocked also.

To test another machine, we opened access temporarily, ran the software, the updates and licensing ran fine. Even after we blocked access to the internet again, the licensing still works but the attempt to connect to Microsoft's servers no longer occurs.

Any ideas?

Best Answer

You have installed the trust list. Now it's trying to grab the CA certificate. You're probably going to have to grab that certificate manually as well. It appears that this is the certificate chain it is trying to obtain:

http://http.fpki.gov/fcpca/caCertsIssuedTofcpca.p7c

Download it and import it into your computer's Trusted Root Certification Authorities.

It is mentioned in this TechNet blog: http://blogs.technet.com/b/pki/archive/2011/03/13/deployment-of-the-new-federal-common-policy-ca-root-certificate.aspx