Service pack information
To resolve this problem, obtain the
latest service pack for Windows Server 2003. For more information, click the
following article number to view the article in the Microsoft Knowledge Base:
889100 How to obtain the latest service pack for Windows Server 2003
Hotfix information
A
supported hotfix is available from Microsoft. However, this hotfix is intended
to correct only the problem that is described in this article. Apply this
hotfix only to systems that are experiencing this specific problem. This hotfix
might receive additional testing. Therefore, if you are not severely affected
by this problem, we recommend that you wait for the next software update that
contains this hotfix.
If the hotfix is available for download, there
is a "Hotfix download available" section at the top of this Knowledge Base
article. If this section does not appear, contact Microsoft Customer Service
and Support to obtain the hotfix.
Note If additional issues occur or if any troubleshooting is required,
you might have to create a separate service request. The usual support costs
will apply to additional support questions and issues that do not qualify for
this specific hotfix. For a complete list of Microsoft Customer Service and
Support telephone numbers or to create a separate service request, visit the
following Microsoft Web site:
Note The "Hotfix download available" form displays the languages for
which the hotfix is available. If you do not see your language, it is because a
hotfix is not available for that language.
Prerequisites
No prerequisites are required.
Restart requirement
You must restart your computer after you apply this hotfix.
Hotfix replacement information
This hotfix does not replace any other hotfixes.
File information
The English version of this hotfix has the file
attributes (or later file attributes) that are listed in the following table.
The dates and times for these files are listed in Coordinated Universal Time
(UTC). When you view the file information, it is converted to local time. To
find the difference between UTC and local time, use the
Time
Zone tab in the Date and Time item in Control Panel.
Windows Server 2003
IA-64-based versions
File name | File version | File
size | Date | Time | Platform | SP
requirement | Service branch |
---|
Crypt32.dll | 5.131.3790.425 | 1,578,496 | 14-Oct-2005 | 05:21 | IA-64 | None | RTMQFE |
Cryptnet.dll | 5.131.3790.425 | 160,256 | 14-Oct-2005 | 05:21 | IA-64 | None | RTMQFE |
Kdcsvc.dll | 5.2.3790.425 | 590,336 | 14-Oct-2005 | 05:21 | IA-64 | None | RTMQFE |
Kerberos.dll | 5.2.3790.425 | 907,264 | 14-Oct-2005 | 05:21 | IA-64 | None | RTMQFE |
Wcrypt32.dll | 5.131.3790.425 | 612,864 | 14-Oct-2005 | 05:21 | x86 | None | WOW |
Wcryptnet.dll | 5.131.3790.425 | 61,952 | 14-Oct-2005 | 05:21 | x86 | None | WOW |
Wkerberos.dll | 5.2.3790.425 | 344,064 | 14-Oct-2005 | 05:21 | x86 | None | WOW |
Crypt32.dll | 5.131.3790.2548 | 1,759,232 | 14-Oct-2005 | 05:21 | IA-64 | SP1 | SP1QFE |
Cryptnet.dll | 5.131.3790.2548 | 172,544 | 14-Oct-2005 | 05:21 | IA-64 | SP1 | SP1QFE |
Kdcsvc.dll | 5.2.3790.2548 | 613,888 | 14-Oct-2005 | 05:21 | IA-64 | SP1 | SP1QFE |
Kerberos.dll | 5.2.3790.2548 | 963,072 | 14-Oct-2005 | 05:21 | IA-64 | SP1 | SP1QFE |
Wcrypt32.dll | 5.131.3790.2548 | 595,968 | 14-Oct-2005 | 05:21 | x86 | SP1 | WOW |
Wcryptnet.dll | 5.131.3790.2548 | 62,464 | 14-Oct-2005 | 05:21 | x86 | SP1 | WOW |
Wkerberos.dll | 5.2.3790.2548 | 350,720 | 14-Oct-2005 | 05:21 | x86 | SP1 | WOW |
x64-based versions
File name | File version | File
size | Date | Time | Platform | SP
requirement | Service branch |
---|
Crypt32.dll | 5.131.3790.2548 | 1,428,992 | 14-Oct-2005 | 05:21 | x64 | SP1 | SP1QFE |
Cryptnet.dll | 5.131.3790.2548 | 111,104 | 14-Oct-2005 | 05:21 | x64 | SP1 | SP1QFE |
Kdcsvc.dll | 5.2.3790.2548 | 419,840 | 14-Oct-2005 | 05:21 | x64 | SP1 | SP1QFE |
Kerberos.dll | 5.2.3790.2548 | 720,896 | 14-Oct-2005 | 05:21 | x64 | SP1 | SP1QFE |
Wcrypt32.dll | 5.131.3790.2548 | 595,968 | 14-Oct-2005 | 05:21 | x86 | SP1 | WOW |
Wcryptnet.dll | 5.131.3790.2548 | 62,464 | 14-Oct-2005 | 05:21 | x86 | SP1 | WOW |
Wkerberos.dll | 5.2.3790.2548 | 350,720 | 14-Oct-2005 | 05:21 | x86 | SP1 | WOW |
x86-based versions
File name | File version | File
size | Date | Time | Platform | SP
requirement | Service branch |
---|
Crypt32.dll | 5.131.3790.425 | 612,864 | 14-Oct-2005 | 04:10 | x86 | None | RTMQFE |
Cryptnet.dll | 5.131.3790.425 | 61,952 | 14-Oct-2005 | 04:10 | x86 | None | RTMQFE |
Kdcsvc.dll | 5.2.3790.425 | 227,840 | 14-Oct-2005 | 04:10 | x86 | None | |
After you install the hotfix
Important This section, method, or task contains steps that tell you how to
modify the registry. However, serious problems might occur if you modify the
registry incorrectly. Therefore, make sure that you follow these steps
carefully. For added protection, back up the registry before you modify it.
Then, you can restore the registry if a problem occurs. For more information
about how to back up and restore the registry, click the following article
number to view the article in the Microsoft Knowledge Base:
322756 How to back up and restore the registry in Windows
If the certification authority (CA) is
unavailable to publish a new CRL after you install this hotfix, you can use
registry keys to extend the validity period of the CRL. To do this, follow
these steps.
On domain controllers
- Start Registry Editor.
- Locate the following registry subkey:
HKEY_Local_Machine\System\CurrentControlSet\Services\KDC
- On the Edit menu, click
New, and then add the following registry entry:
Value Name: CRLValidityExtensionPeriod
Value Type: DWORD
Value Data: Hours (Decimal)
Description: This DWORD value lets you to
extend the CRL validity period by a specified number of hours. When you set
this value to a nonzero value, the certificate status checking code for smart
card logons ignores any validity period errors as long as the CRL is not
expired by more than the number of specified hours. This extension of the
validity period applies only to CRLs that are used during the evaluation of
certificates that are used for smart card logon. For example, this extension
would apply to a certificate that is issued by a CA that is populated in the
NTAuth store and to any certificates that are part of the trust chain that is
used to verify the NTAuth store certificate. - Locate the following registry subkey:
HKEY_Local_Machine\System\CurrentControlSet\Services\KDC
- On the Edit menu, click New, and then add the following
registry entry:
Value Name: CRLTimeoutPeriod
Value Type: DWORD
Value Data: Seconds (Decimal)
Description: This DWORD value lets you
to specify the CRL time-out period to reduce false positives. The Key
Distribution Center (KDC) passes this value to the certificate policy checking
code. By default, the KDC specifies a time-out value of 90 seconds even if this
registry value is not set.
On client computers
Windows
XP- Start Registry editor.
- Locate the following registry subkey:
HKEY_Local_Machine\System\CurrentControlSet\Control\LSA\Kerberos
- On the Edit menu, click
New, and then add the following registry entry:
Value Name: CRLTimeoutPeriod
Value Type: DWORD
Value Data:
Seconds (Decimal)
Description: This DWORD value lets you to specify the
CRL time-out period to reduce false positives. The Kerberos client passes this
value to the certificate policy checking code. By default, the Kerberos client
specifies a time-out value of 90 seconds even if this registry value is not
set. - Locate the following registry subkey:
HKEY_Local_Machine\System\CurrentControlSet\Control\LSA\Kerberos
- On the Edit menu, click
New, and then add the following registry entry:
Value Name: UseCachedCRLOnlyAndIgnoreRevocationUnknownErrors
Value Type: DWORD
Value Data: 1
Description: After you set this
DWORD value to 1, the Kerberos clients (Smartcard logon clients) will ignore
"revocation unknown" errors that are caused by an expired CRL.
Windows Server 2003, Windows Vista, and Windows Server 2008- Start Registry Editor.
- Locate the following registry subkey:
HKEY_Local_Machine\System\CurrentControlSet\Control\LSA\Kerberos\Parameters
- On the Edit menu, click New, and then add the following registry entry:
Value Name:
CRLTimeoutPeriod
Value Type: DWORD
Value Data: Seconds (Decimal)
Description: This DWORD value lets you to specify the CRL time-out period
to reduce false positives. The Kerberos client passes this value to the
certificate policy checking code. By default, the Kerberos client specifies a
time-out value of 90 seconds even if this registry value is not set.
- Locate the following registry subkey:
HKEY_Local_Machine\System\CurrentControlSet\Control\LSA\Kerberos\Parameters
- On the Edit menu, click
New, and then add the following registry entry:
Value Name: UseCachedCRLOnlyAndIgnoreRevocationUnknownErrors
Value Type: DWORD
Value Data: 1
Description: After you set this
DWORD value to 1, the Kerberos clients (Smartcard logon clients) will ignore
"revocation unknown" errors that are caused by an expired CRL.