Could not retrieve an OCSP response.

Andreas 1,321 Reputation points
2023-02-02T08:54:37.2433333+00:00

Hi,

We have 1 MS 2022 CA server, and have noticed on our DC`s the following error message

EventID 36928

Source Schannel

Could not retrieve an OCSP response.

   The Failure Reason is: REASON_OCSP_RESPONSE_RETRIEVAL_ERROR
    The OCSP Url is: 
   The previous OCSP response contained the following times:
      ThisUpdate: ‎1601‎-‎01‎-‎01T00:00:00.000000000Z
      NextUpdate: ‎1601‎-‎01‎-‎01T00:00:00.000000000Z

The attached data contains the certificate.

User's image

We don't have a OCSP installed, so why does this error message ? And as I understand we do not need any OCSP either. We only publish internal machine certificates so the machines can connect to the Wifi.

Please advice.

Thanks for any reply

/R

Andy

Windows Server
Windows Server
A family of Microsoft server operating systems that support enterprise-level management, data storage, applications, and communications.
13,044 questions
Windows Server Infrastructure
Windows Server Infrastructure
Windows Server: A family of Microsoft server operating systems that support enterprise-level management, data storage, applications, and communications.Infrastructure: A Microsoft solution area focused on providing organizations with a cloud solution that supports their real-world needs and meets evolving regulatory requirements.
544 questions
0 comments No comments
{count} votes

8 answers

Sort by: Most helpful
  1. Maurizio Poles 0 Reputation points
    2023-05-16T18:19:05.12+00:00

    I am having the same issue with Windows Server 2022. However, this started to happen after I installed the CA. All the settings are default. I have not modified any settings. In the past, I never had this issue with just defaulted settings. What do I need to do to resolve this?

    0 comments No comments

  2. Michael Maher 47 Reputation points
    2023-09-14T10:24:40.0933333+00:00

    I was using an OCSP responder and got this error on a newly built DC running Server 2022.

    Any other server or workstation on the domain I tested could validate certs fine against the OCSP server.

    To replicate the error export a cert. Can be any cert as long as it is issued from your CA.

    Run this certutil test. In this case I call my exported cert dc.cer.

    certutil -f –urlfetch -verify .\dc.cer | sls "OCSP"

    The OCSP call will fail from the server generating these event log entries but the same command will work from another host.

    I can't say I worked out why this happens but I got around it by restarting the OCSP server. Then running the same command on the new DC worked

    0 comments No comments

  3. Paul 0 Reputation points
    2024-08-08T15:34:45.1766667+00:00

    Hi All

    Did anyone come up with a solution for this? I have just expereinced the same issue after upgrading one of our DCs from Server 2019 to Server 2022. We are running an Enterprise CA for internal purposes only and was of the understanding OCSP is to check public based certificates.

    Prior to the upgrade we ran a full DCDIAG across our estate (all DCs on Server 2019) and had Zero issues. Now when running a DCDIAG on the upgraded DC the exact same issue is occurring as Andreas initially reported.

    Has anyone tried adding the OCSP Responder to their CA and if so did this fix it? Although I dont understand as under the CA Extensions Tab you add a public address which wouldnt address any self signed certificates?

    We removed any ldap entries from the CA Extensions Tab, we had no OCSP entries and the warnings remained so reinstated the ldap addresses.

    Thanks in advance!

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.