Event ID 60 — AD CS Access Control
Applies To: Windows Server 2008
Certification authority (CA) access control permissions ensure that authorized components and users can complete required tasks. Access control errors can identify potential problems associated with insufficient or inappropriate use of permissions.
Event Details
Product: | Windows Operating System |
ID: | 60 |
Source: | Microsoft-Windows-CertificationAuthority |
Version: | 6.0 |
Symbolic Name: | MSG_E_POSSIBLE_DENIAL_OF_SERVICE_ATTACK |
Message: | Active Directory Certificate Services refused to process an extremely long request from %1. This may indicate a denial-of-service attack. If the request was rejected in error, modify the MaxIncomingMessageSize registry parameter via certutil -setreg CA\MaxIncomingMessageSize <bytes>. Unless verbose logging is enabled, this error will not be logged again for 20 minutes. |
Resolve
Address an attempt to submit a long certificate request
Extremely long certificate requests can represent an attempt to launch a denial-of-service attack.
The source should be identified in the event log message. You should also review information about all failed certificate requests to detect whether there have been other unusual certificate requests.
To address this potential problem:
- Review failed certificate requests to determine whether or not the failed request is from a known or trusted source.
- If the request was rejected in error, modify the MaxIncomingMessageSize setting in the registry to allow larger certificate requests.
- If the request was not rejected in error, identify the source of the request and prevent requests from being submitted from that source.
To perform these procedures, you must have membership in local Administrators, or you must have been delegated the appropriate authority.
Review failed certificate requests
To review failed certificate requests:
- COn the computer hosting the CA, click Start, point to Administrative Tools, and click Certification Authority.
- Examine the failed requests contained in the Failed Requests folder and determine wether it came from a trusted source.
- You can also open a command prompt window and run the following command: certutil -view LogFail.
- If the request was from a legitimate source but rejected because it was too large, you can increase the maximum message size using the following procedure, or have the certificate requester submit a new certificate request.
Modify maximum message size
The default maximum message size setting is 10,000 bytes. If during your review of failed certificate requests in the previous procedure you detect legitimate certificate requests that were rejected because they exceeded this value, consider increasing this registry setting to a value that will allow similar requests to succeed.
To modify the maximum message size:
Caution: Incorrectly editing the registry might severely damage your system. Before making changes to the registry, you should back up any valued data.
- On the computer hosting the CA, click Start, type cmd and press ENTER.
- Type certutil -setreg CA\MaxIncomingMessageSize <bytes> and press ENTER.
Verify
To perform this procedure, you must have membership in local Administrators on the computer hosting the certification authority (CA), or you must have been delegated the appropriate authority.
To confirm that the CA logon context is correct:
- On the computer hosting the CA, click Start, point to Administrative Tools, and click Services.
- Confirm that the word Started appears in the Status belong for the Active Directory Certificate Services service.