Troubleshooting Procedures
This page presents common issues and troubleshooting procedures related to the Federal PKI Root CA migration. We encourage only Domain or System Administrators follow the procedures listed on this page. If you need help or have any questions, email us at fpkirootupdate@gsa.gov.
Windows Troubleshooting
- Windows Troubleshooting
- macOS Troubleshooting
- iOS Troubleshooting
- Solutions
- Windows
- How come my workstation isn’t chaining to FCPCA G2?
- How come I can’t login to an application or website with my PIV after migrating to FCPCA G2?
- How can I verify network configurations aren’t preventing certificate validation?
- Is there any logging I can enable to help verify what’s going on?
- Are there any useful commands that I should be familiar with?
- macOS
- iOS
- Windows
macOS Troubleshooting
- How come my workstation isn’t chaining to FCPCA G2?
- How come I can’t login to an application or website with my PIV after migrating to FCPCA G2?
- Are there any useful commands that I should be familiar with?
iOS Troubleshooting
Solutions
Windows
How come my workstation isn’t chaining to FCPCA G2?
In some cases, even after distributing the Federal Common Policy CA G2 as a Trusted Root CA, Microsoft-based systems may still attempt to build a path to the Federal Common Policy CA. If the Federal Common Policy CA has been distrusted, that may result in errors as pictured below:
Recommended Steps:
- Verify the distribution of the Federal Common Policy CA G2 as a Trusted Root CA Certificate
- Verify the distrust of the Federal Common Policy CA
- Distribute the intermediate CA certificates issued by the Federal Common Policy CA G2
If you’re still having problems, email us at fpkirootupdate@gsa.gov.
How come I can’t login to an application or website with my PIV after migrating to FCPCA G2?
It’s possible the application or website you are attempting to authenticate to does not yet trust the Federal Common Policy CA G2 certificate or the new intermediate CA certificates issued by the Federal Common Policy CA G2. Depending on how your system is configured, this may result in Transport Layer Security (TLS) client authentication errors - typically observed with the application or website not prompting a user for their certificate during authentication attempts.
The steps below should only be performed by System Administrators and require OpenSSL.
Recommended Steps:
- Run the following OpenSSL command, replacing the placeholder below with the application or website’s fully qualified domain name (FQDN):
openssl s_client -connect [FQDN].gov:443
For example, to test https://piv.treasury.gov, you would execute:openssl s_client -connect piv.treasury.gov:443
-
Review the output for a line that reads “Acceptable client certificate CA names.” This presents a listing of the certificates the website is willing to accept a certificate from for authentication.
- Verify an entry exists for the Federal Common Policy CA G2. This will appear as the following:
/C=US/O=U.S. Government/OU=FPKI/CN=Federal Common Policy CA G2
- Verify an entry exists for each CA certificate on the chain between the CA that issued your certificate and the Federal Common Policy CA G2.
Note: the presence of an intermediate CA certificate’s name in the list of “Acceptable client certificate CA names” does not guarantee the right certificate has been added to the application or website’s trust store. You may need to work with the application or website administrator to verify the correct intermediate CA certificates issued from the Federal Common Policy CA G2 have been added to the trust store.
How can I verify network configurations aren’t preventing certificate validation?
Certificates contain extensions that tell us more information about their intended use, status, the CA that issued them, and more. When certificates are being validated, two particular extensions are very important:
- Authority Information Access (AIA)
- Certificate Revocation List (CRL) Distribution Point (DP)
These extensions contain Hypertext Transfer Protocol (HTTP) pointers that our operating systems will use to support certificate path discovery and validation. If local network configurations are configured to block access to these HTTP pointers, validation may fail. Use the following steps to confirm network configurations are not preventing access to these important extension pointers.
Recommended Steps:
-
Export the certificate you’d like to analyze to a known location on your file system.
-
Start -> Run -> cmd.exe
- Run the following command to open the Certutil Graphical User Interface:
certutil -URL "http://"
-
Click “Select” and browse to the file location of the certificate you’d like to analyze.
-
Select the “Certs (from AIA)” radio button and click “Retrieve.” Verify at least one entry returns a status of “Verified”.
-
Select the “CRLs (from CDP)” radio button and click “Retrieve.” Verify at least one entry returns a status of “Verified”.
- Optional: If the certificate contains an Online Certificate Status Protocol pointer within the AIA extension, select the “OCSP (from AIA)” radio button and click “Retrieve.” Verify at least one entry returns a status of “Verified.”
Note: Work with your network teams to identify if a firewall configuration is blocking traffic for any tests above that do not return a status of “Verified.” Be sure to analyze each certificate on the chain, all the way to the Federal Common Policy CA G2.
Is there any logging I can enable to help verify what’s going on?
Microsoft systems include a PKI troubleshooting diagnostic tool availabe through the Event Viewer. This feature provides administrators with an ability to troubleshoot PKI problems by collecting detailed information about certificate validation, trust store operations, and signature verification. Follow the steps below to enable the Microsoft diagnostic tool.
Recommended Steps:
-
Start -> Run -> eventvwr.msc
-
Browse to “Application and Services Logs” -> “Microsoft” -> “Windows” -> “CAPI 2”
-
Right-click on “Operational” and select “Enable Log”. This will enable CAPI2 Diagnostics logging.
Note: Review the detailed logs to learn more about errors or validation issues. It may be useful to filter the log based on “Level” (Error or Information) or Event ID. Event IDs 10 and 11 are associated with certificate chain building. Event IDs 40 and 41 are associated with certificate revocation checking.
Are there any useful commands that I should be familiar with?
Certutil.exe is a command-line program that is installed on Microsoft systems. You can use Certutil to display certificate status, validate certificate chains, and more.
The following Certutil commands may be helpful during troubleshooting:
- To verify a certificate and attempt to retrieve and verify AIA and CRLDP URIs:
certutil -verify -urlfetch [PATH-TO-CERTIFICATE]
- To clear the machine’s certificate and certificate URL cache:
certutil -urlcache * delete
Note: Carefully review any failures presented by the output of the commands above.
macOS
How come my workstation isn’t chaining to FCPCA G2?
The most common cause of path building errors on macOS is due to the full certificate chain not being trusted. Review “Are there any useful commands that I should be familiar with?” below to learn how to detect certificate trust issues.
How come I can’t login to an application or website with my PIV after migrating to FCPCA G2?
It’s possible the application or website you are attempting to authenticate to has not yet distributed the Federal Common Policy CA G2 certificate or the new intermediate CA certificates issued by the Federal Common Policy CA G2. Depending on how your system is configured, this may result in Transport Layer Security (TLS) client authentication errors - typically observed with the application or website not prompting a user for their certificate during authentication attempts.
The steps below should only be performed by System Administrators and require OpenSSL.
Recommended Steps:
- Run the following OpenSSL command, replacing the placeholder below with the application or website’s fully qualified domain name (FQDN):
openssl s_client -connect [FQDN].gov:443
For example, to test https://piv.treasury.gov, you would execute:openssl s_client -connect piv.treasury.gov:443
-
Review the output for a line that reads “Acceptable client certificate CA names.” This presents a listing of the certificates the website is willing to accept a certificate from for authentication.
- Verify an entry exists for the Federal Common Policy CA G2. This will appear as the following:
/C=US/O=U.S. Government/OU=FPKI/CN=Federal Common Policy CA G2
- Verify an entry exists for each CA certificate on the chain between the CA that issued your certificate and the Federal Common Policy CA G2.
Note: the presence of the name of an intermediate CA certificate issued from the Federal Common Policy CA G2 in the list of “Acceptable client certificate CA names” does not guarantee the right certificate has been added to the application or website’s trust store. You may need to work with the application or website administrator to verify the correct intermediate CA certificates issued from the Federal Common Policy CA G2 have been added to the trust store.
Are there any useful commands that I should be familiar with?
The macOS verify-cert
command is useful for detecting issues with certificates.
Recommended Steps:
- Click the Spotlight icon and search for Terminal.
- Double-click the Terminal icon (black monitor icon with white “>_”) to open a window.
- Run the following command:
security verify-cert -c [PATH-TO-CERTIFICATE] -v
Note: Any issues detected during certificate validation will be presented in the command’s output.
iOS
Why am I seeing TLS certificate errors?
Even after distributing the Federal Common Policy CA G2 as a Trusted Root Certificate to an iOS device, TLS negotiation failures may appear when navigating to a website whose TLS certificate was issued by a Federal PKI CA.
TLS certificate errors presented to the user in Safari are typically caused by either:
- “Full Trust” for the Federal Common Policy CA G2 is not enabled; or
- An intermediate CA certificate is missing from the device’s trust store
Recommended Steps:
- Verify that “Full Trust” is enabled for the Federal Common Policy CA G2
- Verify that all required intermediate CA certificates are trusted by the device
- Settings -> General -> Profile
- Review the list of Configuration Profiles loaded on the device. Specifically, look at any profile which contains digital certificates.
- Verify the device explicitly trusts all CA certificates on the chain between the website’s TLS certificate and the Federal Common Policy CA G2.