This is output from certutil -scinfo “my reader name”. I ran this right after getting the 0x8009200B CAPI2 error (CryptCertificateAcquirePrivateKey) during a “run as other user” operation.
The Microsoft Smart Card Resource Manager is running.
Current reader/card status:
Readers: 1
0: SCM Microsystems Inc. Virtual SmartCard Reader 1
— Reader: SCM Microsystems Inc. Virtual SmartCard Reader 1
— Status: SCARD_STATE_PRESENT | SCARD_STATE_INUSE
— Status: The card is being shared by a process.
— Card: CSSI CardOS V4.3B
— ATR:
3b f4 18 00 02 c1 0a 31 fe 58 56 34 63 76 c5 ;…1.XV4cv.
=======================================================
Analyzing card in reader: SCM Microsystems Inc. Virtual SmartCard Reader 1
--------------===========================--------------
================ Certificate 0 ================
— Reader: SCM Microsystems Inc. Virtual SmartCard Reader 1
— Card: CSSI CardOS V4.3B
Provider = Charismathics Smart Security Interface CSP
Key Container = le-SmartcardLogon-9c3ce75b-39da-4ac2-93f8-04af6725801a
Performing AT_SIGNATURE public key matching test…
Public key matching test succeeded
Key Container = le-SmartcardLogon-9c3ce75b-39da-4ac2-93f8-04af6725801a
Provider = Charismathics Smart Security Interface CSP
ProviderType = 1
Flags = 1
KeySpec = 2 – AT_SIGNATURE
Private key verifies
Performing cert chain verification…
Chain validates
Smart Card Logon: Chain validates
dwFlags = CA_VERIFY_FLAGS_NT_AUTH (0x10)
dwFlags = CA_VERIFY_FLAGS_CONSOLE_TRACE (0x20000000)
dwFlags = CA_VERIFY_FLAGS_DUMP_CHAIN (0x40000000)
Application[0] = 1.3.6.1.4.1.311.20.2.2 Smart Card Logon
ChainFlags = CERT_CHAIN_REVOCATION_CHECK_CHAIN_EXCLUDE_ROOT (0x40000000)
HCCE_LOCAL_MACHINE
CERT_CHAIN_POLICY_NT_AUTH
-------- CERT_CHAIN_CONTEXT --------
ChainContext.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
ChainContext.dwRevocationFreshnessTime: 6 Hours, 50 Minutes, 44 Seconds
SimpleChain.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
SimpleChain.dwRevocationFreshnessTime: 6 Hours, 50 Minutes, 44 Seconds
CertContext[0][0]: dwInfoStatus=102 dwErrorStatus=0
Issuer: CN=dev-AD-CA, DC=dev, DC=bomgar, DC=local
NotBefore: 5/24/2012 11:29 PM
NotAfter: 5/24/2013 11:29 PM
Subject: CN=VSC01 Test, CN=Users, DC=dev, DC=bomgar, DC=local
Serial: 297698de000000000019
SubjectAltName: Other Name:Principal Name=xxxxx@dev.bomgar.local
Template: SmartcardLogon
7b e1 2d af 35 75 86 53 13 69 3b 55 d0 7a 04 d5 3c f9 d5 b8
Element.dwInfoStatus = CERT_TRUST_HAS_KEY_MATCH_ISSUER (0x2)
Element.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
CRL 55:
Issuer: CN=dev-AD-CA, DC=dev, DC=bomgar, DC=local
e8 a8 98 1b 7d 2c 4a b8 aa 81 f2 ba 7c ad 34 6c f3 89 f6 95
Delta CRL 5a:
Issuer: CN=dev-AD-CA, DC=dev, DC=bomgar, DC=local
27 25 43 98 09 90 cf 71 48 38 78 40 36 86 39 fd b8 ba 28 3f
Application[0] = 1.3.6.1.5.5.7.3.2 Client Authentication
Application[1] = 1.3.6.1.4.1.311.20.2.2 Smart Card Logon
CertContext[0][1]: dwInfoStatus=10c dwErrorStatus=0
Issuer: CN=dev-AD-CA, DC=dev, DC=bomgar, DC=local
NotBefore: 3/2/2012 6:07 PM
NotAfter: 3/2/2017 6:17 PM
Subject: CN=dev-AD-CA, DC=dev, DC=bomgar, DC=local
Serial: 70626203288ecb9b41ce2081f5def96a
3d 79 07 42 7e da e0 5c e5 c7 26 e8 84 b7 aa 21 16 bf 5a a8
Element.dwInfoStatus = CERT_TRUST_HAS_NAME_MATCH_ISSUER (0x4)
Element.dwInfoStatus = CERT_TRUST_IS_SELF_SIGNED (0x8)
Element.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
Exclude leaf cert:
11 e1 e3 dd 3b 66 d8 8e d9 37 33 7d 47 07 e4 70 62 3b 3b 86
Full chain:
d8 95 f5 ed 76 1d 50 ba cd 54 35 54 66 74 7b 0a 11 01 a1 d2
Verified Issuance Policies: None
Verified Application Policies:
1.3.6.1.5.5.7.3.2 Client Authentication
1.3.6.1.4.1.311.20.2.2 Smart Card Logon
Displayed AT_SIGNATURE cert for reader: SCM Microsystems Inc. Virtual SmartCard Reader 1
Performing AT_KEYEXCHANGE public key matching test…
Public key matching test succeeded
Key Container = le-SmartcardLogon-9c3ce75b-39da-4ac2-93f8-04af6725801a
Provider = Charismathics Smart Security Interface CSP
ProviderType = 1
Flags = 1
KeySpec = 1 – AT_KEYEXCHANGE
Private key verifies
Performing cert chain verification…
Chain validates
Smart Card Logon: Chain validates
dwFlags = CA_VERIFY_FLAGS_NT_AUTH (0x10)
dwFlags = CA_VERIFY_FLAGS_CONSOLE_TRACE (0x20000000)
dwFlags = CA_VERIFY_FLAGS_DUMP_CHAIN (0x40000000)
Application[0] = 1.3.6.1.4.1.311.20.2.2 Smart Card Logon
ChainFlags = CERT_CHAIN_REVOCATION_CHECK_CHAIN_EXCLUDE_ROOT (0x40000000)
HCCE_LOCAL_MACHINE
CERT_CHAIN_POLICY_NT_AUTH
-------- CERT_CHAIN_CONTEXT --------
ChainContext.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
ChainContext.dwRevocationFreshnessTime: 6 Hours, 50 Minutes, 49 Seconds
SimpleChain.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
SimpleChain.dwRevocationFreshnessTime: 6 Hours, 50 Minutes, 49 Seconds
CertContext[0][0]: dwInfoStatus=102 dwErrorStatus=0
Issuer: CN=dev-AD-CA, DC=dev, DC=bomgar, DC=local
NotBefore: 5/24/2012 11:29 PM
NotAfter: 5/24/2013 11:29 PM
Subject: CN=VSC01 Test, CN=Users, DC=dev, DC=bomgar, DC=local
Serial: 297698de000000000019
SubjectAltName: Other Name:Principal Name=xxxxx@dev.bomgar.local
Template: SmartcardLogon
7b e1 2d af 35 75 86 53 13 69 3b 55 d0 7a 04 d5 3c f9 d5 b8
Element.dwInfoStatus = CERT_TRUST_HAS_KEY_MATCH_ISSUER (0x2)
Element.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
CRL 55:
Issuer: CN=dev-AD-CA, DC=dev, DC=bomgar, DC=local
e8 a8 98 1b 7d 2c 4a b8 aa 81 f2 ba 7c ad 34 6c f3 89 f6 95
Delta CRL 5a:
Issuer: CN=dev-AD-CA, DC=dev, DC=bomgar, DC=local
27 25 43 98 09 90 cf 71 48 38 78 40 36 86 39 fd b8 ba 28 3f
Application[0] = 1.3.6.1.5.5.7.3.2 Client Authentication
Application[1] = 1.3.6.1.4.1.311.20.2.2 Smart Card Logon
CertContext[0][1]: dwInfoStatus=10c dwErrorStatus=0
Issuer: CN=dev-AD-CA, DC=dev, DC=bomgar, DC=local
NotBefore: 3/2/2012 6:07 PM
NotAfter: 3/2/2017 6:17 PM
Subject: CN=dev-AD-CA, DC=dev, DC=bomgar, DC=local
Serial: 70626203288ecb9b41ce2081f5def96a
3d 79 07 42 7e da e0 5c e5 c7 26 e8 84 b7 aa 21 16 bf 5a a8
Element.dwInfoStatus = CERT_TRUST_HAS_NAME_MATCH_ISSUER (0x4)
Element.dwInfoStatus = CERT_TRUST_IS_SELF_SIGNED (0x8)
Element.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
Exclude leaf cert:
11 e1 e3 dd 3b 66 d8 8e d9 37 33 7d 47 07 e4 70 62 3b 3b 86
Full chain:
d8 95 f5 ed 76 1d 50 ba cd 54 35 54 66 74 7b 0a 11 01 a1 d2
Verified Issuance Policies: None
Verified Application Policies:
1.3.6.1.5.5.7.3.2 Client Authentication
1.3.6.1.4.1.311.20.2.2 Smart Card Logon
Displayed AT_KEYEXCHANGE cert for reader: SCM Microsystems Inc. Virtual SmartCard Reader 1
--------------===========================--------------
================ Certificate 1 ================
— Reader: SCM Microsystems Inc. Virtual SmartCard Reader 1
— Card: CSSI CardOS V4.3B
Provider = Charismathics Smart Security Interface CSP
Key Container = le-SmartcardLogon-f51c5220-2950-4e42-a97b-6ae09936aa6f [Default Container]
Performing AT_SIGNATURE public key matching test…
Public key matching test succeeded
Key Container = le-SmartcardLogon-f51c5220-2950-4e42-a97b-6ae09936aa6f
Provider = Charismathics Smart Security Interface CSP
ProviderType = 1
Flags = 1
KeySpec = 2 – AT_SIGNATURE
Private key verifies
Performing cert chain verification…
Chain validates
Smart Card Logon: Chain validates
dwFlags = CA_VERIFY_FLAGS_NT_AUTH (0x10)
dwFlags = CA_VERIFY_FLAGS_CONSOLE_TRACE (0x20000000)
dwFlags = CA_VERIFY_FLAGS_DUMP_CHAIN (0x40000000)
Application[0] = 1.3.6.1.4.1.311.20.2.2 Smart Card Logon
ChainFlags = CERT_CHAIN_REVOCATION_CHECK_CHAIN_EXCLUDE_ROOT (0x40000000)
HCCE_LOCAL_MACHINE
CERT_CHAIN_POLICY_NT_AUTH
-------- CERT_CHAIN_CONTEXT --------
ChainContext.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
ChainContext.dwRevocationFreshnessTime: 6 Hours, 50 Minutes, 55 Seconds
SimpleChain.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
SimpleChain.dwRevocationFreshnessTime: 6 Hours, 50 Minutes, 55 Seconds
CertContext[0][0]: dwInfoStatus=102 dwErrorStatus=0
Issuer: CN=dev-AD-CA, DC=dev, DC=bomgar, DC=local
NotBefore: 5/24/2012 11:29 PM
NotAfter: 5/24/2013 11:29 PM
Subject: CN=Alt.VSC01 Test, CN=Users, DC=dev, DC=bomgar, DC=local
Serial: 2977446900000000001a
SubjectAltName: Other Name:Principal Name=xxxxx@dev.bomgar.local
Template: SmartcardLogon
7c 48 47 82 fd fb b2 3f 7f f6 6a 45 f2 b3 8d 6c d6 5f 7d fc
Element.dwInfoStatus = CERT_TRUST_HAS_KEY_MATCH_ISSUER (0x2)
Element.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
CRL 55:
Issuer: CN=dev-AD-CA, DC=dev, DC=bomgar, DC=local
e8 a8 98 1b 7d 2c 4a b8 aa 81 f2 ba 7c ad 34 6c f3 89 f6 95
Delta CRL 5a:
Issuer: CN=dev-AD-CA, DC=dev, DC=bomgar, DC=local
27 25 43 98 09 90 cf 71 48 38 78 40 36 86 39 fd b8 ba 28 3f
Application[0] = 1.3.6.1.5.5.7.3.2 Client Authentication
Application[1] = 1.3.6.1.4.1.311.20.2.2 Smart Card Logon
CertContext[0][1]: dwInfoStatus=10c dwErrorStatus=0
Issuer: CN=dev-AD-CA, DC=dev, DC=bomgar, DC=local
NotBefore: 3/2/2012 6:07 PM
NotAfter: 3/2/2017 6:17 PM
Subject: CN=dev-AD-CA, DC=dev, DC=bomgar, DC=local
Serial: 70626203288ecb9b41ce2081f5def96a
3d 79 07 42 7e da e0 5c e5 c7 26 e8 84 b7 aa 21 16 bf 5a a8
Element.dwInfoStatus = CERT_TRUST_HAS_NAME_MATCH_ISSUER (0x4)
Element.dwInfoStatus = CERT_TRUST_IS_SELF_SIGNED (0x8)
Element.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
Exclude leaf cert:
dd de 26 64 2a 9a 9b 3d b7 fb 97 07 73 2c 75 ce aa 44 23 88
Full chain:
3c 71 34 5e 3b 52 27 7e 65 1f 8a 05 2d 85 65 a4 6b de 9e 61
Verified Issuance Policies: None
Verified Application Policies:
1.3.6.1.5.5.7.3.2 Client Authentication
1.3.6.1.4.1.311.20.2.2 Smart Card Logon
Displayed AT_SIGNATURE cert for reader: SCM Microsystems Inc. Virtual SmartCard Reader 1
Performing AT_KEYEXCHANGE public key matching test…
Public key matching test succeeded
Key Container = le-SmartcardLogon-f51c5220-2950-4e42-a97b-6ae09936aa6f
Provider = Charismathics Smart Security Interface CSP
ProviderType = 1
Flags = 1
KeySpec = 1 – AT_KEYEXCHANGE
Private key verifies
Performing cert chain verification…
Chain validates
Smart Card Logon: Chain validates
dwFlags = CA_VERIFY_FLAGS_NT_AUTH (0x10)
dwFlags = CA_VERIFY_FLAGS_CONSOLE_TRACE (0x20000000)
dwFlags = CA_VERIFY_FLAGS_DUMP_CHAIN (0x40000000)
Application[0] = 1.3.6.1.4.1.311.20.2.2 Smart Card Logon
ChainFlags = CERT_CHAIN_REVOCATION_CHECK_CHAIN_EXCLUDE_ROOT (0x40000000)
HCCE_LOCAL_MACHINE
CERT_CHAIN_POLICY_NT_AUTH
-------- CERT_CHAIN_CONTEXT --------
ChainContext.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
ChainContext.dwRevocationFreshnessTime: 6 Hours, 51 Minutes
SimpleChain.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
SimpleChain.dwRevocationFreshnessTime: 6 Hours, 51 Minutes
CertContext[0][0]: dwInfoStatus=102 dwErrorStatus=0
Issuer: CN=dev-AD-CA, DC=dev, DC=bomgar, DC=local
NotBefore: 5/24/2012 11:29 PM
NotAfter: 5/24/2013 11:29 PM
Subject: CN=Alt.VSC01 Test, CN=Users, DC=dev, DC=bomgar, DC=local
Serial: 2977446900000000001a
SubjectAltName: Other Name:Principal Name=xxxxx@dev.bomgar.local
Template: SmartcardLogon
7c 48 47 82 fd fb b2 3f 7f f6 6a 45 f2 b3 8d 6c d6 5f 7d fc
Element.dwInfoStatus = CERT_TRUST_HAS_KEY_MATCH_ISSUER (0x2)
Element.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
CRL 55:
Issuer: CN=dev-AD-CA, DC=dev, DC=bomgar, DC=local
e8 a8 98 1b 7d 2c 4a b8 aa 81 f2 ba 7c ad 34 6c f3 89 f6 95
Delta CRL 5a:
Issuer: CN=dev-AD-CA, DC=dev, DC=bomgar, DC=local
27 25 43 98 09 90 cf 71 48 38 78 40 36 86 39 fd b8 ba 28 3f
Application[0] = 1.3.6.1.5.5.7.3.2 Client Authentication
Application[1] = 1.3.6.1.4.1.311.20.2.2 Smart Card Logon
CertContext[0][1]: dwInfoStatus=10c dwErrorStatus=0
Issuer: CN=dev-AD-CA, DC=dev, DC=bomgar, DC=local
NotBefore: 3/2/2012 6:07 PM
NotAfter: 3/2/2017 6:17 PM
Subject: CN=dev-AD-CA, DC=dev, DC=bomgar, DC=local
Serial: 70626203288ecb9b41ce2081f5def96a
3d 79 07 42 7e da e0 5c e5 c7 26 e8 84 b7 aa 21 16 bf 5a a8
Element.dwInfoStatus = CERT_TRUST_HAS_NAME_MATCH_ISSUER (0x4)
Element.dwInfoStatus = CERT_TRUST_IS_SELF_SIGNED (0x8)
Element.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
Exclude leaf cert:
dd de 26 64 2a 9a 9b 3d b7 fb 97 07 73 2c 75 ce aa 44 23 88
Full chain:
3c 71 34 5e 3b 52 27 7e 65 1f 8a 05 2d 85 65 a4 6b de 9e 61
Verified Issuance Policies: None
Verified Application Policies:
1.3.6.1.5.5.7.3.2 Client Authentication
1.3.6.1.4.1.311.20.2.2 Smart Card Logon
Displayed AT_KEYEXCHANGE cert for reader: SCM Microsystems Inc. Virtual SmartCard Reader 1
SCardGetCardTypeProviderName: The system cannot find the file specified. 0x2 (WIN32: 2)
Cannot retrieve Provider Name for CSSI CardOS V4.3B
--------------===========================--------------
Done.
CertUtil: -SCInfo command completed successfully.
Nik Twerdochlib
Software Developer
+1.601.607.8309 O
+1.866.522.8678 F
BOMGAR | Enterprise Remote Support™
One of the Fastest-Growing Technology Companies in America | Technology Fast 500™
-----Original Message-----
From: xxxxx@lists.osr.com [mailto:xxxxx@lists.osr.com] On Behalf Of Nik Twerdochlib
Sent: Thursday, May 31, 2012 12:26 AM
To: Windows System Software Devs Interest List
Subject: RE: RE:[ntdev] smart card device enumeration
Completely missed your reply. Need to figure out a better method to manage the emails on this list.
I have recently been testing with certutil. I have been addressing issues where it fails, but for the most part it does succeed, even when a “run as other user” selecting a cert on that reader will fail with :
- Result Cannot find the certificate and private key for decryption.
[value] 8009200B
I will reply with a failure from certutil as soon as I can.
Thanks,
Nik Twerdochlib
Software Developer
+1.601.607.8309 O
+1.866.522.8678 F
BOMGAR | Enterprise Remote Support™
One of the Fastest-Growing Technology Companies in America | Technology Fast 500™
-----Original Message-----
From: xxxxx@lists.osr.com [mailto:xxxxx@lists.osr.com] On Behalf Of xxxxx@microsoft.com
Sent: Thursday, May 10, 2012 4:56 PM
To: Windows System Software Devs Interest List
Subject: RE:[ntdev] smart card device enumeration
Hi, Nik. Could you provide some more information on exactly what you’re seeing? Which OS version is this happening? Does this happen for all operations or only certain ones? For example, if you run ‘certutil -scinfo’, does the PIN you put in get applied to the wrong card? If you are able to provide the ‘certutil -scinfo’ output, that would also be useful for seeing if I can help track down your issue.
Thanks.
-Jeff
NTDEV is sponsored by OSR
For our schedule of WDF, WDM, debugging and other seminars visit:
http://www.osr.com/seminars
To unsubscribe, visit the List Server section of OSR Online at http://www.osronline.com/page.cfm?name=ListServer
NTDEV is sponsored by OSR
For our schedule of WDF, WDM, debugging and other seminars visit:
http://www.osr.com/seminars
To unsubscribe, visit the List Server section of OSR Online at http://www.osronline.com/page.cfm?name=ListServer