UCPrimer
  • UCprimer
  • About

Skype Room Systems (SRS) V2 issues with SHA-1 Certificates

7/26/2017

0 Comments

 
In a previous blog post I wrote about provisioning Exchange mailbox accounts and Skype for Business meeting rooms accounts for Skype Room Devices such as the SurfaceHub and the Skype Room Systems V2 that is already available today. During my initial setup of a Polycom MSR Skype Room System V2 device, even after following the steps in the previous blog post, the device can register and sign-in successfully to a Skype meeting room account that is homed online on Office365. However, using an account that is homed on-premise, I could not get the device to sign in successfully. This blog posts walks through the error encountered and how I managed to resolve the issue
Picture
Sign-in failures related to hash algorithms on certificates are rather difficult to detect as the logs don't really show any direct information that points to the correct problem. In my case, the SRS V2 device was able to sign into Exchange online but it will be stuck at a "Sign-in failed" error message as shown above which is using an Skype for Business on-premise account. There are ways to get the logs from the SRS V2 device by following this Technet article but in my case the log files yielded no useful information. On the Skype for Business Server, we can do a CLS logging and looking at the snooper trace, we can see that the error message shown is "Invalid Credentials":
Picture
Obviously testing the account credentials on a SFB Client I was able to login successfully so the issue had to be something else. However, when I tried to navigate the FE Pool certificate provisioning service using a Chrome browser, I got a "NET:ERR_CERT_WEAK_SIGNATURE_ALGORITHM" error and Chrome would refuse to enter the website at all. (on IE this error is not evidently shown):
After exhausting other possibilities of why my SRS V2 device was not able to sign-in such as DNS records etc., I recalled reading about SHA-1 certificates being deprecated by mid-2017 as explained in this Technet article. As I was still using Windows Server 2012 as the domain controller and CA server that issued certificates to my Skype for Business Pool about 2 years ago, there was a very likelyhood that the default certificates used on the FE Pool was still using SHA-1 hash algorithm. I could easily verify this by going to the Skype Deployment Wizard, running Setup and the Certificate Wizard again to view the current certifcate. True enough, my FE Pool was using a SHA-1 certificate as shown below:
Picture
Picture
Obviously, we want to request and install new certificates for our FE Pool that uses the newer SHA-256 hash algorithms but how do we update our Windows Server 2012 CA to do that? A quick search on the internet provided this Technet article which is pretty much aimed at upgrading the CA to use Key Storage Provider (KSP) instead of the older (Cryptographic Service Provider) CSP and then configuring the CA to issue SHA-256 certificates over SHA-1. The entire process is rather complex had not necessary to repeat here since it is already described in detailed in the TechNet article. The main objective is to get the CA to use KSP and we can verify this by running the certutil -store my <CA Name> cmdlet as shown below:
Picture
Following through the steps in the Technet article, in Step 10 of the article, we use certutil on the CA Server to change the registry setting so that the server uses SHA-256 instead of SHA-1 as shown below:
Picture
Next we need to renew the existing Default Certificates on our Skype for Business FE Pool which are still using SHA-1 certificates. This is relatively straightforward process by simply running the Deployment Wizard and re-running the Request, Install or Assign Certificates Wizard as shown below:
Picture
Simply follow the wizard to request and assign a new Default certificate for the FE Server:
Picture
Once the process is completed, we can go back to view the newly assigned Default certificate and verify that it is indeed using SHA-256 hashing algorithm as shown below:
Picture
We have to stop and restart the FE service for the certificate to take effect. And then repeat for all the other FE servers in the pool. Once done, we can navigate back to the certificate provisioning service https://<WebServicesFQDN>/certProv/certProvisioningService.svc using Chrome browser and verify that we can now successfully login.

Going back to the SRS V2 device, we can now login successfully. Of course, its important to mention that the Root CA certificate must be manually imported into the SRS V2 device if not joined to the domain. The steps to install the root CA certificate can be found in this TechNet article. Hopefully, this blog post serves to be useful to anyone facing login problems on the SRS V2 machine that may be caused by old Skype for Business FE Pool certificates using SHA-1
0 Comments

Your comment will be posted after it is approved.


Leave a Reply.

    UCPrimer

    Picture
    Picture
    Picture
    View my profile on LinkedIn

    Important Links

    Microsoft Teams Docs
    Microsoft Learn

    ​Microsoft MVP Blogs

    Michael Tressler’s Blog
    Michael’s MTR Quick Tip Videos
    Jimmy Vaughan’s Blog
    Jeff Schertz
    Adam Jacobs
    James Cussen
    ​Damien Margaritis

    Archives

    March 2025
    February 2025
    January 2025
    December 2024
    November 2024
    October 2024
    August 2024
    July 2024
    May 2024
    April 2024
    March 2024
    February 2024
    December 2023
    November 2023
    October 2023
    September 2023
    July 2023
    March 2023
    February 2023
    January 2023
    November 2022
    October 2022
    September 2022
    August 2022
    July 2022
    March 2022
    February 2022
    January 2022
    December 2021
    November 2021
    October 2021
    September 2021
    August 2021
    June 2021
    April 2021
    March 2021
    December 2020
    October 2020
    September 2020
    August 2020
    April 2020
    March 2020
    February 2020
    January 2020
    December 2019
    November 2019
    October 2019
    September 2019
    August 2019
    July 2019
    March 2019
    November 2018
    October 2018
    September 2018
    August 2018
    June 2018
    March 2018
    February 2018
    January 2018
    December 2017
    November 2017
    August 2017
    July 2017
    April 2017
    March 2017
    February 2017
    January 2017
    November 2016
    October 2016
    September 2016
    August 2016
    July 2016
    June 2016
    May 2016
    April 2016
    March 2016
    January 2016
    November 2015
    October 2015
    September 2015
    August 2015
    July 2015
    June 2015
    May 2015
    April 2015
    March 2015
    February 2015
    January 2015
    December 2014
    November 2014
    October 2014
    September 2014
    August 2014
    July 2014
    June 2014
    May 2014
    April 2014
    March 2014
    February 2014
    January 2014
    December 2013
    November 2013
    October 2013
    September 2013
    August 2013
    July 2013
    June 2013
    May 2013
    April 2013
    March 2013
    February 2013
    January 2013
    December 2012
    November 2012
    September 2012
    August 2012

    Categories

    All
    Edge
    Exchange 2013
    Hybrid
    Lpe
    Lync 2010
    Lync 2013
    Mobility
    Oauth
    Office365
    Polycom
    Ucs

    RSS Feed

    This website uses marketing and tracking technologies. Opting out of this will opt you out of all cookies, except for those needed to run the website. Note that some products may not work as well without tracking cookies.

    Opt Out of Cookies