Ask a Question

Advanced Search

Solution ID : SO22031

Last Modified : 05/02/2018

Error: ASN1 bad tag value met. 0X80009310b (ASN:267) during certificate installation with Microsoft IIS 8.0

Problem

When Completing the Certificate Request in Internet Information Services (IIS) 8.0 Manager using a PKCS#7 file,  the server may respond with the following error message:

There was an error while performing this operation.

Details:
CertEnroll::CX509Enrollment::p_InstallResponse:ASN1 bad tag value met. 0x8009310b (ASN: 267)

 

Cause

Microsoft IIS 8.0 may report an error indicating it does not accept PKCS#7 formatted certificates.  Although the ASN1 error occurs during installation, the certificate may still install successfully.

Solution

To verify that the SSL certificate is successfully installed, try to bind the certificate to the appropriate web site.

Bind the certificate to the appropriate web site

  1. Click Start > Administrative Tools > Internet Information Services (IIS) Manager.
  2. Browse to your Server Name > Sites > Your SSL-based site.
  3. From the Actions pane, choose Bindings.
  4. In the Site Bindings window, choose Add.
  5. From the Add Site Bindings window, provide the binding type as HTTPS.
  6. Select the SSL certificate that will be used for this site.
  7. Click OK.
  8. Confirm the certificate is working by accessing the site securely using https. (Example: https://www.symantec.com).
     

If unable to locate the new certificate in the list, try restoring the private key:

Import SSL certificate in to the Personal > Certificates store

  1. Create a Certificate snap-in in a MMC console.
  2. In the left-hand pane, expand the Certificates folder, expand and select the Personal folder.
  3. Right-click the Certificates folder inside the Personal folder, select All Tasks, select Import.
  4. The Certificate Import Wizard opens. Click Next.
  5. Click Browse and then navigate to the file that contains the SSL certificate. Click Open > Next.
  6. Ensure "Place all certificates in the following store" is selected, ensure that "Personal" is listed for the certificate store.
  7. Click Next > Finish.


Restore Private Key

  1. With the MMC console still open, select the Certificates folder inside the Personal folder in the left-hand pane.
  2. Double-click the newly imported SSL certificate in the right-hand pane, then select the Details tab.
  3. Scroll down and select the Thumbprint.
  4. The Thumbprint should appear in the box below.
  5. Click inside the box so that the curser appears. Hit Ctrl + A on the keyboard then hit Ctrl + C.
  6. Open a Notepad and paste in the Thumbprint.
  7. Add double quotes (“) at the beginning and end of the Thumbprint.
     

Open a command prompt (Go to Search > type cmd in search box), then enter the following command:

certutil -repairstore my "<thumbprint>"

Example:
certutil -repairstore my "00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f"

If successful, the response will be "CertUtil: -repairstore command completed successfully"
 

Assign SSL certificate in IIS

  1. Open the IIS Manager application.
  2. From the Connections pane on the left, expand the local server, expand the Sites folder and select the web site to be secured with SSL.
  3. From the Actions pane on the right, select the Bindings option (under Edit Site).
  4. In the Site Bindings window, select an existing https binding and click Edit. If there are no existing https bindings, click Add.
  5. Ensure the type is set to 'https', then select the new SSL certificate from the drop down menu. Click the View button to confirm details of the certificate, if necessary.
  6. Click OK > Close.
     

If the above steps do not resolve the issue, an alternative method of installation using the .x509 version of the certificate can be attempted.

Symantec SSL certificates for Microsoft servers are delivered in PKCS#7 format. This means the certificate file includes the corresponding Intermediate CA.  To acquire the certificate in X.509 (PKCS#10) format, perform the following steps:

  1. Download the certificate from your MPKI account and select the x.509 format.
  2. Install the the X.509 (PKCS#10) certificate file.
  3. Download and install the proper Intermediate CA for your certificate type.