SSTP Windows VPN Client Error: The revocation function was unable to check revocation
If you are deploying SSTP VPN for Windows clients and get the error: “The revocation function was unable to check revocation because the revocation server was offline.”, you are most likely using your own internal PKI and the certificate used for SSTP does not have a Certificate Revocation List (CRL) accessible from the outside, so the client machine is failing checking whether or not the certificate has been revoked from the CA. If you simply want to bypass this, you can edit the registry on the client:
Disable CRL Checking on VPN Client
- Start Registry Editor (Regedit.exe)
- Locate and then click the following key in the registry:
HKEY_LOCAL_MACHINE > System > CurrentControlSet > Services > Sstpsvc > Parameters - On the Edit menu > New > DWORD (32-bit) Value > and then add the following registry value:
Value Name:NoCertRevocationCheck
Value Data: 1
In the following video I setup SSTP VPN almost from scratch in about 10 minutes. I did run into a snag while Windows complained about a CN (common name) mismatch while it was actually a Subject Alternative Name DNS mismatch, not CN. I inadvertently proved that SSTP relies on the SAN name in the certificate. After 41 years of being in business they still don’t get their error messages right.
Source:
sysadminshowto.com for the NoCertRevocationCheck reg string
July 6, 2019 5:33 pm @ 17:33
That really helped!
Thanks for sharing.
July 10, 2019 2:30 pm @ 14:30
Hey thanks for the comment. I also fixed the broken walk-through video on the post.