WSUS 3.0 SP2 - Problem with SSL : Error 80072f0c.
hello people,
i becoming nuts.
i have brand-new wsus 3.0 sp2. i'm trying setup ssl on it, , i've been stuck same issue 3 days.
the server name toto.child.rootdomain.ext, , i've configured gpo accessed via https://wsus.rootdomain.ext.
the need https need use wsus software update point in sccm native mode.
i had first tried set directly wsus sccm sup, client updates fail error still encountering.
to make troubleshooting simpler, trying set ssl on wsus, still getting same error in clients' windowsupdate.log.
i created certificate on our ca (with certificate name = wsus.rootdomain.ext), confiured iis it, enabled ssl on adequate virtual directories, ran wsusutil configuressl wsus.rootdomain.ext.
still client fail 80072f0c error. i've seen many people having error on web, did not find solution.
please find log below. may add without ssl, wsus works charm.
#############
## start ## au: search updates
#########
<<## submitted ## au: search updates [callid = {de2b0ed0-b6b2-4871-8fae-1a4bd4f8b8ba}]
*************
** start ** agent: finding updates [callerid = automaticupdates]
*********
" * online = yes; ignore download priority = no"
" * criteria = ""isinstalled=0 , deploymentaction='installation' or ispresent=1 , deploymentaction='uninstallation' or isinstalled=1 , deploymentaction='installation' , rebootrequired=1 or
isinstalled=0 , deploymentaction='uninstallation' , rebootrequired=1"""
* serviceid = {3da21691-e39d-4da6-8a4b-b43877bcb1b7} managed
* search scope = {machine}
checking agent selfupdate
client version: core: 7.4.7600.226 aux: 7.4.7600.226
validating signature c:\windows\softwaredistribution\selfupdate\wuident.cab:
microsoft signed: yes
validating signature c:\windows\softwaredistribution\selfupdate\wuident.cab:
microsoft signed: yes
validating signature c:\windows\softwaredistribution\selfupdate\wsus3setup.cab:
microsoft signed: yes
validating signature c:\windows\softwaredistribution\selfupdate\wsus3setup.cab:
microsoft signed: yes
determining whether new setup handler needs downloaded
validating signature c:\windows\softwaredistribution\selfupdate\handler\wusetupv.exe:
microsoft signed: yes
selfupdate handler update not required: current version: 7.4.7600.226, required version: 7.4.7600.226
"evaluating applicability of setup package ""wuclient-selfupdate-activex~31bf3856ad364e35~x86~~7.4.7600.226"""
"setup package ""wuclient-selfupdate-activex~31bf3856ad364e35~x86~~7.4.7600.226"" installed."
"evaluating applicability of setup package ""wuclient-selfupdate-aux-toplevel~31bf3856ad364e35~x86~~7.4.7600.226"""
"setup package ""wuclient-selfupdate-aux-toplevel~31bf3856ad364e35~x86~~7.4.7600.226"" installed."
"evaluating applicability of setup package ""wuclient-selfupdate-core-toplevel~31bf3856ad364e35~x86~~7.4.7600.226"""
"setup package ""wuclient-selfupdate-core-toplevel~31bf3856ad364e35~x86~~7.4.7600.226"" installed."
selfupdate check completed. selfupdate not required.
+++++++++++ pt: synchronizing server updates +++++++++++
+ serviceid = {3da21691-e39d-4da6-8a4b-b43877bcb1b7}, server url = https://wsus.rootdomain.ext/clientwebservice/client.asmx
warning: cached cookie has expired or new pid available
initializing simple targeting cookie, clientid = 51d3ff3f-2f60-459a-b54e-ea8b9eb78ede, target group = , dns name = testwin7img.child.rootdomain.ext
server url = https://wsus.rootdomain.ext/simpleauthwebservice/simpleauth.asmx
warning: send failed hr = 80072f0c.
warning: sendrequest failed hr = 80072f0c. proxy list used: <(null)> bypass list used : <(null)> auth schemes used : <>
+ last proxy send request failed hr = 0x80072f0c, http status code = 0
+ caller provided credentials = no
+ impersonate flags = 0
+ possible authorization schemes used =
warning: getauthorizationcookie failure, error = 0x80072f0c, soap client error = 5, soap error code = 0, http status code = 200
warning: failed initialize simple targeting cookie: 0x80072f0c
warning: populateauthcookies failed: 0x80072f0c
warning: refreshcookie failed: 0x80072f0c
warning: refreshptstate failed: 0x80072f0c
warning: sync of updates: 0x80072f0c
warning: syncserverupdatesinternal failed: 0x80072f0c
* warning: failed synchronize, error = 0x80072f0c
* warning: exit code = 0x80072f0c
*********
** end ** agent: finding updates [callerid = automaticupdates]
*************
warning: wu client failed searching update error 0x80072f0c
>>## resumed ## au: search updates [callid = {de2b0ed0-b6b2-4871-8fae-1a4bd4f8b8ba}]
# warning: search callback failed, result = 0x80072f0c
# warning: failed find updates error code 80072f0c
#########
## end ## au: search updates [callid = {de2b0ed0-b6b2-4871-8fae-1a4bd4f8b8ba}]
#############
successfully wrote event au health state:0
au setting next detection timeout 2009-12-14 20:38:40
setting au scheduled install time 2009-12-14 16:00:00
successfully wrote event au health state:0
successfully wrote event au health state:0
report event: {0d434a75-5412-46fb-8bb7-4da344c4f5b2} 2009-12-14 16:38:40:259+0100 1 148 101 {00000000-0000-0000-0000-000000000000} 0 80072f0c automaticupdates failure
software synchronization windows update client failed detect error 0x80072f0c.
cwerreporter::handleevents - wer report upload completed status 0x8
wer report sent: 7.4.7600.226 0x80072f0c 00000000-0000-0000-0000-000000000000 scan 101 managed
cwerreporter finishing event handling. (00000000)
after night sleep, found out was. dumb.
ssl settings on virtual directories set "accept client certificates". setting "ignore" fixed it.
can't figure out why, i'll think later.
i wasn't aware sccm/sup required ssl . . . hmmmm
--> doesn't in native mode ?
Windows Server > WSUS
Comments
Post a Comment