On February 9th, Microsoft released an update which updates the root certificates for XP, 2003 and Vista to include members in its root certificate program.The update is intended to add the root certificate Authorities that support Extended Validation (EV) certificates in Windows Internet Explorer 7. EV is part of the Anti-Phishing feature of IE 7; IN a nutshell, when you access a website that is encrypted, (its URL starts with HTTPS and you see the lock icon), EV ensures the the Website operator has been identified and authenticated by a third party and the site is secure, as well as providing additional information regarding the website owner. For example, EV capable web browsers will show a Green background in the URL field while browsing an EV validated site while a know Phisher or Fraudulent website will show a Red background.
As a result of the certificate update, the number of trusted root certificates has grown dramatically (not sure of the exact number). For the most part, this is fairly benign and in fact beneficial for EV but you may experience problems setting up secure connections to your systems if you issue your own internal certificates from an internal Certificate Authority. For example, Live Communication Server users may not be able to logon using TLS encryption and your Unix/Linux systems may not be able to contact your Active Directory Domain Controllers for LDAP authentication.
You may see an error in the Server System log similar to the following:
Source: Schannel
Event ID: 36885
Description: When asking for client authentication, this server sends a list of trusted certificate authorities to the client. The client uses this list to choose a client certificate that is trusted by the server. Currently, this server trusts so many certificate authorities that the list has grown too long. This list has thus been truncated. The administrator of this machine should review the certificate authorities trusted for client authentication and remove those that do not really need to be trusted.
The reason for this is that when a client attempts a secure connection to a server, the server sends the list of trusted root certificates to the client for the client to choose certificate which they both trust. However, with the recent update, this list of certificates has grown too long and the server sends a truncated list of certificates back to the client. If the certificate the client intended to use did not make the cutoff in the truncated list, the secure connection will fail. I recently experienced this problem when my internal certificate authority's root certificate was truncated from the list sent to the clients.
You can definitely remove all "expired" root certificates and then move on to removing certificates which you determine are never likely to be used. However, ensure you keep all the well known Certificate Authority root certificates such as Thawte, Verisign and Microsoft.
Alternatively, you may be able to add a registry key to the server that disables the sending of the trusted root certificates to the client. This forces the client to utilize its own list.
Note: Although I have not seen any side-effects to making this change, there may be some other ramifications of making this change but I have yet to see any.
Registry path
HKLM SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL
DWORD: SendTrustedIssuerList
For more information, See: TLS/SSL Tools and Settings on Microsoft's Site.


