{"id":24887,"date":"2022-06-16T12:34:05","date_gmt":"2022-06-16T10:34:05","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=24887"},"modified":"2022-06-16T12:42:59","modified_gmt":"2022-06-16T10:42:59","slug":"exchange-2016-2019-mitigation-service-error-1008-wegen-abgelaufenem-zertifikat","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2022\/06\/16\/exchange-2016-2019-mitigation-service-error-1008-wegen-abgelaufenem-zertifikat\/","title":{"rendered":"Exchange 2016\/2019 Mitigation Service Error 1008 due to expired certificate"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline; border-width: 0px;\" title=\"Exchange Logo\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2022\/06\/Exchange.jpg\" alt=\"Exchange Logo\" width=\"107\" height=\"94\" align=\"left\" border=\"0\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2022\/06\/16\/exchange-2016-2019-mitigation-service-error-1008-wegen-abgelaufenem-zertifikat\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]Today another piece of information for administrators of Microsoft Exchange servers who this week suddenly receive an Error 1008 on Exchange 2016 or 2019 in the event logs, which is triggered by the Mitigation Service. A blog reader brought this to my attention the other day because he suddenly experienced the issue on Microsoft Exchange Server 2019. The background is a Microsoft \"Microsoft Exchange XML Signing\" certificate that expired on June 9, 2022. The problem should have been fixed by Microsoft in the meantime.<\/p>\n<p><!--more--><\/p>\n<h2>Mitigation Service Error 1008 in log files<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg08.met.vgwort.de\/na\/b237ecaee0e94636ab29e31aed7bfe54\" alt=\"\" width=\"1\" height=\"1\" \/>Blog reader Phil Randal contacted me via email on June 14, 2022, and pointed out that on Microsoft Exchange (on his end it was Exchange 2019), Mitigation Service Error 1008 could suddenly appear in the Event Viewer application logs (thanks for the tip).<\/p>\n<blockquote><p>Hi Gunter,<\/p>\n<p>Noticing Application log error 1008 on our exchange servers:<\/p>\n<p>\"Exception encountered while fetching mitigations : System.Exception: This XML is not deemed safe to consume since\u00a0 Response xml's signing cert is invalid or not from Microsoft\"<\/p><\/blockquote>\n<p>Exchange Server encounters an exception error when applying mitigation and reports that an XML file cannot be used safely because the signing certificate of Response xml is invalid or not from Microsoft. Phil then referred me to a reddit.com thread <a href=\"https:\/\/www.reddit.com\/r\/exchangeserver\/comments\/vbewhz\/mitigation_service_xml_errors_since_cu23_upgrade\/\" target=\"_blank\" rel=\"noopener\">Mitigation Service XML errors since CU23 upgrade<\/a>\u00a0where this is also addressed.<\/p>\n<blockquote><p><strong>Mitigation Service XML errors since CU23 upgrade<\/strong><\/p>\n<p>Good morning!<\/p>\n<p>Since the upgrade to 2016 CU23, I've noticed several machines are throwing a new XML error regarding the Mitigation Service (EEM). We've been running 2016 CU22 on various clients with no issues and this error was never present. Since the upgrade to CU23, we're seeing this all over the place.<\/p>\n<p>Microsoft Forums seem to suggest this is the result of a network connection being blocked to the IPs used by EEM. But the only thing that has changed is installing CU23, there's nothing new blocking these connections.<\/p>\n<p>Testing the Mitigation Service passes fine. I'm able to access the URL for the mitigations just fine from these machines in a web browser. Clearly, nothing is being blocked.<\/p>\n<p>Here's the full error:<\/p>\n<pre>An unexpected exception occurred. Diagnostic information: \r\nException encountered while fetching mitigations: \r\nSystem.Exception: This XML is not deemed safe to consume since Response \r\nxml's signing cert is invalid or notfrom microsoft at\r\n\r\nMicrosoft.Exchange.Mitigation.Service.Common.SignatureVerifierUtils.ThrowIfIntegrityChecksFail(SafeXmlDocument xmlDoc) at Microsoft.Exchange.Mitigation.Service.Common.SignatureVerifierUtils.GetValidatedDocumentWithoutSignature(SafeXmlDocument xmlDoc) at Microsoft.Exchange.Mitigation.Service.Common.Utils.FetchDataFromXmlStream[T](Stream stream) at Microsoft.Exchange.Mitigation.Service.Common.Utils.FetchMitigationsFromUrl[T](String url, RemoteCertificateValidationCallback certValidationCallback, X509Certificate clientAuthCert, Boolean isResponseJson) at Microsoft.Exchange.Mitigation.Service.MitigationCloudServiceV2.FetchMitigations() at Microsoft.Exchange.Mitigation.Service.Mitigations.MitigationEngine.FetchAndApplyMitigation()<\/pre>\n<\/blockquote>\n<p>Also on Microsoft Q&amp;A, there is an <a href=\"https:\/\/docs.microsoft.com\/en-us\/answers\/questions\/884528\/exchange-2019-mitigation-service-error-1008.html\" target=\"_blank\" rel=\"noopener\">Exchange 2019 Mitigation service error 1008<\/a> post where an affected person addresses the issue.<\/p>\n<blockquote>\n<h4>Exchange 2019 Mitigation service error 1008<\/h4>\n<p>Hi,<br \/>\nI regularly receive error 1008<br \/>\nException encountered while fetching mitigations : System.Exception: This XML is not deemed safe to consume since Response xml's signing cert is invalid or not from microsoft<\/p>\n<p>The issue started June 9.<\/p>\n<p>Any suggestions?<\/p>\n<p>King regards,<br \/>\nDmitry<\/p><\/blockquote>\n<h2>Certificate expired at Microsoft<\/h2>\n<p>A Microsoft employee then got in touch on reddit.com and wrote that the error had nothing to do with the CU23, but with an expired certificate on the service's side &#8211; the certificate expired on June 9, 20222. Microsoft is working to fix it on the service side (admins don't have to do anything). The issue is only cosmetic at the moment, he said, and Microsoft has not released any contingency measures.<\/p>\n<blockquote><p>The Microsoft Q&amp;A thread <a href=\"https:\/\/docs.microsoft.com\/en-us\/answers\/questions\/884528\/exchange-2019-mitigation-service-error-1008.html\" target=\"_blank\" rel=\"noopener\">Exchange 2019 Mitigation service error 1008<\/a> contains a reader comment pointing to <a href=\"https:\/\/www.theregister.com\/2022\/06\/10\/microsoft_insider_certificate\" target=\"_blank\" rel=\"noopener\">this article<\/a> from The Register. There, on June 10, 2022, it was reported that Microsoft forgot to renew the certificate for the Windows Insider website. Visitors then received the message \"Your connection is not private\".<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>[German]Today another piece of information for administrators of Microsoft Exchange servers who this week suddenly receive an Error 1008 on Exchange 2016 or 2019 in the event logs, which is triggered by the Mitigation Service. A blog reader brought this &hellip; <a href=\"https:\/\/borncity.com\/win\/2022\/06\/16\/exchange-2016-2019-mitigation-service-error-1008-wegen-abgelaufenem-zertifikat\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[463,1547],"tags":[869,47],"class_list":["post-24887","post","type-post","status-publish","format-standard","hentry","category-issue","category-software","tag-exchange","tag-issue"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/24887","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=24887"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/24887\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=24887"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=24887"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=24887"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}