Вы находитесь на странице: 1из 9

Prepared by EDS CS-D for Server Authentication Problem CA01576568.

Filename: Sniffer Trace File Analysis for Active Directory Authentication Problem v1-5.doc

Troubleshooting Analysis for Windows 2000 Active


Directory Authentication Problem

Overview
Servers DB1 & DB2 are configured with clustering (DB1 is active and DB2 is
backup). The PDC (server NT9) is connected to a different subnet, which is
separated by two firewalls. The DB server clustering services depend on Active
Directory Authentication. When the servers cannot authenticate, the clustering
service cannot start. To initially start the clustering services on the DB servers,
the work-around is to connect to the DB server via terminal services and to
manually map a network drive from the DB server to the PDC server using a
domain USERID. Once the drive is mapped, the clustering service can be
successfully started and then the network drive map can be disconnected. Once
the cluster service is up and running it continues to work fine even if the Active
Directory authentication fails (until the clustering service has to be restarted
again).

Connectivity for the Production Environment


DB1 backend ----> client-fw1 ----> utilfw2 ----> NT9

Connectivity for the LAB Environment


DB2 backend ----> NT9

Source Trace Files


Trace file "Filter for NT09 IP (Mar31pm-apr01am).cap" was obtained with port monitor configured for
the DB1 server and shows all traffic between the production servers DB1 & NT9 from 2003-03-
31 15:01 to 2003-04-01 08:13.
Trace file " lab capture 02 DB2 communicating with NT9 ok.cap " shows all traffic on the LAB
segment hub, including traffic between replica servers DB2 & NT9.

Observations
?? Switches and firewalls are not logging any drops between NT9 and the DB servers.
?? Both DB servers are logging NETLOGON system authentication errors because they do
not receive the responses to their RPC NETLOGON request packets submitted to TCP
port 1026 on NT9 (NETLOGON UUID = 12345678-1234-abcd-ef00-01234567cffb).
?? The NETLOGON request packets seen in the LAB appear identical to those sent on the
production network.
?? DB1 can successfully communicate with the Directory Replication Interface via the same
port 1026 on NT9 (NTDS UUID = e3514235-4b06-11d1-ab04-00c04fc2dcd2).
?? The NETLOGON response packets are being intercepted and RESET by utilfw2.
?? utilfw2 runs Firewall-1 software on a Nokia platform.

Revised on 14/05/2003 by Daniel Cayer Page 1 of 9


Prepared by EDS CS-D for Server Authentication Problem CA01576568.
Filename: Sniffer Trace File Analysis for Active Directory Authentication Problem v1-5.doc

Successful DB2 NETLOGON in LAB (Sniffer on LAB HUB)


NOTE: DB server and PDC are on the same local subnet. The traffic in the production network
is identical to that in the LAB until the NETLOGON request, which is successfully acknowledged
and answered in the LAB. This trace files contains all traffic from both servers since they were
powered on.

1 Search for Domain Controller


1.1 DNS query for DC
No. Time SRC DST Pro Info
173 2003-02-26 10:27:51 DB2 NT9 DNS Standard query SRV _ldap._tcp.Default-First-Site-Name._sites.dc._msdcs.CWH-
OTTAWA.COM
1.2 DNS response: DC found
174 2003-02-26 10:27:51 NT9 DB2 DNS Standard query response SRV 0 100 389 cwh-ott-nt-009.cwh-ottawa.com

2 Determine if DC is closest one available


2.1 LDAP search request for matching host name, domain name, SID & GUID
175 2003-02-26 10:27:51 DB2 NT9 LDAP MsgId=1 MsgType=Search Request
2.2 Successful LDAP response
176 2003-02-26 10:27:51 NT9 DB2 LDAP MsgId=1 MsgType=Search Entry

3 Establishment of secured channel between DB2 & DC (NT09)


3.1 PORTMAPPER (EPM) request via RPC for Active Directory Logon
177 2003-02-26 10:27:51 DB2 NT9 TCP 1103 > 135 [SYN] Seq=1560904577 Ack=0 Win=16384 Len=0
178 2003-02-26 10:27:51 NT9 DB2 TCP 135 > 1103 [SYN, ACK] Seq=4114774075 Ack=1560904578 Win=17520 Len=0
179 2003-02-26 10:27:51 DB2 NT9 TCP 1103 > 135 [ACK] Seq=1560904578 Ack=4114774076 Win=17520 Len=0
180 2003-02-26 10:27:51 DB2 NT9 DCERPC Bind: call_id: 1 UUID: EPM
181 2003-02-26 10:27:51 NT9 DB2 DCERPC Bind_ack: call_id: 1 accept max_xmit: 5840 max_recv: 5840
182 2003-02-26 10:27:51 DB2 NT9 EPM Map request
3.2 PORTMAPPER response (port = 1026)
183 2003-02-26 10:27:51 NT9 DB2 EPM Map reply
184 2003-02-26 10:27:51 DB2 NT9 TCP 1103 > 135 [FIN, ACK] Seq=1560904806 Ack=4114774464 Win=17132 Len=0
3.3 NETLOGON request
185 2003-02-26 10:27:51 DB2 NT9 TCP 1104 > 1026 [SYN] Seq=1560942590 Ack=0 Win=16384 Len=0
186 2003-02-26 10:27:51 NT9 DB2 TCP 1026 > 1104 [SYN, ACK] Seq=4114826958 Ack=1560942591 Win=17520 Len=0
187 2003-02-26 10:27:51 NT9 DB2 TCP 135 > 1103 [ACK] Seq=4114774464 Ack=1560904807 Win=17292 Len=0
188 2003-02-26 10:27:51 NT9 DB2 TCP 135 > 1103 [FIN, ACK] Seq=4114774464 Ack=1560904807 Win=17292 Len=0
189 2003-02-26 10:27:51 DB2 NT9 TCP 1104 > 1026 [ACK] Seq=1560942591 Ack=4114826959 Win=17520 Len=0
190 2003-02-26 10:27:51 DB2 NT9 DCERPC Bind: call_id: 1 UUID: RPC_NETLOGON
191 2003-02-26 10:27:51 DB2 NT9 TCP 1103 > 135 [ACK] Seq=1560904807 Ack=4114774465 Win=17132 Len=0
3.4 NETLOGON request acknowledgement
192 2003-02-26 10:27:51 NT9 DB2 DCERPC Bind_ack: call_id: 1 accept max_xmit: 5840 max_recv: 5840
3.5 NETLOGON server challenge request
193 2003-02-26 10:27:51 DB2 NT9 RPC_NETLOGON ServerReqChallenge request, REBIZX-DB2
3.6 NETLOGON server challenge response
194 2003-02-26 10:27:51 NT9 DB2 RPC_NETLOGON ServerReqChallenge reply
3.7 NETLOGON server authentication request
195 2003-02-26 10:27:51 DB2 NT9 RPC_NETLOGON ServerAuthenticate3 request
3.8 NETLOGON server authentication response
196 2003-02-26 10:27:51 NT9 DB2 RPC_NETLOGON ServerAuthenticate3 reply
3.9 New NETLOGON connection for Domain Info lookup
197 2003-02-26 10:27:51 DB2 NT9 TCP 1105 > 1026 [SYN] Seq=1561007361 Ack=0 Win=16384 Len=0
198 2003-02-26 10:27:51 NT9 DB2 TCP 1026 > 1105 [SYN, ACK] Seq=4114884240 Ack=1561007362 Win=17520 Len=0
199 2003-02-26 10:27:51 DB2 NT9 TCP 1105 > 1026 [ACK] Seq=1561007362 Ack=4114884241 Win=17520 Len=0
200 2003-02-26 10:27:51 DB2 NT9 DCERPC Bind: call_id: 3 UUID: RPC_NETLOGON
201 2003-02-26 10:27:51 NT9 DB2 DCERPC Bind_ack: call_id: 3 accept max_xmit: 5840 max_recv: 5840
202 2003-02-26 10:27:51 DB2 NT9 RPC_NETLOGON NetrLogonGetDomainInfo request

Revised on 14/05/2003 by Daniel Cayer Page 2 of 9


Prepared by EDS CS-D for Server Authentication Problem CA01576568.
Filename: Sniffer Trace File Analysis for Active Directory Authentication Problem v1-5.doc

3.10 Domain Info response (encrypted payload)


203 2003-02-26 10:27:51 NT9 DB2 RPC_NETLOGON NetrLogonGetDomainInfo reply
3.11 Establish SMB connection, authenticate with Kerberos, etc…
204 2003-02-26 10:27:51 DB2 NT9 ICMP Echo (ping) request
205 2003-02-26 10:27:51 NT9 DB2 ICMP Echo (ping) reply
206 2003-02-26 10:27:51 DB2 NT9 TCP 1106 > 445 [SYN] Seq=1561041120 Ack=0 Win=16384 Len=0
207 2003-02-26 10:27:51 NT9 DB2 TCP 445 > 1106 [SYN, ACK] Seq=4114942432 Ack=1561041121 Win=17520 Len=0
208 2003-02-26 10:27:51 DB2 NT9 TCP 1106 > 445 [ACK] Seq=1561041121 Ack=4114942433 Win=17520 Len=0
209 2003-02-26 10:27:51 DB2 NT9 ICMP Echo (ping) request
210 2003-02-26 10:27:51 NT9 DB2 ICMP Echo (ping) reply
211 2003-02-26 10:27:51 DB2 NT9 SMB Negotiate Protocol Request
212 2003-02-26 10:27:51 NT9 DB2 SMB Negotiate Protocol Response
213 2003-02-26 10:27:51 DB2 NT9 KRB5 AS-REQ
214 2003-02-26 10:27:51 NT9 DB2 KRB5 KRB-ERROR
215 2003-02-26 10:27:51 DB2 NT9 KRB5 AS-REQ
216 2003-02-26 10:27:51 NT9 DB2 KRB5 AS-REP
217 2003-02-26 10:27:51 DB2 NT9 KRB5 TGS-REQ
218 2003-02-26 10:27:51 NT9 DB2 KRB5 TGS-REP
219 2003-02-26 10:27:51 DB2 NT9 KRB5 TGS-REQ
220 2003-02-26 10:27:51 NT9 DB2 KRB5 TGS-REP
221 2003-02-26 10:27:51 DB2 NT9 SMB Session Setup AndX Request[Unreassembled Packet]
222 2003-02-26 10:27:51 DB2 NT9 NBSS NBSS Continuation Message
223 2003-02-26 10:27:51 NT9 DB2 TCP 445 > 1106 [ACK] Seq=4114942624 Ack=1561043946 Win=17520 Len=0
224 2003-02-26 10:27:51 NT9 DB2 SMB Session Setup AndX Response, Error: STATUS_MORE_PROCESSING_REQUIRED
225 2003-02-26 10:27:51 DB2 NT9 SMB Session Setup AndX Request[Unreassembled Packet]
226 2003-02-26 10:27:51 DB2 NT9 NBSS NBSS Continuation Message
227 2003-02-26 10:27:51 NT9 DB2 TCP 445 > 1106 [ACK] Seq=4114943017 Ack=1561046572 Win=17520 Len=0
228 2003-02-26 10:27:51 NT9 DB2 SMB Session Setup AndX Response
229 2003-02-26 10:27:51 DB2 NT9 SMB Tree Connect AndX Request,Path: \\CWH-OTT-NT-009.CWH-OTTAWA.COM\IPC$
230 2003-02-26 10:27:51 NT9 DB2 SMB Tree Connect AndX Response
231 2003-02-26 10:27:51 DB2 NT9 SMB NT Create AndX Request, Path: \lsarpc
232 2003-02-26 10:27:51 NT9 DB2 SMB NT Create AndX Response, FID: 0x4000
233 2003-02-26 10:27:51 DB2 NT9 DCERPC Bind: call_id: 1 UUID: LSA
234 2003-02-26 10:27:51 NT9 DB2 DCERPC Bind_ack: call_id: 1 accept max_xmit: 4280 max_recv: 4280
235 2003-02-26 10:27:51 DB2 NT9 LSA OpenPolicy2 request, \\cwh-ott-nt-009.CWH-OTTAWA.COM
236 2003-02-26 10:27:51 NT9 DB2 SMB Write AndX Response, FID: 0x4000, 140 bytes
237 2003-02-26 10:27:51 DB2 NT9 SMB Read AndX Request, FID: 0x4000, 1024 bytes at offset 0
238 2003-02-26 10:27:51 NT9 DB2 LSA OpenPolicy2 reply
239 2003-02-26 10:27:51 DB2 NT9 SMB NT Create AndX Request, Path: \lsarpc
240 2003-02-26 10:27:51 NT9 DB2 SMB NT Create AndX Response, FID: 0x4001
241 2003-02-26 10:27:51 DB2 NT9 DCERPC Bind: call_id: 2 UUID: LSA
242 2003-02-26 10:27:51 NT9 DB2 DCERPC Bind_ack: call_id: 2 accept max_xmit: 4280 max_recv: 4280
243 2003-02-26 10:27:51 DB2 NT9 LSA QueryInfoPolicy request, Primary Domain Information
244 2003-02-26 10:27:51 NT9 DB2 SMB Write AndX Response, FID: 0x4001, 96 bytes
245 2003-02-26 10:27:51 DB2 NT9 SMB Read AndX Request, FID: 0x4001, 1024 bytes at offset 0
246 2003-02-26 10:27:51 NT9 DB2 LSA QueryInfoPolicy reply
247 2003-02-26 10:27:51 DB2 NT9 LSA QueryInfoPolicy request, Account Domain Information
248 2003-02-26 10:27:51 NT9 DB2 SMB Write AndX Response, FID: 0x4001, 96 bytes
249 2003-02-26 10:27:51 DB2 NT9 SMB Read AndX Request, FID: 0x4001, 1024 bytes at offset 0
250 2003-02-26 10:27:51 NT9 DB2 LSA QueryInfoPolicy reply
251 2003-02-26 10:27:51 DB2 NT9 LSA LookupSIDs2 request
252 2003-02-26 10:27:51 NT9 DB2 SMB Write AndX Response, FID: 0x4001, 240 bytes
253 2003-02-26 10:27:51 DB2 NT9 SMB Read AndX Request, FID: 0x4001, 1024 bytes at offset 0
254 2003-02-26 10:27:51 NT9 DB2 LSA LookupSIDs2 reply
255 2003-02-26 10:27:51 DB2 NT9 LSA Close request
256 2003-02-26 10:27:51 NT9 DB2 SMB Write AndX Response, FID: 0x4001, 96 bytes
257 2003-02-26 10:27:51 DB2 NT9 SMB Read AndX Request, FID: 0x4001, 1024 bytes at offset 0
258 2003-02-26 10:27:51 NT9 DB2 LSA Close reply
259 2003-02-26 10:27:51 DB2 NT9 SMB Close Request, FID: 0x4000
260 2003-02-26 10:27:51 NT9 DB2 SMB Close Response
261 2003-02-26 10:27:51 DB2 NT9 SMB Close Request, FID: 0x4001
262 2003-02-26 10:27:51 NT9 DB2 SMB Close Response
263 2003-02-26 10:27:51 DB2 NT9 TCP 1105 > 1026 [ACK] Seq=1561008268 Ack=4114885009 Win=16752 Len=0
264 2003-02-26 10:27:51 DB2 NT9 TCP 1104 > 1026 [ACK] Seq=1560943001 Ack=4114827099 Win=17380 Len=0
265 2003-02-26 10:27:51 DB2 NT9 TCP 1106 > 445 [ACK] Seq=1561048707 Ack=4114945372 Win=16066 Len=0

Revised on 14/05/2003 by Daniel Cayer Page 3 of 9


Prepared by EDS CS-D for Server Authentication Problem CA01576568.
Filename: Sniffer Trace File Analysis for Active Directory Authentication Problem v1-5.doc

Failed DB1 NETLOGON on Production LAN (Sniffer next to DB1)


1 Search for Domain Controller
No. Time SRC DST Proto Info
4571 2003-03-31 22:14:24 DB1 NT09 DNS Standard query SRV _ldap._tcp.pdc._msdcs.rebizx-db1
4572 2003-03-31 22:14:24 NT09 DB1 DNS Standard query response, No such name
4573 2003-03-31 22:14:26 DB1 NT09 DNS Standard query SRV _ldap._tcp.Default-First-Site-
Name._sites.dc._msdcs.rebizx-db1
4574 2003-03-31 22:14:26 NT09 DB1 DNS Standard query response, No such name
4575 2003-03-31 22:14:26 DB1 NT09 DNS Standard query SRV _ldap._tcp.dc._msdcs.rebizx-db1
4576 2003-03-31 22:14:26 NT09 DB1 DNS Standard query response, No such name
4577 2003-03-31 22:17:22 DB1 NT09 DNS Standard query SRV _ldap._tcp.Default-First-Site-
Name._sites.dc._msdcs.CWH-OTTAWA.COM
4578 2003-03-31 22:17:22 NT09 DB1 DNS Standard query response SRV 0 100 389 cwh-ott-nt-009.cwh-ottawa.com
2 Determine if DC is closest one available
4579 2003-03-31 22:17:22 DB1 NT09 LDAP MsgId=3743 MsgType=Search Request
4580 2003-03-31 22:17:22 NT09 DB1 LDAP MsgId=3743 MsgType=Search Entry
3 Establishment of secured channel between DB1 & DC (NT09)
3.1 PORTMAPPER (EPM) request via RPC for Active Directory Logon
4581 2003-03-31 22:17:22 DB1 NT09 TCP 1673 > epmap [SYN] Seq=192046899 Ack=0 Win=16384 Len=0
4582 2003-03-31 22:17:22 NT09 DB1 TCP epmap > 1673 [SYN, ACK] Seq=4024295118 Ack=192046900 Win=17520 Len=0
4583 2003-03-31 22:17:22 DB1 NT09 TCP 1673 > epmap [ACK] Seq=192046900 Ack=4024295119 Win=17520 Len=0
4584 2003-03-31 22:17:22 DB1 NT09 DCERPC Bind: call_id: 1 UUID: EPM
4585 2003-03-31 22:17:22 NT09 DB1 DCERPC Bind_ack: call_id: 1 accept max_xmit: 5840 max_recv: 5840
4586 2003-03-31 22:17:22 DB1 NT09 EPM Map request
3.2 PORTMAPPER response (port = 1026)
4587 2003-03-31 22:17:22 NT09 DB1 EPM Map reply
4588 2003-03-31 22:17:22 DB1 NT09 TCP 1673 > epmap [FIN, ACK] Seq=192047128 Ack=4024295331 Win=17308 Len=0
4589 2003-03-31 22:17:22 DB1 NT09 TCP 1674 > 1026 [SYN] Seq=192089439 Ack=0 Win=16384 Len=0
4590 2003-03-31 22:17:22 NT09 DB1 TCP epmap > 1673 [ACK] Seq=4024295331 Ack=192047129 Win=17292 Len=0
4591 2003-03-31 22:17:22 NT09 DB1 TCP epmap > 1673 [FIN, ACK] Seq=4024295331 Ack=192047129 Win=17292 Len=0
4592 2003-03-31 22:17:22 DB1 NT09 TCP 1673 > epmap [ACK] Seq=192047129 Ack=4024295332 Win=17308 Len=0
3.3 NETLOGON request
4593 2003-03-31 22:17:22 NT09 DB1 TCP 1026 > 1674 [SYN, ACK] Seq=4024345794 Ack=192089440 Win=17520 Len=0
4594 2003-03-31 22:17:22 DB1 NT09 TCP 1674 > 1026 [ACK] Seq=192089440 Ack=4024345795 Win=17520 Len=0
4595 2003-03-31 22:17:22 DB1 NT09 DCERPC Bind: call_id: 1 UUID: RPC_NETLOGON
3.3.1 Retransmission of NETLOGON request (3-second timeoute)
4596 2003-03-31 22:17:26 DB1 NT09 DCERPC Bind: call_id: 1 UUID: RPC_NETLOGON
3.3.2 NETLOGON error (NT09 reset of the TCP connection)
4597 2003-03-31 22:17:26 NT09 DB1 TCP 1026 > 1674 [RST] Seq=4024345795 Ack=4024345795 Win=0 Len=0
3.3.3 RETRY NETLOGON (2nd attempt, from a different source port)
4598 2003-03-31 22:17:26 DB1 NT09 TCP 1675 > 1026 [SYN] Seq=193074352 Ack=0 Win=16384 Len=0
4599 2003-03-31 22:17:26 NT09 DB1 TCP 1026 > 1675 [SYN, ACK] Seq=4025232633 Ack=193074353 Win=17520 Len=0
4600 2003-03-31 22:17:26 DB1 NT09 TCP 1675 > 1026 [ACK] Seq=193074353 Ack=4025232634 Win=17520 Len=0
4601 2003-03-31 22:17:26 DB1 NT09 DCERPC Bind: call_id: 1 UUID: RPC_NETLOGON
3.3.4 Retransmission of NETLOGON request (3-second timeoute)
4604 2003-03-31 22:17:29 DB1 NT09 DCERPC Bind: call_id: 1 UUID: RPC_NETLOGON
3.3.5 NETLOGON error (NT09 reset of the TCP connection)
4605 2003-03-31 22:17:29 NT09 DB1 TCP 1026 > 1675 [RST] Seq=4025232634 Ack=4025232634 Win=0 Len=0

Revised on 14/05/2003 by Daniel Cayer Page 4 of 9


Prepared by EDS CS-D for Server Authentication Problem CA01576568.
Filename: Sniffer Trace File Analysis for Active Directory Authentication Problem v1-5.doc

NOTE: Other successful TCP connections are seen on NT09 port 1026 for another UUID:
No. Time SRC DST Proto Info
800 2003-03-31
16:25:57 DB1 NT09 TCP 3927 > 1026 [SYN] Seq=1126453154 Ack=0 Win=16384 Len=0
804 2003-03-31
16:25:57 NT09 DB1 TCP 1026 > 3927 [SYN, ACK] Seq=3006786322 Ack=1126453155 Win=17520 Len=0
805 2003-03-31
16:25:57 DB1 NT09 TCP 3927 > 1026 [ACK] Seq=1126453155 Ack=3006786323 Win=17520 Len=0
812 2003-03-31
16:25:57 DB1 NT09 DCERPC Bind: call_id: 1 UUID: e3514235-4b06-11d1-ab04-00c04fc2dcd2 ver 4.0
813 2003-03-31
16:25:57 DB1 NT09 TCP 3927 > 1026 [PSH,ACK] Seq=1126454615 Ack=3006786323 Win=17520 Len=1156
814 2003-03-31
16:25:57 NT09 DB1 TCP 1026 > 3927 [ACK] Seq=3006786323 Ack=1126455771 Win=17520 Len=0
815 2003-03-31
16:25:57 NT09 DB1 DCERPC Bind_ack: call_id: 1 accept max_xmit: 5840 max_recv: 5840
816 2003-03-31
16:25:57 DB1 NT09 DCERPC Alter_context: call_id: 1 UUID: e3514235-4b06-11d1-ab04-
00c04fc2dcd2 ver 4.0
817 2003-03-31 16:25:57 NT09 DB1 DCERPC Alter_context_resp: call_id: 1 accept max_xmit: 5840 max_recv: 5840
818 2003-03-31 16:25:57 DB1 NT09 DCERPC Request: call_id: 1 opnum: 0 ctx_id: 0
819 2003-03-31 16:25:57 NT09 DB1 DCERPC Response: call_id: 1 ctx_id: 0
820 2003-03-31 16:25:57 DB1 NT09 DCERPC Request: call_id: 2 opnum: 12 ctx_id: 0
821 2003-03-31 16:25:57 NT09 DB1 DCERPC Response: call_id: 2 ctx_id: 0
822 2003-03-31 16:25:57 DB1 NT09 DCERPC Request: call_id: 3 opnum: 12 ctx_id: 0
823 2003-03-31 16:25:57 NT09 DB1 DCERPC Response: call_id: 3 ctx_id: 0
824 2003-03-31 16:25:57 DB1 NT09 DCERPC Request: call_id: 4 opnum: 1 ctx_id: 0
825 2003-03-31 16:25:57 NT09 DB1 DCERPC Response: call_id: 4 ctx_id: 0
826 2003-03-31 16:25:57 DB1 NT09 TCP 3927 > 1026 [FIN, ACK] Seq=1126456608 Ack=3006787506 Win=16337 Len=0
827 2003-03-31 16:25:57 NT09 DB1 TCP 1026 > 3927 [ACK] Seq=3006787506 Ack=1126456609 Win=16683 Len=0
828 2003-03-31 16:25:57 NT09 DB1 TCP 1026 > 3927 [FIN, ACK] Seq=3006787506 Ack=1126456609 Win=16683 Len=0
829 2003-03-31 16:25:57 DB1 NT09 TCP 3927 > 1026 [ACK] Seq=1126456609 Ack=3006787507 Win=16337 Len=0

Kerberos Errors From DB1 to NT9 (Sniffer next to DB1)


Trace file " DB1 kereberos failed to NT9.cap " shows that DB1 is using the
wrong name to authenticate with Kerberos. In fact DB1 uses LDAP1's IP
address instead of its own FQDN!!! These Kerberos errors are occurring at a
regular 40-minute interval.
NOTE: Sniffer does not decode Kerberos… Use Ethereal instead!
Frame 5 (1373 bytes on wire, 1373 bytes captured)
Arrival Time: Mar 28, 2003 10:02:48.124115000
Ethernet II, Src: 00:02:a5:6b:8d:96, Dst: 00:00:5e:00:01:04
Internet Protocol, Src Addr: 172.20.6.39 (172.20.6.39), Dst Addr:
172.20.0.193 (172.20.0.193)
User Datagram Protocol, Src Port: 2729 (2729), Dst Port: 88 (88)
Kerberos
Version: 5
MSG Type: TGS-REQ
Pre-Authentication
Type: PA-TGS-REQ
Value: 6E82048730820483A003020105A10302...
Request This should be a qualified
Options: 0040810010 domain such as "cwh-ott-
Realm: CWH-OTTAWA.COM nt-009.CWH-
Server Name: HOST
Type: Service and Instance
OTTAWA.COM" !!!
Name: HOST
Name: 172.20.6.37
End Time: 2037-09-13 02:48:05 (Z)
Random Number: 1281252417
Encryption Types
Type: rc4-hmac

Revised on 14/05/2003 by Daniel Cayer Page 5 of 9


Prepared by EDS CS-D for Server Authentication Problem CA01576568.
Filename: Sniffer Trace File Analysis for Active Directory Authentication Problem v1-5.doc

Type: Unknown encryption type 0xff7b


Type: Unknown encryption type 0x80
Type: des-cbc-md5
Type: des-cbc-crc
Type: rc4-hmac-exp
Type: Unknown encryption type 0xff79

Frame 6 (150 bytes on wire, 150 bytes captured)


Arrival Time: Mar 28, 2003 10:02:48.127646000
Ethernet II, Src: 00:a0:8e:32:ba:53, Dst: 00:02:a5:6b:8d:96
Internet Protocol, Src Addr: 172.20.0.193 (172.20.0.193), Dst Addr:
172.20.6.39 (172.20.6.39)
User Datagram Protocol, Src Port: 88 (88), Dst Port: 2729 (2729)
Kerberos
Version: 5
MSG Type: KRB-ERROR
stime: 2003-03-28 15:01:20 (Z)
susec: 982004
Error Code: KRB5KDC_ERR_S_PRINCIPAL_UNKNOWN
realm: CWH-OTTAWA.COM
sname: krbtgt
Type: Service and Instance
Name: krbtgt
Name: CWH-OTTAWA.COM

Failed NETLOGON on Production LAN (Sniffer next to NT9)


NOTE: Span a port on switch connected to NT9 for the Sniffer.

Trace file shows NETLOGON request from DB1 is reaching NT9 and NT9 is
acknowledging!!!
No. Time SRC DST Pro Info
7901 2003-04-02 14:17:54 DB1 NT9 TCP 1280 > 1026 [SYN] Seq=2306675940 Ack=0 Win=16384 Len=0
7902 2003-04-02 14:17:54 NT9 DB1 TCP 1026 > 1280 [SYN, ACK] Seq=1956349167 Ack=2306675941 Win=17520 Len=0
7904 2003-04-02 14:17:54 DB1 NT9 TCP 1280 > 1026 [ACK] Seq=2306675941 Ack=1956349168 Win=17520 Len=0
7905 2003-04-02 14:17:54 DB1 NT9 DCERPC Bind: call_id: 1 UUID: RPC_NETLOGON
7906 2003-04-02 14:17:54 NT9 DB1 DCERPC Bind_ack: call_id: 1 accept max_xmit: 5840 max_recv: 5840
7907 2003-04-02 14:17:54 DB1 NT9 TCP 1280 > 1026 [RST] Seq=2306676013 Ack=0 Win=0 Len=0
7912 2003-04-02 14:17:58 DB1 NT9 DCERPC Bind: call_id: 1 UUID: RPC_NETLOGON
7913 2003-04-02 14:17:58 NT9 DB1 TCP 1026 > 1280 [RST] Seq=1956349168 Ack=1956349168 Win=0 Len=0
Where are these packets dropped and who is sending the RST on behalf of
the DB servers??? ? obtain trace file from segment between 2 firewalls

Failed NETLOGON on Production LAN (Trace from utilfw2


interface facing the other firewall)

Packet 7906 above (NETLOGON response) is intercepted by utilfw2 and packet


7907 is originated from this same utilfw2 because both packets do not show up
on the other side of this firewall:
No. Time SRC DST Pro Info
1 2003-04-03 00:45:00 DB1 NT9 TCP 4447 > 1026 [SYN] Seq=3797945959 Ack=0 Win=16384 Len=0
2 2003-04-03 00:45:00 NT9 DB1 TCP 1026 > 4447 [SYN, ACK] Seq=2862503320 Ack=3797945960 Win=17520 Len=0

Revised on 14/05/2003 by Daniel Cayer Page 6 of 9


Prepared by EDS CS-D for Server Authentication Problem CA01576568.
Filename: Sniffer Trace File Analysis for Active Directory Authentication Problem v1-5.doc

3 2003-04-03 00:45:00 DB1 NT9 TCP 4447 > 1026 [ACK] Seq=3797945960 Ack=2862503321 Win=17520 Len=0
4 2003-04-03 00:45:00 DB1 NT9 DCERPC Bind: call_id: 1 UUID: RPC_NETLOGON
5 2003-04-03 00:45:03 DB1 NT9 DCERPC Bind: call_id: 1 UUID: RPC_NETLOGON
6 2003-04-03 00:45:03 NT9 DB1 TCP 1026 > 4447 [RST] Seq=2862503321 Ack=2862503321 Win=0 Len=0

Revised on 14/05/2003 by Daniel Cayer Page 7 of 9


Prepared by EDS CS-D for Server Authentication Problem CA01576568.
Filename: Sniffer Trace File Analysis for Active Directory Authentication Problem v1-5.doc

Questions

1. Is there any way to determine the correctness of the NETLOGON


requests from DB1 (i.e.: is DB1 attempting to logon to NT09 correctly)?
ANSWER: YES! The packets in the LAB are identical!

2. Is there any way to determine why NT09 does not even acknowledge
these NETLOGON requests at the TCP layer?
ANSWER: YES! NT09 DOES acknowledge the packets. The
firewall is intercepting and dropping the response, which
includes the TCP ACK!!!

3. Is NT09 supposed to be listening on port 1026 for both NETLOGON and


NTDS UUIDs (e3514235-4b06-11d1-ab04-00c04fc2dcd2 & 12345678-
1234-abcd-ef00-01234567cffb)?
ANSWER: YES! This is a normal behavior for Win2K.

4. Are the Kerberos errors the cause of the NETLOGON failures?


ANSWER: NO! NETLOGON fails because of the firewall.

5. What is the root cause of the Kerberos errors?

6. What are the dependencies between Kerberos and Active Directory


Authentication?

Suggestions
1. Fix Firewall
2. Fix Kerberos problem (Windows patch???)

Microsoft Knowledge Base Articles:


260371 - Troubleshooting Common Active Directory Setup Issues in Windows 2000
220940 - How to Enable Diagnostic Event Logging for Active Directory Services
248807 - Using Uppercase Letters for Kerberos Realm Names
262177 - HOW TO: Enable Kerberos Event Logging
235529 - Kerberos Support on Windows 2000-Based Server Clusters
280132 - XCCC: Exchange 2000 Windows 2000 Connectivity Through Firewalls
308111 - A Missing Service Principal Name May Prevent Domain Controllers from Replicating

Revised on 14/05/2003 by Daniel Cayer Page 8 of 9


Prepared by EDS CS-D for Server Authentication Problem CA01576568.
Filename: Sniffer Trace File Analysis for Active Directory Authentication Problem v1-5.doc

Conclusion
Once we were able to identify the failed NETLOGON requests in the trace files (corresponding to
the NETLOGON errors on the DB servers), we then moved the Sniffer next to the PDC server
and confirmed that the NETLOGON requests were indeed being answered. Additional traces
from the firewalls allowed us to determine that the NETLOGON responses from the PDC were
being blocked by the utilfw2 firewall. Upon reception of the NETLOGON response packet from
NT9, utilfw2 would immediately send back a TCP RST to NT9. A support call was made to the
firewall vendor (Check-Point) who confirmed that they did not support Microsoft Active Directory
on this version of the firewall-1 software (version 4.x). Their recommendation was to upgrade the
firewall software to a more recent version.

Lessons Learned
?? How Windows 2000 Active Directory Authentication works
?? What Windows 2000 Active Directory Authentication looks like "on-the-wire".

Revised on 14/05/2003 by Daniel Cayer Page 9 of 9

Вам также может понравиться