Kerberos error in NLB environment
Hi, anyone got this error in context with Moss2007 SP2, NLB, Win2k8r2 64-bit, Kerberos. I get this error only on one server, host2. Log Name: System Source: Microsoft-Windows-Security-Kerberos Date: 17.11.2010 04:37:52 Event ID: 3 Task Category: None Level: Error Keywords: Classic User: N/A Computer: host2.gtv.grp Description: A Kerberos Error Message was received: on logon session Client Time: Server Time: 3:38:7.0000 11/17/2010 Z Error Code: 0x7 KDC_ERR_S_PRINCIPAL_UNKNOWN Extended Error: 0xc0000035 KLIN(0) Client Realm: Client Name: Server Realm: domain.GRP Server Name: HTTP/host1.domain.grp Target Name: HTTP/host1.domain.grp@domain.GRP Error Text: File: 9 Line: efb Error Data is in record data. Event Xml: <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event"> <System> <Provider Name="Microsoft-Windows-Security-Kerberos" Guid="{98E6CFCB-EE0A-41E0-A57B-622D4E1B30B1}" EventSourceName="Kerberos" /> <EventID Qualifiers="32768">3</EventID> <Version>0</Version> <Level>2</Level> <Task>0</Task> <Opcode>0</Opcode> <Keywords>0x80000000000000</Keywords> <TimeCreated SystemTime="2010-11-17T03:37:52.000000000Z" /> <EventRecordID>31906</EventRecordID> <Correlation /> <Execution ProcessID="0" ThreadID="0" /> <Channel>System</Channel> <Computer>host2.domain.grp</Computer> <Security /> </System> <EventData> <Data Name="LogonSession"> </Data> <Data Name="ClientTime"> </Data> <Data Name="ServerTime">3:38:7.0000 11/17/2010 Z</Data> <Data Name="ErrorCode">0x7</Data> <Data Name="ErrorMessage"> KDC_ERR_S_PRINCIPAL_UNKNOWN</Data> <Data Name="ExtendedError">0xc0000035 KLIN(0)</Data> <Data Name="ClientRealm"> </Data> <Data Name="ClientName"> </Data> <Data Name="ServerRealm">DOMAIN.GRP</Data> <Data Name="ServerName">HTTP/host1.domain.grp</Data> <Data Name="TargetName">HTTP/host1.domain.grp@domain.GRP</Data> <Data Name="ErrorText"> </Data> <Data Name="File">9</Data> <Data Name="Line">efb</Data> <Binary>3015A103020103A20E040C350000C00000000001000000</Binary> </EventData> </Event> best regards, Knut
November 17th, 2010 3:30am

The KDC_ERR_S_PRINCIPAL_UNKNOWN is described http://www.windowsecurity.com/articles/Troubleshooting-Kerberos-SharePoint-environment-Part1.html "...As the SPN missing the Active Directory will send a KDC_ERR_S_PRINCIPAL_UNKNOWN. This is the message saying that the Active Directory cannot find a matching SPN for this website...." (found by google search, very handy) Server Name: HTTP/host1.domain.grp Target Name: HTTP/host1.domain.grp@domain.GRP/bac
Free Windows Admin Tool Kit Click here and download it now
November 17th, 2010 8:11am

Hi Bob, the confusing thing is, that the SPN's are in place. C:\Users\mossadm-p>setspn -l Service_MossAppPoolp http/host2.domain.grp http/host2 http/host1.domain.grp http/host1 Knut
November 17th, 2010 9:50am

Did you provide the full domain\username when you specified the setspn command? /bac
Free Windows Admin Tool Kit Click here and download it now
November 17th, 2010 10:17am

Yepp
November 17th, 2010 1:55pm

Yepp
Free Windows Admin Tool Kit Click here and download it now
November 17th, 2010 1:55pm

You should also try the SETSPN -X to search for duplicates. Likewise, use the -S for adds, as it tests for dupes./bac
November 17th, 2010 2:49pm

Also, have you researched the delegconfig tool? This may be useful for troubleshooting./bac
Free Windows Admin Tool Kit Click here and download it now
November 17th, 2010 2:52pm

Hi Bob, I did execute the setspn command. C:\Users\mossadm-p>setspn -S http/v-st-n002-p v-st-n002-p Checking domain DC=gtv,DC=grp CN=Service_MossAppPool-p,OU=ServiceAccounts,OU=Administration,DC=domain,DC=grp http/v-st-n002-p.domain.grp http/v-st-n002-p http/v-st-n001-p.domain.grp http/v-st-n001-p CN=mossadm-p,OU=ServiceAccounts,OU=Administration,DC=domain,DC=grp http/v-st-n002-p.domain.grp http/v-st-n002-p http/v-st-n001-p.domain.grp http/v-st-n001-p Duplicate SPN found, aborting operation! The mossadm-p account is the serverfarm account for MOSS and Service_MossAppPool-p is the ProtalPool account. I still dont get it. Knut
November 18th, 2010 2:40am

Hi Knut, 1 An Event log 3 about a Kerberos error that has the error code Error Code: 0x7 KDC_ERR_S_PRINCIPAL_UNKNOWN for Server Name will be logged when a share access is made against a server IP address and no server name. If the error is logged, the Windows client automatically tries to fail back to NTLM authentication for the user account. If this operation works, receive no error. Please disable Kerberos logging to stop throwing these errors. 2 Duplicate SPN found, aborting operation! Means you no longer have to depend upon boggling commands using LDIFDE or your own custom scripts to find out the duplicate SPNs. For detail please see http://blogs.msdn.com/b/saurabh_singh/archive/2009/01/09/new-features-in-setspn-exe-on-windows-server-2008.aspxBest regards. Emir
Free Windows Admin Tool Kit Click here and download it now
November 23rd, 2010 6:16am

Definately resolve the spns, but also, here are more of my notes on verifying the config in IIS using the IIS Admin Pack Configuration Editor. Our IIS7 configuration had two issues which were clarified via the IIS Admin Pack Configuration Editor. The IIS Admin Pack http://www.iis.net/download/administrationpack providers This was suspect during test 3, so we were on the right track, but using the IIS Admin Pack made the process of editing these changes more straight forward. useAppPoolCredentials The IIS Admin Pack Config Editor made it clear this was not set as expected, and made editing simple. After installing the IIS7 Admin Pack, Select the site in question, and under Features view, Management you will see Configuration Editor. Run it. Select ApplicationHost.config for the From: Navigate to the s ystem.webServer/security/authentication/windowsAuthentication Note the providers and useAppPoolCredentials Click the ellipses related to the providers to open the collection editor Update providers. Delete all entries, then re-add Negotiate first, then NTLM (case sensitive), close the collection editor and click Apply to save the changes. Note: You could also use the Generate Script option to make the necessary change scripts for use later. Change useAppPoolCredentials to True. Click Apply to save the change. View the settings using From: www.yoursite.com Web.Config . We don't want the web.config to override and possibly alter these settings. Use the From selector to verify these are not overridden. /bac
December 2nd, 2010 9:04am

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics