DirectAccess problems on 2012 RTM
Hi,
I have been trying to set up a lab using Server 2012 for directaccess, using a Windows Server 2008 R2 DC - I am trying to reflect our production environment.
I have confirmed the following to work:
- GPOs are distributed properly, - Both the Server and the client receive settings
- CRLs are accessible from the internet, -I used certutil to retrieve the CRL from the internet
- HTTPS tunnel is accessible from the Internet - netsh int https sh int - shows interface active
- I can ping the IPv6 address of the Directaccess as it is specified in the DNS server page,
I believe the problem is with IPSEC authentication, As I have enabled IPSEC auditing and receive a lot of Audit failures.
The failure reason is "No policy configured"
The Client is a Windows 7 machine and not a Windows 8 machine.
Both Computer and Server have a computer certificate using the default "Computer" template.
September 16th, 2012 7:24am
Here is the copy of the Event from the Event Log:
Log Name: Security
Source: Microsoft-Windows-Security-Auditing
Date: 16.9.2012 13:00:21
Event ID: 4653
Task Category: IPsec Main Mode
Level: Information
Keywords: Audit Failure
User: N/A
Computer: W7DAC3.Matrix.int
Description:
An IPsec main mode negotiation failed.
Local Endpoint:
Local Principal Name: -
Network Address: fda8:2d23:cc0c:1000:b454:18a4:c043:bd66
Keying Module Port: 500
Remote Endpoint:
Principal Name: -
Network Address: fda8:2d23:cc0c:1000::1
Keying Module Port: 500
Additional Information:
Keying Module Name: AuthIP
Authentication Method: Unknown authentication
Role: Initiator
Impersonation State: Not enabled
Main Mode Filter ID: 79151
Failure Information:
Failure Point: Local computer
Failure Reason: Negotiation timed out
State: Sent first (SA) payload
Initiator Cookie: f15a8d1f6872839f
Responder Cookie: 0000000000000000
Event Xml:
<Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
<System>
<Provider Name="Microsoft-Windows-Security-Auditing" Guid="{54849625-5478-4994-A5BA-3E3B0328C30D}" />
<EventID>4653</EventID>
<Version>0</Version>
<Level>0</Level>
<Task>12547</Task>
<Opcode>0</Opcode>
<Keywords>0x8010000000000000</Keywords>
<TimeCreated SystemTime="2012-09-16T11:00:21.353484400Z" />
<EventRecordID>3693</EventRecordID>
<Correlation />
<Execution ProcessID="532" ThreadID="2100" />
<Channel>Security</Channel>
<Computer>W7DAC3.Matrix.int</Computer>
<Security />
</System>
<EventData>
<Data Name="LocalMMPrincipalName">-</Data>
<Data Name="RemoteMMPrincipalName">-</Data>
<Data Name="LocalAddress">fda8:2d23:cc0c:1000:b454:18a4:c043:bd66</Data>
<Data Name="LocalKeyModPort">500</Data>
<Data Name="RemoteAddress">fda8:2d23:cc0c:1000::1</Data>
<Data Name="RemoteKeyModPort">500</Data>
<Data Name="KeyModName">%%8223</Data>
<Data Name="FailurePoint">%%8199</Data>
<Data Name="FailureReason">Negotiation timed out
</Data>
<Data Name="MMAuthMethod">%%8194</Data>
<Data Name="State">%%8202</Data>
<Data Name="Role">%%8205</Data>
<Data Name="MMImpersonationState">%%8217</Data>
<Data Name="MMFilterID">79151</Data>
<Data Name="InitiatorCookie">f15a8d1f6872839f</Data>
<Data Name="ResponderCookie">0000000000000000</Data>
</EventData>
</Event>
Free Windows Admin Tool Kit Click here and download it now
September 16th, 2012 7:28am
Hi,
Have you tested with a Windows 8 client to see if that works?
Start by verifying that you have selected "Enabled Windows 7 client computers to connect via DirectAccess", it is not selected by default.
You can find it by opening the Remote Access Management Console, click Edit for Step 2 (Remote Access Server) and then look at "Authentication")
Best wishes,
Jonas BlomJonas Blom | Relevo AB |
http://blog.nrpt.se
September 17th, 2012 3:59am
Hi,
Yes, I have verified, that Windows 7 clients are enabled.
I don't have any Windows 8 clients yet.
Regards,
S
Free Windows Admin Tool Kit Click here and download it now
September 17th, 2012 4:45am
Hi again,
Can you post a log from DCA from the Windows 7 client?
I often do a quick test to make sure that it is something with the IPSec-tunnels and that it's not related to anything else internally.
Use nslookup and set the IPv6 address listed in the NRPT as DNS server and see if you can do DNS lookups?
Since it is not ICMP it will try to go through the IPSec tunnels but is still destined to the DA server.
Another thing is to enable CAPI2 logs to see if you can see any certificate-related errors when the client tries to establish the IPSec tunnels.
Best wishes,
Jonas Blom
Jonas Blom | Relevo AB |
http://blog.nrpt.se
September 17th, 2012 7:51am
Hi,
I don't have DCA installed.
I can't post them right now, as I am rebuilding the client from scratch.
So you need output from:
netsh dns show state
netsh name show effective
And the diagnostic for the SAs?
CAPI2 logging is enabled as described here:
http://blogs.technet.com/b/pki/archive/2006/12/16/the-easy-way-of-crl-troubleshooting-in-windows-vista.aspx
right?
Regards,
Simon
Free Windows Admin Tool Kit Click here and download it now
September 17th, 2012 8:06am
Hi again,
The DCA logs give a lot of different information.
So I always ask for it to be able to quickly look through it. (A good way to avoid missing something obvious that deviates from the standard.)
The commands you posted are ofcourse interesting, but since you can reach the DA server the most important part is regarding the certificate.
(The output from certutil -store my)
If there's nothing strange there, the next suggestion would to go through the IPSec rules and compare the authentication settings between your client and the DA server to see if something differs.
(There is also a setting that the Windows Firewall GUI doesn't show that you can only see in the GPO that could be interesting to verify)
Regarding the CAPI2 log, the information how to enable it is corret.
Clear the log and try to access the DNS service on your DA server and see if you get any errors in it.
Best wishes,
Jonas Blom
Jonas Blom | Relevo AB |
http://blog.nrpt.se
September 17th, 2012 2:41pm
Hi,
thank you for taking a look at this. I don't have DCA configured, so I will try capturing most of the things needed.
Here are outputs:
NETSH INT HTTP SHOW INT
Interface IPHTTPSInterface (Group Policy) Parameters
------------------------------------------------------------
Role : client
URL :
https://uagda.src.si:443/IPHTTPS
Last Error Code : 0x0
Interface Status : IPHTTPS interface active
DNS Effective Name Resolution Policy Table Settings
Settings for MATRIXDA.Matrix.int
----------------------------------------------------------------------
Certification authority :
DNSSEC (Validation) : disabled
IPsec settings : disabled
DirectAccess (DNS Servers) :
DirectAccess (Proxy Settings) : Use default browser settings
Settings for .Matrix.int
----------------------------------------------------------------------
Certification authority :
DNSSEC (Validation) : disabled
IPsec settings : disabled
DirectAccess (DNS Servers) : fda8:2d23:cc0c:3333::1
DirectAccess (Proxy Settings) : Bypass proxy
Name Resolution Policy Table Options
--------------------------------------------------------------------
Query Failure Behavior : Always fall back to LLMNR and
NetBIOS for any kinds
of errors
Query Resolution Behavior : Resolve only IPv6 addresses for names
Network Location Behavior : Let Network ID determine when Direct
Access settings are to
be used
Machine Location : Outside corporate network
Direct Access Settings : Configured and Enabled
DNSSEC Settings : Not Configured
IPSEC output shows no SAs Match both for quick mode and main mode
my
================ Certificate 0 ================
Serial Number: 1a4f1c8a00000000000a
Issuer: CN=Matrix CA, DC=Matrix, DC=int
NotBefore: 17.9.2012 15:48
NotAfter: 17.9.2013 15:48
Subject: CN=W7DAC4.Matrix.int
Certificate Template Name (Certificate Type): Machine
Non-root Certificate
Template: Machine
Cert Hash(sha1): 80 b8 68 10 b2 ee 39 f2 4a f7 22 e6 12 63 b2 a8 84 a5 4a d9
Key Container = 03e559fb1e7c9ba25db87da4e5e9b1cf_0fc63c2c-6954-490b-80ec-c890711aba2c
Simple container name: le-Machine-ceb9325a-d563-4fba-8f09-87882caaa995
Provider = Microsoft RSA SChannel Cryptographic Provider
Private key is NOT exportable
Encryption test passed
CertUtil: -store command completed successfully.
Also CAPI2 logging is enabled and nothing happens there...
Free Windows Admin Tool Kit Click here and download it now
September 17th, 2012 2:56pm
Also,
I noticed this on the VM:
Code integrity determined that the image hash of a file is not valid. The file could be corrupt due to unauthorized modification or the invalid hash could indicate a potential disk device error.
File Name: \Device\HarddiskVolume2\Windows\System32\drivers\CVPNDRVA.sys
I am using a CISCO VPN client to grab the GPOs.
Do you think it could be related?
September 17th, 2012 3:04pm
Sounds really strange, as long as the client gets the GPO settings and has a valid machine certificate it should more or less work.
Have you doublechecked the machine certificate on the DA server also?
//Jonas
Jonas Blom | Relevo AB |
http://blog.nrpt.se
Free Windows Admin Tool Kit Click here and download it now
September 17th, 2012 3:33pm
Hi,
here are certificate outputs from the server. It is a mystery to me too, The lab was built from scratch, new install of DC, with clean GPOs, new DA server, and new client. One thing I am using the same certificate for the NLS and IPSEC. Could that be a problem?
my "Personal"
================ Certificate 0 ================
Serial Number: 1437f8f4000000000007
Issuer: CN=Matrix CA, DC=Matrix, DC=int
NotBefore: 16.9.2012 11:25
NotAfter: 16.9.2014 11:25
Subject: CN=uagda.src.si, C=SI
Certificate Template Name (Certificate Type): WebServer
Non-root Certificate
Template: WebServer, Web Server
Cert Hash(sha1): ab c7 2f 7e ab 63 3f e5 44 51 db 6a f8 3f ff 0a 25 5a 17 57
Key Container = 64d1dda8ffeb73a98600c4a11c9bc859_4ba10873-1ba4-4cb2-9b0f-479e909e1184
Provider = Microsoft RSA SChannel Cryptographic Provider
Missing stored keyset
================ Certificate 1 ================
Serial Number: 376379758c5ababc4d430f9e665d5c2e
Issuer: CN=DirectAccess-RADIUS-Encrypt-MATRIXDA.Matrix.int
NotBefore: 16.9.2012 10:03
NotAfter: 16.9.2017 12:13
Subject: CN=DirectAccess-RADIUS-Encrypt-MATRIXDA.Matrix.int
Signature matches Public Key
Root Certificate: Subject matches Issuer
Cert Hash(sha1): 88 d2 e6 ea a1 0a a4 5b b9 11 85 36 10 98 72 b7 a0 89 77 54
Key Container = 6cd8f3add549b224485be3b117db1f56_4ba10873-1ba4-4cb2-9b0f-479e909e1184
Provider = Microsoft Strong Cryptographic Provider
Missing stored keyset
================ Certificate 2 ================
Serial Number: 1437f6d2000000000006
Issuer: CN=Matrix CA, DC=Matrix, DC=int
NotBefore: 16.9.2012 11:25
NotAfter: 16.9.2013 11:25
Subject: CN=MATRIXDA.Matrix.int
Certificate Template Name (Certificate Type): Machine
Non-root Certificate
Template: Machine, Computer
Cert Hash(sha1): 5a bf 25 f6 64 38 11 f1 1f f8 a6 a3 55 86 40 d6 db 9c fa 71
Key Container = b4a3d5d0cd5bb9de28a26548a1b6a35b_4ba10873-1ba4-4cb2-9b0f-479e909e1184
Provider = Microsoft RSA SChannel Cryptographic Provider
Missing stored keyset
CertUtil: -store command completed successfully.
September 17th, 2012 3:54pm
Based on your earlier postings and the list of certificates in the last post, it looks like you have two different certificates (Cert 0 for the IPHTTPS interface and Cert 2 for the machine/ipsec connections)
I can't really see a problem with that combination/setup, but it could of course be that your server tries to use Cert 0 to establish the IPSec tunnel and then it fails since the WebServer template only has Server Authentication configured.
(But then you should really see something in the CAPI2 log on the client and/or the server)
//JonasJonas Blom | Relevo AB |
http://blog.nrpt.se
Free Windows Admin Tool Kit Click here and download it now
September 17th, 2012 4:10pm
This is one of the errors that I get from a CAPI2 output..
+ System
- Provider
[ Name] Microsoft-Windows-CAPI2
[ Guid] {5bbca4a8-b209-48dc-a8c7-b23d3e5216fb}
EventID 30
Version 0
Level 2
Task 30
Opcode 0
Keywords 0x4000000000000001
- TimeCreated
[ SystemTime] 2012-09-17T20:13:50.175168300Z
EventRecordID 6
Correlation
- Execution
[ ProcessID] 512
[ ThreadID] 1528
Channel Microsoft-Windows-CAPI2/Operational
Computer MATRIXDA.Matrix.int
- Security
[ UserID] S-1-5-20
- UserData
- CertVerifyCertificateChainPolicy
- Policy
[ type] CERT_CHAIN_POLICY_SSL
[ constant] 4
- Certificate
[ fileRef] 0598E8120FDEDA8EA3C3F9067027685DCC594C19.cer
[ subjectName] MATRIXDA.Matrix.int
- CertificateChain
[ chainRef] {DF706D8C-06D9-4514-8040-453FB55934DA}
- Flags
[ value] 0
- SSLAdditionalPolicyInfo
[ authType] server
- IgnoreFlags
[ value] 280
[ SECURITY_FLAG_IGNORE_REVOCATION] true
[ SECURITY_FLAG_IGNORE_WRONG_USAGE] true
- Status
[ chainIndex] 0
[ elementIndex] 0
- EventAuxInfo
[ ProcessName] lsass.exe
[ impersonateToken] S-1-5-20
- CorrelationAuxInfo
[ TaskId] {DACC0624-86A2-4565-9708-7FEEFFEAEE9E}
[ SeqNumber] 1
- Result A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.
[ value] 800B0109
September 17th, 2012 4:33pm
That one is from the server. The only thing that is an error I receive on the Clients is some errors with not being able to download CRLs from Microsoft, nothing wrong with mine :)
I checked on the server, I have root certificates installed in the machine store in trusted root certification authority.
Free Windows Admin Tool Kit Click here and download it now
September 17th, 2012 4:41pm
Hmm,
Read through all your posts again, to make sure I didn't miss anything.
Do a test and change the NLS url to another name that is different from the hostname of the DA server.
I honestly cannot see that it would block the IPSec tunnels from establishing since you cannot even do a DNS lookup before establishing the IPSec tunnels... but when you do a Quick Setup with the Wizard that Microsoft created it always separates the NLS from
the computername. So there might be something with that setup.
//JonasJonas Blom | Relevo AB |
http://blog.nrpt.se
September 17th, 2012 5:04pm
I tried creating a new certificate on the DA host, created a DNS A record for the host name. But the configuration did not finish as expected as the Hostname did not resolve to a DirectAccess server.
I did however move the NLS to another server. Still no success :(
Free Windows Admin Tool Kit Click here and download it now
September 17th, 2012 5:32pm
Have you tried forcing the client to connect over Teredo instead of IPHTTPS to see if you get any changes?
And perhaps dump the network traffic to try to pinpoint where in the handshake it fails?
Jonas Blom | Relevo AB |
http://blog.nrpt.se
September 18th, 2012 5:17am
I can't really fallback to Teredo because the DA server is behind a NAT. Or can I fall back to Teredo even behind NAT?
I will try to get a network capture, Do I do a network capture on the physical interface or is the Https Interface enough?
Free Windows Admin Tool Kit Click here and download it now
September 18th, 2012 5:39am
Hi,
No then you're not able to switch to Teredo.
Yes, you need to capture the traffic on the IPHTTPS interface, something that Wireshark for example will not be able to since it cannot see the interface. (Atleast last time I tried). Network Monitor will be able to though.
The fact that Teredo is not encrypted makes you able to capture the traffic on the host interface, thats why it is so nice to be able to switch back to Teredo when troubleshooting.
Jonas Blom | Relevo AB |
http://blog.nrpt.se
September 18th, 2012 6:54am
I have the capture. Can I upload it somewhere?
But what was interesting is I get a lot of notifications "First exchange with an unknown peer SPN, Iniator provide proposal TLS for negotiation."
Free Windows Admin Tool Kit Click here and download it now
September 18th, 2012 7:51am
I guess I finally entered the 21st century, my first skydrive shared file :)
https://skydrive.live.com/redir?resid=587A7695C13E5E7E!128&authkey=!AG__oKtBy96R7Qg
I posted the capture from the https interface, hope it provides some clues to you, as I can't really tell anything useful from it..
September 18th, 2012 4:42pm
The traffic capture looks really strange, you only have traffic flowing from your client to the server in the capture you uploaded.
Can you try and look at the trafficflow in your NAT firewall (and on your DA server) to see if/that incoming packets reach the DA server and that outgoing responses are sent and can pass the NAT firewall?
Jonas Blom | Relevo AB |
http://blog.nrpt.se
Free Windows Admin Tool Kit Click here and download it now
September 19th, 2012 4:43am
Hi,
This is the Server capture:
https://skydrive.live.com/redir?resid=587A7695C13E5E7E!129&authkey=!AArush6yfegdNJE
Ok, at first I got IPSEC invalided by old policy. But that didn't repeat here. I also ran the gpresult /z on the server And I got the following, which would seem that GPOs don't get applied, but the settings are all there in the connection security rules:
Microsoft (R) Windows (R) Operating System Group Policy Result tool v2.0
c 2012 Microsoft Corporation. All rights reserved.
Created on 19.9.2012 at 11:31:35
RSOP data for MATRIX\ITSG on MATRIXDA : Logging Mode
-----------------------------------------------------
OS Configuration: Member Server
OS Version: 6.2.9200
Site Name: N/A
Roaming Profile: N/A
Local Profile: C:\Users\ITSG
Connected over a slow link?: No
USER SETTINGS
--------------
CN=ITSG,CN=Users,DC=Matrix,DC=int
Last time Group Policy was applied: 19.9.2012 at 11:31:19
Group Policy was applied from: DC1.Matrix.int
Group Policy slow link threshold: 500 kbps
Domain Name: MATRIX
Domain Type: Windows 2008 or later
Applied Group Policy Objects
-----------------------------
N/A
The following GPOs were not applied because they were filtered out
-------------------------------------------------------------------
Local Group Policy
Filtering: Not Applied (Empty)
DirectAccess Server Settings
Filtering: Disabled (GPO)
DirectAccess Client Settings
Filtering: Disabled (GPO)
Default Domain Policy
Filtering: Not Applied (Empty)
The user is a part of the following security groups
---------------------------------------------------
Domain Users
Everyone
Netmon Users
BUILTIN\Users
BUILTIN\Administrators
REMOTE INTERACTIVE LOGON
NT AUTHORITY\INTERACTIVE
NT AUTHORITY\Authenticated Users
This Organization
LOCAL
Domain Admins
Group Policy Creator Owners
Schema Admins
Enterprise Admins
Denied RODC Password Replication Group
High Mandatory Level
The user has the following security privileges
----------------------------------------------
Resultant Set Of Policies for User
-----------------------------------
Software Installations
----------------------
N/A
Logon Scripts
-------------
N/A
Logoff Scripts
--------------
N/A
Public Key Policies
-------------------
N/A
Administrative Templates
------------------------
N/A
Folder Redirection
------------------
N/A
Internet Explorer Browser User Interface
----------------------------------------
N/A
Internet Explorer Connection
----------------------------
N/A
Internet Explorer URLs
----------------------
N/A
Internet Explorer Security
--------------------------
N/A
Internet Explorer Programs
--------------------------
N/A
September 19th, 2012 5:47am
First, the gpresult.
The results you see are from a usercontext, you need to run it in an elevated cmd.exe with the flag /scope:computer (ex: gpresult /r /scope:computer)
Regarding your trace, it doesnt contain any responses sent from the server to the client either, must say that you have gotten yourself a tough LAB environment :)
Some other things to do:
* Check that related services are running as they should: IP Helper, IPSec Policy Agent, IKE and AuthIP IPSec Keying Modules
* Enable logging of allowed/dropped packets in the Windows firewall to try and find traffic that shouldn't get dropped.
* Enable the logs in Eventviewer for Windows Firewall (found below Application and Services Logs\Microsoft\Windows Firewall with Advanced Settings)
Jonas Blom | Relevo AB |
http://blog.nrpt.se
Free Windows Admin Tool Kit Click here and download it now
September 19th, 2012 8:15am
Ok, glad to understand the gpresult result.
The shouldn't be tough as there was absolutely no legacy :). Everything is installed from scratch, from the servers to the client.
All services are up and running.
I will enable the logging and report back.
I do not protect the domain profile in the WIndows firewall, could that be affecting it?
Also the Isatap adapter on the server is enabled, should it be enabled?
September 19th, 2012 8:43am
Hi again,
If you don't have ISATAP implemented internally for something, then remove it and rerun the configuration so you will get a fresh setup without using the ISATAP prefix.
(It shouldn't be a problem to have ISATAP but it adds another complexity to the setup)
Jonas Blom | Relevo AB |
http://blog.nrpt.se
Free Windows Admin Tool Kit Click here and download it now
September 19th, 2012 9:18am
hey,
I enabled firewall auditing as specified here:
http://msdn.microsoft.com/en-us/library/windows/desktop/bb736284(v=vs.85).aspx
Here is the security log, I cleared before :)
http://sdrv.ms/PI6UCP
YOu can see an allowed inbound connection on port 500 udp, the next thing IPSEC main mode audit failure..
Just one question, can I have manage out without ISATAP?
September 19th, 2012 3:52pm


