Server 2003: problem with NT AUTHORITY\NetworkService account
Hi! On a MS Windows Server 2003 Standard with SP2 the following odd problem started to occur some time ago: all services which run as the "NT AUTHORITY\NetworkService" account cannot start. After the Windows is restarted everything works file for a day or two and then the problem shows up again. The server is a domain controller but does not have any of FSMO roles. Another domain controller in the domain does not have this problem. There are various errors and warnings logged in the Event Log regarding the issue, for example: Event Type: Warning Event Source: LSASRV Event Category: SPNEGO (Negotiator) Event ID: 40960 Date: 19.03.2012 Time: 03:07:45 User: N/A Description: The Security System detected an authentication error for the server DNS/foo.bar.local. The failure code from authentication protocol Kerberos was "A specified logon session does not exist. It may already have been terminated. (0xc000005f)". An attempt to restart the DNS Client results in the following: Event Type: Error Event Source: Service Control Manager Event Category: None Event ID: 7038 Date: 20.03.2012 Time: 17:38:29 User: N/A Description: The Dnscache service was unable to log on as NT AUTHORITY\NetworkService with the currently configured password due to the following error: Cannot start a new logon session with an ID that is already in use. Event Type: Error Event Source: Service Control Manager Event Category: None Event ID: 7000 Date: 20.03.2012 Time: 17:38:29 User: N/A Description: The DNS Client service failed to start due to the following error: The service did not start due to a logon failure. It seems as if there is a problem with the NetworkService account. Group Policy should be fine as in the Default Domain Policy, as well as Default Domain Controllers Policy, in the branch of Windows Settings/Security Settings/Local Policies/User Rights Assignment the "Log on as a service" policy includes the "NT AUTHORITY\NETWORK SERVICE" account. Is there a possibility that the NetworkService account gets locked? Has anyone seen this issue before? I'd really need to fix it as the server is in production (e.g. it runs WSUS 3.0 SP2). TIA -- rpr.
March 20th, 2012 2:16pm

I remember the recommendation that no service on a Domain Controller should run with a local account. The main problem is that there is no local SAM account database on a DC, but I think the built in "network service" is also a security concern. It is essentially the computer object and has more permissions than necessary. The recommendation I recall (for SQL Server) was that you should configure a domain user account to run the service. The account should have only the permissions necessary for the service. The only documentation I could quickly find: http://msdn.microsoft.com/en-us/library/ms143504.aspx Was your dc recently promoted, and perhaps the problem started after that? Since the network service account is essentially the local system, maybe forcing a password change would help. One recommendation I remember for sure; Never run dcpromo (either to promote to a dc or to demote to a member server) on a computer with SQL Server installed. Richard Mueller - MVP Directory Services
Free Windows Admin Tool Kit Click here and download it now
March 20th, 2012 4:32pm

Richard, the server was promoted to a DC long time ago (more than 5 years). The recommendations you mentioned seem reasonable BUT I wonder why Microsoft developers do not follow them. The server runs the following Microsoft services with the "NT AUTHORITY\NetworkService" account: aspnet_state (ASP.NET State Service) Dhcp (DHCP Client) MSDTC (Distributed Transaction Coordinator) Dnscache (DNS Client) LicenseService (License Logging) RpcSs (Remote Procedure Call (RPC)) MSSQLServerADHelper (SQL Server Active Directory Helper) WsusService (Update Services) MSSQL$MICROSOFT##SSEE (Windows Internal Database (MICROSOFT##SSEE)) WinRM (Windows Remote Management (WS-Management)) I'm sure the server was a DC when WSUS was installed. If Microsoft followed their own recommendations, then the services installed for WSUS 3.0 (WsusService, aspnet_state, MSSQL$MICROSOFT##SSEE, MSSQLServerADHelper) would not run as "NT AUTHORITY\NetworkService" account but as another domain user created by the installation. -- rpr.
March 21st, 2012 8:21am

After additional troubleshooting this issue I'd say I've found the root cause of the problem. The hardware clock frequency on this server (which is a DC) has an error and the clock drifts quite a lot. The Windows Time service cannot take the clock drift into account (it can only correct system time by discontinuous changes). So, the system time is corrected by a scheduled task that runs every 4 minutes and synchronizes the clock with another DC. It seems that despite of the synchronization the system time of the server occasionally differs too much and exceeds the maximum tolerance for computer clock synchronization of the Kerberos protocol. In the Default Domain Policy GPO I changed the following setting: Computer Configuration -> Windows Settings -> Security Settings -> Account Policies -> Kerberos Policy -> Maximum tolerance for computer clock synchronization -> increased from 5 to 7 minutes After that change the services which run as the "NT AUTHORITY\NetworkService" account on the server have not experienced the problems mentioned in my initial post for last 3 weeks. I'd say the issue has been fixed. -- rpr.
Free Windows Admin Tool Kit Click here and download it now
May 10th, 2012 9:27am

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics