Results 1 to 5 of 5

Thread: DC Kerberos Errors

  1. #1
    Zachary Dundore Guest

    DC Kerberos Errors

    I am running a Windows 2003 Server in a single domain enviroment. We

    have two main DCs in our home office and 7 remote DCs in our branch

    plants. One of our branch plant DC is triggering errors in our main DC

    Directory Service event log.





    Type: Warning

    Source: NTDS KCC

    Event ID: 1566

    All domain controllers in the following site that can replicate the
    directory partition

    over this transport are currently unavailable.


    Site:

    CN=***,CN=***,CN=***,DC=***,DC=***

    Directory partition:

    DC=***,DC=***

    Transport:

    CN=***,CN=***,CN=***,CN=***,DC=***,DC=***





    Type: Error

    Source: NTDS KCC

    Event ID: 1311

    The Knowledge Consistency Checker (KCC) has detected problems with the
    following

    directory partition.


    Directory partition:

    DC=***,DC***

    There is insufficient site connectivity information in Active Directory
    Sites and

    Services for the KCC to create a spanning tree replication topology. Or, one
    or more

    domain controllers with this directory partition are unable to replicate the
    directory

    partition information. This is probably due to inaccessible domain
    controllers.


    User Action

    Use Active Directory Sites and Services to perform one of the following
    actions:

    - Publish sufficient site connectivity information so that the KCC can
    determine a

    route by which this directory partition can reach this site. This is the
    preferred

    option.

    - Add a Connection object to a domain controller that contains the directory
    partition

    in this site from a domain controller that contains the same directory
    partition in

    another site.


    If neither of the Active Directory Sites and Services tasks correct this
    condition, see

    previous events logged by the KCC that identify the inaccessible domain
    controllers





    Type: Warning

    Source: NTDS KCC

    Event ID: 1865

    The Knowledge Consistency Checker (KCC) was unable to form a complete
    spanning tree

    network topology. As a result, the following list of sites cannot be reached
    from the

    local site.


    Sites:

    CN=***,CN=***,CN=***,DC=***,DC=***





    On top of these errors, the branch plant DC is logging this Kerberos

    error over and over in the System event log:





    Type; Error

    Source: Kerberos

    Event ID: 4

    The kerberos client received a KRB_AP_ERR_MODIFIED error from the server
    host/***. The

    target name used was ldap/***. This indicates that the password used to
    encrypt the

    kerberos service ticket is different than that on the target server.
    Commonly, this is

    due to identically named machine accounts in the target realm (***), and the
    client

    realm. Please contact your system administrator.





    And it's logging this error in the Application event log over and over:





    Type: Error

    Source: Userenv

    Event ID: 1053

    Windows cannot determine the user or computer name. (The target principal
    name is incorrect.

    ). Group Policy processing aborted.





    Some of the recent changes done to this machine that may be causing

    these issues are system board replacement, and an upgrade to the hard

    drives. I have tried reseting the machine account password using

    netdom.exe, though i am not 100% sure I am perfoming this task

    correctly. The main tasks that seem to be broke are File Replication,

    directory replication, and when logged into the branch plant DC you get

    a logon Failure error message when trying to access network shares. Any

    help on this issue would be greatly appreciated.



  2. #2
    Amir Fahmy Guest

    RE: DC Kerberos Errors

    i think you will need to reset the domain controller password in the active
    directory
    but you wont be able to do it from active directory users and groups so you
    will nedd to use netdom commands to reset the DC password


    "Zachary Dundore" wrote:

    > I am running a Windows 2003 Server in a single domain enviroment. We
    >
    > have two main DCs in our home office and 7 remote DCs in our branch
    >
    > plants. One of our branch plant DC is triggering errors in our main DC
    >
    > Directory Service event log.
    >
    >
    >
    >
    >
    > Type: Warning
    >
    > Source: NTDS KCC
    >
    > Event ID: 1566
    >
    > All domain controllers in the following site that can replicate the
    > directory partition
    >
    > over this transport are currently unavailable.
    >
    >
    > Site:
    >
    > CN=***,CN=***,CN=***,DC=***,DC=***
    >
    > Directory partition:
    >
    > DC=***,DC=***
    >
    > Transport:
    >
    > CN=***,CN=***,CN=***,CN=***,DC=***,DC=***
    >
    >
    >
    >
    >
    > Type: Error
    >
    > Source: NTDS KCC
    >
    > Event ID: 1311
    >
    > The Knowledge Consistency Checker (KCC) has detected problems with the
    > following
    >
    > directory partition.
    >
    >
    > Directory partition:
    >
    > DC=***,DC***
    >
    > There is insufficient site connectivity information in Active Directory
    > Sites and
    >
    > Services for the KCC to create a spanning tree replication topology. Or, one
    > or more
    >
    > domain controllers with this directory partition are unable to replicate the
    > directory
    >
    > partition information. This is probably due to inaccessible domain
    > controllers.
    >
    >
    > User Action
    >
    > Use Active Directory Sites and Services to perform one of the following
    > actions:
    >
    > - Publish sufficient site connectivity information so that the KCC can
    > determine a
    >
    > route by which this directory partition can reach this site. This is the
    > preferred
    >
    > option.
    >
    > - Add a Connection object to a domain controller that contains the directory
    > partition
    >
    > in this site from a domain controller that contains the same directory
    > partition in
    >
    > another site.
    >
    >
    > If neither of the Active Directory Sites and Services tasks correct this
    > condition, see
    >
    > previous events logged by the KCC that identify the inaccessible domain
    > controllers
    >
    >
    >
    >
    >
    > Type: Warning
    >
    > Source: NTDS KCC
    >
    > Event ID: 1865
    >
    > The Knowledge Consistency Checker (KCC) was unable to form a complete
    > spanning tree
    >
    > network topology. As a result, the following list of sites cannot be reached
    > from the
    >
    > local site.
    >
    >
    > Sites:
    >
    > CN=***,CN=***,CN=***,DC=***,DC=***
    >
    >
    >
    >
    >
    > On top of these errors, the branch plant DC is logging this Kerberos
    >
    > error over and over in the System event log:
    >
    >
    >
    >
    >
    > Type; Error
    >
    > Source: Kerberos
    >
    > Event ID: 4
    >
    > The kerberos client received a KRB_AP_ERR_MODIFIED error from the server
    > host/***. The
    >
    > target name used was ldap/***. This indicates that the password used to
    > encrypt the
    >
    > kerberos service ticket is different than that on the target server.
    > Commonly, this is
    >
    > due to identically named machine accounts in the target realm (***), and the
    > client
    >
    > realm. Please contact your system administrator.
    >
    >
    >
    >
    >
    > And it's logging this error in the Application event log over and over:
    >
    >
    >
    >
    >
    > Type: Error
    >
    > Source: Userenv
    >
    > Event ID: 1053
    >
    > Windows cannot determine the user or computer name. (The target principal
    > name is incorrect.
    >
    > ). Group Policy processing aborted.
    >
    >
    >
    >
    >
    > Some of the recent changes done to this machine that may be causing
    >
    > these issues are system board replacement, and an upgrade to the hard
    >
    > drives. I have tried reseting the machine account password using
    >
    > netdom.exe, though i am not 100% sure I am perfoming this task
    >
    > correctly. The main tasks that seem to be broke are File Replication,
    >
    > directory replication, and when logged into the branch plant DC you get
    >
    > a logon Failure error message when trying to access network shares. Any
    >
    > help on this issue would be greatly appreciated.
    >
    >
    >


  3. #3
    Zachary Dundore Guest

    Re: DC Kerberos Errors

    I have already tried that. I have gone through the steps found on
    Microsoft's website:
    http://support.microsoft.com/kb/325850
    Yet still no luck getting the error messages to stop.

    "Amir Fahmy" <AmirFahmy@discussions.microsoft.com> wrote in message
    news:FB6FB16D-715C-4D01-82D1-EEE98AB73F27@microsoft.com...
    >i think you will need to reset the domain controller password in the active
    > directory
    > but you wont be able to do it from active directory users and groups so
    > you
    > will nedd to use netdom commands to reset the DC password




  4. #4
    Harj Guest

    Re: DC Kerberos Errors

    On Apr 16, 11:18 am, "Zachary Dundore" <dundo...@wausuahomes.com>
    wrote:
    > I have already tried that. I have gone through the steps found on
    > Microsoft's website:http://support.microsoft.com/kb/325850
    > Yet still no luck getting the error messages to stop.
    >
    > "Amir Fahmy" <AmirFa...@discussions.microsoft.com> wrote in message
    >
    > news:FB6FB16D-715C-4D01-82D1-EEE98AB73F27@microsoft.com...
    >
    >
    >
    > >i think you will need to reset the domain controller password in the active
    > > directory
    > > but you wont be able to do it from active directory users and groups so
    > > you
    > > will nedd to use netdom commands to reset the DC password- Hide quoted text -

    >
    > - Show quoted text -


    Hi,

    >Event ID: 1566

    This is probably because you do not have your sites and subnets set up
    correctly. If you have them set up, what transport are you using? IP
    or SMTP.

    >Event ID: 1311

    Fix 1566 first

    >Event ID: 1865

    Same...fix 1566

    >Event ID: 4

    two DCs sharing the same IP address? Same name?

    I would fix the first errors and then attack the others one at a time.


    Good luck

    Harj Singh
    Power Your Active Directory
    www.specopssoft.com


  5. #5
    Zachary Dundore Guest

    Re: DC Kerberos Errors

    I am going to reopen a new post on this. I have found the issue to be that
    this particular DC hasn't replicated with another DC since January 17, 2007.
    This is well past the tombstone lifetime limit set in our system.

    "Harj" <cisqokid@gmail.com> wrote in message
    news:1176751921.062059.41580@y5g2000hsa.googlegroups.com...
    > On Apr 16, 11:18 am, "Zachary Dundore" <dundo...@wausuahomes.com>
    > wrote:
    >> I have already tried that. I have gone through the steps found on
    >> Microsoft's website:http://support.microsoft.com/kb/325850
    >> Yet still no luck getting the error messages to stop.
    >>
    >> "Amir Fahmy" <AmirFa...@discussions.microsoft.com> wrote in message
    >>
    >> news:FB6FB16D-715C-4D01-82D1-EEE98AB73F27@microsoft.com...
    >>
    >>
    >>
    >> >i think you will need to reset the domain controller password in the
    >> >active
    >> > directory
    >> > but you wont be able to do it from active directory users and groups so
    >> > you
    >> > will nedd to use netdom commands to reset the DC password- Hide quoted
    >> > text -

    >>
    >> - Show quoted text -

    >
    > Hi,
    >
    >>Event ID: 1566

    > This is probably because you do not have your sites and subnets set up
    > correctly. If you have them set up, what transport are you using? IP
    > or SMTP.
    >
    >>Event ID: 1311

    > Fix 1566 first
    >
    >>Event ID: 1865

    > Same...fix 1566
    >
    >>Event ID: 4

    > two DCs sharing the same IP address? Same name?
    >
    > I would fix the first errors and then attack the others one at a time.
    >
    >
    > Good luck
    >
    > Harj Singh
    > Power Your Active Directory
    > www.specopssoft.com
    >




Similar Threads

  1. Various Login Errors when attempting to implement Kerberos
    By DetRich in forum Active Directory
    Replies: 2
    Last Post: 18-05-2012, 12:16 AM
  2. Kerberos vs LDAP
    By Dolla in forum Active Directory
    Replies: 2
    Last Post: 29-04-2009, 10:22 PM
  3. Event ID 3 Kerberos
    By TomJerzey in forum Active Directory
    Replies: 3
    Last Post: 05-06-2008, 01:33 PM
  4. Kerberos authentication
    By Jorge Azcuy in forum Active Directory
    Replies: 8
    Last Post: 14-02-2007, 01:05 PM
  5. Event ID: 537 Kerberos
    By Evan in forum Windows Server Help
    Replies: 4
    Last Post: 22-10-2006, 09:16 AM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,713,250,255.60738 seconds with 17 queries