windows-server-2008 – 系统帐户登录每30秒失败一次

前端之家收集整理的这篇文章主要介绍了windows-server-2008 – 系统帐户登录每30秒失败一次前端之家小编觉得挺不错的,现在分享给大家,也给大家做个参考。
我们在sql故障转移群集中运行了两个 Windows 2008 R2 SP1服务器.在其中一个上,我们每隔30秒就会在安全日志中收到以下事件.空白的部分实际上是空白的.有没有人见过类似的问题,或协助追查这些事件的原因?没有其他事件日志显示我可以告诉的任何相关内容.
  1. Log Name: Security
  2. Source: Microsoft-Windows-Security-Auditing
  3. Date: 10/17/2012 10:02:04 PM
  4. Event ID: 4625
  5. Task Category: logon
  6. Level: Information
  7. Keywords: Audit Failure
  8. User: N/A
  9. Computer: SERVERNAME.domainname.local
  10. Description:
  11. An account Failed to log on.
  12.  
  13. Subject:
  14. Security ID: SYSTEM
  15. Account Name: SERVERNAME$
  16. Account Domain: DOMAINNAME
  17. logon ID: 0x3e7
  18.  
  19. logon Type: 3
  20.  
  21. Account For Which logon Failed:
  22. Security ID: NULL SID
  23. Account Name:
  24. Account Domain:
  25.  
  26. Failure Information:
  27. Failure Reason: Unknown user name or bad password.
  28. Status: 0xc000006d
  29. Sub Status: 0xc0000064
  30.  
  31. Process Information:
  32. Caller Process ID: 0x238
  33. Caller Process Name: C:\Windows\System32\lsass.exe
  34.  
  35. Network Information:
  36. Workstation Name: SERVERNAME
  37. Source Network Address: -
  38. Source Port: -
  39.  
  40. Detailed Authentication Information:
  41. logon Process: Schannel
  42. Authentication Package: Kerberos
  43. Transited Services: -
  44. Package Name (NTLM only): -
  45. Key Length: 0

在上述每个事件之后的第二个事件

  1. Log Name: Security
  2. Source: Microsoft-Windows-Security-Auditing
  3. Date: 10/17/2012 10:02:04 PM
  4. Event ID: 4625
  5. Task Category: logon
  6. Level: Information
  7. Keywords: Audit Failure
  8. User: N/A
  9. Computer: SERVERNAME.domainname.local
  10. Description:
  11. An account Failed to log on.
  12.  
  13. Subject:
  14. Security ID: NULL SID
  15. Account Name: -
  16. Account Domain: -
  17. logon ID: 0x0
  18.  
  19. logon Type: 3
  20.  
  21. Account For Which logon Failed:
  22. Security ID: NULL SID
  23. Account Name:
  24. Account Domain:
  25.  
  26. Failure Information:
  27. Failure Reason: An Error occured during logon.
  28. Status: 0xc000006d
  29. Sub Status: 0x80090325
  30.  
  31. Process Information:
  32. Caller Process ID: 0x0
  33. Caller Process Name: -
  34.  
  35. Network Information:
  36. Workstation Name: -
  37. Source Network Address: -
  38. Source Port: -
  39.  
  40. Detailed Authentication Information:
  41. logon Process: Schannel
  42. Authentication Package: Microsoft Unified Security Protocol Provider
  43. Transited Services: -
  44. Package Name (NTLM only): -
  45. Key Length: 0

编辑更新:我有更多信息要添加.我在这台机器上安装了网络监视器并为Kerberos流量做了一个过滤器,发现以下内容对应于安全审核日志中的时间戳.

Kerberos AS_Request Cname:CN = sqlInstanceName Realm:domain.local Sname krbtgt / domain.local

来自DC的答复:KRB_ERROR:KDC_ERR_C_PRINCIPAL_UNKOWN

然后,我检查了响应的DC的安全审核日志,发现以下内容

  1. A Kerberos authentication ticket (TGT) was requested.
  2.  
  3. Account Information:
  4. Account Name: X509N:<S>CN=sqlInstanceName
  5. Supplied Realm Name: domain.local
  6. User ID: NULL SID
  7.  
  8. Service Information:
  9. Service Name: krbtgt/domain.local
  10. Service ID: NULL SID
  11.  
  12. Network Information:
  13. Client Address: ::ffff:10.240.42.101
  14. Client Port: 58207
  15.  
  16. Additional Information:
  17. Ticket Options: 0x40810010
  18. Result Code: 0x6
  19. Ticket Encryption Type: 0xffffffff
  20. Pre-Authentication Type: -
  21.  
  22. Certificate Information:
  23. Certificate Issuer Name:
  24. Certificate Serial Number:
  25. Certificate Thumbprint:

所以似乎与安装在sql机器上的证书有关,仍然没有任何线索为什么或所述证书有什么问题.它没有过期等.

我使用Microsoft网络监视器来查找导致此问题的流量,并在此sql服务器和我们的AD2服务器之间找到流量. sql服务器正在为sql实例名称的计算机帐户发送Kerberos AS_REQ. AD服务器将以KDC_ERR_C_PRINCIPAL_UNKNOWN响应.我查看了AD2服务器上的安全日志,发现了如下的失败审核:
  1. A Kerberos authentication ticket (TGT) was requested.
  2.  
  3. Account Information:
  4. Account Name: X509N:<S>CN=sqlInstanceName
  5. Supplied Realm Name: domain.local
  6. User ID: NULL SID
  7.  
  8. Service Information:
  9. Service Name: krbtgt/domain.local
  10. Service ID: NULL SID

这似乎是一些证书请求.然后,我使用了SysInternals Process Monitor,发现来自具有相同时间戳的自定义服务的流量.它正在查询所有证书商店而没有找到任何东西.

禁用此服务将停止安全事件.

猜你在找的Windows相关文章