A
Ace Fekay [MVP]
In
Great points Roger. Glad to have another set of eyes on this. Maybe, just
maybe, if what you're surmising that something is looking for an LDAP
server, possibly a GC, and the records are incorrect, maybe suggest to
delete the SRVs, the netlogon.dns and dnb's and register everything?
Funny, I would also think, if there is a mis-registration, that it would
also show up as an NTDS or some other AD error in the Event logs, but I
think the poster said there were no other errors?
Also, that extra DNS IP that showed up in one of the ipconfigs (which Kevin
caught), shows there maybe some sort of other misconfig going on.
Do you think a dcdiag /v would catch this?
Curious, relay-denied, can you run that and post the results please?
Also curious, from what Roger is saying, are there any other LDAP or AD
aware apps that you have running (anything at all, maybe even stuff that the
dev guys are experimenting with or have running on the SQL or the other
servers)?
--
Regards,
Ace
Please direct all replies to the newsgroup so all can benefit.
This posting is provided "AS IS" with no warranties.
Ace Fekay, MCSE 2000, MCSE+I, MCSA, MCT, MVP
Microsoft Windows MVP - Active Directory
Roger Abell said:Well, what I meant by AD-leveraging is any third-party or
home-grown app that uses AD-awareness. This is either
happening due to MS software, or something that wants
to locate an ldap server and knows how to go about it.
For example, any code that tries to use an ldap moniker
in an ASs or Adsi binding action, etc..
For example, the following docs a new flag added at SP1
to avoid the problem when a servername is given to an
ldap bind action. However, it is up to the developer to
use the flag, and also if you read closely, to make sure
that they no longer use GetObject, replacing those with
OpenObject.
http://support.microsoft.com/default.aspx?scid=kb;en-us;258507&Product=win2000
The records you just quoted show it (on 10.10.20.86 )
trying to find an Ldap service in its site, and then to find
one for the forestroot domain.
The problem is simply that it (whatever it is) thinks that
the forestroot domain is DC3 instead of the correct value.
The records in your original post showed the same thing
happening, except it exampled it cycling through about
8 or 9 names in place of the DC3.
The records you posted in reply to Ace elsewhere in this
thread show it doing this, following a pattern of normal
DNS suffix appending, hence first
<host>.anydomain.com is tried, then simply <host>
Now, in initial post, the salt-and-peppered about
examples, where it used for the domain such as
(3)dc1(9)adexpedia(3)com(0)
are 1) most bizzard, 2) in this example from the same
machine (10.10.20.86 ) as the DC3 records exampled
in this post, and 3) perhap a very big clue as to what is
originating this (why adexpedia.com - others like this,
or always this?).
When you look at the (non-salt-and-peppered) queries
is there any correspondance between sender's IP and
hostname ??
Ex.
here we have
10.10.20.86 DC3
or in initial post
10.10.20.97 PV3
10.10.21.41 LSSE2
192.168.1.161 P2
10.10.20.59 SQL2
10.10.21.36 LPUB1
10.10.21.30 DEVADMIN
10.10.20.45 NS2
10.10.20.83 SSE1
10.10.20.95 SSE3
We are not that lucky are we, as to have this hostname
of the sender being used in place as its domain ?
Is there any rhyme or reason why the machine indicated
by IP would be trying to ldap bind to the host they try?
From their hostnames I would guess they are not all DCs.
Following up on your stating that you have raked the
KBs over, we then need to be creative in absence of
info from relevant articles. Is there any ability to watch
(sysmon trace) a machine to profile CPU time by process
over a time period during it might be possible to timestamp
correlate with its sending to Tcp to port 53 at your DNS
server IP ? (Probably impossible to do if a given machine
just does the 4 or so malformed queries in a short time and
then does not do it again for a lengthy time).
I am just trying to get at what it is that is doing this.
Great points Roger. Glad to have another set of eyes on this. Maybe, just
maybe, if what you're surmising that something is looking for an LDAP
server, possibly a GC, and the records are incorrect, maybe suggest to
delete the SRVs, the netlogon.dns and dnb's and register everything?
Funny, I would also think, if there is a mis-registration, that it would
also show up as an NTDS or some other AD error in the Event logs, but I
think the poster said there were no other errors?
Also, that extra DNS IP that showed up in one of the ipconfigs (which Kevin
caught), shows there maybe some sort of other misconfig going on.
Do you think a dcdiag /v would catch this?
Curious, relay-denied, can you run that and post the results please?
Also curious, from what Roger is saying, are there any other LDAP or AD
aware apps that you have running (anything at all, maybe even stuff that the
dev guys are experimenting with or have running on the SQL or the other
servers)?
--
Regards,
Ace
Please direct all replies to the newsgroup so all can benefit.
This posting is provided "AS IS" with no warranties.
Ace Fekay, MCSE 2000, MCSE+I, MCSA, MCT, MVP
Microsoft Windows MVP - Active Directory