Hi Andreas, In order to best troubleshoot this issue, it does appear that a TT Trace will be the best option. I've created the following steps to gather an lsass trace from our modern OS versions. Please gather a simultaneous network trace, if possible, as well. I have added the text-based instructions below for collecting the TT Trace and attached a formatted version as a docx to the email. These instructions are rather new, so please let me know if you encounter any difficulties.
Lsass Tracing on Windows 11 and Server 2025
1. Download and run the TTD.appinstaller from our website using the
following link. Note: An End-User License Agreement (EULA) will appear in a
command window that you will need to approve.
a. Link: https://aka.ms/ttd/download
2. We need to run lsass.exe as a non-protected process and disable Shadow
Stacks so that we can run the trace. Run the following commands in an
administrator-elevated PowerShell instance, then restart the machine. Warning:
This should not be done on a machine exposed to the Internet.
a. Set-ItemProperty -Path
"HKLM:\SYSTEM\CurrentControlSet\Control\Lsa" -Name "RunAsPPL" -Value 0
b. reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session
Manager\Kernel" /v "UserShadowStacksForceDisabled" /t REG_DWORD /d 1 /f
3. When ready to repro the issue, run the following commands to create a
destination folder and begin the trace. Run the following commands in an
elevated PowerShell instance.
a. mkdir C:\Traces_$(Get-Date -format "dd-MMM-yyyy")
b. TTD -Attach ([int](Get-Process -NAME lsass | Format-Wide
-Property ID).formatEntryInfo.formatPropertyField.propertyValue) -out
C:\Traces_$(Get-Date -format "dd-MMM-yyyy")\lsass.run
c. When the following small window pops up, the trace has begun
and you can now reproduce the issue. To end the trace, simply click "Tracing
Off".
i. <image_found_in_attachment>
4. Once the trace operation is complete, we need to compress the .run file
created by TTD for easy transfer. Run the following command in an elevated
PowerShell instance.
a. Compress-Archive -Path C:\Traces_$(Get-Date -format
"dd-MMM-yyyy")\ -DestinationPath C:\Traces_$(Get-Date -format "dd-MMM-yyyy").zip
5. Now we must undo the security changes made prior to taking the trace.
Run the following commands in an elevated PowerShell instance, then restart the
machine. After reboot, you are safe to reconnect the computer to the Internet.
a. Set-ItemProperty -Path
"HKLM:\SYSTEM\CurrentControlSet\Control\Lsa" -Name "RunAsPPL" -Value 1
b. reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session
Manager\Kernel" /v "UserShadowStacksForceDisabled" /t REG_DWORD /d 0 /f
6. Upload C:\Traces_dd-MMM-yyyy.zip to the secure file share link below
a. Link:
https://support.microsoft.com/files?workspace=eyJhbGciOiJSUzI1NiIsImtpZCI6IjUwNjQwRTE0NEREODg5MzE5NzYzRTBFNjM5RjMzNjdFQUNDNzlBRDAiLCJ0eXAiOiJKV1QifQ.eyJ3c2lkIjoiZDlhZDdlZjYtNTQ2MS00ZTg0LWE0YzAtNzdhNzQ1N2Y0NDg0Iiwic3IiOiIyNTA3MDEwMDQwMDA2OTY0Iiwic3YiOiJ2MSIsInJzIjoiRXh0ZXJuYWwiLCJ3dGlkIjoiMzhkNzY3ZTMtZmRkYy00NGQwLThjMjQtOWRhNjE0OWMyMTBkIiwiYXBwaWQiOiI0ZTc2ODkxZC04NDUwLTRlNWUtYmUzOC1lYTNiZDZlZjIxZTUiLCJuYmYiOjE3NTE5MjAyNjMsImV4cCI6MTc1OTY5NjI2MywiaWF0IjoxNzUxOTIwMjYzLCJpc3MiOiJodHRwczovL2FwaS5kdG1uZWJ1bGEubWljcm9zb2Z0LmNvbSIsImF1ZCI6Imh0dHA6Ly9zbWMifQ.IrYHu5Pz3IJW7_XS47LnPyXFyccmZi-7EMM32lg-k2IhxyGnGWWRiQ36aRI5f9XEiTzYtqO_oTgexVKcAOVUFXxdOodrPXytAd4eJnK3y13GvXBY2Y5Z6odJHySMNaK4h5BWLMEB43UYJLMmF9R0Gwtmb0yY99BpXzrhi88VW8YE21FGoWPrCHrn5Hce_2QZRHJxcvc6j2AK6vCRY84upqmwOUvP8GsSO6swyMEoEp4gWZ5NttuUX77KW9Vx7zQfA1FZ_fmaEy30qYw-JSvbckb0os3ZSemU9BPsL5n7h2oQeGkjpHzWOnE5TTlnFCqxsK2CyUxrbs0BhHsJkB4FAA&wid=d9ad7ef6-5461-4e84-a4c0-77a7457f4484
Thanks for your help!
Regards,
Kristian Smith
Support Escalation Engineer | Microsoft(r) Corporation
Email: [email protected]
-----Original Message-----
From: Kristian Smith
Sent: Tuesday, July 1, 2025 8:45 AM
To: Andreas Schneider <[email protected]>
Cc: cifs-protocol <[email protected]>; Microsoft Support
<[email protected]>
Subject: RE: [EXTERNAL] Certificate Auto Enrollment (CEP/CES) and Windows 2025
- TrackingID#2507010040006964
[DocHelp to Bcc]
Hi Andreas,
Thanks for reaching out with your Certificate Auto-enrollment question. I've
created case 2507010040006964 to track the issue. I will research this and be
in touch soon.
Regards,
Kristian Smith
Support Escalation Engineer | Microsoft(r) Corporation
Email: [email protected]
-----Original Message-----
From: Andreas Schneider <[email protected]>
Sent: Tuesday, July 1, 2025 12:38 AM
To: Interoperability Documentation Help <[email protected]>; cifs-protocol
<[email protected]>
Subject: [EXTERNAL] Certificate Auto Enrollment (CEP/CES) and Windows 2025
Hi Dochelp,
I'm trying to get CEP/CES (Certificate Auto Enrollment) with Samba working
against Windows 2025. This was working fine against earlier versions of Windows
but I can't get Kerberos authentication working against CEP/CES configured on
Windows Server 2025.
I've followed the How-to guides at
https://learn.microsoft.com/en-us/windows-server/identity/ad-cs/
to setup the Certificate services. I distilled out a set of reproducible steps
using Powershell commands. I set up an AD DC and a domain member for the
Certification Authority and its services.
You can find them here:
https://hackmd.io/@asn/SkHk8rXBz
If I try to get the certificate templates on Linux using our cepces client
implementation. I'm always getting:
requests.exceptions.HTTPError: 401 Client Error: Unauthorized for url:
https://win-ca01.mars.milkyway.site/ADPolicyProvider_CEP_Kerberos/service.svc/
CEP
Looking at the ticket cache, we have the correct ticket:
Default principal: [email protected]
Valid starting Expires Service principal
07/01/25 09:12:23 07/01/25 19:12:23 krbtgt/
[email protected]
renew until 07/08/25 09:12:23
07/01/25 09:12:23 07/01/25 19:12:23 HTTP/win-ca01.mars.milkyway.site@
renew until 07/08/25 09:12:23
Ticket server: HTTP/[email protected]
But it looks like the the IIS server doesn't accept the Kerberos ticket, the
IIS logs show:
#Software: Microsoft Internet Information Services 10.0
#Version: 1.0
#Date: 2025-07-01 07:11:16
#Fields: date time s-ip cs-method cs-uri-stem cs-uri-query s-port cs-username
c-ip cs(User-Agent) cs(Referer) sc-status sc-substatus sc-win32-status time-
taken
2025-07-01 07:11:16 192.168.56.193 POST /ADPolicyProvider_CEP_Kerberos/
service.svc/CEP - 443 - 192.168.56.247 python-requests/2.32.3 - 401 2 5 243
2025-07-01 07:12:23 192.168.56.193 POST /ADPolicyProvider_CEP_Kerberos/
service.svc/CEP - 443 - 192.168.56.247 python-requests/2.32.3 - 401 2 5 2
2025-07-01 07:12:23 192.168.56.193 POST /ADPolicyProvider_CEP_Kerberos/
service.svc/CEP - 443 - 192.168.56.247 python-requests/2.32.3 - 401 1
2148074310 14
2025-07-01 07:12:23 192.168.56.193 POST /ADPolicyProvider_CEP_Kerberos/
service.svc/CEP - 443 - 192.168.56.247 python-requests/2.32.3 - 401 1
2148074310 0
2025-07-01 07:16:18 192.168.56.193 POST /ADPolicyProvider_CEP_Kerberos/
service.svc/CEP - 443 - 192.168.56.247 python-requests/2.32.3 - 401 2 5 0
2025-07-01 07:17:42 192.168.56.193 POST /ADPolicyProvider_CEP_Kerberos/
service.svc/CEP - 443 - 192.168.56.247 python-requests/2.32.3 - 401 2 5 0
I'm not able to figure out why the IIS server doesn't allow to authenticate
with the ticket. I didn't find anything that I could enable advanced logging
here to figure out why it doesn't want to accept the ticket.
Could you help trying to find out what the issue is?
I can create a TTrace if that helps!
Thank you very much.
Best regards
Andreas
--
Andreas Schneider [email protected]
Samba Team http://www.samba.org/
GPG-ID: 8DFF53E18F2ABC8D8F3C92237EE0FC4DCC014E3D
lsass_TTD_Win11Server25 - 2507010040006964.docx
Description: lsass_TTD_Win11Server25 - 2507010040006964.docx
_______________________________________________ cifs-protocol mailing list [email protected] https://lists.samba.org/mailman/listinfo/cifs-protocol
