RE: Lose access to local domain servers when connected w/VPN to remote / different Windows domain

2008-12-17 Thread Carl Houseman
Thanks Bob, hadn't run into that widget before.

 

Now can I automatically run it from a post-VPN-connection script without
going through all the CMAK nonsense?

 

From: Free, Bob [mailto:r...@pge.com] 
Sent: Tuesday, December 16, 2008 3:50 PM
To: NT System Admin Issues
Subject: RE: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain

 

 Anybody know of a way to script the removal of something from the saved
passwords list?

 

I haven't followed this whole thread but the answer to that particular
question, cmdkey may be your friend here.  It has a switch for deleting RAS
credentials that I've seen mentioned being used for situations similar to
yours.

 

From: Carl Houseman [mailto:c.house...@gmail.com] 
Sent: Monday, December 15, 2008 9:28 AM
To: NT System Admin Issues
Subject: RE: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain

 

I'm starting to connect the dots here, I think.

 

I noticed when I 'control userpasswords2' and click Advanced and Manage
Passwords, while the VPN is connected, at the top of the saved passwords
list is ...

 

   Dialup Session

 

If I disconnect the VPN, Dialup Session disappears from this list.

 

If I delete Dialup Session from the saved passwords list, the problem goes
away (the VPN is still connected).

 

Anybody know of a way to script the removal of something from the saved
passwords list?

 

Meanwhile, I haven't had a failure when drives are mapped to FQDNs.  I'm
still thinking that somewhere, Vista is bypassing the hosts file entry I
made for my TLD and still uses DNS to resolve it (a security measure, hosts
file not trustworthy, etc.).   And then it thinks that the credentials for
the connection that resolved the DNS should be used to re-authenticate.

 

On that basis, I could script a change to the adapter order.

 

Or just use the FQDN's for drive mapping I supposed.

 

I don't like any of these solutions that much.   The FQDN's are the least
effort, but have a side effect - e.g. \\server file:///\\server  is
trusted to execute a .vbs script without prompting, but
\\servername.mydomain.com file:///\\servername.mydomain.com  always
prompts.   Even when servername.mydomain.com is added to Intranet or Trusted
zones, it still prompts.

 

Carl

 

 

From: Carl Houseman [mailto:c.house...@gmail.com] 
Sent: Saturday, December 13, 2008 12:24 PM
To: NT System Admin Issues
Subject: RE: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain

 

Here's a new way I can see this problem... I don't know if this would have
happened before the reboot, but I rebooted the DC in my local environment
(it's the only DC).

 

Following that, from the Vista machine I wanted to run something on the
DC I typed

 

psexec \\server file:///\\server  command

 

Response:

Couldn't access server:

Logon failure: unknown user name or bad password.

 

Login failures on server showed the attempted use of the VPN credentials -
by psexec (no other explanation for those events).

 

Meanwhile, psexec \\server.mydomain.com file:///\\server.mydomain.com
worked just fine.

 

Still no problem pinging \\server file:///\\server , keeping in mind, my
local AD TLD is in the DNS suffix search list.  And still no problem with
the drives mapped to FQDN's on the DC that rebooted.

 

So it's a NETBIOS thing, maybe, except that I've seen drives that were
mapped to \\ip.ad.dr.ess stop working with the same wrong-credentials login
failure.

 

Carl

 

From: Carl Houseman [mailto:c.house...@gmail.com] 
Sent: Wednesday, December 10, 2008 2:28 PM
To: NT System Admin Issues
Subject: Lose access to local domain servers when connected w/VPN to remote
/ different Windows domain

 

This problem has bothered me a long time, and happens daily.  It's so
bothersome, I'll send some Dale  Thomas popcorn to the first person who can
come up with a solution or a tip that quickly (without many hours of effort
on my part) leads to a solution.  Advice such as call Microsoft does not
qualify for the popcorn!

 

Past history:  The problem was seen for Windows XP but seems to be worse
under Vista.  In fact I wrote about it in reference to XP to this list a
year or two ago without any resolution.  Certainly what I'm doing here can't
be that unique, aside from relying on Microsoft-based VPN solutions...
(kindly withhold comments on the worthiness of those solutions).

 

Goes like this:

 

In my local office, there are two 2003 servers - member and domain
controller.  My everyday Vista SP1 is joined to that domain.  I have drives
mapped to both servers.

 

I use an L2TP/IPSEC VPN connection to connect to a client's network.   The
client's VPN gateway is ISA 2006, joined to the client's Windows domain, but
I authenticate for the purpose of the VPN connection using a local username
on the ISA server.  We'll call the ISA server ISAVPN in further
discussion.

 

What happens:  Sooner

RE: Lose access to local domain servers when connected w/VPN to remote / different Windows domain

2008-12-17 Thread Free, Bob
It's just a console command in 2K3  above so it should be easy to do.
C:\Windows\System32\CMDKEY /delete /ras

 

Easy for me to say cuz I'm not doing it J

 

Also came across a post from MS that said to use UseRasCredentials=0 in
the .pbk file that contains the entry that you dial.

 

From: Carl Houseman [mailto:c.house...@gmail.com] 
Sent: Wednesday, December 17, 2008 10:53 AM
To: NT System Admin Issues
Subject: RE: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain

 

Thanks Bob, hadn't run into that widget before.

 

Now can I automatically run it from a post-VPN-connection script without
going through all the CMAK nonsense?

 

From: Free, Bob [mailto:r...@pge.com] 
Sent: Tuesday, December 16, 2008 3:50 PM
To: NT System Admin Issues
Subject: RE: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain

 

 Anybody know of a way to script the removal of something from the
saved passwords list?

 

I haven't followed this whole thread but the answer to that particular
question, cmdkey may be your friend here.  It has a switch for deleting
RAS credentials that I've seen mentioned being used for situations
similar to yours.

 

From: Carl Houseman [mailto:c.house...@gmail.com] 
Sent: Monday, December 15, 2008 9:28 AM
To: NT System Admin Issues
Subject: RE: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain

 

I'm starting to connect the dots here, I think.

 

I noticed when I 'control userpasswords2' and click Advanced and Manage
Passwords, while the VPN is connected, at the top of the saved passwords
list is ...

 

   Dialup Session

 

If I disconnect the VPN, Dialup Session disappears from this list.

 

If I delete Dialup Session from the saved passwords list, the problem
goes away (the VPN is still connected).

 

Anybody know of a way to script the removal of something from the saved
passwords list?

 

Meanwhile, I haven't had a failure when drives are mapped to FQDNs.  I'm
still thinking that somewhere, Vista is bypassing the hosts file entry I
made for my TLD and still uses DNS to resolve it (a security measure,
hosts file not trustworthy, etc.).   And then it thinks that the
credentials for the connection that resolved the DNS should be used to
re-authenticate.

 

On that basis, I could script a change to the adapter order.

 

Or just use the FQDN's for drive mapping I supposed.

 

I don't like any of these solutions that much.   The FQDN's are the
least effort, but have a side effect - e.g. \\server file:///\\server
is trusted to execute a .vbs script without prompting, but
\\servername.mydomain.com file:///\\servername.mydomain.com  always
prompts.   Even when servername.mydomain.com is added to Intranet or
Trusted zones, it still prompts.

 

Carl

 

 

From: Carl Houseman [mailto:c.house...@gmail.com] 
Sent: Saturday, December 13, 2008 12:24 PM
To: NT System Admin Issues
Subject: RE: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain

 

Here's a new way I can see this problem... I don't know if this would
have happened before the reboot, but I rebooted the DC in my local
environment (it's the only DC).

 

Following that, from the Vista machine I wanted to run something on the
DC I typed

 

psexec \\server file:///\\server  command

 

Response:

Couldn't access server:

Logon failure: unknown user name or bad password.

 

Login failures on server showed the attempted use of the VPN credentials
- by psexec (no other explanation for those events).

 

Meanwhile, psexec \\server.mydomain.com file:///\\server.mydomain.com
worked just fine.

 

Still no problem pinging \\server file:///\\server , keeping in mind,
my local AD TLD is in the DNS suffix search list.  And still no problem
with the drives mapped to FQDN's on the DC that rebooted.

 

So it's a NETBIOS thing, maybe, except that I've seen drives that were
mapped to \\ip.ad.dr.ess stop working with the same wrong-credentials
login failure.

 

Carl

 

From: Carl Houseman [mailto:c.house...@gmail.com] 
Sent: Wednesday, December 10, 2008 2:28 PM
To: NT System Admin Issues
Subject: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain

 

This problem has bothered me a long time, and happens daily.  It's so
bothersome, I'll send some Dale  Thomas popcorn to the first person who
can come up with a solution or a tip that quickly (without many hours of
effort on my part) leads to a solution.  Advice such as call Microsoft
does not qualify for the popcorn!

 

Past history:  The problem was seen for Windows XP but seems to be worse
under Vista.  In fact I wrote about it in reference to XP to this list a
year or two ago without any resolution.  Certainly what I'm doing here
can't be that unique, aside from relying on Microsoft-based VPN
solutions... (kindly withhold comments on the worthiness of those
solutions).

 

Goes

RE: Lose access to local domain servers when connected w/VPN to remote / different Windows domain

2008-12-15 Thread Carl Houseman
I'm starting to connect the dots here, I think.

 

I noticed when I 'control userpasswords2' and click Advanced and Manage
Passwords, while the VPN is connected, at the top of the saved passwords
list is ...

 

   Dialup Session

 

If I disconnect the VPN, Dialup Session disappears from this list.

 

If I delete Dialup Session from the saved passwords list, the problem goes
away (the VPN is still connected).

 

Anybody know of a way to script the removal of something from the saved
passwords list?

 

Meanwhile, I haven't had a failure when drives are mapped to FQDNs.  I'm
still thinking that somewhere, Vista is bypassing the hosts file entry I
made for my TLD and still uses DNS to resolve it (a security measure, hosts
file not trustworthy, etc.).   And then it thinks that the credentials for
the connection that resolved the DNS should be used to re-authenticate.

 

On that basis, I could script a change to the adapter order.

 

Or just use the FQDN's for drive mapping I supposed.

 

I don't like any of these solutions that much.   The FQDN's are the least
effort, but have a side effect - e.g. \\server file:///\\server  is
trusted to execute a .vbs script without prompting, but
\\servername.mydomain.com file:///\\servername.mydomain.com  always
prompts.   Even when servername.mydomain.com is added to Intranet or Trusted
zones, it still prompts.

 

Carl

 

 

From: Carl Houseman [mailto:c.house...@gmail.com] 
Sent: Saturday, December 13, 2008 12:24 PM
To: NT System Admin Issues
Subject: RE: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain

 

Here's a new way I can see this problem... I don't know if this would have
happened before the reboot, but I rebooted the DC in my local environment
(it's the only DC).

 

Following that, from the Vista machine I wanted to run something on the
DC I typed

 

psexec \\server file:///\\server  command

 

Response:

Couldn't access server:

Logon failure: unknown user name or bad password.

 

Login failures on server showed the attempted use of the VPN credentials -
by psexec (no other explanation for those events).

 

Meanwhile, psexec \\server.mydomain.com file:///\\server.mydomain.com
worked just fine.

 

Still no problem pinging \\server file:///\\server , keeping in mind, my
local AD TLD is in the DNS suffix search list.  And still no problem with
the drives mapped to FQDN's on the DC that rebooted.

 

So it's a NETBIOS thing, maybe, except that I've seen drives that were
mapped to \\ip.ad.dr.ess stop working with the same wrong-credentials login
failure.

 

Carl

 

From: Carl Houseman [mailto:c.house...@gmail.com] 
Sent: Wednesday, December 10, 2008 2:28 PM
To: NT System Admin Issues
Subject: Lose access to local domain servers when connected w/VPN to remote
/ different Windows domain

 

This problem has bothered me a long time, and happens daily.  It's so
bothersome, I'll send some Dale  Thomas popcorn to the first person who can
come up with a solution or a tip that quickly (without many hours of effort
on my part) leads to a solution.  Advice such as call Microsoft does not
qualify for the popcorn!

 

Past history:  The problem was seen for Windows XP but seems to be worse
under Vista.  In fact I wrote about it in reference to XP to this list a
year or two ago without any resolution.  Certainly what I'm doing here can't
be that unique, aside from relying on Microsoft-based VPN solutions...
(kindly withhold comments on the worthiness of those solutions).

 

Goes like this:

 

In my local office, there are two 2003 servers - member and domain
controller.  My everyday Vista SP1 is joined to that domain.  I have drives
mapped to both servers.

 

I use an L2TP/IPSEC VPN connection to connect to a client's network.   The
client's VPN gateway is ISA 2006, joined to the client's Windows domain, but
I authenticate for the purpose of the VPN connection using a local username
on the ISA server.  We'll call the ISA server ISAVPN in further
discussion.

 

What happens:  Sooner or later I will be unable to access the drives mapped
to my local domain's servers (UNC references to those servers also fail).
The error returned when just trying to do anything at the CMD prompt
defaulted to a mapped drive on either server is:

 

Logon failure: unknown user name or bad password.

 

Once I disconnect from ISAVPN, at the very same CMD prompt, I again and
immediately have access to files on my local servers.

 

This seems to affect access to the member server a short time after
connecting to ISAVPN.  Access to files on the domain controller usually
keeps working much longer, but eventually I lose it as well.  This behavior
has guaranteed repeatability 100% of the time.

 

I should note that the domain controller's mapped drive is available
offline but Vista does not switch to offline because of this problem. 

 

Looking in the security event log of the server, I see events 529 and 680
(source Security

RE: Lose access to local domain servers when connected w/VPN to remote / different Windows domain

2008-12-13 Thread Carl Houseman
No wins server in the local environment.

 

Regarding Kerb lifetime of the remote, there are two remotes in play

 

1. The remote domain.  But the remote domain is not authenticating my VPN
session with the remote network.

2. The remote ISA server that is authenticating my VPN session.

 

The problem is that VPN session credentials are being applied to my local
servers.  So from which platform exactly would you want to see klist
information?  The ISA server, the remote domain DC, or my local Vista?  I've
not installed Win2003 RK tools on my local Vista machine.

 

I will say this, everything involving Kerberos is operating at
Microsoft-installed defaults.  I would not play with such things, and yes, I
know the remote well enough to say they did not play with such things.

 

The title of KB 180362 is services and redirected drives.  It seems to
care more about redirected drives and drive letters, but my problem is not
specific to drive letter mappings - if a drive mapped to \\server\share
file:///\\server\share  is failing, a UNC reference to \\server\share
file:///\\server\share  is also failing.

 

Meanwhile, I've been actively working with the VPN connected for the last 3
hours and haven't lost any drives mapped to FQDN's   I know that any result
of less than 24 hours experience is inconclusive, so I'm going to wait until
at least Monday p.m. to declare success or failure.

 

Carl

 

From: Michael B. Smith [mailto:mich...@theessentialexchange.com] 
Sent: Friday, December 12, 2008 3:06 PM
To: NT System Admin Issues
Subject: RE: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain

 

What does your wins look like?

 

What's the Kerb lifetime of the remote and are they defaulting to UDP or TCP
and what do your tickets look like? (kerbtray and klist are your friends)

 

The title of this KB says services, and it's old (but still valid), but
it's about any time you are changing security contexts:

 

http://support.microsoft.com/kb/180362

 

Regards,

 

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP

My blog: http://TheEssentialExchange.com/blogs/michael

I'll be at TEC'2009! http://www.tec2009.com/vegas/index.php

 

From: Carl Houseman [mailto:c.house...@gmail.com] 
Sent: Friday, December 12, 2008 2:45 PM
To: NT System Admin Issues
Subject: RE: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain

 

Well crap.   The problem just happened again.  Sorry John, looks like you
don't get the popcorn.

 

pinging my local AD TLD is hitting the correct server.

 

Big heavy sigh.  What else could it be?   I guess I'll go with mapping
drives to FQDN's and see where that gets me.

 

Carl

 

From: Carl Houseman [mailto:c.house...@gmail.com] 
Sent: Friday, December 12, 2008 1:29 PM
To: NT System Admin Issues
Subject: RE: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain

 

It looks like the problem is solved.  I've been reviewing all the responses
to see if anyone won the popcorn... :)

 

John Gwinner's answer was the first to call DNS into question and he also
described what ended up being the problem - the fact that my AD domain name
was being resolved by the remote org's DNS to a public IP.  If I'd not been
so skeptical I could have solved the problem faster based on his answer.

 

So John, if you want a bag of popcorn, send me your mailing address
privately and choose one of these flavors (they're all good!):

 

-   Peanut butter and white chocolate

-   Chocolate chunk and caramel

-   Milk chocolate and white chocolate

 

Again, thanks to everybody for their comments, and Happy Holidays to all.

 

Carl

 

From: Carl Houseman [mailto:c.house...@gmail.com] 
Sent: Wednesday, December 10, 2008 2:28 PM
To: NT System Admin Issues
Subject: Lose access to local domain servers when connected w/VPN to remote
/ different Windows domain

 

This problem has bothered me a long time, and happens daily.  It's so
bothersome, I'll send some Dale  Thomas popcorn to the first person who can
come up with a solution or a tip that quickly (without many hours of effort
on my part) leads to a solution.  Advice such as call Microsoft does not
qualify for the popcorn!

 

Past history:  The problem was seen for Windows XP but seems to be worse
under Vista.  In fact I wrote about it in reference to XP to this list a
year or two ago without any resolution.  Certainly what I'm doing here can't
be that unique, aside from relying on Microsoft-based VPN solutions...
(kindly withhold comments on the worthiness of those solutions).

 

Goes like this:

 

In my local office, there are two 2003 servers - member and domain
controller.  My everyday Vista SP1 is joined to that domain.  I have drives
mapped to both servers.

 

I use an L2TP/IPSEC VPN connection to connect to a client's network.   The
client's VPN gateway is ISA 2006, joined to the client's Windows domain, but
I

RE: Lose access to local domain servers when connected w/VPN to remote / different Windows domain

2008-12-13 Thread Carl Houseman
OK, I don't speak DNS as well as you but I can report my results.  I'll let
you explain them however you like!

My scenario:
A local LAN adapter references one Windows AD DNS - TLD= a.com
A PPP adapter referencing another Windows AD DNS - TLD= b.com

When I start NSLookup, the PPP adapter's DNS is identified.  So I know the
PPP adapter's DNS is first in line.

That being the case,
1. Ping can resolve server.a.com, only defined in a.com's DNS.
2. Ping can resolve server.b.com, only defined in b.com's DNS.

Both TLDs also exist in the public DNS world.  So the TLDs are resolvable by
both DNS's.  But server.a.com and server.b.com are not defined in the public
DNS's.

Based on what you've said, an NXDOMAIN response was not returned - because
the domain did exist, only the hostname was not found.

Carl

-Original Message-
From: Ben Scott [mailto:mailvor...@gmail.com] 
Sent: Friday, December 12, 2008 7:35 PM
To: NT System Admin Issues
Subject: Re: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain

On Fri, Dec 12, 2008 at 12:37 PM, Carl Houseman c.house...@gmail.com
wrote:
 When there are multiple adapters each with their own DNS, DNS
 resolution is attempted on each adapter in turn until one resolves
 it and only fails if none of them resolve it.

  I believe that is inaccurate.

  To the best of my knowledge, an NXDOMAIN response from an
authoritative nameserver *is* considered a successful result for a DNS
query.  The query did not fail.  The local stub resolver *did* receive
an answer.  That answer said, I contacted a nameserver which is
authoritative for the zone in question, and that nameserver said the
domain name you want does not exist.  A failure would be a SERVFAIL
response from an intermediate full-service resolver, or no response at
all (timeout).

  In every relevant situation I've encountered, observed behavior has
corroborated the above.

  It's the difference between sending an email message and getting a
failure notice stating The recipient address does not exist on this
server, vs sending an email message and getting a failure notice
stating The destination email server could not be reached after
several tries; I'm giving up.  The former says authoritatively the
recipient address is bogus; the message could never be delivered
(unless configuration changes).  The later just says your message
could not be delivered, but it might be a temporary problem.

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


RE: Lose access to local domain servers when connected w/VPN to remote / different Windows domain

2008-12-13 Thread Carl Houseman
Here's a new way I can see this problem... I don't know if this would have
happened before the reboot, but I rebooted the DC in my local environment
(it's the only DC).

 

Following that, from the Vista machine I wanted to run something on the
DC I typed

 

psexec \\server file:///\\server  command

 

Response:

Couldn't access server:

Logon failure: unknown user name or bad password.

 

Login failures on server showed the attempted use of the VPN credentials -
by psexec (no other explanation for those events).

 

Meanwhile, psexec \\server.mydomain.com file:///\\server.mydomain.com
worked just fine.

 

Still no problem pinging \\server file:///\\server , keeping in mind, my
local AD TLD is in the DNS suffix search list.  And still no problem with
the drives mapped to FQDN's on the DC that rebooted.

 

So it's a NETBIOS thing, maybe, except that I've seen drives that were
mapped to \\ip.ad.dr.ess stop working with the same wrong-credentials login
failure.

 

Carl

 

From: Carl Houseman [mailto:c.house...@gmail.com] 
Sent: Wednesday, December 10, 2008 2:28 PM
To: NT System Admin Issues
Subject: Lose access to local domain servers when connected w/VPN to remote
/ different Windows domain

 

This problem has bothered me a long time, and happens daily.  It's so
bothersome, I'll send some Dale  Thomas popcorn to the first person who can
come up with a solution or a tip that quickly (without many hours of effort
on my part) leads to a solution.  Advice such as call Microsoft does not
qualify for the popcorn!

 

Past history:  The problem was seen for Windows XP but seems to be worse
under Vista.  In fact I wrote about it in reference to XP to this list a
year or two ago without any resolution.  Certainly what I'm doing here can't
be that unique, aside from relying on Microsoft-based VPN solutions...
(kindly withhold comments on the worthiness of those solutions).

 

Goes like this:

 

In my local office, there are two 2003 servers - member and domain
controller.  My everyday Vista SP1 is joined to that domain.  I have drives
mapped to both servers.

 

I use an L2TP/IPSEC VPN connection to connect to a client's network.   The
client's VPN gateway is ISA 2006, joined to the client's Windows domain, but
I authenticate for the purpose of the VPN connection using a local username
on the ISA server.  We'll call the ISA server ISAVPN in further
discussion.

 

What happens:  Sooner or later I will be unable to access the drives mapped
to my local domain's servers (UNC references to those servers also fail).
The error returned when just trying to do anything at the CMD prompt
defaulted to a mapped drive on either server is:

 

Logon failure: unknown user name or bad password.

 

Once I disconnect from ISAVPN, at the very same CMD prompt, I again and
immediately have access to files on my local servers.

 

This seems to affect access to the member server a short time after
connecting to ISAVPN.  Access to files on the domain controller usually
keeps working much longer, but eventually I lose it as well.  This behavior
has guaranteed repeatability 100% of the time.

 

I should note that the domain controller's mapped drive is available
offline but Vista does not switch to offline because of this problem. 

 

Looking in the security event log of the server, I see events 529 and 680
(source Security), in pairs, related to the login failure, with the 529
having the most information:

 

Logon Failure:

Reason:Unknown user name or bad password

User Name:   local_username_on_ISAVPN

Domain:ISAVPN

Logon Type: 3

Logon Process: NtLmSsp 

Authentication Package:NTLM

Workstation Name:MYVISTAPC

 

My take on it:  At some point, SMB access has to re-authenticate and is
using the more recent credentials from the VPN connection to talk to my
local servers.  I'm guessing binding order somewhere is the problem, but
where can I find and fix this binding order?  A permanent one-time solution
would be nice, but it's OK if I have to fix it every time after making the
VPN connection.

 

thanks all,

Carl

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

Re: Lose access to local domain servers when connected w/VPN to remote / different Windows domain

2008-12-13 Thread Ben Scott
On Sat, Dec 13, 2008 at 11:01 AM, Carl Houseman c.house...@gmail.com wrote:
 I'll let you explain them however you like!

  I don't have enough information to explain anything definitively,
I'm afraid.  :)

 A local LAN adapter references one Windows AD DNS - TLD= a.com

  Just so you know, TLD is Top Level Domain, which means com.,
net., us., and the like.  a.com. or example.com. would be 2LD,
Second Level Domain.

 Based on what you've said, an NXDOMAIN response was not returned - because
 the domain did exist, only the hostname was not found.

  At least one of us is confused in the above.  :)  If I understand
what you mean correctly, it sounds like things are working exactly as
I described: A query for the 2LD domain returned DNS resource records
(domain did exist), but the domain name for the server resulted in
NXDOMAIN (hostname was not found).

  Understand that in DNS, there is no such thing as a hostname.  All
names are domain names.  com. is a domain name.  example.com. is a
domain name.  server.example.com. is a domain name.
www.example.com. is a domain name.  NXDOMAIN is returned by a
nameserver when a query is received for a domain name which said
nameserver knows not to exist, regardless of whether said domain is a
TLD, 2LD, or the domain name assigned to a server.  :)

  This is in contrast to Active Directory, where a domain name is an
entity which groups objects (computers, users, etc.) within an AD
forest, but is not itself a single computer.  AD clients use DNS
domain names to locate AD Domain Controllers.  Thus, confusingly,
while every AD domain name has a DNS domain name, every AD member
computer name has a DNS domain name, too.

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


Re: Lose access to local domain servers when connected w/VPN to remote / different Windows domain

2008-12-13 Thread Ben Scott
On Sat, Dec 13, 2008 at 12:23 PM, Carl Houseman c.house...@gmail.com wrote:
 psexec \\server command
 Couldn't access server:

 Meanwhile, psexec \\server.mydomain.com worked just fine.

  Maybe the customer has a wildcard DNS record, or a server or other
entity with the same name as server in your local environment?

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


RE: Lose access to local domain servers when connected w/VPN to remote / different Windows domain

2008-12-13 Thread Carl Houseman
You're still not making sense, to me anyway. 
Let me restate our respective claims:

My claim:  The first online nameserver of each network adapter is tried, in
turn, until one of them resolves the name.

Your claim:  Only the first online nameserver will be attempted to resolve a
name.  Once the nameserver of *any* adapter returns an IP address, or an
NXDOMAIN, resolution attempts stop.  (if that is not your claim, then I
misread your point a long time ago...)

In my situation:
a.com = local AD TLD, whose AD DNS is ns.a.com, assigned to LAN adapter
b.com = remote AD TLD, whose AD DNS is ns.b.com, assigned to PPP adapter
Both ns.a.com and ns.b.com resolve public names.
Both a.com and b.com are also defined in public DNSs.

Given these results:
1. Ping a.com - public IP of a.com is returned - resolved by ns.b.com
(because ns.a.com would not have returned a public IP).
2. NSLOOKUP server.a.com using ns.b.com - returns NXDOMAIN ('set debug'
tells me so).
3. Ping server.a.com - private IP is returned - resolved by ns.a.com

My conclusions:
b.com's nameservers are tried first due to result (1) above.
a.com's nameservers are resolving names AFTER an NXDOMAIN is returned by
ns.a.com.
This proves my claim as stated above.

I won't belabor the point after your next response, whatever it happens to
be.  You may have the last word.

Carl

-Original Message-
From: Ben Scott [mailto:mailvor...@gmail.com] 
Sent: Saturday, December 13, 2008 2:35 PM
To: NT System Admin Issues
Subject: Re: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain

On Sat, Dec 13, 2008 at 11:01 AM, Carl Houseman c.house...@gmail.com
wrote:
 I'll let you explain them however you like!

  I don't have enough information to explain anything definitively,
I'm afraid.  :)

 A local LAN adapter references one Windows AD DNS - TLD= a.com

  Just so you know, TLD is Top Level Domain, which means com.,
net., us., and the like.  a.com. or example.com. would be 2LD,
Second Level Domain.

 Based on what you've said, an NXDOMAIN response was not returned - because
 the domain did exist, only the hostname was not found.

  At least one of us is confused in the above.  :)  If I understand
what you mean correctly, it sounds like things are working exactly as
I described: A query for the 2LD domain returned DNS resource records
(domain did exist), but the domain name for the server resulted in
NXDOMAIN (hostname was not found).

  Understand that in DNS, there is no such thing as a hostname.  All
names are domain names.  com. is a domain name.  example.com. is a
domain name.  server.example.com. is a domain name.
www.example.com. is a domain name.  NXDOMAIN is returned by a
nameserver when a query is received for a domain name which said
nameserver knows not to exist, regardless of whether said domain is a
TLD, 2LD, or the domain name assigned to a server.  :)

  This is in contrast to Active Directory, where a domain name is an
entity which groups objects (computers, users, etc.) within an AD
forest, but is not itself a single computer.  AD clients use DNS
domain names to locate AD Domain Controllers.  Thus, confusingly,
while every AD domain name has a DNS domain name, every AD member
computer name has a DNS domain name, too.

-- Ben



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


RE: Lose access to local domain servers when connected w/VPN to remote / different Windows domain

2008-12-13 Thread Carl Houseman
nslookup server.remotetld.com using ns.remotetld.com returns NXDOMAIN.

That would suggest no to both of your suppositions.

Carl

-Original Message-
From: Ben Scott [mailto:mailvor...@gmail.com] 
Sent: Saturday, December 13, 2008 2:37 PM
To: NT System Admin Issues
Subject: Re: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain

On Sat, Dec 13, 2008 at 12:23 PM, Carl Houseman c.house...@gmail.com
wrote:
 psexec \\server command
 Couldn't access server:

 Meanwhile, psexec \\server.mydomain.com worked just fine.

  Maybe the customer has a wildcard DNS record, or a server or other
entity with the same name as server in your local environment?

-- Ben



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


RE: Lose access to local domain servers when connected w/VPN to remote / different Windows domain

2008-12-12 Thread Carl Houseman
I'm
assuming, for the moment, that the internal servers you're having
problems reaching are on the same subnet?

Yep, no complexity there.

Also, I have to question why you have two sets of DNS servers. Why not
make static entries in your local DNS for your clients? It's more work
up front, but it can be automated, with dnscmd, I think.

You make it sound like I did it on purpose, but the other org's DNS is
established by default on the PPP adapter when the VPN is connected.  And
I'd prefer to have their DNS resolution available when I'm connected, vs.
other workarounds.  A single entry in the hosts files for my AD domain to
avoid this problem is a very minor and acceptable workaround.

Carl

-Original Message-
From: Kurt Buff [mailto:kurt.b...@gmail.com] 
Sent: Thursday, December 11, 2008 8:41 PM
To: NT System Admin Issues
Subject: Re: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain

On Thu, Dec 11, 2008 at 6:45 AM, Carl Houseman c.house...@gmail.com wrote:
 Use default gateway on remote network is NOT checked for the VPN TCP/IP
 configuration.

Dang. That eliminates my best guess.

 I agree with the recommendations about diagnosing in a methodical way.
Here
 are the results.  If you don't have a lot of time for reading, skip to the
 bottom couple paragraphs, there's a new realization there.

 First, I mapped a total of 6 drives to the 2 local servers in 3 different
 ways:
 One to each server with \\servername (this was done by default)
 One to each server with \\servername.mydomain.com
 One to each server with \\ip.add.re.ss

Excellent!

 Then I connected the VPN (with VPN gateway server credentials).
 Then I mapped a drive to a remote AD DC (using remote domain credentials).

OK.

 My IPCONFIG /ALL results showed (truncated to include only relevant info):

 Windows IP Configuration
   Primary Dns Suffix  . . . . . . . : mydomain.com
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   DNS Suffix Search List. . . . . . : mydomain.com
 PPP adapter VPN-to-Customer-Network:
   Connection-specific DNS Suffix  . :
   Physical Address. . . . . . . . . :
   Autoconfiguration Enabled . . . . : Yes
   IPv4 Address. . . . . . . . . . . : 10.1.7.33(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.255.255
   Default Gateway . . . . . . . . . :
   DNS Servers . . . . . . . . . . . : 10.1.1.176
   10.1.1.172
 Ethernet adapter Local Area Connection:
   Connection-specific DNS Suffix  . : mydomain.com
   Autoconfiguration Enabled . . . . : Yes
   IPv4 Address. . . . . . . . . . . : 192.168.55.129(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . : 192.168.55.1
   DNS Servers . . . . . . . . . . . : 192.168.55.10 [my DC/Local-DNS]

 I checked DNS resolution at this time.   I could resolve FQDN's of both my
 domain and the remote domain.  I've noticed that, when there are multiple
 connections each with their own DNS, DNS's of each connection will be
tried
 in turn until one resolves the request.  You want to see route print
because
 you still don't trust the gateway setting I already confirmed?

Heh. No need to get testy, there youngster...

 Active Routes (just the important ones):
 Network DestinationNetmask  Gateway   Interface
Metric
  0.0.0.0  0.0.0.0  192.168.55.1  192.168.55.129 25
 10.0.0.0255.0.0.0   10.1.5.13510.1.7.33 21
 And tracert was giving 1 hop to local servers, 2 hops to remote network
 servers, such as 10.1.1.172.

OK.

 The first results came 20-30 minutes later, when the first mapped drives
 were lost.  Which ones?
 Those mapped to \\ip.add.re.ss !
 The other 4 were still working.  At this point I re-checked pinging by by
 FQDN to both local and remote servers, and both were working and resolving
 correctly, even after an ipconfig /flushdns.  Tracert unchanged.

 About 8 hours later, but with no activity, the other mapped drives were
 still good.  I started doing some work and suddenly, the two drives mapped
 to \\servername were exhibiting the problem AT THE SAME TIME, which is
 unusual (typically the member server is the first to go by a margin of
more
 than a couple minutes).  The drives mapped to \\servername.mydomain.com
 still worked.  Results of ping, tracert, ipconfig, route print, all
 unchanged.

 When I went to disconnect (NET USE /D) the drive mapped to my local DC
with
 \\servername, it told me There are open files and/or incomplete directory
 searches pending on the connection to m:.  Curious.  I forced it, and
tried
 a net use m: /home to restore it.  That failed: The user's home
directory
 could not be determined.   My user account specifies \\server\share for
my
 home directory.  LIkewise, net use m: \\server\share got The password
or
 user name is invalid for \\servername\share and prompted for a password.
 It was trying

RE: Lose access to local domain servers when connected w/VPN to remote / different Windows domain

2008-12-12 Thread Carl Houseman
  The list of DNS servers that Windows maintains means Ask this
server first.  If that server *doesn't respond*, ask this other server
next.  It does *not* mean, Ask this server first.  If we don't get
an answer we like, ask this other server next.

Not exactly true. 

It is true for multiple DNS's assigned to a single adapter.  When there are
multiple adapters each with their own DNS, DNS resolution is attempted on
each adapter in turn until one resolves it and only fails if none of them
resolve it.

Carl

-Original Message-
From: Ben Scott [mailto:mailvor...@gmail.com] 
Sent: Wednesday, December 10, 2008 9:35 PM
To: NT System Admin Issues
Subject: Re: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain

On Wed, Dec 10, 2008 at 4:29 PM, Carl Houseman c.house...@gmail.com wrote:
 The default DNS after connecting (the one that
 NSLOOKUP identifies) is a server on the client
 network's in the client's AD domain ...

  I'd bet money (or, at least, popcorn) that's your problem.

  The list of DNS servers that Windows maintains means Ask this
server first.  If that server *doesn't respond*, ask this other server
next.  It does *not* mean, Ask this server first.  If we don't get
an answer we like, ask this other server next.

  What happens to most people is they've got something like
corp.example.com which is their Active Directory domain name.
However, that domain name is not delegated in the public DNS.
example.com exists in the public DNS, but there are no NS records
delegating control to your Active Directory DNS servers.

  In other words, if I sit here on my home PC and type dig
corp.example.com., I'm going to get an NXDOMAIN (non-existent domain)
response from the nameservers authoritative for example.com.

  When that happens to your Windows DNS client, *it stops looking*.
It takes that non-existent domain message as authoritative (because
it is).  DNS does *not* then go and try your own corporate DNS servers
to see if *they* happen to know about a corp.example.com.

  Since AD depends on DNS to find and authenticate to domain
controllers, if DNS isn't working, everything will fall apart.  The
varied delays are prolly due to various kinds of caching and timeouts.

  You can check this theory by running an NSLOOKUP for SRV records
associated with the Active Directory domain name.  If your own AD
domain is corp.example.com, connect with the VPN, then run the
command:

NSLOOKUP -type=SRV _ldap._tcp.corp.example.com.

  The _ldap._tcp SRV record is the magic that lets an Active
Directory client find the Domain Controller(s) for a domain.  It all
hinges on that.

  If this is your problem, you should be able to do something about
it, but it's not without complications.

  On Win XP (I dunno about Vista):

1. Open the Network Connections folder
2. From the menu bar, open the Advanced menu, then choose Advanced
Settings
3. Select the Adapters and Bindings tab
4. Look in the Connections list
5. Move the icon for the VPN all the way down to the bottom
6. Move the icon for whatever connects you to your own private network
all the way up to the top

  That will mean your private DNS servers then take precedence over
VPN-provided DNS servers.

  Now, possible complications...

  Complication #1: It's entirely likely you now won't be able to
connect to resources on the customer's network.  That's because your
own DNS servers will now be telling your computer that *their* network
domain name doesn't exist.

  Solution #1 to complication #1: You might be able to get away with
HOSTS and LMHOSTS file entries for the customer servers.

  Solution #2 to complication #1: If your local DNS servers are
running on Win 2003 or later, you can configure selective forwarding,
such that your customer's domain name is forwarded to the customer's
DNS servers.  However, that will require your local DNS servers to be
able to reach customer DNS servers via IP, which likely won't work
with your VPN.  You'd need to configure a VPN gateway for your whole
local network.

  Complication #2: If you use the same VPN for yourself to connect to
your own company network, you might find you have the same problem the
other way around: When VPN'ing in, you can't resolve your company's
private domain.

  Solution #1 to complication #2: Manually adjust binding order before
each connection.

  Solution #2 to complication #2: HOSTS/LMHOSTS again.

  Complication #3: If you're using customer-provided VPN software that
forces settings upon you, you might not be able to make these
adjustments.  If so, you'll have to negotiate with your customer.

  Hope this helps,

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


RE: Lose access to local domain servers when connected w/VPN to remote / different Windows domain

2008-12-12 Thread Carl Houseman
It looks like the problem is solved.  I've been reviewing all the responses
to see if anyone won the popcorn... :)

 

John Gwinner's answer was the first to call DNS into question and he also
described what ended up being the problem - the fact that my AD domain name
was being resolved by the remote org's DNS to a public IP.  If I'd not been
so skeptical I could have solved the problem faster based on his answer.

 

So John, if you want a bag of popcorn, send me your mailing address
privately and choose one of these flavors (they're all good!):

 

-   Peanut butter and white chocolate

-   Chocolate chunk and caramel

-   Milk chocolate and white chocolate

 

Again, thanks to everybody for their comments, and Happy Holidays to all.

 

Carl

 

From: Carl Houseman [mailto:c.house...@gmail.com] 
Sent: Wednesday, December 10, 2008 2:28 PM
To: NT System Admin Issues
Subject: Lose access to local domain servers when connected w/VPN to remote
/ different Windows domain

 

This problem has bothered me a long time, and happens daily.  It's so
bothersome, I'll send some Dale  Thomas popcorn to the first person who can
come up with a solution or a tip that quickly (without many hours of effort
on my part) leads to a solution.  Advice such as call Microsoft does not
qualify for the popcorn!

 

Past history:  The problem was seen for Windows XP but seems to be worse
under Vista.  In fact I wrote about it in reference to XP to this list a
year or two ago without any resolution.  Certainly what I'm doing here can't
be that unique, aside from relying on Microsoft-based VPN solutions...
(kindly withhold comments on the worthiness of those solutions).

 

Goes like this:

 

In my local office, there are two 2003 servers - member and domain
controller.  My everyday Vista SP1 is joined to that domain.  I have drives
mapped to both servers.

 

I use an L2TP/IPSEC VPN connection to connect to a client's network.   The
client's VPN gateway is ISA 2006, joined to the client's Windows domain, but
I authenticate for the purpose of the VPN connection using a local username
on the ISA server.  We'll call the ISA server ISAVPN in further
discussion.

 

What happens:  Sooner or later I will be unable to access the drives mapped
to my local domain's servers (UNC references to those servers also fail).
The error returned when just trying to do anything at the CMD prompt
defaulted to a mapped drive on either server is:

 

Logon failure: unknown user name or bad password.

 

Once I disconnect from ISAVPN, at the very same CMD prompt, I again and
immediately have access to files on my local servers.

 

This seems to affect access to the member server a short time after
connecting to ISAVPN.  Access to files on the domain controller usually
keeps working much longer, but eventually I lose it as well.  This behavior
has guaranteed repeatability 100% of the time.

 

I should note that the domain controller's mapped drive is available
offline but Vista does not switch to offline because of this problem. 

 

Looking in the security event log of the server, I see events 529 and 680
(source Security), in pairs, related to the login failure, with the 529
having the most information:

 

Logon Failure:

Reason:Unknown user name or bad password

User Name:   local_username_on_ISAVPN

Domain:ISAVPN

Logon Type: 3

Logon Process: NtLmSsp 

Authentication Package:NTLM

Workstation Name:MYVISTAPC

 

My take on it:  At some point, SMB access has to re-authenticate and is
using the more recent credentials from the VPN connection to talk to my
local servers.  I'm guessing binding order somewhere is the problem, but
where can I find and fix this binding order?  A permanent one-time solution
would be nice, but it's OK if I have to fix it every time after making the
VPN connection.

 

thanks all,

Carl

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

Re: Lose access to local domain servers when connected w/VPN to remote / different Windows domain

2008-12-12 Thread Steve Ens
Carl,
Is this what you guys do?  Make popcorn?  What's the website, I might put an
order in too...I love that stuff.
Steve

On Fri, Dec 12, 2008 at 12:29 PM, Carl Houseman c.house...@gmail.comwrote:

  It looks like the problem is solved.  I've been reviewing all the
 responses to see if anyone won the popcorn... :)



 John Gwinner's answer was the first to call DNS into question and he also
 described what ended up being the problem – the fact that my AD domain name
 was being resolved by the remote org's DNS to a public IP.  If I'd not been
 so skeptical I could have solved the problem faster based on his answer.



 So John, if you want a bag of popcorn, send me your mailing address
 privately and choose one of these flavors (they're all good!):



 -   Peanut butter and white chocolate

 -   Chocolate chunk and caramel

 -   Milk chocolate and white chocolate



 Again, thanks to everybody for their comments, and Happy Holidays to all.



 Carl



 *From:* Carl Houseman [mailto:c.house...@gmail.com]
 *Sent:* Wednesday, December 10, 2008 2:28 PM
 *To:* NT System Admin Issues
 *Subject:* Lose access to local domain servers when connected w/VPN to
 remote / different Windows domain



 This problem has bothered me a long time, and happens daily.  It's so
 bothersome, I'll send some Dale  Thomas popcorn to the first person who can
 come up with a solution or a tip that quickly (without many hours of effort
 on my part) leads to a solution.  Advice such as call Microsoft does not
 qualify for the popcorn!



 Past history:  The problem was seen for Windows XP but seems to be worse
 under Vista.  In fact I wrote about it in reference to XP to this list a
 year or two ago without any resolution.  Certainly what I'm doing here can't
 be that unique, aside from relying on Microsoft-based VPN solutions...
 (kindly withhold comments on the worthiness of those solutions).



 Goes like this:



 In my local office, there are two 2003 servers – member and domain
 controller.  My everyday Vista SP1 is joined to that domain.  I have drives
 mapped to both servers.



 I use an L2TP/IPSEC VPN connection to connect to a client's network.   The
 client's VPN gateway is ISA 2006, joined to the client's Windows domain, but
 I authenticate for the purpose of the VPN connection using a local username
 on the ISA server.  We'll call the ISA server ISAVPN in further
 discussion.



 What happens:  Sooner or later I will be unable to access the drives mapped
 to my local domain's servers (UNC references to those servers also fail).
  The error returned when just trying to do anything at the CMD prompt
 defaulted to a mapped drive on either server is:



 Logon failure: unknown user name or bad password.



 Once I disconnect from ISAVPN, at the very same CMD prompt, I again and
 immediately have access to files on my local servers.



 This seems to affect access to the member server a short time after
 connecting to ISAVPN.  Access to files on the domain controller usually
 keeps working much longer, but eventually I lose it as well.  This behavior
 has guaranteed repeatability 100% of the time.



 I should note that the domain controller's mapped drive is available
 offline but Vista does not switch to offline because of this problem.



 Looking in the security event log of the server, I see events 529 and 680
 (source Security), in pairs, related to the login failure, with the 529
 having the most information:



 Logon Failure:

 Reason:Unknown user name or bad password

 User Name:   local_username_on_ISAVPN

 Domain:ISAVPN

 Logon Type: 3

 Logon Process: NtLmSsp

 Authentication Package:NTLM

 Workstation Name:MYVISTAPC



 My take on it:  At some point, SMB access has to re-authenticate and is
 using the more recent credentials from the VPN connection to talk to my
 local servers.  I'm guessing binding order somewhere is the problem, but
 where can I find and fix this binding order?  A permanent one-time solution
 would be nice, but it's OK if I have to fix it every time after making the
 VPN connection.



 thanks all,

 Carl














~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Lose access to local domain servers when connected w/VPN to remote / different Windows domain

2008-12-12 Thread Carl Houseman
Well crap.   The problem just happened again.  Sorry John, looks like you
don't get the popcorn.

 

pinging my local AD TLD is hitting the correct server.

 

Big heavy sigh.  What else could it be?   I guess I'll go with mapping
drives to FQDN's and see where that gets me.

 

Carl

 

From: Carl Houseman [mailto:c.house...@gmail.com] 
Sent: Friday, December 12, 2008 1:29 PM
To: NT System Admin Issues
Subject: RE: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain

 

It looks like the problem is solved.  I've been reviewing all the responses
to see if anyone won the popcorn... :)

 

John Gwinner's answer was the first to call DNS into question and he also
described what ended up being the problem - the fact that my AD domain name
was being resolved by the remote org's DNS to a public IP.  If I'd not been
so skeptical I could have solved the problem faster based on his answer.

 

So John, if you want a bag of popcorn, send me your mailing address
privately and choose one of these flavors (they're all good!):

 

-   Peanut butter and white chocolate

-   Chocolate chunk and caramel

-   Milk chocolate and white chocolate

 

Again, thanks to everybody for their comments, and Happy Holidays to all.

 

Carl

 

From: Carl Houseman [mailto:c.house...@gmail.com] 
Sent: Wednesday, December 10, 2008 2:28 PM
To: NT System Admin Issues
Subject: Lose access to local domain servers when connected w/VPN to remote
/ different Windows domain

 

This problem has bothered me a long time, and happens daily.  It's so
bothersome, I'll send some Dale  Thomas popcorn to the first person who can
come up with a solution or a tip that quickly (without many hours of effort
on my part) leads to a solution.  Advice such as call Microsoft does not
qualify for the popcorn!

 

Past history:  The problem was seen for Windows XP but seems to be worse
under Vista.  In fact I wrote about it in reference to XP to this list a
year or two ago without any resolution.  Certainly what I'm doing here can't
be that unique, aside from relying on Microsoft-based VPN solutions...
(kindly withhold comments on the worthiness of those solutions).

 

Goes like this:

 

In my local office, there are two 2003 servers - member and domain
controller.  My everyday Vista SP1 is joined to that domain.  I have drives
mapped to both servers.

 

I use an L2TP/IPSEC VPN connection to connect to a client's network.   The
client's VPN gateway is ISA 2006, joined to the client's Windows domain, but
I authenticate for the purpose of the VPN connection using a local username
on the ISA server.  We'll call the ISA server ISAVPN in further
discussion.

 

What happens:  Sooner or later I will be unable to access the drives mapped
to my local domain's servers (UNC references to those servers also fail).
The error returned when just trying to do anything at the CMD prompt
defaulted to a mapped drive on either server is:

 

Logon failure: unknown user name or bad password.

 

Once I disconnect from ISAVPN, at the very same CMD prompt, I again and
immediately have access to files on my local servers.

 

This seems to affect access to the member server a short time after
connecting to ISAVPN.  Access to files on the domain controller usually
keeps working much longer, but eventually I lose it as well.  This behavior
has guaranteed repeatability 100% of the time.

 

I should note that the domain controller's mapped drive is available
offline but Vista does not switch to offline because of this problem. 

 

Looking in the security event log of the server, I see events 529 and 680
(source Security), in pairs, related to the login failure, with the 529
having the most information:

 

Logon Failure:

Reason:Unknown user name or bad password

User Name:   local_username_on_ISAVPN

Domain:ISAVPN

Logon Type: 3

Logon Process: NtLmSsp 

Authentication Package:NTLM

Workstation Name:MYVISTAPC

 

My take on it:  At some point, SMB access has to re-authenticate and is
using the more recent credentials from the VPN connection to talk to my
local servers.  I'm guessing binding order somewhere is the problem, but
where can I find and fix this binding order?  A permanent one-time solution
would be nice, but it's OK if I have to fix it every time after making the
VPN connection.

 

thanks all,

Carl

 

 

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Lose access to local domain servers when connected w/VPN to remote / different Windows domain

2008-12-12 Thread Michael B. Smith
What does your wins look like?

 

What's the Kerb lifetime of the remote and are they defaulting to UDP or TCP
and what do your tickets look like? (kerbtray and klist are your friends)

 

The title of this KB says services, and it's old (but still valid), but
it's about any time you are changing security contexts:

 

http://support.microsoft.com/kb/180362

 

Regards,

 

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP

My blog: http://TheEssentialExchange.com/blogs/michael

I'll be at TEC'2009! http://www.tec2009.com/vegas/index.php

 

From: Carl Houseman [mailto:c.house...@gmail.com] 
Sent: Friday, December 12, 2008 2:45 PM
To: NT System Admin Issues
Subject: RE: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain

 

Well crap.   The problem just happened again.  Sorry John, looks like you
don't get the popcorn.

 

pinging my local AD TLD is hitting the correct server.

 

Big heavy sigh.  What else could it be?   I guess I'll go with mapping
drives to FQDN's and see where that gets me.

 

Carl

 

From: Carl Houseman [mailto:c.house...@gmail.com] 
Sent: Friday, December 12, 2008 1:29 PM
To: NT System Admin Issues
Subject: RE: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain

 

It looks like the problem is solved.  I've been reviewing all the responses
to see if anyone won the popcorn... :)

 

John Gwinner's answer was the first to call DNS into question and he also
described what ended up being the problem - the fact that my AD domain name
was being resolved by the remote org's DNS to a public IP.  If I'd not been
so skeptical I could have solved the problem faster based on his answer.

 

So John, if you want a bag of popcorn, send me your mailing address
privately and choose one of these flavors (they're all good!):

 

-   Peanut butter and white chocolate

-   Chocolate chunk and caramel

-   Milk chocolate and white chocolate

 

Again, thanks to everybody for their comments, and Happy Holidays to all.

 

Carl

 

From: Carl Houseman [mailto:c.house...@gmail.com] 
Sent: Wednesday, December 10, 2008 2:28 PM
To: NT System Admin Issues
Subject: Lose access to local domain servers when connected w/VPN to remote
/ different Windows domain

 

This problem has bothered me a long time, and happens daily.  It's so
bothersome, I'll send some Dale  Thomas popcorn to the first person who can
come up with a solution or a tip that quickly (without many hours of effort
on my part) leads to a solution.  Advice such as call Microsoft does not
qualify for the popcorn!

 

Past history:  The problem was seen for Windows XP but seems to be worse
under Vista.  In fact I wrote about it in reference to XP to this list a
year or two ago without any resolution.  Certainly what I'm doing here can't
be that unique, aside from relying on Microsoft-based VPN solutions...
(kindly withhold comments on the worthiness of those solutions).

 

Goes like this:

 

In my local office, there are two 2003 servers - member and domain
controller.  My everyday Vista SP1 is joined to that domain.  I have drives
mapped to both servers.

 

I use an L2TP/IPSEC VPN connection to connect to a client's network.   The
client's VPN gateway is ISA 2006, joined to the client's Windows domain, but
I authenticate for the purpose of the VPN connection using a local username
on the ISA server.  We'll call the ISA server ISAVPN in further
discussion.

 

What happens:  Sooner or later I will be unable to access the drives mapped
to my local domain's servers (UNC references to those servers also fail).
The error returned when just trying to do anything at the CMD prompt
defaulted to a mapped drive on either server is:

 

Logon failure: unknown user name or bad password.

 

Once I disconnect from ISAVPN, at the very same CMD prompt, I again and
immediately have access to files on my local servers.

 

This seems to affect access to the member server a short time after
connecting to ISAVPN.  Access to files on the domain controller usually
keeps working much longer, but eventually I lose it as well.  This behavior
has guaranteed repeatability 100% of the time.

 

I should note that the domain controller's mapped drive is available
offline but Vista does not switch to offline because of this problem. 

 

Looking in the security event log of the server, I see events 529 and 680
(source Security), in pairs, related to the login failure, with the 529
having the most information:

 

Logon Failure:

Reason:Unknown user name or bad password

User Name:   local_username_on_ISAVPN

Domain:ISAVPN

Logon Type: 3

Logon Process: NtLmSsp 

Authentication Package:NTLM

Workstation Name:MYVISTAPC

 

My take on it:  At some point, SMB access has to re-authenticate and is
using the more recent credentials from

Re: Lose access to local domain servers when connected w/VPN to remote / different Windows domain

2008-12-12 Thread Ben Scott
On Fri, Dec 12, 2008 at 12:37 PM, Carl Houseman c.house...@gmail.com wrote:
 When there are multiple adapters each with their own DNS, DNS
 resolution is attempted on each adapter in turn until one resolves
 it and only fails if none of them resolve it.

  I believe that is inaccurate.

  To the best of my knowledge, an NXDOMAIN response from an
authoritative nameserver *is* considered a successful result for a DNS
query.  The query did not fail.  The local stub resolver *did* receive
an answer.  That answer said, I contacted a nameserver which is
authoritative for the zone in question, and that nameserver said the
domain name you want does not exist.  A failure would be a SERVFAIL
response from an intermediate full-service resolver, or no response at
all (timeout).

  In every relevant situation I've encountered, observed behavior has
corroborated the above.

  It's the difference between sending an email message and getting a
failure notice stating The recipient address does not exist on this
server, vs sending an email message and getting a failure notice
stating The destination email server could not be reached after
several tries; I'm giving up.  The former says authoritatively the
recipient address is bogus; the message could never be delivered
(unless configuration changes).  The later just says your message
could not be delivered, but it might be a temporary problem.

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


Re: Lose access to local domain servers when connected w/VPN to remote / different Windows domain

2008-12-12 Thread Kurt Buff
So, even easier!

Set up an authoritative entry in *their* DNS server for your domain,
and point the IP addresses in it the way you want.

Tastes great, less filling!

On Fri, Dec 12, 2008 at 9:30 AM, Carl Houseman c.house...@gmail.com wrote:
I'm
assuming, for the moment, that the internal servers you're having
problems reaching are on the same subnet?

 Yep, no complexity there.

Also, I have to question why you have two sets of DNS servers. Why not
make static entries in your local DNS for your clients? It's more work
up front, but it can be automated, with dnscmd, I think.

 You make it sound like I did it on purpose, but the other org's DNS is
 established by default on the PPP adapter when the VPN is connected.  And
 I'd prefer to have their DNS resolution available when I'm connected, vs.
 other workarounds.  A single entry in the hosts files for my AD domain to
 avoid this problem is a very minor and acceptable workaround.

 Carl

 -Original Message-
 From: Kurt Buff [mailto:kurt.b...@gmail.com]
 Sent: Thursday, December 11, 2008 8:41 PM
 To: NT System Admin Issues
 Subject: Re: Lose access to local domain servers when connected w/VPN to
 remote / different Windows domain

 On Thu, Dec 11, 2008 at 6:45 AM, Carl Houseman c.house...@gmail.com wrote:
 Use default gateway on remote network is NOT checked for the VPN TCP/IP
 configuration.

 Dang. That eliminates my best guess.

 I agree with the recommendations about diagnosing in a methodical way.
 Here
 are the results.  If you don't have a lot of time for reading, skip to the
 bottom couple paragraphs, there's a new realization there.

 First, I mapped a total of 6 drives to the 2 local servers in 3 different
 ways:
 One to each server with \\servername (this was done by default)
 One to each server with \\servername.mydomain.com
 One to each server with \\ip.add.re.ss

 Excellent!

 Then I connected the VPN (with VPN gateway server credentials).
 Then I mapped a drive to a remote AD DC (using remote domain credentials).

 OK.

 My IPCONFIG /ALL results showed (truncated to include only relevant info):

 Windows IP Configuration
   Primary Dns Suffix  . . . . . . . : mydomain.com
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   DNS Suffix Search List. . . . . . : mydomain.com
 PPP adapter VPN-to-Customer-Network:
   Connection-specific DNS Suffix  . :
   Physical Address. . . . . . . . . :
   Autoconfiguration Enabled . . . . : Yes
   IPv4 Address. . . . . . . . . . . : 10.1.7.33(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.255.255
   Default Gateway . . . . . . . . . :
   DNS Servers . . . . . . . . . . . : 10.1.1.176
   10.1.1.172
 Ethernet adapter Local Area Connection:
   Connection-specific DNS Suffix  . : mydomain.com
   Autoconfiguration Enabled . . . . : Yes
   IPv4 Address. . . . . . . . . . . : 192.168.55.129(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . : 192.168.55.1
   DNS Servers . . . . . . . . . . . : 192.168.55.10 [my DC/Local-DNS]

 I checked DNS resolution at this time.   I could resolve FQDN's of both my
 domain and the remote domain.  I've noticed that, when there are multiple
 connections each with their own DNS, DNS's of each connection will be
 tried
 in turn until one resolves the request.  You want to see route print
 because
 you still don't trust the gateway setting I already confirmed?

 Heh. No need to get testy, there youngster...

 Active Routes (just the important ones):
 Network DestinationNetmask  Gateway   Interface
 Metric
  0.0.0.0  0.0.0.0  192.168.55.1  192.168.55.129 25
 10.0.0.0255.0.0.0   10.1.5.13510.1.7.33 21
 And tracert was giving 1 hop to local servers, 2 hops to remote network
 servers, such as 10.1.1.172.

 OK.

 The first results came 20-30 minutes later, when the first mapped drives
 were lost.  Which ones?
 Those mapped to \\ip.add.re.ss !
 The other 4 were still working.  At this point I re-checked pinging by by
 FQDN to both local and remote servers, and both were working and resolving
 correctly, even after an ipconfig /flushdns.  Tracert unchanged.

 About 8 hours later, but with no activity, the other mapped drives were
 still good.  I started doing some work and suddenly, the two drives mapped
 to \\servername were exhibiting the problem AT THE SAME TIME, which is
 unusual (typically the member server is the first to go by a margin of
 more
 than a couple minutes).  The drives mapped to \\servername.mydomain.com
 still worked.  Results of ping, tracert, ipconfig, route print, all
 unchanged.

 When I went to disconnect (NET USE /D) the drive mapped to my local DC
 with
 \\servername, it told me There are open files and/or incomplete directory
 searches pending on the connection to m:.  Curious.  I forced it, and
 tried
 a net use m: /home to restore it.  That failed

Re: Lose access to local domain servers when connected w/VPN to remote / different Windows domain

2008-12-11 Thread Ben Scott
On Wed, Dec 10, 2008 at 11:34 PM, Kurt Buff [EMAIL PROTECTED] wrote:
 Start at the beginning... When this problem occurs, can you ping
 the hard-to-reach server by IP address? ...

  Indeed.  It's always a good idea to follow a methodical approach.
Work step-by-step to identify what works, and isolate the trouble.

  However, that being said: From the original description, his mapped
drives don't immediately stop working.  They're okay for a little
while, and fall apart after a few minutes.  If he was loosing IP
connectivity, he'd loose that right away.

  Also, the default gateway will only matter if the domain controller
or other servers he's trying to reach are not on his local subnet.
(Which may be the case, of course; just thought it was worth
mentioning.)

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


RE: Lose access to local domain servers when connected w/VPN to remote / different Windows domain

2008-12-11 Thread Kennedy, Jim
Then ping the hostnames, see if you can resolve the names. That is my bet. The 
VPN is taking over your dns/wins. The delay is perhaps the time the resolutions 
live in your cache before they go poof.

 -Original Message-
 From: Ben Scott [mailto:[EMAIL PROTECTED]
 Sent: Thursday, December 11, 2008 8:25 AM
 To: NT System Admin Issues
 Subject: Re: Lose access to local domain servers when connected w/VPN
 to remote / different Windows domain

 On Wed, Dec 10, 2008 at 11:34 PM, Kurt Buff [EMAIL PROTECTED]
 wrote:
  Start at the beginning... When this problem occurs, can you ping
  the hard-to-reach server by IP address? ...


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


RE: Lose access to local domain servers when connected w/VPN to remote / different Windows domain

2008-12-11 Thread Carl Houseman
network's DNS... and what will happen if I do that.  Hmmm. checking
HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Linkage\Bind, I see:

\Device\{1BF6FDBF-63AF-4A12-9A68-BFD7D06BB920}
\Device\NdisWanIp
\Device\{277E3FE6-F44A-473C-B5F1-0F38683D56A1}
\Device\{DBA2C2F4-E6FA-4BC7-8008-0CC46A3A77DA}

I moved NdisWanIP to the bottom of the list.  Now, NSLOOKUP is defaulting to
my local DNS server as expected.  But, ping mydomain.com is still
resolving to the public IP.  IPCONFIG /FLUSHDNS.   Ping domain.com.  Still
reaching the public IP.  Where is this DNS lookup cached?  Grrr, Vista has
too many caches!

So let's try a hosts entry for mydomain.com.  Ping mydomain.com - now
reaches the correct private IP.  But net use m: /home - still fails.  net
use m: \\servername\share - still fails.  Still cached somewhere?

I'll have to reboot and start again with only the hosts entry for
mydomain.com as the workaround, and see what the results are.  More when I
know more.  Thanks everybody for your comments.

Carl

-Original Message-
From: Kurt Buff [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, December 10, 2008 11:35 PM
To: NT System Admin Issues
Subject: Re: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain

Start at the beginning...

When this problem occurs, can you ping the hard-to-reach server by IP
address? What does 'ping -a ip.add.re.ss' reveal? If those work, ping
by name, but if those fail, what does tracert reveal? What does
ipconfig /all reveal - as others have voiced, I have my suspicions
about the default gateway being set to the remote network, but first
things first.

Kurt

On Wed, Dec 10, 2008 at 11:28 AM, Carl Houseman [EMAIL PROTECTED]
wrote:
 This problem has bothered me a long time, and happens daily.  It's so
 bothersome, I'll send some Dale  Thomas popcorn to the first person who
can
 come up with a solution or a tip that quickly (without many hours of
effort
 on my part) leads to a solution.  Advice such as call Microsoft does not
 qualify for the popcorn!

 Past history:  The problem was seen for Windows XP but seems to be worse
 under Vista.  In fact I wrote about it in reference to XP to this list a
 year or two ago without any resolution.  Certainly what I'm doing here
can't
 be that unique, aside from relying on Microsoft-based VPN solutions...
 (kindly withhold comments on the worthiness of those solutions).

 Goes like this:

 In my local office, there are two 2003 servers - member and domain
 controller.  My everyday Vista SP1 is joined to that domain.  I have
drives
 mapped to both servers.

 I use an L2TP/IPSEC VPN connection to connect to a client's network.   The
 client's VPN gateway is ISA 2006, joined to the client's Windows domain,
but
 I authenticate for the purpose of the VPN connection using a local
username
 on the ISA server.  We'll call the ISA server ISAVPN in further
 discussion.

 What happens:  Sooner or later I will be unable to access the drives
mapped
 to my local domain's servers (UNC references to those servers also fail).
  The error returned when just trying to do anything at the CMD prompt
 defaulted to a mapped drive on either server is:

 Logon failure: unknown user name or bad password.

 Once I disconnect from ISAVPN, at the very same CMD prompt, I again and
 immediately have access to files on my local servers.

 This seems to affect access to the member server a short time after
 connecting to ISAVPN.  Access to files on the domain controller usually
 keeps working much longer, but eventually I lose it as well.  This
behavior
 has guaranteed repeatability 100% of the time.

 I should note that the domain controller's mapped drive is available
 offline but Vista does not switch to offline because of this problem.

 Looking in the security event log of the server, I see events 529 and 680
 (source Security), in pairs, related to the login failure, with the 529
 having the most information:

 Logon Failure:
 Reason:Unknown user name or bad password
 User Name:   local_username_on_ISAVPN
 Domain:ISAVPN
 Logon Type: 3
 Logon Process: NtLmSsp
 Authentication Package:NTLM
 Workstation Name:MYVISTAPC

 My take on it:  At some point, SMB access has to re-authenticate and is
 using the more recent credentials from the VPN connection to talk to my
 local servers.  I'm guessing binding order somewhere is the problem, but
 where can I find and fix this binding order?  A permanent one-time
solution
 would be nice, but it's OK if I have to fix it every time after making the
 VPN connection.
 thanks all,
 Carl



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


Re: Lose access to local domain servers when connected w/VPN to remote / different Windows domain

2008-12-11 Thread Kurt Buff
On Thu, Dec 11, 2008 at 6:45 AM, Carl Houseman c.house...@gmail.com wrote:
 Use default gateway on remote network is NOT checked for the VPN TCP/IP
 configuration.

Dang. That eliminates my best guess.

 I agree with the recommendations about diagnosing in a methodical way.  Here
 are the results.  If you don't have a lot of time for reading, skip to the
 bottom couple paragraphs, there's a new realization there.

 First, I mapped a total of 6 drives to the 2 local servers in 3 different
 ways:
 One to each server with \\servername (this was done by default)
 One to each server with \\servername.mydomain.com
 One to each server with \\ip.add.re.ss

Excellent!

 Then I connected the VPN (with VPN gateway server credentials).
 Then I mapped a drive to a remote AD DC (using remote domain credentials).

OK.

 My IPCONFIG /ALL results showed (truncated to include only relevant info):

 Windows IP Configuration
   Primary Dns Suffix  . . . . . . . : mydomain.com
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   DNS Suffix Search List. . . . . . : mydomain.com
 PPP adapter VPN-to-Customer-Network:
   Connection-specific DNS Suffix  . :
   Physical Address. . . . . . . . . :
   Autoconfiguration Enabled . . . . : Yes
   IPv4 Address. . . . . . . . . . . : 10.1.7.33(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.255.255
   Default Gateway . . . . . . . . . :
   DNS Servers . . . . . . . . . . . : 10.1.1.176
   10.1.1.172
 Ethernet adapter Local Area Connection:
   Connection-specific DNS Suffix  . : mydomain.com
   Autoconfiguration Enabled . . . . : Yes
   IPv4 Address. . . . . . . . . . . : 192.168.55.129(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . : 192.168.55.1
   DNS Servers . . . . . . . . . . . : 192.168.55.10 [my DC/Local-DNS]

 I checked DNS resolution at this time.   I could resolve FQDN's of both my
 domain and the remote domain.  I've noticed that, when there are multiple
 connections each with their own DNS, DNS's of each connection will be tried
 in turn until one resolves the request.  You want to see route print because
 you still don't trust the gateway setting I already confirmed?

Heh. No need to get testy, there youngster...

 Active Routes (just the important ones):
 Network DestinationNetmask  Gateway   Interface  Metric
  0.0.0.0  0.0.0.0  192.168.55.1  192.168.55.129 25
 10.0.0.0255.0.0.0   10.1.5.13510.1.7.33 21
 And tracert was giving 1 hop to local servers, 2 hops to remote network
 servers, such as 10.1.1.172.

OK.

 The first results came 20-30 minutes later, when the first mapped drives
 were lost.  Which ones?
 Those mapped to \\ip.add.re.ss !
 The other 4 were still working.  At this point I re-checked pinging by by
 FQDN to both local and remote servers, and both were working and resolving
 correctly, even after an ipconfig /flushdns.  Tracert unchanged.

 About 8 hours later, but with no activity, the other mapped drives were
 still good.  I started doing some work and suddenly, the two drives mapped
 to \\servername were exhibiting the problem AT THE SAME TIME, which is
 unusual (typically the member server is the first to go by a margin of more
 than a couple minutes).  The drives mapped to \\servername.mydomain.com
 still worked.  Results of ping, tracert, ipconfig, route print, all
 unchanged.

 When I went to disconnect (NET USE /D) the drive mapped to my local DC with
 \\servername, it told me There are open files and/or incomplete directory
 searches pending on the connection to m:.  Curious.  I forced it, and tried
 a net use m: /home to restore it.  That failed: The user's home directory
 could not be determined.   My user account specifies \\server\share for my
 home directory.  LIkewise, net use m: \\server\share got The password or
 user name is invalid for \\servername\share and prompted for a password.
 It was trying to use the VPN gateway credentials.  I then tried net use m:
 \\servername.mydomain.com\share and that worked.

 But it gets weird here.  I went into ADUC (from the same Vista machine) and
 changed my user account profile's home directory to
 \\servername.mydomain.com\share.  I then tried net use m: /home again.
 The user's home directory could not be determined.  Went to another
 machine where I was already logged on, disconnected m: and then net use m:
 /home - worked.  WTF?

 This has been interesting experiment, though little is explained.

 Just to re-cap, through all this, DNS, ping, tracert, route print, ipconfig
 /all results have remained the same, even after ipconfig /flushdns.

 One thing that now occurs to me, my AD domain name is also my public domain
 name (split DNS), with the public one pointing to a public IP for Internet
 E-mail purposes.  So if something was trying to work off that top level
 name, it would get a 

Re: Lose access to local domain servers when connected w/VPN to remote / different Windows domain

2008-12-10 Thread Steve Ens
You do have a local account on the remote serversame username and
password I presume?

On Wed, Dec 10, 2008 at 1:28 PM, Carl Houseman [EMAIL PROTECTED] wrote:

  This problem has bothered me a long time, and happens daily.  It's so
 bothersome, I'll send some Dale  Thomas popcorn to the first person who can
 come up with a solution or a tip that quickly (without many hours of effort
 on my part) leads to a solution.  Advice such as call Microsoft does not
 qualify for the popcorn!



 Past history:  The problem was seen for Windows XP but seems to be worse
 under Vista.  In fact I wrote about it in reference to XP to this list a
 year or two ago without any resolution.  Certainly what I'm doing here can't
 be that unique, aside from relying on Microsoft-based VPN solutions...
 (kindly withhold comments on the worthiness of those solutions).



 Goes like this:



 In my local office, there are two 2003 servers – member and domain
 controller.  My everyday Vista SP1 is joined to that domain.  I have drives
 mapped to both servers.



 I use an L2TP/IPSEC VPN connection to connect to a client's network.   The
 client's VPN gateway is ISA 2006, joined to the client's Windows domain, but
 I authenticate for the purpose of the VPN connection using a local username
 on the ISA server.  We'll call the ISA server ISAVPN in further
 discussion.



 What happens:  Sooner or later I will be unable to access the drives mapped
 to my local domain's servers (UNC references to those servers also fail).
  The error returned when just trying to do anything at the CMD prompt
 defaulted to a mapped drive on either server is:



 Logon failure: unknown user name or bad password.



 Once I disconnect from ISAVPN, at the very same CMD prompt, I again and
 immediately have access to files on my local servers.



 This seems to affect access to the member server a short time after
 connecting to ISAVPN.  Access to files on the domain controller usually
 keeps working much longer, but eventually I lose it as well.  This behavior
 has guaranteed repeatability 100% of the time.



 I should note that the domain controller's mapped drive is available
 offline but Vista does not switch to offline because of this problem.



 Looking in the security event log of the server, I see events 529 and 680
 (source Security), in pairs, related to the login failure, with the 529
 having the most information:



 Logon Failure:

 Reason:Unknown user name or bad password

 User Name:   local_username_on_ISAVPN

 Domain:ISAVPN

 Logon Type: 3

 Logon Process: NtLmSsp

 Authentication Package:NTLM

 Workstation Name:MYVISTAPC



 My take on it:  At some point, SMB access has to re-authenticate and is
 using the more recent credentials from the VPN connection to talk to my
 local servers.  I'm guessing binding order somewhere is the problem, but
 where can I find and fix this binding order?  A permanent one-time solution
 would be nice, but it's OK if I have to fix it every time after making the
 VPN connection.



 thanks all,

 Carl







~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Lose access to local domain servers when connected w/VPN to remote / different Windows domain

2008-12-10 Thread Carl Houseman
No, the usernames and passwords are different, and they must remain that
way.

 

Carl

 

From: Steve Ens [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, December 10, 2008 2:35 PM
To: NT System Admin Issues
Subject: Re: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain

 

You do have a local account on the remote serversame username and
password I presume?

On Wed, Dec 10, 2008 at 1:28 PM, Carl Houseman [EMAIL PROTECTED] wrote:

This problem has bothered me a long time, and happens daily.  It's so
bothersome, I'll send some Dale  Thomas popcorn to the first person who can
come up with a solution or a tip that quickly (without many hours of effort
on my part) leads to a solution.  Advice such as call Microsoft does not
qualify for the popcorn!

 

Past history:  The problem was seen for Windows XP but seems to be worse
under Vista.  In fact I wrote about it in reference to XP to this list a
year or two ago without any resolution.  Certainly what I'm doing here can't
be that unique, aside from relying on Microsoft-based VPN solutions...
(kindly withhold comments on the worthiness of those solutions).

 

Goes like this:

 

In my local office, there are two 2003 servers - member and domain
controller.  My everyday Vista SP1 is joined to that domain.  I have drives
mapped to both servers.

 

I use an L2TP/IPSEC VPN connection to connect to a client's network.   The
client's VPN gateway is ISA 2006, joined to the client's Windows domain, but
I authenticate for the purpose of the VPN connection using a local username
on the ISA server.  We'll call the ISA server ISAVPN in further
discussion.

 

What happens:  Sooner or later I will be unable to access the drives mapped
to my local domain's servers (UNC references to those servers also fail).
The error returned when just trying to do anything at the CMD prompt
defaulted to a mapped drive on either server is:

 

Logon failure: unknown user name or bad password.

 

Once I disconnect from ISAVPN, at the very same CMD prompt, I again and
immediately have access to files on my local servers.

 

This seems to affect access to the member server a short time after
connecting to ISAVPN.  Access to files on the domain controller usually
keeps working much longer, but eventually I lose it as well.  This behavior
has guaranteed repeatability 100% of the time.

 

I should note that the domain controller's mapped drive is available
offline but Vista does not switch to offline because of this problem. 

 

Looking in the security event log of the server, I see events 529 and 680
(source Security), in pairs, related to the login failure, with the 529
having the most information:

 

Logon Failure:

Reason:Unknown user name or bad password

User Name:   local_username_on_ISAVPN

Domain:ISAVPN

Logon Type: 3

Logon Process: NtLmSsp 

Authentication Package:NTLM

Workstation Name:MYVISTAPC

 

My take on it:  At some point, SMB access has to re-authenticate and is
using the more recent credentials from the VPN connection to talk to my
local servers.  I'm guessing binding order somewhere is the problem, but
where can I find and fix this binding order?  A permanent one-time solution
would be nice, but it's OK if I have to fix it every time after making the
VPN connection.

 

thanks all,

Carl

 

 

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Lose access to local domain servers when connected w/VPN to remote / different Windows domain

2008-12-10 Thread John Gwinner
Is it a default gateway issue?  ISA 2004 can force you to use the
default gateway on the remote side.

 

Also, is it a DNS issue?  When you connect to a VPN, even one that
forces default gateway behavior, the DNS order might be wrong.
Apparently it's a 50/50 issue which DNS server will reply first.

 

I have this problem on my own side, my internal servers have 'corp.com'
DNS settings that resolve to 192.168.x.x. numbers, but when you connect
to the VPN, you get a 66.150.x.x number - outside the firewall, even
though you are on the VPN.  If this is the problem, maybe your DNS gets
confused and your local DC suddenly gets reached via a public IP, which
is blocked.

 

I assume the subnets are separate, i.e. you aren't both using
192.168.0.X.

 

   == John ==
 

From: Carl Houseman [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, December 10, 2008 12:30 PM
To: NT System Admin Issues
Subject: RE: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain

 

No, the usernames and passwords are different, and they must remain that
way.

 

Carl

 

From: Steve Ens [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, December 10, 2008 2:35 PM
To: NT System Admin Issues
Subject: Re: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain

 

You do have a local account on the remote serversame username and
password I presume?

On Wed, Dec 10, 2008 at 1:28 PM, Carl Houseman [EMAIL PROTECTED]
wrote:

This problem has bothered me a long time, and happens daily.  It's so
bothersome, I'll send some Dale  Thomas popcorn to the first person who
can come up with a solution or a tip that quickly (without many hours of
effort on my part) leads to a solution.  Advice such as call Microsoft
does not qualify for the popcorn!

 

Past history:  The problem was seen for Windows XP but seems to be worse
under Vista.  In fact I wrote about it in reference to XP to this list a
year or two ago without any resolution.  Certainly what I'm doing here
can't be that unique, aside from relying on Microsoft-based VPN
solutions... (kindly withhold comments on the worthiness of those
solutions).

 

Goes like this:

 

In my local office, there are two 2003 servers - member and domain
controller.  My everyday Vista SP1 is joined to that domain.  I have
drives mapped to both servers.

 

I use an L2TP/IPSEC VPN connection to connect to a client's network.
The client's VPN gateway is ISA 2006, joined to the client's Windows
domain, but I authenticate for the purpose of the VPN connection using a
local username on the ISA server.  We'll call the ISA server ISAVPN in
further discussion.

 

What happens:  Sooner or later I will be unable to access the drives
mapped to my local domain's servers (UNC references to those servers
also fail).   The error returned when just trying to do anything at the
CMD prompt defaulted to a mapped drive on either server is:

 

Logon failure: unknown user name or bad password.

 

Once I disconnect from ISAVPN, at the very same CMD prompt, I again and
immediately have access to files on my local servers.

 

This seems to affect access to the member server a short time after
connecting to ISAVPN.  Access to files on the domain controller usually
keeps working much longer, but eventually I lose it as well.  This
behavior has guaranteed repeatability 100% of the time.

 

I should note that the domain controller's mapped drive is available
offline but Vista does not switch to offline because of this problem. 

 

Looking in the security event log of the server, I see events 529 and
680 (source Security), in pairs, related to the login failure, with the
529 having the most information:

 

Logon Failure:

Reason:Unknown user name or bad password

User Name:   local_username_on_ISAVPN

Domain:ISAVPN

Logon Type: 3

Logon Process: NtLmSsp 

Authentication Package:NTLM

Workstation Name:MYVISTAPC

 

My take on it:  At some point, SMB access has to re-authenticate and is
using the more recent credentials from the VPN connection to talk to my
local servers.  I'm guessing binding order somewhere is the problem, but
where can I find and fix this binding order?  A permanent one-time
solution would be nice, but it's OK if I have to fix it every time after
making the VPN connection.

 

thanks all,

Carl

 

 

 

 

 

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Lose access to local domain servers when connected w/VPN to remote / different Windows domain

2008-12-10 Thread Dean Sadler
Have you tried un-checking the option to Use default gateway on remote
network, under the general tab of the advanced tcp/ip settings for the
VPN connection?

 

From: Carl Houseman [mailto:[EMAIL PROTECTED] 
Posted At: Wednesday, December 10, 2008 2:28 PM
Posted To: Sunbelt NT
Conversation: Lose access to local domain servers when connected w/VPN
to remote / different Windows domain
Subject: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain

 

This problem has bothered me a long time, and happens daily.  It's so
bothersome, I'll send some Dale  Thomas popcorn to the first person who
can come up with a solution or a tip that quickly (without many hours of
effort on my part) leads to a solution.  Advice such as call Microsoft
does not qualify for the popcorn!

 

Past history:  The problem was seen for Windows XP but seems to be worse
under Vista.  In fact I wrote about it in reference to XP to this list a
year or two ago without any resolution.  Certainly what I'm doing here
can't be that unique, aside from relying on Microsoft-based VPN
solutions... (kindly withhold comments on the worthiness of those
solutions).

 

Goes like this:

 

In my local office, there are two 2003 servers - member and domain
controller.  My everyday Vista SP1 is joined to that domain.  I have
drives mapped to both servers.

 

I use an L2TP/IPSEC VPN connection to connect to a client's network.
The client's VPN gateway is ISA 2006, joined to the client's Windows
domain, but I authenticate for the purpose of the VPN connection using a
local username on the ISA server.  We'll call the ISA server ISAVPN in
further discussion.

 

What happens:  Sooner or later I will be unable to access the drives
mapped to my local domain's servers (UNC references to those servers
also fail).   The error returned when just trying to do anything at the
CMD prompt defaulted to a mapped drive on either server is:

 

Logon failure: unknown user name or bad password.

 

Once I disconnect from ISAVPN, at the very same CMD prompt, I again and
immediately have access to files on my local servers.

 

This seems to affect access to the member server a short time after
connecting to ISAVPN.  Access to files on the domain controller usually
keeps working much longer, but eventually I lose it as well.  This
behavior has guaranteed repeatability 100% of the time.

 

I should note that the domain controller's mapped drive is available
offline but Vista does not switch to offline because of this problem. 

 

Looking in the security event log of the server, I see events 529 and
680 (source Security), in pairs, related to the login failure, with the
529 having the most information:

 

Logon Failure:

Reason:Unknown user name or bad password

User Name:   local_username_on_ISAVPN

Domain:ISAVPN

Logon Type: 3

Logon Process: NtLmSsp 

Authentication Package:NTLM

Workstation Name:MYVISTAPC

 

My take on it:  At some point, SMB access has to re-authenticate and is
using the more recent credentials from the VPN connection to talk to my
local servers.  I'm guessing binding order somewhere is the problem, but
where can I find and fix this binding order?  A permanent one-time
solution would be nice, but it's OK if I have to fix it every time after
making the VPN connection.

 

thanks all,

Carl

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Lose access to local domain servers when connected w/VPN to remote / different Windows domain

2008-12-10 Thread Carl Houseman
All VPN connections are set up that way.   Also ISA is not required to
provoke the problem.  I can get the same thing when SBS 2003 is my VPN
gateway.

 

From: Dean Sadler [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, December 10, 2008 4:10 PM
To: NT System Admin Issues
Subject: RE: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain

 

Have you tried un-checking the option to Use default gateway on remote
network, under the general tab of the advanced tcp/ip settings for the VPN
connection?

 

From: Carl Houseman [mailto:[EMAIL PROTECTED] 
Posted At: Wednesday, December 10, 2008 2:28 PM
Posted To: Sunbelt NT
Conversation: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain
Subject: Lose access to local domain servers when connected w/VPN to remote
/ different Windows domain

 

This problem has bothered me a long time, and happens daily.  It's so
bothersome, I'll send some Dale  Thomas popcorn to the first person who can
come up with a solution or a tip that quickly (without many hours of effort
on my part) leads to a solution.  Advice such as call Microsoft does not
qualify for the popcorn!

 

Past history:  The problem was seen for Windows XP but seems to be worse
under Vista.  In fact I wrote about it in reference to XP to this list a
year or two ago without any resolution.  Certainly what I'm doing here can't
be that unique, aside from relying on Microsoft-based VPN solutions...
(kindly withhold comments on the worthiness of those solutions).

 

Goes like this:

 

In my local office, there are two 2003 servers - member and domain
controller.  My everyday Vista SP1 is joined to that domain.  I have drives
mapped to both servers.

 

I use an L2TP/IPSEC VPN connection to connect to a client's network.   The
client's VPN gateway is ISA 2006, joined to the client's Windows domain, but
I authenticate for the purpose of the VPN connection using a local username
on the ISA server.  We'll call the ISA server ISAVPN in further
discussion.

 

What happens:  Sooner or later I will be unable to access the drives mapped
to my local domain's servers (UNC references to those servers also fail).
The error returned when just trying to do anything at the CMD prompt
defaulted to a mapped drive on either server is:

 

Logon failure: unknown user name or bad password.

 

Once I disconnect from ISAVPN, at the very same CMD prompt, I again and
immediately have access to files on my local servers.

 

This seems to affect access to the member server a short time after
connecting to ISAVPN.  Access to files on the domain controller usually
keeps working much longer, but eventually I lose it as well.  This behavior
has guaranteed repeatability 100% of the time.

 

I should note that the domain controller's mapped drive is available
offline but Vista does not switch to offline because of this problem. 

 

Looking in the security event log of the server, I see events 529 and 680
(source Security), in pairs, related to the login failure, with the 529
having the most information:

 

Logon Failure:

Reason:Unknown user name or bad password

User Name:   local_username_on_ISAVPN

Domain:ISAVPN

Logon Type: 3

Logon Process: NtLmSsp 

Authentication Package:NTLM

Workstation Name:MYVISTAPC

 

My take on it:  At some point, SMB access has to re-authenticate and is
using the more recent credentials from the VPN connection to talk to my
local servers.  I'm guessing binding order somewhere is the problem, but
where can I find and fix this binding order?  A permanent one-time solution
would be nice, but it's OK if I have to fix it every time after making the
VPN connection.

 

thanks all,

Carl

 

 

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Lose access to local domain servers when connected w/VPN to remote / different Windows domain

2008-12-10 Thread Benjamin Zachary - Lists
You've tried changing the provider order under advanced networking? I don't
terminate to isa boxes but other vpn products (I commonly use Sonicwall) do
not have this feature, so it might be something along the ISA lines (AD
integrated or RADIUS?)  I do work with several ISA boxes and I guess I could
try to confirm/repeat the issue. 

 

What if you do a net use x: \\localserver\share
file:///\\localserver\share  /user:[EMAIL PROTECTED] password ?? after you
receive that error? Unless the security policy of the domain does not allow
that connection (I forget which option it is under Security Policy) you
should be able to present different credentials manually.




 

From: Carl Houseman [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, December 10, 2008 15:30
To: NT System Admin Issues
Subject: RE: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain

 

No, the usernames and passwords are different, and they must remain that
way.

 

Carl

 

From: Steve Ens [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, December 10, 2008 2:35 PM
To: NT System Admin Issues
Subject: Re: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain

 

You do have a local account on the remote serversame username and
password I presume?

On Wed, Dec 10, 2008 at 1:28 PM, Carl Houseman [EMAIL PROTECTED] wrote:

This problem has bothered me a long time, and happens daily.  It's so
bothersome, I'll send some Dale  Thomas popcorn to the first person who can
come up with a solution or a tip that quickly (without many hours of effort
on my part) leads to a solution.  Advice such as call Microsoft does not
qualify for the popcorn!

 

Past history:  The problem was seen for Windows XP but seems to be worse
under Vista.  In fact I wrote about it in reference to XP to this list a
year or two ago without any resolution.  Certainly what I'm doing here can't
be that unique, aside from relying on Microsoft-based VPN solutions...
(kindly withhold comments on the worthiness of those solutions).

 

Goes like this:

 

In my local office, there are two 2003 servers - member and domain
controller.  My everyday Vista SP1 is joined to that domain.  I have drives
mapped to both servers.

 

I use an L2TP/IPSEC VPN connection to connect to a client's network.   The
client's VPN gateway is ISA 2006, joined to the client's Windows domain, but
I authenticate for the purpose of the VPN connection using a local username
on the ISA server.  We'll call the ISA server ISAVPN in further
discussion.

 

What happens:  Sooner or later I will be unable to access the drives mapped
to my local domain's servers (UNC references to those servers also fail).
The error returned when just trying to do anything at the CMD prompt
defaulted to a mapped drive on either server is:

 

Logon failure: unknown user name or bad password.

 

Once I disconnect from ISAVPN, at the very same CMD prompt, I again and
immediately have access to files on my local servers.

 

This seems to affect access to the member server a short time after
connecting to ISAVPN.  Access to files on the domain controller usually
keeps working much longer, but eventually I lose it as well.  This behavior
has guaranteed repeatability 100% of the time.

 

I should note that the domain controller's mapped drive is available
offline but Vista does not switch to offline because of this problem. 

 

Looking in the security event log of the server, I see events 529 and 680
(source Security), in pairs, related to the login failure, with the 529
having the most information:

 

Logon Failure:

Reason:Unknown user name or bad password

User Name:   local_username_on_ISAVPN

Domain:ISAVPN

Logon Type: 3

Logon Process: NtLmSsp 

Authentication Package:NTLM

Workstation Name:MYVISTAPC

 

My take on it:  At some point, SMB access has to re-authenticate and is
using the more recent credentials from the VPN connection to talk to my
local servers.  I'm guessing binding order somewhere is the problem, but
where can I find and fix this binding order?  A permanent one-time solution
would be nice, but it's OK if I have to fix it every time after making the
VPN connection.

 

thanks all,

Carl

 

 

 

 

 

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Lose access to local domain servers when connected w/VPN to remote / different Windows domain

2008-12-10 Thread Carl Houseman
The default DNS after connecting (the one that NSLOOKUP identifies) is a
server on the client network's in the client's AD domain, which has a
completely different set of authentication credentials - different from my
local domain, and different from the VPN gateway.

 

Just to re-cap...

 

1. I authenticate to my local domain first on logging into Windows.

2. Then I authenticate to the remote VPN gateway server via the VPN
connection.

3. Then I authenticate to the remote Windows servers by supplying a 3rd set
of credentials on the NET USE command line.

 

If anything, I'd expect that the more recent credentials - from item (3) -
would be attempted for re-authentication to my local domain.   But no, it's
the ones from the VPN connection (2), that get tried.

 

So I'm highly doubtful of a DNS issue, but there's one scenario I haven't
tried in attempt to prove it, and that would be to map a drive using the
local server's IP address and see if that also goes away when the ones
mapped by name go away.  I will give that a try ASAP...

 

Carl

 

From: John Gwinner [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, December 10, 2008 3:57 PM
To: NT System Admin Issues
Subject: RE: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain

 

Is it a default gateway issue?  ISA 2004 can force you to use the default
gateway on the remote side.

 

Also, is it a DNS issue?  When you connect to a VPN, even one that forces
default gateway behavior, the DNS order might be wrong.  Apparently it's a
50/50 issue which DNS server will reply first.

 

I have this problem on my own side, my internal servers have 'corp.com' DNS
settings that resolve to 192.168.x.x. numbers, but when you connect to the
VPN, you get a 66.150.x.x number - outside the firewall, even though you are
on the VPN.  If this is the problem, maybe your DNS gets confused and your
local DC suddenly gets reached via a public IP, which is blocked.

 

I assume the subnets are separate, i.e. you aren't both using 192.168.0.X.

 

   == John ==
 

From: Carl Houseman [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, December 10, 2008 12:30 PM
To: NT System Admin Issues
Subject: RE: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain

 

No, the usernames and passwords are different, and they must remain that
way.

 

Carl

 

From: Steve Ens [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, December 10, 2008 2:35 PM
To: NT System Admin Issues
Subject: Re: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain

 

You do have a local account on the remote serversame username and
password I presume?

On Wed, Dec 10, 2008 at 1:28 PM, Carl Houseman [EMAIL PROTECTED] wrote:

This problem has bothered me a long time, and happens daily.  It's so
bothersome, I'll send some Dale  Thomas popcorn to the first person who can
come up with a solution or a tip that quickly (without many hours of effort
on my part) leads to a solution.  Advice such as call Microsoft does not
qualify for the popcorn!

 

Past history:  The problem was seen for Windows XP but seems to be worse
under Vista.  In fact I wrote about it in reference to XP to this list a
year or two ago without any resolution.  Certainly what I'm doing here can't
be that unique, aside from relying on Microsoft-based VPN solutions...
(kindly withhold comments on the worthiness of those solutions).

 

Goes like this:

 

In my local office, there are two 2003 servers - member and domain
controller.  My everyday Vista SP1 is joined to that domain.  I have drives
mapped to both servers.

 

I use an L2TP/IPSEC VPN connection to connect to a client's network.   The
client's VPN gateway is ISA 2006, joined to the client's Windows domain, but
I authenticate for the purpose of the VPN connection using a local username
on the ISA server.  We'll call the ISA server ISAVPN in further
discussion.

 

What happens:  Sooner or later I will be unable to access the drives mapped
to my local domain's servers (UNC references to those servers also fail).
The error returned when just trying to do anything at the CMD prompt
defaulted to a mapped drive on either server is:

 

Logon failure: unknown user name or bad password.

 

Once I disconnect from ISAVPN, at the very same CMD prompt, I again and
immediately have access to files on my local servers.

 

This seems to affect access to the member server a short time after
connecting to ISAVPN.  Access to files on the domain controller usually
keeps working much longer, but eventually I lose it as well.  This behavior
has guaranteed repeatability 100% of the time.

 

I should note that the domain controller's mapped drive is available
offline but Vista does not switch to offline because of this problem. 

 

Looking in the security event log of the server, I see events 529 and 680
(source Security), in pairs, related to the login failure, with the 529
having the most

RE: Lose access to local domain servers when connected w/VPN to remote / different Windows domain

2008-12-10 Thread Joe Tinney
My co-worker experienced this exact problem when he moved to Vista and
was connecting to his home VPN connection (a non-Microsoft VPN
end-point, I believe it was a DDWRT-based router, but still using PPTP).
After a random amount of time his mapped network drives would cease to
authenticate. He had to disconnect, open the shares, then reconnect to
the VPN to get the behavior to stop temporarily. He investigated it some
and said that he found wide reports of problems but no solutions. He has
since moved back to Windows XP (it was a deal breaker for him, it seems)
and has not had the problem since. He noted that during his testing that
the VPN username and password combination relative to his domain
username and password combination had no bearing on the occurrence of
the problem and suspected that it was, instead, from an inability of the
system to actually determine which credentials the resource needed so it
gave the most recent ones.

 

Have you tried adding the network shares using their FQDN (in hopes that
the system would see that and then use credentials for that domain vs.
the other)?

 

- Sidebar for John Gwinner's DNS comments

The workaround in http://support.microsoft.com/kb/311218 has resolved
those issues on our Windows XP SP2 machines beautifully. Our users were
having issues accessing internal resources by name while on the VPN. It
was sporadic and inconsistent. It seemed to depend on the state of their
DNS Cache and if the system had to look up the address it was using
their router/modem's DNS servers instead of the ones provided by our
network. With the ISP's now responding to DNS requests that don't
actually have domains (ala the 'DNS Redirection Search Feature') it was
never failing and thus never trying the secondary DNS servers. I've
found that you need to reconnect to the VPN after you make the registry
change and you may also have to clear your DNS cache. I have not had to
reboot for this to take effect. So far it has been a one-time change and
not (as I had feared) a per-connection change.

 

From: Carl Houseman [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, December 10, 2008 4:30 PM
To: NT System Admin Issues
Subject: RE: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain

 

The default DNS after connecting (the one that NSLOOKUP identifies) is a
server on the client network's in the client's AD domain, which has a
completely different set of authentication credentials - different from
my local domain, and different from the VPN gateway.

 

Just to re-cap...

 

1. I authenticate to my local domain first on logging into Windows.

2. Then I authenticate to the remote VPN gateway server via the VPN
connection.

3. Then I authenticate to the remote Windows servers by supplying a 3rd
set of credentials on the NET USE command line.

 

If anything, I'd expect that the more recent credentials - from item (3)
- would be attempted for re-authentication to my local domain.   But no,
it's the ones from the VPN connection (2), that get tried.

 

So I'm highly doubtful of a DNS issue, but there's one scenario I
haven't tried in attempt to prove it, and that would be to map a drive
using the local server's IP address and see if that also goes away when
the ones mapped by name go away.  I will give that a try ASAP...

 

Carl

 

From: John Gwinner [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, December 10, 2008 3:57 PM
To: NT System Admin Issues
Subject: RE: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain

 

Is it a default gateway issue?  ISA 2004 can force you to use the
default gateway on the remote side.

 

Also, is it a DNS issue?  When you connect to a VPN, even one that
forces default gateway behavior, the DNS order might be wrong.
Apparently it's a 50/50 issue which DNS server will reply first.

 

I have this problem on my own side, my internal servers have 'corp.com'
DNS settings that resolve to 192.168.x.x. numbers, but when you connect
to the VPN, you get a 66.150.x.x number - outside the firewall, even
though you are on the VPN.  If this is the problem, maybe your DNS gets
confused and your local DC suddenly gets reached via a public IP, which
is blocked.

 

I assume the subnets are separate, i.e. you aren't both using
192.168.0.X.

 

   == John ==
 

From: Carl Houseman [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, December 10, 2008 12:30 PM
To: NT System Admin Issues
Subject: RE: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain

 

No, the usernames and passwords are different, and they must remain that
way.

 

Carl

 

From: Steve Ens [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, December 10, 2008 2:35 PM
To: NT System Admin Issues
Subject: Re: Lose access to local domain servers when connected w/VPN to
remote / different Windows domain

 

You do have a local account on the remote serversame username and
password I presume

Re: Lose access to local domain servers when connected w/VPN to remote / different Windows domain

2008-12-10 Thread Kurt Buff
Start at the beginning...

When this problem occurs, can you ping the hard-to-reach server by IP
address? What does 'ping -a ip.add.re.ss' reveal? If those work, ping
by name, but if those fail, what does tracert reveal? What does
ipconfig /all reveal - as others have voiced, I have my suspicions
about the default gateway being set to the remote network, but first
things first.

Kurt

On Wed, Dec 10, 2008 at 11:28 AM, Carl Houseman [EMAIL PROTECTED] wrote:
 This problem has bothered me a long time, and happens daily.  It's so
 bothersome, I'll send some Dale  Thomas popcorn to the first person who can
 come up with a solution or a tip that quickly (without many hours of effort
 on my part) leads to a solution.  Advice such as call Microsoft does not
 qualify for the popcorn!



 Past history:  The problem was seen for Windows XP but seems to be worse
 under Vista.  In fact I wrote about it in reference to XP to this list a
 year or two ago without any resolution.  Certainly what I'm doing here can't
 be that unique, aside from relying on Microsoft-based VPN solutions...
 (kindly withhold comments on the worthiness of those solutions).



 Goes like this:



 In my local office, there are two 2003 servers – member and domain
 controller.  My everyday Vista SP1 is joined to that domain.  I have drives
 mapped to both servers.



 I use an L2TP/IPSEC VPN connection to connect to a client's network.   The
 client's VPN gateway is ISA 2006, joined to the client's Windows domain, but
 I authenticate for the purpose of the VPN connection using a local username
 on the ISA server.  We'll call the ISA server ISAVPN in further
 discussion.



 What happens:  Sooner or later I will be unable to access the drives mapped
 to my local domain's servers (UNC references to those servers also fail).
  The error returned when just trying to do anything at the CMD prompt
 defaulted to a mapped drive on either server is:



 Logon failure: unknown user name or bad password.



 Once I disconnect from ISAVPN, at the very same CMD prompt, I again and
 immediately have access to files on my local servers.



 This seems to affect access to the member server a short time after
 connecting to ISAVPN.  Access to files on the domain controller usually
 keeps working much longer, but eventually I lose it as well.  This behavior
 has guaranteed repeatability 100% of the time.



 I should note that the domain controller's mapped drive is available
 offline but Vista does not switch to offline because of this problem.



 Looking in the security event log of the server, I see events 529 and 680
 (source Security), in pairs, related to the login failure, with the 529
 having the most information:



 Logon Failure:

 Reason:Unknown user name or bad password

 User Name:   local_username_on_ISAVPN

 Domain:ISAVPN

 Logon Type: 3

 Logon Process: NtLmSsp

 Authentication Package:NTLM

 Workstation Name:MYVISTAPC



 My take on it:  At some point, SMB access has to re-authenticate and is
 using the more recent credentials from the VPN connection to talk to my
 local servers.  I'm guessing binding order somewhere is the problem, but
 where can I find and fix this binding order?  A permanent one-time solution
 would be nice, but it's OK if I have to fix it every time after making the
 VPN connection.



 thanks all,

 Carl





~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~