Skip to content

Commit 902651a

Browse files
authored
Merge pull request #4830 from kaikeguc/patch-1
AB#180532: Update ldap-kerberos-server-reset-tcp-sessions.md
2 parents bdc008d + 50ef75b commit 902651a

4 files changed

Lines changed: 60 additions & 51 deletions

File tree

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5897,6 +5897,11 @@
58975897
"redirect_url": "/troubleshoot/sql/database-engine/install/windows/sql-server-upgrade-failed-error-574",
58985898
"redirect_document_id": true
58995899
},
5900+
{
5901+
"source_path": "support/windows-server/identity/ldap-kerberos-server-reset-tcp-sessions.md",
5902+
"redirect_url": "/troubleshoot/windows-server/identity/ldap-kerberos-server-not-respond-udp-request-reset-tcp-sessions",
5903+
"redirect_document_id": true
5904+
},
59005905
{
59015906
"source_path": "support/azure/azure-functions/index.md",
59025907
"redirect_url": "/troubleshoot/azure/azure-functions/welcome-azure-functions",
Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
---
2+
title: LDAP and Kerberos Server not respond to UDP requests or reset TCP sessions
3+
description: Fixes an issue where TCP sessions created to the server ports 88, 464, 389 and 3268 are reset. Sessions using Secure Sockets Layer or Transport Layer Security on ports 636 and 3269 are also affected.
4+
ms.date: 09/07/2023
5+
author: Deland-Han
6+
ms.author: delhan
7+
manager: dcscontentpm
8+
audience: itpro
9+
ms.topic: troubleshooting
10+
ms.prod: windows-server
11+
localization_priority: medium
12+
ms.reviewer: kaushika
13+
ms.custom: sap:domain-controller-scalability-or-performance-including-ldap, csstroubleshoot
14+
ms.technology: windows-server-active-directory
15+
---
16+
# LDAP and Kerberos Server may not respond to UDP requests or reset TCP sessions immediately after creation
17+
18+
This article provides a solution to an issue where Transmission Control Protocol (TCP) sessions created to the server ports 88, 464, 389 and 3268 are reset. Sessions using Secure Sockets Layer (SSL) or Transport Layer Security (TLS) on ports 636 and 3269 are also affected.
19+
20+
You may also notice requests on User Datagram Protocol (UDP) ports 88 and 464 don't get a response.
21+
22+
_Applies to:_   Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, Windows Server 2012
23+
_Original KB number:_   2000061
24+
25+
You're running the Windows Server roles Active Directory Domain Services (AD DS) or Active Directory Lightweight Directory Services (AD LDS). Sporadically, you experience a situation where TCP sessions created to the server ports 88, 464, 389 and 3268 are reset. Sessions using Secure Sockets Layer (SSL) or Transport Layer Security (TLS) on ports 636 and 3269 are also affected.
26+
27+
In a trace of the network traffic, you can see the frame with the TCP RESET (or RST) is sent by the server almost immediately after the session is established using the TCP three-way handshake. The client might be able to send some request data before the RESET is sent, but this request isn't responded to nor is the data acknowledged.
28+
29+
In the case of UDP, you can see requests on ports 88 and 464 don't get a response.
30+
31+
## Incorrect idle session monitoring
32+
33+
The library that manages the TCP sessions for the LDAP Server and the Kerberos Key Distribution Center (KDC) uses a scavenging thread to monitor sessions that are inactive, and disconnects these sessions if they're idle for too long. The scavenging thread runs every 30 seconds to clean out these sessions.
34+
35+
The KDC registry entry `NewConnectionTimeout` controls the idle time, using a default of 10 seconds. However, based on the implementation of the scavenging, the effective interval is 0-30 seconds. Therefore newly created sessions may be disconnected immediately by the server sporadically.
36+
37+
## Reset NewConnectionTimeout
38+
39+
For the KDC ports, many clients, including the Windows Kerberos client, will perform a retry and then get a full timer tick to work on the session. LDAP applications have a higher chance of considering the connection reset a fatal failure.
40+
41+
When you set `NewConnectionTimeout` to 40 or higher, you receive a time-out window of 30-90 seconds. When you use 70 or higher, you receive 60-120 seconds for the time-out. For more information about the `NewConnectionTimeout` registry value, see [Kerberos protocol registry entries and KDC configuration keys in Windows](../windows-security/kerberos-protocol-registry-kdc-configuration-keys.md).
42+
43+
## KDC might not respond to certain UDP Kerberos authentication requests
44+
45+
You're running the Windows Server role AD DS. The client sends a Kerberos authentication or password change request from source port 22528/UDP or 53249/UDP, but the KDC might not respond.
46+
47+
> [!NOTE]
48+
> The Microsoft Kerberos client uses TCP Kerberos authentication by default since Windows Vista. Therefore, this issue likely occurs only with third-party products that use UDP for Kerberos requests.
49+
50+
The KDC has a built-in protection against request loops and blocks Kerberos authentication requests on source ports 88/UDP and 464/UDP. However, the implementation has a bug in byte ordering, so source ports 22528/UDP and 53249/UDP are blocked.
51+
52+
You have to exclude 22528/UDP and 53249/UDP from the ephemeral port range of UDP on the client.
53+

support/windows-server/identity/ldap-kerberos-server-reset-tcp-sessions.md

Lines changed: 0 additions & 49 deletions
This file was deleted.

support/windows-server/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -392,8 +392,8 @@
392392
href: ./identity/troubleshoot-high-lsass.exe-cpu-utilization.md
393393
- name: Issues when AD replication and Netlogon RPCs request backlog values are exceeded
394394
href: ./identity/issues-ad-replication-netlogon-rpcs-request-backlog-values-exceeded.md
395-
- name: LDAP and Kerberos servers reset TCP sessions
396-
href: ./identity/ldap-kerberos-server-reset-tcp-sessions.md
395+
- name: LDAP and Kerberos servers not respond to UDP requests or reset TCP sessions
396+
href: ./identity/ldap-kerberos-server-not-respond-udp-request-reset-tcp-sessions.md
397397
- name: Performance issues after you upgrade DCs
398398
href: ./identity/dc-delayed-response-to-ldap-kerberos-request.md
399399
- name: Use Event1644Reader.ps1 to analyze LDAP query performance

0 commit comments

Comments
 (0)