DSfW: xadsd crashes in rpc__cn_binding_inq_addr () due to failed NTLMSSP authentication requests

  • 7011514
  • 12-Dec-2012
  • 12-Dec-2012

Environment

Open Enterprise Server 11SP1 (OES11SP1)
Domain Services for Windows
DSfW

Situation

Some of the workstations try to send NTLMSSP authentication requests in the following sequence and fail to authenticate and the requests go in loop,
1. BIND (C->S)
2. BIND-ACK (S->C)
3. BIND (C->S)
4. BIND-ACK (S->C)
5. AUTH3 (C->S)
6. FAULT (S->C)
 All the above 6 steps are looped over. The steps 1 and 2 are redundant and incomplete. This incomplete exchange is leaving the association group in the 
stuck state and hence the resource exhaustion.
One of the stack show,
#0  0x00002aaaaabdf9f2 in rpc__cn_binding_inq_addr ()
    from 
/opt/novell/xad/lib64/libprot_ncacn.so
 #1  0x00002b95f3ead0d3 in rpc_binding_to_string_binding ()
    from 
/opt/novell/xad/lib64/libdcerpc.so.1
 #2  0x00002b95f258f622 in xad_sec_handle_is_local ()
    from 
/opt/novell/xad/lib64/libxadsdk.so.2
 #3  0x00002b95f533ffe9 in xad_lsa_policy_handle_new ()
    from 
/opt/novell/xad/lib64/libxadlsa.so
 #4  0x00002b95f53403bd in LsapOpenPolicy ()
    from 
/opt/novell/xad/lib64/libxadlsa.so
 #5  0x00002b95f5340966 in LsarOpenPolicy2 ()
    from 
/opt/novell/xad/lib64/libxadlsa.so
 #6  0x00002b95f5356140 in op44_ssr ()
    from 
/opt/novell/xad/lib64/libxadlsa.so
 #7  0x00002aaaaabe69d9 in rpc__cn_call_executor ()
    from 
/opt/novell/xad/lib64/libprot_ncacn.so

Resolution

Apply November 2012 Maintenance Patch

Cause

The NTLM2 seal and sign verification in NTLMSSP is failing for NTLMv1 authentication protocol. As a result of this some 20 odd workstations repeatedly send the DCERPC BIND (using NTLMSSP) packets. This generated a lot of load on xadsd and have caused some crashes that are not consistently reproducible.

Feedback service temporarily unavailable. For content questions or problems, please contact Support.