Okay, so basically I can think of a few quickish options: 1. Let somebody who geeks out on this stuff poke around in your DCs. There are obviously lots of caveats around that one (like, why would you let a stranger poke around in your AD, why would somebody want to take on that liability, how would you determine that somebody wasn't a cluebie, etc.) 2. Call PSS and get the benefit of all the warranties and liabilities that come with the support agreement, and let them poke around in your AD. 3. Find a willing geek to get on the phone with you, 'cause typing all this stuff up has to be as difficult for you as it is for the people trying to make heads or tails of the situation. 4. Scrap trying to track down the problem and demote the problem DC, then re-promote it. I hate offering that as a solution as I usually like to dig around and figure out what's causing things, but in this situation it's really hard to troubleshoot your environment simply because there are so many different factors that could come into play that would need to be looked at. And honestly, this smells like there was an imaged DC or something similar somewhere along the line. I believe you that there wasn't; it's just the same kind of behavior that you see in scenarios like that. Wait, hold on a sec... what does "a parallel upgrade" mean? Laura
_____ From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of hboogz Sent: Thursday, November 16, 2006 5:10 PM To: [email protected] Subject: Re: [ActiveDir] Kerberos is Killing Me! Hey Laura, this is the strange DC error guy...unfortunately. This DC existed for about 4 months. I did a parralle upgrade to 2003 with a new box and promoting it into a windows 2000 domain using adprep /forestprep and adprep /domainprep:gprep. There has never been use of duplicate names. this DC was never restored from a backup. there never has been a duplicate name for any member servers nor have their been any backup restores... I'm able to update DNS registration from this maindc now, because i needed to enable the DHCP client service on the machine. I've tried the following from the problmatic DC: net stop kdc purge kerberos ticket cache using kerbtray reset pwd using netdom net start kdc reboot but i continue to get Replication access denied from one DC to all three of my DC's. I've tried the same as above from a second DC without removing the ticket cahce, but still get the same errors from the phmaindc1 DC. All other DC's replicate with this DC just fine. i've checked the zones through dnscmd and made sure they are alike with regard to zone type.dnscmd /enumzones C:\>dnscmd /enumzones Enumerated zone list: Zone count = 5 Zone name Type Storage Properties . Cache AD-Domain 168.192.in-addr.arpa Primary AD-Domain Update Rev Aging 31.168.192.in-addr.arpa Secondary File Rev HYPERLINK "http://jacwf.phippsny.org"jacwf.phippsny.org Secondary File HYPERLINK "http://phippsny.org"phippsny.org Primary AD-Domain Update Aging Command completed successfully. above is PHMAINDC1 Below is PHPRINT1 C:\>dnscmd /enumzones Enumerated zone list: Zone count = 5 Zone name Type Storage Properties . Cache AD-Domain 168.192.in-addr.arpa Primary AD-Domain Update Rev Aging 31.168.192.in-addr.arpa Secondary File Rev HYPERLINK "http://jacwf.phippsny.org"jacwf.phippsny.org Secondary File HYPERLINK "http://phippsny.org"phippsny.org Primary AD-Domain Update Aging Command completed successfully. =\ i'm stuck. On 11/16/06, Laura A. Robinson <HYPERLINK "mailto:[EMAIL PROTECTED]" [EMAIL PROTECTED]> wrote: Is this the same set of machines that are being talked about in the "strange DC error" thread? I don't remember who it was who originated that one and I want to make sure I'm not asking for something you've already provided. So, if the answer to the above is "no", my next question is, can you provide a little more information about the environment? How long has this DC existed as a DC? Was there ever another DC with the same name? Was this DC at any point restored from a backup? Has it been consistently connected to the network? How about the member server- same questions as the DC questions. Thanks, Laura _____ From: HYPERLINK "mailto:[EMAIL PROTECTED]" [EMAIL PROTECTED] [mailto:HYPERLINK "mailto:[EMAIL PROTECTED]" [EMAIL PROTECTED] On Behalf Of hboogz Sent: Thursday, November 16,HYPERLINK "javascript:void(0)" 2006 12 :09 PM To: HYPERLINK "mailto:[email protected]" [EMAIL PROTECTED] Subject: [ActiveDir] Kerberos is Killing Me! I am having continued issues with Kerberos. I tried running tokensz against the problem server and i get this error message.. C:\Tools>tokensz /compute_tokensize /package:negotiate /use_delegation /target_s erver:host/phmaindc1 Name: Negotiate Comment: Microsoft Package Negotiator Current PackageInfo->MaxToken: 12128 Asked for delegate, but didn't get it. Check if server is trusted for delegation. QueryKeyInfo: Signature algorithm = Encrypt algorithm = RSADSI RC4 KeySize = 128 Flags = 2001c Signature Algorithm = -138 Encrypt Algorithm = 26625 QueryContextAttributes (lifespan): Status =HYPERLINK "javascript:void(0)" 2148074242 0x80090302 SEC_E_NOT_SUPP ORTED any ideas ? I keep getting the following event log message on a domain controller which prevents users from accessing it and authenticating to it. Event Type: Error Event Source: Kerberos Event Category: None Event ID: 4 Date: 11/16/2006 Time: 12:02:37 PM User: N/A Computer: PHMAINDC1 Description: The kerberos client received a KRB_AP_ERR_MODIFIED error from the server host/phmaindc1.phippsny.org. The target name used was host/phprint1. This indicates that the password used to encrypt the kerberos service ticket is different than that on the target server. Commonly, this is due to identically named machine accounts in the target realm ( HYPERLINK "http://PHIPPSNY.ORG" \nPHIPPSNY.ORG), and the client realm. Please contact your system administrator. For more information, see Help and Support Center at HYPERLINK "http://go.microsoft.com/fwlink/events.asp" \nhttp://go.microsoft.com/fwlink/events.asp. Help! -- HBooGz:\> -- HBooGz:\> -- No virus found in this incoming message. Checked by AVG Free Edition. -- No virus found in this outgoing message. Checked by AVG Free Edition.
