Link to home
Start Free TrialLog in
Avatar of bleujaegel
bleujaegel

asked on

Event ID 529 failure origin

Does anyone have any idea where this Event ID 529 failure would originate from?  Server1 is a physically secured W2K3 server, yet I am getting a failure that doesn't have a source IP or port.  There were around 100 failures in the logs within the range of a minute or so.  My guess is that someone is intentionally masking this information.   But HOW?  The server has Exchange, OWA, and a VPN running on it.  Ports 25, 80, and 1723 are open currently.  Any ideas?

Logon Failure:
       Reason:            Unknown user name or bad password
       User Name:      notused
       Domain:            
       Logon Type:      3
       Logon Process:      Advapi  
       Authentication Package:      MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
       Workstation Name:      Server1
       Caller User Name:      Server1$
       Caller Domain:      MYDOMAIN
       Caller Logon ID:      (0x0,0x3E7)
       Caller Process ID:      1920
       Transited Services:      -
       Source Network Address:      -
       Source Port:      -
Avatar of Toni Uranjek
Toni Uranjek
Flag of Slovenia image

Hi!

Check process ID number. Which proces has PID 1920 on your server?

Toni
Avatar of bleujaegel
bleujaegel

ASKER

It is inetinfo.exe.
Well, then you will have to check IIS logs in C:\WINDOWS\system32\LogFiles folder. Check the traffic which is related to your events in Event Viewer. You wil get at least IP number. If the IP number is external and you are actually being attacked, you can prohibit traffic from that IP on your firewall (hopefully) or report attack to ISP to which was this IP assigned.
Checking IIS logs is easier with log analyzer utilities, but in this case you have the time of the event so it shouldn't be hard for you to find event related traffic.
And if this is not attack related traffic, then you might to check out this KB article: How to troubleshoot Kerberos related issues in IIS: http://support.microsoft.com/kb/326985
The logfile doesn't show an entry at the time indicated in the event logs.  
ASKER CERTIFIED SOLUTION
Avatar of Toni Uranjek
Toni Uranjek
Flag of Slovenia image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
It isn't logging anything at that time related to the attempt.  Someone has tried again, so it is not related to the last article.  Someone is intentionally trying to get in.
SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Believe me, I've tried that.  When I connect to it remotely with a bad password, I get:

Logon Failure:
       Reason:            Unknown user name or bad password
       User Name:      hacker
       Domain:            mail.domain.org
       Logon Type:      3
       Logon Process:      NtLmSsp
       Authentication Package:      NTLM
       Workstation Name:      WS07
       Caller User Name:      -
       Caller Domain:      -
       Caller Logon ID:      -
       Caller Process ID:      -
       Transited Services:      -
       Source Network Address:       1.1.1.1
       Source Port:      19133

The person attempting leaves a failure audit as shown in my original post.  Any other ideas?
Here is a VPN failed attempt:
Logon Failure:
       Reason:            Unknown user name or bad password
       User Name:      hacker
       Domain:            DOMAIN
       Logon Type:      3
       Logon Process:      IAS
       Authentication Package:      MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
       Workstation Name:      
       Caller User Name:      SERVER$
       Caller Domain:      DOMAIN
       Caller Logon ID:      (0x0,0x3E7)
       Caller Process ID:      868
       Transited Services:      -
       Source Network Address:      -
       Source Port:      -
This conceals the source information, but uses IAS instead of ADVAPI, so it's not it either.  Terminal user has different logon type numbers all together, so it isn't it.

I finally figured out the problem.  It is failed SMTP authentication attempts.  In other words, people trying to use us as an open relay.  I verified this by using Outlook Express to create a remote email account via pop.  I enabled SMTP authentication, and checked the server logs after it failed.  It was an exact match.  Also, I get the same failure audits using telnet:

C:\> telnet mail.mydomain.com 25
ehlo mydomain.com
auth login (this is SMTP AUTH encrypted).
334 VXNlcm5hbWU6 (output from server)
Ymx1dWVuY29kZWQ=  (Base64 encoded username see below.)
334 UGFzc3dvcmQ6 (output from server)
Mypassword
535 5.7.3 Authentication unsuccessful.

I used the binary encoder at http://www.webpan.com/customers/Email/base64_conversion.htm to
generate the Base64 encrypted username.