Active Directory
--
Questions
--
Followers
Top Experts
- 3 Active Directory DC's, 2 of which are also DNS servers.
- One DNS server is windows 2000 and one is 2003
- AD Integrated DNS.
Server 2003 machine has an IP of 192.168.1.253
Server 2000 machine has an IP of 192.168.1.2
DNS TCP-IP settings on 192.168.1.253 are it points to itself first and 192.168.1.2 second.
DNS TCP/IP settings on 192.168.1.2 are it points to itself first and 192.168.1.253 second
I'm getting event ID's 5504 and 5505.
"The DNS server encountered an invalid domain name in a packet from 192.168.1.253."
"The DNS server encountered a domain name exceeding the maximum length in the packet."
This is obviously weird and 192.168.1.253 is one of my DNS servers.
- - - - - - - - - - - - - - - - - - - - - - - - - - - -
Running NETDIAG on 192.168.1.2
PASS - All the DNS entries for DC are registered on DNS server '192.168.1.2' and other DCs also have some of the names registered.
PASS - All the DNS entries for DC are registered on DNS server '192.168.1.253' and other DCs also have some of the names registered.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Running NETDIAG on 192.168.1.253 DNS test also passes.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
** Running NETDIAG on my other DC that isnt a DNS server gives me a strange result.**
DNS test . . . . . . . . . . . . . : Passed
[WARNING] Cannot find a primary authoritative DNS server for the name
'adminserver.gilroygannon.
The name 'adminserver.gilroygannon.
PASS - All the DNS entries for DC are registered on DNS server '192.168.1.2' and other DCs also have some of the names registered.
PASS - All the DNS entries for DC are registered on DNS server '192.168.1.253' and other DCs also have some of the names registered.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
I've tried the REGISTERDNS command on this DC however it still gives this netdiag error.
I havent made any recent DNS changes so I'm concerned mainly why I'm getting errors about bad packets from one of my own internal DNS servers. I sometimes get a few from external addresses but this hasnt been a problem. My own one might. Any theories where I need to check next?
Zero AI Policy
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
Hey,
It would be nice to know what request it's actually making.
To find that you'd need to turn on Debug Logging. You can do that by opening the DNS Console, head to Properties for the Server, then the Debug Logging tab.
That will allow us to capture the request it's actually making.
Chris
You would normally have that ticked, yes. Are there any other network interfaces on that server?
Chris






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
I turned on the logging and a few events have just occured. They're only the same however as is in the event log:
DNS Server log file creation at 18/02/2008 11:10:42 UTC
Log file wrap at 19/02/2008 11:24:32
Message logging key (for packets - other items use a subset of these fields):
Field # Information Values
------- ----------- ------
1 Date (in yyyymmdd format)
2 Time (in 24-hour hh:mm:ss format)
3 Thread ID
4 Context
5 UDP/TCP indicator
6 Send/Receive indicator
7 Remote IP
8 Xid (hex)
9 Query/Response R = Response
blank = Query
10 Opcode Q = Standard Query
N = Notify
U = Update
? = Unknown
11 [ Flags (hex)
12 Flags (char codes) A = Authoritative Answer
T = Truncated Response
D = Recursion Desired
R = Recursion Available
13 ResponseCode ]
14 Question Name
20080219 11:34:57 FE0 EVENT The DNS server encountered a domain name exceeding the maximum length in the
packet from 192.168.1.253.
The event data contains the DNS packet.
20080219 11:34:57 FE0 EVENT The DNS server encountered an invalid domain name in a packet from 192.168.1.253.
The packet will be rejected.
The event data contains the DNS packet.
20080219 11:34:57 FE0 EVENT The DNS server encountered a domain name exceeding the maximum length in the
packet from 192.168.1.253.
The event data contains the DNS packet.
20080219 11:34:57 FE0 EVENT The DNS server encountered an invalid domain name in a packet from 192.168.1.253.
The packet will be rejected.
The event data contains the DNS packet.
20080219 11:35:01 FE0 EVENT The DNS server encountered a domain name exceeding the maximum length in the
packet from 192.168.1.253.
The event data contains the DNS packet.
20080219 11:35:01 FE0 EVENT The DNS server encountered an invalid domain name in a packet from 192.168.1.253.
The packet will be rejected.
The event data contains the DNS packet.
20080219 11:35:05 FE0 EVENT The DNS server encountered a domain name exceeding the maximum length in the
packet from 192.168.1.253.
The event data contains the DNS packet.
20080219 11:35:05 FE0 EVENT The DNS server encountered an invalid domain name in a packet from 192.168.1.253.
The packet will be rejected.
The event data contains the DNS packet.
All those event occur after the Log File Wrap. You might try setting a larger size for the log file. Did you tick all the boxes under Debug Logging? And did you set a Filter at all?
Chris
Is this right?

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
Yep, that sounds good to me.
Chris
Still nothing in the file at all?
Chris






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
20080219 11:35:01 FE0 EVENT The DNS server encountered an invalid domain name in a packet from 192.168.1.253.
The packet will be rejected.
The event data contains the DNS packet.
20080219 11:35:05 FE0 EVENT The DNS server encountered a domain name exceeding the maximum length in the
packet from 192.168.1.253.
In the log file it's creating as part of Debug Logging, does it only have the header section?
Chris

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
I know, we've got the event (which it will log regardless of the filter), but we need the packet (which we're not getting at the moment).
You may need to take the filters off.
Does 1.2 have 1.253 set as Forwarder (Properties for the Server, Forwarders)?
Chris
Forwarders are setup as follows:
- 192.168.1.253 has forwarders setup to external dns servers.
- 192.168.1.2 doesnt have forwarders setup.
To a certain extent those kind of (bad) requests are unavoidable, however, normally you'd expect them to originate externally.
The only alternative is to use a Packet Sniffer to attempt to capture the DNS request, that won't really be any easier than working with Debug Logging, just gives you more configurable filters.
Chris






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
It would tell you everything, but everything might be rather too much. You'd have to begin by filtering out all the regular network traffic. Ultimately you'll be digging through the DNS Requests one at a time until you find the correct filter.
By the time you've finished you may find it better to trawl through the DNS log file, aiming for a time-stamp match.
Far from ideal situation, but the data returned in the standard Event ID is rubbish (as you've seen).
Chris

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
http://articles.techrepublic.com.com/5100-6345_11-5091116.html
It is interesting, but it should only be sending out packets greater than 512b (Extended) if the server performing the query advertises support for EDNS.
Only Windows 2003 and above can do that on the MS side, so we should be safe from such a thing on the 2000 server.
That doesn't necessarily mean something isn't sending extended packets at the server without receiving the advertisement.
Chris
--------------------------
20080220 09:37:08 FE0 EVENT The DNS server encountered a domain name exceeding the maximum length in the
packet from 192.168.1.253.
The event data contains the DNS packet.
20080220 09:37:08 FE0 EVENT The DNS server encountered an invalid domain name in a packet from 192.168.1.253.
The packet will be rejected.
The event data contains the DNS packet.
20080220 09:37:12 FE4 EVENT The DNS server encountered a domain name exceeding the maximum length in the
packet from 192.168.1.253.
The event data contains the DNS packet.
20080220 09:37:12 FE4 EVENT The DNS server encountered an invalid domain name in a packet from 192.168.1.253.
The packet will be rejected.
The event data contains the DNS packet.
--------------------------
Im going to increase the points to 500 as I'm stumped and would be delighted to know why my own dns server is behaving like this...






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
Still no packet logged in the text file though?
It's one of those annoying things, can't do anything at all unless it's possible to identify the failing packet :-\
It states "The event data contains the DNS packet." does it actually have anything else in the Event Log at all?
Chris
Heres some extra info just in case anything is relevant (cluthing at straws basically).
The Win2003 192.168.1.253 server is also a file server and a proxy server running Symantec Web Security 3.0
On the Win2k 192.168.1.2 server something strange i've just noticed. i used to be able to map to various shares on the server just using its name. Now I notice I have to use the FQDN from my workstation to map to a share?
Also, my domain is only win 2k and XP machines with static IPs on the clients aswell as servers. Should allow only secure dns updates be enabled on both DNS servers yes?

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
Okay, yell if you need any help with it. You'll get a hell of a lot logged. Initially I recommend you filter with:
udp dst port 53 or udp src port 53
It should be noted that the Capture Filter syntax is completely different from the Filter syntax on the main dump.
Chris
Replication will not effect Queries as the mechanism used isn't at all the same. AD Replication as opposed to DNS traffic. In essence, Replication problems will not create the errors seen above.
For 2000 it will be all DCs in the AD Domain or Standard Primary, it was only split out into DNS Servers in the Forest / Domain with 2003.
Chris






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
Okay, you set the Capture Filter mentioned before? If so, we should only have DNS traffic to look at.
Next, we can see if we can see the request from a specific server. Apply this filter (in the main capture view):
ip.addr eq 192.168.1.253
That should reduce the capture to only include traffic to and from the server we're seeing in the error message.
Once done, it's a bit of a case of looking through, start by selecting a packet.
You can see the Time for each packet by expanding "Frame", the Arrival Time there will help. And you can see the contents of the query (or response) by expanding the "Domain Name System" section.
Chris

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
They are all of "Standard Query Response" and all apart from one with a source of the external DNS server setup on the problem servers (.253) forwarders tab. The destination is 192.168.1.253 on all as per filter.
i dont understand all thats in the packet info but I cant see anything that looks like it is my 2 servers talking and one sending bad packet data to the other?
You've looked through each of the responses?
It's very unfortunate that you have so much other traffic between the server in question and 192.168.1.253, it'll make it very difficult to isolate simple because there's so much to check.
Chris
You are of course correct, I was just wondering if it was possible it was set to the forest and as this is a 2003 scope then it was sending out eDNS packets instead thinking the recipient was compatible? Just a random idea, not sure if it was possible.






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
Always worth considering, I wouldn't completely discount it, whether unlikely or not :)
Chris
I've been through the log thourghly and I dont see anything unusual, im at a loss as to what to do at this stage. Given the Symantec Proxy software on the server I might disable that service come Friday evening as users wont need webaccess over the weekend, see does that have any affect on things.
Other than that aside from another reboot its all I can think of at the moment.
Well that's no fun, it goes around in circles really. Unless you can capture the packet and see exactly what it's upset about there's nothing at all you can do to stop it happening :-\
Chris

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
unfortunately I cant see anything strange in the packet filter though maybe I'm missing something. At least with the symantec service disabled over the weekend there'll be no web traffic going though dns server and if error still reoccurs I can rule that out?
Yep, it's not a bad plan.
Chris






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
Okay, have a good weekend :)
Chris

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
Without fully knowing the software and without seeing the packet you'd have to assume that the Symantec software was mangling a DNS request it was making on behalf of a client.
Chris
Having tested some mroe to be 100% this error is definitely linked to the web security software. Its been reinstalled and reconfugured and still the events occur. I've been planning on changing it for a while anyway to something more robust and usable so I've got the go ahead to get Surf Control. These events coincided with a version upgrade of the sws too which says alot. I'm awarding you the points anyway...cheers for all the help
Good luck, I hope Surfcontrol behaves itself a little better.
Chris






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
Active Directory
--
Questions
--
Followers
Top Experts
Active Directory (AD) is a Microsoft brand for identity-related capabilities. In the on-premises world, Windows Server AD provides a set of identity capabilities and services, and is hugely popular (88% of Fortune 1000 and 95% of enterprises use AD). This topic includes all things Active Directory including DNS, Group Policy, DFS, troubleshooting, ADFS, and all other topics under the Microsoft AD and identity umbrella.