How come Windows server cannot change Log On Account of service in Active Directory Domain?

I have a Hybrid Domain with two AD servers managing all windows workstations and servers and a Linux Domain managing linux servers.

The AD servers are Windows Server 2008.  The servers are a mix of 2003 and 2008.

I am trying to change a service to start as a specified domain account instead of Local System Account.  When I make the change I get an error saying "The specified Domain Either does not exist or could not be contated"

The domain is up and available.  I can login ot the system with Domain accounts, I can map and access Domain File Servers, I can browse Domain members .. but I cannot change service account.

The DNS I am using is not the AD it is bind9 .. is this part of the problem?  I can't really see why.  The servers can see each other.

I have disabled the firewall and AV and still no luck.  This behavior can be seen on multiple  member servers.

I ran these commands

dcdiag /v /c /d /e /s:dcname >c:\dcdiag.txt
 repadmin /showrepl dc* /verbose /all /intersite >c:\repl.txt

and saw no errors (other than smart card certificates which we are not using)

Any help would be greatly appreciated.

Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Is the BIND9 server acting as a secondary to one of the DNS-enabled DCs?  There should be a _msdtc subzone where the service location records exist.  These are required for AD operations.
DanRaposoAuthor Commented:
These are the AD records I have  ( I see no mention of msdtc in the link you referenced.

;   SRV RECORDS FOR ACTIVE DIRECTORY DOMAIN CONTROLLER SRV 0 0 389 dc SRV 0 0 88 dc SRV 0 0 389 dc SRV 0 0 88 dc
Big Business Goals? Which KPIs Will Help You

The most successful MSPs rely on metrics – known as key performance indicators (KPIs) – for making informed decisions that help their businesses thrive, rather than just survive. This eBook provides an overview of the most important KPIs used by top MSPs.

Sorry - I mean "_msdcs" subzone...

_msdcs DNS subdomain

The Microsoft-specific subdomain enables location of domain controllers that have specific roles in the Active Directory domain or forest. Resource records for the DNS root domain of a new Active Directory forest are stored in a _msdcs zone instead of a subdomain, and that zone is stored in the forest-wide application directory partition.

You are running DNS on the DCs, right (that's the default setup for an AD DC)?  Even though that's not where you're pointing your clients?

Am I correct in assuming that the service you're editing is on one of the Windows AD member servers (not one of the DCs)?

You could test this idea that DNS is the problem (I suspect it is) by configuring one of the member servers to use the DC for DNS, restarting, and trying to reconfigure the service account as previously attempted.  

If it works, then you've got incomplete DNS records in your BIND9 zone - insufficient to fully support your AD member servers.

If it still doesn't work, then you can at least rule out the BIND9 zone as the source of the problem.
...also, if you look at the document I linked to, you will see many more SRV records than what you have indicated.
DanRaposoAuthor Commented:
Sorry but that doc link is a bit confusing to me.   It doesn't have all the information on it that I need.   For example which ports?

Yes You are correct in assuming that I am running DNS on the DCs but pointing clients to another (BIND 9 server)

Correct  The service I am  editing is on one of the Windows AD member servers

If I change to AD for DNS the problem does indeed go away .

Could you assist in the syntax of the lines I may need to add?   Would this be correct? I have no sub domains or sites so would this be sufficient? SRV 0 0 389 dc SRV 0 0 88 dc SRV 0 0 389 dc SRV 0 0 88 dc

NEW LINES SRV 0 0 389 dc SRV 0 0 389 dc SRV 0 0 389 dc SRV 0 0 3268 dc
Why not just delegate the sub zones back to one of the DCs? This approach will bring you all the records and keep them in sync going forward. You'll get more functionality out of AD that way.
DanRaposoAuthor Commented:
Your losing me... What subzone do I have in my main DNS Zone?
Sorry... let me back up a step.

You have a single zone of "" which is being hosted both on AD-enabled DNS DCs *and* on BIND9 Unix hosts.  Correct?

For some reason, you've chosen to do the domain administration on BIND9, and point all of your clients there for resolution.  Correct?

There are host records that exist in the BIND9 version of the zone that *do not* exist in the AD DNS version.  Correct?

Personally, I think the best answer would be to add all of your BIND9-only records to the AD DNS, then reconfigure your BIND9 servers as secondaries to the AD DNS.  This would assure that all only one zone exists across your environment.  But then you'd have to do your DNS admin going forward on the Windows AD servers.  I'm guessing that you don't want to do this (or you wouldn't be trying to run your Windows AD clients against a manually-configured BIND9 DNS server in the first place), right?

The second best answer would be to delegate the AD-specific subzones back to the AD DNS servers.  So... if you look at your AD DNS servers, you will see that the AD-specific SRV records are actually held in sub zones under

Rather than add individual SRV records to the BIND9 zone, you could delegate the four "_" zones back to the AD DNS servers.  Generally, you shouldn't need to administer these zones by hand (provided you have secure dynamic updating configured).

A quick overview on how to set up subzone delegation on BIND can be found here...

If I've made any incorrect assumptions above, please let me know...
DanRaposoAuthor Commented:
You are correct in your assumptions.  The major factor in not using AD DNS is simply that I support both internal and external zone transfer and do not know enough about AD DNS to set this up efficiently

Basically the internal zone resolves to internal IPs and the external zone resolves to public IPs.
Sounds like split DNS. Makes sense. But then why point your internal clients to your external (public IP resolving) DNS servers at all?

So I'm still confused. If I were in your situation (as I think I understand it), I would use the BIND servers to resolve outside requests for public IP addresses from a subset of hosts offering services available to the Internet only. Then I would point all internal systems (including the public name servers and all Unix hosts) to internal/private IP resolving AD DNS servers.

It's generally not best practice to expose your private IP space to public queries. Nor is it advisable to make AD accessible from public/untrusted networks.

Am I still missing something?

The BIND name server you're currently working with - the one where you've added the handful of AD records - is it resolving public or private IPs for

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
DanRaposoAuthor Commented:
Thanks for helping me work through this issue.  I am going to try to finish conversion to AD based DNS server for all internal zones.  I will keep BIND running for external requests.
Good choice, IMHO - you'll be happier in the long run.  :)
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Active Directory

From novice to tech pro — start learning today.