KDC error 26 and 27 constantly on DCs

Getting Tons of KDC errors on tons of user accounts.

There are both windows 2003 and windows 2008 domain controllers.


While processing an AS request for target service krbtgt, the account User123 did not  have a suitable key for generating a Kerberos ticket (the missing key has an ID of 2). The requested etypes were 18.  The accounts available etypes were 23  -133  -128  3  1  -140.


While processing a TGS request for the target server krbtgt/domain.com, the account Computer$@domain.COM did not have a suitable key for generating a Kerberos ticket (the missing key has an ID of 8). The requested etypes were 18.  The accounts available etypes were 23  -133  -128  3  1.



Also getting netlogon alerts 5805 and 5723


The session setup from the computer SOMECOMPUTER failed to authenticate. The name(s) of the account(s) referenced in the security database is SOMECOMPUTER$.  The following error occurred:
Access is denied.


The session setup from computer SOMECOMPUTER failed because the security database does not contain a trust account SOMECOMPUTER$ referenced by the specified computer.
LVL 5
IndyrbAsked:
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Life1430Commented:
I agree with below link..In my case too it was 2003 DC logging events

KDC Event ID 26 and 27 logged on 2003 DC
http://itimesaver.wordpress.com/2013/01/07/kdc-event-id-26-and-27-logged-on-2003-dc/
0
ZenVenkyArchitectCommented:
This happens only in mixed environment (Server 2003 and 2008). These KDC events occurs when clients requests service ticket with a etype 18 (aes256-cts-hmac-sha1-96), which is not supported by Windows Server 2003 but supported by Windows Server 2008 R2. Best way is to resolve it is make 2008 DC as PDCe role holder and reboot it once. Also make sure PDCe role holder as Authoritative Time Server.

Reference:-

http://support.microsoft.com/kb/977321

http://technet.microsoft.com/en-us/library/cc733974(v=ws.10).aspx

DNS Best Practices

Authoritative Time Server
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
SandeshdubeySenior Server EngineerCommented:
The problem is that the client is sending a TGS request using the Etype of 18  (AES). Windows 2003 does not support this etype for Kerberos where 2008  does. The error that is being logged on the domain controller can safely be  ignored as it is by design.The domain controller is just informing the  client what etypes it does support.
 
EventID 26 & 27 : KDC: suitable keys
 http://social.technet.microsoft.com/Forums/en-US/winserverDS/thread/29f55875-f3ee-476c-9d74-94f1b74edb31/
 
KDC Event ID 16 or 27 is logged if DES for Kerberos is disabled
 http://support.microsoft.com/kb/977321
 
Event ID 27 — KDC Encryption Type Configuration
 http://technet.microsoft.com/en-us/library/cc733974(WS.10).aspx

Reference link:http://social.technet.microsoft.com/Forums/windowsserver/en-US/ba598be9-3a06-4a7a-932b-013891d35f78/final-check-before-demoting-the-win2k3-dc
 
Hope this helps
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Active Directory

From novice to tech pro — start learning today.