2012R2 DC disconnecting with KRB_AP_ERR_MODIFIED

Posted on 2014-01-13
Medium Priority
Last Modified: 2014-03-14

I'm hoping someone could maybe shed some light on this issue.

We have recently installed some new servers running 2012 R2 Hyper-V. There are 2 identical physical servers (HP DL360p) both running 2012 R2 with 4 x VMs total.
1 VM for DC/Fileserver and 1 for Exchange 2010 in each box.
DC1 = PDC, RID and Infrastructure Master
DC2 = Schema Master, Domain Naming Master

Everything has been working fine for 2 months since but last Friday I had users reporting "Access denied" to file shares on one of the DC / Fileservers which uses DFS replication.
After looking in the event log I found several errors:

Event ID:4
The kerberos client received a KRB_AP_ERR_MODIFIED error from the server (servername). The target name used was HTTP/(servername).(domainname). This indicates that the target server failed to decrypt the ticket provided by the client. This can occur when the target server principal name (SPN) is registered on an account other than the account the target service is using....

Also the error repeats with reference to target name "Rpcss/(servername)" and "Cifs/(servername)"

When attempting to log onto the offending DC (DC2) with the Domain Admin user, I was refused as username password not recognised. The only solution was a reboot of the machine (VM).
The SAME thing also happened to DC1 the following day.

I've been looking into the errors and tried several steps already:

    Checked for duplicate SPN using "Setspn /x"
    Noticed on DC2 that the secure channel was broken so had to run:
    import-module ActiveDirectory
    Test-ComputerSecureChannel /repair
    Check DNS manually for any duplicates. Scavenge and clear cache.
    Ensure Time sync is working properly. Setup according to recommendations (HyperV hosts are not domain joined-they sync directly to NTP, DC1/PDC is master and syncs to NTP, other member servers and client sync to DC1/PDC)
    Reset the Domain Administrator users password
    Ran DCDIAG on both DCs and everything OK
    Verified that no Windows updates had been performed before the issue
    The only thing that I can remember changing in regards to Active Directory is that I added the second DC to the nightly backup job for System State. This means that AD gets backed up twice, wondered if this could cause issues. However speaking to the company about it (Yosemite Backup) they said no.

Only thing I havn't done is to reset the machine account password on either of the DC's, wondering if this is needed as I already rebooted and reset the secure channel? I found a guide explaining this, would it be worth trying (out of hours probably due to reboot needed):

Also, I cannot reset the secure channel on DC1, I assume because it is the PDC and does not need a channel to communicate with itself?

Hope there is some solution, i'm on the edge of my seat today hoping the servers stay up in the office!
Question by:chrismanncalgavin
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
LVL 10

Expert Comment

ID: 39777066
Since a reboot fixed this immidiately, and it has only occured once, I would itially suspect a glitch of some kind caused this, unless it happens again.
A single glitched bit, especially located in a cryptographoc key, could cause this problem:  "server failed to decrypt the ticket"

Related factoid:
Lets say an average bit in the computer memory messes up due to some environmental/external factors (acceidentally switches from a 0 to 1  or vice versa), on average,  once every 100 years (3.15 Billion Seconds).
You have 8GB of ram, thats (8GB*8 bits/byte) = 64 billion bits.
This means that, on-average, you will have a bit go wrong every... 100 years(3.15Bsec)/64billion = 0.05 Seconds!!!

It's amazing computers work at all!  (The fact that they DO work so consistantly shows just how stable those memory bits actually are in reality! )

Author Comment

ID: 39777079
Thanks for the comment.

I would understand the glitch as you mentioned if it only occurred on one DC, but this happened 2 days in a row (first on server 1 then on server 2).
So far has been fine today.

It is quite unnerving!
LVL 10

Expert Comment

ID: 39777144
Two days in a row on two machines:  I agree- not a glitch.
2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.


Accepted Solution

chrismanncalgavin earned 0 total points
ID: 39778674
Thanks Korbus.

Just to update you:
I've now followed steps to reset both the domain controller's computer account passwords.
Still no sign of the issue mentioned since.
LVL 10

Expert Comment

ID: 39779761
Gosh dont ya hate that?  You almost WANT it to happen so you can address it now when your expecting it, rather than 2 months down the road when your in the middle of somthing else.

Author Closing Comment

ID: 39806077
I realised there was no simple answer and in the end only followed my nose. Hopefully this was a one off issue, but I may need to ask another question in the future.

Expert Comment

ID: 39927049
I am having this same issue.  What exactly did you do to resolve this?  You mention resetting the domain controller's computer account password.  Do you have the steps taken?

Author Comment

ID: 39928793
Hi there,
Sorry to hear you're having the same issue. Some of the guides I followed are below:


Hope that helps.

Featured Post

Fill in the form and get your FREE NFR key NOW!

Veeam® is happy to provide a FREE NFR server license to certified engineers, trainers, and bloggers.  It allows for the non‑production use of Veeam Agent for Microsoft Windows. This license is valid for five workstations and two servers.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A hard and fast method for reducing Active Directory Administrators members.
Microsoft Office 365 is a subscriptions based service which includes services like Exchange Online and Skype for business Online. These services integrate with Microsoft's online version of Active Directory called Azure Active Directory.
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
This tutorial will walk an individual through the process of configuring basic necessities in order to use the 2010 version of Data Protection Manager. These include storage, agents, and protection jobs. Launch Data Protection Manager from the deskt…

719 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question