Training
Module
Explore name resolution - Training
This module focuses on name resolution in Windows client and the methods used to resolve device names to addresses.
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
This article discusses a problem in which a new session setup for LDAP services takes longer than expected if it targets host names.
Original KB number: 4559609
Lightweight Directory Access Protocol (LDAP) queries that target host names randomly take longer than expected to respond.
Additionally, DNS client events such as the following may be logged In the event log:
Log Name: System
Source: Microsoft-Windows-DNS-Client
Event ID: 1014
Level: Warning
User: NETWORK SERVICE
Description:
Name resolution for the name _ldap._tcp.<site>._sites.<name> timed out after none of the configured DNS servers responded.
Note
In this log entry, the <name> parameter can be any of the following:
This problem causes multiple issues that affect administrators, users, and applications. These issues include but aren't limited to the following:
Starting in Windows 7 and Windows Server 2008 R2, Windows introduced a change in name lookup behavior to fix two earlier problem scenarios:
The delay occurs because one of the following two conditions is true:
The delays can be observed in a network trace that shows LDAP clients running NetBIOS name lookups for a "[HOSTNAME]<0x1C>" record before they run a DNS lookup to locate the application host computer (see Figure A).
The network trace of a Windows Server 2003 or 2008 LDAP client showed that it directly ran the DNS lookup for the host computer without performing the NetBIOS lookup for the "<0x1C>" record.
In the case of DNS, you see name queries for names that end in a DC computer name, such as the following:
_ldap._tcp.Default-First-Site-Name._sites.ADDC01.contoso.com
_ldap._tcp.ADDC01.contoso.com
_ldap._tcp.Default-First-Site-Name._sites.ADDC01
_ldap._tcp.ADDC01
When you target an LDAP server by host name instead of domain name, you should use the LDAP_OPT_AREC_EXCLUSIVE session option to indicate that the target is a host name instead of a domain name.
This option is set differently depending on the programming interface that is used. Use the following information as reference.
If an Active Directory DNS server name is passed for theHostNameparameter, ldap_set_option should be called to set the LDAP_OPT_AREC_EXCLUSIVE flag before calling any LDAP function that creates the actual connection.
Doing this forces an A-record lookup and bypasses any SRV record lookup when the computer resolves the host name. In some scenarios, it improves network performance. For example, in a branch office that uses a dial-up connection, using A-Record lookup can avoid forcing the dialup to query a remote DNS server for SRV records when it resolves names.
If you must specify a server, use the ADS_SERVER_BIND flag to avoid unnecessary or incorrect queries to the DNS server. For more information, see this documentation of ADsOpenObject() and related functions.
If your ADsPath includes a server name, specify the AuthenticationTypes.ServerBind flag when you use the LDAP provider. Don't use this flag for paths that include a domain name or for serverless paths. Specifying a server name without also specifying this flag causes unnecessary network traffic.
For example:
DirectoryEntry ent = new DirectoryEntry("LDAP://server01",null,null,AuthenticationTypes.ServerBind);
When you prepare a new LDAP connection, include an LdapDirectoryIdentifier object that is constructed by using a host name and optional port that you want to contact, and also includes a <fullyQualifiedDnsHostName> parameter that is set to True.
The new default behavior in Windows 7, Windows Server 2008 R2, and later versions can be reverted to pre-Windows 7 behavior. This may reintroduce problems that affect NetBIOS names as described in the "Cause" section. However, there are also scenarios in which the Pre-Windows 7 behavior provides better results. Therefore, which setting produces the better results depends on the main LDAP client use scenario.
The long-term solution should always be to get the application to use server and domain names that have the appropriate flags when calling into LDAP, ADSI, or .NET interfaces. You should use the correct flags to make the application independent from scenario dependencies when the directory services client code has to decide the resolution method in ambiguous situations.
You can revert to pre-Windows 7 behavior by setting the following registry value:
Subkey: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LDAP
Entry: UseOldHostResolutionOrder
Type: REG_DWORD
Value data: 1
As an additional approach, you can turn off name resolution by using broadcasting for NetBt. See 819108 Settings for minimizing periodic WAN traffic to configure NodeType as "p-mode."
For more information, see the following articles:
LDAP session options (see LDAP_OPT_AREC_EXCLUSIVE, 0x98)
ADSI function AdsopenObject
ADSI AuthenticationEnum with the ADS_SERVER_BIND value
S.DS AuthenticationTypes Enum with the ServerBind value
S.DS.P LdapDirectoryIdentifier constructor with the fullyQualifiedDnsHostName flag
Training
Module
Explore name resolution - Training
This module focuses on name resolution in Windows client and the methods used to resolve device names to addresses.