Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

A logon window appears in Windows Server 2003 Service Pack 1 NLB when you try to browse the virtual NLB cluster name


View products that this article applies to.

Important This article contains information that shows you how to help lower security settings or how to turn off security features on a computer. You can make these changes to work around a specific problem. Before you make these changes, we recommend that you evaluate the risks that are associated with implementing this workaround in your particular environment. If you implement this workaround, take any appropriate additional steps to help protect your system.
Important This article contains information about how to modify the registry. Make sure that you back up the registry before you modify it. Make sure that you know how to restore the registry if a problem occurs. For more information about how to back up, restore, and modify the registry, click the following article number to view the article in the Microsoft Knowledge Base:
256986 (http://support.microsoft.com/kb/256986/ ) Description of the Microsoft Windows registry

↑ Back to the top


Symptoms

If the following conditions are true, you may receive a logon window that prompts you for credentials:
  • You try to browse the virtual Network Load Balancing (NLB) cluster name.
  • You use a server that is a member of the NLB cluster.
  • The NLB cluster is running Microsoft Windows Server 2003 Service Pack 1 (SP1).
After you type the appropriate credentials, you can view all shares, and you can access all shares. Also, you can browse the virtual NLB cluster name from any other client in the network without a problem.

↑ Back to the top


Cause

This problem occurs because Windows Server 2003 SP1 includes a security feature that removes the last available authentication mechanism in NLB Manager. This security feature is an authentication loopback check that helps prevent man-in-the-middle (MITM) attacks on NTLM.

By default, loopback check functionality is turned on in Windows Server 2003 SP1. Also, the value of the DisableLoopbackCheck registry entry is set to 0 (zero).

↑ Back to the top


Workaround

Warning This workaround may make a computer or a network more vulnerable to attack by malicious users or by malicious software such as viruses. We do not recommend this workaround but are providing this information so that you can implement this workaround at your own discretion. Use this workaround at your own risk.
Warning Serious problems might occur if you modify the registry incorrectly by using Registry Editor or by using another method. These problems might require that you reinstall the operating system. Microsoft cannot guarantee that these problems can be solved. Modify the registry at your own risk.
To work around this problem, set the DisableStrictNameChecking registry entry to 1. Then, use one of the following methods, as appropriate.

For more information about how to modify the "DisableStrictNameChecking" registry entry, click the following article number to view the article in the Microsoft Knowledge Base:
281308� Connecting to SMB share on a Windows 2000-based computer or a Windows Server 2003-based computer may not work with an alias name

Method 1: Create the Local Security Authority host names that can be referenced in an NTLM authentication request

Re-enable the behavior that exists in Windows Server 2003 by setting the DisableLoopbackCheck registry entry in the following registry subkey to 1:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa
To do this, follow these steps on all NLB Nodes:
  1. Click Start, click Run, type regedit, and then click OK.
  2. Locate the following key in the registry:
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\MSV1_0
  3. Right-click MSV1_0, point to New, and then click Multi-String Value.
  4. Type BackConnectionHostNames, and then press ENTER.
  5. Right-click BackConnectionHostNames, and then click Modify.
  6. In the Value data box, type the host name that is used for the NLB cluster, and then click OK.
  7. Close Registry Editor, and then restart the computer.

Method 2: Disable the authentication loopback check

To do this, follow these steps for all the nodes:
  1. Click Start, click Run, type regedit, and then click OK.
  2. Locate the following key in the registry:
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa
  3. Right-click Lsa, point to New, and then click DWORD Value.
  4. Type DisableLoopbackCheck, and then press ENTER.
  5. Right-click DisableLoopbackCheck, and then click Modify.
  6. In the Value data box, type 1, and then click OK.
  7. Close Registry Editor, and then restart the computer.

↑ Back to the top


More information

After you install security update 957097, applications such as SQL Server or Internet Information Services (IIS) may fail when making local NTLM authentication requests. For more information about how to resolve this issue, click the following article number to view the article in the Microsoft Knowledge Base:
957097 � MS08-068: Vulnerability in SMB could allow remote code execution
See the "Known issues with this security update" section of KB article 957097 for details about how to resolve the issue.

↑ Back to the top


References

For more information, click the following article number to view the article in the Microsoft Knowledge Base:
281308� Connecting to SMB share on a Windows 2000-based computer or a Windows Server 2003-based computer may not work with an alias name
926642� Error message when you try to access a server locally by using its FQDN or its CNAME alias after you install Windows Server 2003 Service Pack 1: "Access denied" or "No network provider accepted the given network path"

↑ Back to the top


Status

Microsoft has confirmed that this is a problem in the Microsoft products that are listed in the "Applies to" section.

↑ Back to the top


Keywords: KB914060, kbprb, kbtshoot

↑ Back to the top

Article Info
Article ID : 914060
Revision : 3
Created on : 2/26/2009
Published on : 2/26/2009
Exists online : False
Views : 395