Ayende @ Rahien

It's a girl

More auth issues: 0xc000006d on Windows 2008 R2

Next on the schedule of problems we had an issue with again, with everything working fine remotely and not working when running locally. This time, it didn’t take as long to figure out what was going on, the root of the problem was “Account failed to log on (0xc000006d)”, and the explanation for that is here:

http://code-journey.com/2009/account-failed-to-log-on-0xc000006d-unable-to-load-website-from-local-server/

The basic idea is that you can’t authenticate against the local server using anything except the local server name.

And it still didn’t work.

The server is Windows 2008 R2, and the documentation said that I had to set a registry key at: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\MSV1_0

That did not work, but what did work was setting the DisableLoopbackCheck at: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa

No idea why, and if there is a problem at the documentation for Windows 2008 R2, but this is how I got it working on my end. I would probably like it more if I was able to use the recommended solution, and not the solution explicitly not recommended.

Any ideas?

Comments

Steve Py
06/15/2011 10:18 AM by
Steve Py

Can you post/send the reg entries you used for the preferred solution?

Ryan Heath
06/15/2011 11:02 AM by
Ryan Heath

Did you try to restart the computer? As the KB article states to restart the server, not IIS.

http://support.microsoft.com/kb/926642

// Ryan

bill
06/15/2011 01:53 PM by
bill

I know it's not a popular answer, but why are you using windows Auth? I've never had any love from it.

Rob Ashton
06/15/2011 02:55 PM by
Rob Ashton

The guys on the last post had it right when they were talking about setting up an SPN, but that only holds true if you're going from one web server to another (Which it sounds like you are not).

Configuring windows servers to pass windows authentication tokens from one to another is all I've been doing for the past couple of months so if you want a more detailed discussion/help feel free to drop me an e-mail.

Rob Ashton
06/15/2011 02:55 PM by
Rob Ashton

(Actually, you might need to use an SPN if you're connecting via anything other than the existing name of the machine, as otherwise it will drop back to NTLM)

Ayende Rahien
06/15/2011 04:00 PM by
Ayende Rahien

Ryan, Yes, I restarted the machine.

Peter
06/16/2011 12:27 AM by
Peter

Who cares about the recommended solution. This security feature didn't exist for a while and all of a sudden got pushed through Windows Update and broke a bunch of (SP) websites I maintained at the time. This feature is specifically one of the reasons server admins are wary to apply recommended MS patches.

Anyway. Theoretically, malicious hackers can subvert security by launching an elevated-permissions website from a non-elevated-permissions request from your own machine, but who cares. Just don't run any other websites other than the app you intend.

Still a little angry about the first time I encountered this bug, angry just remembering it. So dumb.

Comments have been closed on this topic.