CONTAP-80033: NTLM authentication fails due to enforcement of Netlogon RPC sealing
Issue
- CIFS shares not accessible using CIFS server IP address
- CIFS Domain authentication using NTLM fails
- secd.cifsAuth.problem
- FAILURE: Pass-through authentication failed. (NT Status: NT_STATUS_NO_LOGON_SERVERS(0xc000005e))
- Windows Domain Controller (DC) logs
Log Name: System Source: NETLOGON Date: 2/22/2023 3:17:28 PM Event ID: 5838 Task Category: None Level: Error Keywords: Classic User: N/A Computer: dc1.demo.netapp.local Description: The Netlogon service encountered a client using RPC signing instead of RPC sealing. Machine SamAccountName: CIFSSERVERNAME
- Kerberos authentication is working
- ONTAP features configured for domain authentication using NTLMv1 or NTLMv2 are affected (e.g. CIFS, Vscan, RBAC, domain tunnel, etc.):
::> set advanced ::*> vserver cifs session show -vserver <vserver> -fields auth-mechanism,address,windows-user node vserver session-id connection-id address auth-mechanism windows-user ------------ --------- -------------------- ------------- ------------ -------------- ------------ netapp-01a <vserver> 17134789207261194186 2550496605 10.62.125.88 NTLMv2 DEMO\user6 netapp-01b <vserver> 17134789207261194188 2550496606 10.216.29.42 Kerberos DEMO\Administrator 2 entries were displayed.
Note: If Kerberos authentication attempt fails, NTLM (NTLMv1 or NTLMv2) is default fallback.