成千上万的类型为8登录类型(NetworkCleartext)的4625登录失败错误的根源是什么?


9

我有一个Windows Server 2008 R2系统,每天都会在Windows日志的“安全性”部分中显示数千个带有登录类型8(NetworkCleartext)的4625登录失败错误。源网络地址中没有列出试图获取访问权限的系统的IP地址,因此我为阻止经常失败的IP而构建的脚本找不到它们。

这些登录尝试可能来自什么服务?

这是其中之一的示例:

An account failed to log on.

Subject:
    Security ID:        SYSTEM
    Account Name:       server-name$
    Account Domain:     example
    Logon ID:       0x3e7

Logon Type:         8

Account For Which Logon Failed:
    Security ID:        NULL SID
    Account Name:       Administrator
    Account Domain:     

Failure Information:
    Failure Reason:     Unknown user name or bad password.
    Status:         0xc000006d
    Sub Status:     0xc0000064

Process Information:
    Caller Process ID:  0x4d0
    Caller Process Name:    C:\Windows\System32\svchost.exe

Network Information:
    Workstation Name:   system-name
    Source Network Address: -
    Source Port:        -

Detailed Authentication Information:
    Logon Process:      Advapi  
    Authentication Package: MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
    Transited Services: -
    Package Name (NTLM only):   -
    Key Length:     0

This event is generated when a logon request fails. It is generated on the computer where access was attempted.

The Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).

The Process Information fields indicate which account and process on the system requested the logon.

The Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
    - Transited services indicate which intermediate services have participated in this logon request.
    - Package name indicates which sub-protocol was used among the NTLM protocols.
    - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.

2
我已对您的问题进行了投票,这应该给您足够的自我解答(IIRC)代表。
HopelessN00b 2014年

Answers:


6

有多个登录源可能会生成这些错误:

  1. FTP登录-检查您的FTP日志以查看是否同时显示登录失败。这就是我的情况,这使我花了很长时间才弄清楚,这就是为什么我要发布此消息。
  2. 通过基本身份验证通过http或https登录(一种简单但可能很危险的方式来对网站进行密码保护)
  3. ASP脚本
  4. 可能还有其他我不知道的地方

WindowsSecurity.com中提到了数字2和3

此登录类型表示类似于登录类型3的网络登录,但是密码是通过网络以明文形式发送的。Windows服务器不允许使用明文身份验证连接到共享文件或打印机。我知道的唯一情况是使用ADVAPI从ASP脚本中登录,或者当用户使用IIS的基本身份验证模式登录IIS时。在这两种情况下,事件描述中的登录过程都将列出advapi。仅当基本身份验证未包装在SSL会话(即https)中时,它才是危险的。就由ASP生成的登录而言,脚本记住,出于维护目的,在源代码中嵌入密码是一种不好的做法,同时也存在恶意者查看源代码并由此获得密码的风险。


1

我将运行A netstat -a -n | find "1232"以查看进程ID(PID)1232正在侦听的端口。这就是生成这些身份验证失败的PID。您可以嗅探这些端口上传入的流量以跟踪源。

(我很难提供在进程中运行w / svchost.exe并监听身份验证的服务。我几乎觉得是第三方...)


0

登录类型8时出现密码被明文形式通过网络发送。IIS中的基本身份验证最可能导致这种登录失败。据我所知,最终用户可以通过其台式机或移动设备使用五种基于Microsoft IIS的基本身份验证服务,它们分别是OWA客户端MS Exchange ActiveSyncOutlook AnywhereFTP客户端SharePoint服务器

当最终用户使用错误的密码从台式机/移动设备连接启用了基本身份验证的OWA客户端时,登录类型为8的事件4625将被记录在承载OWA的Exchange Server中。

检查本文:http : //www.morgantechspace.com/2014/12/Find-Account-Lockout-Source-for-Logon-Type-8.html


3
登录类型3 =登录类型8.!
斯文

@Sven ..now纠正了我的anwser
kombsh
By using our site, you acknowledge that you have read and understand our Cookie Policy and Privacy Policy.
Licensed under cc by-sa 3.0 with attribution required.