question

RobertRo-0293 avatar image
2 Votes"
RobertRo-0293 asked RobertRo-0293 answered

Remote Credential Guard double-hop issue after server 2022 upgrade

we upgraded two of our jump/admin servers from server 2019 to server 2022. one was installed fresh, the other one was upgraded via inplace upgrade.

now mstsc /remoteguard no longer works correctly, we seem to run into a kerberos double-hop issue.

what we do is, we logon to the admin server as usual with credentials. then from the admin server we use mstsc /remoteguard to jump to a different machine. on the destination machine, upon opening network shares we receive the message:

"The system cannot contact a domain controller to service the authentication reuqest. Please try again later."


176535-image.png



this did not happen before the upgrade. everything still works fine when starting from a server 2019 admin server.
no group policies, security settings or other modifications were done the infrastructure.
anyone else experiencing this?


windows-serverwindows-server-securityremote-desktop-client
image.png (66.7 KiB)
5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

SimonKR-5940 avatar image
0 Votes"
SimonKR-5940 answered

Same problem here: when using an Windows Server 2022 jump/admin host to connect to other machines using mstsc /remoteguard then we run in the kerberos double hop issue as robert described (you can´t access file shares, ...). It doesn´t matter if the destination machine is Windows Server 2016, 2019 or 2022. If you use an Windows Server 2016 or 2019 jump/admin host to connect to other machines using mstsc /remoteguard, then everything works as expected (access to file shares works, ...).

5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

SIMONSPhilippe avatar image
0 Votes"
SIMONSPhilippe answered

Similar issue here, using Windows 10 21H2 after applying January Patch Tuesday Update (KB5009543) as source of RDP (destination machine is Windows Server 2019 or 2022.)
A work arround is to Lock / Unlock the remote session (CTRL+ALT+END) ... but I imagine then you are not relying on RGC but local Authentication.

5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

RobertRo-0293 avatar image
1 Vote"
RobertRo-0293 answered

We opened a support case on 2022-02-22 but so far no resolution.

5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

SIMONSPhilippe avatar image
0 Votes"
SIMONSPhilippe answered

We also opened a support case on 2022-01-14, and provided a reproduction scenario on 19-02-2022 ...

5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

SIMONSPhilippe avatar image
0 Votes"
SIMONSPhilippe answered SIMONSPhilippe edited

Good news,
Preview update (4C) is available, and addresses the issue

Windows Server 2022 - KB5012637 ,Windows 11 (SV) - KB5012643 , Windows 10 2004 \ 20H1 \ 20H2 \ 21H1 \21H2 -KB5011831

“Addresses an issue that causes Kerberos authentication to fail, and the error is “0xc0030009 (RPC_NT_NULL_REF_POINTER)”. This occurs when a client machine attempts to use the Remote Desktop Protocol (RDP) to connect to another machine while Remote Credential Guard is enabled.”













5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

RobertRo-0293 avatar image
0 Votes"
RobertRo-0293 answered

did you test it?
we're still investigating but so far the patch doesn't fix the issue.

5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

SIMONSPhilippe avatar image
0 Votes"
SIMONSPhilippe answered

Yes we tested it, yes it fixes the issue for us.
The patch has to be installed on the Client machine (the one you are launching mstsc on) not the Server (machine that you RDP to)

5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

RobertRo-0293 avatar image
0 Votes"
RobertRo-0293 answered RobertRo-0293 edited

found the issue.
additionally to RCG we have Credential Guard / VBS enabled on all our systems as well.

196752-image.png


while this is fine on hardware boxes (e.g. Win10->Win10), on virtualized servers it still causes the problem as described in the first post. disabling Virtualization Based Security "fixes" it. both confirmed in lab and in prod environment. i'll update the MS support case.




image.png (120.3 KiB)
5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

SIMONSPhilippe avatar image
0 Votes"
SIMONSPhilippe answered

@RobertRo-0293 ,
we also have Credential Guard / Virtualization Based Security enabled on our VMs - on purpose.
We knew at the opening of the case that disabling it 'fixes' the issue - but this is not a valid option !
And again, for us, installing KB5011831 on the 'source' machine fixes the issue.

5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

RobertRo-0293 avatar image
0 Votes"
RobertRo-0293 answered RobertRo-0293 edited

Thanks, i wasn't aware of this. care to compare with our specs? i'm trying to find a difference why it works for you, and not for us.

our starting point is a server 2022 vm, in esxi 6.7 Update 2 VM 15 Compatibility Level, on VMware ESXi, 6.7.0, 19195723 Host

196873-image.png

196866-image.png

196901-image.png

196810-image.png
credential guard is enabled as per screenshot above.

ipv4/ipv6 dual stack, but i tried with ipv4 only, no difference.


destinations are a random selection of server 2019 or server 2022 vms on the same esx host. all with the latest patch installed as well.

i confirmed the situation in a lab environment to make sure no other (hardening) settings come to play.



image.png (18.2 KiB)
image.png (23.9 KiB)
image.png (11.6 KiB)
image.png (6.9 KiB)
5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.