Skip to content

Instantly share code, notes, and snippets.

@erikerlandson
Created June 5, 2012 22:03
Show Gist options
  • Save erikerlandson/2878348 to your computer and use it in GitHub Desktop.
Save erikerlandson/2878348 to your computer and use it in GitHub Desktop.
Condor log file
# at config time, it tells me it sees configuration to allow 'test1':
06/05/12 14:46:08 IPVERIFY: allow WRITE: eje@localhost.localdomain, condor@localhost.localdomain, root@localhost.localdomain, test1@localhost.localdomain, test1@192.168.1.102, test1@192.168.1.2 (from config value ALLOW_WRITE)
# I'm interested in what this means:
06/05/12 14:46:08 Authorizations yet to be resolved:
06/05/12 14:46:08 allow WRITE: eje@localhost.localdomain/* condor@localhost.localdomain/* root@localhost.localdomain/* test1@localhost.localdomain/* test1@192.168.1.102/* test1@192.168.1.2/*
# When the rubber hits the road, it resolves as 'deny':
06/05/12 14:46:55 Adding to resolved authorization table: test1/192.168.1.2: DENY_ADMINISTRATOR
06/05/12 14:46:55 Adding to resolved authorization table: test1/192.168.1.2: DENY_DAEMON
06/05/12 14:46:55 Adding to resolved authorization table: test1/192.168.1.2: DENY_WRITE
06/05/12 14:46:55 PERMISSION DENIED to test1 from host 192.168.1.2 for command 1112 (QMGMT_WRITE_CMD), access level WRITE: reason: WRITE authorization policy contains no matching ALLOW entry for this request; identifiers used for this host: 192.168.1.2,rorschach,rorschach.localdomain,localhost,localhost.localdomain,rorschach.localdomain,localhost.localdomain,localhost,rorschach.localdomain,localhost,localhost.localdomain,localhost6.localdomain6,localhost6,rorschach6,rorschach6.localdomain6,rorschach.localdomain
# here is the full log for context:
06/05/12 14:46:07 Reading from /proc/cpuinfo
06/05/12 14:46:07 Found: Physical-IDs:True; Core-IDs:True
06/05/12 14:46:07 Analyzing 2 processors using IDs...
06/05/12 14:46:07 Looking at processor #0 (PID:0, CID:0):
06/05/12 14:46:07 Comparing P#0 and P#1 : pid:0!=0 or cid:0!=1 (match=No)
06/05/12 14:46:07 ncpus = 1
06/05/12 14:46:07 P0: match->1
06/05/12 14:46:07 Looking at processor #1 (PID:0, CID:1):
06/05/12 14:46:07 ncpus = 2
06/05/12 14:46:07 P1: match->1
06/05/12 14:46:07 Using IDs: 2 processors, 2 CPUs, 0 HTs
06/05/12 14:46:07 Finding local host information, calling gethostname()
06/05/12 14:46:07 gethostname() returned a host with no domain "rorschach"
06/05/12 14:46:07 Trying to find full hostname for "rorschach"
06/05/12 14:46:07 Calling gethostbyname(rorschach)
06/05/12 14:46:07 Trying to find full hostname from hostent
06/05/12 14:46:07 Main name in hostent "rorschach" contains no '.', checking aliases
06/05/12 14:46:07 Checking alias "rorschach.localdomain"
06/05/12 14:46:07 Alias "rorschach.localdomain" is fully qualified
06/05/12 14:46:07 Ignoring config file based on LOCAL_CONFIG_DIR_EXCLUDE_REGEXP, '/home/eje/condor/config.d/95.auth-acct-grps.config~'
06/05/12 14:46:07 Ignoring config file based on LOCAL_CONFIG_DIR_EXCLUDE_REGEXP, '/home/eje/condor/config.d/05.min.config~'
06/05/12 14:46:07 Trying to initialize local IP address (config file not read)
06/05/12 14:46:07 NETWORK_INTERFACE=* matches lo 127.0.0.1, wlan0 192.168.1.2, virbr0 192.168.122.1, tun0 10.3.233.74, choosing IP 192.168.1.2
06/05/12 14:46:07 Trying to initialize local IP address (after reading config)
06/05/12 14:46:07 NETWORK_INTERFACE=* matches lo 127.0.0.1, wlan0 192.168.1.2, virbr0 192.168.122.1, tun0 10.3.233.74, choosing IP 192.168.1.2
06/05/12 14:46:07 KEYCACHE: created: 0x1ea15b0
06/05/12 14:46:07 Setting maximum accepts per cycle 8.
06/05/12 14:46:07 ******************************************************
06/05/12 14:46:07 ** condor_schedd (CONDOR_SCHEDD) STARTING UP
06/05/12 14:46:07 ** /usr/local/src/condor/grid/src/release_dir/sbin/condor_schedd
06/05/12 14:46:07 ** SubsystemInfo: name=SCHEDD type=SCHEDD(5) class=DAEMON(1)
06/05/12 14:46:07 ** Configuration: subsystem:SCHEDD local:IT class:DAEMON
06/05/12 14:46:07 ** $CondorVersion: 7.6.5 Jun 05 2012 $
06/05/12 14:46:07 ** $CondorPlatform: X86_64-Fedora_12 $
06/05/12 14:46:07 ** PID = 16470
06/05/12 14:46:07 ** Log last touched time unavailable (No such file or directory)
06/05/12 14:46:07 ******************************************************
06/05/12 14:46:07 Using config source: /home/eje/condor/condor.config
06/05/12 14:46:07 Using local config sources:
06/05/12 14:46:07 /home/eje/condor/config.d/05.min.config
06/05/12 14:46:07 /home/eje/condor/config.d/10.log.config
06/05/12 14:46:07 /home/eje/condor/config.d/15.slot.config
06/05/12 14:46:07 /home/eje/condor/config.d/20.disable.preempt.config
06/05/12 14:46:07 /home/eje/condor/config.d/25.interval.config
06/05/12 14:46:07 /home/eje/condor/config.d/30.qmfbroker.config
06/05/12 14:46:07 /home/eje/condor/config.d/35.startd.schedd.config
06/05/12 14:46:07 /home/eje/condor/config.d/60.condor-qmf.config
06/05/12 14:46:07 /home/eje/condor/config.d/90.eje.config
06/05/12 14:46:07 /home/eje/condor/config.d/95.auth-acct-grps.config
06/05/12 14:46:07 Not using shared port because USE_SHARED_PORT=false
06/05/12 14:46:07 DaemonCore: command socket at <192.168.1.2:46032>
06/05/12 14:46:07 DaemonCore: private command socket at <192.168.1.2:46032>
06/05/12 14:46:07 Setting maximum accepts per cycle 8.
06/05/12 14:46:07 COLLECTOR_HOST is set to "localhost.localdomain"
06/05/12 14:46:07 New Daemon obj (collector) name: "localhost.localdomain", pool: "NULL", addr: "NULL"
06/05/12 14:46:07 Using name "localhost.localdomain" to find daemon
06/05/12 14:46:07 Port not specified, using default (9618)
06/05/12 14:46:07 Host info "localhost.localdomain" is a hostname, finding IP address
06/05/12 14:46:07 Trying to find IP addr for "localhost.localdomain"
06/05/12 14:46:07 Calling gethostbyname(localhost.localdomain)
06/05/12 14:46:07 Found IP addr in hostent: 127.0.0.1
06/05/12 14:46:07 Found IP address and port <127.0.0.1:9618>
06/05/12 14:46:07 Will use UDP to update collector localhost.localdomain <127.0.0.1:9618>
06/05/12 14:46:07 Not using shared port because USE_SHARED_PORT=false
06/05/12 14:46:07 Trying to find full hostname for "it_sch"
06/05/12 14:46:07 Calling gethostbyname(it_sch)
06/05/12 14:46:07 gethostbyname() failed: Success (errno: 0)
06/05/12 14:46:07 Using name: it_sch@rorschach.localdomain
06/05/12 14:46:07 No Accountant host specified in config file
06/05/12 14:46:07 History file rotation is enabled.
06/05/12 14:46:07 Maximum history file size is: 20971520 bytes
06/05/12 14:46:07 Number of rotated history files is: 2
06/05/12 14:46:07 initLocalStarterDir(): /home/eje/condor/local/spool.IT/local_univ_execute does not exist, calling mkdir()
06/05/12 14:46:07 initLocalStarterDir(): Changing permission on /home/eje/condor/local/spool.IT/local_univ_execute
06/05/12 14:46:07 Period for SelfDrainingQueue job_is_finished_queue set to 0
06/05/12 14:46:07 Count per interval for SelfDrainingQueue stop_job_queue set to 1
06/05/12 14:46:07 Queue Management Super Users:
06/05/12 14:46:07 root
06/05/12 14:46:07 condor
06/05/12 14:46:07 eje
06/05/12 14:46:08 "/home/eje/condor/release/sbin/condor_shadow.std -classad" did not produce any output, ignoring
06/05/12 14:46:08 CronJobMgr: Setting name to 'schedd'
06/05/12 14:46:08 CronJobMgr: Setting parameter base to 'schedd_cron'
06/05/12 14:46:08 CronJobMgr: Initializing 'schedd'
06/05/12 14:46:08 CronJobMgr: Doing config (initial)
06/05/12 14:46:08 Registering PeriodicExprHandler(), next callback in 300 seconds
06/05/12 14:46:08 Spool format version requires >= 0 (I support version 1)
06/05/12 14:46:08 Spool format version is 0 (I require version >= 0)
06/05/12 14:46:08 AutoCluster:config((null)) invoked
06/05/12 14:46:08 Setting delay until next queue scan to 5 seconds
06/05/12 14:46:08 DaemonCore: No more children processes to reap.
06/05/12 14:46:08 Getting monitoring info for pid 16470
06/05/12 14:46:08 DaemonCore: in SendAliveToParent()
06/05/12 14:46:08 New Daemon obj (any) name: "NULL", pool: "NULL", addr: "<192.168.1.2:46000>"
06/05/12 14:46:08 Using port 46000 based on address "<192.168.1.2:46000>"
06/05/12 14:46:08 SECMAN: command 60008 DC_CHILDALIVE to daemon at <192.168.1.2:46000> from TCP port 41017 (blocking).
06/05/12 14:46:08 SECMAN: no cached key for {<192.168.1.2:46000>,<60008>}.
06/05/12 14:46:08 SECMAN: Security Policy:
Enact = "NO"
Subsystem = "SCHEDD"
CryptoMethods = "3DES,BLOWFISH"
NewSession = "YES"
ServerPid = 16470
AuthMethods = "CLAIMTOBE"
Encryption = "OPTIONAL"
Integrity = "OPTIONAL"
OutgoingNegotiation = "PREFERRED"
ParentUniqueID = "rorschach:16463:1338932765"
SessionDuration = "86400"
CurrentTime = time()
SessionLease = 3600
Authentication = "OPTIONAL"
06/05/12 14:46:08 SECMAN: negotiating security for command 60008.
06/05/12 14:46:08 SECMAN: sending DC_AUTHENTICATE command
06/05/12 14:46:08 SECMAN: sending following classad:
Enact = "NO"
Subsystem = "SCHEDD"
CryptoMethods = "3DES,BLOWFISH"
NewSession = "YES"
ServerPid = 16470
AuthMethods = "CLAIMTOBE"
Encryption = "OPTIONAL"
ServerCommandSock = "<192.168.1.2:46032>"
Integrity = "OPTIONAL"
OutgoingNegotiation = "PREFERRED"
ParentUniqueID = "rorschach:16463:1338932765"
Command = 60008
SessionDuration = "86400"
CurrentTime = time()
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $"
SessionLease = 3600
Authentication = "OPTIONAL"
06/05/12 14:46:08 SECMAN: server responded with:
Enact = "YES"
CryptoMethods = "3DES,BLOWFISH"
AuthMethodsList = "CLAIMTOBE"
AuthMethods = "CLAIMTOBE"
Encryption = "NO"
Integrity = "NO"
SessionDuration = "86400"
CurrentTime = time()
SessionLease = 3600
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $"
Authentication = "NO"
06/05/12 14:46:08 SECMAN: received post-auth classad:
Sid = "rorschach:16463:1338932768:2"
ValidCommands = "60000,60008,60017,60004,60012,60007,457"
CurrentTime = time()
User = "unauthenticated@unmapped"
06/05/12 14:46:08 SECMAN: policy to be cached:
Enact = "YES"
Subsystem = "SCHEDD"
Sid = "rorschach:16463:1338932768:2"
CryptoMethods = "3DES,BLOWFISH"
UseSession = "YES"
AuthMethodsList = "CLAIMTOBE"
AuthMethods = "CLAIMTOBE"
Encryption = "NO"
Integrity = "NO"
OutgoingNegotiation = "PREFERRED"
Command = 60008
ValidCommands = "60000,60008,60017,60004,60012,60007,457"
SessionDuration = "86400"
User = "unauthenticated@unmapped"
CurrentTime = time()
MyRemoteUserName = "unauthenticated@unmapped"
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $"
SessionLease = 3600
Authentication = "NO"
06/05/12 14:46:08 SECMAN: added session rorschach:16463:1338932768:2 to cache for 86400 seconds (3600s lease).
06/05/12 14:46:08 SECMAN: command {<192.168.1.2:46000>,<60000>} mapped to session rorschach:16463:1338932768:2.
06/05/12 14:46:08 SECMAN: command {<192.168.1.2:46000>,<60008>} mapped to session rorschach:16463:1338932768:2.
06/05/12 14:46:08 SECMAN: command {<192.168.1.2:46000>,<60017>} mapped to session rorschach:16463:1338932768:2.
06/05/12 14:46:08 SECMAN: command {<192.168.1.2:46000>,<60004>} mapped to session rorschach:16463:1338932768:2.
06/05/12 14:46:08 SECMAN: command {<192.168.1.2:46000>,<60012>} mapped to session rorschach:16463:1338932768:2.
06/05/12 14:46:08 SECMAN: command {<192.168.1.2:46000>,<60007>} mapped to session rorschach:16463:1338932768:2.
06/05/12 14:46:08 SECMAN: command {<192.168.1.2:46000>,<457>} mapped to session rorschach:16463:1338932768:2.
06/05/12 14:46:08 SECMAN: startCommand succeeded.
06/05/12 14:46:08 Authorizing server 'unauthenticated@unmapped/192.168.1.2'.
06/05/12 14:46:08 IPVERIFY: allow READ: * (from config value ALLOW_READ)
06/05/12 14:46:08 ipverify: READ optimized to allow anyone
06/05/12 14:46:08 IPVERIFY: allow WRITE: eje@localhost.localdomain, condor@localhost.localdomain, root@localhost.localdomain, test1@localhost.localdomain, test1@192.168.1.102, test1@192.168.1.2 (from config value ALLOW_WRITE)
06/05/12 14:46:08 IPVERIFY: allow NEGOTIATOR: * (from config value ALLOW_NEGOTIATOR_SCHEDD)
06/05/12 14:46:08 ipverify: NEGOTIATOR optimized to allow anyone
06/05/12 14:46:08 IPVERIFY: allow ADMINISTRATOR: eje@localhost.localdomain, condor@localhost.localdomain, root@localhost.localdomain, test1@localhost.localdomain, test1@192.168.1.102, test1@192.168.1.2 (from config value ALLOW_ADMINISTRATOR)
06/05/12 14:46:08 IPVERIFY: allow OWNER: rorschach.localdomain, localhost.localdomain (from config value ALLOW_OWNER)
06/05/12 14:46:08 ipverify: CONFIG optimized to deny everyone
06/05/12 14:46:08 IPVERIFY: allow DAEMON: eje@localhost.localdomain, condor@localhost.localdomain, root@localhost.localdomain, test1@localhost.localdomain, test1@192.168.1.102, test1@192.168.1.2 (from config value ALLOW_WRITE)
06/05/12 14:46:08 ipverify: SOAP optimized to allow anyone
06/05/12 14:46:08 ipverify: DEFAULT optimized to allow anyone
06/05/12 14:46:08 ipverify: CLIENT optimized to allow anyone
06/05/12 14:46:08 IPVERIFY: allow ADVERTISE_STARTD: eje@localhost.localdomain, condor@localhost.localdomain, root@localhost.localdomain, test1@localhost.localdomain, test1@192.168.1.102, test1@192.168.1.2 (from config value ALLOW_WRITE)
06/05/12 14:46:08 IPVERIFY: allow ADVERTISE_SCHEDD: eje@localhost.localdomain, condor@localhost.localdomain, root@localhost.localdomain, test1@localhost.localdomain, test1@192.168.1.102, test1@192.168.1.2 (from config value ALLOW_WRITE)
06/05/12 14:46:08 IPVERIFY: allow ADVERTISE_MASTER: eje@localhost.localdomain, condor@localhost.localdomain, root@localhost.localdomain, test1@localhost.localdomain, test1@192.168.1.102, test1@192.168.1.2 (from config value ALLOW_WRITE)
06/05/12 14:46:08 Initialized the following authorization table:
06/05/12 14:46:08 Authorizations yet to be resolved:
06/05/12 14:46:08 allow WRITE: eje@localhost.localdomain/* condor@localhost.localdomain/* root@localhost.localdomain/* test1@localhost.localdomain/* test1@192.168.1.102/* test1@192.168.1.2/*
06/05/12 14:46:08 allow ADMINISTRATOR: eje@localhost.localdomain/* condor@localhost.localdomain/* root@localhost.localdomain/* test1@localhost.localdomain/* test1@192.168.1.102/* test1@192.168.1.2/*
06/05/12 14:46:08 allow OWNER: */192.168.1.2 */127.0.0.1 */127.0.0.1 */rorschach.localdomain */localhost.localdomain */192.168.1.102 */192.168.1.102
06/05/12 14:46:08 allow DAEMON: eje@localhost.localdomain/* condor@localhost.localdomain/* root@localhost.localdomain/* test1@localhost.localdomain/* test1@192.168.1.102/* test1@192.168.1.2/*
06/05/12 14:46:08 allow ADVERTISE_STARTD: eje@localhost.localdomain/* condor@localhost.localdomain/* root@localhost.localdomain/* test1@localhost.localdomain/* test1@192.168.1.102/* test1@192.168.1.2/*
06/05/12 14:46:08 allow ADVERTISE_SCHEDD: eje@localhost.localdomain/* condor@localhost.localdomain/* root@localhost.localdomain/* test1@localhost.localdomain/* test1@192.168.1.102/* test1@192.168.1.2/*
06/05/12 14:46:08 allow ADVERTISE_MASTER: eje@localhost.localdomain/* condor@localhost.localdomain/* root@localhost.localdomain/* test1@localhost.localdomain/* test1@192.168.1.102/* test1@192.168.1.2/*
06/05/12 14:46:08 Completed DC_CHILDALIVE to daemon at <192.168.1.2:46000>
06/05/12 14:46:08 DaemonCore: Leaving SendAliveToParent() - success
06/05/12 14:46:08 Destroying Daemon object:
06/05/12 14:46:08 Type: 1 (any), Name: (null), Addr: <192.168.1.2:46000>
06/05/12 14:46:08 FullHost: (null), Host: (null), Pool: (null), Port: 46000
06/05/12 14:46:08 IsLocal: N, IdStr: daemon at <192.168.1.2:46000>, Error: (null)
06/05/12 14:46:08 --- End of Daemon object info ---
06/05/12 14:46:13 JobsRunning = 0
06/05/12 14:46:13 JobsIdle = 0
06/05/12 14:46:13 JobsHeld = 0
06/05/12 14:46:13 JobsRemoved = 0
06/05/12 14:46:13 LocalUniverseJobsRunning = 0
06/05/12 14:46:13 LocalUniverseJobsIdle = 0
06/05/12 14:46:13 SchedUniverseJobsRunning = 0
06/05/12 14:46:13 SchedUniverseJobsIdle = 0
06/05/12 14:46:13 N_Owners = 0
06/05/12 14:46:13 MaxJobsRunning = 1000000000
06/05/12 14:46:13 TransferQueueManager stats: active up=0/10 down=0/10; waiting up=0 down=0; wait time up=0s down=0s
06/05/12 14:46:13 Trying to update collector <127.0.0.1:9618>
06/05/12 14:46:13 Attempting to send update via UDP to collector localhost.localdomain <127.0.0.1:9618>
06/05/12 14:46:13 SECMAN: command 1 UPDATE_SCHEDD_AD to collector localhost.localdomain from UDP port 40621 (non-blocking).
06/05/12 14:46:13 SECMAN: no cached key for {<127.0.0.1:9618>,<1>}.
06/05/12 14:46:13 SECMAN: Security Policy:
Enact = "NO"
Subsystem = "SCHEDD"
CryptoMethods = "3DES,BLOWFISH"
ServerPid = 16470
AuthMethods = "CLAIMTOBE"
Encryption = "OPTIONAL"
Integrity = "OPTIONAL"
OutgoingNegotiation = "PREFERRED"
ParentUniqueID = "rorschach:16463:1338932765"
SessionDuration = "86400"
CurrentTime = time()
SessionLease = 3600
Authentication = "OPTIONAL"
06/05/12 14:46:13 SECMAN: negotiating security for command 1.
06/05/12 14:46:13 SECMAN: need to start a session via TCP
06/05/12 14:46:13 SECMAN: command 60010 UPDATE_SCHEDD_AD to <127.0.0.1:9618> from TCP port 51416 (non-blocking).
06/05/12 14:46:13 SECMAN: waiting for TCP connection to <127.0.0.1:9618>.
06/05/12 14:46:13 File descriptor limits: max 1024, safe 820
06/05/12 14:46:13 Sent HEART BEAT ad to 1 collectors. Number of submittors=0
06/05/12 14:46:13 ============ Begin clean_shadow_recs =============
06/05/12 14:46:13 ============ End clean_shadow_recs =============
06/05/12 14:46:13 New Daemon obj (startd) name: "NULL", pool: "NULL", addr: "NULL"
06/05/12 14:46:13 Destroying Daemon object:
06/05/12 14:46:13 Type: 4 (startd), Name: (null), Addr: (null)
06/05/12 14:46:13 FullHost: (null), Host: (null), Pool: (null), Port: -1
06/05/12 14:46:13 IsLocal: N, IdStr: (null), Error: (null)
06/05/12 14:46:13 --- End of Daemon object info ---
06/05/12 14:46:13 SECMAN: resuming command 60010 UPDATE_SCHEDD_AD to <127.0.0.1:9618> from TCP port 51416 (non-blocking).
06/05/12 14:46:13 SECMAN: no cached key for {<127.0.0.1:9618>,<60010>}.
06/05/12 14:46:13 SECMAN: Security Policy:
Enact = "NO"
Subsystem = "SCHEDD"
CryptoMethods = "3DES,BLOWFISH"
NewSession = "YES"
ServerPid = 16470
AuthMethods = "CLAIMTOBE"
Encryption = "OPTIONAL"
Integrity = "OPTIONAL"
OutgoingNegotiation = "PREFERRED"
ParentUniqueID = "rorschach:16463:1338932765"
SessionDuration = "86400"
CurrentTime = time()
SessionLease = 3600
Authentication = "OPTIONAL"
06/05/12 14:46:13 SECMAN: negotiating security for command 60010.
06/05/12 14:46:13 SECMAN: sending DC_AUTHENTICATE command
06/05/12 14:46:13 SECMAN: sending following classad:
Enact = "NO"
Subsystem = "SCHEDD"
CryptoMethods = "3DES,BLOWFISH"
NewSession = "YES"
ServerPid = 16470
AuthMethods = "CLAIMTOBE"
Encryption = "OPTIONAL"
ServerCommandSock = "<192.168.1.2:46032>"
Integrity = "OPTIONAL"
OutgoingNegotiation = "PREFERRED"
ParentUniqueID = "rorschach:16463:1338932765"
Command = 60010
AuthCommand = 1
SessionDuration = "86400"
CurrentTime = time()
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $"
SessionLease = 3600
Authentication = "OPTIONAL"
06/05/12 14:46:13 SECMAN: server responded with:
Enact = "YES"
CryptoMethods = "3DES,BLOWFISH"
AuthMethodsList = "CLAIMTOBE"
AuthMethods = "CLAIMTOBE"
Encryption = "NO"
Integrity = "NO"
SessionDuration = "86400"
CurrentTime = time()
SessionLease = 3600
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $"
Authentication = "NO"
06/05/12 14:46:13 SECMAN: received post-auth classad:
Sid = "rorschach:16467:1338932773:4"
ValidCommands = "1,11,14,18"
CurrentTime = time()
User = "unauthenticated@unmapped"
06/05/12 14:46:13 SECMAN: policy to be cached:
Enact = "YES"
Subsystem = "SCHEDD"
Sid = "rorschach:16467:1338932773:4"
CryptoMethods = "3DES,BLOWFISH"
UseSession = "YES"
AuthMethodsList = "CLAIMTOBE"
AuthMethods = "CLAIMTOBE"
Encryption = "NO"
Integrity = "NO"
OutgoingNegotiation = "PREFERRED"
Command = 60010
AuthCommand = 1
ValidCommands = "1,11,14,18"
SessionDuration = "86400"
User = "unauthenticated@unmapped"
CurrentTime = time()
MyRemoteUserName = "unauthenticated@unmapped"
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $"
SessionLease = 3600
Authentication = "NO"
06/05/12 14:46:13 SECMAN: added session rorschach:16467:1338932773:4 to cache for 86400 seconds (3600s lease).
06/05/12 14:46:13 SECMAN: command {<127.0.0.1:9618>,<1>} mapped to session rorschach:16467:1338932773:4.
06/05/12 14:46:13 SECMAN: command {<127.0.0.1:9618>,<11>} mapped to session rorschach:16467:1338932773:4.
06/05/12 14:46:13 SECMAN: command {<127.0.0.1:9618>,<14>} mapped to session rorschach:16467:1338932773:4.
06/05/12 14:46:13 SECMAN: command {<127.0.0.1:9618>,<18>} mapped to session rorschach:16467:1338932773:4.
06/05/12 14:46:13 SECMAN: startCommand succeeded.
06/05/12 14:46:13 Authorizing server 'unauthenticated@unmapped/127.0.0.1'.
06/05/12 14:46:13 SECMAN: succesfully created security session to <127.0.0.1:9618> via TCP!
06/05/12 14:46:13 SECMAN: resuming command 1 UPDATE_SCHEDD_AD to collector localhost.localdomain from UDP port 40621 (non-blocking).
06/05/12 14:46:13 SECMAN: using session rorschach:16467:1338932773:4 for {<127.0.0.1:9618>,<1>}.
06/05/12 14:46:13 SECMAN: found cached session id rorschach:16467:1338932773:4 for {<127.0.0.1:9618>,<1>}.
Enact = "YES"
Subsystem = "SCHEDD"
Sid = "rorschach:16467:1338932773:4"
CryptoMethods = "3DES,BLOWFISH"
UseSession = "YES"
AuthMethodsList = "CLAIMTOBE"
ServerPid = 16470
AuthMethods = "CLAIMTOBE"
Encryption = "NO"
Integrity = "NO"
OutgoingNegotiation = "PREFERRED"
ParentUniqueID = "rorschach:16463:1338932765"
Command = 60010
AuthCommand = 1
ValidCommands = "1,11,14,18"
SessionDuration = "86400"
User = "unauthenticated@unmapped"
CurrentTime = time()
MyRemoteUserName = "unauthenticated@unmapped"
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $"
SessionLease = 3600
Authentication = "NO"
06/05/12 14:46:13 SECMAN: Security Policy:
Enact = "YES"
Subsystem = "SCHEDD"
Sid = "rorschach:16467:1338932773:4"
CryptoMethods = "3DES,BLOWFISH"
UseSession = "YES"
AuthMethodsList = "CLAIMTOBE"
ServerPid = 16470
AuthMethods = "CLAIMTOBE"
Encryption = "NO"
Integrity = "NO"
OutgoingNegotiation = "PREFERRED"
ParentUniqueID = "rorschach:16463:1338932765"
Command = 60010
AuthCommand = 1
ValidCommands = "1,11,14,18"
SessionDuration = "86400"
User = "unauthenticated@unmapped"
CurrentTime = time()
MyRemoteUserName = "unauthenticated@unmapped"
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $"
SessionLease = 3600
Authentication = "NO"
06/05/12 14:46:13 SECMAN: negotiating security for command 1.
06/05/12 14:46:13 SECMAN: UDP, m_have_session == 1
06/05/12 14:46:13 SECMAN: UDP has session rorschach:16467:1338932773:4.
06/05/12 14:46:13 SECMAN: sending DC_AUTHENTICATE command
06/05/12 14:46:13 SECMAN: sending following classad:
Enact = "YES"
Subsystem = "SCHEDD"
Sid = "rorschach:16467:1338932773:4"
CryptoMethods = "3DES,BLOWFISH"
UseSession = "YES"
AuthMethodsList = "CLAIMTOBE"
ServerPid = 16470
AuthMethods = "CLAIMTOBE"
Encryption = "NO"
ServerCommandSock = "<192.168.1.2:46032>"
Integrity = "NO"
OutgoingNegotiation = "PREFERRED"
ParentUniqueID = "rorschach:16463:1338932765"
Command = 1
AuthCommand = 1
ValidCommands = "1,11,14,18"
SessionDuration = "86400"
User = "unauthenticated@unmapped"
CurrentTime = time()
MyRemoteUserName = "unauthenticated@unmapped"
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $"
SessionLease = 3600
Authentication = "NO"
06/05/12 14:46:13 Getting authenticated user from cached session: unauthenticated@unmapped
06/05/12 14:46:13 SECMAN: startCommand succeeded.
06/05/12 14:46:13 Authorizing server 'unauthenticated@unmapped/127.0.0.1'.
06/05/12 14:46:18 -------- Begin starting jobs --------
06/05/12 14:46:18 -------- Done starting jobs --------
06/05/12 14:46:28 JobsRunning = 0
06/05/12 14:46:28 JobsIdle = 0
06/05/12 14:46:28 JobsHeld = 0
06/05/12 14:46:28 JobsRemoved = 0
06/05/12 14:46:28 LocalUniverseJobsRunning = 0
06/05/12 14:46:28 LocalUniverseJobsIdle = 0
06/05/12 14:46:28 SchedUniverseJobsRunning = 0
06/05/12 14:46:28 SchedUniverseJobsIdle = 0
06/05/12 14:46:28 N_Owners = 0
06/05/12 14:46:28 MaxJobsRunning = 1000000000
06/05/12 14:46:28 TransferQueueManager stats: active up=0/10 down=0/10; waiting up=0 down=0; wait time up=0s down=0s
06/05/12 14:46:28 Trying to update collector <127.0.0.1:9618>
06/05/12 14:46:28 Attempting to send update via UDP to collector localhost.localdomain <127.0.0.1:9618>
06/05/12 14:46:28 SECMAN: command 1 UPDATE_SCHEDD_AD to collector localhost.localdomain from UDP port 54872 (non-blocking).
06/05/12 14:46:28 SECMAN: using session rorschach:16467:1338932773:4 for {<127.0.0.1:9618>,<1>}.
06/05/12 14:46:28 SECMAN: found cached session id rorschach:16467:1338932773:4 for {<127.0.0.1:9618>,<1>}.
Enact = "YES"
Subsystem = "SCHEDD"
Sid = "rorschach:16467:1338932773:4"
CryptoMethods = "3DES,BLOWFISH"
UseSession = "YES"
AuthMethodsList = "CLAIMTOBE"
AuthMethods = "CLAIMTOBE"
Encryption = "NO"
OutgoingNegotiation = "PREFERRED"
Integrity = "NO"
Command = 60010
AuthCommand = 1
ValidCommands = "1,11,14,18"
SessionDuration = "86400"
User = "unauthenticated@unmapped"
CurrentTime = time()
MyRemoteUserName = "unauthenticated@unmapped"
SessionLease = 3600
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $"
Authentication = "NO"
06/05/12 14:46:28 SECMAN: Security Policy:
Enact = "YES"
Subsystem = "SCHEDD"
Sid = "rorschach:16467:1338932773:4"
CryptoMethods = "3DES,BLOWFISH"
UseSession = "YES"
AuthMethodsList = "CLAIMTOBE"
AuthMethods = "CLAIMTOBE"
Encryption = "NO"
OutgoingNegotiation = "PREFERRED"
Integrity = "NO"
Command = 60010
AuthCommand = 1
ValidCommands = "1,11,14,18"
SessionDuration = "86400"
User = "unauthenticated@unmapped"
CurrentTime = time()
MyRemoteUserName = "unauthenticated@unmapped"
SessionLease = 3600
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $"
Authentication = "NO"
06/05/12 14:46:28 SECMAN: negotiating security for command 1.
06/05/12 14:46:28 SECMAN: UDP, m_have_session == 1
06/05/12 14:46:28 SECMAN: UDP has session rorschach:16467:1338932773:4.
06/05/12 14:46:28 SECMAN: sending DC_AUTHENTICATE command
06/05/12 14:46:28 SECMAN: sending following classad:
Enact = "YES"
Subsystem = "SCHEDD"
Sid = "rorschach:16467:1338932773:4"
CryptoMethods = "3DES,BLOWFISH"
UseSession = "YES"
AuthMethodsList = "CLAIMTOBE"
AuthMethods = "CLAIMTOBE"
Encryption = "NO"
ServerCommandSock = "<192.168.1.2:46032>"
OutgoingNegotiation = "PREFERRED"
Integrity = "NO"
Command = 1
AuthCommand = 1
ValidCommands = "1,11,14,18"
SessionDuration = "86400"
User = "unauthenticated@unmapped"
CurrentTime = time()
MyRemoteUserName = "unauthenticated@unmapped"
SessionLease = 3600
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $"
Authentication = "NO"
06/05/12 14:46:28 Getting authenticated user from cached session: unauthenticated@unmapped
06/05/12 14:46:28 SECMAN: startCommand succeeded.
06/05/12 14:46:28 Authorizing server 'unauthenticated@unmapped/127.0.0.1'.
06/05/12 14:46:28 Sent HEART BEAT ad to 1 collectors. Number of submittors=0
06/05/12 14:46:28 ============ Begin clean_shadow_recs =============
06/05/12 14:46:28 ============ End clean_shadow_recs =============
06/05/12 14:46:28 New Daemon obj (startd) name: "NULL", pool: "NULL", addr: "NULL"
06/05/12 14:46:28 Destroying Daemon object:
06/05/12 14:46:28 Type: 4 (startd), Name: (null), Addr: (null)
06/05/12 14:46:28 FullHost: (null), Host: (null), Pool: (null), Port: -1
06/05/12 14:46:28 IsLocal: N, IdStr: (null), Error: (null)
06/05/12 14:46:28 --- End of Daemon object info ---
06/05/12 14:46:34 -------- Begin starting jobs --------
06/05/12 14:46:34 -------- Done starting jobs --------
06/05/12 14:46:44 JobsRunning = 0
06/05/12 14:46:44 JobsIdle = 0
06/05/12 14:46:44 JobsHeld = 0
06/05/12 14:46:44 JobsRemoved = 0
06/05/12 14:46:44 LocalUniverseJobsRunning = 0
06/05/12 14:46:44 LocalUniverseJobsIdle = 0
06/05/12 14:46:44 SchedUniverseJobsRunning = 0
06/05/12 14:46:44 SchedUniverseJobsIdle = 0
06/05/12 14:46:44 N_Owners = 0
06/05/12 14:46:44 MaxJobsRunning = 1000000000
06/05/12 14:46:44 TransferQueueManager stats: active up=0/10 down=0/10; waiting up=0 down=0; wait time up=0s down=0s
06/05/12 14:46:44 Trying to update collector <127.0.0.1:9618>
06/05/12 14:46:44 Attempting to send update via UDP to collector localhost.localdomain <127.0.0.1:9618>
06/05/12 14:46:44 SECMAN: command 1 UPDATE_SCHEDD_AD to collector localhost.localdomain from UDP port 34166 (non-blocking).
06/05/12 14:46:44 SECMAN: using session rorschach:16467:1338932773:4 for {<127.0.0.1:9618>,<1>}.
06/05/12 14:46:44 SECMAN: found cached session id rorschach:16467:1338932773:4 for {<127.0.0.1:9618>,<1>}.
Enact = "YES"
Subsystem = "SCHEDD"
Sid = "rorschach:16467:1338932773:4"
CryptoMethods = "3DES,BLOWFISH"
UseSession = "YES"
AuthMethodsList = "CLAIMTOBE"
AuthMethods = "CLAIMTOBE"
Encryption = "NO"
OutgoingNegotiation = "PREFERRED"
Integrity = "NO"
Command = 60010
AuthCommand = 1
ValidCommands = "1,11,14,18"
SessionDuration = "86400"
User = "unauthenticated@unmapped"
CurrentTime = time()
MyRemoteUserName = "unauthenticated@unmapped"
SessionLease = 3600
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $"
Authentication = "NO"
06/05/12 14:46:44 SECMAN: Security Policy:
Enact = "YES"
Subsystem = "SCHEDD"
Sid = "rorschach:16467:1338932773:4"
CryptoMethods = "3DES,BLOWFISH"
UseSession = "YES"
AuthMethodsList = "CLAIMTOBE"
AuthMethods = "CLAIMTOBE"
Encryption = "NO"
OutgoingNegotiation = "PREFERRED"
Integrity = "NO"
Command = 60010
AuthCommand = 1
ValidCommands = "1,11,14,18"
SessionDuration = "86400"
User = "unauthenticated@unmapped"
CurrentTime = time()
MyRemoteUserName = "unauthenticated@unmapped"
SessionLease = 3600
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $"
Authentication = "NO"
06/05/12 14:46:44 SECMAN: negotiating security for command 1.
06/05/12 14:46:44 SECMAN: UDP, m_have_session == 1
06/05/12 14:46:44 SECMAN: UDP has session rorschach:16467:1338932773:4.
06/05/12 14:46:44 SECMAN: sending DC_AUTHENTICATE command
06/05/12 14:46:44 SECMAN: sending following classad:
Enact = "YES"
Subsystem = "SCHEDD"
Sid = "rorschach:16467:1338932773:4"
CryptoMethods = "3DES,BLOWFISH"
UseSession = "YES"
AuthMethodsList = "CLAIMTOBE"
AuthMethods = "CLAIMTOBE"
Encryption = "NO"
ServerCommandSock = "<192.168.1.2:46032>"
OutgoingNegotiation = "PREFERRED"
Integrity = "NO"
Command = 1
AuthCommand = 1
ValidCommands = "1,11,14,18"
SessionDuration = "86400"
User = "unauthenticated@unmapped"
CurrentTime = time()
MyRemoteUserName = "unauthenticated@unmapped"
SessionLease = 3600
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $"
Authentication = "NO"
06/05/12 14:46:44 Getting authenticated user from cached session: unauthenticated@unmapped
06/05/12 14:46:44 SECMAN: startCommand succeeded.
06/05/12 14:46:44 Authorizing server 'unauthenticated@unmapped/127.0.0.1'.
06/05/12 14:46:44 Sent HEART BEAT ad to 1 collectors. Number of submittors=0
06/05/12 14:46:44 ============ Begin clean_shadow_recs =============
06/05/12 14:46:44 ============ End clean_shadow_recs =============
06/05/12 14:46:44 New Daemon obj (startd) name: "NULL", pool: "NULL", addr: "NULL"
06/05/12 14:46:44 Destroying Daemon object:
06/05/12 14:46:44 Type: 4 (startd), Name: (null), Addr: (null)
06/05/12 14:46:44 FullHost: (null), Host: (null), Pool: (null), Port: -1
06/05/12 14:46:44 IsLocal: N, IdStr: (null), Error: (null)
06/05/12 14:46:44 --- End of Daemon object info ---
06/05/12 14:46:50 -------- Begin starting jobs --------
06/05/12 14:46:50 -------- Done starting jobs --------
06/05/12 14:46:55 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.2:55107>
06/05/12 14:46:55 DC_AUTHENTICATE: received following ClassAd:
Enact = "NO"
Subsystem = "SUBMIT"
CryptoMethods = "3DES,BLOWFISH"
NewSession = "YES"
ServerPid = 16547
AuthMethods = "CLAIMTOBE"
Encryption = "OPTIONAL"
OutgoingNegotiation = "PREFERRED"
Integrity = "OPTIONAL"
Command = 1112
SessionDuration = "60"
CurrentTime = time()
SessionLease = 3600
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $"
Authentication = "OPTIONAL"
06/05/12 14:46:55 DC_AUTHENTICATE: our_policy:
Enact = "NO"
Subsystem = "SCHEDD"
CryptoMethods = "3DES,BLOWFISH"
ServerPid = 16470
AuthMethods = "CLAIMTOBE"
Encryption = "OPTIONAL"
Integrity = "OPTIONAL"
OutgoingNegotiation = "REQUIRED"
ParentUniqueID = "rorschach:16463:1338932765"
SessionDuration = "86400"
CurrentTime = time()
SessionLease = 3600
Authentication = "REQUIRED"
06/05/12 14:46:55 DC_AUTHENTICATE: the_policy:
Enact = "YES"
CryptoMethods = "3DES,BLOWFISH"
AuthMethodsList = "CLAIMTOBE"
AuthMethods = "CLAIMTOBE"
Encryption = "NO"
Integrity = "NO"
SessionDuration = "60"
CurrentTime = time()
SessionLease = 3600
Authentication = "YES"
06/05/12 14:46:55 DC_AUTHENTICATE: generating 3DES key for session rorschach:16470:1338932815:0...
06/05/12 14:46:55 SECMAN: Sending following response ClassAd:
Enact = "YES"
CryptoMethods = "3DES,BLOWFISH"
AuthMethodsList = "CLAIMTOBE"
AuthMethods = "CLAIMTOBE"
Encryption = "NO"
Integrity = "NO"
SessionDuration = "60"
CurrentTime = time()
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $"
SessionLease = 3600
Authentication = "YES"
06/05/12 14:46:55 SECMAN: new session, doing initial authentication.
06/05/12 14:46:55 DC_AUTHENTICATE: authenticating RIGHT NOW.
06/05/12 14:46:55 AUTHENTICATE: in authenticate( addr == NULL, methods == 'CLAIMTOBE')
06/05/12 14:46:55 AUTHENTICATE: can still try these methods: CLAIMTOBE
06/05/12 14:46:55 HANDSHAKE: in handshake(my_methods = 'CLAIMTOBE')
06/05/12 14:46:55 HANDSHAKE: handshake() - i am the server
06/05/12 14:46:55 HANDSHAKE: client sent (methods == 2)
06/05/12 14:46:55 HANDSHAKE: i picked (method == 2)
06/05/12 14:46:55 HANDSHAKE: client received (method == 2)
06/05/12 14:46:55 AUTHENTICATE: will try to use 2 (CLAIMTOBE)
06/05/12 14:46:55 AUTHENTICATE: auth_status == 2 (CLAIMTOBE)
06/05/12 14:46:55 Authentication was a Success.
06/05/12 14:46:55 ZKM: setting default map to test1
06/05/12 14:46:55 ZKM: post-map: current user is 'test1'
06/05/12 14:46:55 ZKM: post-map: current domain is '(null)'
06/05/12 14:46:55 ZKM: post-map: current FQU is 'test1'
06/05/12 14:46:55 DC_AUTHENTICATE: authentication of 192.168.1.2 complete.
06/05/12 14:46:55 DC_AUTHENTICATE: sending session ad:
Sid = "rorschach:16470:1338932815:0"
TriedAuthentication = true
ValidCommands = "511,74000,60004,60012,1112,404,421,464,478,480,481,486,487,488,489,499,502,507,509,60007,1111,441,443,457,471"
User = "test1"
CurrentTime = time()
06/05/12 14:46:55 DC_AUTHENTICATE: sent session rorschach:16470:1338932815:0 info!
06/05/12 14:46:55 DC_AUTHENTICATE: added incoming session id rorschach:16470:1338932815:0 to cache for 80 seconds (lease is 3620s, return address is unknown).
Enact = "YES"
Subsystem = "SUBMIT"
Sid = "rorschach:16470:1338932815:0"
CryptoMethods = "3DES,BLOWFISH"
TriedAuthentication = true
AuthMethodsList = "CLAIMTOBE"
ServerPid = 16547
AuthMethods = "CLAIMTOBE"
Encryption = "NO"
Integrity = "NO"
ValidCommands = "511,74000,60004,60012,1112,404,421,464,478,480,481,486,487,488,489,499,502,507,509,60007,1111,441,443,457,471"
SessionDuration = "60"
User = "test1"
CurrentTime = time()
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $"
SessionLease = 3600
Authentication = "YES"
06/05/12 14:46:55 DC_AUTHENTICATE: Success.
06/05/12 14:46:55 Adding to resolved authorization table: test1/192.168.1.2: DENY_ADMINISTRATOR
06/05/12 14:46:55 Adding to resolved authorization table: test1/192.168.1.2: DENY_DAEMON
06/05/12 14:46:55 Adding to resolved authorization table: test1/192.168.1.2: DENY_WRITE
06/05/12 14:46:55 PERMISSION DENIED to test1 from host 192.168.1.2 for command 1112 (QMGMT_WRITE_CMD), access level WRITE: reason: WRITE authorization policy contains no matching ALLOW entry for this request; identifiers used for this host: 192.168.1.2,rorschach,rorschach.localdomain,localhost,localhost.localdomain,rorschach.localdomain,localhost.localdomain,localhost,rorschach.localdomain,localhost,localhost.localdomain,localhost6.localdomain6,localhost6,rorschach6,rorschach6.localdomain6,rorschach.localdomain
06/05/12 14:47:00 JobsRunning = 0
06/05/12 14:47:00 JobsIdle = 0
06/05/12 14:47:00 JobsHeld = 0
06/05/12 14:47:00 JobsRemoved = 0
06/05/12 14:47:00 LocalUniverseJobsRunning = 0
06/05/12 14:47:00 LocalUniverseJobsIdle = 0
06/05/12 14:47:00 SchedUniverseJobsRunning = 0
06/05/12 14:47:00 SchedUniverseJobsIdle = 0
06/05/12 14:47:00 N_Owners = 0
06/05/12 14:47:00 MaxJobsRunning = 1000000000
06/05/12 14:47:00 TransferQueueManager stats: active up=0/10 down=0/10; waiting up=0 down=0; wait time up=0s down=0s
06/05/12 14:47:00 Trying to update collector <127.0.0.1:9618>
06/05/12 14:47:00 Attempting to send update via UDP to collector localhost.localdomain <127.0.0.1:9618>
06/05/12 14:47:00 SECMAN: command 1 UPDATE_SCHEDD_AD to collector localhost.localdomain from UDP port 36971 (non-blocking).
06/05/12 14:47:00 SECMAN: using session rorschach:16467:1338932773:4 for {<127.0.0.1:9618>,<1>}.
06/05/12 14:47:00 SECMAN: found cached session id rorschach:16467:1338932773:4 for {<127.0.0.1:9618>,<1>}.
Enact = "YES"
Subsystem = "SCHEDD"
Sid = "rorschach:16467:1338932773:4"
CryptoMethods = "3DES,BLOWFISH"
UseSession = "YES"
AuthMethodsList = "CLAIMTOBE"
AuthMethods = "CLAIMTOBE"
Encryption = "NO"
OutgoingNegotiation = "PREFERRED"
Integrity = "NO"
Command = 60010
AuthCommand = 1
ValidCommands = "1,11,14,18"
SessionDuration = "86400"
User = "unauthenticated@unmapped"
CurrentTime = time()
MyRemoteUserName = "unauthenticated@unmapped"
SessionLease = 3600
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $"
Authentication = "NO"
06/05/12 14:47:00 SECMAN: Security Policy:
Enact = "YES"
Subsystem = "SCHEDD"
Sid = "rorschach:16467:1338932773:4"
CryptoMethods = "3DES,BLOWFISH"
UseSession = "YES"
AuthMethodsList = "CLAIMTOBE"
AuthMethods = "CLAIMTOBE"
Encryption = "NO"
OutgoingNegotiation = "PREFERRED"
Integrity = "NO"
Command = 60010
AuthCommand = 1
ValidCommands = "1,11,14,18"
SessionDuration = "86400"
User = "unauthenticated@unmapped"
CurrentTime = time()
MyRemoteUserName = "unauthenticated@unmapped"
SessionLease = 3600
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $"
Authentication = "NO"
06/05/12 14:47:00 SECMAN: negotiating security for command 1.
06/05/12 14:47:00 SECMAN: UDP, m_have_session == 1
06/05/12 14:47:00 SECMAN: UDP has session rorschach:16467:1338932773:4.
06/05/12 14:47:00 SECMAN: sending DC_AUTHENTICATE command
06/05/12 14:47:00 SECMAN: sending following classad:
Enact = "YES"
Subsystem = "SCHEDD"
Sid = "rorschach:16467:1338932773:4"
CryptoMethods = "3DES,BLOWFISH"
UseSession = "YES"
AuthMethodsList = "CLAIMTOBE"
AuthMethods = "CLAIMTOBE"
Encryption = "NO"
ServerCommandSock = "<192.168.1.2:46032>"
OutgoingNegotiation = "PREFERRED"
Integrity = "NO"
Command = 1
AuthCommand = 1
ValidCommands = "1,11,14,18"
SessionDuration = "86400"
User = "unauthenticated@unmapped"
CurrentTime = time()
MyRemoteUserName = "unauthenticated@unmapped"
SessionLease = 3600
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $"
Authentication = "NO"
06/05/12 14:47:00 Getting authenticated user from cached session: unauthenticated@unmapped
06/05/12 14:47:00 SECMAN: startCommand succeeded.
06/05/12 14:47:00 Authorizing server 'unauthenticated@unmapped/127.0.0.1'.
06/05/12 14:47:00 Sent HEART BEAT ad to 1 collectors. Number of submittors=0
06/05/12 14:47:00 ============ Begin clean_shadow_recs =============
06/05/12 14:47:00 ============ End clean_shadow_recs =============
06/05/12 14:47:00 New Daemon obj (startd) name: "NULL", pool: "NULL", addr: "NULL"
06/05/12 14:47:00 Destroying Daemon object:
06/05/12 14:47:00 Type: 4 (startd), Name: (null), Addr: (null)
06/05/12 14:47:00 FullHost: (null), Host: (null), Pool: (null), Port: -1
06/05/12 14:47:00 IsLocal: N, IdStr: (null), Error: (null)
06/05/12 14:47:00 --- End of Daemon object info ---
06/05/12 14:47:06 -------- Begin starting jobs --------
06/05/12 14:47:06 -------- Done starting jobs --------
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment