Created
June 5, 2012 22:03
-
-
Save erikerlandson/2878348 to your computer and use it in GitHub Desktop.
Condor log file
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# at config time, it tells me it sees configuration to allow 'test1': | |
06/05/12 14:46:08 IPVERIFY: allow WRITE: [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] (from config value ALLOW_WRITE) | |
# I'm interested in what this means: | |
06/05/12 14:46:08 Authorizations yet to be resolved: | |
06/05/12 14:46:08 allow WRITE: [email protected]/* [email protected]/* [email protected]/* [email protected]/* [email protected]/* [email protected]/* | |
# When the rubber hits the road, it resolves as 'deny': | |
06/05/12 14:46:55 Adding to resolved authorization table: test1/192.168.1.2: DENY_ADMINISTRATOR | |
06/05/12 14:46:55 Adding to resolved authorization table: test1/192.168.1.2: DENY_DAEMON | |
06/05/12 14:46:55 Adding to resolved authorization table: test1/192.168.1.2: DENY_WRITE | |
06/05/12 14:46:55 PERMISSION DENIED to test1 from host 192.168.1.2 for command 1112 (QMGMT_WRITE_CMD), access level WRITE: reason: WRITE authorization policy contains no matching ALLOW entry for this request; identifiers used for this host: 192.168.1.2,rorschach,rorschach.localdomain,localhost,localhost.localdomain,rorschach.localdomain,localhost.localdomain,localhost,rorschach.localdomain,localhost,localhost.localdomain,localhost6.localdomain6,localhost6,rorschach6,rorschach6.localdomain6,rorschach.localdomain | |
# here is the full log for context: | |
06/05/12 14:46:07 Reading from /proc/cpuinfo | |
06/05/12 14:46:07 Found: Physical-IDs:True; Core-IDs:True | |
06/05/12 14:46:07 Analyzing 2 processors using IDs... | |
06/05/12 14:46:07 Looking at processor #0 (PID:0, CID:0): | |
06/05/12 14:46:07 Comparing P#0 and P#1 : pid:0!=0 or cid:0!=1 (match=No) | |
06/05/12 14:46:07 ncpus = 1 | |
06/05/12 14:46:07 P0: match->1 | |
06/05/12 14:46:07 Looking at processor #1 (PID:0, CID:1): | |
06/05/12 14:46:07 ncpus = 2 | |
06/05/12 14:46:07 P1: match->1 | |
06/05/12 14:46:07 Using IDs: 2 processors, 2 CPUs, 0 HTs | |
06/05/12 14:46:07 Finding local host information, calling gethostname() | |
06/05/12 14:46:07 gethostname() returned a host with no domain "rorschach" | |
06/05/12 14:46:07 Trying to find full hostname for "rorschach" | |
06/05/12 14:46:07 Calling gethostbyname(rorschach) | |
06/05/12 14:46:07 Trying to find full hostname from hostent | |
06/05/12 14:46:07 Main name in hostent "rorschach" contains no '.', checking aliases | |
06/05/12 14:46:07 Checking alias "rorschach.localdomain" | |
06/05/12 14:46:07 Alias "rorschach.localdomain" is fully qualified | |
06/05/12 14:46:07 Ignoring config file based on LOCAL_CONFIG_DIR_EXCLUDE_REGEXP, '/home/eje/condor/config.d/95.auth-acct-grps.config~' | |
06/05/12 14:46:07 Ignoring config file based on LOCAL_CONFIG_DIR_EXCLUDE_REGEXP, '/home/eje/condor/config.d/05.min.config~' | |
06/05/12 14:46:07 Trying to initialize local IP address (config file not read) | |
06/05/12 14:46:07 NETWORK_INTERFACE=* matches lo 127.0.0.1, wlan0 192.168.1.2, virbr0 192.168.122.1, tun0 10.3.233.74, choosing IP 192.168.1.2 | |
06/05/12 14:46:07 Trying to initialize local IP address (after reading config) | |
06/05/12 14:46:07 NETWORK_INTERFACE=* matches lo 127.0.0.1, wlan0 192.168.1.2, virbr0 192.168.122.1, tun0 10.3.233.74, choosing IP 192.168.1.2 | |
06/05/12 14:46:07 KEYCACHE: created: 0x1ea15b0 | |
06/05/12 14:46:07 Setting maximum accepts per cycle 8. | |
06/05/12 14:46:07 ****************************************************** | |
06/05/12 14:46:07 ** condor_schedd (CONDOR_SCHEDD) STARTING UP | |
06/05/12 14:46:07 ** /usr/local/src/condor/grid/src/release_dir/sbin/condor_schedd | |
06/05/12 14:46:07 ** SubsystemInfo: name=SCHEDD type=SCHEDD(5) class=DAEMON(1) | |
06/05/12 14:46:07 ** Configuration: subsystem:SCHEDD local:IT class:DAEMON | |
06/05/12 14:46:07 ** $CondorVersion: 7.6.5 Jun 05 2012 $ | |
06/05/12 14:46:07 ** $CondorPlatform: X86_64-Fedora_12 $ | |
06/05/12 14:46:07 ** PID = 16470 | |
06/05/12 14:46:07 ** Log last touched time unavailable (No such file or directory) | |
06/05/12 14:46:07 ****************************************************** | |
06/05/12 14:46:07 Using config source: /home/eje/condor/condor.config | |
06/05/12 14:46:07 Using local config sources: | |
06/05/12 14:46:07 /home/eje/condor/config.d/05.min.config | |
06/05/12 14:46:07 /home/eje/condor/config.d/10.log.config | |
06/05/12 14:46:07 /home/eje/condor/config.d/15.slot.config | |
06/05/12 14:46:07 /home/eje/condor/config.d/20.disable.preempt.config | |
06/05/12 14:46:07 /home/eje/condor/config.d/25.interval.config | |
06/05/12 14:46:07 /home/eje/condor/config.d/30.qmfbroker.config | |
06/05/12 14:46:07 /home/eje/condor/config.d/35.startd.schedd.config | |
06/05/12 14:46:07 /home/eje/condor/config.d/60.condor-qmf.config | |
06/05/12 14:46:07 /home/eje/condor/config.d/90.eje.config | |
06/05/12 14:46:07 /home/eje/condor/config.d/95.auth-acct-grps.config | |
06/05/12 14:46:07 Not using shared port because USE_SHARED_PORT=false | |
06/05/12 14:46:07 DaemonCore: command socket at <192.168.1.2:46032> | |
06/05/12 14:46:07 DaemonCore: private command socket at <192.168.1.2:46032> | |
06/05/12 14:46:07 Setting maximum accepts per cycle 8. | |
06/05/12 14:46:07 COLLECTOR_HOST is set to "localhost.localdomain" | |
06/05/12 14:46:07 New Daemon obj (collector) name: "localhost.localdomain", pool: "NULL", addr: "NULL" | |
06/05/12 14:46:07 Using name "localhost.localdomain" to find daemon | |
06/05/12 14:46:07 Port not specified, using default (9618) | |
06/05/12 14:46:07 Host info "localhost.localdomain" is a hostname, finding IP address | |
06/05/12 14:46:07 Trying to find IP addr for "localhost.localdomain" | |
06/05/12 14:46:07 Calling gethostbyname(localhost.localdomain) | |
06/05/12 14:46:07 Found IP addr in hostent: 127.0.0.1 | |
06/05/12 14:46:07 Found IP address and port <127.0.0.1:9618> | |
06/05/12 14:46:07 Will use UDP to update collector localhost.localdomain <127.0.0.1:9618> | |
06/05/12 14:46:07 Not using shared port because USE_SHARED_PORT=false | |
06/05/12 14:46:07 Trying to find full hostname for "it_sch" | |
06/05/12 14:46:07 Calling gethostbyname(it_sch) | |
06/05/12 14:46:07 gethostbyname() failed: Success (errno: 0) | |
06/05/12 14:46:07 Using name: [email protected] | |
06/05/12 14:46:07 No Accountant host specified in config file | |
06/05/12 14:46:07 History file rotation is enabled. | |
06/05/12 14:46:07 Maximum history file size is: 20971520 bytes | |
06/05/12 14:46:07 Number of rotated history files is: 2 | |
06/05/12 14:46:07 initLocalStarterDir(): /home/eje/condor/local/spool.IT/local_univ_execute does not exist, calling mkdir() | |
06/05/12 14:46:07 initLocalStarterDir(): Changing permission on /home/eje/condor/local/spool.IT/local_univ_execute | |
06/05/12 14:46:07 Period for SelfDrainingQueue job_is_finished_queue set to 0 | |
06/05/12 14:46:07 Count per interval for SelfDrainingQueue stop_job_queue set to 1 | |
06/05/12 14:46:07 Queue Management Super Users: | |
06/05/12 14:46:07 root | |
06/05/12 14:46:07 condor | |
06/05/12 14:46:07 eje | |
06/05/12 14:46:08 "/home/eje/condor/release/sbin/condor_shadow.std -classad" did not produce any output, ignoring | |
06/05/12 14:46:08 CronJobMgr: Setting name to 'schedd' | |
06/05/12 14:46:08 CronJobMgr: Setting parameter base to 'schedd_cron' | |
06/05/12 14:46:08 CronJobMgr: Initializing 'schedd' | |
06/05/12 14:46:08 CronJobMgr: Doing config (initial) | |
06/05/12 14:46:08 Registering PeriodicExprHandler(), next callback in 300 seconds | |
06/05/12 14:46:08 Spool format version requires >= 0 (I support version 1) | |
06/05/12 14:46:08 Spool format version is 0 (I require version >= 0) | |
06/05/12 14:46:08 AutoCluster:config((null)) invoked | |
06/05/12 14:46:08 Setting delay until next queue scan to 5 seconds | |
06/05/12 14:46:08 DaemonCore: No more children processes to reap. | |
06/05/12 14:46:08 Getting monitoring info for pid 16470 | |
06/05/12 14:46:08 DaemonCore: in SendAliveToParent() | |
06/05/12 14:46:08 New Daemon obj (any) name: "NULL", pool: "NULL", addr: "<192.168.1.2:46000>" | |
06/05/12 14:46:08 Using port 46000 based on address "<192.168.1.2:46000>" | |
06/05/12 14:46:08 SECMAN: command 60008 DC_CHILDALIVE to daemon at <192.168.1.2:46000> from TCP port 41017 (blocking). | |
06/05/12 14:46:08 SECMAN: no cached key for {<192.168.1.2:46000>,<60008>}. | |
06/05/12 14:46:08 SECMAN: Security Policy: | |
Enact = "NO" | |
Subsystem = "SCHEDD" | |
CryptoMethods = "3DES,BLOWFISH" | |
NewSession = "YES" | |
ServerPid = 16470 | |
AuthMethods = "CLAIMTOBE" | |
Encryption = "OPTIONAL" | |
Integrity = "OPTIONAL" | |
OutgoingNegotiation = "PREFERRED" | |
ParentUniqueID = "rorschach:16463:1338932765" | |
SessionDuration = "86400" | |
CurrentTime = time() | |
SessionLease = 3600 | |
Authentication = "OPTIONAL" | |
06/05/12 14:46:08 SECMAN: negotiating security for command 60008. | |
06/05/12 14:46:08 SECMAN: sending DC_AUTHENTICATE command | |
06/05/12 14:46:08 SECMAN: sending following classad: | |
Enact = "NO" | |
Subsystem = "SCHEDD" | |
CryptoMethods = "3DES,BLOWFISH" | |
NewSession = "YES" | |
ServerPid = 16470 | |
AuthMethods = "CLAIMTOBE" | |
Encryption = "OPTIONAL" | |
ServerCommandSock = "<192.168.1.2:46032>" | |
Integrity = "OPTIONAL" | |
OutgoingNegotiation = "PREFERRED" | |
ParentUniqueID = "rorschach:16463:1338932765" | |
Command = 60008 | |
SessionDuration = "86400" | |
CurrentTime = time() | |
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $" | |
SessionLease = 3600 | |
Authentication = "OPTIONAL" | |
06/05/12 14:46:08 SECMAN: server responded with: | |
Enact = "YES" | |
CryptoMethods = "3DES,BLOWFISH" | |
AuthMethodsList = "CLAIMTOBE" | |
AuthMethods = "CLAIMTOBE" | |
Encryption = "NO" | |
Integrity = "NO" | |
SessionDuration = "86400" | |
CurrentTime = time() | |
SessionLease = 3600 | |
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $" | |
Authentication = "NO" | |
06/05/12 14:46:08 SECMAN: received post-auth classad: | |
Sid = "rorschach:16463:1338932768:2" | |
ValidCommands = "60000,60008,60017,60004,60012,60007,457" | |
CurrentTime = time() | |
User = "unauthenticated@unmapped" | |
06/05/12 14:46:08 SECMAN: policy to be cached: | |
Enact = "YES" | |
Subsystem = "SCHEDD" | |
Sid = "rorschach:16463:1338932768:2" | |
CryptoMethods = "3DES,BLOWFISH" | |
UseSession = "YES" | |
AuthMethodsList = "CLAIMTOBE" | |
AuthMethods = "CLAIMTOBE" | |
Encryption = "NO" | |
Integrity = "NO" | |
OutgoingNegotiation = "PREFERRED" | |
Command = 60008 | |
ValidCommands = "60000,60008,60017,60004,60012,60007,457" | |
SessionDuration = "86400" | |
User = "unauthenticated@unmapped" | |
CurrentTime = time() | |
MyRemoteUserName = "unauthenticated@unmapped" | |
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $" | |
SessionLease = 3600 | |
Authentication = "NO" | |
06/05/12 14:46:08 SECMAN: added session rorschach:16463:1338932768:2 to cache for 86400 seconds (3600s lease). | |
06/05/12 14:46:08 SECMAN: command {<192.168.1.2:46000>,<60000>} mapped to session rorschach:16463:1338932768:2. | |
06/05/12 14:46:08 SECMAN: command {<192.168.1.2:46000>,<60008>} mapped to session rorschach:16463:1338932768:2. | |
06/05/12 14:46:08 SECMAN: command {<192.168.1.2:46000>,<60017>} mapped to session rorschach:16463:1338932768:2. | |
06/05/12 14:46:08 SECMAN: command {<192.168.1.2:46000>,<60004>} mapped to session rorschach:16463:1338932768:2. | |
06/05/12 14:46:08 SECMAN: command {<192.168.1.2:46000>,<60012>} mapped to session rorschach:16463:1338932768:2. | |
06/05/12 14:46:08 SECMAN: command {<192.168.1.2:46000>,<60007>} mapped to session rorschach:16463:1338932768:2. | |
06/05/12 14:46:08 SECMAN: command {<192.168.1.2:46000>,<457>} mapped to session rorschach:16463:1338932768:2. | |
06/05/12 14:46:08 SECMAN: startCommand succeeded. | |
06/05/12 14:46:08 Authorizing server 'unauthenticated@unmapped/192.168.1.2'. | |
06/05/12 14:46:08 IPVERIFY: allow READ: * (from config value ALLOW_READ) | |
06/05/12 14:46:08 ipverify: READ optimized to allow anyone | |
06/05/12 14:46:08 IPVERIFY: allow WRITE: [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] (from config value ALLOW_WRITE) | |
06/05/12 14:46:08 IPVERIFY: allow NEGOTIATOR: * (from config value ALLOW_NEGOTIATOR_SCHEDD) | |
06/05/12 14:46:08 ipverify: NEGOTIATOR optimized to allow anyone | |
06/05/12 14:46:08 IPVERIFY: allow ADMINISTRATOR: [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] (from config value ALLOW_ADMINISTRATOR) | |
06/05/12 14:46:08 IPVERIFY: allow OWNER: rorschach.localdomain, localhost.localdomain (from config value ALLOW_OWNER) | |
06/05/12 14:46:08 ipverify: CONFIG optimized to deny everyone | |
06/05/12 14:46:08 IPVERIFY: allow DAEMON: [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] (from config value ALLOW_WRITE) | |
06/05/12 14:46:08 ipverify: SOAP optimized to allow anyone | |
06/05/12 14:46:08 ipverify: DEFAULT optimized to allow anyone | |
06/05/12 14:46:08 ipverify: CLIENT optimized to allow anyone | |
06/05/12 14:46:08 IPVERIFY: allow ADVERTISE_STARTD: [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] (from config value ALLOW_WRITE) | |
06/05/12 14:46:08 IPVERIFY: allow ADVERTISE_SCHEDD: [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] (from config value ALLOW_WRITE) | |
06/05/12 14:46:08 IPVERIFY: allow ADVERTISE_MASTER: [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] (from config value ALLOW_WRITE) | |
06/05/12 14:46:08 Initialized the following authorization table: | |
06/05/12 14:46:08 Authorizations yet to be resolved: | |
06/05/12 14:46:08 allow WRITE: [email protected]/* [email protected]/* [email protected]/* [email protected]/* [email protected]/* [email protected]/* | |
06/05/12 14:46:08 allow ADMINISTRATOR: [email protected]/* [email protected]/* [email protected]/* [email protected]/* [email protected]/* [email protected]/* | |
06/05/12 14:46:08 allow OWNER: */192.168.1.2 */127.0.0.1 */127.0.0.1 */rorschach.localdomain */localhost.localdomain */192.168.1.102 */192.168.1.102 | |
06/05/12 14:46:08 allow DAEMON: [email protected]/* [email protected]/* [email protected]/* [email protected]/* [email protected]/* [email protected]/* | |
06/05/12 14:46:08 allow ADVERTISE_STARTD: [email protected]/* [email protected]/* [email protected]/* [email protected]/* [email protected]/* [email protected]/* | |
06/05/12 14:46:08 allow ADVERTISE_SCHEDD: [email protected]/* [email protected]/* [email protected]/* [email protected]/* [email protected]/* [email protected]/* | |
06/05/12 14:46:08 allow ADVERTISE_MASTER: [email protected]/* [email protected]/* [email protected]/* [email protected]/* [email protected]/* [email protected]/* | |
06/05/12 14:46:08 Completed DC_CHILDALIVE to daemon at <192.168.1.2:46000> | |
06/05/12 14:46:08 DaemonCore: Leaving SendAliveToParent() - success | |
06/05/12 14:46:08 Destroying Daemon object: | |
06/05/12 14:46:08 Type: 1 (any), Name: (null), Addr: <192.168.1.2:46000> | |
06/05/12 14:46:08 FullHost: (null), Host: (null), Pool: (null), Port: 46000 | |
06/05/12 14:46:08 IsLocal: N, IdStr: daemon at <192.168.1.2:46000>, Error: (null) | |
06/05/12 14:46:08 --- End of Daemon object info --- | |
06/05/12 14:46:13 JobsRunning = 0 | |
06/05/12 14:46:13 JobsIdle = 0 | |
06/05/12 14:46:13 JobsHeld = 0 | |
06/05/12 14:46:13 JobsRemoved = 0 | |
06/05/12 14:46:13 LocalUniverseJobsRunning = 0 | |
06/05/12 14:46:13 LocalUniverseJobsIdle = 0 | |
06/05/12 14:46:13 SchedUniverseJobsRunning = 0 | |
06/05/12 14:46:13 SchedUniverseJobsIdle = 0 | |
06/05/12 14:46:13 N_Owners = 0 | |
06/05/12 14:46:13 MaxJobsRunning = 1000000000 | |
06/05/12 14:46:13 TransferQueueManager stats: active up=0/10 down=0/10; waiting up=0 down=0; wait time up=0s down=0s | |
06/05/12 14:46:13 Trying to update collector <127.0.0.1:9618> | |
06/05/12 14:46:13 Attempting to send update via UDP to collector localhost.localdomain <127.0.0.1:9618> | |
06/05/12 14:46:13 SECMAN: command 1 UPDATE_SCHEDD_AD to collector localhost.localdomain from UDP port 40621 (non-blocking). | |
06/05/12 14:46:13 SECMAN: no cached key for {<127.0.0.1:9618>,<1>}. | |
06/05/12 14:46:13 SECMAN: Security Policy: | |
Enact = "NO" | |
Subsystem = "SCHEDD" | |
CryptoMethods = "3DES,BLOWFISH" | |
ServerPid = 16470 | |
AuthMethods = "CLAIMTOBE" | |
Encryption = "OPTIONAL" | |
Integrity = "OPTIONAL" | |
OutgoingNegotiation = "PREFERRED" | |
ParentUniqueID = "rorschach:16463:1338932765" | |
SessionDuration = "86400" | |
CurrentTime = time() | |
SessionLease = 3600 | |
Authentication = "OPTIONAL" | |
06/05/12 14:46:13 SECMAN: negotiating security for command 1. | |
06/05/12 14:46:13 SECMAN: need to start a session via TCP | |
06/05/12 14:46:13 SECMAN: command 60010 UPDATE_SCHEDD_AD to <127.0.0.1:9618> from TCP port 51416 (non-blocking). | |
06/05/12 14:46:13 SECMAN: waiting for TCP connection to <127.0.0.1:9618>. | |
06/05/12 14:46:13 File descriptor limits: max 1024, safe 820 | |
06/05/12 14:46:13 Sent HEART BEAT ad to 1 collectors. Number of submittors=0 | |
06/05/12 14:46:13 ============ Begin clean_shadow_recs ============= | |
06/05/12 14:46:13 ============ End clean_shadow_recs ============= | |
06/05/12 14:46:13 New Daemon obj (startd) name: "NULL", pool: "NULL", addr: "NULL" | |
06/05/12 14:46:13 Destroying Daemon object: | |
06/05/12 14:46:13 Type: 4 (startd), Name: (null), Addr: (null) | |
06/05/12 14:46:13 FullHost: (null), Host: (null), Pool: (null), Port: -1 | |
06/05/12 14:46:13 IsLocal: N, IdStr: (null), Error: (null) | |
06/05/12 14:46:13 --- End of Daemon object info --- | |
06/05/12 14:46:13 SECMAN: resuming command 60010 UPDATE_SCHEDD_AD to <127.0.0.1:9618> from TCP port 51416 (non-blocking). | |
06/05/12 14:46:13 SECMAN: no cached key for {<127.0.0.1:9618>,<60010>}. | |
06/05/12 14:46:13 SECMAN: Security Policy: | |
Enact = "NO" | |
Subsystem = "SCHEDD" | |
CryptoMethods = "3DES,BLOWFISH" | |
NewSession = "YES" | |
ServerPid = 16470 | |
AuthMethods = "CLAIMTOBE" | |
Encryption = "OPTIONAL" | |
Integrity = "OPTIONAL" | |
OutgoingNegotiation = "PREFERRED" | |
ParentUniqueID = "rorschach:16463:1338932765" | |
SessionDuration = "86400" | |
CurrentTime = time() | |
SessionLease = 3600 | |
Authentication = "OPTIONAL" | |
06/05/12 14:46:13 SECMAN: negotiating security for command 60010. | |
06/05/12 14:46:13 SECMAN: sending DC_AUTHENTICATE command | |
06/05/12 14:46:13 SECMAN: sending following classad: | |
Enact = "NO" | |
Subsystem = "SCHEDD" | |
CryptoMethods = "3DES,BLOWFISH" | |
NewSession = "YES" | |
ServerPid = 16470 | |
AuthMethods = "CLAIMTOBE" | |
Encryption = "OPTIONAL" | |
ServerCommandSock = "<192.168.1.2:46032>" | |
Integrity = "OPTIONAL" | |
OutgoingNegotiation = "PREFERRED" | |
ParentUniqueID = "rorschach:16463:1338932765" | |
Command = 60010 | |
AuthCommand = 1 | |
SessionDuration = "86400" | |
CurrentTime = time() | |
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $" | |
SessionLease = 3600 | |
Authentication = "OPTIONAL" | |
06/05/12 14:46:13 SECMAN: server responded with: | |
Enact = "YES" | |
CryptoMethods = "3DES,BLOWFISH" | |
AuthMethodsList = "CLAIMTOBE" | |
AuthMethods = "CLAIMTOBE" | |
Encryption = "NO" | |
Integrity = "NO" | |
SessionDuration = "86400" | |
CurrentTime = time() | |
SessionLease = 3600 | |
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $" | |
Authentication = "NO" | |
06/05/12 14:46:13 SECMAN: received post-auth classad: | |
Sid = "rorschach:16467:1338932773:4" | |
ValidCommands = "1,11,14,18" | |
CurrentTime = time() | |
User = "unauthenticated@unmapped" | |
06/05/12 14:46:13 SECMAN: policy to be cached: | |
Enact = "YES" | |
Subsystem = "SCHEDD" | |
Sid = "rorschach:16467:1338932773:4" | |
CryptoMethods = "3DES,BLOWFISH" | |
UseSession = "YES" | |
AuthMethodsList = "CLAIMTOBE" | |
AuthMethods = "CLAIMTOBE" | |
Encryption = "NO" | |
Integrity = "NO" | |
OutgoingNegotiation = "PREFERRED" | |
Command = 60010 | |
AuthCommand = 1 | |
ValidCommands = "1,11,14,18" | |
SessionDuration = "86400" | |
User = "unauthenticated@unmapped" | |
CurrentTime = time() | |
MyRemoteUserName = "unauthenticated@unmapped" | |
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $" | |
SessionLease = 3600 | |
Authentication = "NO" | |
06/05/12 14:46:13 SECMAN: added session rorschach:16467:1338932773:4 to cache for 86400 seconds (3600s lease). | |
06/05/12 14:46:13 SECMAN: command {<127.0.0.1:9618>,<1>} mapped to session rorschach:16467:1338932773:4. | |
06/05/12 14:46:13 SECMAN: command {<127.0.0.1:9618>,<11>} mapped to session rorschach:16467:1338932773:4. | |
06/05/12 14:46:13 SECMAN: command {<127.0.0.1:9618>,<14>} mapped to session rorschach:16467:1338932773:4. | |
06/05/12 14:46:13 SECMAN: command {<127.0.0.1:9618>,<18>} mapped to session rorschach:16467:1338932773:4. | |
06/05/12 14:46:13 SECMAN: startCommand succeeded. | |
06/05/12 14:46:13 Authorizing server 'unauthenticated@unmapped/127.0.0.1'. | |
06/05/12 14:46:13 SECMAN: succesfully created security session to <127.0.0.1:9618> via TCP! | |
06/05/12 14:46:13 SECMAN: resuming command 1 UPDATE_SCHEDD_AD to collector localhost.localdomain from UDP port 40621 (non-blocking). | |
06/05/12 14:46:13 SECMAN: using session rorschach:16467:1338932773:4 for {<127.0.0.1:9618>,<1>}. | |
06/05/12 14:46:13 SECMAN: found cached session id rorschach:16467:1338932773:4 for {<127.0.0.1:9618>,<1>}. | |
Enact = "YES" | |
Subsystem = "SCHEDD" | |
Sid = "rorschach:16467:1338932773:4" | |
CryptoMethods = "3DES,BLOWFISH" | |
UseSession = "YES" | |
AuthMethodsList = "CLAIMTOBE" | |
ServerPid = 16470 | |
AuthMethods = "CLAIMTOBE" | |
Encryption = "NO" | |
Integrity = "NO" | |
OutgoingNegotiation = "PREFERRED" | |
ParentUniqueID = "rorschach:16463:1338932765" | |
Command = 60010 | |
AuthCommand = 1 | |
ValidCommands = "1,11,14,18" | |
SessionDuration = "86400" | |
User = "unauthenticated@unmapped" | |
CurrentTime = time() | |
MyRemoteUserName = "unauthenticated@unmapped" | |
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $" | |
SessionLease = 3600 | |
Authentication = "NO" | |
06/05/12 14:46:13 SECMAN: Security Policy: | |
Enact = "YES" | |
Subsystem = "SCHEDD" | |
Sid = "rorschach:16467:1338932773:4" | |
CryptoMethods = "3DES,BLOWFISH" | |
UseSession = "YES" | |
AuthMethodsList = "CLAIMTOBE" | |
ServerPid = 16470 | |
AuthMethods = "CLAIMTOBE" | |
Encryption = "NO" | |
Integrity = "NO" | |
OutgoingNegotiation = "PREFERRED" | |
ParentUniqueID = "rorschach:16463:1338932765" | |
Command = 60010 | |
AuthCommand = 1 | |
ValidCommands = "1,11,14,18" | |
SessionDuration = "86400" | |
User = "unauthenticated@unmapped" | |
CurrentTime = time() | |
MyRemoteUserName = "unauthenticated@unmapped" | |
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $" | |
SessionLease = 3600 | |
Authentication = "NO" | |
06/05/12 14:46:13 SECMAN: negotiating security for command 1. | |
06/05/12 14:46:13 SECMAN: UDP, m_have_session == 1 | |
06/05/12 14:46:13 SECMAN: UDP has session rorschach:16467:1338932773:4. | |
06/05/12 14:46:13 SECMAN: sending DC_AUTHENTICATE command | |
06/05/12 14:46:13 SECMAN: sending following classad: | |
Enact = "YES" | |
Subsystem = "SCHEDD" | |
Sid = "rorschach:16467:1338932773:4" | |
CryptoMethods = "3DES,BLOWFISH" | |
UseSession = "YES" | |
AuthMethodsList = "CLAIMTOBE" | |
ServerPid = 16470 | |
AuthMethods = "CLAIMTOBE" | |
Encryption = "NO" | |
ServerCommandSock = "<192.168.1.2:46032>" | |
Integrity = "NO" | |
OutgoingNegotiation = "PREFERRED" | |
ParentUniqueID = "rorschach:16463:1338932765" | |
Command = 1 | |
AuthCommand = 1 | |
ValidCommands = "1,11,14,18" | |
SessionDuration = "86400" | |
User = "unauthenticated@unmapped" | |
CurrentTime = time() | |
MyRemoteUserName = "unauthenticated@unmapped" | |
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $" | |
SessionLease = 3600 | |
Authentication = "NO" | |
06/05/12 14:46:13 Getting authenticated user from cached session: unauthenticated@unmapped | |
06/05/12 14:46:13 SECMAN: startCommand succeeded. | |
06/05/12 14:46:13 Authorizing server 'unauthenticated@unmapped/127.0.0.1'. | |
06/05/12 14:46:18 -------- Begin starting jobs -------- | |
06/05/12 14:46:18 -------- Done starting jobs -------- | |
06/05/12 14:46:28 JobsRunning = 0 | |
06/05/12 14:46:28 JobsIdle = 0 | |
06/05/12 14:46:28 JobsHeld = 0 | |
06/05/12 14:46:28 JobsRemoved = 0 | |
06/05/12 14:46:28 LocalUniverseJobsRunning = 0 | |
06/05/12 14:46:28 LocalUniverseJobsIdle = 0 | |
06/05/12 14:46:28 SchedUniverseJobsRunning = 0 | |
06/05/12 14:46:28 SchedUniverseJobsIdle = 0 | |
06/05/12 14:46:28 N_Owners = 0 | |
06/05/12 14:46:28 MaxJobsRunning = 1000000000 | |
06/05/12 14:46:28 TransferQueueManager stats: active up=0/10 down=0/10; waiting up=0 down=0; wait time up=0s down=0s | |
06/05/12 14:46:28 Trying to update collector <127.0.0.1:9618> | |
06/05/12 14:46:28 Attempting to send update via UDP to collector localhost.localdomain <127.0.0.1:9618> | |
06/05/12 14:46:28 SECMAN: command 1 UPDATE_SCHEDD_AD to collector localhost.localdomain from UDP port 54872 (non-blocking). | |
06/05/12 14:46:28 SECMAN: using session rorschach:16467:1338932773:4 for {<127.0.0.1:9618>,<1>}. | |
06/05/12 14:46:28 SECMAN: found cached session id rorschach:16467:1338932773:4 for {<127.0.0.1:9618>,<1>}. | |
Enact = "YES" | |
Subsystem = "SCHEDD" | |
Sid = "rorschach:16467:1338932773:4" | |
CryptoMethods = "3DES,BLOWFISH" | |
UseSession = "YES" | |
AuthMethodsList = "CLAIMTOBE" | |
AuthMethods = "CLAIMTOBE" | |
Encryption = "NO" | |
OutgoingNegotiation = "PREFERRED" | |
Integrity = "NO" | |
Command = 60010 | |
AuthCommand = 1 | |
ValidCommands = "1,11,14,18" | |
SessionDuration = "86400" | |
User = "unauthenticated@unmapped" | |
CurrentTime = time() | |
MyRemoteUserName = "unauthenticated@unmapped" | |
SessionLease = 3600 | |
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $" | |
Authentication = "NO" | |
06/05/12 14:46:28 SECMAN: Security Policy: | |
Enact = "YES" | |
Subsystem = "SCHEDD" | |
Sid = "rorschach:16467:1338932773:4" | |
CryptoMethods = "3DES,BLOWFISH" | |
UseSession = "YES" | |
AuthMethodsList = "CLAIMTOBE" | |
AuthMethods = "CLAIMTOBE" | |
Encryption = "NO" | |
OutgoingNegotiation = "PREFERRED" | |
Integrity = "NO" | |
Command = 60010 | |
AuthCommand = 1 | |
ValidCommands = "1,11,14,18" | |
SessionDuration = "86400" | |
User = "unauthenticated@unmapped" | |
CurrentTime = time() | |
MyRemoteUserName = "unauthenticated@unmapped" | |
SessionLease = 3600 | |
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $" | |
Authentication = "NO" | |
06/05/12 14:46:28 SECMAN: negotiating security for command 1. | |
06/05/12 14:46:28 SECMAN: UDP, m_have_session == 1 | |
06/05/12 14:46:28 SECMAN: UDP has session rorschach:16467:1338932773:4. | |
06/05/12 14:46:28 SECMAN: sending DC_AUTHENTICATE command | |
06/05/12 14:46:28 SECMAN: sending following classad: | |
Enact = "YES" | |
Subsystem = "SCHEDD" | |
Sid = "rorschach:16467:1338932773:4" | |
CryptoMethods = "3DES,BLOWFISH" | |
UseSession = "YES" | |
AuthMethodsList = "CLAIMTOBE" | |
AuthMethods = "CLAIMTOBE" | |
Encryption = "NO" | |
ServerCommandSock = "<192.168.1.2:46032>" | |
OutgoingNegotiation = "PREFERRED" | |
Integrity = "NO" | |
Command = 1 | |
AuthCommand = 1 | |
ValidCommands = "1,11,14,18" | |
SessionDuration = "86400" | |
User = "unauthenticated@unmapped" | |
CurrentTime = time() | |
MyRemoteUserName = "unauthenticated@unmapped" | |
SessionLease = 3600 | |
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $" | |
Authentication = "NO" | |
06/05/12 14:46:28 Getting authenticated user from cached session: unauthenticated@unmapped | |
06/05/12 14:46:28 SECMAN: startCommand succeeded. | |
06/05/12 14:46:28 Authorizing server 'unauthenticated@unmapped/127.0.0.1'. | |
06/05/12 14:46:28 Sent HEART BEAT ad to 1 collectors. Number of submittors=0 | |
06/05/12 14:46:28 ============ Begin clean_shadow_recs ============= | |
06/05/12 14:46:28 ============ End clean_shadow_recs ============= | |
06/05/12 14:46:28 New Daemon obj (startd) name: "NULL", pool: "NULL", addr: "NULL" | |
06/05/12 14:46:28 Destroying Daemon object: | |
06/05/12 14:46:28 Type: 4 (startd), Name: (null), Addr: (null) | |
06/05/12 14:46:28 FullHost: (null), Host: (null), Pool: (null), Port: -1 | |
06/05/12 14:46:28 IsLocal: N, IdStr: (null), Error: (null) | |
06/05/12 14:46:28 --- End of Daemon object info --- | |
06/05/12 14:46:34 -------- Begin starting jobs -------- | |
06/05/12 14:46:34 -------- Done starting jobs -------- | |
06/05/12 14:46:44 JobsRunning = 0 | |
06/05/12 14:46:44 JobsIdle = 0 | |
06/05/12 14:46:44 JobsHeld = 0 | |
06/05/12 14:46:44 JobsRemoved = 0 | |
06/05/12 14:46:44 LocalUniverseJobsRunning = 0 | |
06/05/12 14:46:44 LocalUniverseJobsIdle = 0 | |
06/05/12 14:46:44 SchedUniverseJobsRunning = 0 | |
06/05/12 14:46:44 SchedUniverseJobsIdle = 0 | |
06/05/12 14:46:44 N_Owners = 0 | |
06/05/12 14:46:44 MaxJobsRunning = 1000000000 | |
06/05/12 14:46:44 TransferQueueManager stats: active up=0/10 down=0/10; waiting up=0 down=0; wait time up=0s down=0s | |
06/05/12 14:46:44 Trying to update collector <127.0.0.1:9618> | |
06/05/12 14:46:44 Attempting to send update via UDP to collector localhost.localdomain <127.0.0.1:9618> | |
06/05/12 14:46:44 SECMAN: command 1 UPDATE_SCHEDD_AD to collector localhost.localdomain from UDP port 34166 (non-blocking). | |
06/05/12 14:46:44 SECMAN: using session rorschach:16467:1338932773:4 for {<127.0.0.1:9618>,<1>}. | |
06/05/12 14:46:44 SECMAN: found cached session id rorschach:16467:1338932773:4 for {<127.0.0.1:9618>,<1>}. | |
Enact = "YES" | |
Subsystem = "SCHEDD" | |
Sid = "rorschach:16467:1338932773:4" | |
CryptoMethods = "3DES,BLOWFISH" | |
UseSession = "YES" | |
AuthMethodsList = "CLAIMTOBE" | |
AuthMethods = "CLAIMTOBE" | |
Encryption = "NO" | |
OutgoingNegotiation = "PREFERRED" | |
Integrity = "NO" | |
Command = 60010 | |
AuthCommand = 1 | |
ValidCommands = "1,11,14,18" | |
SessionDuration = "86400" | |
User = "unauthenticated@unmapped" | |
CurrentTime = time() | |
MyRemoteUserName = "unauthenticated@unmapped" | |
SessionLease = 3600 | |
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $" | |
Authentication = "NO" | |
06/05/12 14:46:44 SECMAN: Security Policy: | |
Enact = "YES" | |
Subsystem = "SCHEDD" | |
Sid = "rorschach:16467:1338932773:4" | |
CryptoMethods = "3DES,BLOWFISH" | |
UseSession = "YES" | |
AuthMethodsList = "CLAIMTOBE" | |
AuthMethods = "CLAIMTOBE" | |
Encryption = "NO" | |
OutgoingNegotiation = "PREFERRED" | |
Integrity = "NO" | |
Command = 60010 | |
AuthCommand = 1 | |
ValidCommands = "1,11,14,18" | |
SessionDuration = "86400" | |
User = "unauthenticated@unmapped" | |
CurrentTime = time() | |
MyRemoteUserName = "unauthenticated@unmapped" | |
SessionLease = 3600 | |
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $" | |
Authentication = "NO" | |
06/05/12 14:46:44 SECMAN: negotiating security for command 1. | |
06/05/12 14:46:44 SECMAN: UDP, m_have_session == 1 | |
06/05/12 14:46:44 SECMAN: UDP has session rorschach:16467:1338932773:4. | |
06/05/12 14:46:44 SECMAN: sending DC_AUTHENTICATE command | |
06/05/12 14:46:44 SECMAN: sending following classad: | |
Enact = "YES" | |
Subsystem = "SCHEDD" | |
Sid = "rorschach:16467:1338932773:4" | |
CryptoMethods = "3DES,BLOWFISH" | |
UseSession = "YES" | |
AuthMethodsList = "CLAIMTOBE" | |
AuthMethods = "CLAIMTOBE" | |
Encryption = "NO" | |
ServerCommandSock = "<192.168.1.2:46032>" | |
OutgoingNegotiation = "PREFERRED" | |
Integrity = "NO" | |
Command = 1 | |
AuthCommand = 1 | |
ValidCommands = "1,11,14,18" | |
SessionDuration = "86400" | |
User = "unauthenticated@unmapped" | |
CurrentTime = time() | |
MyRemoteUserName = "unauthenticated@unmapped" | |
SessionLease = 3600 | |
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $" | |
Authentication = "NO" | |
06/05/12 14:46:44 Getting authenticated user from cached session: unauthenticated@unmapped | |
06/05/12 14:46:44 SECMAN: startCommand succeeded. | |
06/05/12 14:46:44 Authorizing server 'unauthenticated@unmapped/127.0.0.1'. | |
06/05/12 14:46:44 Sent HEART BEAT ad to 1 collectors. Number of submittors=0 | |
06/05/12 14:46:44 ============ Begin clean_shadow_recs ============= | |
06/05/12 14:46:44 ============ End clean_shadow_recs ============= | |
06/05/12 14:46:44 New Daemon obj (startd) name: "NULL", pool: "NULL", addr: "NULL" | |
06/05/12 14:46:44 Destroying Daemon object: | |
06/05/12 14:46:44 Type: 4 (startd), Name: (null), Addr: (null) | |
06/05/12 14:46:44 FullHost: (null), Host: (null), Pool: (null), Port: -1 | |
06/05/12 14:46:44 IsLocal: N, IdStr: (null), Error: (null) | |
06/05/12 14:46:44 --- End of Daemon object info --- | |
06/05/12 14:46:50 -------- Begin starting jobs -------- | |
06/05/12 14:46:50 -------- Done starting jobs -------- | |
06/05/12 14:46:55 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.2:55107> | |
06/05/12 14:46:55 DC_AUTHENTICATE: received following ClassAd: | |
Enact = "NO" | |
Subsystem = "SUBMIT" | |
CryptoMethods = "3DES,BLOWFISH" | |
NewSession = "YES" | |
ServerPid = 16547 | |
AuthMethods = "CLAIMTOBE" | |
Encryption = "OPTIONAL" | |
OutgoingNegotiation = "PREFERRED" | |
Integrity = "OPTIONAL" | |
Command = 1112 | |
SessionDuration = "60" | |
CurrentTime = time() | |
SessionLease = 3600 | |
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $" | |
Authentication = "OPTIONAL" | |
06/05/12 14:46:55 DC_AUTHENTICATE: our_policy: | |
Enact = "NO" | |
Subsystem = "SCHEDD" | |
CryptoMethods = "3DES,BLOWFISH" | |
ServerPid = 16470 | |
AuthMethods = "CLAIMTOBE" | |
Encryption = "OPTIONAL" | |
Integrity = "OPTIONAL" | |
OutgoingNegotiation = "REQUIRED" | |
ParentUniqueID = "rorschach:16463:1338932765" | |
SessionDuration = "86400" | |
CurrentTime = time() | |
SessionLease = 3600 | |
Authentication = "REQUIRED" | |
06/05/12 14:46:55 DC_AUTHENTICATE: the_policy: | |
Enact = "YES" | |
CryptoMethods = "3DES,BLOWFISH" | |
AuthMethodsList = "CLAIMTOBE" | |
AuthMethods = "CLAIMTOBE" | |
Encryption = "NO" | |
Integrity = "NO" | |
SessionDuration = "60" | |
CurrentTime = time() | |
SessionLease = 3600 | |
Authentication = "YES" | |
06/05/12 14:46:55 DC_AUTHENTICATE: generating 3DES key for session rorschach:16470:1338932815:0... | |
06/05/12 14:46:55 SECMAN: Sending following response ClassAd: | |
Enact = "YES" | |
CryptoMethods = "3DES,BLOWFISH" | |
AuthMethodsList = "CLAIMTOBE" | |
AuthMethods = "CLAIMTOBE" | |
Encryption = "NO" | |
Integrity = "NO" | |
SessionDuration = "60" | |
CurrentTime = time() | |
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $" | |
SessionLease = 3600 | |
Authentication = "YES" | |
06/05/12 14:46:55 SECMAN: new session, doing initial authentication. | |
06/05/12 14:46:55 DC_AUTHENTICATE: authenticating RIGHT NOW. | |
06/05/12 14:46:55 AUTHENTICATE: in authenticate( addr == NULL, methods == 'CLAIMTOBE') | |
06/05/12 14:46:55 AUTHENTICATE: can still try these methods: CLAIMTOBE | |
06/05/12 14:46:55 HANDSHAKE: in handshake(my_methods = 'CLAIMTOBE') | |
06/05/12 14:46:55 HANDSHAKE: handshake() - i am the server | |
06/05/12 14:46:55 HANDSHAKE: client sent (methods == 2) | |
06/05/12 14:46:55 HANDSHAKE: i picked (method == 2) | |
06/05/12 14:46:55 HANDSHAKE: client received (method == 2) | |
06/05/12 14:46:55 AUTHENTICATE: will try to use 2 (CLAIMTOBE) | |
06/05/12 14:46:55 AUTHENTICATE: auth_status == 2 (CLAIMTOBE) | |
06/05/12 14:46:55 Authentication was a Success. | |
06/05/12 14:46:55 ZKM: setting default map to test1 | |
06/05/12 14:46:55 ZKM: post-map: current user is 'test1' | |
06/05/12 14:46:55 ZKM: post-map: current domain is '(null)' | |
06/05/12 14:46:55 ZKM: post-map: current FQU is 'test1' | |
06/05/12 14:46:55 DC_AUTHENTICATE: authentication of 192.168.1.2 complete. | |
06/05/12 14:46:55 DC_AUTHENTICATE: sending session ad: | |
Sid = "rorschach:16470:1338932815:0" | |
TriedAuthentication = true | |
ValidCommands = "511,74000,60004,60012,1112,404,421,464,478,480,481,486,487,488,489,499,502,507,509,60007,1111,441,443,457,471" | |
User = "test1" | |
CurrentTime = time() | |
06/05/12 14:46:55 DC_AUTHENTICATE: sent session rorschach:16470:1338932815:0 info! | |
06/05/12 14:46:55 DC_AUTHENTICATE: added incoming session id rorschach:16470:1338932815:0 to cache for 80 seconds (lease is 3620s, return address is unknown). | |
Enact = "YES" | |
Subsystem = "SUBMIT" | |
Sid = "rorschach:16470:1338932815:0" | |
CryptoMethods = "3DES,BLOWFISH" | |
TriedAuthentication = true | |
AuthMethodsList = "CLAIMTOBE" | |
ServerPid = 16547 | |
AuthMethods = "CLAIMTOBE" | |
Encryption = "NO" | |
Integrity = "NO" | |
ValidCommands = "511,74000,60004,60012,1112,404,421,464,478,480,481,486,487,488,489,499,502,507,509,60007,1111,441,443,457,471" | |
SessionDuration = "60" | |
User = "test1" | |
CurrentTime = time() | |
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $" | |
SessionLease = 3600 | |
Authentication = "YES" | |
06/05/12 14:46:55 DC_AUTHENTICATE: Success. | |
06/05/12 14:46:55 Adding to resolved authorization table: test1/192.168.1.2: DENY_ADMINISTRATOR | |
06/05/12 14:46:55 Adding to resolved authorization table: test1/192.168.1.2: DENY_DAEMON | |
06/05/12 14:46:55 Adding to resolved authorization table: test1/192.168.1.2: DENY_WRITE | |
06/05/12 14:46:55 PERMISSION DENIED to test1 from host 192.168.1.2 for command 1112 (QMGMT_WRITE_CMD), access level WRITE: reason: WRITE authorization policy contains no matching ALLOW entry for this request; identifiers used for this host: 192.168.1.2,rorschach,rorschach.localdomain,localhost,localhost.localdomain,rorschach.localdomain,localhost.localdomain,localhost,rorschach.localdomain,localhost,localhost.localdomain,localhost6.localdomain6,localhost6,rorschach6,rorschach6.localdomain6,rorschach.localdomain | |
06/05/12 14:47:00 JobsRunning = 0 | |
06/05/12 14:47:00 JobsIdle = 0 | |
06/05/12 14:47:00 JobsHeld = 0 | |
06/05/12 14:47:00 JobsRemoved = 0 | |
06/05/12 14:47:00 LocalUniverseJobsRunning = 0 | |
06/05/12 14:47:00 LocalUniverseJobsIdle = 0 | |
06/05/12 14:47:00 SchedUniverseJobsRunning = 0 | |
06/05/12 14:47:00 SchedUniverseJobsIdle = 0 | |
06/05/12 14:47:00 N_Owners = 0 | |
06/05/12 14:47:00 MaxJobsRunning = 1000000000 | |
06/05/12 14:47:00 TransferQueueManager stats: active up=0/10 down=0/10; waiting up=0 down=0; wait time up=0s down=0s | |
06/05/12 14:47:00 Trying to update collector <127.0.0.1:9618> | |
06/05/12 14:47:00 Attempting to send update via UDP to collector localhost.localdomain <127.0.0.1:9618> | |
06/05/12 14:47:00 SECMAN: command 1 UPDATE_SCHEDD_AD to collector localhost.localdomain from UDP port 36971 (non-blocking). | |
06/05/12 14:47:00 SECMAN: using session rorschach:16467:1338932773:4 for {<127.0.0.1:9618>,<1>}. | |
06/05/12 14:47:00 SECMAN: found cached session id rorschach:16467:1338932773:4 for {<127.0.0.1:9618>,<1>}. | |
Enact = "YES" | |
Subsystem = "SCHEDD" | |
Sid = "rorschach:16467:1338932773:4" | |
CryptoMethods = "3DES,BLOWFISH" | |
UseSession = "YES" | |
AuthMethodsList = "CLAIMTOBE" | |
AuthMethods = "CLAIMTOBE" | |
Encryption = "NO" | |
OutgoingNegotiation = "PREFERRED" | |
Integrity = "NO" | |
Command = 60010 | |
AuthCommand = 1 | |
ValidCommands = "1,11,14,18" | |
SessionDuration = "86400" | |
User = "unauthenticated@unmapped" | |
CurrentTime = time() | |
MyRemoteUserName = "unauthenticated@unmapped" | |
SessionLease = 3600 | |
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $" | |
Authentication = "NO" | |
06/05/12 14:47:00 SECMAN: Security Policy: | |
Enact = "YES" | |
Subsystem = "SCHEDD" | |
Sid = "rorschach:16467:1338932773:4" | |
CryptoMethods = "3DES,BLOWFISH" | |
UseSession = "YES" | |
AuthMethodsList = "CLAIMTOBE" | |
AuthMethods = "CLAIMTOBE" | |
Encryption = "NO" | |
OutgoingNegotiation = "PREFERRED" | |
Integrity = "NO" | |
Command = 60010 | |
AuthCommand = 1 | |
ValidCommands = "1,11,14,18" | |
SessionDuration = "86400" | |
User = "unauthenticated@unmapped" | |
CurrentTime = time() | |
MyRemoteUserName = "unauthenticated@unmapped" | |
SessionLease = 3600 | |
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $" | |
Authentication = "NO" | |
06/05/12 14:47:00 SECMAN: negotiating security for command 1. | |
06/05/12 14:47:00 SECMAN: UDP, m_have_session == 1 | |
06/05/12 14:47:00 SECMAN: UDP has session rorschach:16467:1338932773:4. | |
06/05/12 14:47:00 SECMAN: sending DC_AUTHENTICATE command | |
06/05/12 14:47:00 SECMAN: sending following classad: | |
Enact = "YES" | |
Subsystem = "SCHEDD" | |
Sid = "rorschach:16467:1338932773:4" | |
CryptoMethods = "3DES,BLOWFISH" | |
UseSession = "YES" | |
AuthMethodsList = "CLAIMTOBE" | |
AuthMethods = "CLAIMTOBE" | |
Encryption = "NO" | |
ServerCommandSock = "<192.168.1.2:46032>" | |
OutgoingNegotiation = "PREFERRED" | |
Integrity = "NO" | |
Command = 1 | |
AuthCommand = 1 | |
ValidCommands = "1,11,14,18" | |
SessionDuration = "86400" | |
User = "unauthenticated@unmapped" | |
CurrentTime = time() | |
MyRemoteUserName = "unauthenticated@unmapped" | |
SessionLease = 3600 | |
RemoteVersion = "$CondorVersion: 7.6.5 Jun 05 2012 $" | |
Authentication = "NO" | |
06/05/12 14:47:00 Getting authenticated user from cached session: unauthenticated@unmapped | |
06/05/12 14:47:00 SECMAN: startCommand succeeded. | |
06/05/12 14:47:00 Authorizing server 'unauthenticated@unmapped/127.0.0.1'. | |
06/05/12 14:47:00 Sent HEART BEAT ad to 1 collectors. Number of submittors=0 | |
06/05/12 14:47:00 ============ Begin clean_shadow_recs ============= | |
06/05/12 14:47:00 ============ End clean_shadow_recs ============= | |
06/05/12 14:47:00 New Daemon obj (startd) name: "NULL", pool: "NULL", addr: "NULL" | |
06/05/12 14:47:00 Destroying Daemon object: | |
06/05/12 14:47:00 Type: 4 (startd), Name: (null), Addr: (null) | |
06/05/12 14:47:00 FullHost: (null), Host: (null), Pool: (null), Port: -1 | |
06/05/12 14:47:00 IsLocal: N, IdStr: (null), Error: (null) | |
06/05/12 14:47:00 --- End of Daemon object info --- | |
06/05/12 14:47:06 -------- Begin starting jobs -------- | |
06/05/12 14:47:06 -------- Done starting jobs -------- |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment