Hi Joe I set STARTD_DEBUG = D_SECURITY:2, restarted condor and submitted a new job for that executor. I attached the StartLog from when condor was restarted + ~3min. Regards, Pascal From: HTCondor-users <htcondor-users-bounces@xxxxxxxxxxx>
On Behalf Of Joe Reuss via HTCondor-users Hi Pascal, Can you set D_SECURITY:2 for STARTD_DEBUG and send us the Start log for that and we can get a lot more information on what is happening. It seems like some security issues are happening with this large of a version
difference. Thanks, Joe Reuss From: HTCondor-users <htcondor-users-bounces@xxxxxxxxxxx>
on behalf of Pascal Schweizer via HTCondor-users <htcondor-users@xxxxxxxxxxx> Hi We have a submitter node running Condor 23.0.4 and are trying to run jobs on an old Windows XP machine running Condor 8.0.4 (please donât ask why). Weâre using 8.0.4 because thatâs the most recent binary that we managed to get running on the Windows XP machine. Other executor nodes in the pool are running Condor 8.8 or newer without any problems. Our problem with the 8.0.4 machine is that itâs not running any jobs, even though they match. The machine is listed when using condor_status and commands like condor_restart also work. But when submitting a job for that
specific machine, it doesnât get picked up. As a general question: Are Condor 8.0.4 and 23.0.4 compatible and this setup should theoretically work if configured correctly? Here are some logs/errors we see every few minutes (negotiation cycle) after submitting a job for this machine. It looks like a communication/authentication error. Does anyone know what could be causing those? Security wise, weâre using a very basic config that shouldnât cause any problems: use SECURITY : HOST_BASED ALLOW_READ = * ALLOW_WRITE = * ALLOW_ADMINISTRATOR = * --- Executor Logs --- StartLog: DC_AUTHENTICATE: attempt to open invalid session <192.168.1.157:1076>#1716304270#1, failing; this session was requested by <192.168.1.30:64664> with return address <192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5816_9e76> NegotiatorLog: ---------- Started Negotiation Cycle ---------- Phase 1: Obtaining ads from collector ... Getting Scheduler, Submitter and Machine ads ... condor_read() failed: recv(fd=448) returned -1, errno = 10054 , reading 5 bytes from collector at <192.168.1.30:9618>. IO: Failed to read packet header Couldn't fetch ads: communication error Aborting negotiation cycle ---------- Started Negotiation Cycle ---------- Phase 1: Obtaining ads from collector ... Getting Scheduler, Submitter and Machine ads ... Sorting 37 ads ... Getting startd private ads ... condor_write(): Socket closed when trying to write 87 bytes to collector at <192.168.1.30:9618>, fd is 580 Buf::write(): condor_write() failed Couldn't fetch ads: communication error Aborting negotiation cycle --- Submitter Logs --- SchedLog: (pid:6336) Negotiating for owner: a@submitter (pid:6336) condor_read(): Socket closed abnormally when trying to read 5 bytes from startd slot1@executor <192.168.1.157:1587> for p, errno=10054
(pid:6336) Response problem from startd when requesting claim slot1@executor <192.168.1.157:1587> for p 2071.0. (pid:6336) Failed to send REQUEST_CLAIM to startd slot1@executor <192.168.1.157:1587> for p: CEDAR:6004:failed reading from socket (pid:6336) Match record (slot1@executor <192.168.1.157:1587> for p, 2071.0) deleted NegotiatorLog: ---------- Started Negotiation Cycle ---------- Phase 1: Obtaining ads from collector ... Not considering preemption, therefore constraining idle machines with ifThenElse((State == "Claimed"&&PartitionableSlot=!=true),"Name MyType State Activity StartdIpAddr AccountingGroup Owner RemoteUser Requirements
SlotWeight ConcurrencyLimits","") Getting startd private ads ... Getting Scheduler, Submitter and Machine ads ... Sorting 19 ads ... Got ads: 19 public and 17 private Public ads include 2 submitter, 17 startd Phase 2: Performing accounting ... Phase 3: Sorting submitter ads by priority ... Starting prefetch round; 2 potential prefetches to do. Starting prefetch negotiation for p@submitter. Got NO_MORE_JOBS; schedd has no more requests Starting prefetch negotiation for a@submitter. Got NO_MORE_JOBS; schedd has no more requests Prefetch summary: 2 attempted, 2 successful. Phase 4.1: Negotiating with schedds ... Negotiating with p@submitter at <192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5816_9e76> 0 seconds so far for this submitter 0 seconds so far for this schedd Request 02071.00000: autocluster 487 (request count 1 of 15) Matched 2071.0 p@submitter <192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5816_9e76> preempting none <192.168.1.157:1587> slot1@executor Successfully matched with slot1@executor Request 02071.00000: autocluster 487 (request count 2 of 15) Rejected 2071.0 p@submitter <192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5816_9e76>: no match found Negotiating with a@submitter at <192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5816_9e76> 0 seconds so far for this submitter 0 seconds so far for this schedd Reached submitter resource limit: 0.000000 ... stopping <------- donât think this has anything to do with this problem, but weâre not seeing this line for jobs submitted for other nodes and donât
know what it means Starting prefetch round; 1 potential prefetches to do. Starting prefetch negotiation for a@submitter. Got NO_MORE_JOBS; schedd has no more requests Prefetch summary: 1 attempted, 1 successful. Phase 4.2: Negotiating with schedds ... Negotiating with a@submitter at <192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5816_9e76> 0 seconds so far for this submitter 0 seconds so far for this schedd Request 02069.00624: autocluster 1 (request count 1 of 142) Rejected 2069.624 a@submitter <192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5816_9e76>: no match found negotiateWithGroup resources used submitterAds length 0
---------- Finished Negotiation Cycle ---------- Regards, Pascal |
05/27/24 11:24:26 Got SIGTERM. Performing graceful shutdown. 05/27/24 11:24:26 shutdown graceful 05/27/24 11:24:26 Cron: Killing all jobs 05/27/24 11:24:26 Cron: Killing all jobs 05/27/24 11:24:26 Killing job mips 05/27/24 11:24:26 Killing job kflops 05/27/24 11:24:26 Deleting cron job manager 05/27/24 11:24:26 Cron: Killing all jobs 05/27/24 11:24:26 Cron: Killing all jobs 05/27/24 11:24:26 CronJobList: Deleting all jobs 05/27/24 11:24:26 Cron: Killing all jobs 05/27/24 11:24:26 CronJobList: Deleting all jobs 05/27/24 11:24:26 Deleting benchmark job mgr 05/27/24 11:24:26 Cron: Killing all jobs 05/27/24 11:24:26 Killing job mips 05/27/24 11:24:26 Killing job kflops 05/27/24 11:24:26 Cron: Killing all jobs 05/27/24 11:24:26 Killing job mips 05/27/24 11:24:26 Killing job kflops 05/27/24 11:24:26 CronJobList: Deleting all jobs 05/27/24 11:24:26 CronJobList: Deleting job 'mips' 05/27/24 11:24:26 CronJob: Deleting job 'mips' (C:\condor/bin/condor_mips.exe), timer -1 05/27/24 11:24:26 CronJobList: Deleting job 'kflops' 05/27/24 11:24:26 CronJob: Deleting job 'kflops' (C:\condor/bin/condor_kflops.exe), timer -1 05/27/24 11:24:26 Cron: Killing all jobs 05/27/24 11:24:26 CronJobList: Deleting all jobs 05/27/24 11:24:26 All resources are free, exiting. 05/27/24 11:24:26 **** condor_startd.exe (condor_STARTD) pid 1868 EXITING WITH STATUS 0 05/27/24 11:24:28 KEYCACHE: created: 02748FB8 05/27/24 11:24:28 ****************************************************** 05/27/24 11:24:28 ** condor_startd.exe (CONDOR_STARTD) STARTING UP 05/27/24 11:24:28 ** C:\condor\bin\condor_startd.exe 05/27/24 11:24:28 ** SubsystemInfo: name=STARTD type=STARTD(7) class=DAEMON(1) 05/27/24 11:24:28 ** Configuration: subsystem:STARTD local:<NONE> class:DAEMON 05/27/24 11:24:28 ** $CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $ 05/27/24 11:24:28 ** $CondorPlatform: x86_64_Windows7 $ 05/27/24 11:24:28 ** PID = 2076 05/27/24 11:24:28 ** Log last touched 5/27 11:24:26 05/27/24 11:24:28 ****************************************************** 05/27/24 11:24:28 Using config source: \submitter\config\condor_XPwin32.conf 05/27/24 11:24:28 Using local config sources: 05/27/24 11:24:28 \submitter\config\local_condor-wxp-sp2-64-01.conf 05/27/24 11:24:28 SECMAN: created non-negotiated security session 499ce3d049917b6ac23c248369676fa1472bbdd0301377a7 for 0 (inf) seconds. 05/27/24 11:24:28 Imported session attributes: [CryptoMethods="3DES";Encryption="NO";Integrity="NO";CurrentTime=time();] 05/27/24 11:24:28 Caching non-negotiated security session ad: User = "condor@parent" SessionDuration = "86400" TriedAuthentication = true ServerPid = 2076 Enact = "YES" CryptoMethods = "3DES" OutgoingNegotiation = "REQUIRED" Sid = "499ce3d049917b6ac23c248369676fa1472bbdd0301377a7" AuthMethods = "NTSSPI,KERBEROS" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Encryption = "NO" SessionLease = 3600 Authentication = "NO" UseSession = "YES" Integrity = "NO" Subsystem = "STARTD" CurrentTime = time() 05/27/24 11:24:28 IpVerify::PunchHole: opened DAEMON level to condor@parent 05/27/24 11:24:28 IpVerify::PunchHole: opened WRITE level to condor@parent 05/27/24 11:24:28 IpVerify::PunchHole: opened READ level to condor@parent 05/27/24 11:24:28 IpVerify::PunchHole: open count at level READ for condor@parent now 2 05/27/24 11:24:28 DaemonCore: command socket at <192.168.1.157:4982> 05/27/24 11:24:28 DaemonCore: private command socket at <192.168.1.157:4982> 05/27/24 11:24:28 VM-gahp server reported an internal error 05/27/24 11:24:28 VM universe will be tested to check if it is available 05/27/24 11:24:28 History file rotation is enabled. 05/27/24 11:24:28 Maximum history file size is: 20971520 bytes 05/27/24 11:24:28 Number of rotated history files is: 2 slot type 1: Cpus: 8, Memory: auto, Swap: auto, Disk: auto slot type 1: Cpus: 8, Memory: 8191, Swap: 100.00%, Disk: 100.00% 05/27/24 11:24:28 slot1: New machine resource of type 1 allocated 05/27/24 11:24:33 CronJobList: Adding job 'mips' 05/27/24 11:24:33 CronJobList: Adding job 'kflops' 05/27/24 11:24:33 CronJob: Initializing job 'mips' (C:\condor/bin/condor_mips.exe) 05/27/24 11:24:33 CronJob: Initializing job 'kflops' (C:\condor/bin/condor_kflops.exe) 05/27/24 11:24:33 slot1: State change: IS_OWNER is false 05/27/24 11:24:33 slot1: Changing state: Owner -> Unclaimed 05/27/24 11:24:33 State change: RunBenchmarks is TRUE 05/27/24 11:24:33 slot1: Changing activity: Idle -> Benchmarking 05/27/24 11:24:33 BenchMgr:StartBenchmarks() 05/27/24 11:24:33 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1038> 05/27/24 11:24:33 DC_AUTHENTICATE: received following ClassAd: Subsystem = "KBDD" Command = 60010 Authentication = "OPTIONAL" SessionLease = 3600 Encryption = "OPTIONAL" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" AuthMethods = "NTSSPI,KERBEROS" Enact = "NO" CryptoMethods = "3DES,BLOWFISH" OutgoingNegotiation = "PREFERRED" CurrentTime = time() ServerCommandSock = "<192.168.1.157:4983>" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" AuthCommand = 427 ServerPid = 1520 SessionDuration = "86400" Integrity = "OPTIONAL" NewSession = "YES" 05/27/24 11:24:33 DC_AUTHENTICATE: our_policy: SessionDuration = "86400" ServerPid = 2076 Enact = "NO" OutgoingNegotiation = "PREFERRED" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Encryption = "OPTIONAL" SessionLease = 3600 Authentication = "OPTIONAL" Integrity = "OPTIONAL" AuthMethods = "NTSSPI,KERBEROS" Subsystem = "STARTD" CryptoMethods = "3DES,BLOWFISH" CurrentTime = time() 05/27/24 11:24:33 DC_AUTHENTICATE: the_policy: SessionLease = 3600 SessionDuration = "86400" CryptoMethods = "3DES,BLOWFISH" AuthMethods = "NTSSPI" AuthMethodsList = "NTSSPI,KERBEROS" Integrity = "NO" Encryption = "NO" Authentication = "NO" Enact = "YES" CurrentTime = time() 05/27/24 11:24:33 SECMAN: Sending following response ClassAd: RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" Authentication = "NO" SessionLease = 3600 SessionDuration = "86400" CryptoMethods = "3DES,BLOWFISH" AuthMethods = "NTSSPI" AuthMethodsList = "NTSSPI,KERBEROS" Integrity = "NO" Encryption = "NO" Enact = "YES" CurrentTime = time() 05/27/24 11:24:33 DC_AUTHENTICATE: not authenticating. 05/27/24 11:24:33 DC_AUTHENTICATE: sending session ad: ValidCommands = "60002,60003,60011,60014,427" Sid = "wxp-sp2-64-01:2076:1716801873:0" User = "unauthenticated@unmapped" CurrentTime = time() 05/27/24 11:24:33 DC_AUTHENTICATE: sent session wxp-sp2-64-01:2076:1716801873:0 info! 05/27/24 11:24:33 DC_AUTHENTICATE: added incoming session id wxp-sp2-64-01:2076:1716801873:0 to cache for 86420 seconds (lease is 3620s, return address is <192.168.1.157:4983>). ValidCommands = "60002,60003,60011,60014,427" User = "unauthenticated@unmapped" CurrentTime = time() ServerCommandSock = "<192.168.1.157:4983>" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" Authentication = "NO" SessionLease = 3600 SessionDuration = "86400" CryptoMethods = "3DES,BLOWFISH" Subsystem = "KBDD" Sid = "wxp-sp2-64-01:2076:1716801873:0" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" AuthMethods = "NTSSPI" ServerPid = 1520 AuthMethodsList = "NTSSPI,KERBEROS" Integrity = "NO" Encryption = "NO" Enact = "YES" 05/27/24 11:24:33 SECMAN: command 60008 DC_CHILDALIVE to daemon at <192.168.1.157:4971> from TCP port 1043 (blocking). 05/27/24 11:24:33 SECMAN: no cached key for {<192.168.1.157:4971>,<60008>}. 05/27/24 11:24:33 SECMAN: Security Policy: NewSession = "YES" SessionDuration = "86400" ServerPid = 2076 Enact = "NO" OutgoingNegotiation = "PREFERRED" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Encryption = "OPTIONAL" SessionLease = 3600 Authentication = "OPTIONAL" Integrity = "OPTIONAL" AuthMethods = "NTSSPI,KERBEROS" Subsystem = "STARTD" CryptoMethods = "3DES,BLOWFISH" CurrentTime = time() 05/27/24 11:24:33 SECMAN: negotiating security for command 60008. 05/27/24 11:24:33 SECMAN: sending DC_AUTHENTICATE command 05/27/24 11:24:33 SECMAN: sending following classad: CurrentTime = time() ServerCommandSock = "<192.168.1.157:4982>" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" NewSession = "YES" SessionDuration = "86400" ServerPid = 2076 Enact = "NO" CryptoMethods = "3DES,BLOWFISH" OutgoingNegotiation = "PREFERRED" AuthMethods = "NTSSPI,KERBEROS" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Encryption = "OPTIONAL" SessionLease = 3600 Authentication = "OPTIONAL" Integrity = "OPTIONAL" Command = 60008 Subsystem = "STARTD" 05/27/24 11:24:33 SECMAN: server responded with: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" AuthMethods = "NTSSPI" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" Authentication = "NO" SessionLease = 3600 RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" CurrentTime = time() 05/27/24 11:24:33 SECMAN: received post-auth classad: User = "unauthenticated@unmapped" Sid = "wxp-sp2-64-01:2980:1716801873:3" ValidCommands = "60000,60008,60017,60026,60004,60012,60021,60007,60020,457" CurrentTime = time() 05/27/24 11:24:33 SECMAN: policy to be cached: User = "unauthenticated@unmapped" ValidCommands = "60000,60008,60017,60026,60004,60012,60021,60007,60020,457" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" AuthMethodsList = "NTSSPI,KERBEROS" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" CurrentTime = time() SessionDuration = "86400" Enact = "YES" CryptoMethods = "3DES,BLOWFISH" OutgoingNegotiation = "PREFERRED" Sid = "wxp-sp2-64-01:2980:1716801873:3" AuthMethods = "NTSSPI" Encryption = "NO" SessionLease = 3600 Authentication = "NO" Integrity = "NO" Command = 60008 Subsystem = "STARTD" 05/27/24 11:24:33 SECMAN: added session wxp-sp2-64-01:2980:1716801873:3 to cache for 86400 seconds (3600s lease). 05/27/24 11:24:33 SECMAN: command {<192.168.1.157:4971>,<60000>} mapped to session wxp-sp2-64-01:2980:1716801873:3. 05/27/24 11:24:33 SECMAN: command {<192.168.1.157:4971>,<60008>} mapped to session wxp-sp2-64-01:2980:1716801873:3. 05/27/24 11:24:33 SECMAN: command {<192.168.1.157:4971>,<60017>} mapped to session wxp-sp2-64-01:2980:1716801873:3. 05/27/24 11:24:33 SECMAN: command {<192.168.1.157:4971>,<60026>} mapped to session wxp-sp2-64-01:2980:1716801873:3. 05/27/24 11:24:33 SECMAN: command {<192.168.1.157:4971>,<60004>} mapped to session wxp-sp2-64-01:2980:1716801873:3. 05/27/24 11:24:33 SECMAN: command {<192.168.1.157:4971>,<60012>} mapped to session wxp-sp2-64-01:2980:1716801873:3. 05/27/24 11:24:33 SECMAN: command {<192.168.1.157:4971>,<60021>} mapped to session wxp-sp2-64-01:2980:1716801873:3. 05/27/24 11:24:33 SECMAN: command {<192.168.1.157:4971>,<60007>} mapped to session wxp-sp2-64-01:2980:1716801873:3. 05/27/24 11:24:33 SECMAN: command {<192.168.1.157:4971>,<60020>} mapped to session wxp-sp2-64-01:2980:1716801873:3. 05/27/24 11:24:33 SECMAN: command {<192.168.1.157:4971>,<457>} mapped to session wxp-sp2-64-01:2980:1716801873:3. 05/27/24 11:24:33 SECMAN: startCommand succeeded. 05/27/24 11:24:33 Authorizing server 'unauthenticated@unmapped/192.168.1.157'. 05/27/24 11:24:33 IPVERIFY: Subsystem STARTD 05/27/24 11:24:33 IPVERIFY: Permission ALLOW 05/27/24 11:24:33 IPVERIFY: Subsystem STARTD 05/27/24 11:24:33 IPVERIFY: Permission READ 05/27/24 11:24:33 IPVERIFY: allow READ: *, (from config value ALLOW_READ_STARTD) 05/27/24 11:24:33 IPVERIFY: Subsystem STARTD 05/27/24 11:24:33 IPVERIFY: Permission WRITE 05/27/24 11:24:33 IPVERIFY: allow WRITE: *, (from config value ALLOW_WRITE_STARTD) 05/27/24 11:24:33 IPVERIFY: Subsystem STARTD 05/27/24 11:24:33 IPVERIFY: Permission NEGOTIATOR 05/27/24 11:24:33 IPVERIFY: allow NEGOTIATOR: submitter, 192.168.1.157 (from config value ALLOW_NEGOTIATOR) 05/27/24 11:24:33 IPVERIFY: Subsystem STARTD 05/27/24 11:24:33 IPVERIFY: Permission ADMINISTRATOR 05/27/24 11:24:33 IPVERIFY: allow ADMINISTRATOR: * (from config value ALLOW_ADMINISTRATOR) 05/27/24 11:24:33 ipverify: ADMINISTRATOR optimized to allow anyone 05/27/24 11:24:33 IPVERIFY: Subsystem STARTD 05/27/24 11:24:33 IPVERIFY: Permission OWNER 05/27/24 11:24:33 IPVERIFY: allow OWNER: executor, * (from config value ALLOW_OWNER) 05/27/24 11:24:33 IPVERIFY: Subsystem STARTD 05/27/24 11:24:33 IPVERIFY: Permission CONFIG 05/27/24 11:24:33 ipverify: CONFIG optimized to deny everyone 05/27/24 11:24:33 IPVERIFY: Subsystem STARTD 05/27/24 11:24:33 IPVERIFY: Permission DAEMON 05/27/24 11:24:33 IPVERIFY: allow DAEMON: * (from config value ALLOW_DAEMON) 05/27/24 11:24:33 ipverify: DAEMON optimized to allow anyone 05/27/24 11:24:33 IPVERIFY: Subsystem STARTD 05/27/24 11:24:33 IPVERIFY: Permission SOAP 05/27/24 11:24:33 ipverify: SOAP optimized to allow anyone 05/27/24 11:24:33 IPVERIFY: Subsystem STARTD 05/27/24 11:24:33 IPVERIFY: Permission DEFAULT 05/27/24 11:24:33 ipverify: DEFAULT optimized to allow anyone 05/27/24 11:24:33 IPVERIFY: Subsystem STARTD 05/27/24 11:24:33 IPVERIFY: Permission CLIENT 05/27/24 11:24:33 ipverify: CLIENT optimized to allow anyone 05/27/24 11:24:33 IPVERIFY: Subsystem STARTD 05/27/24 11:24:33 IPVERIFY: Permission ADVERTISE_STARTD 05/27/24 11:24:33 IPVERIFY: allow ADVERTISE_STARTD: * (from config value ALLOW_DAEMON) 05/27/24 11:24:33 ipverify: ADVERTISE_STARTD optimized to allow anyone 05/27/24 11:24:33 IPVERIFY: Subsystem STARTD 05/27/24 11:24:33 IPVERIFY: Permission ADVERTISE_SCHEDD 05/27/24 11:24:33 IPVERIFY: allow ADVERTISE_SCHEDD: * (from config value ALLOW_DAEMON) 05/27/24 11:24:33 ipverify: ADVERTISE_SCHEDD optimized to allow anyone 05/27/24 11:24:33 IPVERIFY: Subsystem STARTD 05/27/24 11:24:33 IPVERIFY: Permission ADVERTISE_MASTER 05/27/24 11:24:33 IPVERIFY: allow ADVERTISE_MASTER: * (from config value ALLOW_DAEMON) 05/27/24 11:24:33 ipverify: ADVERTISE_MASTER optimized to allow anyone 05/27/24 11:24:33 Initialized the following authorization table: 05/27/24 11:24:33 Authorizations yet to be resolved: 05/27/24 11:24:33 allow READ: */* 05/27/24 11:24:33 allow WRITE: */* 05/27/24 11:24:33 allow NEGOTIATOR: */192.168.1.30 */192.168.1.157 */submitter 05/27/24 11:24:33 allow OWNER: */* */executor */192.168.1.157 05/27/24 11:24:33 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1037>. 05/27/24 11:24:33 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1037> 05/27/24 11:24:33 DC_AUTHENTICATE: received following ClassAd: ValidCommands = "60002,60003,60011,60014,427" Subsystem = "KBDD" Command = 427 Integrity = "NO" Authentication = "NO" SessionLease = 3600 Encryption = "NO" Sid = "wxp-sp2-64-01:2076:1716801873:0" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" AuthMethods = "NTSSPI" OutgoingNegotiation = "PREFERRED" CryptoMethods = "3DES,BLOWFISH" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 1520 MyRemoteUserName = "unauthenticated@unmapped" SessionDuration = "86400" UseSession = "YES" Enact = "YES" User = "unauthenticated@unmapped" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" AuthCommand = 427 ServerCommandSock = "<192.168.1.157:4983>" CurrentTime = time() 05/27/24 11:24:33 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>: 05/27/24 11:24:33 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 1520 AuthMethods = "NTSSPI" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Sid = "wxp-sp2-64-01:2076:1716801873:0" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:4983>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:24:33 DC_AUTHENTICATE: Success. 05/27/24 11:24:33 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:24:37 SECMAN: command 0 UPDATE_STARTD_AD to collector submitter from UDP port 1048 (non-blocking). 05/27/24 11:24:37 SECMAN: no cached key for {<192.168.1.30:9618>,<0>}. 05/27/24 11:24:37 SECMAN: Security Policy: SessionDuration = "86400" ServerPid = 2076 Enact = "NO" OutgoingNegotiation = "PREFERRED" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Encryption = "OPTIONAL" SessionLease = 3600 Authentication = "OPTIONAL" Integrity = "OPTIONAL" AuthMethods = "NTSSPI,KERBEROS" Subsystem = "STARTD" CryptoMethods = "3DES,BLOWFISH" CurrentTime = time() 05/27/24 11:24:37 SECMAN: negotiating security for command 0. 05/27/24 11:24:37 SECMAN: need to start a session via TCP 05/27/24 11:24:37 SECMAN: command 60010 UPDATE_STARTD_AD to <192.168.1.30:9618> from TCP port 1049 (non-blocking). 05/27/24 11:24:37 SECMAN: waiting for TCP connection to <192.168.1.30:9618>. 05/27/24 11:24:37 SECMAN: resuming command 60010 UPDATE_STARTD_AD to <192.168.1.30:9618> from TCP port 1049 (non-blocking). 05/27/24 11:24:37 SECMAN: no cached key for {<192.168.1.30:9618>,<60010>}. 05/27/24 11:24:37 SECMAN: Security Policy: NewSession = "YES" SessionDuration = "86400" ServerPid = 2076 Enact = "NO" OutgoingNegotiation = "PREFERRED" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Encryption = "OPTIONAL" SessionLease = 3600 Authentication = "OPTIONAL" Integrity = "OPTIONAL" AuthMethods = "NTSSPI,KERBEROS" Subsystem = "STARTD" CryptoMethods = "3DES,BLOWFISH" CurrentTime = time() 05/27/24 11:24:37 SECMAN: negotiating security for command 60010. 05/27/24 11:24:37 SECMAN: sending DC_AUTHENTICATE command 05/27/24 11:24:37 SECMAN: sending following classad: AuthCommand = 0 CurrentTime = time() ServerCommandSock = "<192.168.1.157:4982>" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" NewSession = "YES" SessionDuration = "86400" ServerPid = 2076 Enact = "NO" CryptoMethods = "3DES,BLOWFISH" OutgoingNegotiation = "PREFERRED" AuthMethods = "NTSSPI,KERBEROS" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Encryption = "OPTIONAL" SessionLease = 3600 Authentication = "OPTIONAL" Integrity = "OPTIONAL" Command = 60010 Subsystem = "STARTD" 05/27/24 11:24:37 SECMAN: resuming command 60010 UPDATE_STARTD_AD to <192.168.1.30:9618> from TCP port 1049 (non-blocking). 05/27/24 11:24:37 SECMAN: server responded with: SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" CryptoMethodsList = "BLOWFISH,3DES" AuthMethods = "NTSSPI" Encryption = "NO" AuthMethodsList = "NTSSPI,KERBEROS" TrustDomain = "submitter" Integrity = "NO" Enact = "YES" NegotiatedSession = true RemoteVersion = "$CondorVersion: 23.0.4 2024-02-08 BuildID: 712251 $" IssuerKeys = "LOCAL, POOL" CurrentTime = time() 05/27/24 11:24:37 SECMAN: received post-auth classad: ValidCommands = "60027,67,13,0,60,60007,457,60020,68,5,6,7,9,12,43,20,46,78,50,56,48,71,74" Sid = "submitter:5064:1716801877:268489" User = "unauthenticated@unmapped" ReturnCode = "AUTHORIZED" CurrentTime = time() 05/27/24 11:24:37 SECMAN: policy to be cached: User = "unauthenticated@unmapped" ValidCommands = "60027,67,13,0,60,60007,457,60020,68,5,6,7,9,12,43,20,46,78,50,56,48,71,74" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" AuthMethodsList = "NTSSPI,KERBEROS" RemoteVersion = "$CondorVersion: 23.0.4 2024-02-08 BuildID: 712251 $" AuthCommand = 0 CurrentTime = time() SessionDuration = "86400" Enact = "YES" CryptoMethods = "3DES,BLOWFISH" OutgoingNegotiation = "PREFERRED" Sid = "submitter:5064:1716801877:268489" AuthMethods = "NTSSPI" Encryption = "NO" SessionLease = 3600 Authentication = "NO" Integrity = "NO" Command = 60010 Subsystem = "STARTD" 05/27/24 11:24:37 SECMAN: added session submitter:5064:1716801877:268489 to cache for 86400 seconds (3600s lease). 05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<60027>} mapped to session submitter:5064:1716801877:268489. 05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<67>} mapped to session submitter:5064:1716801877:268489. 05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<13>} mapped to session submitter:5064:1716801877:268489. 05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<0>} mapped to session submitter:5064:1716801877:268489. 05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<60>} mapped to session submitter:5064:1716801877:268489. 05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<60007>} mapped to session submitter:5064:1716801877:268489. 05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<457>} mapped to session submitter:5064:1716801877:268489. 05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<60020>} mapped to session submitter:5064:1716801877:268489. 05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<68>} mapped to session submitter:5064:1716801877:268489. 05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<5>} mapped to session submitter:5064:1716801877:268489. 05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<6>} mapped to session submitter:5064:1716801877:268489. 05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<7>} mapped to session submitter:5064:1716801877:268489. 05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<9>} mapped to session submitter:5064:1716801877:268489. 05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<12>} mapped to session submitter:5064:1716801877:268489. 05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<43>} mapped to session submitter:5064:1716801877:268489. 05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<20>} mapped to session submitter:5064:1716801877:268489. 05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<46>} mapped to session submitter:5064:1716801877:268489. 05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<78>} mapped to session submitter:5064:1716801877:268489. 05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<50>} mapped to session submitter:5064:1716801877:268489. 05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<56>} mapped to session submitter:5064:1716801877:268489. 05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<48>} mapped to session submitter:5064:1716801877:268489. 05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<71>} mapped to session submitter:5064:1716801877:268489. 05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<74>} mapped to session submitter:5064:1716801877:268489. 05/27/24 11:24:37 SECMAN: startCommand succeeded. 05/27/24 11:24:37 Authorizing server 'unauthenticated@unmapped/192.168.1.30'. 05/27/24 11:24:37 SECMAN: succesfully created security session to <192.168.1.30:9618> via TCP! 05/27/24 11:24:37 SECMAN: resuming command 0 UPDATE_STARTD_AD to collector submitter from UDP port 1048 (non-blocking). 05/27/24 11:24:37 SECMAN: using session submitter:5064:1716801877:268489 for {<192.168.1.30:9618>,<0>}. 05/27/24 11:24:37 SECMAN: found cached session id submitter:5064:1716801877:268489 for {<192.168.1.30:9618>,<0>}. AuthMethodsList = "NTSSPI,KERBEROS" UseSession = "YES" MyRemoteUserName = "unauthenticated@unmapped" User = "unauthenticated@unmapped" SessionDuration = "86400" ServerPid = 2076 Enact = "YES" CryptoMethods = "3DES,BLOWFISH" OutgoingNegotiation = "PREFERRED" Sid = "submitter:5064:1716801877:268489" AuthMethods = "NTSSPI" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Encryption = "NO" SessionLease = 3600 Authentication = "NO" Integrity = "NO" Command = 60010 Subsystem = "STARTD" ValidCommands = "60027,67,13,0,60,60007,457,60020,68,5,6,7,9,12,43,20,46,78,50,56,48,71,74" AuthCommand = 0 RemoteVersion = "$CondorVersion: 23.0.4 2024-02-08 BuildID: 712251 $" CurrentTime = time() 05/27/24 11:24:37 SECMAN: Security Policy: AuthMethodsList = "NTSSPI,KERBEROS" UseSession = "YES" MyRemoteUserName = "unauthenticated@unmapped" User = "unauthenticated@unmapped" SessionDuration = "86400" ServerPid = 2076 Enact = "YES" CryptoMethods = "3DES,BLOWFISH" OutgoingNegotiation = "PREFERRED" Sid = "submitter:5064:1716801877:268489" AuthMethods = "NTSSPI" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Encryption = "NO" SessionLease = 3600 Authentication = "NO" Integrity = "NO" Command = 60010 Subsystem = "STARTD" ValidCommands = "60027,67,13,0,60,60007,457,60020,68,5,6,7,9,12,43,20,46,78,50,56,48,71,74" AuthCommand = 0 RemoteVersion = "$CondorVersion: 23.0.4 2024-02-08 BuildID: 712251 $" CurrentTime = time() 05/27/24 11:24:37 SECMAN: negotiating security for command 0. 05/27/24 11:24:37 SECMAN: UDP, m_have_session == 1 05/27/24 11:24:37 SECMAN: UDP has session submitter:5064:1716801877:268489. 05/27/24 11:24:37 SECMAN: sending DC_AUTHENTICATE command 05/27/24 11:24:37 SECMAN: sending following classad: AuthMethodsList = "NTSSPI,KERBEROS" UseSession = "YES" MyRemoteUserName = "unauthenticated@unmapped" User = "unauthenticated@unmapped" SessionDuration = "86400" ServerPid = 2076 Enact = "YES" CryptoMethods = "3DES,BLOWFISH" OutgoingNegotiation = "PREFERRED" Sid = "submitter:5064:1716801877:268489" AuthMethods = "NTSSPI" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Encryption = "NO" SessionLease = 3600 Authentication = "NO" Integrity = "NO" Command = 0 Subsystem = "STARTD" ValidCommands = "60027,67,13,0,60,60007,457,60020,68,5,6,7,9,12,43,20,46,78,50,56,48,71,74" ServerCommandSock = "<192.168.1.157:4982>" AuthCommand = 0 RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" CurrentTime = time() 05/27/24 11:24:37 Getting authenticated user from cached session: unauthenticated@unmapped 05/27/24 11:24:37 SECMAN: startCommand succeeded. 05/27/24 11:24:37 Authorizing server 'unauthenticated@unmapped/192.168.1.30'. 05/27/24 11:24:45 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1056> 05/27/24 11:24:45 DC_AUTHENTICATE: received following ClassAd: AuthMethods = "NTSSPI,KERBEROS" CryptoMethods = "3DES,BLOWFISH" OutgoingNegotiation = "PREFERRED" Enact = "NO" Authentication = "OPTIONAL" SessionLease = 3600 Encryption = "OPTIONAL" ServerPid = 2864 Subsystem = "KBDD" Command = 60010 CurrentTime = time() AuthCommand = 427 ServerCommandSock = "<192.168.1.157:1155>" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" SessionDuration = "86400" Integrity = "OPTIONAL" NewSession = "YES" 05/27/24 11:24:45 DC_AUTHENTICATE: our_policy: SessionDuration = "86400" ServerPid = 2076 Enact = "NO" OutgoingNegotiation = "PREFERRED" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Encryption = "OPTIONAL" SessionLease = 3600 Authentication = "OPTIONAL" Integrity = "OPTIONAL" AuthMethods = "NTSSPI,KERBEROS" Subsystem = "STARTD" CryptoMethods = "3DES,BLOWFISH" CurrentTime = time() 05/27/24 11:24:45 DC_AUTHENTICATE: the_policy: SessionLease = 3600 SessionDuration = "86400" CryptoMethods = "3DES,BLOWFISH" AuthMethods = "NTSSPI" AuthMethodsList = "NTSSPI,KERBEROS" Integrity = "NO" Encryption = "NO" Authentication = "NO" Enact = "YES" CurrentTime = time() 05/27/24 11:24:45 SECMAN: Sending following response ClassAd: RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" Authentication = "NO" SessionLease = 3600 SessionDuration = "86400" CryptoMethods = "3DES,BLOWFISH" AuthMethods = "NTSSPI" AuthMethodsList = "NTSSPI,KERBEROS" Integrity = "NO" Encryption = "NO" Enact = "YES" CurrentTime = time() 05/27/24 11:24:45 DC_AUTHENTICATE: not authenticating. 05/27/24 11:24:45 DC_AUTHENTICATE: sending session ad: ValidCommands = "60002,60003,60011,60014,427" Sid = "wxp-sp2-64-01:2076:1716801885:1" User = "unauthenticated@unmapped" CurrentTime = time() 05/27/24 11:24:45 DC_AUTHENTICATE: sent session wxp-sp2-64-01:2076:1716801885:1 info! 05/27/24 11:24:45 DC_AUTHENTICATE: added incoming session id wxp-sp2-64-01:2076:1716801885:1 to cache for 86420 seconds (lease is 3620s, return address is <192.168.1.157:1155>). ValidCommands = "60002,60003,60011,60014,427" User = "unauthenticated@unmapped" CurrentTime = time() ServerCommandSock = "<192.168.1.157:1155>" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" Authentication = "NO" SessionLease = 3600 SessionDuration = "86400" CryptoMethods = "3DES,BLOWFISH" Subsystem = "KBDD" Sid = "wxp-sp2-64-01:2076:1716801885:1" AuthMethods = "NTSSPI" ServerPid = 2864 AuthMethodsList = "NTSSPI,KERBEROS" Integrity = "NO" Encryption = "NO" Enact = "YES" 05/27/24 11:24:45 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1055>. 05/27/24 11:24:45 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1055> 05/27/24 11:24:45 DC_AUTHENTICATE: received following ClassAd: ValidCommands = "60002,60003,60011,60014,427" Subsystem = "KBDD" Command = 427 Sid = "wxp-sp2-64-01:2076:1716801885:1" AuthMethods = "NTSSPI" OutgoingNegotiation = "PREFERRED" CryptoMethods = "3DES,BLOWFISH" Enact = "YES" SessionLease = 3600 Authentication = "NO" Encryption = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 2864 Integrity = "NO" UseSession = "YES" SessionDuration = "86400" MyRemoteUserName = "unauthenticated@unmapped" User = "unauthenticated@unmapped" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" AuthCommand = 427 ServerCommandSock = "<192.168.1.157:1155>" CurrentTime = time() 05/27/24 11:24:45 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>: 05/27/24 11:24:45 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 2864 AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:24:45 DC_AUTHENTICATE: Success. 05/27/24 11:24:45 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:24:48 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1058>. 05/27/24 11:24:48 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1058> 05/27/24 11:24:48 DC_AUTHENTICATE: received following ClassAd: Enact = "YES" User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" CryptoMethods = "3DES,BLOWFISH" OutgoingNegotiation = "PREFERRED" SessionDuration = "86400" ValidCommands = "60002,60003,60011,60014,427" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" CurrentTime = time() ServerCommandSock = "<192.168.1.157:4983>" AuthCommand = 427 Integrity = "NO" Command = 427 Subsystem = "KBDD" Sid = "wxp-sp2-64-01:2076:1716801873:0" AuthMethods = "NTSSPI" Encryption = "NO" Authentication = "NO" SessionLease = 3600 05/27/24 11:24:48 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>: 05/27/24 11:24:48 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 1520 AuthMethods = "NTSSPI" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Sid = "wxp-sp2-64-01:2076:1716801873:0" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:4983>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:24:48 DC_AUTHENTICATE: Success. 05/27/24 11:24:48 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:24:50 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1060>. 05/27/24 11:24:50 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1060> 05/27/24 11:24:50 DC_AUTHENTICATE: received following ClassAd: User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" Integrity = "NO" CurrentTime = time() AuthCommand = 427 RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" Subsystem = "KBDD" Command = 427 SessionDuration = "86400" Encryption = "NO" Authentication = "NO" SessionLease = 3600 ValidCommands = "60002,60003,60011,60014,427" OutgoingNegotiation = "PREFERRED" CryptoMethods = "3DES,BLOWFISH" Enact = "YES" AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" 05/27/24 11:24:50 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>: 05/27/24 11:24:50 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 2864 AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:24:50 DC_AUTHENTICATE: Success. 05/27/24 11:24:50 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:24:53 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1062>. 05/27/24 11:24:53 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1062> 05/27/24 11:24:53 DC_AUTHENTICATE: received following ClassAd: Enact = "YES" User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" CryptoMethods = "3DES,BLOWFISH" OutgoingNegotiation = "PREFERRED" SessionDuration = "86400" ValidCommands = "60002,60003,60011,60014,427" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" CurrentTime = time() ServerCommandSock = "<192.168.1.157:4983>" AuthCommand = 427 Integrity = "NO" Command = 427 Subsystem = "KBDD" Sid = "wxp-sp2-64-01:2076:1716801873:0" AuthMethods = "NTSSPI" Encryption = "NO" Authentication = "NO" SessionLease = 3600 05/27/24 11:24:53 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>: 05/27/24 11:24:53 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 1520 AuthMethods = "NTSSPI" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Sid = "wxp-sp2-64-01:2076:1716801873:0" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:4983>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:24:53 DC_AUTHENTICATE: Success. 05/27/24 11:24:53 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:24:55 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1064>. 05/27/24 11:24:55 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1064> 05/27/24 11:24:55 DC_AUTHENTICATE: received following ClassAd: User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" Integrity = "NO" CurrentTime = time() AuthCommand = 427 RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" Subsystem = "KBDD" Command = 427 SessionDuration = "86400" Encryption = "NO" Authentication = "NO" SessionLease = 3600 ValidCommands = "60002,60003,60011,60014,427" OutgoingNegotiation = "PREFERRED" CryptoMethods = "3DES,BLOWFISH" Enact = "YES" AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" 05/27/24 11:24:55 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>: 05/27/24 11:24:55 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 2864 AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:24:55 DC_AUTHENTICATE: Success. 05/27/24 11:24:55 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:24:58 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1067>. 05/27/24 11:24:58 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1067> 05/27/24 11:24:58 DC_AUTHENTICATE: received following ClassAd: Enact = "YES" User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" CryptoMethods = "3DES,BLOWFISH" OutgoingNegotiation = "PREFERRED" SessionDuration = "86400" ValidCommands = "60002,60003,60011,60014,427" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" CurrentTime = time() ServerCommandSock = "<192.168.1.157:4983>" AuthCommand = 427 Integrity = "NO" Command = 427 Subsystem = "KBDD" Sid = "wxp-sp2-64-01:2076:1716801873:0" AuthMethods = "NTSSPI" Encryption = "NO" Authentication = "NO" SessionLease = 3600 05/27/24 11:24:58 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>: 05/27/24 11:24:58 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 1520 AuthMethods = "NTSSPI" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Sid = "wxp-sp2-64-01:2076:1716801873:0" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:4983>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:24:58 DC_AUTHENTICATE: Success. 05/27/24 11:24:58 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:25:00 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1069>. 05/27/24 11:25:00 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1069> 05/27/24 11:25:00 DC_AUTHENTICATE: received following ClassAd: User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" Integrity = "NO" CurrentTime = time() AuthCommand = 427 RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" Subsystem = "KBDD" Command = 427 SessionDuration = "86400" Encryption = "NO" Authentication = "NO" SessionLease = 3600 ValidCommands = "60002,60003,60011,60014,427" OutgoingNegotiation = "PREFERRED" CryptoMethods = "3DES,BLOWFISH" Enact = "YES" AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" 05/27/24 11:25:00 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>: 05/27/24 11:25:00 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 2864 AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:25:00 DC_AUTHENTICATE: Success. 05/27/24 11:25:00 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:25:03 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1071>. 05/27/24 11:25:03 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1071> 05/27/24 11:25:03 DC_AUTHENTICATE: received following ClassAd: Enact = "YES" User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" CryptoMethods = "3DES,BLOWFISH" OutgoingNegotiation = "PREFERRED" SessionDuration = "86400" ValidCommands = "60002,60003,60011,60014,427" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" CurrentTime = time() ServerCommandSock = "<192.168.1.157:4983>" AuthCommand = 427 Integrity = "NO" Command = 427 Subsystem = "KBDD" Sid = "wxp-sp2-64-01:2076:1716801873:0" AuthMethods = "NTSSPI" Encryption = "NO" Authentication = "NO" SessionLease = 3600 05/27/24 11:25:03 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>: 05/27/24 11:25:03 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 1520 AuthMethods = "NTSSPI" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Sid = "wxp-sp2-64-01:2076:1716801873:0" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:4983>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:25:03 DC_AUTHENTICATE: Success. 05/27/24 11:25:03 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:25:05 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1073>. 05/27/24 11:25:05 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1073> 05/27/24 11:25:05 DC_AUTHENTICATE: received following ClassAd: User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" Integrity = "NO" CurrentTime = time() AuthCommand = 427 RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" Subsystem = "KBDD" Command = 427 SessionDuration = "86400" Encryption = "NO" Authentication = "NO" SessionLease = 3600 ValidCommands = "60002,60003,60011,60014,427" OutgoingNegotiation = "PREFERRED" CryptoMethods = "3DES,BLOWFISH" Enact = "YES" AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" 05/27/24 11:25:05 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>: 05/27/24 11:25:05 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 2864 AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:25:05 DC_AUTHENTICATE: Success. 05/27/24 11:25:05 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:25:08 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1075>. 05/27/24 11:25:08 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1075> 05/27/24 11:25:08 DC_AUTHENTICATE: received following ClassAd: Enact = "YES" User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" CryptoMethods = "3DES,BLOWFISH" OutgoingNegotiation = "PREFERRED" SessionDuration = "86400" ValidCommands = "60002,60003,60011,60014,427" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" CurrentTime = time() ServerCommandSock = "<192.168.1.157:4983>" AuthCommand = 427 Integrity = "NO" Command = 427 Subsystem = "KBDD" Sid = "wxp-sp2-64-01:2076:1716801873:0" AuthMethods = "NTSSPI" Encryption = "NO" Authentication = "NO" SessionLease = 3600 05/27/24 11:25:08 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>: 05/27/24 11:25:08 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 1520 AuthMethods = "NTSSPI" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Sid = "wxp-sp2-64-01:2076:1716801873:0" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:4983>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:25:08 DC_AUTHENTICATE: Success. 05/27/24 11:25:08 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:25:10 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1077>. 05/27/24 11:25:10 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1077> 05/27/24 11:25:10 DC_AUTHENTICATE: received following ClassAd: User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" Integrity = "NO" CurrentTime = time() AuthCommand = 427 RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" Subsystem = "KBDD" Command = 427 SessionDuration = "86400" Encryption = "NO" Authentication = "NO" SessionLease = 3600 ValidCommands = "60002,60003,60011,60014,427" OutgoingNegotiation = "PREFERRED" CryptoMethods = "3DES,BLOWFISH" Enact = "YES" AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" 05/27/24 11:25:10 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>: 05/27/24 11:25:10 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 2864 AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:25:10 DC_AUTHENTICATE: Success. 05/27/24 11:25:10 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:25:13 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1079>. 05/27/24 11:25:13 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1079> 05/27/24 11:25:13 DC_AUTHENTICATE: received following ClassAd: Enact = "YES" User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" CryptoMethods = "3DES,BLOWFISH" OutgoingNegotiation = "PREFERRED" SessionDuration = "86400" ValidCommands = "60002,60003,60011,60014,427" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" CurrentTime = time() ServerCommandSock = "<192.168.1.157:4983>" AuthCommand = 427 Integrity = "NO" Command = 427 Subsystem = "KBDD" Sid = "wxp-sp2-64-01:2076:1716801873:0" AuthMethods = "NTSSPI" Encryption = "NO" Authentication = "NO" SessionLease = 3600 05/27/24 11:25:13 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>: 05/27/24 11:25:13 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 1520 AuthMethods = "NTSSPI" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Sid = "wxp-sp2-64-01:2076:1716801873:0" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:4983>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:25:13 DC_AUTHENTICATE: Success. 05/27/24 11:25:13 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:25:13 State change: benchmarks completed 05/27/24 11:25:13 slot1: Changing activity: Benchmarking -> Idle 05/27/24 11:25:15 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1084>. 05/27/24 11:25:15 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1084> 05/27/24 11:25:15 DC_AUTHENTICATE: received following ClassAd: User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" Integrity = "NO" CurrentTime = time() AuthCommand = 427 RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" Subsystem = "KBDD" Command = 427 SessionDuration = "86400" Encryption = "NO" Authentication = "NO" SessionLease = 3600 ValidCommands = "60002,60003,60011,60014,427" OutgoingNegotiation = "PREFERRED" CryptoMethods = "3DES,BLOWFISH" Enact = "YES" AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" 05/27/24 11:25:15 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>: 05/27/24 11:25:15 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 2864 AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:25:15 DC_AUTHENTICATE: Success. 05/27/24 11:25:15 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:25:17 SECMAN: command 0 UPDATE_STARTD_AD to collector submitter from UDP port 1086 (non-blocking). 05/27/24 11:25:17 SECMAN: using session submitter:5064:1716801877:268489 for {<192.168.1.30:9618>,<0>}. 05/27/24 11:25:17 SECMAN: found cached session id submitter:5064:1716801877:268489 for {<192.168.1.30:9618>,<0>}. Subsystem = "STARTD" Command = 60010 Integrity = "NO" Authentication = "NO" SessionLease = 3600 Encryption = "NO" Sid = "submitter:5064:1716801877:268489" AuthMethods = "NTSSPI" CurrentTime = time() AuthCommand = 0 RemoteVersion = "$CondorVersion: 23.0.4 2024-02-08 BuildID: 712251 $" SessionDuration = "86400" OutgoingNegotiation = "PREFERRED" CryptoMethods = "3DES,BLOWFISH" ValidCommands = "60027,67,13,0,60,60007,457,60020,68,5,6,7,9,12,43,20,46,78,50,56,48,71,74" UseSession = "YES" MyRemoteUserName = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" User = "unauthenticated@unmapped" Enact = "YES" 05/27/24 11:25:17 SECMAN: Security Policy: Subsystem = "STARTD" Command = 60010 Integrity = "NO" Authentication = "NO" SessionLease = 3600 Encryption = "NO" Sid = "submitter:5064:1716801877:268489" AuthMethods = "NTSSPI" CurrentTime = time() AuthCommand = 0 RemoteVersion = "$CondorVersion: 23.0.4 2024-02-08 BuildID: 712251 $" SessionDuration = "86400" OutgoingNegotiation = "PREFERRED" CryptoMethods = "3DES,BLOWFISH" ValidCommands = "60027,67,13,0,60,60007,457,60020,68,5,6,7,9,12,43,20,46,78,50,56,48,71,74" UseSession = "YES" MyRemoteUserName = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" User = "unauthenticated@unmapped" Enact = "YES" 05/27/24 11:25:17 SECMAN: negotiating security for command 0. 05/27/24 11:25:17 SECMAN: UDP, m_have_session == 1 05/27/24 11:25:17 SECMAN: UDP has session submitter:5064:1716801877:268489. 05/27/24 11:25:17 SECMAN: sending DC_AUTHENTICATE command 05/27/24 11:25:17 SECMAN: sending following classad: Subsystem = "STARTD" Command = 0 Integrity = "NO" Authentication = "NO" SessionLease = 3600 Encryption = "NO" Sid = "submitter:5064:1716801877:268489" AuthMethods = "NTSSPI" ServerCommandSock = "<192.168.1.157:4982>" CurrentTime = time() AuthCommand = 0 RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" SessionDuration = "86400" OutgoingNegotiation = "PREFERRED" CryptoMethods = "3DES,BLOWFISH" ValidCommands = "60027,67,13,0,60,60007,457,60020,68,5,6,7,9,12,43,20,46,78,50,56,48,71,74" UseSession = "YES" MyRemoteUserName = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" User = "unauthenticated@unmapped" Enact = "YES" 05/27/24 11:25:17 Getting authenticated user from cached session: unauthenticated@unmapped 05/27/24 11:25:17 SECMAN: startCommand succeeded. 05/27/24 11:25:17 Authorizing server 'unauthenticated@unmapped/192.168.1.30'. 05/27/24 11:25:18 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1088>. 05/27/24 11:25:18 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1088> 05/27/24 11:25:18 DC_AUTHENTICATE: received following ClassAd: Enact = "YES" User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" CryptoMethods = "3DES,BLOWFISH" OutgoingNegotiation = "PREFERRED" SessionDuration = "86400" ValidCommands = "60002,60003,60011,60014,427" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" CurrentTime = time() ServerCommandSock = "<192.168.1.157:4983>" AuthCommand = 427 Integrity = "NO" Command = 427 Subsystem = "KBDD" Sid = "wxp-sp2-64-01:2076:1716801873:0" AuthMethods = "NTSSPI" Encryption = "NO" Authentication = "NO" SessionLease = 3600 05/27/24 11:25:18 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>: 05/27/24 11:25:18 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 1520 AuthMethods = "NTSSPI" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Sid = "wxp-sp2-64-01:2076:1716801873:0" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:4983>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:25:18 DC_AUTHENTICATE: Success. 05/27/24 11:25:18 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:25:20 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1090>. 05/27/24 11:25:20 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1090> 05/27/24 11:25:20 DC_AUTHENTICATE: received following ClassAd: User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" Integrity = "NO" CurrentTime = time() AuthCommand = 427 RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" Subsystem = "KBDD" Command = 427 SessionDuration = "86400" Encryption = "NO" Authentication = "NO" SessionLease = 3600 ValidCommands = "60002,60003,60011,60014,427" OutgoingNegotiation = "PREFERRED" CryptoMethods = "3DES,BLOWFISH" Enact = "YES" AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" 05/27/24 11:25:20 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>: 05/27/24 11:25:20 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 2864 AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:25:20 DC_AUTHENTICATE: Success. 05/27/24 11:25:20 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:25:25 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1092>. 05/27/24 11:25:25 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1092> 05/27/24 11:25:25 DC_AUTHENTICATE: received following ClassAd: User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" Integrity = "NO" CurrentTime = time() AuthCommand = 427 RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" Subsystem = "KBDD" Command = 427 SessionDuration = "86400" Encryption = "NO" Authentication = "NO" SessionLease = 3600 ValidCommands = "60002,60003,60011,60014,427" OutgoingNegotiation = "PREFERRED" CryptoMethods = "3DES,BLOWFISH" Enact = "YES" AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" 05/27/24 11:25:25 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>: 05/27/24 11:25:25 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 2864 AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:25:25 DC_AUTHENTICATE: Success. 05/27/24 11:25:25 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:25:28 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1094>. 05/27/24 11:25:28 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1094> 05/27/24 11:25:28 DC_AUTHENTICATE: received following ClassAd: Enact = "YES" User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" CryptoMethods = "3DES,BLOWFISH" OutgoingNegotiation = "PREFERRED" SessionDuration = "86400" ValidCommands = "60002,60003,60011,60014,427" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" CurrentTime = time() ServerCommandSock = "<192.168.1.157:4983>" AuthCommand = 427 Integrity = "NO" Command = 427 Subsystem = "KBDD" Sid = "wxp-sp2-64-01:2076:1716801873:0" AuthMethods = "NTSSPI" Encryption = "NO" Authentication = "NO" SessionLease = 3600 05/27/24 11:25:28 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>: 05/27/24 11:25:28 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 1520 AuthMethods = "NTSSPI" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Sid = "wxp-sp2-64-01:2076:1716801873:0" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:4983>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:25:28 DC_AUTHENTICATE: Success. 05/27/24 11:25:28 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:25:30 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1097>. 05/27/24 11:25:30 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1097> 05/27/24 11:25:30 DC_AUTHENTICATE: received following ClassAd: User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" Integrity = "NO" CurrentTime = time() AuthCommand = 427 RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" Subsystem = "KBDD" Command = 427 SessionDuration = "86400" Encryption = "NO" Authentication = "NO" SessionLease = 3600 ValidCommands = "60002,60003,60011,60014,427" OutgoingNegotiation = "PREFERRED" CryptoMethods = "3DES,BLOWFISH" Enact = "YES" AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" 05/27/24 11:25:30 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>: 05/27/24 11:25:30 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 2864 AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:25:30 DC_AUTHENTICATE: Success. 05/27/24 11:25:30 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:25:33 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1099>. 05/27/24 11:25:33 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1099> 05/27/24 11:25:33 DC_AUTHENTICATE: received following ClassAd: Enact = "YES" User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" CryptoMethods = "3DES,BLOWFISH" OutgoingNegotiation = "PREFERRED" SessionDuration = "86400" ValidCommands = "60002,60003,60011,60014,427" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" CurrentTime = time() ServerCommandSock = "<192.168.1.157:4983>" AuthCommand = 427 Integrity = "NO" Command = 427 Subsystem = "KBDD" Sid = "wxp-sp2-64-01:2076:1716801873:0" AuthMethods = "NTSSPI" Encryption = "NO" Authentication = "NO" SessionLease = 3600 05/27/24 11:25:33 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>: 05/27/24 11:25:33 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 1520 AuthMethods = "NTSSPI" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Sid = "wxp-sp2-64-01:2076:1716801873:0" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:4983>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:25:33 DC_AUTHENTICATE: Success. 05/27/24 11:25:33 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:25:35 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1101>. 05/27/24 11:25:35 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1101> 05/27/24 11:25:35 DC_AUTHENTICATE: received following ClassAd: User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" Integrity = "NO" CurrentTime = time() AuthCommand = 427 RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" Subsystem = "KBDD" Command = 427 SessionDuration = "86400" Encryption = "NO" Authentication = "NO" SessionLease = 3600 ValidCommands = "60002,60003,60011,60014,427" OutgoingNegotiation = "PREFERRED" CryptoMethods = "3DES,BLOWFISH" Enact = "YES" AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" 05/27/24 11:25:35 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>: 05/27/24 11:25:35 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 2864 AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:25:35 DC_AUTHENTICATE: Success. 05/27/24 11:25:35 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:25:38 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1103>. 05/27/24 11:25:38 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1103> 05/27/24 11:25:38 DC_AUTHENTICATE: received following ClassAd: Enact = "YES" User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" CryptoMethods = "3DES,BLOWFISH" OutgoingNegotiation = "PREFERRED" SessionDuration = "86400" ValidCommands = "60002,60003,60011,60014,427" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" CurrentTime = time() ServerCommandSock = "<192.168.1.157:4983>" AuthCommand = 427 Integrity = "NO" Command = 427 Subsystem = "KBDD" Sid = "wxp-sp2-64-01:2076:1716801873:0" AuthMethods = "NTSSPI" Encryption = "NO" Authentication = "NO" SessionLease = 3600 05/27/24 11:25:38 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>: 05/27/24 11:25:38 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 1520 AuthMethods = "NTSSPI" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Sid = "wxp-sp2-64-01:2076:1716801873:0" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:4983>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:25:38 DC_AUTHENTICATE: Success. 05/27/24 11:25:38 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:25:40 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1105>. 05/27/24 11:25:40 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1105> 05/27/24 11:25:40 DC_AUTHENTICATE: received following ClassAd: User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" Integrity = "NO" CurrentTime = time() AuthCommand = 427 RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" Subsystem = "KBDD" Command = 427 SessionDuration = "86400" Encryption = "NO" Authentication = "NO" SessionLease = 3600 ValidCommands = "60002,60003,60011,60014,427" OutgoingNegotiation = "PREFERRED" CryptoMethods = "3DES,BLOWFISH" Enact = "YES" AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" 05/27/24 11:25:40 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>: 05/27/24 11:25:40 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 2864 AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:25:40 DC_AUTHENTICATE: Success. 05/27/24 11:25:40 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:25:43 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1107>. 05/27/24 11:25:43 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1107> 05/27/24 11:25:43 DC_AUTHENTICATE: received following ClassAd: Enact = "YES" User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" CryptoMethods = "3DES,BLOWFISH" OutgoingNegotiation = "PREFERRED" SessionDuration = "86400" ValidCommands = "60002,60003,60011,60014,427" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" CurrentTime = time() ServerCommandSock = "<192.168.1.157:4983>" AuthCommand = 427 Integrity = "NO" Command = 427 Subsystem = "KBDD" Sid = "wxp-sp2-64-01:2076:1716801873:0" AuthMethods = "NTSSPI" Encryption = "NO" Authentication = "NO" SessionLease = 3600 05/27/24 11:25:43 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>: 05/27/24 11:25:43 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 1520 AuthMethods = "NTSSPI" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Sid = "wxp-sp2-64-01:2076:1716801873:0" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:4983>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:25:43 DC_AUTHENTICATE: Success. 05/27/24 11:25:43 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:25:45 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1111>. 05/27/24 11:25:45 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1111> 05/27/24 11:25:45 DC_AUTHENTICATE: received following ClassAd: User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" Integrity = "NO" CurrentTime = time() AuthCommand = 427 RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" Subsystem = "KBDD" Command = 427 SessionDuration = "86400" Encryption = "NO" Authentication = "NO" SessionLease = 3600 ValidCommands = "60002,60003,60011,60014,427" OutgoingNegotiation = "PREFERRED" CryptoMethods = "3DES,BLOWFISH" Enact = "YES" AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" 05/27/24 11:25:45 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>: 05/27/24 11:25:45 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 2864 AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:25:45 DC_AUTHENTICATE: Success. 05/27/24 11:25:45 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:25:48 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1113>. 05/27/24 11:25:48 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1113> 05/27/24 11:25:48 DC_AUTHENTICATE: received following ClassAd: Enact = "YES" User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" CryptoMethods = "3DES,BLOWFISH" OutgoingNegotiation = "PREFERRED" SessionDuration = "86400" ValidCommands = "60002,60003,60011,60014,427" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" CurrentTime = time() ServerCommandSock = "<192.168.1.157:4983>" AuthCommand = 427 Integrity = "NO" Command = 427 Subsystem = "KBDD" Sid = "wxp-sp2-64-01:2076:1716801873:0" AuthMethods = "NTSSPI" Encryption = "NO" Authentication = "NO" SessionLease = 3600 05/27/24 11:25:48 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>: 05/27/24 11:25:48 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 1520 AuthMethods = "NTSSPI" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Sid = "wxp-sp2-64-01:2076:1716801873:0" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:4983>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:25:48 DC_AUTHENTICATE: Success. 05/27/24 11:25:48 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:25:50 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1115>. 05/27/24 11:25:50 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1115> 05/27/24 11:25:50 DC_AUTHENTICATE: received following ClassAd: User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" Integrity = "NO" CurrentTime = time() AuthCommand = 427 RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" Subsystem = "KBDD" Command = 427 SessionDuration = "86400" Encryption = "NO" Authentication = "NO" SessionLease = 3600 ValidCommands = "60002,60003,60011,60014,427" OutgoingNegotiation = "PREFERRED" CryptoMethods = "3DES,BLOWFISH" Enact = "YES" AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" 05/27/24 11:25:50 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>: 05/27/24 11:25:50 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 2864 AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:25:50 DC_AUTHENTICATE: Success. 05/27/24 11:25:50 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:25:53 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1117>. 05/27/24 11:25:53 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1117> 05/27/24 11:25:53 DC_AUTHENTICATE: received following ClassAd: Enact = "YES" User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" CryptoMethods = "3DES,BLOWFISH" OutgoingNegotiation = "PREFERRED" SessionDuration = "86400" ValidCommands = "60002,60003,60011,60014,427" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" CurrentTime = time() ServerCommandSock = "<192.168.1.157:4983>" AuthCommand = 427 Integrity = "NO" Command = 427 Subsystem = "KBDD" Sid = "wxp-sp2-64-01:2076:1716801873:0" AuthMethods = "NTSSPI" Encryption = "NO" Authentication = "NO" SessionLease = 3600 05/27/24 11:25:53 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>: 05/27/24 11:25:53 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 1520 AuthMethods = "NTSSPI" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Sid = "wxp-sp2-64-01:2076:1716801873:0" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:4983>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:25:53 DC_AUTHENTICATE: Success. 05/27/24 11:25:53 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:25:55 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1119>. 05/27/24 11:25:55 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1119> 05/27/24 11:25:55 DC_AUTHENTICATE: received following ClassAd: User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" Integrity = "NO" CurrentTime = time() AuthCommand = 427 RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" Subsystem = "KBDD" Command = 427 SessionDuration = "86400" Encryption = "NO" Authentication = "NO" SessionLease = 3600 ValidCommands = "60002,60003,60011,60014,427" OutgoingNegotiation = "PREFERRED" CryptoMethods = "3DES,BLOWFISH" Enact = "YES" AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" 05/27/24 11:25:55 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>: 05/27/24 11:25:55 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 2864 AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:25:55 DC_AUTHENTICATE: Success. 05/27/24 11:25:55 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:25:58 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1121>. 05/27/24 11:25:58 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1121> 05/27/24 11:25:58 DC_AUTHENTICATE: received following ClassAd: Enact = "YES" User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" CryptoMethods = "3DES,BLOWFISH" OutgoingNegotiation = "PREFERRED" SessionDuration = "86400" ValidCommands = "60002,60003,60011,60014,427" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" CurrentTime = time() ServerCommandSock = "<192.168.1.157:4983>" AuthCommand = 427 Integrity = "NO" Command = 427 Subsystem = "KBDD" Sid = "wxp-sp2-64-01:2076:1716801873:0" AuthMethods = "NTSSPI" Encryption = "NO" Authentication = "NO" SessionLease = 3600 05/27/24 11:25:58 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>: 05/27/24 11:25:58 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 1520 AuthMethods = "NTSSPI" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Sid = "wxp-sp2-64-01:2076:1716801873:0" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:4983>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:25:58 DC_AUTHENTICATE: Success. 05/27/24 11:25:58 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:26:00 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1124>. 05/27/24 11:26:00 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1124> 05/27/24 11:26:00 DC_AUTHENTICATE: received following ClassAd: User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" Integrity = "NO" CurrentTime = time() AuthCommand = 427 RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" Subsystem = "KBDD" Command = 427 SessionDuration = "86400" Encryption = "NO" Authentication = "NO" SessionLease = 3600 ValidCommands = "60002,60003,60011,60014,427" OutgoingNegotiation = "PREFERRED" CryptoMethods = "3DES,BLOWFISH" Enact = "YES" AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" 05/27/24 11:26:00 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>: 05/27/24 11:26:00 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 2864 AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:26:00 DC_AUTHENTICATE: Success. 05/27/24 11:26:00 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:26:03 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1126>. 05/27/24 11:26:03 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1126> 05/27/24 11:26:03 DC_AUTHENTICATE: received following ClassAd: Enact = "YES" User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" CryptoMethods = "3DES,BLOWFISH" OutgoingNegotiation = "PREFERRED" SessionDuration = "86400" ValidCommands = "60002,60003,60011,60014,427" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" CurrentTime = time() ServerCommandSock = "<192.168.1.157:4983>" AuthCommand = 427 Integrity = "NO" Command = 427 Subsystem = "KBDD" Sid = "wxp-sp2-64-01:2076:1716801873:0" AuthMethods = "NTSSPI" Encryption = "NO" Authentication = "NO" SessionLease = 3600 05/27/24 11:26:03 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>: 05/27/24 11:26:03 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 1520 AuthMethods = "NTSSPI" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Sid = "wxp-sp2-64-01:2076:1716801873:0" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:4983>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:26:03 DC_AUTHENTICATE: Success. 05/27/24 11:26:03 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:26:05 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1128>. 05/27/24 11:26:05 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1128> 05/27/24 11:26:05 DC_AUTHENTICATE: received following ClassAd: User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" Integrity = "NO" CurrentTime = time() AuthCommand = 427 RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" Subsystem = "KBDD" Command = 427 SessionDuration = "86400" Encryption = "NO" Authentication = "NO" SessionLease = 3600 ValidCommands = "60002,60003,60011,60014,427" OutgoingNegotiation = "PREFERRED" CryptoMethods = "3DES,BLOWFISH" Enact = "YES" AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" 05/27/24 11:26:05 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>: 05/27/24 11:26:05 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 2864 AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:26:05 DC_AUTHENTICATE: Success. 05/27/24 11:26:05 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:26:08 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1130>. 05/27/24 11:26:08 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1130> 05/27/24 11:26:08 DC_AUTHENTICATE: received following ClassAd: Enact = "YES" User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" CryptoMethods = "3DES,BLOWFISH" OutgoingNegotiation = "PREFERRED" SessionDuration = "86400" ValidCommands = "60002,60003,60011,60014,427" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" CurrentTime = time() ServerCommandSock = "<192.168.1.157:4983>" AuthCommand = 427 Integrity = "NO" Command = 427 Subsystem = "KBDD" Sid = "wxp-sp2-64-01:2076:1716801873:0" AuthMethods = "NTSSPI" Encryption = "NO" Authentication = "NO" SessionLease = 3600 05/27/24 11:26:08 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>: 05/27/24 11:26:08 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 1520 AuthMethods = "NTSSPI" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Sid = "wxp-sp2-64-01:2076:1716801873:0" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:4983>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:26:08 DC_AUTHENTICATE: Success. 05/27/24 11:26:08 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:26:10 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1134>. 05/27/24 11:26:10 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1134> 05/27/24 11:26:10 DC_AUTHENTICATE: received following ClassAd: User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" Integrity = "NO" CurrentTime = time() AuthCommand = 427 RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" Subsystem = "KBDD" Command = 427 SessionDuration = "86400" Encryption = "NO" Authentication = "NO" SessionLease = 3600 ValidCommands = "60002,60003,60011,60014,427" OutgoingNegotiation = "PREFERRED" CryptoMethods = "3DES,BLOWFISH" Enact = "YES" AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" 05/27/24 11:26:10 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>: 05/27/24 11:26:10 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 2864 AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:26:10 DC_AUTHENTICATE: Success. 05/27/24 11:26:10 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:26:13 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1136>. 05/27/24 11:26:13 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1136> 05/27/24 11:26:13 DC_AUTHENTICATE: received following ClassAd: Enact = "YES" User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" CryptoMethods = "3DES,BLOWFISH" OutgoingNegotiation = "PREFERRED" SessionDuration = "86400" ValidCommands = "60002,60003,60011,60014,427" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" CurrentTime = time() ServerCommandSock = "<192.168.1.157:4983>" AuthCommand = 427 Integrity = "NO" Command = 427 Subsystem = "KBDD" Sid = "wxp-sp2-64-01:2076:1716801873:0" AuthMethods = "NTSSPI" Encryption = "NO" Authentication = "NO" SessionLease = 3600 05/27/24 11:26:13 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>: 05/27/24 11:26:13 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 1520 AuthMethods = "NTSSPI" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Sid = "wxp-sp2-64-01:2076:1716801873:0" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:4983>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:26:13 DC_AUTHENTICATE: Success. 05/27/24 11:26:13 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:26:15 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1140>. 05/27/24 11:26:15 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1140> 05/27/24 11:26:15 DC_AUTHENTICATE: received following ClassAd: User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" Integrity = "NO" CurrentTime = time() AuthCommand = 427 RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" Subsystem = "KBDD" Command = 427 SessionDuration = "86400" Encryption = "NO" Authentication = "NO" SessionLease = 3600 ValidCommands = "60002,60003,60011,60014,427" OutgoingNegotiation = "PREFERRED" CryptoMethods = "3DES,BLOWFISH" Enact = "YES" AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" 05/27/24 11:26:15 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>: 05/27/24 11:26:15 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 2864 AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:26:15 DC_AUTHENTICATE: Success. 05/27/24 11:26:15 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:26:18 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1142>. 05/27/24 11:26:18 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1142> 05/27/24 11:26:18 DC_AUTHENTICATE: received following ClassAd: Enact = "YES" User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" CryptoMethods = "3DES,BLOWFISH" OutgoingNegotiation = "PREFERRED" SessionDuration = "86400" ValidCommands = "60002,60003,60011,60014,427" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" CurrentTime = time() ServerCommandSock = "<192.168.1.157:4983>" AuthCommand = 427 Integrity = "NO" Command = 427 Subsystem = "KBDD" Sid = "wxp-sp2-64-01:2076:1716801873:0" AuthMethods = "NTSSPI" Encryption = "NO" Authentication = "NO" SessionLease = 3600 05/27/24 11:26:18 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>: 05/27/24 11:26:18 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 1520 AuthMethods = "NTSSPI" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Sid = "wxp-sp2-64-01:2076:1716801873:0" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:4983>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:26:18 DC_AUTHENTICATE: Success. 05/27/24 11:26:18 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:26:20 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1144>. 05/27/24 11:26:20 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1144> 05/27/24 11:26:20 DC_AUTHENTICATE: received following ClassAd: User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" Integrity = "NO" CurrentTime = time() AuthCommand = 427 RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" Subsystem = "KBDD" Command = 427 SessionDuration = "86400" Encryption = "NO" Authentication = "NO" SessionLease = 3600 ValidCommands = "60002,60003,60011,60014,427" OutgoingNegotiation = "PREFERRED" CryptoMethods = "3DES,BLOWFISH" Enact = "YES" AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" 05/27/24 11:26:20 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>: 05/27/24 11:26:20 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 2864 AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:26:20 DC_AUTHENTICATE: Success. 05/27/24 11:26:20 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:26:23 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1146>. 05/27/24 11:26:23 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1146> 05/27/24 11:26:23 DC_AUTHENTICATE: received following ClassAd: Enact = "YES" User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" CryptoMethods = "3DES,BLOWFISH" OutgoingNegotiation = "PREFERRED" SessionDuration = "86400" ValidCommands = "60002,60003,60011,60014,427" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" CurrentTime = time() ServerCommandSock = "<192.168.1.157:4983>" AuthCommand = 427 Integrity = "NO" Command = 427 Subsystem = "KBDD" Sid = "wxp-sp2-64-01:2076:1716801873:0" AuthMethods = "NTSSPI" Encryption = "NO" Authentication = "NO" SessionLease = 3600 05/27/24 11:26:23 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>: 05/27/24 11:26:23 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 1520 AuthMethods = "NTSSPI" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Sid = "wxp-sp2-64-01:2076:1716801873:0" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:4983>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:26:23 DC_AUTHENTICATE: Success. 05/27/24 11:26:23 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:26:25 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1148>. 05/27/24 11:26:25 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1148> 05/27/24 11:26:25 DC_AUTHENTICATE: received following ClassAd: User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" Integrity = "NO" CurrentTime = time() AuthCommand = 427 RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" Subsystem = "KBDD" Command = 427 SessionDuration = "86400" Encryption = "NO" Authentication = "NO" SessionLease = 3600 ValidCommands = "60002,60003,60011,60014,427" OutgoingNegotiation = "PREFERRED" CryptoMethods = "3DES,BLOWFISH" Enact = "YES" AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" 05/27/24 11:26:25 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>: 05/27/24 11:26:25 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 2864 AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:26:25 DC_AUTHENTICATE: Success. 05/27/24 11:26:25 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:26:28 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1150>. 05/27/24 11:26:28 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1150> 05/27/24 11:26:28 DC_AUTHENTICATE: received following ClassAd: Enact = "YES" User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" CryptoMethods = "3DES,BLOWFISH" OutgoingNegotiation = "PREFERRED" SessionDuration = "86400" ValidCommands = "60002,60003,60011,60014,427" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" CurrentTime = time() ServerCommandSock = "<192.168.1.157:4983>" AuthCommand = 427 Integrity = "NO" Command = 427 Subsystem = "KBDD" Sid = "wxp-sp2-64-01:2076:1716801873:0" AuthMethods = "NTSSPI" Encryption = "NO" Authentication = "NO" SessionLease = 3600 05/27/24 11:26:28 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>: 05/27/24 11:26:28 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 1520 AuthMethods = "NTSSPI" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Sid = "wxp-sp2-64-01:2076:1716801873:0" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:4983>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:26:28 DC_AUTHENTICATE: Success. 05/27/24 11:26:28 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:26:30 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1153>. 05/27/24 11:26:30 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1153> 05/27/24 11:26:30 DC_AUTHENTICATE: received following ClassAd: User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" Integrity = "NO" CurrentTime = time() AuthCommand = 427 RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" Subsystem = "KBDD" Command = 427 SessionDuration = "86400" Encryption = "NO" Authentication = "NO" SessionLease = 3600 ValidCommands = "60002,60003,60011,60014,427" OutgoingNegotiation = "PREFERRED" CryptoMethods = "3DES,BLOWFISH" Enact = "YES" AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" 05/27/24 11:26:30 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>: 05/27/24 11:26:30 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 2864 AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:26:30 DC_AUTHENTICATE: Success. 05/27/24 11:26:30 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:27:07 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.30:63662> 05/27/24 11:27:07 DC_AUTHENTICATE: received following ClassAd: Sid = "<192.168.1.157:4982>#1716801868#1" RemoteVersion = "$CondorVersion: 23.0.4 2024-02-08 BuildID: 712251 $" CryptoMethods = "AES" UseSession = "YES" ServerCommandSock = "<192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5572_3636>" ResumeResponse = false Nonce = "Y4iIHXaZpK8/nYfF0YoI+1rZ9IEOFN4OxO+xPZcW7qUx" ConnectSinful = "<192.168.1.157:4982>" Command = 442 CurrentTime = time() 05/27/24 11:27:07 DC_AUTHENTICATE: attempt to open invalid session <192.168.1.157:4982>#1716801868#1, failing; this session was requested by <192.168.1.30:63662> with return address <192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5572_3636> 05/27/24 11:27:07 SECMAN: command 60014 DC_INVALIDATE_KEY to daemon at <192.168.1.30:9618> from TCP port 1159 (non-blocking, raw). 05/27/24 11:27:07 SECMAN: waiting for TCP connection to daemon at <192.168.1.30:9618>. 05/27/24 11:27:07 SECMAN: resuming command 60014 DC_INVALIDATE_KEY to daemon at <192.168.1.30:9618> from TCP port 1159 (non-blocking, raw). 05/27/24 11:27:07 SECMAN: no cached key for {<192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5572_3636>,<60014>}. 05/27/24 11:27:07 SECMAN: Security Policy: NewSession = "YES" SessionDuration = "86400" ServerPid = 2076 Enact = "NO" OutgoingNegotiation = "NEVER" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Encryption = "NEVER" SessionLease = 3600 Authentication = "NEVER" Integrity = "NEVER" AuthMethods = "NTSSPI,KERBEROS" Subsystem = "STARTD" CryptoMethods = "3DES,BLOWFISH" CurrentTime = time() 05/27/24 11:27:07 SECMAN: not negotiating, just sending command (60014) 05/27/24 11:27:07 Authorizing server 'unauthenticated@unmapped/192.168.1.30'. 05/27/24 11:27:07 Completed DC_INVALIDATE_KEY to daemon at <192.168.1.30:9618> 05/27/24 11:27:27 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.30:63671> 05/27/24 11:27:27 DC_AUTHENTICATE: received following ClassAd: Sid = "<192.168.1.157:4982>#1716801868#1" RemoteVersion = "$CondorVersion: 23.0.4 2024-02-08 BuildID: 712251 $" CryptoMethods = "AES" UseSession = "YES" ServerCommandSock = "<192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5572_3636>" ResumeResponse = false Nonce = "fT9JzIqQFeVkZC649CHWy/AkgT/2aYjxGtHhCAaZEE30" ConnectSinful = "<192.168.1.157:4982>" Command = 442 CurrentTime = time() 05/27/24 11:27:27 DC_AUTHENTICATE: attempt to open invalid session <192.168.1.157:4982>#1716801868#1, failing; this session was requested by <192.168.1.30:63671> with return address <192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5572_3636> 05/27/24 11:27:27 SECMAN: command 60014 DC_INVALIDATE_KEY to daemon at <192.168.1.30:9618> from TCP port 1162 (non-blocking, raw). 05/27/24 11:27:27 SECMAN: waiting for TCP connection to daemon at <192.168.1.30:9618>. 05/27/24 11:27:27 SECMAN: resuming command 60014 DC_INVALIDATE_KEY to daemon at <192.168.1.30:9618> from TCP port 1162 (non-blocking, raw). 05/27/24 11:27:27 SECMAN: no cached key for {<192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5572_3636>,<60014>}. 05/27/24 11:27:27 SECMAN: Security Policy: NewSession = "YES" SessionDuration = "86400" ServerPid = 2076 Enact = "NO" OutgoingNegotiation = "NEVER" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Encryption = "NEVER" SessionLease = 3600 Authentication = "NEVER" Integrity = "NEVER" AuthMethods = "NTSSPI,KERBEROS" Subsystem = "STARTD" CryptoMethods = "3DES,BLOWFISH" CurrentTime = time() 05/27/24 11:27:27 SECMAN: not negotiating, just sending command (60014) 05/27/24 11:27:27 Authorizing server 'unauthenticated@unmapped/192.168.1.30'. 05/27/24 11:27:27 Completed DC_INVALIDATE_KEY to daemon at <192.168.1.30:9618> 05/27/24 11:27:47 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.30:63679> 05/27/24 11:27:47 DC_AUTHENTICATE: received following ClassAd: Sid = "<192.168.1.157:4982>#1716801868#1" RemoteVersion = "$CondorVersion: 23.0.4 2024-02-08 BuildID: 712251 $" CryptoMethods = "AES" UseSession = "YES" ServerCommandSock = "<192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5572_3636>" ResumeResponse = false Nonce = "6KN/mxyKbhL7EYUKfrbqy1fGl/NIQTDW3B5apBvKvkFA" ConnectSinful = "<192.168.1.157:4982>" Command = 442 CurrentTime = time() 05/27/24 11:27:47 DC_AUTHENTICATE: attempt to open invalid session <192.168.1.157:4982>#1716801868#1, failing; this session was requested by <192.168.1.30:63679> with return address <192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5572_3636> 05/27/24 11:27:47 SECMAN: command 60014 DC_INVALIDATE_KEY to daemon at <192.168.1.30:9618> from TCP port 1166 (non-blocking, raw). 05/27/24 11:27:47 SECMAN: waiting for TCP connection to daemon at <192.168.1.30:9618>. 05/27/24 11:27:47 SECMAN: resuming command 60014 DC_INVALIDATE_KEY to daemon at <192.168.1.30:9618> from TCP port 1166 (non-blocking, raw). 05/27/24 11:27:47 SECMAN: no cached key for {<192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5572_3636>,<60014>}. 05/27/24 11:27:47 SECMAN: Security Policy: NewSession = "YES" SessionDuration = "86400" ServerPid = 2076 Enact = "NO" OutgoingNegotiation = "NEVER" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Encryption = "NEVER" SessionLease = 3600 Authentication = "NEVER" Integrity = "NEVER" AuthMethods = "NTSSPI,KERBEROS" Subsystem = "STARTD" CryptoMethods = "3DES,BLOWFISH" CurrentTime = time() 05/27/24 11:27:47 SECMAN: not negotiating, just sending command (60014) 05/27/24 11:27:47 Authorizing server 'unauthenticated@unmapped/192.168.1.30'. 05/27/24 11:27:47 Completed DC_INVALIDATE_KEY to daemon at <192.168.1.30:9618> 05/27/24 11:28:07 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.30:63690> 05/27/24 11:28:07 DC_AUTHENTICATE: received following ClassAd: Sid = "<192.168.1.157:4982>#1716801868#1" RemoteVersion = "$CondorVersion: 23.0.4 2024-02-08 BuildID: 712251 $" CryptoMethods = "AES" UseSession = "YES" ServerCommandSock = "<192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5572_3636>" ResumeResponse = false Nonce = "rGO1tbWJpWS5fFaYkfFL6zt98WsdX4qOp6f3FRX9tEdP" ConnectSinful = "<192.168.1.157:4982>" Command = 442 CurrentTime = time() 05/27/24 11:28:07 DC_AUTHENTICATE: attempt to open invalid session <192.168.1.157:4982>#1716801868#1, failing; this session was requested by <192.168.1.30:63690> with return address <192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5572_3636> 05/27/24 11:28:07 SECMAN: command 60014 DC_INVALIDATE_KEY to daemon at <192.168.1.30:9618> from TCP port 1168 (non-blocking, raw). 05/27/24 11:28:07 SECMAN: waiting for TCP connection to daemon at <192.168.1.30:9618>. 05/27/24 11:28:07 SECMAN: resuming command 60014 DC_INVALIDATE_KEY to daemon at <192.168.1.30:9618> from TCP port 1168 (non-blocking, raw). 05/27/24 11:28:07 SECMAN: no cached key for {<192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5572_3636>,<60014>}. 05/27/24 11:28:07 SECMAN: Security Policy: NewSession = "YES" SessionDuration = "86400" ServerPid = 2076 Enact = "NO" OutgoingNegotiation = "NEVER" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Encryption = "NEVER" SessionLease = 3600 Authentication = "NEVER" Integrity = "NEVER" AuthMethods = "NTSSPI,KERBEROS" Subsystem = "STARTD" CryptoMethods = "3DES,BLOWFISH" CurrentTime = time() 05/27/24 11:28:07 SECMAN: not negotiating, just sending command (60014) 05/27/24 11:28:07 Authorizing server 'unauthenticated@unmapped/192.168.1.30'. 05/27/24 11:28:07 Completed DC_INVALIDATE_KEY to daemon at <192.168.1.30:9618> 05/27/24 11:28:15 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1171>. 05/27/24 11:28:15 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1171> 05/27/24 11:28:15 DC_AUTHENTICATE: received following ClassAd: User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" Integrity = "NO" CurrentTime = time() AuthCommand = 427 RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" Subsystem = "KBDD" Command = 427 SessionDuration = "86400" Encryption = "NO" Authentication = "NO" SessionLease = 3600 ValidCommands = "60002,60003,60011,60014,427" OutgoingNegotiation = "PREFERRED" CryptoMethods = "3DES,BLOWFISH" Enact = "YES" AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" 05/27/24 11:28:15 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>: 05/27/24 11:28:15 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 2864 AuthMethods = "NTSSPI" Sid = "wxp-sp2-64-01:2076:1716801885:1" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:1155>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:28:15 DC_AUTHENTICATE: Success. 05/27/24 11:28:15 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 05/27/24 11:28:18 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1173>. 05/27/24 11:28:18 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1173> 05/27/24 11:28:18 DC_AUTHENTICATE: received following ClassAd: Enact = "YES" User = "unauthenticated@unmapped" AuthMethodsList = "NTSSPI,KERBEROS" MyRemoteUserName = "unauthenticated@unmapped" UseSession = "YES" CryptoMethods = "3DES,BLOWFISH" OutgoingNegotiation = "PREFERRED" SessionDuration = "86400" ValidCommands = "60002,60003,60011,60014,427" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" CurrentTime = time() ServerCommandSock = "<192.168.1.157:4983>" AuthCommand = 427 Integrity = "NO" Command = 427 Subsystem = "KBDD" Sid = "wxp-sp2-64-01:2076:1716801873:0" AuthMethods = "NTSSPI" Encryption = "NO" Authentication = "NO" SessionLease = 3600 05/27/24 11:28:18 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>: 05/27/24 11:28:18 DC_AUTHENTICATE: Cached Session: Enact = "YES" Encryption = "NO" Integrity = "NO" AuthMethodsList = "NTSSPI,KERBEROS" ServerPid = 1520 AuthMethods = "NTSSPI" ParentUniqueID = "wxp-sp2-64-01:2980:1716801866" Sid = "wxp-sp2-64-01:2076:1716801873:0" Subsystem = "KBDD" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "86400" SessionLease = 3600 Authentication = "NO" RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $" ServerCommandSock = "<192.168.1.157:4983>" CurrentTime = time() User = "unauthenticated@unmapped" ValidCommands = "60002,60003,60011,60014,427" 05/27/24 11:28:18 DC_AUTHENTICATE: Success. 05/27/24 11:28:18 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: