[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [HTCondor-users] Condor 8.0.4 & 23.0.4 compatibility



Hi Joe

 

I set STARTD_DEBUG = D_SECURITY:2, restarted condor and submitted a new job for that executor.

I attached the StartLog from when condor was restarted + ~3min.

 

Regards,

Pascal

 

From: HTCondor-users <htcondor-users-bounces@xxxxxxxxxxx> On Behalf Of Joe Reuss via HTCondor-users
Sent: Thursday, 23 May 2024 23:21
To: HTCondor-Users Mail List <htcondor-users@xxxxxxxxxxx>
Cc: Joe Reuss <jrreuss@xxxxxxxx>
Subject: Re: [HTCondor-users] Condor 8.0.4 & 23.0.4 compatibility

 

Hi Pascal,

 

Can you set D_SECURITY:2 for STARTD_DEBUG and send us the Start log for that and we can get a lot more information on what is happening. It seems like some security issues are happening with this large of a version difference.

 

Thanks,

Joe Reuss


From: HTCondor-users <htcondor-users-bounces@xxxxxxxxxxx> on behalf of Pascal Schweizer via HTCondor-users <htcondor-users@xxxxxxxxxxx>
Sent: Wednesday, May 22, 2024 4:40 AM
To: htcondor-users@xxxxxxxxxxx <htcondor-users@xxxxxxxxxxx>
Cc: Pascal Schweizer <schweizer@xxxxxxxxxxxxxxx>
Subject: [HTCondor-users] Condor 8.0.4 & 23.0.4 compatibility

 

Hi

 

We have a submitter node running Condor 23.0.4 and are trying to run jobs on an old Windows XP machine running Condor 8.0.4 (please donât ask why).

Weâre using 8.0.4 because thatâs the most recent binary that we managed to get running on the Windows XP machine. Other executor nodes in the pool are running Condor 8.8 or newer without any problems.

 

Our problem with the 8.0.4 machine is that itâs not running any jobs, even though they match. The machine is listed when using condor_status and commands like condor_restart also work. But when submitting a job for that specific machine, it doesnât get picked up.

As a general question: Are Condor 8.0.4 and 23.0.4 compatible and this setup should theoretically work if configured correctly?

 

Here are some logs/errors we see every few minutes (negotiation cycle) after submitting a job for this machine.

It looks like a communication/authentication error. Does anyone know what could be causing those?

Security wise, weâre using a very basic config that shouldnât cause any problems:

  use SECURITY : HOST_BASED

  ALLOW_READ = *

  ALLOW_WRITE = *

  ALLOW_ADMINISTRATOR = *

 

--- Executor Logs ---

StartLog:

    DC_AUTHENTICATE: attempt to open invalid session <192.168.1.157:1076>#1716304270#1, failing; this session was requested by <192.168.1.30:64664> with return address <192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5816_9e76>

 

NegotiatorLog:

  ---------- Started Negotiation Cycle ----------

  Phase 1:  Obtaining ads from collector ...

    Getting Scheduler, Submitter and Machine ads ...

  condor_read() failed: recv(fd=448) returned -1, errno = 10054 , reading 5 bytes from collector at <192.168.1.30:9618>.

  IO: Failed to read packet header

  Couldn't fetch ads: communication error

  Aborting negotiation cycle

  ---------- Started Negotiation Cycle ----------

  Phase 1:  Obtaining ads from collector ...

    Getting Scheduler, Submitter and Machine ads ...

    Sorting 37 ads ...

    Getting startd private ads ...

  condor_write(): Socket closed when trying to write 87 bytes to collector at <192.168.1.30:9618>, fd is 580

  Buf::write(): condor_write() failed

  Couldn't fetch ads: communication error

  Aborting negotiation cycle

 

--- Submitter Logs ---

SchedLog:

  (pid:6336) Negotiating for owner: a@submitter

  (pid:6336) condor_read(): Socket closed abnormally when trying to read 5 bytes from startd slot1@executor <192.168.1.157:1587> for p, errno=10054

  (pid:6336) Response problem from startd when requesting claim slot1@executor <192.168.1.157:1587> for p 2071.0.

  (pid:6336) Failed to send REQUEST_CLAIM to startd slot1@executor <192.168.1.157:1587> for p: CEDAR:6004:failed reading from socket

  (pid:6336) Match record (slot1@executor <192.168.1.157:1587> for p, 2071.0) deleted

 

NegotiatorLog:

  ---------- Started Negotiation Cycle ----------

  Phase 1:  Obtaining ads from collector ...

  Not considering preemption, therefore constraining idle machines with ifThenElse((State == "Claimed"&&PartitionableSlot=!=true),"Name MyType State Activity StartdIpAddr AccountingGroup Owner RemoteUser Requirements SlotWeight ConcurrencyLimits","")

    Getting startd private ads ...

    Getting Scheduler, Submitter and Machine ads ...

    Sorting 19 ads ...

  Got ads: 19 public and 17 private

  Public ads include 2 submitter, 17 startd

  Phase 2:  Performing accounting ...

  Phase 3:  Sorting submitter ads by priority ...

  Starting prefetch round; 2 potential prefetches to do.

  Starting prefetch negotiation for p@submitter.

      Got NO_MORE_JOBS;  schedd has no more requests

  Starting prefetch negotiation for a@submitter.

      Got NO_MORE_JOBS;  schedd has no more requests

  Prefetch summary: 2 attempted, 2 successful.

  Phase 4.1:  Negotiating with schedds ...

    Negotiating with p@submitter at <192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5816_9e76>

  0 seconds so far for this submitter

  0 seconds so far for this schedd

      Request 02071.00000: autocluster 487 (request count 1 of 15)

        Matched 2071.0 p@submitter <192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5816_9e76> preempting none <192.168.1.157:1587> slot1@executor

        Successfully matched with slot1@executor

      Request 02071.00000: autocluster 487 (request count 2 of 15)

        Rejected 2071.0 p@submitter <192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5816_9e76>: no match found

    Negotiating with a@submitter at <192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5816_9e76>

  0 seconds so far for this submitter

  0 seconds so far for this schedd

      Reached submitter resource limit: 0.000000 ... stopping               <------- donât think this has anything to do with this problem, but weâre not seeing this line for jobs submitted for other nodes and donât know what it means

  Starting prefetch round; 1 potential prefetches to do.

  Starting prefetch negotiation for a@submitter.

      Got NO_MORE_JOBS;  schedd has no more requests

  Prefetch summary: 1 attempted, 1 successful.

  Phase 4.2:  Negotiating with schedds ...

    Negotiating with a@submitter at <192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5816_9e76>

  0 seconds so far for this submitter

  0 seconds so far for this schedd

      Request 02069.00624: autocluster 1 (request count 1 of 142)

        Rejected 2069.624 a@submitter <192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5816_9e76>: no match found

   negotiateWithGroup resources used submitterAds length 0

  ---------- Finished Negotiation Cycle ----------

 

Regards,

Pascal

05/27/24 11:24:26 Got SIGTERM. Performing graceful shutdown.
05/27/24 11:24:26 shutdown graceful
05/27/24 11:24:26 Cron: Killing all jobs
05/27/24 11:24:26 Cron: Killing all jobs
05/27/24 11:24:26 Killing job mips
05/27/24 11:24:26 Killing job kflops
05/27/24 11:24:26 Deleting cron job manager
05/27/24 11:24:26 Cron: Killing all jobs
05/27/24 11:24:26 Cron: Killing all jobs
05/27/24 11:24:26 CronJobList: Deleting all jobs
05/27/24 11:24:26 Cron: Killing all jobs
05/27/24 11:24:26 CronJobList: Deleting all jobs
05/27/24 11:24:26 Deleting benchmark job mgr
05/27/24 11:24:26 Cron: Killing all jobs
05/27/24 11:24:26 Killing job mips
05/27/24 11:24:26 Killing job kflops
05/27/24 11:24:26 Cron: Killing all jobs
05/27/24 11:24:26 Killing job mips
05/27/24 11:24:26 Killing job kflops
05/27/24 11:24:26 CronJobList: Deleting all jobs
05/27/24 11:24:26 CronJobList: Deleting job 'mips'
05/27/24 11:24:26 CronJob: Deleting job 'mips' (C:\condor/bin/condor_mips.exe), timer -1
05/27/24 11:24:26 CronJobList: Deleting job 'kflops'
05/27/24 11:24:26 CronJob: Deleting job 'kflops' (C:\condor/bin/condor_kflops.exe), timer -1
05/27/24 11:24:26 Cron: Killing all jobs
05/27/24 11:24:26 CronJobList: Deleting all jobs
05/27/24 11:24:26 All resources are free, exiting.
05/27/24 11:24:26 **** condor_startd.exe (condor_STARTD) pid 1868 EXITING WITH STATUS 0
05/27/24 11:24:28 KEYCACHE: created: 02748FB8
05/27/24 11:24:28 ******************************************************
05/27/24 11:24:28 ** condor_startd.exe (CONDOR_STARTD) STARTING UP
05/27/24 11:24:28 ** C:\condor\bin\condor_startd.exe
05/27/24 11:24:28 ** SubsystemInfo: name=STARTD type=STARTD(7) class=DAEMON(1)
05/27/24 11:24:28 ** Configuration: subsystem:STARTD local:<NONE> class:DAEMON
05/27/24 11:24:28 ** $CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $
05/27/24 11:24:28 ** $CondorPlatform: x86_64_Windows7 $
05/27/24 11:24:28 ** PID = 2076
05/27/24 11:24:28 ** Log last touched 5/27 11:24:26
05/27/24 11:24:28 ******************************************************
05/27/24 11:24:28 Using config source: \submitter\config\condor_XPwin32.conf
05/27/24 11:24:28 Using local config sources: 
05/27/24 11:24:28    \submitter\config\local_condor-wxp-sp2-64-01.conf
05/27/24 11:24:28 SECMAN: created non-negotiated security session 499ce3d049917b6ac23c248369676fa1472bbdd0301377a7 for 0 (inf) seconds.
05/27/24 11:24:28 Imported session attributes: [CryptoMethods="3DES";Encryption="NO";Integrity="NO";CurrentTime=time();]
05/27/24 11:24:28 Caching non-negotiated security session ad:
User = "condor@parent"
SessionDuration = "86400"
TriedAuthentication = true
ServerPid = 2076
Enact = "YES"
CryptoMethods = "3DES"
OutgoingNegotiation = "REQUIRED"
Sid = "499ce3d049917b6ac23c248369676fa1472bbdd0301377a7"
AuthMethods = "NTSSPI,KERBEROS"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Encryption = "NO"
SessionLease = 3600
Authentication = "NO"
UseSession = "YES"
Integrity = "NO"
Subsystem = "STARTD"
CurrentTime = time()
05/27/24 11:24:28 IpVerify::PunchHole: opened DAEMON level to condor@parent
05/27/24 11:24:28 IpVerify::PunchHole: opened WRITE level to condor@parent
05/27/24 11:24:28 IpVerify::PunchHole: opened READ level to condor@parent
05/27/24 11:24:28 IpVerify::PunchHole: open count at level READ for condor@parent now 2
05/27/24 11:24:28 DaemonCore: command socket at <192.168.1.157:4982>
05/27/24 11:24:28 DaemonCore: private command socket at <192.168.1.157:4982>
05/27/24 11:24:28 VM-gahp server reported an internal error
05/27/24 11:24:28 VM universe will be tested to check if it is available
05/27/24 11:24:28 History file rotation is enabled.
05/27/24 11:24:28   Maximum history file size is: 20971520 bytes
05/27/24 11:24:28   Number of rotated history files is: 2
slot type 1: Cpus: 8, Memory: auto, Swap: auto, Disk: auto
slot type 1: Cpus: 8, Memory: 8191, Swap: 100.00%, Disk: 100.00%
05/27/24 11:24:28 slot1: New machine resource of type 1 allocated
05/27/24 11:24:33 CronJobList: Adding job 'mips'
05/27/24 11:24:33 CronJobList: Adding job 'kflops'
05/27/24 11:24:33 CronJob: Initializing job 'mips' (C:\condor/bin/condor_mips.exe)
05/27/24 11:24:33 CronJob: Initializing job 'kflops' (C:\condor/bin/condor_kflops.exe)
05/27/24 11:24:33 slot1: State change: IS_OWNER is false
05/27/24 11:24:33 slot1: Changing state: Owner -> Unclaimed
05/27/24 11:24:33 State change: RunBenchmarks is TRUE
05/27/24 11:24:33 slot1: Changing activity: Idle -> Benchmarking
05/27/24 11:24:33 BenchMgr:StartBenchmarks()
05/27/24 11:24:33 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1038>
05/27/24 11:24:33 DC_AUTHENTICATE: received following ClassAd:
Subsystem = "KBDD"
Command = 60010
Authentication = "OPTIONAL"
SessionLease = 3600
Encryption = "OPTIONAL"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
AuthMethods = "NTSSPI,KERBEROS"
Enact = "NO"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
CurrentTime = time()
ServerCommandSock = "<192.168.1.157:4983>"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
AuthCommand = 427
ServerPid = 1520
SessionDuration = "86400"
Integrity = "OPTIONAL"
NewSession = "YES"
05/27/24 11:24:33 DC_AUTHENTICATE: our_policy:
SessionDuration = "86400"
ServerPid = 2076
Enact = "NO"
OutgoingNegotiation = "PREFERRED"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Encryption = "OPTIONAL"
SessionLease = 3600
Authentication = "OPTIONAL"
Integrity = "OPTIONAL"
AuthMethods = "NTSSPI,KERBEROS"
Subsystem = "STARTD"
CryptoMethods = "3DES,BLOWFISH"
CurrentTime = time()
05/27/24 11:24:33 DC_AUTHENTICATE: the_policy:
SessionLease = 3600
SessionDuration = "86400"
CryptoMethods = "3DES,BLOWFISH"
AuthMethods = "NTSSPI"
AuthMethodsList = "NTSSPI,KERBEROS"
Integrity = "NO"
Encryption = "NO"
Authentication = "NO"
Enact = "YES"
CurrentTime = time()
05/27/24 11:24:33 SECMAN: Sending following response ClassAd:
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
Authentication = "NO"
SessionLease = 3600
SessionDuration = "86400"
CryptoMethods = "3DES,BLOWFISH"
AuthMethods = "NTSSPI"
AuthMethodsList = "NTSSPI,KERBEROS"
Integrity = "NO"
Encryption = "NO"
Enact = "YES"
CurrentTime = time()
05/27/24 11:24:33 DC_AUTHENTICATE: not authenticating.
05/27/24 11:24:33 DC_AUTHENTICATE: sending session ad:
ValidCommands = "60002,60003,60011,60014,427"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
User = "unauthenticated@unmapped"
CurrentTime = time()
05/27/24 11:24:33 DC_AUTHENTICATE: sent session wxp-sp2-64-01:2076:1716801873:0 info!
05/27/24 11:24:33 DC_AUTHENTICATE: added incoming session id wxp-sp2-64-01:2076:1716801873:0 to cache for 86420 seconds (lease is 3620s, return address is <192.168.1.157:4983>).
ValidCommands = "60002,60003,60011,60014,427"
User = "unauthenticated@unmapped"
CurrentTime = time()
ServerCommandSock = "<192.168.1.157:4983>"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
Authentication = "NO"
SessionLease = 3600
SessionDuration = "86400"
CryptoMethods = "3DES,BLOWFISH"
Subsystem = "KBDD"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
AuthMethods = "NTSSPI"
ServerPid = 1520
AuthMethodsList = "NTSSPI,KERBEROS"
Integrity = "NO"
Encryption = "NO"
Enact = "YES"
05/27/24 11:24:33 SECMAN: command 60008 DC_CHILDALIVE to daemon at <192.168.1.157:4971> from TCP port 1043 (blocking).
05/27/24 11:24:33 SECMAN: no cached key for {<192.168.1.157:4971>,<60008>}.
05/27/24 11:24:33 SECMAN: Security Policy:
NewSession = "YES"
SessionDuration = "86400"
ServerPid = 2076
Enact = "NO"
OutgoingNegotiation = "PREFERRED"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Encryption = "OPTIONAL"
SessionLease = 3600
Authentication = "OPTIONAL"
Integrity = "OPTIONAL"
AuthMethods = "NTSSPI,KERBEROS"
Subsystem = "STARTD"
CryptoMethods = "3DES,BLOWFISH"
CurrentTime = time()
05/27/24 11:24:33 SECMAN: negotiating security for command 60008.
05/27/24 11:24:33 SECMAN: sending DC_AUTHENTICATE command
05/27/24 11:24:33 SECMAN: sending following classad:
CurrentTime = time()
ServerCommandSock = "<192.168.1.157:4982>"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
NewSession = "YES"
SessionDuration = "86400"
ServerPid = 2076
Enact = "NO"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
AuthMethods = "NTSSPI,KERBEROS"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Encryption = "OPTIONAL"
SessionLease = 3600
Authentication = "OPTIONAL"
Integrity = "OPTIONAL"
Command = 60008
Subsystem = "STARTD"
05/27/24 11:24:33 SECMAN: server responded with:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
AuthMethods = "NTSSPI"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
Authentication = "NO"
SessionLease = 3600
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
CurrentTime = time()
05/27/24 11:24:33 SECMAN: received post-auth classad:
User = "unauthenticated@unmapped"
Sid = "wxp-sp2-64-01:2980:1716801873:3"
ValidCommands = "60000,60008,60017,60026,60004,60012,60021,60007,60020,457"
CurrentTime = time()
05/27/24 11:24:33 SECMAN: policy to be cached:
User = "unauthenticated@unmapped"
ValidCommands = "60000,60008,60017,60026,60004,60012,60021,60007,60020,457"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
AuthMethodsList = "NTSSPI,KERBEROS"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
CurrentTime = time()
SessionDuration = "86400"
Enact = "YES"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
Sid = "wxp-sp2-64-01:2980:1716801873:3"
AuthMethods = "NTSSPI"
Encryption = "NO"
SessionLease = 3600
Authentication = "NO"
Integrity = "NO"
Command = 60008
Subsystem = "STARTD"
05/27/24 11:24:33 SECMAN: added session wxp-sp2-64-01:2980:1716801873:3 to cache for 86400 seconds (3600s lease).
05/27/24 11:24:33 SECMAN: command {<192.168.1.157:4971>,<60000>} mapped to session wxp-sp2-64-01:2980:1716801873:3.
05/27/24 11:24:33 SECMAN: command {<192.168.1.157:4971>,<60008>} mapped to session wxp-sp2-64-01:2980:1716801873:3.
05/27/24 11:24:33 SECMAN: command {<192.168.1.157:4971>,<60017>} mapped to session wxp-sp2-64-01:2980:1716801873:3.
05/27/24 11:24:33 SECMAN: command {<192.168.1.157:4971>,<60026>} mapped to session wxp-sp2-64-01:2980:1716801873:3.
05/27/24 11:24:33 SECMAN: command {<192.168.1.157:4971>,<60004>} mapped to session wxp-sp2-64-01:2980:1716801873:3.
05/27/24 11:24:33 SECMAN: command {<192.168.1.157:4971>,<60012>} mapped to session wxp-sp2-64-01:2980:1716801873:3.
05/27/24 11:24:33 SECMAN: command {<192.168.1.157:4971>,<60021>} mapped to session wxp-sp2-64-01:2980:1716801873:3.
05/27/24 11:24:33 SECMAN: command {<192.168.1.157:4971>,<60007>} mapped to session wxp-sp2-64-01:2980:1716801873:3.
05/27/24 11:24:33 SECMAN: command {<192.168.1.157:4971>,<60020>} mapped to session wxp-sp2-64-01:2980:1716801873:3.
05/27/24 11:24:33 SECMAN: command {<192.168.1.157:4971>,<457>} mapped to session wxp-sp2-64-01:2980:1716801873:3.
05/27/24 11:24:33 SECMAN: startCommand succeeded.
05/27/24 11:24:33 Authorizing server 'unauthenticated@unmapped/192.168.1.157'.
05/27/24 11:24:33 IPVERIFY: Subsystem STARTD
05/27/24 11:24:33 IPVERIFY: Permission ALLOW
05/27/24 11:24:33 IPVERIFY: Subsystem STARTD
05/27/24 11:24:33 IPVERIFY: Permission READ
05/27/24 11:24:33 IPVERIFY: allow READ: *,  (from config value ALLOW_READ_STARTD)
05/27/24 11:24:33 IPVERIFY: Subsystem STARTD
05/27/24 11:24:33 IPVERIFY: Permission WRITE
05/27/24 11:24:33 IPVERIFY: allow WRITE: *,  (from config value ALLOW_WRITE_STARTD)
05/27/24 11:24:33 IPVERIFY: Subsystem STARTD
05/27/24 11:24:33 IPVERIFY: Permission NEGOTIATOR
05/27/24 11:24:33 IPVERIFY: allow NEGOTIATOR: submitter, 192.168.1.157 (from config value ALLOW_NEGOTIATOR)
05/27/24 11:24:33 IPVERIFY: Subsystem STARTD
05/27/24 11:24:33 IPVERIFY: Permission ADMINISTRATOR
05/27/24 11:24:33 IPVERIFY: allow ADMINISTRATOR: * (from config value ALLOW_ADMINISTRATOR)
05/27/24 11:24:33 ipverify: ADMINISTRATOR optimized to allow anyone
05/27/24 11:24:33 IPVERIFY: Subsystem STARTD
05/27/24 11:24:33 IPVERIFY: Permission OWNER
05/27/24 11:24:33 IPVERIFY: allow OWNER: executor, * (from config value ALLOW_OWNER)
05/27/24 11:24:33 IPVERIFY: Subsystem STARTD
05/27/24 11:24:33 IPVERIFY: Permission CONFIG
05/27/24 11:24:33 ipverify: CONFIG optimized to deny everyone
05/27/24 11:24:33 IPVERIFY: Subsystem STARTD
05/27/24 11:24:33 IPVERIFY: Permission DAEMON
05/27/24 11:24:33 IPVERIFY: allow DAEMON: * (from config value ALLOW_DAEMON)
05/27/24 11:24:33 ipverify: DAEMON optimized to allow anyone
05/27/24 11:24:33 IPVERIFY: Subsystem STARTD
05/27/24 11:24:33 IPVERIFY: Permission SOAP
05/27/24 11:24:33 ipverify: SOAP optimized to allow anyone
05/27/24 11:24:33 IPVERIFY: Subsystem STARTD
05/27/24 11:24:33 IPVERIFY: Permission DEFAULT
05/27/24 11:24:33 ipverify: DEFAULT optimized to allow anyone
05/27/24 11:24:33 IPVERIFY: Subsystem STARTD
05/27/24 11:24:33 IPVERIFY: Permission CLIENT
05/27/24 11:24:33 ipverify: CLIENT optimized to allow anyone
05/27/24 11:24:33 IPVERIFY: Subsystem STARTD
05/27/24 11:24:33 IPVERIFY: Permission ADVERTISE_STARTD
05/27/24 11:24:33 IPVERIFY: allow ADVERTISE_STARTD: * (from config value ALLOW_DAEMON)
05/27/24 11:24:33 ipverify: ADVERTISE_STARTD optimized to allow anyone
05/27/24 11:24:33 IPVERIFY: Subsystem STARTD
05/27/24 11:24:33 IPVERIFY: Permission ADVERTISE_SCHEDD
05/27/24 11:24:33 IPVERIFY: allow ADVERTISE_SCHEDD: * (from config value ALLOW_DAEMON)
05/27/24 11:24:33 ipverify: ADVERTISE_SCHEDD optimized to allow anyone
05/27/24 11:24:33 IPVERIFY: Subsystem STARTD
05/27/24 11:24:33 IPVERIFY: Permission ADVERTISE_MASTER
05/27/24 11:24:33 IPVERIFY: allow ADVERTISE_MASTER: * (from config value ALLOW_DAEMON)
05/27/24 11:24:33 ipverify: ADVERTISE_MASTER optimized to allow anyone
05/27/24 11:24:33 Initialized the following authorization table:
05/27/24 11:24:33 Authorizations yet to be resolved:
05/27/24 11:24:33 allow READ:  */*
05/27/24 11:24:33 allow WRITE:  */*
05/27/24 11:24:33 allow NEGOTIATOR:  */192.168.1.30 */192.168.1.157 */submitter
05/27/24 11:24:33 allow OWNER:  */* */executor */192.168.1.157
05/27/24 11:24:33 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1037>.
05/27/24 11:24:33 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1037>
05/27/24 11:24:33 DC_AUTHENTICATE: received following ClassAd:
ValidCommands = "60002,60003,60011,60014,427"
Subsystem = "KBDD"
Command = 427
Integrity = "NO"
Authentication = "NO"
SessionLease = 3600
Encryption = "NO"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
AuthMethods = "NTSSPI"
OutgoingNegotiation = "PREFERRED"
CryptoMethods = "3DES,BLOWFISH"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 1520
MyRemoteUserName = "unauthenticated@unmapped"
SessionDuration = "86400"
UseSession = "YES"
Enact = "YES"
User = "unauthenticated@unmapped"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
AuthCommand = 427
ServerCommandSock = "<192.168.1.157:4983>"
CurrentTime = time()
05/27/24 11:24:33 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>:
05/27/24 11:24:33 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 1520
AuthMethods = "NTSSPI"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:4983>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:24:33 DC_AUTHENTICATE: Success.
05/27/24 11:24:33 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:24:37 SECMAN: command 0 UPDATE_STARTD_AD to collector submitter from UDP port 1048 (non-blocking).
05/27/24 11:24:37 SECMAN: no cached key for {<192.168.1.30:9618>,<0>}.
05/27/24 11:24:37 SECMAN: Security Policy:
SessionDuration = "86400"
ServerPid = 2076
Enact = "NO"
OutgoingNegotiation = "PREFERRED"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Encryption = "OPTIONAL"
SessionLease = 3600
Authentication = "OPTIONAL"
Integrity = "OPTIONAL"
AuthMethods = "NTSSPI,KERBEROS"
Subsystem = "STARTD"
CryptoMethods = "3DES,BLOWFISH"
CurrentTime = time()
05/27/24 11:24:37 SECMAN: negotiating security for command 0.
05/27/24 11:24:37 SECMAN: need to start a session via TCP
05/27/24 11:24:37 SECMAN: command 60010 UPDATE_STARTD_AD to <192.168.1.30:9618> from TCP port 1049 (non-blocking).
05/27/24 11:24:37 SECMAN: waiting for TCP connection to <192.168.1.30:9618>.
05/27/24 11:24:37 SECMAN: resuming command 60010 UPDATE_STARTD_AD to <192.168.1.30:9618> from TCP port 1049 (non-blocking).
05/27/24 11:24:37 SECMAN: no cached key for {<192.168.1.30:9618>,<60010>}.
05/27/24 11:24:37 SECMAN: Security Policy:
NewSession = "YES"
SessionDuration = "86400"
ServerPid = 2076
Enact = "NO"
OutgoingNegotiation = "PREFERRED"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Encryption = "OPTIONAL"
SessionLease = 3600
Authentication = "OPTIONAL"
Integrity = "OPTIONAL"
AuthMethods = "NTSSPI,KERBEROS"
Subsystem = "STARTD"
CryptoMethods = "3DES,BLOWFISH"
CurrentTime = time()
05/27/24 11:24:37 SECMAN: negotiating security for command 60010.
05/27/24 11:24:37 SECMAN: sending DC_AUTHENTICATE command
05/27/24 11:24:37 SECMAN: sending following classad:
AuthCommand = 0
CurrentTime = time()
ServerCommandSock = "<192.168.1.157:4982>"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
NewSession = "YES"
SessionDuration = "86400"
ServerPid = 2076
Enact = "NO"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
AuthMethods = "NTSSPI,KERBEROS"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Encryption = "OPTIONAL"
SessionLease = 3600
Authentication = "OPTIONAL"
Integrity = "OPTIONAL"
Command = 60010
Subsystem = "STARTD"
05/27/24 11:24:37 SECMAN: resuming command 60010 UPDATE_STARTD_AD to <192.168.1.30:9618> from TCP port 1049 (non-blocking).
05/27/24 11:24:37 SECMAN: server responded with:
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
CryptoMethodsList = "BLOWFISH,3DES"
AuthMethods = "NTSSPI"
Encryption = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
TrustDomain = "submitter"
Integrity = "NO"
Enact = "YES"
NegotiatedSession = true
RemoteVersion = "$CondorVersion: 23.0.4 2024-02-08 BuildID: 712251 $"
IssuerKeys = "LOCAL, POOL"
CurrentTime = time()
05/27/24 11:24:37 SECMAN: received post-auth classad:
ValidCommands = "60027,67,13,0,60,60007,457,60020,68,5,6,7,9,12,43,20,46,78,50,56,48,71,74"
Sid = "submitter:5064:1716801877:268489"
User = "unauthenticated@unmapped"
ReturnCode = "AUTHORIZED"
CurrentTime = time()
05/27/24 11:24:37 SECMAN: policy to be cached:
User = "unauthenticated@unmapped"
ValidCommands = "60027,67,13,0,60,60007,457,60020,68,5,6,7,9,12,43,20,46,78,50,56,48,71,74"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
AuthMethodsList = "NTSSPI,KERBEROS"
RemoteVersion = "$CondorVersion: 23.0.4 2024-02-08 BuildID: 712251 $"
AuthCommand = 0
CurrentTime = time()
SessionDuration = "86400"
Enact = "YES"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
Sid = "submitter:5064:1716801877:268489"
AuthMethods = "NTSSPI"
Encryption = "NO"
SessionLease = 3600
Authentication = "NO"
Integrity = "NO"
Command = 60010
Subsystem = "STARTD"
05/27/24 11:24:37 SECMAN: added session submitter:5064:1716801877:268489 to cache for 86400 seconds (3600s lease).
05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<60027>} mapped to session submitter:5064:1716801877:268489.
05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<67>} mapped to session submitter:5064:1716801877:268489.
05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<13>} mapped to session submitter:5064:1716801877:268489.
05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<0>} mapped to session submitter:5064:1716801877:268489.
05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<60>} mapped to session submitter:5064:1716801877:268489.
05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<60007>} mapped to session submitter:5064:1716801877:268489.
05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<457>} mapped to session submitter:5064:1716801877:268489.
05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<60020>} mapped to session submitter:5064:1716801877:268489.
05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<68>} mapped to session submitter:5064:1716801877:268489.
05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<5>} mapped to session submitter:5064:1716801877:268489.
05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<6>} mapped to session submitter:5064:1716801877:268489.
05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<7>} mapped to session submitter:5064:1716801877:268489.
05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<9>} mapped to session submitter:5064:1716801877:268489.
05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<12>} mapped to session submitter:5064:1716801877:268489.
05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<43>} mapped to session submitter:5064:1716801877:268489.
05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<20>} mapped to session submitter:5064:1716801877:268489.
05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<46>} mapped to session submitter:5064:1716801877:268489.
05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<78>} mapped to session submitter:5064:1716801877:268489.
05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<50>} mapped to session submitter:5064:1716801877:268489.
05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<56>} mapped to session submitter:5064:1716801877:268489.
05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<48>} mapped to session submitter:5064:1716801877:268489.
05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<71>} mapped to session submitter:5064:1716801877:268489.
05/27/24 11:24:37 SECMAN: command {<192.168.1.30:9618>,<74>} mapped to session submitter:5064:1716801877:268489.
05/27/24 11:24:37 SECMAN: startCommand succeeded.
05/27/24 11:24:37 Authorizing server 'unauthenticated@unmapped/192.168.1.30'.
05/27/24 11:24:37 SECMAN: succesfully created security session to <192.168.1.30:9618> via TCP!
05/27/24 11:24:37 SECMAN: resuming command 0 UPDATE_STARTD_AD to collector submitter from UDP port 1048 (non-blocking).
05/27/24 11:24:37 SECMAN: using session submitter:5064:1716801877:268489 for {<192.168.1.30:9618>,<0>}.
05/27/24 11:24:37 SECMAN: found cached session id submitter:5064:1716801877:268489 for {<192.168.1.30:9618>,<0>}.
AuthMethodsList = "NTSSPI,KERBEROS"
UseSession = "YES"
MyRemoteUserName = "unauthenticated@unmapped"
User = "unauthenticated@unmapped"
SessionDuration = "86400"
ServerPid = 2076
Enact = "YES"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
Sid = "submitter:5064:1716801877:268489"
AuthMethods = "NTSSPI"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Encryption = "NO"
SessionLease = 3600
Authentication = "NO"
Integrity = "NO"
Command = 60010
Subsystem = "STARTD"
ValidCommands = "60027,67,13,0,60,60007,457,60020,68,5,6,7,9,12,43,20,46,78,50,56,48,71,74"
AuthCommand = 0
RemoteVersion = "$CondorVersion: 23.0.4 2024-02-08 BuildID: 712251 $"
CurrentTime = time()
05/27/24 11:24:37 SECMAN: Security Policy:
AuthMethodsList = "NTSSPI,KERBEROS"
UseSession = "YES"
MyRemoteUserName = "unauthenticated@unmapped"
User = "unauthenticated@unmapped"
SessionDuration = "86400"
ServerPid = 2076
Enact = "YES"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
Sid = "submitter:5064:1716801877:268489"
AuthMethods = "NTSSPI"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Encryption = "NO"
SessionLease = 3600
Authentication = "NO"
Integrity = "NO"
Command = 60010
Subsystem = "STARTD"
ValidCommands = "60027,67,13,0,60,60007,457,60020,68,5,6,7,9,12,43,20,46,78,50,56,48,71,74"
AuthCommand = 0
RemoteVersion = "$CondorVersion: 23.0.4 2024-02-08 BuildID: 712251 $"
CurrentTime = time()
05/27/24 11:24:37 SECMAN: negotiating security for command 0.
05/27/24 11:24:37 SECMAN: UDP, m_have_session == 1
05/27/24 11:24:37 SECMAN: UDP has session submitter:5064:1716801877:268489.
05/27/24 11:24:37 SECMAN: sending DC_AUTHENTICATE command
05/27/24 11:24:37 SECMAN: sending following classad:
AuthMethodsList = "NTSSPI,KERBEROS"
UseSession = "YES"
MyRemoteUserName = "unauthenticated@unmapped"
User = "unauthenticated@unmapped"
SessionDuration = "86400"
ServerPid = 2076
Enact = "YES"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
Sid = "submitter:5064:1716801877:268489"
AuthMethods = "NTSSPI"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Encryption = "NO"
SessionLease = 3600
Authentication = "NO"
Integrity = "NO"
Command = 0
Subsystem = "STARTD"
ValidCommands = "60027,67,13,0,60,60007,457,60020,68,5,6,7,9,12,43,20,46,78,50,56,48,71,74"
ServerCommandSock = "<192.168.1.157:4982>"
AuthCommand = 0
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
CurrentTime = time()
05/27/24 11:24:37 Getting authenticated user from cached session: unauthenticated@unmapped
05/27/24 11:24:37 SECMAN: startCommand succeeded.
05/27/24 11:24:37 Authorizing server 'unauthenticated@unmapped/192.168.1.30'.
05/27/24 11:24:45 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1056>
05/27/24 11:24:45 DC_AUTHENTICATE: received following ClassAd:
AuthMethods = "NTSSPI,KERBEROS"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
Enact = "NO"
Authentication = "OPTIONAL"
SessionLease = 3600
Encryption = "OPTIONAL"
ServerPid = 2864
Subsystem = "KBDD"
Command = 60010
CurrentTime = time()
AuthCommand = 427
ServerCommandSock = "<192.168.1.157:1155>"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
SessionDuration = "86400"
Integrity = "OPTIONAL"
NewSession = "YES"
05/27/24 11:24:45 DC_AUTHENTICATE: our_policy:
SessionDuration = "86400"
ServerPid = 2076
Enact = "NO"
OutgoingNegotiation = "PREFERRED"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Encryption = "OPTIONAL"
SessionLease = 3600
Authentication = "OPTIONAL"
Integrity = "OPTIONAL"
AuthMethods = "NTSSPI,KERBEROS"
Subsystem = "STARTD"
CryptoMethods = "3DES,BLOWFISH"
CurrentTime = time()
05/27/24 11:24:45 DC_AUTHENTICATE: the_policy:
SessionLease = 3600
SessionDuration = "86400"
CryptoMethods = "3DES,BLOWFISH"
AuthMethods = "NTSSPI"
AuthMethodsList = "NTSSPI,KERBEROS"
Integrity = "NO"
Encryption = "NO"
Authentication = "NO"
Enact = "YES"
CurrentTime = time()
05/27/24 11:24:45 SECMAN: Sending following response ClassAd:
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
Authentication = "NO"
SessionLease = 3600
SessionDuration = "86400"
CryptoMethods = "3DES,BLOWFISH"
AuthMethods = "NTSSPI"
AuthMethodsList = "NTSSPI,KERBEROS"
Integrity = "NO"
Encryption = "NO"
Enact = "YES"
CurrentTime = time()
05/27/24 11:24:45 DC_AUTHENTICATE: not authenticating.
05/27/24 11:24:45 DC_AUTHENTICATE: sending session ad:
ValidCommands = "60002,60003,60011,60014,427"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
User = "unauthenticated@unmapped"
CurrentTime = time()
05/27/24 11:24:45 DC_AUTHENTICATE: sent session wxp-sp2-64-01:2076:1716801885:1 info!
05/27/24 11:24:45 DC_AUTHENTICATE: added incoming session id wxp-sp2-64-01:2076:1716801885:1 to cache for 86420 seconds (lease is 3620s, return address is <192.168.1.157:1155>).
ValidCommands = "60002,60003,60011,60014,427"
User = "unauthenticated@unmapped"
CurrentTime = time()
ServerCommandSock = "<192.168.1.157:1155>"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
Authentication = "NO"
SessionLease = 3600
SessionDuration = "86400"
CryptoMethods = "3DES,BLOWFISH"
Subsystem = "KBDD"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
AuthMethods = "NTSSPI"
ServerPid = 2864
AuthMethodsList = "NTSSPI,KERBEROS"
Integrity = "NO"
Encryption = "NO"
Enact = "YES"
05/27/24 11:24:45 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1055>.
05/27/24 11:24:45 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1055>
05/27/24 11:24:45 DC_AUTHENTICATE: received following ClassAd:
ValidCommands = "60002,60003,60011,60014,427"
Subsystem = "KBDD"
Command = 427
Sid = "wxp-sp2-64-01:2076:1716801885:1"
AuthMethods = "NTSSPI"
OutgoingNegotiation = "PREFERRED"
CryptoMethods = "3DES,BLOWFISH"
Enact = "YES"
SessionLease = 3600
Authentication = "NO"
Encryption = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 2864
Integrity = "NO"
UseSession = "YES"
SessionDuration = "86400"
MyRemoteUserName = "unauthenticated@unmapped"
User = "unauthenticated@unmapped"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
AuthCommand = 427
ServerCommandSock = "<192.168.1.157:1155>"
CurrentTime = time()
05/27/24 11:24:45 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>:
05/27/24 11:24:45 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 2864
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:24:45 DC_AUTHENTICATE: Success.
05/27/24 11:24:45 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:24:48 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1058>.
05/27/24 11:24:48 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1058>
05/27/24 11:24:48 DC_AUTHENTICATE: received following ClassAd:
Enact = "YES"
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
SessionDuration = "86400"
ValidCommands = "60002,60003,60011,60014,427"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
CurrentTime = time()
ServerCommandSock = "<192.168.1.157:4983>"
AuthCommand = 427
Integrity = "NO"
Command = 427
Subsystem = "KBDD"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
AuthMethods = "NTSSPI"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
05/27/24 11:24:48 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>:
05/27/24 11:24:48 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 1520
AuthMethods = "NTSSPI"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:4983>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:24:48 DC_AUTHENTICATE: Success.
05/27/24 11:24:48 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:24:50 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1060>.
05/27/24 11:24:50 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1060>
05/27/24 11:24:50 DC_AUTHENTICATE: received following ClassAd:
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
Integrity = "NO"
CurrentTime = time()
AuthCommand = 427
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
Subsystem = "KBDD"
Command = 427
SessionDuration = "86400"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
ValidCommands = "60002,60003,60011,60014,427"
OutgoingNegotiation = "PREFERRED"
CryptoMethods = "3DES,BLOWFISH"
Enact = "YES"
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
05/27/24 11:24:50 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>:
05/27/24 11:24:50 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 2864
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:24:50 DC_AUTHENTICATE: Success.
05/27/24 11:24:50 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:24:53 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1062>.
05/27/24 11:24:53 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1062>
05/27/24 11:24:53 DC_AUTHENTICATE: received following ClassAd:
Enact = "YES"
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
SessionDuration = "86400"
ValidCommands = "60002,60003,60011,60014,427"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
CurrentTime = time()
ServerCommandSock = "<192.168.1.157:4983>"
AuthCommand = 427
Integrity = "NO"
Command = 427
Subsystem = "KBDD"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
AuthMethods = "NTSSPI"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
05/27/24 11:24:53 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>:
05/27/24 11:24:53 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 1520
AuthMethods = "NTSSPI"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:4983>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:24:53 DC_AUTHENTICATE: Success.
05/27/24 11:24:53 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:24:55 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1064>.
05/27/24 11:24:55 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1064>
05/27/24 11:24:55 DC_AUTHENTICATE: received following ClassAd:
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
Integrity = "NO"
CurrentTime = time()
AuthCommand = 427
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
Subsystem = "KBDD"
Command = 427
SessionDuration = "86400"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
ValidCommands = "60002,60003,60011,60014,427"
OutgoingNegotiation = "PREFERRED"
CryptoMethods = "3DES,BLOWFISH"
Enact = "YES"
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
05/27/24 11:24:55 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>:
05/27/24 11:24:55 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 2864
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:24:55 DC_AUTHENTICATE: Success.
05/27/24 11:24:55 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:24:58 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1067>.
05/27/24 11:24:58 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1067>
05/27/24 11:24:58 DC_AUTHENTICATE: received following ClassAd:
Enact = "YES"
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
SessionDuration = "86400"
ValidCommands = "60002,60003,60011,60014,427"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
CurrentTime = time()
ServerCommandSock = "<192.168.1.157:4983>"
AuthCommand = 427
Integrity = "NO"
Command = 427
Subsystem = "KBDD"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
AuthMethods = "NTSSPI"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
05/27/24 11:24:58 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>:
05/27/24 11:24:58 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 1520
AuthMethods = "NTSSPI"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:4983>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:24:58 DC_AUTHENTICATE: Success.
05/27/24 11:24:58 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:25:00 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1069>.
05/27/24 11:25:00 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1069>
05/27/24 11:25:00 DC_AUTHENTICATE: received following ClassAd:
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
Integrity = "NO"
CurrentTime = time()
AuthCommand = 427
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
Subsystem = "KBDD"
Command = 427
SessionDuration = "86400"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
ValidCommands = "60002,60003,60011,60014,427"
OutgoingNegotiation = "PREFERRED"
CryptoMethods = "3DES,BLOWFISH"
Enact = "YES"
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
05/27/24 11:25:00 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>:
05/27/24 11:25:00 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 2864
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:25:00 DC_AUTHENTICATE: Success.
05/27/24 11:25:00 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:25:03 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1071>.
05/27/24 11:25:03 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1071>
05/27/24 11:25:03 DC_AUTHENTICATE: received following ClassAd:
Enact = "YES"
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
SessionDuration = "86400"
ValidCommands = "60002,60003,60011,60014,427"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
CurrentTime = time()
ServerCommandSock = "<192.168.1.157:4983>"
AuthCommand = 427
Integrity = "NO"
Command = 427
Subsystem = "KBDD"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
AuthMethods = "NTSSPI"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
05/27/24 11:25:03 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>:
05/27/24 11:25:03 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 1520
AuthMethods = "NTSSPI"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:4983>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:25:03 DC_AUTHENTICATE: Success.
05/27/24 11:25:03 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:25:05 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1073>.
05/27/24 11:25:05 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1073>
05/27/24 11:25:05 DC_AUTHENTICATE: received following ClassAd:
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
Integrity = "NO"
CurrentTime = time()
AuthCommand = 427
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
Subsystem = "KBDD"
Command = 427
SessionDuration = "86400"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
ValidCommands = "60002,60003,60011,60014,427"
OutgoingNegotiation = "PREFERRED"
CryptoMethods = "3DES,BLOWFISH"
Enact = "YES"
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
05/27/24 11:25:05 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>:
05/27/24 11:25:05 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 2864
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:25:05 DC_AUTHENTICATE: Success.
05/27/24 11:25:05 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:25:08 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1075>.
05/27/24 11:25:08 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1075>
05/27/24 11:25:08 DC_AUTHENTICATE: received following ClassAd:
Enact = "YES"
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
SessionDuration = "86400"
ValidCommands = "60002,60003,60011,60014,427"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
CurrentTime = time()
ServerCommandSock = "<192.168.1.157:4983>"
AuthCommand = 427
Integrity = "NO"
Command = 427
Subsystem = "KBDD"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
AuthMethods = "NTSSPI"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
05/27/24 11:25:08 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>:
05/27/24 11:25:08 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 1520
AuthMethods = "NTSSPI"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:4983>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:25:08 DC_AUTHENTICATE: Success.
05/27/24 11:25:08 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:25:10 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1077>.
05/27/24 11:25:10 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1077>
05/27/24 11:25:10 DC_AUTHENTICATE: received following ClassAd:
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
Integrity = "NO"
CurrentTime = time()
AuthCommand = 427
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
Subsystem = "KBDD"
Command = 427
SessionDuration = "86400"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
ValidCommands = "60002,60003,60011,60014,427"
OutgoingNegotiation = "PREFERRED"
CryptoMethods = "3DES,BLOWFISH"
Enact = "YES"
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
05/27/24 11:25:10 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>:
05/27/24 11:25:10 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 2864
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:25:10 DC_AUTHENTICATE: Success.
05/27/24 11:25:10 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:25:13 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1079>.
05/27/24 11:25:13 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1079>
05/27/24 11:25:13 DC_AUTHENTICATE: received following ClassAd:
Enact = "YES"
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
SessionDuration = "86400"
ValidCommands = "60002,60003,60011,60014,427"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
CurrentTime = time()
ServerCommandSock = "<192.168.1.157:4983>"
AuthCommand = 427
Integrity = "NO"
Command = 427
Subsystem = "KBDD"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
AuthMethods = "NTSSPI"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
05/27/24 11:25:13 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>:
05/27/24 11:25:13 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 1520
AuthMethods = "NTSSPI"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:4983>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:25:13 DC_AUTHENTICATE: Success.
05/27/24 11:25:13 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:25:13 State change: benchmarks completed
05/27/24 11:25:13 slot1: Changing activity: Benchmarking -> Idle
05/27/24 11:25:15 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1084>.
05/27/24 11:25:15 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1084>
05/27/24 11:25:15 DC_AUTHENTICATE: received following ClassAd:
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
Integrity = "NO"
CurrentTime = time()
AuthCommand = 427
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
Subsystem = "KBDD"
Command = 427
SessionDuration = "86400"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
ValidCommands = "60002,60003,60011,60014,427"
OutgoingNegotiation = "PREFERRED"
CryptoMethods = "3DES,BLOWFISH"
Enact = "YES"
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
05/27/24 11:25:15 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>:
05/27/24 11:25:15 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 2864
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:25:15 DC_AUTHENTICATE: Success.
05/27/24 11:25:15 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:25:17 SECMAN: command 0 UPDATE_STARTD_AD to collector submitter from UDP port 1086 (non-blocking).
05/27/24 11:25:17 SECMAN: using session submitter:5064:1716801877:268489 for {<192.168.1.30:9618>,<0>}.
05/27/24 11:25:17 SECMAN: found cached session id submitter:5064:1716801877:268489 for {<192.168.1.30:9618>,<0>}.
Subsystem = "STARTD"
Command = 60010
Integrity = "NO"
Authentication = "NO"
SessionLease = 3600
Encryption = "NO"
Sid = "submitter:5064:1716801877:268489"
AuthMethods = "NTSSPI"
CurrentTime = time()
AuthCommand = 0
RemoteVersion = "$CondorVersion: 23.0.4 2024-02-08 BuildID: 712251 $"
SessionDuration = "86400"
OutgoingNegotiation = "PREFERRED"
CryptoMethods = "3DES,BLOWFISH"
ValidCommands = "60027,67,13,0,60,60007,457,60020,68,5,6,7,9,12,43,20,46,78,50,56,48,71,74"
UseSession = "YES"
MyRemoteUserName = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
User = "unauthenticated@unmapped"
Enact = "YES"
05/27/24 11:25:17 SECMAN: Security Policy:
Subsystem = "STARTD"
Command = 60010
Integrity = "NO"
Authentication = "NO"
SessionLease = 3600
Encryption = "NO"
Sid = "submitter:5064:1716801877:268489"
AuthMethods = "NTSSPI"
CurrentTime = time()
AuthCommand = 0
RemoteVersion = "$CondorVersion: 23.0.4 2024-02-08 BuildID: 712251 $"
SessionDuration = "86400"
OutgoingNegotiation = "PREFERRED"
CryptoMethods = "3DES,BLOWFISH"
ValidCommands = "60027,67,13,0,60,60007,457,60020,68,5,6,7,9,12,43,20,46,78,50,56,48,71,74"
UseSession = "YES"
MyRemoteUserName = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
User = "unauthenticated@unmapped"
Enact = "YES"
05/27/24 11:25:17 SECMAN: negotiating security for command 0.
05/27/24 11:25:17 SECMAN: UDP, m_have_session == 1
05/27/24 11:25:17 SECMAN: UDP has session submitter:5064:1716801877:268489.
05/27/24 11:25:17 SECMAN: sending DC_AUTHENTICATE command
05/27/24 11:25:17 SECMAN: sending following classad:
Subsystem = "STARTD"
Command = 0
Integrity = "NO"
Authentication = "NO"
SessionLease = 3600
Encryption = "NO"
Sid = "submitter:5064:1716801877:268489"
AuthMethods = "NTSSPI"
ServerCommandSock = "<192.168.1.157:4982>"
CurrentTime = time()
AuthCommand = 0
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
SessionDuration = "86400"
OutgoingNegotiation = "PREFERRED"
CryptoMethods = "3DES,BLOWFISH"
ValidCommands = "60027,67,13,0,60,60007,457,60020,68,5,6,7,9,12,43,20,46,78,50,56,48,71,74"
UseSession = "YES"
MyRemoteUserName = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
User = "unauthenticated@unmapped"
Enact = "YES"
05/27/24 11:25:17 Getting authenticated user from cached session: unauthenticated@unmapped
05/27/24 11:25:17 SECMAN: startCommand succeeded.
05/27/24 11:25:17 Authorizing server 'unauthenticated@unmapped/192.168.1.30'.
05/27/24 11:25:18 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1088>.
05/27/24 11:25:18 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1088>
05/27/24 11:25:18 DC_AUTHENTICATE: received following ClassAd:
Enact = "YES"
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
SessionDuration = "86400"
ValidCommands = "60002,60003,60011,60014,427"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
CurrentTime = time()
ServerCommandSock = "<192.168.1.157:4983>"
AuthCommand = 427
Integrity = "NO"
Command = 427
Subsystem = "KBDD"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
AuthMethods = "NTSSPI"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
05/27/24 11:25:18 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>:
05/27/24 11:25:18 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 1520
AuthMethods = "NTSSPI"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:4983>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:25:18 DC_AUTHENTICATE: Success.
05/27/24 11:25:18 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:25:20 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1090>.
05/27/24 11:25:20 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1090>
05/27/24 11:25:20 DC_AUTHENTICATE: received following ClassAd:
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
Integrity = "NO"
CurrentTime = time()
AuthCommand = 427
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
Subsystem = "KBDD"
Command = 427
SessionDuration = "86400"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
ValidCommands = "60002,60003,60011,60014,427"
OutgoingNegotiation = "PREFERRED"
CryptoMethods = "3DES,BLOWFISH"
Enact = "YES"
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
05/27/24 11:25:20 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>:
05/27/24 11:25:20 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 2864
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:25:20 DC_AUTHENTICATE: Success.
05/27/24 11:25:20 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:25:25 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1092>.
05/27/24 11:25:25 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1092>
05/27/24 11:25:25 DC_AUTHENTICATE: received following ClassAd:
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
Integrity = "NO"
CurrentTime = time()
AuthCommand = 427
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
Subsystem = "KBDD"
Command = 427
SessionDuration = "86400"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
ValidCommands = "60002,60003,60011,60014,427"
OutgoingNegotiation = "PREFERRED"
CryptoMethods = "3DES,BLOWFISH"
Enact = "YES"
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
05/27/24 11:25:25 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>:
05/27/24 11:25:25 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 2864
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:25:25 DC_AUTHENTICATE: Success.
05/27/24 11:25:25 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:25:28 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1094>.
05/27/24 11:25:28 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1094>
05/27/24 11:25:28 DC_AUTHENTICATE: received following ClassAd:
Enact = "YES"
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
SessionDuration = "86400"
ValidCommands = "60002,60003,60011,60014,427"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
CurrentTime = time()
ServerCommandSock = "<192.168.1.157:4983>"
AuthCommand = 427
Integrity = "NO"
Command = 427
Subsystem = "KBDD"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
AuthMethods = "NTSSPI"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
05/27/24 11:25:28 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>:
05/27/24 11:25:28 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 1520
AuthMethods = "NTSSPI"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:4983>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:25:28 DC_AUTHENTICATE: Success.
05/27/24 11:25:28 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:25:30 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1097>.
05/27/24 11:25:30 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1097>
05/27/24 11:25:30 DC_AUTHENTICATE: received following ClassAd:
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
Integrity = "NO"
CurrentTime = time()
AuthCommand = 427
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
Subsystem = "KBDD"
Command = 427
SessionDuration = "86400"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
ValidCommands = "60002,60003,60011,60014,427"
OutgoingNegotiation = "PREFERRED"
CryptoMethods = "3DES,BLOWFISH"
Enact = "YES"
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
05/27/24 11:25:30 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>:
05/27/24 11:25:30 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 2864
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:25:30 DC_AUTHENTICATE: Success.
05/27/24 11:25:30 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:25:33 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1099>.
05/27/24 11:25:33 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1099>
05/27/24 11:25:33 DC_AUTHENTICATE: received following ClassAd:
Enact = "YES"
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
SessionDuration = "86400"
ValidCommands = "60002,60003,60011,60014,427"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
CurrentTime = time()
ServerCommandSock = "<192.168.1.157:4983>"
AuthCommand = 427
Integrity = "NO"
Command = 427
Subsystem = "KBDD"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
AuthMethods = "NTSSPI"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
05/27/24 11:25:33 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>:
05/27/24 11:25:33 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 1520
AuthMethods = "NTSSPI"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:4983>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:25:33 DC_AUTHENTICATE: Success.
05/27/24 11:25:33 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:25:35 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1101>.
05/27/24 11:25:35 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1101>
05/27/24 11:25:35 DC_AUTHENTICATE: received following ClassAd:
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
Integrity = "NO"
CurrentTime = time()
AuthCommand = 427
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
Subsystem = "KBDD"
Command = 427
SessionDuration = "86400"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
ValidCommands = "60002,60003,60011,60014,427"
OutgoingNegotiation = "PREFERRED"
CryptoMethods = "3DES,BLOWFISH"
Enact = "YES"
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
05/27/24 11:25:35 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>:
05/27/24 11:25:35 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 2864
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:25:35 DC_AUTHENTICATE: Success.
05/27/24 11:25:35 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:25:38 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1103>.
05/27/24 11:25:38 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1103>
05/27/24 11:25:38 DC_AUTHENTICATE: received following ClassAd:
Enact = "YES"
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
SessionDuration = "86400"
ValidCommands = "60002,60003,60011,60014,427"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
CurrentTime = time()
ServerCommandSock = "<192.168.1.157:4983>"
AuthCommand = 427
Integrity = "NO"
Command = 427
Subsystem = "KBDD"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
AuthMethods = "NTSSPI"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
05/27/24 11:25:38 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>:
05/27/24 11:25:38 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 1520
AuthMethods = "NTSSPI"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:4983>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:25:38 DC_AUTHENTICATE: Success.
05/27/24 11:25:38 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:25:40 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1105>.
05/27/24 11:25:40 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1105>
05/27/24 11:25:40 DC_AUTHENTICATE: received following ClassAd:
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
Integrity = "NO"
CurrentTime = time()
AuthCommand = 427
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
Subsystem = "KBDD"
Command = 427
SessionDuration = "86400"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
ValidCommands = "60002,60003,60011,60014,427"
OutgoingNegotiation = "PREFERRED"
CryptoMethods = "3DES,BLOWFISH"
Enact = "YES"
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
05/27/24 11:25:40 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>:
05/27/24 11:25:40 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 2864
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:25:40 DC_AUTHENTICATE: Success.
05/27/24 11:25:40 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:25:43 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1107>.
05/27/24 11:25:43 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1107>
05/27/24 11:25:43 DC_AUTHENTICATE: received following ClassAd:
Enact = "YES"
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
SessionDuration = "86400"
ValidCommands = "60002,60003,60011,60014,427"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
CurrentTime = time()
ServerCommandSock = "<192.168.1.157:4983>"
AuthCommand = 427
Integrity = "NO"
Command = 427
Subsystem = "KBDD"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
AuthMethods = "NTSSPI"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
05/27/24 11:25:43 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>:
05/27/24 11:25:43 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 1520
AuthMethods = "NTSSPI"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:4983>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:25:43 DC_AUTHENTICATE: Success.
05/27/24 11:25:43 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:25:45 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1111>.
05/27/24 11:25:45 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1111>
05/27/24 11:25:45 DC_AUTHENTICATE: received following ClassAd:
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
Integrity = "NO"
CurrentTime = time()
AuthCommand = 427
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
Subsystem = "KBDD"
Command = 427
SessionDuration = "86400"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
ValidCommands = "60002,60003,60011,60014,427"
OutgoingNegotiation = "PREFERRED"
CryptoMethods = "3DES,BLOWFISH"
Enact = "YES"
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
05/27/24 11:25:45 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>:
05/27/24 11:25:45 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 2864
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:25:45 DC_AUTHENTICATE: Success.
05/27/24 11:25:45 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:25:48 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1113>.
05/27/24 11:25:48 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1113>
05/27/24 11:25:48 DC_AUTHENTICATE: received following ClassAd:
Enact = "YES"
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
SessionDuration = "86400"
ValidCommands = "60002,60003,60011,60014,427"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
CurrentTime = time()
ServerCommandSock = "<192.168.1.157:4983>"
AuthCommand = 427
Integrity = "NO"
Command = 427
Subsystem = "KBDD"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
AuthMethods = "NTSSPI"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
05/27/24 11:25:48 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>:
05/27/24 11:25:48 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 1520
AuthMethods = "NTSSPI"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:4983>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:25:48 DC_AUTHENTICATE: Success.
05/27/24 11:25:48 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:25:50 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1115>.
05/27/24 11:25:50 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1115>
05/27/24 11:25:50 DC_AUTHENTICATE: received following ClassAd:
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
Integrity = "NO"
CurrentTime = time()
AuthCommand = 427
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
Subsystem = "KBDD"
Command = 427
SessionDuration = "86400"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
ValidCommands = "60002,60003,60011,60014,427"
OutgoingNegotiation = "PREFERRED"
CryptoMethods = "3DES,BLOWFISH"
Enact = "YES"
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
05/27/24 11:25:50 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>:
05/27/24 11:25:50 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 2864
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:25:50 DC_AUTHENTICATE: Success.
05/27/24 11:25:50 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:25:53 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1117>.
05/27/24 11:25:53 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1117>
05/27/24 11:25:53 DC_AUTHENTICATE: received following ClassAd:
Enact = "YES"
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
SessionDuration = "86400"
ValidCommands = "60002,60003,60011,60014,427"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
CurrentTime = time()
ServerCommandSock = "<192.168.1.157:4983>"
AuthCommand = 427
Integrity = "NO"
Command = 427
Subsystem = "KBDD"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
AuthMethods = "NTSSPI"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
05/27/24 11:25:53 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>:
05/27/24 11:25:53 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 1520
AuthMethods = "NTSSPI"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:4983>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:25:53 DC_AUTHENTICATE: Success.
05/27/24 11:25:53 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:25:55 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1119>.
05/27/24 11:25:55 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1119>
05/27/24 11:25:55 DC_AUTHENTICATE: received following ClassAd:
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
Integrity = "NO"
CurrentTime = time()
AuthCommand = 427
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
Subsystem = "KBDD"
Command = 427
SessionDuration = "86400"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
ValidCommands = "60002,60003,60011,60014,427"
OutgoingNegotiation = "PREFERRED"
CryptoMethods = "3DES,BLOWFISH"
Enact = "YES"
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
05/27/24 11:25:55 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>:
05/27/24 11:25:55 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 2864
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:25:55 DC_AUTHENTICATE: Success.
05/27/24 11:25:55 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:25:58 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1121>.
05/27/24 11:25:58 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1121>
05/27/24 11:25:58 DC_AUTHENTICATE: received following ClassAd:
Enact = "YES"
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
SessionDuration = "86400"
ValidCommands = "60002,60003,60011,60014,427"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
CurrentTime = time()
ServerCommandSock = "<192.168.1.157:4983>"
AuthCommand = 427
Integrity = "NO"
Command = 427
Subsystem = "KBDD"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
AuthMethods = "NTSSPI"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
05/27/24 11:25:58 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>:
05/27/24 11:25:58 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 1520
AuthMethods = "NTSSPI"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:4983>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:25:58 DC_AUTHENTICATE: Success.
05/27/24 11:25:58 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:26:00 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1124>.
05/27/24 11:26:00 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1124>
05/27/24 11:26:00 DC_AUTHENTICATE: received following ClassAd:
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
Integrity = "NO"
CurrentTime = time()
AuthCommand = 427
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
Subsystem = "KBDD"
Command = 427
SessionDuration = "86400"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
ValidCommands = "60002,60003,60011,60014,427"
OutgoingNegotiation = "PREFERRED"
CryptoMethods = "3DES,BLOWFISH"
Enact = "YES"
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
05/27/24 11:26:00 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>:
05/27/24 11:26:00 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 2864
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:26:00 DC_AUTHENTICATE: Success.
05/27/24 11:26:00 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:26:03 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1126>.
05/27/24 11:26:03 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1126>
05/27/24 11:26:03 DC_AUTHENTICATE: received following ClassAd:
Enact = "YES"
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
SessionDuration = "86400"
ValidCommands = "60002,60003,60011,60014,427"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
CurrentTime = time()
ServerCommandSock = "<192.168.1.157:4983>"
AuthCommand = 427
Integrity = "NO"
Command = 427
Subsystem = "KBDD"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
AuthMethods = "NTSSPI"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
05/27/24 11:26:03 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>:
05/27/24 11:26:03 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 1520
AuthMethods = "NTSSPI"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:4983>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:26:03 DC_AUTHENTICATE: Success.
05/27/24 11:26:03 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:26:05 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1128>.
05/27/24 11:26:05 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1128>
05/27/24 11:26:05 DC_AUTHENTICATE: received following ClassAd:
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
Integrity = "NO"
CurrentTime = time()
AuthCommand = 427
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
Subsystem = "KBDD"
Command = 427
SessionDuration = "86400"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
ValidCommands = "60002,60003,60011,60014,427"
OutgoingNegotiation = "PREFERRED"
CryptoMethods = "3DES,BLOWFISH"
Enact = "YES"
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
05/27/24 11:26:05 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>:
05/27/24 11:26:05 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 2864
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:26:05 DC_AUTHENTICATE: Success.
05/27/24 11:26:05 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:26:08 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1130>.
05/27/24 11:26:08 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1130>
05/27/24 11:26:08 DC_AUTHENTICATE: received following ClassAd:
Enact = "YES"
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
SessionDuration = "86400"
ValidCommands = "60002,60003,60011,60014,427"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
CurrentTime = time()
ServerCommandSock = "<192.168.1.157:4983>"
AuthCommand = 427
Integrity = "NO"
Command = 427
Subsystem = "KBDD"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
AuthMethods = "NTSSPI"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
05/27/24 11:26:08 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>:
05/27/24 11:26:08 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 1520
AuthMethods = "NTSSPI"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:4983>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:26:08 DC_AUTHENTICATE: Success.
05/27/24 11:26:08 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:26:10 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1134>.
05/27/24 11:26:10 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1134>
05/27/24 11:26:10 DC_AUTHENTICATE: received following ClassAd:
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
Integrity = "NO"
CurrentTime = time()
AuthCommand = 427
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
Subsystem = "KBDD"
Command = 427
SessionDuration = "86400"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
ValidCommands = "60002,60003,60011,60014,427"
OutgoingNegotiation = "PREFERRED"
CryptoMethods = "3DES,BLOWFISH"
Enact = "YES"
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
05/27/24 11:26:10 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>:
05/27/24 11:26:10 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 2864
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:26:10 DC_AUTHENTICATE: Success.
05/27/24 11:26:10 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:26:13 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1136>.
05/27/24 11:26:13 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1136>
05/27/24 11:26:13 DC_AUTHENTICATE: received following ClassAd:
Enact = "YES"
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
SessionDuration = "86400"
ValidCommands = "60002,60003,60011,60014,427"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
CurrentTime = time()
ServerCommandSock = "<192.168.1.157:4983>"
AuthCommand = 427
Integrity = "NO"
Command = 427
Subsystem = "KBDD"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
AuthMethods = "NTSSPI"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
05/27/24 11:26:13 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>:
05/27/24 11:26:13 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 1520
AuthMethods = "NTSSPI"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:4983>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:26:13 DC_AUTHENTICATE: Success.
05/27/24 11:26:13 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:26:15 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1140>.
05/27/24 11:26:15 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1140>
05/27/24 11:26:15 DC_AUTHENTICATE: received following ClassAd:
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
Integrity = "NO"
CurrentTime = time()
AuthCommand = 427
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
Subsystem = "KBDD"
Command = 427
SessionDuration = "86400"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
ValidCommands = "60002,60003,60011,60014,427"
OutgoingNegotiation = "PREFERRED"
CryptoMethods = "3DES,BLOWFISH"
Enact = "YES"
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
05/27/24 11:26:15 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>:
05/27/24 11:26:15 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 2864
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:26:15 DC_AUTHENTICATE: Success.
05/27/24 11:26:15 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:26:18 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1142>.
05/27/24 11:26:18 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1142>
05/27/24 11:26:18 DC_AUTHENTICATE: received following ClassAd:
Enact = "YES"
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
SessionDuration = "86400"
ValidCommands = "60002,60003,60011,60014,427"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
CurrentTime = time()
ServerCommandSock = "<192.168.1.157:4983>"
AuthCommand = 427
Integrity = "NO"
Command = 427
Subsystem = "KBDD"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
AuthMethods = "NTSSPI"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
05/27/24 11:26:18 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>:
05/27/24 11:26:18 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 1520
AuthMethods = "NTSSPI"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:4983>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:26:18 DC_AUTHENTICATE: Success.
05/27/24 11:26:18 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:26:20 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1144>.
05/27/24 11:26:20 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1144>
05/27/24 11:26:20 DC_AUTHENTICATE: received following ClassAd:
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
Integrity = "NO"
CurrentTime = time()
AuthCommand = 427
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
Subsystem = "KBDD"
Command = 427
SessionDuration = "86400"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
ValidCommands = "60002,60003,60011,60014,427"
OutgoingNegotiation = "PREFERRED"
CryptoMethods = "3DES,BLOWFISH"
Enact = "YES"
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
05/27/24 11:26:20 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>:
05/27/24 11:26:20 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 2864
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:26:20 DC_AUTHENTICATE: Success.
05/27/24 11:26:20 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:26:23 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1146>.
05/27/24 11:26:23 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1146>
05/27/24 11:26:23 DC_AUTHENTICATE: received following ClassAd:
Enact = "YES"
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
SessionDuration = "86400"
ValidCommands = "60002,60003,60011,60014,427"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
CurrentTime = time()
ServerCommandSock = "<192.168.1.157:4983>"
AuthCommand = 427
Integrity = "NO"
Command = 427
Subsystem = "KBDD"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
AuthMethods = "NTSSPI"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
05/27/24 11:26:23 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>:
05/27/24 11:26:23 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 1520
AuthMethods = "NTSSPI"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:4983>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:26:23 DC_AUTHENTICATE: Success.
05/27/24 11:26:23 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:26:25 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1148>.
05/27/24 11:26:25 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1148>
05/27/24 11:26:25 DC_AUTHENTICATE: received following ClassAd:
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
Integrity = "NO"
CurrentTime = time()
AuthCommand = 427
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
Subsystem = "KBDD"
Command = 427
SessionDuration = "86400"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
ValidCommands = "60002,60003,60011,60014,427"
OutgoingNegotiation = "PREFERRED"
CryptoMethods = "3DES,BLOWFISH"
Enact = "YES"
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
05/27/24 11:26:25 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>:
05/27/24 11:26:25 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 2864
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:26:25 DC_AUTHENTICATE: Success.
05/27/24 11:26:25 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:26:28 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1150>.
05/27/24 11:26:28 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1150>
05/27/24 11:26:28 DC_AUTHENTICATE: received following ClassAd:
Enact = "YES"
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
SessionDuration = "86400"
ValidCommands = "60002,60003,60011,60014,427"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
CurrentTime = time()
ServerCommandSock = "<192.168.1.157:4983>"
AuthCommand = 427
Integrity = "NO"
Command = 427
Subsystem = "KBDD"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
AuthMethods = "NTSSPI"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
05/27/24 11:26:28 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>:
05/27/24 11:26:28 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 1520
AuthMethods = "NTSSPI"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:4983>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:26:28 DC_AUTHENTICATE: Success.
05/27/24 11:26:28 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:26:30 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1153>.
05/27/24 11:26:30 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1153>
05/27/24 11:26:30 DC_AUTHENTICATE: received following ClassAd:
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
Integrity = "NO"
CurrentTime = time()
AuthCommand = 427
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
Subsystem = "KBDD"
Command = 427
SessionDuration = "86400"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
ValidCommands = "60002,60003,60011,60014,427"
OutgoingNegotiation = "PREFERRED"
CryptoMethods = "3DES,BLOWFISH"
Enact = "YES"
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
05/27/24 11:26:30 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>:
05/27/24 11:26:30 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 2864
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:26:30 DC_AUTHENTICATE: Success.
05/27/24 11:26:30 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:27:07 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.30:63662>
05/27/24 11:27:07 DC_AUTHENTICATE: received following ClassAd:
Sid = "<192.168.1.157:4982>#1716801868#1"
RemoteVersion = "$CondorVersion: 23.0.4 2024-02-08 BuildID: 712251 $"
CryptoMethods = "AES"
UseSession = "YES"
ServerCommandSock = "<192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5572_3636>"
ResumeResponse = false
Nonce = "Y4iIHXaZpK8/nYfF0YoI+1rZ9IEOFN4OxO+xPZcW7qUx"
ConnectSinful = "<192.168.1.157:4982>"
Command = 442
CurrentTime = time()
05/27/24 11:27:07 DC_AUTHENTICATE: attempt to open invalid session <192.168.1.157:4982>#1716801868#1, failing; this session was requested by <192.168.1.30:63662> with return address <192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5572_3636>
05/27/24 11:27:07 SECMAN: command 60014 DC_INVALIDATE_KEY to daemon at <192.168.1.30:9618> from TCP port 1159 (non-blocking, raw).
05/27/24 11:27:07 SECMAN: waiting for TCP connection to daemon at <192.168.1.30:9618>.
05/27/24 11:27:07 SECMAN: resuming command 60014 DC_INVALIDATE_KEY to daemon at <192.168.1.30:9618> from TCP port 1159 (non-blocking, raw).
05/27/24 11:27:07 SECMAN: no cached key for {<192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5572_3636>,<60014>}.
05/27/24 11:27:07 SECMAN: Security Policy:
NewSession = "YES"
SessionDuration = "86400"
ServerPid = 2076
Enact = "NO"
OutgoingNegotiation = "NEVER"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Encryption = "NEVER"
SessionLease = 3600
Authentication = "NEVER"
Integrity = "NEVER"
AuthMethods = "NTSSPI,KERBEROS"
Subsystem = "STARTD"
CryptoMethods = "3DES,BLOWFISH"
CurrentTime = time()
05/27/24 11:27:07 SECMAN: not negotiating, just sending command (60014)
05/27/24 11:27:07 Authorizing server 'unauthenticated@unmapped/192.168.1.30'.
05/27/24 11:27:07 Completed DC_INVALIDATE_KEY to daemon at <192.168.1.30:9618>
05/27/24 11:27:27 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.30:63671>
05/27/24 11:27:27 DC_AUTHENTICATE: received following ClassAd:
Sid = "<192.168.1.157:4982>#1716801868#1"
RemoteVersion = "$CondorVersion: 23.0.4 2024-02-08 BuildID: 712251 $"
CryptoMethods = "AES"
UseSession = "YES"
ServerCommandSock = "<192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5572_3636>"
ResumeResponse = false
Nonce = "fT9JzIqQFeVkZC649CHWy/AkgT/2aYjxGtHhCAaZEE30"
ConnectSinful = "<192.168.1.157:4982>"
Command = 442
CurrentTime = time()
05/27/24 11:27:27 DC_AUTHENTICATE: attempt to open invalid session <192.168.1.157:4982>#1716801868#1, failing; this session was requested by <192.168.1.30:63671> with return address <192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5572_3636>
05/27/24 11:27:27 SECMAN: command 60014 DC_INVALIDATE_KEY to daemon at <192.168.1.30:9618> from TCP port 1162 (non-blocking, raw).
05/27/24 11:27:27 SECMAN: waiting for TCP connection to daemon at <192.168.1.30:9618>.
05/27/24 11:27:27 SECMAN: resuming command 60014 DC_INVALIDATE_KEY to daemon at <192.168.1.30:9618> from TCP port 1162 (non-blocking, raw).
05/27/24 11:27:27 SECMAN: no cached key for {<192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5572_3636>,<60014>}.
05/27/24 11:27:27 SECMAN: Security Policy:
NewSession = "YES"
SessionDuration = "86400"
ServerPid = 2076
Enact = "NO"
OutgoingNegotiation = "NEVER"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Encryption = "NEVER"
SessionLease = 3600
Authentication = "NEVER"
Integrity = "NEVER"
AuthMethods = "NTSSPI,KERBEROS"
Subsystem = "STARTD"
CryptoMethods = "3DES,BLOWFISH"
CurrentTime = time()
05/27/24 11:27:27 SECMAN: not negotiating, just sending command (60014)
05/27/24 11:27:27 Authorizing server 'unauthenticated@unmapped/192.168.1.30'.
05/27/24 11:27:27 Completed DC_INVALIDATE_KEY to daemon at <192.168.1.30:9618>
05/27/24 11:27:47 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.30:63679>
05/27/24 11:27:47 DC_AUTHENTICATE: received following ClassAd:
Sid = "<192.168.1.157:4982>#1716801868#1"
RemoteVersion = "$CondorVersion: 23.0.4 2024-02-08 BuildID: 712251 $"
CryptoMethods = "AES"
UseSession = "YES"
ServerCommandSock = "<192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5572_3636>"
ResumeResponse = false
Nonce = "6KN/mxyKbhL7EYUKfrbqy1fGl/NIQTDW3B5apBvKvkFA"
ConnectSinful = "<192.168.1.157:4982>"
Command = 442
CurrentTime = time()
05/27/24 11:27:47 DC_AUTHENTICATE: attempt to open invalid session <192.168.1.157:4982>#1716801868#1, failing; this session was requested by <192.168.1.30:63679> with return address <192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5572_3636>
05/27/24 11:27:47 SECMAN: command 60014 DC_INVALIDATE_KEY to daemon at <192.168.1.30:9618> from TCP port 1166 (non-blocking, raw).
05/27/24 11:27:47 SECMAN: waiting for TCP connection to daemon at <192.168.1.30:9618>.
05/27/24 11:27:47 SECMAN: resuming command 60014 DC_INVALIDATE_KEY to daemon at <192.168.1.30:9618> from TCP port 1166 (non-blocking, raw).
05/27/24 11:27:47 SECMAN: no cached key for {<192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5572_3636>,<60014>}.
05/27/24 11:27:47 SECMAN: Security Policy:
NewSession = "YES"
SessionDuration = "86400"
ServerPid = 2076
Enact = "NO"
OutgoingNegotiation = "NEVER"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Encryption = "NEVER"
SessionLease = 3600
Authentication = "NEVER"
Integrity = "NEVER"
AuthMethods = "NTSSPI,KERBEROS"
Subsystem = "STARTD"
CryptoMethods = "3DES,BLOWFISH"
CurrentTime = time()
05/27/24 11:27:47 SECMAN: not negotiating, just sending command (60014)
05/27/24 11:27:47 Authorizing server 'unauthenticated@unmapped/192.168.1.30'.
05/27/24 11:27:47 Completed DC_INVALIDATE_KEY to daemon at <192.168.1.30:9618>
05/27/24 11:28:07 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.30:63690>
05/27/24 11:28:07 DC_AUTHENTICATE: received following ClassAd:
Sid = "<192.168.1.157:4982>#1716801868#1"
RemoteVersion = "$CondorVersion: 23.0.4 2024-02-08 BuildID: 712251 $"
CryptoMethods = "AES"
UseSession = "YES"
ServerCommandSock = "<192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5572_3636>"
ResumeResponse = false
Nonce = "rGO1tbWJpWS5fFaYkfFL6zt98WsdX4qOp6f3FRX9tEdP"
ConnectSinful = "<192.168.1.157:4982>"
Command = 442
CurrentTime = time()
05/27/24 11:28:07 DC_AUTHENTICATE: attempt to open invalid session <192.168.1.157:4982>#1716801868#1, failing; this session was requested by <192.168.1.30:63690> with return address <192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5572_3636>
05/27/24 11:28:07 SECMAN: command 60014 DC_INVALIDATE_KEY to daemon at <192.168.1.30:9618> from TCP port 1168 (non-blocking, raw).
05/27/24 11:28:07 SECMAN: waiting for TCP connection to daemon at <192.168.1.30:9618>.
05/27/24 11:28:07 SECMAN: resuming command 60014 DC_INVALIDATE_KEY to daemon at <192.168.1.30:9618> from TCP port 1168 (non-blocking, raw).
05/27/24 11:28:07 SECMAN: no cached key for {<192.168.1.30:9618?addrs=192.168.1.30-9618&alias=submitter&noUDP&sock=schedd_5572_3636>,<60014>}.
05/27/24 11:28:07 SECMAN: Security Policy:
NewSession = "YES"
SessionDuration = "86400"
ServerPid = 2076
Enact = "NO"
OutgoingNegotiation = "NEVER"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Encryption = "NEVER"
SessionLease = 3600
Authentication = "NEVER"
Integrity = "NEVER"
AuthMethods = "NTSSPI,KERBEROS"
Subsystem = "STARTD"
CryptoMethods = "3DES,BLOWFISH"
CurrentTime = time()
05/27/24 11:28:07 SECMAN: not negotiating, just sending command (60014)
05/27/24 11:28:07 Authorizing server 'unauthenticated@unmapped/192.168.1.30'.
05/27/24 11:28:07 Completed DC_INVALIDATE_KEY to daemon at <192.168.1.30:9618>
05/27/24 11:28:15 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1171>.
05/27/24 11:28:15 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1171>
05/27/24 11:28:15 DC_AUTHENTICATE: received following ClassAd:
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
Integrity = "NO"
CurrentTime = time()
AuthCommand = 427
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
Subsystem = "KBDD"
Command = 427
SessionDuration = "86400"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
ValidCommands = "60002,60003,60011,60014,427"
OutgoingNegotiation = "PREFERRED"
CryptoMethods = "3DES,BLOWFISH"
Enact = "YES"
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
05/27/24 11:28:15 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801885:1 with return address <192.168.1.157:1155>:
05/27/24 11:28:15 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 2864
AuthMethods = "NTSSPI"
Sid = "wxp-sp2-64-01:2076:1716801885:1"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:1155>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:28:15 DC_AUTHENTICATE: Success.
05/27/24 11:28:15 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: 
05/27/24 11:28:18 DC_AUTHENTICATE: received UDP packet from <192.168.1.157:1173>.
05/27/24 11:28:18 DC_AUTHENTICATE: received DC_AUTHENTICATE from <192.168.1.157:1173>
05/27/24 11:28:18 DC_AUTHENTICATE: received following ClassAd:
Enact = "YES"
User = "unauthenticated@unmapped"
AuthMethodsList = "NTSSPI,KERBEROS"
MyRemoteUserName = "unauthenticated@unmapped"
UseSession = "YES"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
SessionDuration = "86400"
ValidCommands = "60002,60003,60011,60014,427"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
CurrentTime = time()
ServerCommandSock = "<192.168.1.157:4983>"
AuthCommand = 427
Integrity = "NO"
Command = 427
Subsystem = "KBDD"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
AuthMethods = "NTSSPI"
Encryption = "NO"
Authentication = "NO"
SessionLease = 3600
05/27/24 11:28:18 DC_AUTHENTICATE: resuming session id wxp-sp2-64-01:2076:1716801873:0 with return address <192.168.1.157:4983>:
05/27/24 11:28:18 DC_AUTHENTICATE: Cached Session:
Enact = "YES"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI,KERBEROS"
ServerPid = 1520
AuthMethods = "NTSSPI"
ParentUniqueID = "wxp-sp2-64-01:2980:1716801866"
Sid = "wxp-sp2-64-01:2076:1716801873:0"
Subsystem = "KBDD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "86400"
SessionLease = 3600
Authentication = "NO"
RemoteVersion = "$CondorVersion: 8.0.4 Oct 19 2013 BuildID: 189770 $"
ServerCommandSock = "<192.168.1.157:4983>"
CurrentTime = time()
User = "unauthenticated@unmapped"
ValidCommands = "60002,60003,60011,60014,427"
05/27/24 11:28:18 DC_AUTHENTICATE: Success.
05/27/24 11:28:18 PERMISSION GRANTED to unauthenticated@unmapped from host 192.168.1.157 for command 427 (X_EVENT_NOTIFICATION), access level ALLOW: reason: