[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Condor-users] Windows, Credd, and run_as_owner question



Title: Message
I ran through the same procedure, again (starting from everything off, turn on master, wait, turn on slave, wait, turn everything off).
 
I apologize for the long email, but I wasn't sure what to cut out, so I included the almost the entire CreddLog and StartLog (with the updated debug settings).  Note that I tried to set the system times of the slave and master as close as possible (within 1 second).
 
Thanks for helping me with this,
Matt
 
CreddLog (SHIPSIM.dom1.jhuapl.edu machine):
 
12/7 14:28:26 KEYCACHE: created: 00A96EC8
12/7 14:28:26 ******************************************************
12/7 14:28:26 ** condor_credd.exe (CONDOR_CREDD) STARTING UP
12/7 14:28:26 ** C:\condor\bin\condor_credd.exe
12/7 14:28:26 ** $CondorVersion: 6.9.5 Nov 28 2007 $
12/7 14:28:26 ** $CondorPlatform: INTEL-WINNT50 $
12/7 14:28:26 ** PID = 2584
12/7 14:28:26 ** Log last touched time unavailable (No such file or directory)
12/7 14:28:26 ******************************************************
12/7 14:28:26 Using config source: C:\condor\condor_config
12/7 14:28:26 Using local config sources:
12/7 14:28:26    C:\condor/condor_config.local
12/7 14:28:26    C:\condor/condor_config.local.credd
12/7 14:28:26 DaemonCore: Command Socket at <128.244.140.226:9620>
12/7 14:28:26 IPVERIFY: allow NEGOTIATOR : SHIPSIM.dom1.jhuapl.edu (from config value HOSTALLOW_NEGOTIATOR)
12/7 14:28:26 IPVERIFY: successfully resolved and added SHIPSIM.dom1.jhuapl.edu to NEGOTIATOR
12/7 14:28:26 IPVERIFY: allow ADMINISTRATOR : SHIPSIM.dom1.jhuapl.edu (from config value HOSTALLOW_ADMINISTRATOR)
12/7 14:28:26 IPVERIFY: successfully resolved and added SHIPSIM.dom1.jhuapl.edu to ADMINISTRATOR
12/7 14:28:26 IPVERIFY: allow OWNER : SHIPSIM.dom1.jhuapl.edu, SHIPSIM.dom1.jhuapl.edu (from config value HOSTALLOW_OWNER)
12/7 14:28:26 IPVERIFY: successfully resolved and added SHIPSIM.dom1.jhuapl.edu to OWNER
12/7 14:28:26 IPVERIFY: successfully resolved and added SHIPSIM.dom1.jhuapl.edu to OWNER
12/7 14:28:26 IPVERIFY: allow CONFIG : SHIPSIM.dom1.jhuapl.edu, SHIPSIM.dom1.jhuapl.edu (from config value HOSTALLOW_CONFIG)
12/7 14:28:26 IPVERIFY: successfully resolved and added SHIPSIM.dom1.jhuapl.edu to CONFIG
12/7 14:28:26 IPVERIFY: successfully resolved and added SHIPSIM.dom1.jhuapl.edu to CONFIG
12/7 14:28:26 IPVERIFY: allow DAEMON : condor_pool@xxxxxxxxxxxxxxx (from config value ALLOW_DAEMON,HOSTALLOW_WRITE)
12/7 14:28:26 IPVERIFY: allow ADVERTISE_STARTD : condor_pool@xxxxxxxxxxxxxxx (from config value ALLOW_DAEMON,HOSTALLOW_WRITE)
12/7 14:28:26 IPVERIFY: allow ADVERTISE_SCHEDD : condor_pool@xxxxxxxxxxxxxxx (from config value ALLOW_DAEMON,HOSTALLOW_WRITE)
12/7 14:28:26 IPVERIFY: allow ADVERTISE_MASTER : condor_pool@xxxxxxxxxxxxxxx (from config value ALLOW_DAEMON,HOSTALLOW_WRITE)
12/7 14:28:26 Will use UDP to update collector SHIPSIM.dom1.jhuapl.edu <128.244.140.226:9618>
12/7 14:28:26 main_init() called
12/7 14:28:26 Getting monitoring info for pid 2584
12/7 14:28:26 Trying to update collector <128.244.140.226:9618>
12/7 14:28:26 Attempting to send update via UDP to collector SHIPSIM.dom1.jhuapl.edu <128.244.140.226:9618>
12/7 14:28:26 STARTCOMMAND: starting 58 to <128.244.140.226:9618> on UDP port 2827.
12/7 14:28:26 SECMAN: command 58 to <128.244.140.226:9618> on UDP port 2827 (non-blocking).
12/7 14:28:26 SECMAN: no cached key for {<128.244.140.226:9618>,<58>}.
12/7 14:28:26 SECMAN: Security Policy:
MyType = ""
TargetType = ""
AuthMethods = "NTSSPI, PASSWORD"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "REQUIRED"
Authentication = "REQUIRED"
Encryption = "REQUIRED"
Integrity = "REQUIRED"
Enact = "NO"
Subsystem = "CREDD"
ParentUniqueID = "SHIPSIM:2580:1196980658"
ServerPid = 2584
SessionDuration = "8640000"
12/7 14:28:26 SECMAN: negotiating security for command 58.
12/7 14:28:26 SECMAN: need to start a session via TCP
12/7 14:28:26 SECMAN: setting timeout to 20 seconds.
12/7 14:28:26 File descriptor limits: max 1024, safe 820
12/7 14:28:26 Non-blocking connection for TCP authentication to <128.244.140.226:9618> finished (connected=1)
12/7 14:28:26 SECMAN: command 60010 to <128.244.140.226:9618> on TCP port 2828 (blocking).
12/7 14:28:26 SECMAN: no cached key for {<128.244.140.226:9618>,<60010>}.
12/7 14:28:26 SECMAN: Security Policy:
MyType = ""
TargetType = ""
AuthMethods = "NTSSPI, PASSWORD"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "REQUIRED"
Authentication = "REQUIRED"
Encryption = "REQUIRED"
Integrity = "REQUIRED"
Enact = "NO"
Subsystem = "CREDD"
ParentUniqueID = "SHIPSIM:2580:1196980658"
ServerPid = 2584
SessionDuration = "8640000"
NewSession = "YES"
12/7 14:28:26 SECMAN: negotiating security for command 60010.
12/7 14:28:26 SECMAN: sending DC_AUTHENTICATE command
12/7 14:28:26 SECMAN: sending following classad:
MyType = ""
TargetType = ""
AuthMethods = "NTSSPI, PASSWORD"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "REQUIRED"
Authentication = "REQUIRED"
Encryption = "REQUIRED"
Integrity = "REQUIRED"
Enact = "NO"
Subsystem = "CREDD"
ParentUniqueID = "SHIPSIM:2580:1196980658"
ServerPid = 2584
SessionDuration = "8640000"
NewSession = "YES"
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
ServerCommandSock = "<128.244.140.226:9620>"
Command = 60010
AuthCommand = 58
12/7 14:28:27 SECMAN: server responded with:
MyType = "(unknown type)"
TargetType = "(unknown type)"
Authentication = "YES"
Encryption = "YES"
Integrity = "YES"
AuthMethodsList = "NTSSPI"
AuthMethods = "NTSSPI"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "8640000"
Enact = "YES"
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
12/7 14:28:27 SECMAN: new session, doing initial authentication.
12/7 14:28:27 SECMAN: authenticating RIGHT NOW.
12/7 14:28:27 SECMAN: AuthMethodsList: NTSSPI
12/7 14:28:27 SECMAN: Auth methods: NTSSPI
12/7 14:28:27 AUTHENTICATE: in authenticate( addr == '<128.244.140.226:9618>', methods == 'NTSSPI')
12/7 14:28:27 AUTHENTICATE: can still try these methods: NTSSPI
12/7 14:28:27 HANDSHAKE: in handshake(my_methods = 'NTSSPI')
12/7 14:28:27 HANDSHAKE: handshake() - i am the client
12/7 14:28:27 HANDSHAKE: sending (methods == 16) to server
12/7 14:28:27 HANDSHAKE: server replied (method = 16)
12/7 14:28:27 AUTHENTICATE: will try to use 16 (NTSSPI)
12/7 14:28:27 sspi_client_auth() entered
12/7 14:28:27 sspi_client_auth() looping
12/7 14:28:27 sspi_client_auth() exiting
12/7 14:28:27 AUTHENTICATE: auth_status == 16 (NTSSPI)
12/7 14:28:27 Authentication was a Success.
12/7 14:28:27 ZKM: setting default map to (null)
12/7 14:28:27 ZKM: post-map: current user is '(null)'
12/7 14:28:27 ZKM: post-map: current domain is '(null)'
12/7 14:28:27 ZKM: post-map: current FQU is '(null)'
12/7 14:28:27 SECMAN: about to enable message authenticator.
12/7 14:28:27 SECMAN: successfully enabled message authenticator!
12/7 14:28:27 SECMAN: about to enable encryption.
12/7 14:28:27 SECMAN: successfully enabled encryption!
12/7 14:28:27 SECMAN: received post-auth classad:
MyType = "(unknown type)"
TargetType = "(unknown type)"
User = "SYSTEM@nt authority"
Sid = "SHIPSIM:1644:1197055706:0"
ValidCommands = "4,17,21,42,44,45,47,52,54,55,57,58,59,60017,60004,5,6,7,9,12,43,46,48,50,53,56,60007,60011,457"
12/7 14:28:27 SECMAN: policy to be cached:
MyType = ""
TargetType = ""
OutgoingNegotiation = "REQUIRED"
Subsystem = "CREDD"
ParentUniqueID = "SHIPSIM:2580:1196980658"
ServerPid = 2584
SessionDuration = "8640000"
ServerCommandSock = "<128.244.140.226:9620>"
Command = 60010
AuthCommand = 58
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
Enact = "YES"
AuthMethodsList = "NTSSPI"
AuthMethods = "NTSSPI"
CryptoMethods = "3DES,BLOWFISH"
Authentication = "YES"
Encryption = "YES"
Integrity = "YES"
UseSession = "YES"
Sid = "SHIPSIM:1644:1197055706:0"
User = "SYSTEM@nt authority"
ValidCommands = "4,17,21,42,44,45,47,52,54,55,57,58,59,60017,60004,5,6,7,9,12,43,46,48,50,53,56,60007,60011,457"
12/7 14:28:27 SECMAN: added session SHIPSIM:1644:1197055706:0 to cache for 8640000 seconds.
12/7 14:28:27 SECMAN: command {<128.244.140.226:9618>,<4>} mapped to session SHIPSIM:1644:1197055706:0.
12/7 14:28:27 SECMAN: command {<128.244.140.226:9618>,<17>} mapped to session SHIPSIM:1644:1197055706:0.
12/7 14:28:27 SECMAN: command {<128.244.140.226:9618>,<21>} mapped to session SHIPSIM:1644:1197055706:0.
12/7 14:28:27 SECMAN: command {<128.244.140.226:9618>,<42>} mapped to session SHIPSIM:1644:1197055706:0.
12/7 14:28:27 SECMAN: command {<128.244.140.226:9618>,<44>} mapped to session SHIPSIM:1644:1197055706:0.
12/7 14:28:27 SECMAN: command {<128.244.140.226:9618>,<45>} mapped to session SHIPSIM:1644:1197055706:0.
12/7 14:28:27 SECMAN: command {<128.244.140.226:9618>,<47>} mapped to session SHIPSIM:1644:1197055706:0.
12/7 14:28:27 SECMAN: command {<128.244.140.226:9618>,<52>} mapped to session SHIPSIM:1644:1197055706:0.
12/7 14:28:27 SECMAN: command {<128.244.140.226:9618>,<54>} mapped to session SHIPSIM:1644:1197055706:0.
12/7 14:28:27 SECMAN: command {<128.244.140.226:9618>,<55>} mapped to session SHIPSIM:1644:1197055706:0.
12/7 14:28:27 SECMAN: command {<128.244.140.226:9618>,<57>} mapped to session SHIPSIM:1644:1197055706:0.
12/7 14:28:27 SECMAN: command {<128.244.140.226:9618>,<58>} mapped to session SHIPSIM:1644:1197055706:0.
12/7 14:28:27 SECMAN: command {<128.244.140.226:9618>,<59>} mapped to session SHIPSIM:1644:1197055706:0.
12/7 14:28:27 SECMAN: command {<128.244.140.226:9618>,<60017>} mapped to session SHIPSIM:1644:1197055706:0.
12/7 14:28:27 SECMAN: command {<128.244.140.226:9618>,<60004>} mapped to session SHIPSIM:1644:1197055706:0.
12/7 14:28:27 SECMAN: command {<128.244.140.226:9618>,<5>} mapped to session SHIPSIM:1644:1197055706:0.
12/7 14:28:27 SECMAN: command {<128.244.140.226:9618>,<6>} mapped to session SHIPSIM:1644:1197055706:0.
12/7 14:28:27 SECMAN: command {<128.244.140.226:9618>,<7>} mapped to session SHIPSIM:1644:1197055706:0.
12/7 14:28:27 SECMAN: command {<128.244.140.226:9618>,<9>} mapped to session SHIPSIM:1644:1197055706:0.
12/7 14:28:27 SECMAN: command {<128.244.140.226:9618>,<12>} mapped to session SHIPSIM:1644:1197055706:0.
12/7 14:28:27 SECMAN: command {<128.244.140.226:9618>,<43>} mapped to session SHIPSIM:1644:1197055706:0.
12/7 14:28:27 SECMAN: command {<128.244.140.226:9618>,<46>} mapped to session SHIPSIM:1644:1197055706:0.
12/7 14:28:27 SECMAN: command {<128.244.140.226:9618>,<48>} mapped to session SHIPSIM:1644:1197055706:0.
12/7 14:28:27 SECMAN: command {<128.244.140.226:9618>,<50>} mapped to session SHIPSIM:1644:1197055706:0.
12/7 14:28:27 SECMAN: command {<128.244.140.226:9618>,<53>} mapped to session SHIPSIM:1644:1197055706:0.
12/7 14:28:27 SECMAN: command {<128.244.140.226:9618>,<56>} mapped to session SHIPSIM:1644:1197055706:0.
12/7 14:28:27 SECMAN: command {<128.244.140.226:9618>,<60007>} mapped to session SHIPSIM:1644:1197055706:0.
12/7 14:28:27 SECMAN: command {<128.244.140.226:9618>,<60011>} mapped to session SHIPSIM:1644:1197055706:0.
12/7 14:28:27 SECMAN: command {<128.244.140.226:9618>,<457>} mapped to session SHIPSIM:1644:1197055706:0.
12/7 14:28:27 SECMAN: startCommand succeeded.
12/7 14:28:27 SECMAN: sending eom() and closing TCP sock.
12/7 14:28:27 SECMAN: succesfully sent NOP via TCP!
12/7 14:28:27 SECMAN: resuming command 58 to <128.244.140.226:9618> on UDP port 2827 (non-blocking).
12/7 14:28:27 SECMAN: using session SHIPSIM:1644:1197055706:0 for {<128.244.140.226:9618>,<58>}.
12/7 14:28:27 SECMAN: found cached session id SHIPSIM:1644:1197055706:0 for {<128.244.140.226:9618>,<58>}.
MyType = ""
TargetType = ""
OutgoingNegotiation = "REQUIRED"
Subsystem = "CREDD"
ParentUniqueID = "SHIPSIM:2580:1196980658"
ServerPid = 2584
SessionDuration = "8640000"
ServerCommandSock = "<128.244.140.226:9620>"
Command = 60010
AuthCommand = 58
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
Enact = "YES"
AuthMethodsList = "NTSSPI"
AuthMethods = "NTSSPI"
CryptoMethods = "3DES,BLOWFISH"
Authentication = "YES"
Encryption = "YES"
Integrity = "YES"
UseSession = "YES"
Sid = "SHIPSIM:1644:1197055706:0"
User = "SYSTEM@nt authority"
ValidCommands = "4,17,21,42,44,45,47,52,54,55,57,58,59,60017,60004,5,6,7,9,12,43,46,48,50,53,56,60007,60011,457"
12/7 14:28:27 SECMAN: Security Policy:
MyType = ""
TargetType = ""
OutgoingNegotiation = "REQUIRED"
Subsystem = "CREDD"
ParentUniqueID = "SHIPSIM:2580:1196980658"
ServerPid = 2584
SessionDuration = "8640000"
ServerCommandSock = "<128.244.140.226:9620>"
Command = 60010
AuthCommand = 58
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
Enact = "YES"
AuthMethodsList = "NTSSPI"
AuthMethods = "NTSSPI"
CryptoMethods = "3DES,BLOWFISH"
Authentication = "YES"
Encryption = "YES"
Integrity = "YES"
UseSession = "YES"
Sid = "SHIPSIM:1644:1197055706:0"
User = "SYSTEM@nt authority"
ValidCommands = "4,17,21,42,44,45,47,52,54,55,57,58,59,60017,60004,5,6,7,9,12,43,46,48,50,53,56,60007,60011,457"
12/7 14:28:27 SECMAN: negotiating security for command 58.
12/7 14:28:27 SECMAN: UDP, have_session == 1, can_neg == 1
12/7 14:28:27 SECMAN: UDP has session SHIPSIM:1644:1197055706:0.
12/7 14:28:27 SECMAN: about to enable message authenticator.
12/7 14:28:27 SECMAN: successfully enabled message authenticator!
12/7 14:28:27 SECMAN: about to enable encryption.
12/7 14:28:27 set_encryption_id: setting key length 48
12/7 14:28:27 SECMAN: successfully enabled encryption!
12/7 14:28:27 SECMAN: sending DC_AUTHENTICATE command
12/7 14:28:27 SECMAN: sending following classad:
MyType = ""
TargetType = ""
OutgoingNegotiation = "REQUIRED"
Subsystem = "CREDD"
ParentUniqueID = "SHIPSIM:2580:1196980658"
ServerPid = 2584
SessionDuration = "8640000"
AuthCommand = 58
Enact = "YES"
AuthMethodsList = "NTSSPI"
AuthMethods = "NTSSPI"
CryptoMethods = "3DES,BLOWFISH"
Authentication = "YES"
Encryption = "YES"
Integrity = "YES"
UseSession = "YES"
Sid = "SHIPSIM:1644:1197055706:0"
User = "SYSTEM@nt authority"
ValidCommands = "4,17,21,42,44,45,47,52,54,55,57,58,59,60017,60004,5,6,7,9,12,43,46,48,50,53,56,60007,60011,457"
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
ServerCommandSock = "<128.244.140.226:9620>"
Command = 58
12/7 14:28:27 SECMAN: startCommand succeeded.
12/7 14:28:27 DaemonCore: in SendAliveToParent()
12/7 14:28:27 STARTCOMMAND: starting 60008 to <128.244.140.226:2833> on UDP port 2838.
12/7 14:28:27 SECMAN: command 60008 to <128.244.140.226:2833> on UDP port 2838 (blocking).
12/7 14:28:27 SECMAN: no cached key for {<128.244.140.226:2833>,<60008>}.
12/7 14:28:27 SECMAN: Security Policy:
MyType = ""
TargetType = ""
AuthMethods = "NTSSPI, PASSWORD"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "REQUIRED"
Authentication = "REQUIRED"
Encryption = "REQUIRED"
Integrity = "REQUIRED"
Enact = "NO"
Subsystem = "CREDD"
ParentUniqueID = "SHIPSIM:2580:1196980658"
ServerPid = 2584
SessionDuration = "8640000"
12/7 14:28:27 SECMAN: negotiating security for command 60008.
12/7 14:28:27 SECMAN: need to start a session via TCP
12/7 14:28:27 SECMAN: setting timeout to 20 seconds.
12/7 14:28:27 SECMAN: command 60010 to <128.244.140.226:2833> on TCP port 2839 (blocking).
12/7 14:28:27 SECMAN: no cached key for {<128.244.140.226:2833>,<60010>}.
12/7 14:28:27 SECMAN: Security Policy:
MyType = ""
TargetType = ""
AuthMethods = "NTSSPI, PASSWORD"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "REQUIRED"
Authentication = "REQUIRED"
Encryption = "REQUIRED"
Integrity = "REQUIRED"
Enact = "NO"
Subsystem = "CREDD"
ParentUniqueID = "SHIPSIM:2580:1196980658"
ServerPid = 2584
SessionDuration = "8640000"
NewSession = "YES"
12/7 14:28:27 SECMAN: negotiating security for command 60010.
12/7 14:28:27 SECMAN: sending DC_AUTHENTICATE command
12/7 14:28:27 SECMAN: sending following classad:
MyType = ""
TargetType = ""
AuthMethods = "NTSSPI, PASSWORD"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "REQUIRED"
Authentication = "REQUIRED"
Encryption = "REQUIRED"
Integrity = "REQUIRED"
Enact = "NO"
Subsystem = "CREDD"
ParentUniqueID = "SHIPSIM:2580:1196980658"
ServerPid = 2584
SessionDuration = "8640000"
NewSession = "YES"
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
ServerCommandSock = "<128.244.140.226:9620>"
Command = 60010
AuthCommand = 60008
12/7 14:28:27 SECMAN: server responded with:
MyType = "(unknown type)"
TargetType = "(unknown type)"
Authentication = "YES"
Encryption = "YES"
Integrity = "YES"
AuthMethodsList = "NTSSPI"
AuthMethods = "NTSSPI"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "8640000"
Enact = "YES"
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
12/7 14:28:27 SECMAN: new session, doing initial authentication.
12/7 14:28:27 SECMAN: authenticating RIGHT NOW.
12/7 14:28:27 SECMAN: AuthMethodsList: NTSSPI
12/7 14:28:27 SECMAN: Auth methods: NTSSPI
12/7 14:28:27 AUTHENTICATE: in authenticate( addr == '<128.244.140.226:2833>', methods == 'NTSSPI')
12/7 14:28:27 AUTHENTICATE: can still try these methods: NTSSPI
12/7 14:28:27 HANDSHAKE: in handshake(my_methods = 'NTSSPI')
12/7 14:28:27 HANDSHAKE: handshake() - i am the client
12/7 14:28:27 HANDSHAKE: sending (methods == 16) to server
12/7 14:28:27 HANDSHAKE: server replied (method = 16)
12/7 14:28:27 AUTHENTICATE: will try to use 16 (NTSSPI)
12/7 14:28:27 sspi_client_auth() entered
12/7 14:28:27 sspi_client_auth() looping
12/7 14:28:27 sspi_client_auth() exiting
12/7 14:28:27 AUTHENTICATE: auth_status == 16 (NTSSPI)
12/7 14:28:27 Authentication was a Success.
12/7 14:28:27 ZKM: setting default map to (null)
12/7 14:28:27 ZKM: post-map: current user is '(null)'
12/7 14:28:27 ZKM: post-map: current domain is '(null)'
12/7 14:28:27 ZKM: post-map: current FQU is '(null)'
12/7 14:28:27 SECMAN: about to enable message authenticator.
12/7 14:28:27 SECMAN: successfully enabled message authenticator!
12/7 14:28:27 SECMAN: about to enable encryption.
12/7 14:28:27 SECMAN: successfully enabled encryption!
12/7 14:28:27 SECMAN: received post-auth classad:
MyType = "(unknown type)"
TargetType = "(unknown type)"
User = "SYSTEM@nt authority"
Sid = "SHIPSIM:2580:1197055707:93"
ValidCommands = "60000,60001,60008"
12/7 14:28:27 SECMAN: policy to be cached:
MyType = ""
TargetType = ""
OutgoingNegotiation = "REQUIRED"
Subsystem = "CREDD"
ParentUniqueID = "SHIPSIM:2580:1196980658"
ServerPid = 2584
SessionDuration = "8640000"
ServerCommandSock = "<128.244.140.226:9620>"
Command = 60010
AuthCommand = 60008
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
Enact = "YES"
AuthMethodsList = "NTSSPI"
AuthMethods = "NTSSPI"
CryptoMethods = "3DES,BLOWFISH"
Authentication = "YES"
Encryption = "YES"
Integrity = "YES"
UseSession = "YES"
Sid = "SHIPSIM:2580:1197055707:93"
User = "SYSTEM@nt authority"
ValidCommands = "60000,60001,60008"
12/7 14:28:27 SECMAN: added session SHIPSIM:2580:1197055707:93 to cache for 8640000 seconds.
12/7 14:28:27 SECMAN: command {<128.244.140.226:2833>,<60000>} mapped to session SHIPSIM:2580:1197055707:93.
12/7 14:28:27 SECMAN: command {<128.244.140.226:2833>,<60001>} mapped to session SHIPSIM:2580:1197055707:93.
12/7 14:28:27 SECMAN: command {<128.244.140.226:2833>,<60008>} mapped to session SHIPSIM:2580:1197055707:93.
12/7 14:28:27 SECMAN: startCommand succeeded.
12/7 14:28:27 SECMAN: sending eom() and closing TCP sock.
12/7 14:28:27 SECMAN: succesfully sent NOP via TCP!
12/7 14:28:27 SECMAN: resuming command 60008 to <128.244.140.226:2833> on UDP port 2838 (blocking).
12/7 14:28:27 SECMAN: using session SHIPSIM:2580:1197055707:93 for {<128.244.140.226:2833>,<60008>}.
12/7 14:28:27 SECMAN: found cached session id SHIPSIM:2580:1197055707:93 for {<128.244.140.226:2833>,<60008>}.
MyType = ""
TargetType = ""
OutgoingNegotiation = "REQUIRED"
Subsystem = "CREDD"
ParentUniqueID = "SHIPSIM:2580:1196980658"
ServerPid = 2584
SessionDuration = "8640000"
ServerCommandSock = "<128.244.140.226:9620>"
Command = 60010
AuthCommand = 60008
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
Enact = "YES"
AuthMethodsList = "NTSSPI"
AuthMethods = "NTSSPI"
CryptoMethods = "3DES,BLOWFISH"
Authentication = "YES"
Encryption = "YES"
Integrity = "YES"
UseSession = "YES"
Sid = "SHIPSIM:2580:1197055707:93"
User = "SYSTEM@nt authority"
ValidCommands = "60000,60001,60008"
12/7 14:28:27 SECMAN: Security Policy:
MyType = ""
TargetType = ""
OutgoingNegotiation = "REQUIRED"
Subsystem = "CREDD"
ParentUniqueID = "SHIPSIM:2580:1196980658"
ServerPid = 2584
SessionDuration = "8640000"
ServerCommandSock = "<128.244.140.226:9620>"
Command = 60010
AuthCommand = 60008
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
Enact = "YES"
AuthMethodsList = "NTSSPI"
AuthMethods = "NTSSPI"
CryptoMethods = "3DES,BLOWFISH"
Authentication = "YES"
Encryption = "YES"
Integrity = "YES"
UseSession = "YES"
Sid = "SHIPSIM:2580:1197055707:93"
User = "SYSTEM@nt authority"
ValidCommands = "60000,60001,60008"
12/7 14:28:27 SECMAN: negotiating security for command 60008.
12/7 14:28:27 SECMAN: UDP, have_session == 1, can_neg == 1
12/7 14:28:27 SECMAN: UDP has session SHIPSIM:2580:1197055707:93.
12/7 14:28:27 SECMAN: about to enable message authenticator.
12/7 14:28:27 SECMAN: successfully enabled message authenticator!
12/7 14:28:27 SECMAN: about to enable encryption.
12/7 14:28:27 set_encryption_id: setting key length 49
12/7 14:28:27 SECMAN: successfully enabled encryption!
12/7 14:28:27 SECMAN: sending DC_AUTHENTICATE command
12/7 14:28:27 SECMAN: sending following classad:
MyType = ""
TargetType = ""
OutgoingNegotiation = "REQUIRED"
Subsystem = "CREDD"
ParentUniqueID = "SHIPSIM:2580:1196980658"
ServerPid = 2584
SessionDuration = "8640000"
AuthCommand = 60008
Enact = "YES"
AuthMethodsList = "NTSSPI"
AuthMethods = "NTSSPI"
CryptoMethods = "3DES,BLOWFISH"
Authentication = "YES"
Encryption = "YES"
Integrity = "YES"
UseSession = "YES"
Sid = "SHIPSIM:2580:1197055707:93"
User = "SYSTEM@nt authority"
ValidCommands = "60000,60001,60008"
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
ServerCommandSock = "<128.244.140.226:9620>"
Command = 60008
12/7 14:28:27 SECMAN: startCommand succeeded.
12/7 14:28:27 DaemonCore: Leaving SendAliveToParent() - success
12/7 14:29:01 DC_AUTHENTICATE: received DC_AUTHENTICATE from <128.244.140.110:1220>
12/7 14:29:01 DC_AUTHENTICATE: received following ClassAd:
MyType = "(unknown type)"
TargetType = "(unknown type)"
AuthMethods = "NTSSPI, PASSWORD"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
Authentication = "OPTIONAL"
Encryption = "OPTIONAL"
Integrity = "OPTIONAL"
Enact = "NO"
Subsystem = "STARTER"
ParentUniqueID = "icad3:2696:1197062940"
ServerPid = 2680
SessionDuration = "8640000"
NewSession = "YES"
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
Command = 81100
12/7 14:29:01 DC_AUTHENTICATE: our_policy:
MyType = ""
TargetType = ""
AuthMethods = "PASSWORD"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "REQUIRED"
Authentication = "REQUIRED"
Encryption = "REQUIRED"
Integrity = "REQUIRED"
Enact = "NO"
Subsystem = "CREDD"
ParentUniqueID = "SHIPSIM:2580:1196980658"
ServerPid = 2584
SessionDuration = "8640000"
12/7 14:29:01 DC_AUTHENTICATE: the_policy:
MyType = ""
TargetType = ""
Authentication = "YES"
Encryption = "YES"
Integrity = "YES"
AuthMethodsList = "PASSWORD"
AuthMethods = "PASSWORD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "8640000"
Enact = "YES"
12/7 14:29:01 DC_AUTHENTICATE: generating 3DES key for session SHIPSIM:2584:1197055741:0...
12/7 14:29:01 SECMAN: Sending following response ClassAd:
MyType = ""
TargetType = ""
Authentication = "YES"
Encryption = "YES"
Integrity = "YES"
AuthMethodsList = "PASSWORD"
AuthMethods = "PASSWORD"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "8640000"
Enact = "YES"
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
12/7 14:29:01 SECMAN: new session, doing initial authentication.
12/7 14:29:01 DC_AUTHENTICATE: authenticating RIGHT NOW.
12/7 14:29:01 AUTHENTICATE: in authenticate( addr == NULL, methods == 'PASSWORD')
12/7 14:29:01 AUTHENTICATE: can still try these methods: PASSWORD
12/7 14:29:01 HANDSHAKE: in handshake(my_methods = 'PASSWORD')
12/7 14:29:01 HANDSHAKE: handshake() - i am the server
12/7 14:29:01 HANDSHAKE: client sent (methods == 512)
12/7 14:29:01 HANDSHAKE: i picked (method == 512)
12/7 14:29:01 HANDSHAKE: client received (method == 512)
12/7 14:29:01 AUTHENTICATE: will try to use 512 (PASSWORD)
12/7 14:29:01 PW.
12/7 14:29:01 PW: Server receiving 1.
12/7 14:29:02 Received: 0, 27(condor_pool@xxxxxxxxxxxxxxx), 256
12/7 14:29:02 PW: Server fetching password.
12/7 14:29:02 Found credential for user 'condor_pool'
12/7 14:29:02 Found credential for user 'condor_pool'
12/7 14:29:02 PW: Server generating rb.
12/7 14:29:02 PW: Server sending.
12/7 14:29:02 In server_send: 0.
12/7 14:29:02 Calculating hkt 'condor_pool@xxxxxxxxxxxxxxx' (27), 'condor_pool@xxxxxxxxxxxxxxx' (27).
12/7 14:29:02 Server send 'condor_pool@xxxxxxxxxxxxxxx', 'condor_pool@xxxxxxxxxxxxxxx', 256 256 20
12/7 14:29:02 PW: Server receiving 2.
12/7 14:29:02 condor_read(): recv() returned -1, errno = 10054, assuming failure reading 5 bytes from <128.244.140.110:1220>.
12/7 14:29:02 IO: Failed to read packet header
12/7 14:29:02 Error communicating with client.  Aborting...
12/7 14:29:02 AUTHENTICATE: method 512 (PASSWORD) failed.
12/7 14:29:02 AUTHENTICATE: can still try these methods: PASSWORD
12/7 14:29:02 HANDSHAKE: in handshake(my_methods = 'PASSWORD')
12/7 14:29:02 HANDSHAKE: handshake() - i am the server
12/7 14:29:02 condor_read(): recv() returned -1, errno = 10054, assuming failure reading 5 bytes from <128.244.140.110:1220>.
12/7 14:29:02 IO: Failed to read packet header
12/7 14:29:02 AUTHENTICATE: handshake failed!
12/7 14:29:02 AUTHENTICATE: auth_status == 0 (?!?)
12/7 14:29:02 Authentication was a FAILURE.
12/7 14:29:02 DC_AUTHENTICATE: authenticate failed: AUTHENTICATE:1002:Failure performing handshake|AUTHENTICATE:1004:Failed to authenticate using PASSWORD
12/7 14:29:24 DC_AUTHENTICATE: received DC_AUTHENTICATE from <128.244.140.226:2859>
12/7 14:29:24 DC_AUTHENTICATE: received following ClassAd:
MyType = "(unknown type)"
TargetType = "(unknown type)"
AuthMethods = "NTSSPI, PASSWORD"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
Authentication = "OPTIONAL"
Encryption = "OPTIONAL"
Integrity = "OPTIONAL"
Enact = "NO"
Subsystem = "MASTER"
ServerPid = 2580
SessionDuration = "8640000"
NewSession = "YES"
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
ServerCommandSock = "<128.244.140.226:2833>"
Command = 60010
AuthCommand = 60000
12/7 14:29:24 DC_AUTHENTICATE: our_policy:
MyType = ""
TargetType = ""
AuthMethods = "NTSSPI"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "REQUIRED"
Authentication = "REQUIRED"
Encryption = "REQUIRED"
Integrity = "REQUIRED"
Enact = "NO"
Subsystem = "CREDD"
ParentUniqueID = "SHIPSIM:2580:1196980658"
ServerPid = 2584
SessionDuration = "8640000"
12/7 14:29:24 DC_AUTHENTICATE: the_policy:
MyType = ""
TargetType = ""
Authentication = "YES"
Encryption = "YES"
Integrity = "YES"
AuthMethodsList = "NTSSPI"
AuthMethods = "NTSSPI"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "8640000"
Enact = "YES"
12/7 14:29:24 DC_AUTHENTICATE: generating 3DES key for session SHIPSIM:2584:1197055764:1...
12/7 14:29:24 SECMAN: Sending following response ClassAd:
MyType = ""
TargetType = ""
Authentication = "YES"
Encryption = "YES"
Integrity = "YES"
AuthMethodsList = "NTSSPI"
AuthMethods = "NTSSPI"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "8640000"
Enact = "YES"
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
12/7 14:29:24 SECMAN: new session, doing initial authentication.
12/7 14:29:24 DC_AUTHENTICATE: authenticating RIGHT NOW.
12/7 14:29:24 AUTHENTICATE: in authenticate( addr == NULL, methods == 'NTSSPI')
12/7 14:29:24 AUTHENTICATE: can still try these methods: NTSSPI
12/7 14:29:24 HANDSHAKE: in handshake(my_methods = 'NTSSPI')
12/7 14:29:24 HANDSHAKE: handshake() - i am the server
12/7 14:29:24 HANDSHAKE: client sent (methods == 16)
12/7 14:29:24 HANDSHAKE: i picked (method == 16)
12/7 14:29:24 HANDSHAKE: client received (method == 16)
12/7 14:29:24 AUTHENTICATE: will try to use 16 (NTSSPI)
12/7 14:29:24 sspi_server_auth() entered
12/7 14:29:24 sspi_server_auth() looping
12/7 14:29:24 sspi_server_auth(): user name is: "SYSTEM"
12/7 14:29:24 sspi_server_auth(): domain name is: "NT AUTHORITY"
12/7 14:29:24 sspi_server_auth() exiting
12/7 14:29:24 AUTHENTICATE: auth_status == 16 (NTSSPI)
12/7 14:29:24 Authentication was a Success.
12/7 14:29:24 ZKM: setting default map to SYSTEM@nt authority
12/7 14:29:24 ZKM: post-map: current user is 'SYSTEM'
12/7 14:29:24 ZKM: post-map: current domain is 'nt authority'
12/7 14:29:24 ZKM: post-map: current FQU is 'SYSTEM@nt authority'
12/7 14:29:24 Condor_Auth_SSPI::wrap() - input_len=24 output_len=40
12/7 14:29:24 DC_AUTHENTICATE: mutual authentication to 128.244.140.226 complete.
12/7 14:29:24 DC_AUTHENTICATE: message authenticator enabled with key id SHIPSIM:2584:1197055764:1.
12/7 14:29:24 DC_AUTHENTICATE: encryption enabled for session SHIPSIM:2584:1197055764:1
12/7 14:29:24 DC_AUTHENTICATE: sending session ad:
MyType = ""
TargetType = ""
User = "SYSTEM@nt authority"
Sid = "SHIPSIM:2584:1197055764:1"
ValidCommands = "60000,60001,60008"
12/7 14:29:24 DC_AUTHENTICATE: sent session SHIPSIM:2584:1197055764:1 info!
12/7 14:29:24 DC_AUTHENTICATE: added incoming session id SHIPSIM:2584:1197055764:1 to cache for 8640000 seconds (return address is <128.244.140.226:2833>).
MyType = ""
TargetType = ""
Authentication = "YES"
Encryption = "YES"
Integrity = "YES"
AuthMethodsList = "NTSSPI"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "8640000"
Enact = "YES"
AuthMethods = "NTSSPI"
Subsystem = "MASTER"
ServerCommandSock = "<128.244.140.226:2833>"
ServerPid = 2580
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
User = "SYSTEM@nt authority"
Sid = "SHIPSIM:2584:1197055764:1"
ValidCommands = "60000,60001,60008"
12/7 14:29:24 DC_AUTHENTICATE: received UDP packet from <128.244.140.226:2858>.
12/7 14:29:24 DC_AUTHENTICATE: packet from <128.244.140.226:2833> uses MD5 session SHIPSIM:2584:1197055764:1.
12/7 14:29:24 MD verified!
12/7 14:29:24 DC_AUTHENTICATE: message authenticator enabled with key id SHIPSIM:2584:1197055764:1.
12/7 14:29:24 DC_AUTHENTICATE: packet from <128.244.140.226:2833> uses crypto session SHIPSIM:2584:1197055764:1.
12/7 14:29:24 DC_AUTHENTICATE: encryption enabled with key id SHIPSIM:2584:1197055764:1.
12/7 14:29:24 DC_AUTHENTICATE: authenticated UDP message is from SYSTEM@nt authority.
12/7 14:29:24 DC_AUTHENTICATE: received DC_AUTHENTICATE from <128.244.140.226:2858>
12/7 14:29:24 DC_AUTHENTICATE: received following ClassAd:
MyType = "(unknown type)"
TargetType = "(unknown type)"
OutgoingNegotiation = "PREFERRED"
Subsystem = "MASTER"
ServerPid = 2580
SessionDuration = "8640000"
AuthCommand = 60000
Enact = "YES"
AuthMethodsList = "NTSSPI"
AuthMethods = "NTSSPI"
CryptoMethods = "3DES,BLOWFISH"
Authentication = "YES"
Encryption = "YES"
Integrity = "YES"
UseSession = "YES"
Sid = "SHIPSIM:2584:1197055764:1"
User = "SYSTEM@nt authority"
ValidCommands = "60000,60001,60008"
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
ServerCommandSock = "<128.244.140.226:2833>"
Command = 60000
12/7 14:29:24 DC_AUTHENTICATE: resuming session id SHIPSIM:2584:1197055764:1 with return address <128.244.140.226:2833>:
12/7 14:29:24 DC_AUTHENTICATE: Cached Session:
MyType = ""
TargetType = ""
Authentication = "YES"
Encryption = "YES"
Integrity = "YES"
AuthMethodsList = "NTSSPI"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "8640000"
Enact = "YES"
AuthMethods = "NTSSPI"
Subsystem = "MASTER"
ServerCommandSock = "<128.244.140.226:2833>"
ServerPid = 2580
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
User = "SYSTEM@nt authority"
Sid = "SHIPSIM:2584:1197055764:1"
ValidCommands = "60000,60001,60008"
12/7 14:29:24 DC_AUTHENTICATE: setting sock->decode()
12/7 14:29:24 DC_AUTHENTICATE: allowing an empty message for sock.
12/7 14:29:24 DC_AUTHENTICATE: Success.
12/7 14:29:24 Got SIGTERM. Performing graceful shutdown.
12/7 14:29:24 Started timer to call main_shutdown_fast in 1800 seconds
12/7 14:29:24 main_shutdown_graceful() called
12/7 14:29:24 Trying to update collector <128.244.140.226:9618>
12/7 14:29:24 Attempting to send update via UDP to collector SHIPSIM.dom1.jhuapl.edu <128.244.140.226:9618>
12/7 14:29:24 STARTCOMMAND: starting 59 to <128.244.140.226:9618> on UDP port 2863.
12/7 14:29:24 SECMAN: command 59 to <128.244.140.226:9618> on UDP port 2863 (non-blocking).
12/7 14:29:24 SECMAN: using session SHIPSIM:1644:1197055706:0 for {<128.244.140.226:9618>,<59>}.
12/7 14:29:24 SECMAN: found cached session id SHIPSIM:1644:1197055706:0 for {<128.244.140.226:9618>,<59>}.
MyType = ""
TargetType = ""
OutgoingNegotiation = "REQUIRED"
Subsystem = "CREDD"
ParentUniqueID = "SHIPSIM:2580:1196980658"
ServerPid = 2584
SessionDuration = "8640000"
ServerCommandSock = "<128.244.140.226:9620>"
Command = 60010
AuthCommand = 58
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
Enact = "YES"
AuthMethodsList = "NTSSPI"
AuthMethods = "NTSSPI"
CryptoMethods = "3DES,BLOWFISH"
Authentication = "YES"
Encryption = "YES"
Integrity = "YES"
UseSession = "YES"
Sid = "SHIPSIM:1644:1197055706:0"
User = "SYSTEM@nt authority"
ValidCommands = "4,17,21,42,44,45,47,52,54,55,57,58,59,60017,60004,5,6,7,9,12,43,46,48,50,53,56,60007,60011,457"
12/7 14:29:24 SECMAN: Security Policy:
MyType = ""
TargetType = ""
OutgoingNegotiation = "REQUIRED"
Subsystem = "CREDD"
ParentUniqueID = "SHIPSIM:2580:1196980658"
ServerPid = 2584
SessionDuration = "8640000"
ServerCommandSock = "<128.244.140.226:9620>"
Command = 60010
AuthCommand = 58
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
Enact = "YES"
AuthMethodsList = "NTSSPI"
AuthMethods = "NTSSPI"
CryptoMethods = "3DES,BLOWFISH"
Authentication = "YES"
Encryption = "YES"
Integrity = "YES"
UseSession = "YES"
Sid = "SHIPSIM:1644:1197055706:0"
User = "SYSTEM@nt authority"
ValidCommands = "4,17,21,42,44,45,47,52,54,55,57,58,59,60017,60004,5,6,7,9,12,43,46,48,50,53,56,60007,60011,457"
12/7 14:29:24 SECMAN: negotiating security for command 59.
12/7 14:29:24 SECMAN: UDP, have_session == 1, can_neg == 1
12/7 14:29:24 SECMAN: UDP has session SHIPSIM:1644:1197055706:0.
12/7 14:29:24 SECMAN: about to enable message authenticator.
12/7 14:29:24 SECMAN: successfully enabled message authenticator!
12/7 14:29:24 SECMAN: about to enable encryption.
12/7 14:29:24 set_encryption_id: setting key length 48
12/7 14:29:24 SECMAN: successfully enabled encryption!
12/7 14:29:24 SECMAN: sending DC_AUTHENTICATE command
12/7 14:29:24 SECMAN: sending following classad:
MyType = ""
TargetType = ""
OutgoingNegotiation = "REQUIRED"
Subsystem = "CREDD"
ParentUniqueID = "SHIPSIM:2580:1196980658"
ServerPid = 2584
SessionDuration = "8640000"
AuthCommand = 58
Enact = "YES"
AuthMethodsList = "NTSSPI"
AuthMethods = "NTSSPI"
CryptoMethods = "3DES,BLOWFISH"
Authentication = "YES"
Encryption = "YES"
Integrity = "YES"
UseSession = "YES"
Sid = "SHIPSIM:1644:1197055706:0"
User = "SYSTEM@nt authority"
ValidCommands = "4,17,21,42,44,45,47,52,54,55,57,58,59,60017,60004,5,6,7,9,12,43,46,48,50,53,56,60007,60011,457"
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
ServerCommandSock = "<128.244.140.226:9620>"
Command = 59
12/7 14:29:24 SECMAN: startCommand succeeded.
12/7 14:29:24 KEYCACHEENTRY: deleted: 00B58548
12/7 14:29:24 KEYCACHEENTRY: deleted: 00B5A768
12/7 14:29:24 KEYCACHEENTRY: deleted: 00B58640
12/7 14:29:24 KEYCACHE: deleted: 00A96EC8
12/7 14:29:24 **** condor_credd.exe (condor_CREDD) EXITING WITH STATUS 0
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
 
Now, this is the slave's StartLog (ICAD3.dom1.jhuapl.edu machine):
 
12/7 14:29:00 KEYCACHE: created: 00C15048
12/7 14:29:00 ******************************************************
12/7 14:29:00 ** condor_startd.exe (CONDOR_STARTD) STARTING UP
12/7 14:29:00 ** C:\condor\bin\condor_startd.exe
12/7 14:29:00 ** $CondorVersion: 6.9.5 Nov 28 2007 $
12/7 14:29:00 ** $CondorPlatform: INTEL-WINNT50 $
12/7 14:29:00 ** PID = 2696
12/7 14:29:00 ** Log last touched time unavailable (No such file or directory)
12/7 14:29:00 ******************************************************
12/7 14:29:00 Using config source: C:\condor\condor_config
12/7 14:29:00 Using local config sources:
12/7 14:29:00    C:\condor/condor_config.local
12/7 14:29:00 DaemonCore: Command Socket at <128.244.140.110:1219>
12/7 14:29:00 IPVERIFY: allow READ : *,  (from config value HOSTALLOW_READ_STARTD)
12/7 14:29:00 IPVERIFY: allow WRITE : *,  (from config value HOSTALLOW_WRITE_STARTD)
12/7 14:29:00 IPVERIFY: allow NEGOTIATOR : SHIPSIM.dom1.jhuapl.edu (from config value HOSTALLOW_NEGOTIATOR)
12/7 14:29:00 IPVERIFY: successfully resolved and added SHIPSIM.dom1.jhuapl.edu to NEGOTIATOR
12/7 14:29:00 IPVERIFY: allow ADMINISTRATOR : icad3.dom1.jhuapl.edu (from config value HOSTALLOW_ADMINISTRATOR)
12/7 14:29:00 IPVERIFY: successfully resolved and added icad3.dom1.jhuapl.edu to ADMINISTRATOR
12/7 14:29:00 IPVERIFY: allow OWNER : icad3.dom1.jhuapl.edu, icad3.dom1.jhuapl.edu (from config value HOSTALLOW_OWNER)
12/7 14:29:00 IPVERIFY: successfully resolved and added icad3.dom1.jhuapl.edu to OWNER
12/7 14:29:00 IPVERIFY: successfully resolved and added icad3.dom1.jhuapl.edu to OWNER
12/7 14:29:00 IPVERIFY: allow CONFIG : SHIPSIM.dom1.jhuapl.edu, icad3.dom1.jhuapl.edu (from config value HOSTALLOW_CONFIG)
12/7 14:29:00 IPVERIFY: successfully resolved and added SHIPSIM.dom1.jhuapl.edu to CONFIG
12/7 14:29:00 IPVERIFY: successfully resolved and added icad3.dom1.jhuapl.edu to CONFIG
12/7 14:29:00 IPVERIFY: allow DAEMON : *,  (from config value HOSTALLOW_WRITE_STARTD)
12/7 14:29:00 IPVERIFY: allow ADVERTISE_STARTD : *,  (from config value HOSTALLOW_WRITE_STARTD)
12/7 14:29:00 IPVERIFY: allow ADVERTISE_SCHEDD : *,  (from config value HOSTALLOW_WRITE_STARTD)
12/7 14:29:00 IPVERIFY: allow ADVERTISE_MASTER : *,  (from config value HOSTALLOW_WRITE_STARTD)
12/7 14:29:00 Will use UDP to update collector SHIPSIM.dom1.jhuapl.edu <128.244.140.226:9618>
12/7 14:29:00 Memory: Detected 1535 megs RAM
12/7 14:29:00 MachAttributes::publish: failed to get Windows version information
12/7 14:29:01 my_popen: CreateProcess failed
12/7 14:29:01 Failed to execute C:\condor/bin/condor_starter.pvm.exe, ignoring
12/7 14:29:01 my_popen: CreateProcess failed
12/7 14:29:01 Failed to execute C:\condor/bin/condor_starter.std.exe, ignoring
12/7 14:29:01 command_x_event() called.
12/7 14:29:01 slot1: New machine resource allocated
12/7 14:29:01 slot2: New machine resource allocated
12/7 14:29:01 UidDomain = "dom1.jhuapl.edu"
12/7 14:29:01 FileSystemDomain = "icad3.dom1.jhuapl.edu"
12/7 14:29:01 Subnet = "128.244.140"
12/7 14:29:01 Swap space: 2962684
12/7 14:29:06 no loadavg samples this minute, maybe thread died???
12/7 14:29:06 Looking up RESERVED_DISK parameter
12/7 14:29:06 Reserving 5120 kbytes for file system
12/7 14:29:06 slot1: Total execute space: 48702400
12/7 14:29:06 Looking up RESERVED_DISK parameter
12/7 14:29:06 Reserving 5120 kbytes for file system
12/7 14:29:06 slot2: Total execute space: 48702400
12/7 14:29:06 About to run initial benchmarks.
12/7 14:29:06 About to compute mips
12/7 14:29:06 Computed mips: 2804
12/7 14:29:06 About to compute kflops
12/7 14:29:10 Computed kflops: 870300
12/7 14:29:10 recalc:DHRY_MIPS=2804, CLINPACK KFLOPS=870300
12/7 14:29:10 Completed initial benchmarks.
12/7 14:29:10 CronMgr: Constructing 'startd'
12/7 14:29:10 CronMgr: Setting name to 'startd'
12/7 14:29:10 CronMgr: Setting parameter base to 'startd'
12/7 14:29:10 CronMgr: Doing config (initial)
12/7 14:29:10 command_x_event() called.
12/7 14:29:10 slot2: State change: IS_OWNER is false
12/7 14:29:10 slot2: Changing state: Owner -> Unclaimed
12/7 14:29:10 slot1: State change: IS_OWNER is false
12/7 14:29:10 slot1: Changing state: Owner -> Unclaimed
12/7 14:29:10 Getting monitoring info for pid 2696
12/7 14:29:10 DaemonCore: in SendAliveToParent()
12/7 14:29:10 STARTCOMMAND: starting 60008 to <128.244.140.110:1182> on UDP port 1222.
12/7 14:29:10 SECMAN: command 60008 to <128.244.140.110:1182> on UDP port 1222 (blocking).
12/7 14:29:10 SECMAN: no cached key for {<128.244.140.110:1182>,<60008>}.
12/7 14:29:10 SECMAN: Security Policy:
MyType = ""
TargetType = ""
AuthMethods = "NTSSPI, PASSWORD"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
Authentication = "OPTIONAL"
Encryption = "OPTIONAL"
Integrity = "OPTIONAL"
Enact = "NO"
Subsystem = "STARTD"
ParentUniqueID = "icad3:3892:1197062762"
ServerPid = 2696
SessionDuration = "8640000"
12/7 14:29:10 SECMAN: negotiating security for command 60008.
12/7 14:29:10 SECMAN: need to start a session via TCP
12/7 14:29:10 SECMAN: setting timeout to 20 seconds.
12/7 14:29:10 SECMAN: command 60010 to <128.244.140.110:1182> on TCP port 1223 (blocking).
12/7 14:29:10 SECMAN: no cached key for {<128.244.140.110:1182>,<60010>}.
12/7 14:29:10 SECMAN: Security Policy:
MyType = ""
TargetType = ""
AuthMethods = "NTSSPI, PASSWORD"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
Authentication = "OPTIONAL"
Encryption = "OPTIONAL"
Integrity = "OPTIONAL"
Enact = "NO"
Subsystem = "STARTD"
ParentUniqueID = "icad3:3892:1197062762"
ServerPid = 2696
SessionDuration = "8640000"
NewSession = "YES"
12/7 14:29:10 SECMAN: negotiating security for command 60010.
12/7 14:29:10 SECMAN: sending DC_AUTHENTICATE command
12/7 14:29:10 SECMAN: sending following classad:
MyType = ""
TargetType = ""
AuthMethods = "NTSSPI, PASSWORD"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
Authentication = "OPTIONAL"
Encryption = "OPTIONAL"
Integrity = "OPTIONAL"
Enact = "NO"
Subsystem = "STARTD"
ParentUniqueID = "icad3:3892:1197062762"
ServerPid = 2696
SessionDuration = "8640000"
NewSession = "YES"
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
ServerCommandSock = "<128.244.140.110:1219>"
Command = 60010
AuthCommand = 60008
12/7 14:29:10 SECMAN: server responded with:
MyType = "(unknown type)"
TargetType = "(unknown type)"
Authentication = "NO"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI"
AuthMethods = "NTSSPI"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "8640000"
Enact = "YES"
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
12/7 14:29:10 SECMAN: received post-auth classad:
MyType = "(unknown type)"
TargetType = "(unknown type)"
Sid = "icad3:3892:1197062950:3"
ValidCommands = "60000,60001,60008"
12/7 14:29:10 SECMAN: policy to be cached:
MyType = ""
TargetType = ""
OutgoingNegotiation = "PREFERRED"
Subsystem = "STARTD"
ParentUniqueID = "icad3:3892:1197062762"
ServerPid = 2696
SessionDuration = "8640000"
ServerCommandSock = "<128.244.140.110:1219>"
Command = 60010
AuthCommand = 60008
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
Enact = "YES"
AuthMethodsList = "NTSSPI"
AuthMethods = "NTSSPI"
CryptoMethods = "3DES,BLOWFISH"
Authentication = "NO"
Encryption = "NO"
Integrity = "NO"
UseSession = "YES"
Sid = "icad3:3892:1197062950:3"
ValidCommands = "60000,60001,60008"
12/7 14:29:10 SECMAN: added session icad3:3892:1197062950:3 to cache for 8640000 seconds.
12/7 14:29:10 SECMAN: command {<128.244.140.110:1182>,<60000>} mapped to session icad3:3892:1197062950:3.
12/7 14:29:10 SECMAN: command {<128.244.140.110:1182>,<60001>} mapped to session icad3:3892:1197062950:3.
12/7 14:29:10 SECMAN: command {<128.244.140.110:1182>,<60008>} mapped to session icad3:3892:1197062950:3.
12/7 14:29:10 SECMAN: startCommand succeeded.
12/7 14:29:10 SECMAN: sending eom() and closing TCP sock.
12/7 14:29:10 SECMAN: succesfully sent NOP via TCP!
12/7 14:29:10 SECMAN: resuming command 60008 to <128.244.140.110:1182> on UDP port 1222 (blocking).
12/7 14:29:10 SECMAN: using session icad3:3892:1197062950:3 for {<128.244.140.110:1182>,<60008>}.
12/7 14:29:10 SECMAN: found cached session id icad3:3892:1197062950:3 for {<128.244.140.110:1182>,<60008>}.
MyType = ""
TargetType = ""
OutgoingNegotiation = "PREFERRED"
Subsystem = "STARTD"
ParentUniqueID = "icad3:3892:1197062762"
ServerPid = 2696
SessionDuration = "8640000"
ServerCommandSock = "<128.244.140.110:1219>"
Command = 60010
AuthCommand = 60008
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
Enact = "YES"
AuthMethodsList = "NTSSPI"
AuthMethods = "NTSSPI"
CryptoMethods = "3DES,BLOWFISH"
Authentication = "NO"
Encryption = "NO"
Integrity = "NO"
UseSession = "YES"
Sid = "icad3:3892:1197062950:3"
ValidCommands = "60000,60001,60008"
12/7 14:29:10 SECMAN: Security Policy:
MyType = ""
TargetType = ""
OutgoingNegotiation = "PREFERRED"
Subsystem = "STARTD"
ParentUniqueID = "icad3:3892:1197062762"
ServerPid = 2696
SessionDuration = "8640000"
ServerCommandSock = "<128.244.140.110:1219>"
Command = 60010
AuthCommand = 60008
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
Enact = "YES"
AuthMethodsList = "NTSSPI"
AuthMethods = "NTSSPI"
CryptoMethods = "3DES,BLOWFISH"
Authentication = "NO"
Encryption = "NO"
Integrity = "NO"
UseSession = "YES"
Sid = "icad3:3892:1197062950:3"
ValidCommands = "60000,60001,60008"
12/7 14:29:10 SECMAN: negotiating security for command 60008.
12/7 14:29:10 SECMAN: UDP, have_session == 1, can_neg == 1
12/7 14:29:10 SECMAN: UDP has session icad3:3892:1197062950:3.
12/7 14:29:10 SECMAN: sending DC_AUTHENTICATE command
12/7 14:29:10 SECMAN: sending following classad:
MyType = ""
TargetType = ""
OutgoingNegotiation = "PREFERRED"
Subsystem = "STARTD"
ParentUniqueID = "icad3:3892:1197062762"
ServerPid = 2696
SessionDuration = "8640000"
AuthCommand = 60008
Enact = "YES"
AuthMethodsList = "NTSSPI"
AuthMethods = "NTSSPI"
CryptoMethods = "3DES,BLOWFISH"
Authentication = "NO"
Encryption = "NO"
Integrity = "NO"
UseSession = "YES"
Sid = "icad3:3892:1197062950:3"
ValidCommands = "60000,60001,60008"
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
ServerCommandSock = "<128.244.140.110:1219>"
Command = 60008
12/7 14:29:10 SECMAN: startCommand succeeded.
12/7 14:29:10 DaemonCore: Leaving SendAliveToParent() - success
12/7 14:29:14 Trying to update collector <128.244.140.226:9618>
12/7 14:29:14 Attempting to send update via UDP to collector SHIPSIM.dom1.jhuapl.edu <128.244.140.226:9618>
12/7 14:29:14 STARTCOMMAND: starting 0 to <128.244.140.226:9618> on UDP port 1224.
12/7 14:29:14 SECMAN: command 0 to <128.244.140.226:9618> on UDP port 1224 (non-blocking).
12/7 14:29:14 SECMAN: no cached key for {<128.244.140.226:9618>,<0>}.
12/7 14:29:14 SECMAN: Security Policy:
MyType = ""
TargetType = ""
AuthMethods = "NTSSPI, PASSWORD"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
Authentication = "OPTIONAL"
Encryption = "OPTIONAL"
Integrity = "OPTIONAL"
Enact = "NO"
Subsystem = "STARTD"
ParentUniqueID = "icad3:3892:1197062762"
ServerPid = 2696
SessionDuration = "8640000"
12/7 14:29:14 SECMAN: negotiating security for command 0.
12/7 14:29:14 SECMAN: need to start a session via TCP
12/7 14:29:14 SECMAN: setting timeout to 20 seconds.
12/7 14:29:14 File descriptor limits: max 1024, safe 820
12/7 14:29:14 slot1: Sent update to 1 collector(s)
12/7 14:29:14 Non-blocking connection for TCP authentication to <128.244.140.226:9618> finished (connected=1)
12/7 14:29:14 SECMAN: command 60010 to <128.244.140.226:9618> on TCP port 1225 (blocking).
12/7 14:29:14 SECMAN: no cached key for {<128.244.140.226:9618>,<60010>}.
12/7 14:29:14 SECMAN: Security Policy:
MyType = ""
TargetType = ""
AuthMethods = "NTSSPI, PASSWORD"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
Authentication = "OPTIONAL"
Encryption = "OPTIONAL"
Integrity = "OPTIONAL"
Enact = "NO"
Subsystem = "STARTD"
ParentUniqueID = "icad3:3892:1197062762"
ServerPid = 2696
SessionDuration = "8640000"
NewSession = "YES"
12/7 14:29:14 SECMAN: negotiating security for command 60010.
12/7 14:29:14 SECMAN: sending DC_AUTHENTICATE command
12/7 14:29:14 SECMAN: sending following classad:
MyType = ""
TargetType = ""
AuthMethods = "NTSSPI, PASSWORD"
CryptoMethods = "3DES,BLOWFISH"
OutgoingNegotiation = "PREFERRED"
Authentication = "OPTIONAL"
Encryption = "OPTIONAL"
Integrity = "OPTIONAL"
Enact = "NO"
Subsystem = "STARTD"
ParentUniqueID = "icad3:3892:1197062762"
ServerPid = 2696
SessionDuration = "8640000"
NewSession = "YES"
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
ServerCommandSock = "<128.244.140.110:1219>"
Command = 60010
AuthCommand = 0
12/7 14:29:14 SECMAN: server responded with:
MyType = "(unknown type)"
TargetType = "(unknown type)"
Authentication = "NO"
Encryption = "NO"
Integrity = "NO"
AuthMethodsList = "NTSSPI"
AuthMethods = "NTSSPI"
CryptoMethods = "3DES,BLOWFISH"
SessionDuration = "8640000"
Enact = "YES"
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
12/7 14:29:14 SECMAN: received post-auth classad:
MyType = "(unknown type)"
TargetType = "(unknown type)"
Sid = "SHIPSIM:1644:1197055755:4"
ValidCommands = "0,13"
12/7 14:29:14 SECMAN: policy to be cached:
MyType = ""
TargetType = ""
OutgoingNegotiation = "PREFERRED"
Subsystem = "STARTD"
ParentUniqueID = "icad3:3892:1197062762"
ServerPid = 2696
SessionDuration = "8640000"
ServerCommandSock = "<128.244.140.110:1219>"
Command = 60010
AuthCommand = 0
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
Enact = "YES"
AuthMethodsList = "NTSSPI"
AuthMethods = "NTSSPI"
CryptoMethods = "3DES,BLOWFISH"
Authentication = "NO"
Encryption = "NO"
Integrity = "NO"
UseSession = "YES"
Sid = "SHIPSIM:1644:1197055755:4"
ValidCommands = "0,13"
12/7 14:29:14 SECMAN: added session SHIPSIM:1644:1197055755:4 to cache for 8640000 seconds.
12/7 14:29:14 SECMAN: command {<128.244.140.226:9618>,<0>} mapped to session SHIPSIM:1644:1197055755:4.
12/7 14:29:14 SECMAN: command {<128.244.140.226:9618>,<13>} mapped to session SHIPSIM:1644:1197055755:4.
12/7 14:29:14 SECMAN: startCommand succeeded.
12/7 14:29:14 SECMAN: sending eom() and closing TCP sock.
12/7 14:29:14 SECMAN: succesfully sent NOP via TCP!
12/7 14:29:14 SECMAN: resuming command 0 to <128.244.140.226:9618> on UDP port 1224 (non-blocking).
12/7 14:29:14 SECMAN: using session SHIPSIM:1644:1197055755:4 for {<128.244.140.226:9618>,<0>}.
12/7 14:29:14 SECMAN: found cached session id SHIPSIM:1644:1197055755:4 for {<128.244.140.226:9618>,<0>}.
MyType = ""
TargetType = ""
OutgoingNegotiation = "PREFERRED"
Subsystem = "STARTD"
ParentUniqueID = "icad3:3892:1197062762"
ServerPid = 2696
SessionDuration = "8640000"
ServerCommandSock = "<128.244.140.110:1219>"
Command = 60010
AuthCommand = 0
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
Enact = "YES"
AuthMethodsList = "NTSSPI"
AuthMethods = "NTSSPI"
CryptoMethods = "3DES,BLOWFISH"
Authentication = "NO"
Encryption = "NO"
Integrity = "NO"
UseSession = "YES"
Sid = "SHIPSIM:1644:1197055755:4"
ValidCommands = "0,13"
12/7 14:29:14 SECMAN: Security Policy:
MyType = ""
TargetType = ""
OutgoingNegotiation = "PREFERRED"
Subsystem = "STARTD"
ParentUniqueID = "icad3:3892:1197062762"
ServerPid = 2696
SessionDuration = "8640000"
ServerCommandSock = "<128.244.140.110:1219>"
Command = 60010
AuthCommand = 0
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
Enact = "YES"
AuthMethodsList = "NTSSPI"
AuthMethods = "NTSSPI"
CryptoMethods = "3DES,BLOWFISH"
Authentication = "NO"
Encryption = "NO"
Integrity = "NO"
UseSession = "YES"
Sid = "SHIPSIM:1644:1197055755:4"
ValidCommands = "0,13"
12/7 14:29:14 SECMAN: negotiating security for command 0.
12/7 14:29:14 SECMAN: UDP, have_session == 1, can_neg == 1
12/7 14:29:14 SECMAN: UDP has session SHIPSIM:1644:1197055755:4.
12/7 14:29:14 SECMAN: sending DC_AUTHENTICATE command
12/7 14:29:14 SECMAN: sending following classad:
MyType = ""
TargetType = ""
OutgoingNegotiation = "PREFERRED"
Subsystem = "STARTD"
ParentUniqueID = "icad3:3892:1197062762"
ServerPid = 2696
SessionDuration = "8640000"
AuthCommand = 0
Enact = "YES"
AuthMethodsList = "NTSSPI"
AuthMethods = "NTSSPI"
CryptoMethods = "3DES,BLOWFISH"
Authentication = "NO"
Encryption = "NO"
Integrity = "NO"
UseSession = "YES"
Sid = "SHIPSIM:1644:1197055755:4"
ValidCommands = "0,13"
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
ServerCommandSock = "<128.244.140.110:1219>"
Command = 0
12/7 14:29:14 SECMAN: startCommand succeeded.
12/7 14:29:15 Trying to update collector <128.244.140.226:9618>
12/7 14:29:15 Attempting to send update via UDP to collector SHIPSIM.dom1.jhuapl.edu <128.244.140.226:9618>
12/7 14:29:15 STARTCOMMAND: starting 0 to <128.244.140.226:9618> on UDP port 1227.
12/7 14:29:15 SECMAN: command 0 to <128.244.140.226:9618> on UDP port 1227 (non-blocking).
12/7 14:29:15 SECMAN: using session SHIPSIM:1644:1197055755:4 for {<128.244.140.226:9618>,<0>}.
12/7 14:29:15 SECMAN: found cached session id SHIPSIM:1644:1197055755:4 for {<128.244.140.226:9618>,<0>}.
MyType = ""
TargetType = ""
OutgoingNegotiation = "PREFERRED"
Subsystem = "STARTD"
ParentUniqueID = "icad3:3892:1197062762"
ServerPid = 2696
SessionDuration = "8640000"
ServerCommandSock = "<128.244.140.110:1219>"
Command = 60010
AuthCommand = 0
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
Enact = "YES"
AuthMethodsList = "NTSSPI"
AuthMethods = "NTSSPI"
CryptoMethods = "3DES,BLOWFISH"
Authentication = "NO"
Encryption = "NO"
Integrity = "NO"
UseSession = "YES"
Sid = "SHIPSIM:1644:1197055755:4"
ValidCommands = "0,13"
12/7 14:29:15 SECMAN: Security Policy:
MyType = ""
TargetType = ""
OutgoingNegotiation = "PREFERRED"
Subsystem = "STARTD"
ParentUniqueID = "icad3:3892:1197062762"
ServerPid = 2696
SessionDuration = "8640000"
ServerCommandSock = "<128.244.140.110:1219>"
Command = 60010
AuthCommand = 0
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
Enact = "YES"
AuthMethodsList = "NTSSPI"
AuthMethods = "NTSSPI"
CryptoMethods = "3DES,BLOWFISH"
Authentication = "NO"
Encryption = "NO"
Integrity = "NO"
UseSession = "YES"
Sid = "SHIPSIM:1644:1197055755:4"
ValidCommands = "0,13"
12/7 14:29:15 SECMAN: negotiating security for command 0.
12/7 14:29:15 SECMAN: UDP, have_session == 1, can_neg == 1
12/7 14:29:15 SECMAN: UDP has session SHIPSIM:1644:1197055755:4.
12/7 14:29:15 SECMAN: sending DC_AUTHENTICATE command
12/7 14:29:15 SECMAN: sending following classad:
MyType = ""
TargetType = ""
OutgoingNegotiation = "PREFERRED"
Subsystem = "STARTD"
ParentUniqueID = "icad3:3892:1197062762"
ServerPid = 2696
SessionDuration = "8640000"
AuthCommand = 0
Enact = "YES"
AuthMethodsList = "NTSSPI"
AuthMethods = "NTSSPI"
CryptoMethods = "3DES,BLOWFISH"
Authentication = "NO"
Encryption = "NO"
Integrity = "NO"
UseSession = "YES"
Sid = "SHIPSIM:1644:1197055755:4"
ValidCommands = "0,13"
RemoteVersion = "$CondorVersion: 6.9.5 Nov 28 2007 $"
ServerCommandSock = "<128.244.140.110:1219>"
Command = 0
12/7 14:29:15 SECMAN: startCommand succeeded.
12/7 14:29:15 slot2: Sent update to 1 collector(s)
<snip logs about shutting down>
 
 


From: condor-users-bounces@xxxxxxxxxxx [mailto:condor-users-bounces@xxxxxxxxxxx] On Behalf Of Thompson, Cooper
Sent: Friday, December 07, 2007 12:22 PM
To: Condor-Users Mail List
Subject: Re: [Condor-users] Windows, Credd, and run_as_owner question

To state the obvious ? the problem seems to start here:

12/5 20:20:24 condor_read(): recv() returned -1, errno = 10054, assuming failure reading 5 bytes from <128.244.140.110:3383>.

 

Which means the connection between the credd and the client is being reset for some reason.  I?ve seen a similar problem related to this issue:

https://lists.cs.wisc.edu/archive/condor-users/2007-October/msg00292.shtml

 

I don?t see any obvious relationship however.

 

My next step would be to take a look at the StartLog on the execute machine ? probably with STARTD_DEBUG set with D_FULLDEBUG and D_SECURITY   (probably add D_SECURITY to CREDD_DEBUG on your master as well).

 

 

Coop

 

P.S.  Moving things between condor_config and condor_config.local should have no affect if you have condor_config.local everywhere.  My understanding is that you do want the 4 lines mentioned on execute machines as well.

 


From: condor-users-bounces@xxxxxxxxxxx [mailto:condor-users-bounces@xxxxxxxxxxx] On Behalf Of Chin, Tammy
Sent: Friday, December 07, 2007 11:36 AM
To: Condor-Users Mail List
Subject: Re: [Condor-users] Windows, Credd, and run_as_owner question

 

Matt,

 

The 4 lines you have in your condor_config.local should actually be in your condor_config file. The condor_config.local file on your slave machine should be empty.

 

Hope this helps,

 

Tammy

-----Original Message-----
From: condor-users-bounces@xxxxxxxxxxx [mailto:condor-users-bounces@xxxxxxxxxxx]On Behalf Of Valencia, Matthew C.
Sent: December 5, 2007 8:40 PM
To: Condor-Users Mail List
Subject: Re: [Condor-users] Windows, Credd, and run_as_owner question

Ok, I made the CREDD_DEBUG change, and did everything again, and I think I understand more about the sequence of events that occur (bear with me, I'm a novice).

 

First, some more information on my setup

 

condor_config (on both machines) -- pretty much the standard config file, except:

HOSTALLOW_CONFIG = $(CONDOR_HOST), $(FULL_HOSTNAME)

UID_DOMAIN = dom1.jhuapl.edu

CREDD_HOST = $(CONDOR_HOST):$(CREDD_PORT)

TRUST_UID_DOMAIN = True #(I was trying different settings...)

 

condor_config.local (on both machines):

ADD_WINDOWS_FIREWALL_EXCEPTION = FALSE
STARTER_ALLOW_RUNAS_OWNER = True
CREDD_CACHE_LOCALLY = True
SEC_CLIENT_AUTHENTICATION_METHODS = NTSSPI, PASSWORD

 

condor_config.local.credd (on the submit / master machine -- comments elided):
CREDD_LOG = $(LOG)/CreddLog
CREDD_DEBUG = D_FULLDEBUG
MAX_CREDD_LOG = 50000000

DAEMON_LIST = $(DAEMON_LIST), CREDD
CREDD    = $(SBIN)/condor_credd.exe

SEC_CREDD_SESSION_TIMEOUT = 10

CREDD.SEC_DEFAULT_AUTHENTICATION =REQUIRED
CREDD.SEC_DEFAULT_ENCRYPTION = REQUIRED
CREDD.SEC_DEFAULT_INTEGRITY = REQUIRED
CREDD.SEC_DEFAULT_NEGOTIATION = REQUIRED

CREDD.SEC_DAEMON_AUTHENTICATION_METHODS = PASSWORD

CREDD.ALLOW_DAEMON = condor_pool@$(UID_DOMAIN)

CREDD.SEC_DEFAULT_AUTHENTICATION_METHODS = NTSSPI

The most interesting piece of info is the CreddLog.  Credd started up fine on the master / submit machine (after condor_on), but when I did condor_on on the execute machine, an error occured (looks like it got the condor_pool credential ok, though): 

 

12/5 20:17:14 ******************************************************
12/5 20:17:15 ** condor_credd.exe (CONDOR_CREDD) STARTING UP
12/5 20:17:15 ** C:\condor\bin\condor_credd.exe
12/5 20:17:15 ** $CondorVersion: 6.9.5 Nov 28 2007 $
12/5 20:17:15 ** $CondorPlatform: INTEL-WINNT50 $
12/5 20:17:16 ** PID = 476
12/5 20:17:16 ** Log last touched time unavailable (No such file or directory)
12/5 20:17:16 ******************************************************
12/5 20:17:16 Using config source: C:\condor\condor_config
12/5 20:17:16 Using local config sources:
12/5 20:17:16    C:\condor/condor_config.local
12/5 20:17:16    C:\condor/condor_config.local.credd
12/5 20:17:16 DaemonCore: Command Socket at <128.244.140.226:9620>
12/5 20:17:16 Will use UDP to update collector SHIPSIM.dom1.jhuapl.edu <128.244.140.226:9618>
12/5 20:17:16 main_init() called
12/5 20:17:16 Getting monitoring info for pid 476
12/5 20:17:16 Trying to update collector <128.244.140.226:9618>
12/5 20:17:16 Attempting to send update via UDP to collector SHIPSIM.dom1.jhuapl.edu <128.244.140.226:9618>
12/5 20:17:16 File descriptor limits: max 1024, safe 820
12/5 20:17:17 sspi_client_auth() entered
12/5 20:17:17 sspi_client_auth() looping
12/5 20:17:17 sspi_client_auth() exiting
12/5 20:17:17 ZKM: setting default map to (null)
12/5 20:17:17 DaemonCore: in SendAliveToParent()
12/5 20:17:18 sspi_client_auth() entered
12/5 20:17:18 sspi_client_auth() looping
12/5 20:17:18 sspi_client_auth() exiting
12/5 20:17:18 ZKM: setting default map to (null)
12/5 20:17:18 DaemonCore: Leaving SendAliveToParent() - success
12/5 20:20:24 Found credential for user 'condor_pool'
12/5 20:20:24 Found credential for user 'condor_pool'
12/5 20:20:24 condor_read(): recv() returned -1, errno = 10054, assuming failure reading 5 bytes from <128.244.140.110:3383>.
12/5 20:20:24 IO: Failed to read packet header
12/5 20:20:24 condor_read(): recv() returned -1, errno = 10054, assuming failure reading 5 bytes from <128.244.140.110:3383>.
12/5 20:20:24 IO: Failed to read packet header
12/5 20:20:24 AUTHENTICATE: handshake failed!
12/5 20:20:24 DC_AUTHENTICATE: authenticate failed: AUTHENTICATE:1002:Failure performing handshake|AUTHENTICATE:1004:Failed to authenticate using PASSWORD
12/5 20:21:16 Getting monitoring info for pid 476
12/5 20:22:18 Trying to update collector <128.244.140.226:9618>
12/5 20:22:18 Attempting to send update via UDP to collector SHIPSIM.dom1.jhuapl.edu <128.244.140.226:9618>
12/5 20:25:16 Getting monitoring info for pid 476
12/5 20:27:18 Trying to update collector <128.244.140.226:9618>
12/5 20:27:18 Attempting to send update via UDP to collector SHIPSIM.dom1.jhuapl.edu <128.244.140.226:9618>
12/5 20:29:16 Getting monitoring info for pid 476

Any thoughts?

 

Thanks,

Matt

 


From: condor-users-bounces@xxxxxxxxxxx [mailto:condor-users-bounces@xxxxxxxxxxx] On Behalf Of Thompson, Cooper
Sent: Wednesday, December 05, 2007 4:36 PM
To: Condor-Users Mail List
Subject: Re: [Condor-users] Windows, Credd, and run_as_owner question

Can you include your security configuration from condor_config (any SEC_<type>_AUTHENTICATION_METHODS, ALLOW_CONFIG, etc).

 

Also ? an excerpt from the CreddLog with CREDD_DEBUG = D_FULLDEBUG would be useful.  Specifically there should be some log entries related to fetching and exchanging the pool password.

 

 


From: condor-users-bounces@xxxxxxxxxxx [mailto:condor-users-bounces@xxxxxxxxxxx] On Behalf Of Valencia, Matthew C.
Sent: Wednesday, December 05, 2007 3:59 PM
To: Condor-Users Mail List
Subject: Re: [Condor-users] Windows, Credd, and run_as_owner question

 

Yes, I have CREDD_HOST  = $(CONDOR_HOST):$(CREDD_PORT) 

 

and I've also run condor_store_cred to add the credentials for the user I'd like to run as (and the command returned successfully).

 

I did everything again from scratch to make sure I didn't miss anything, and I noticed the following message in the MasterLog of both machines (it is also listed below) after running the condor_store_cred -c -n A.dom1.jhuapl.edu and condor_store_cred -c -n B.dom1.jhuapl.edu:

 

store_pool_cred: failed to receive all parameters

 

Could this be important?

 


From: condor-users-bounces@xxxxxxxxxxx [mailto:condor-users-bounces@xxxxxxxxxxx] On Behalf Of Jones, Torrin A (US SSA)
Sent: Wednesday, December 05, 2007 3:42 PM
To: Condor-Users Mail List
Subject: Re: [Condor-users] Windows, Credd, and run_as_owner question

Also, is CREDD_HOST defined in the condor_config for both machine A and machine B.

-----Original Message-----
From: Jones, Torrin A (US SSA)
Sent: Wednesday, December 05, 2007 12:38
To: 'Condor-Users Mail List'
Subject: RE: [Condor-users] Windows, Credd, and run_as_owner question

Did you also run condor_store_cred for the user you want to run as?

 

condor_store_cred add

 

 

<snip>

 


CONFIDENTIAL AND PRIVILEGED INFORMATION NOTICE

This e-mail, and any attachments, may contain information that
is confidential, subject to copyright, or exempt from disclosure.
Any unauthorized review, disclosure, retransmission, 
dissemination or other use of or reliance on this information 
may be unlawful and is strictly prohibited.  

AVIS D'INFORMATION CONFIDENTIELLE ET PRIVILÉGIÉE

Le présent courriel, et toute pièce jointe, peut contenir de 
l'information qui est confidentielle, régie par les droits 
d'auteur, ou interdite de divulgation. Tout examen, 
divulgation, retransmission, diffusion ou autres utilisations 
non autorisées de l'information ou dépendance non autorisée 
envers celle-ci peut être illégale et est strictement interdite.