[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [HTCondor-users] Kerberos Permission Denied error



Hi,

Thanks Zach... Authentication is succeeding now.. All I had to do was just remove all my settings and only retain the line just as suggested by you...

However I am now encountering a few more issues with Kerberos authentication. I am actually trying to submit a grid universe job to a remote machine. The error that I was able to solve earlier was with the submit node. The Schedd on the submit node now is able to correctly recognize and authenticate my kerberos credentials. However the remote Schedd still fails to authenticate with Kerberos. I have enabled debugging on GridManager log on the submit node with D_ALL:2. Upon inspection, the GridManager on the submit node is not selecting the proper kerberos credential for authenticating the remote schedd, instead it is using 'unauthenticated@unmapped' as the user.Â

How do I make the GridManager on the submit node to select the proper kerberos credential. (The Schedd on the submit node is recognizing proper credentials and the client debug output also shows valid kerberos credentials). Below are the various log outputs.


Config file on submit node (gridfs.nsgtest.cdac.in IP: 10.180.141.148) :

SEC_DEFAULT_AUTHENTICATION_METHODS = KERBEROS
KERBEROS_MAP_FILE = $(RELEASE_DIR)/etc/condor.kmap
CERTIFICATE_MAPFILE = /usr/local/nsg/condor/etc/usermap
SCHEDD_DEBUGÂÂÂÂÂÂÂÂÂÂÂ = D_SECURITY
GRIDMANAGER_DEBUGÂÂÂÂÂÂ = D_ALL:2

Config file on remote node (grid-1-0.nsgtest.cdac.in IP: 10.180.141.111) :

SEC_DEFAULT_AUTHENTICATION_METHODS = KERBEROS
KERBEROS_MAP_FILE = $(RELEASE_DIR)/etc/condor.kmap
CERTIFICATE_MAPFILE = /usr/local/nsg/condor/etc/usermap

Job script:

[asvija@gridfs condor]$ cat condor-universe.job
universe = grid
executable = /bin/hostname
output = myoutput
error = myerror
log = mylog

grid_resource = condor grid-1-0.nsgtest.cdac.in grid-1-0.nsgtest.cdac.in
+remote_jobuniverse = 5
+remote_requirements = True
+remote_ShouldTransferFiles = "YES"
+remote_WhenToTransferOutput = "ON_EXIT"
queue


Client side debug output:

[asvija@gridfs condor]$ _condor_TOOL_DEBUG=D_SECURITY condor_submit -debug condor-universe.job 2>&1 | tee out
09/09/19 12:02:55 KEYCACHE: created: 0xf46150
09/09/19 12:02:55 Can't open directory "/opt/condor//config" as PRIV_UNKNOWN, errno: 2 (No such file or directory)
09/09/19 12:02:55 Cannot open /opt/condor//config: No such file or directory
Submitting job(s)09/09/19 12:02:55 CRED: NO MODULES REQUESTED
09/09/19 12:02:55 SECMAN: command 1112 QMGMT_WRITE_CMD to schedd at <10.180.141.148:9618> from TCP port 22978 (blocking).
09/09/19 12:02:55 SECMAN: new session, doing initial authentication.
09/09/19 12:02:55 SECMAN: Auth methods: KERBEROS
09/09/19 12:02:55 AUTHENTICATE: setting timeout for <10.180.141.148:9618?addrs=10.180.141.148-9618&noUDP&sock=95471_0ec0_4> to 20.
09/09/19 12:02:55 HANDSHAKE: in handshake(my_methods = 'KERBEROS')
09/09/19 12:02:55 HANDSHAKE: handshake() - i am the client
09/09/19 12:02:55 HANDSHAKE: sending (methods == 64) to server
09/09/19 12:02:55 HANDSHAKE: server replied (method = 64)
09/09/19 12:02:55 KERBEROS: krb5_unparse_name: host/gridfs.nsgtest.cdac.in@xxxxxxxxxxxxxxx
09/09/19 12:02:55 KERBEROS: no user yet determined, will grab up to slash
09/09/19 12:02:55 KERBEROS: picked user: host
09/09/19 12:02:55 KERBEROS: remapping 'host' to 'condor'
09/09/19 12:02:55 Client is condor@xxxxxxxxxxxxxxx
09/09/19 12:02:55 KERBEROS: Server principal is host/gridfs.nsgtest.cdac.in@xxxxxxxxxxxxxxx
09/09/19 12:02:55 Acquiring credential for user
09/09/19 12:02:55 Successfully located credential cache
09/09/19 12:02:55 Remote host is 10.180.141.148
09/09/19 12:02:55 Authentication was a Success.
09/09/19 12:02:55 ZKM: setting default map to condor@xxxxxxxxxxxxxxx
09/09/19 12:02:55 ZKM: name to map is 'host/gridfs.nsgtest.cdac.in@xxxxxxxxxxxxxxx'
09/09/19 12:02:55 ZKM: pre-map: current user is 'condor'
09/09/19 12:02:55 ZKM: pre-map: current domain is 'nsgtest.cdac.in'
09/09/19 12:02:55 ZKM: Parsing map file.
09/09/19 12:02:55 ZKM: attempting to map 'host/gridfs.nsgtest.cdac.in@xxxxxxxxxxxxxxx'
09/09/19 12:02:55 ZKM: 1: attempting to map 'host/gridfs.nsgtest.cdac.in@xxxxxxxxxxxxxxx'
09/09/19 12:02:55 ZKM: 2: mapret: 0 included_voms: 0 canonical_user: host@xxxxxxxxxxxxxxx
09/09/19 12:02:55 ZKM: found user host@xxxxxxxxxxxxxxx, splitting.
09/09/19 12:02:55 ZKM: post-map: current user is 'host'
09/09/19 12:02:55 ZKM: post-map: current domain is 'nsgtest.cdac.in'
09/09/19 12:02:55 ZKM: post-map: current FQU is 'host@xxxxxxxxxxxxxxx'
09/09/19 12:02:55 AUTHENTICATE: Exchanging keys with remote side.
09/09/19 12:02:55 AUTHENTICATE: Result of end of authenticate is 1.
09/09/19 12:02:55 SECMAN: added session gridfs:95518:1568010775:0 to cache for 60 seconds (3600s lease).
09/09/19 12:02:55 SECMAN: startCommand succeeded.
09/09/19 12:02:55 IPVERIFY: Subsystem SUBMIT
09/09/19 12:02:55 IPVERIFY: Permission ALLOW
09/09/19 12:02:55 IPVERIFY: Subsystem SUBMIT
09/09/19 12:02:55 IPVERIFY: Permission READ
09/09/19 12:02:55 ipverify: READ optimized to allow anyone
09/09/19 12:02:55 IPVERIFY: Subsystem SUBMIT
09/09/19 12:02:55 IPVERIFY: Permission WRITE
09/09/19 12:02:55 ipverify: WRITE optimized to allow anyone
09/09/19 12:02:55 IPVERIFY: Subsystem SUBMIT
09/09/19 12:02:55 IPVERIFY: Permission NEGOTIATOR
09/09/19 12:02:55 ipverify: NEGOTIATOR optimized to allow anyone
09/09/19 12:02:55 IPVERIFY: Subsystem SUBMIT
09/09/19 12:02:55 IPVERIFY: Permission ADMINISTRATOR
09/09/19 12:02:55 ipverify: ADMINISTRATOR optimized to allow anyone
09/09/19 12:02:55 IPVERIFY: Subsystem SUBMIT
09/09/19 12:02:55 IPVERIFY: Permission OWNER
09/09/19 12:02:55 ipverify: OWNER optimized to allow anyone
09/09/19 12:02:55 IPVERIFY: Subsystem SUBMIT
09/09/19 12:02:55 IPVERIFY: Permission CONFIG
09/09/19 12:02:55 ipverify: CONFIG optimized to deny everyone
09/09/19 12:02:55 IPVERIFY: Subsystem SUBMIT
09/09/19 12:02:55 IPVERIFY: Permission DAEMON
09/09/19 12:02:55 ipverify: DAEMON optimized to allow anyone
09/09/19 12:02:55 IPVERIFY: Subsystem SUBMIT
09/09/19 12:02:55 IPVERIFY: Permission SOAP
09/09/19 12:02:55 ipverify: SOAP optimized to allow anyone
09/09/19 12:02:55 IPVERIFY: Subsystem SUBMIT
09/09/19 12:02:55 IPVERIFY: Permission DEFAULT
09/09/19 12:02:55 ipverify: DEFAULT optimized to allow anyone
09/09/19 12:02:55 IPVERIFY: Subsystem SUBMIT
09/09/19 12:02:55 IPVERIFY: Permission CLIENT
09/09/19 12:02:55 ipverify: CLIENT optimized to allow anyone
09/09/19 12:02:55 IPVERIFY: Subsystem SUBMIT
09/09/19 12:02:55 IPVERIFY: Permission ADVERTISE_STARTD
09/09/19 12:02:55 ipverify: ADVERTISE_STARTD optimized to allow anyone
09/09/19 12:02:55 IPVERIFY: Subsystem SUBMIT
09/09/19 12:02:55 IPVERIFY: Permission ADVERTISE_SCHEDD
09/09/19 12:02:55 ipverify: ADVERTISE_SCHEDD optimized to allow anyone
09/09/19 12:02:55 IPVERIFY: Subsystem SUBMIT
09/09/19 12:02:55 IPVERIFY: Permission ADVERTISE_MASTER
09/09/19 12:02:55 ipverify: ADVERTISE_MASTER optimized to allow anyone
.
1 job(s) submitted to cluster 27.
09/09/19 12:02:55 SECMAN: command 421 RESCHEDULE to local schedd from TCP port 11296 (blocking).
09/09/19 12:02:55 SECMAN: using session gridfs:95518:1568010775:0 for {<10.180.141.148:9618?addrs=10.180.141.148-9618&noUDP&sock=95471_0ec0_4>,<421>}.
09/09/19 12:02:55 SECMAN: resume, other side is $CondorVersion: 8.8.4 Jul 09 2019 BuildID: 474941 $, NOT reauthenticating.
09/09/19 12:02:55 SECMAN: startCommand succeeded.
[asvija@gridfs condor]$


Schedd Log on Submit node (gridfs.nsgtest.cdac.in)

Pls see the contents from this link:

https://github.com/asvija/condor-slurm/blob/master/Schedd-gridfs.txt


GridManager Log on Submit node:

Pls see the contents from this link:

https://github.com/asvija/condor-slurm/blob/master/GridmanagerLog.asvija


Schedd Log on Remote node (grid-1-0.nsgtest.cdac.in)

09/09/19 12:02:03 KEYCACHE: created: 0xa27150
09/09/19 12:02:03 Can't open directory "/opt/condor//config" as PRIV_UNKNOWN, errno: 2 (No such file or directory)
09/09/19 12:02:03 Cannot open /opt/condor//config: No such file or directory
09/09/19 12:02:03 Setting maximum file descriptors to 4096.
09/09/19 12:02:03 ******************************************************
09/09/19 12:02:03 ** condor_schedd (CONDOR_SCHEDD) STARTING UP
09/09/19 12:02:03 ** /usr/local/nsg/condor/sbin/condor_schedd
09/09/19 12:02:03 ** SubsystemInfo: name=SCHEDD type=SCHEDD(5) class=DAEMON(1)
09/09/19 12:02:03 ** Configuration: subsystem:SCHEDD local:<NONE> class:DAEMON
09/09/19 12:02:03 ** $CondorVersion: 8.8.4 Jul 09 2019 BuildID: 474941 $
09/09/19 12:02:03 ** $CondorPlatform: x86_64_RedHat7 $
09/09/19 12:02:03 ** PID = 309007
09/09/19 12:02:03 ** Log last touched 9/9 12:01:56
09/09/19 12:02:03 ******************************************************
09/09/19 12:02:03 Using config source: /usr/local/nsg/condor/etc/condor_config
09/09/19 12:02:03 Using local config sources:
09/09/19 12:02:03ÂÂÂ /opt/condor//condor_config.local
09/09/19 12:02:03 config Macros = 100, Sorted = 100, StringBytes = 4012, TablesBytes = 3648
09/09/19 12:02:03 CLASSAD_CACHING is ENABLED
09/09/19 12:02:03 Daemon Log is logging: D_ALWAYS D_ERROR D_SECURITY
09/09/19 12:02:03 SharedPortEndpoint: waiting for connections to named socket 308958_61ed_4
09/09/19 12:02:03 SECMAN: created non-negotiated security session 828b90d9a353477b5f987995937491be00f0d6e46f223ce0 for 0 (inf) seconds.
09/09/19 12:02:03 SECMAN: now creating non-negotiated command mappings
09/09/19 12:02:03 IpVerify::PunchHole: opened DAEMON level to condor@parent
09/09/19 12:02:03 IpVerify::PunchHole: opened WRITE level to condor@parent
09/09/19 12:02:03 IpVerify::PunchHole: opened READ level to condor@parent
09/09/19 12:02:03 IpVerify::PunchHole: open count at level READ for condor@parent now 2
09/09/19 12:02:03 DaemonCore: command socket at <10.180.141.111:9618?addrs=10.180.141.111-9618&noUDP&sock=308958_61ed_4>
09/09/19 12:02:03 DaemonCore: private command socket at <10.180.141.111:9618?addrs=10.180.141.111-9618&noUDP&sock=308958_61ed_4>
09/09/19 12:02:03 History file rotation is enabled.
09/09/19 12:02:03ÂÂ Maximum history file size is: 20971520 bytes
09/09/19 12:02:03ÂÂ Number of rotated history files is: 20
09/09/19 12:02:03 IpVerify::PunchHole: opened CLIENT level to execute-side@matchsession
09/09/19 12:02:03 Reloading job factories
09/09/19 12:02:03 Loaded 0 job factories, 0 were paused, 0 failed to load
09/09/19 12:02:03 SECMAN: command 60008 DC_CHILDALIVE to daemon at <10.180.141.111:9618> from TCP port 28294 (blocking).
09/09/19 12:02:03 SECMAN: using session 828b90d9a353477b5f987995937491be00f0d6e46f223ce0 for {<10.180.141.111:9618?addrs=10.180.141.111-9618&noUDP&sock=308958_61ed>,<60008>}.
09/09/19 12:02:03 SECMAN: startCommand succeeded.
09/09/19 12:02:03 IPVERIFY: Subsystem SCHEDD
09/09/19 12:02:03 IPVERIFY: Permission ALLOW
09/09/19 12:02:03 IPVERIFY: Subsystem SCHEDD
09/09/19 12:02:03 IPVERIFY: Permission READ
09/09/19 12:02:03 IPVERIFY: allow READ: * (from config value ALLOW_READ)
09/09/19 12:02:03 ipverify: READ optimized to allow anyone
09/09/19 12:02:03 IPVERIFY: Subsystem SCHEDD
09/09/19 12:02:03 IPVERIFY: Permission WRITE
09/09/19 12:02:03 IPVERIFY: allow WRITE: grid-1-0.nsgtest.cdac.in, 10.180.141.111, 10.180.141.148, 10.180.141.111 (from config value ALLOW_WRITE)
09/09/19 12:02:03 IPVERIFY: Subsystem SCHEDD
09/09/19 12:02:03 IPVERIFY: Permission NEGOTIATOR
09/09/19 12:02:03 IPVERIFY: allow NEGOTIATOR: grid-1-0.nsgtest.cdac.in, , 10.180.141.111 (from config value ALLOW_NEGOTIATOR_SCHEDD)
09/09/19 12:02:03 IPVERIFY: Subsystem SCHEDD
09/09/19 12:02:03 IPVERIFY: Permission ADMINISTRATOR
09/09/19 12:02:03 IPVERIFY: allow ADMINISTRATOR: grid-1-0.nsgtest.cdac.in, 10.180.141.111 (from config value ALLOW_ADMINISTRATOR)
09/09/19 12:02:03 IPVERIFY: Subsystem SCHEDD
09/09/19 12:02:03 IPVERIFY: Permission OWNER
09/09/19 12:02:03 IPVERIFY: allow OWNER: grid-1-0.nsgtest.cdac.in, grid-1-0.nsgtest.cdac.in, 10.180.141.111 (from config value ALLOW_OWNER)
09/09/19 12:02:03 IPVERIFY: Subsystem SCHEDD
09/09/19 12:02:03 IPVERIFY: Permission CONFIG
09/09/19 12:02:03 ipverify: CONFIG optimized to deny everyone
09/09/19 12:02:03 IPVERIFY: Subsystem SCHEDD
09/09/19 12:02:03 IPVERIFY: Permission DAEMON
09/09/19 12:02:03 IPVERIFY: allow DAEMON: grid-1-0.nsgtest.cdac.in, 10.180.141.111, 10.180.141.148, 10.180.141.111 (from config value ALLOW_WRITE)






On 9/6/2019 10:08 PM, asvijab wrote:
Dear Zach,
Â
Thanks for the reply..
I had tried with this setting alone.. I did receive the same error subsequent to which I tried various settings in the config file..Â
Nevertheless the permission denied error in the schedd log persists..Â
Â
Thanks and regards,
Asvija

On September 6, 2019 at 6:39 PM Zach Miller <zmiller@xxxxxxxxxxx> wrote:
> Hi Asvija,
>
> If you want to force all authenticated transactions to use krb, you can just set this one setting:
>
> SEC_DEFAULT_AUTHENTICATION_METHODS = KERBEROS
>
>
> But forcing any of the authentication settings to "NEVER" means that krb authentication cannot/will-not happen.
>
> (Also, there might be a typo in the config that you posted, but you should remove those lines anyway. I would start with just the above single setting.)
>
>
> Cheers,
> -zach
>
>
> ïOn 9/6/19, 2:04 AM, "HTCondor-users on behalf of Asvija B" <htcondor-users-bounces@xxxxxxxxxxx on behalf of asvijab@xxxxxxx> wrote:
>
> Dear all,
> I am trying to use Kerberos authentication for submitting jobs to HT-Condor. However on the client side the submission fails complaining 'AUTHENTICATE:1002:Failure performing handshake'. The schedd log tells that the permission was denied with this error:
> DaemonCore: PERMISSION DENIED for 1112 (QMGMT_WRITE_CMD) via TCP from host <10.180.141.148:15918> (access level WRITE)
> It is a simple setup to test the Kerberos integration with condor. The KDC is running on the same machine (10.180.141.148). The same machine has been configured to run as both condor submit node and worker nodes.
>
>
> I have given the most open options for security in the condor_config file. Following are the excerpts from condor_config file, client debug messages and the schedd log entries:
> condor_config file excerpt:
> SEC_DEFAULT_NEGOTIATION = OPTIONAL
> SEC_DEFAULT_AUTHENTICATION = NEVER
> SEC_CLIENT_AUTHENCTICATION = NEVER
> SEC_DEFAULT_AUTHENTICATION_METHODS = KERBEROS
> KERBEROS_MAP_FILE = $(RELEASE_DIR)/etc/condor.kmap
> SCHEDD.ALLOW_WRITE = *@*/*, 10.180.141.148
> SEC_WRITE_AUTHENTICATION = NEVER
>
>
>
> condor.kmap contents:
>
> [root@gridfs log]# cat /usr/local/nsg/condor/etc/condor.kmap
> NSGTEST.CDAC.IN = nsgtest.cdac.in
>
>
>
>
> Kerberos klist output on client side:
>
> [asvija@gridfs condor]$ klist
> Ticket cache: KEYRING:persistent:1005:1005
> Default principal:
> asvija@xxxxxxxxxxxxxxx <mailto:asvija@xxxxxxxxxxxxxxx>
>
> Valid starting Expires Service principal
> 09/06/2019 12:18:30 09/07/2019 12:18:30
> krbtgt/NSGTEST.CDAC.IN@xxxxxxxxxxxxxxx <mailto:krbtgt/NSGTEST.CDAC.IN@xxxxxxxxxxxxxxx>
>
> Debug output from condor_submit :
>
> [asvija@gridfs condor]$ _condor_TOOL_DEBUG=D_SECURITY condor_submit -debug condor-universe.job 2>&1 | tee out
>
>
> 09/06/19 12:21:05 KEYCACHE: created: 0x239a150
> 09/06/19 12:21:05 Can't open directory "/opt/condor//config" as PRIV_UNKNOWN, errno: 2 (No such file or directory)
> 09/06/19 12:21:05 Cannot open /opt/condor//config: No such file or directory
> Submitting job(s)09/06/19 12:21:05 CRED: NO MODULES REQUESTED
> 09/06/19 12:21:05 SECMAN: command 1112 QMGMT_WRITE_CMD to schedd at <10.180.141.148:9618> from TCP port 22376 (blocking).
> 09/06/19 12:21:05 IPVERIFY: Subsystem SUBMIT
> 09/06/19 12:21:05 IPVERIFY: Permission ALLOW
> 09/06/19 12:21:05 IPVERIFY: Subsystem SUBMIT
> 09/06/19 12:21:05 IPVERIFY: Permission READ
> 09/06/19 12:21:05 ipverify: READ optimized to allow anyone
> 09/06/19 12:21:05 IPVERIFY: Subsystem SUBMIT
> 09/06/19 12:21:05 IPVERIFY: Permission WRITE
> 09/06/19 12:21:05 ipverify: WRITE optimized to allow anyone
> 09/06/19 12:21:05 IPVERIFY: Subsystem SUBMIT
> 09/06/19 12:21:05 IPVERIFY: Permission NEGOTIATOR
> 09/06/19 12:21:05 ipverify: NEGOTIATOR optimized to allow anyone
> 09/06/19 12:21:05 IPVERIFY: Subsystem SUBMIT
> 09/06/19 12:21:05 IPVERIFY: Permission ADMINISTRATOR
> 09/06/19 12:21:05 ipverify: ADMINISTRATOR optimized to allow anyone
> 09/06/19 12:21:05 IPVERIFY: Subsystem SUBMIT
> 09/06/19 12:21:05 IPVERIFY: Permission OWNER
> 09/06/19 12:21:05 ipverify: OWNER optimized to allow anyone
> 09/06/19 12:21:05 IPVERIFY: Subsystem SUBMIT
> 09/06/19 12:21:05 IPVERIFY: Permission CONFIG
> 09/06/19 12:21:05 ipverify: CONFIG optimized to deny everyone
> 09/06/19 12:21:05 IPVERIFY: Subsystem SUBMIT
> 09/06/19 12:21:05 IPVERIFY: Permission DAEMON
> 09/06/19 12:21:05 ipverify: DAEMON optimized to allow anyone
> 09/06/19 12:21:05 IPVERIFY: Subsystem SUBMIT
> 09/06/19 12:21:05 IPVERIFY: Permission SOAP
> 09/06/19 12:21:05 ipverify: SOAP optimized to allow anyone
> 09/06/19 12:21:05 IPVERIFY: Subsystem SUBMIT
> 09/06/19 12:21:05 IPVERIFY: Permission DEFAULT
> 09/06/19 12:21:05 ipverify: DEFAULT optimized to allow anyone
> 09/06/19 12:21:05 IPVERIFY: Subsystem SUBMIT
> 09/06/19 12:21:05 IPVERIFY: Permission CLIENT
> 09/06/19 12:21:05 ipverify: CLIENT optimized to allow anyone
> 09/06/19 12:21:05 IPVERIFY: Subsystem SUBMIT
> 09/06/19 12:21:05 IPVERIFY: Permission ADVERTISE_STARTD
> 09/06/19 12:21:05 ipverify: ADVERTISE_STARTD optimized to allow anyone
> 09/06/19 12:21:05 IPVERIFY: Subsystem SUBMIT
> 09/06/19 12:21:05 IPVERIFY: Permission ADVERTISE_SCHEDD
> 09/06/19 12:21:05 ipverify: ADVERTISE_SCHEDD optimized to allow anyone
> 09/06/19 12:21:05 IPVERIFY: Subsystem SUBMIT
> 09/06/19 12:21:05 IPVERIFY: Permission ADVERTISE_MASTER
> 09/06/19 12:21:05 ipverify: ADVERTISE_MASTER optimized to allow anyone
> 09/06/19 12:21:05 AUTHENTICATE: setting timeout for <10.180.141.148:9618?addrs=10.180.141.148-9618&noUDP&sock=83499_42eb_4> to 20.
> 09/06/19 12:21:05 HANDSHAKE: in handshake(my_methods = 'KERBEROS')
> 09/06/19 12:21:05 HANDSHAKE: handshake() - i am the client
> 09/06/19 12:21:05 HANDSHAKE: sending (methods == 64) to server
> 09/06/19 12:21:05 HANDSHAKE: server replied (method = 64)
> 09/06/19 12:21:05 KERBEROS: krb5_unparse_name:
> condor@xxxxxxxxxxxxxxx <mailto:condor@xxxxxxxxxxxxxxx>
> 09/06/19 12:21:05 KERBEROS: param server princ: condor
> 09/06/19 12:21:05 KERBEROS: no user yet determined, will grab up to slash
> 09/06/19 12:21:05 KERBEROS: picked user: condor
> 09/06/19 12:21:05 Client is
> condor@xxxxxxxxxxxxxxx <mailto:condor@xxxxxxxxxxxxxxx>
> 09/06/19 12:21:05 KERBEROS: Server principal is
> condor@xxxxxxxxxxxxxxx <mailto:condor@xxxxxxxxxxxxxxx>
> 09/06/19 12:21:05 Acquiring credential for user
> 09/06/19 12:21:05 Successfully located credential cache
> 09/06/19 12:21:05 condor_write(): Socket closed when trying to write 13 bytes to schedd at <10.180.141.148:9618>, fd is 4
> 09/06/19 12:21:05 Buf::write(): condor_write() failed
> 09/06/19 12:21:05 AUTHENTICATE: method 64 (KERBEROS) failed.
> 09/06/19 12:21:05 HANDSHAKE: in handshake(my_methods = '')
> 09/06/19 12:21:05 HANDSHAKE: handshake() - i am the client
> 09/06/19 12:21:05 HANDSHAKE: sending (methods == 0) to server
> 09/06/19 12:21:05 condor_write(): Socket closed when trying to write 13 bytes to schedd at <10.180.141.148:9618>, fd is 4
> 09/06/19 12:21:05 Buf::write(): condor_write() failed
> 09/06/19 12:21:05 AUTHENTICATE: handshake failed!
> 09/06/19 12:21:05 Authentication was a FAILURE.
>
> ERROR: Failed to connect to local queue manager
> AUTHENTICATE:1002:Failure performing handshake
> AUTHENTICATE:1004:Failed to authenticate using KERBEROS
>
>
>
> Schedd log:
> 09/06/19 12:26:22 (pid:83694) ******************************************************
> 09/06/19 12:26:22 (pid:83694) ** condor_schedd (CONDOR_SCHEDD) STARTING UP
> 09/06/19 12:26:22 (pid:83694) ** /usr/local/nsg/condor/sbin/condor_schedd
> 09/06/19 12:26:22 (pid:83694) ** SubsystemInfo: name=SCHEDD type=SCHEDD(5) class=DAEMON(1)
> 09/06/19 12:26:22 (pid:83694) ** Configuration: subsystem:SCHEDD local:<NONE> class:DAEMON
> 09/06/19 12:26:22 (pid:83694) ** $CondorVersion: 8.8.4 Jul 09 2019 BuildID: 474941 $
> 09/06/19 12:26:22 (pid:83694) ** $CondorPlatform: x86_64_RedHat7 $
> 09/06/19 12:26:22 (pid:83694) ** PID = 83694
> 09/06/19 12:26:22 (pid:83694) ** Log last touched 9/6 12:26:13
> 09/06/19 12:26:22 (pid:83694) ******************************************************
> 09/06/19 12:26:22 (pid:83694) Using config source: /usr/local/nsg/condor/etc/condor_config
> 09/06/19 12:26:22 (pid:83694) Using local config sources:
> 09/06/19 12:26:22 (pid:83694) /opt/condor//condor_config.local
> 09/06/19 12:26:22 (pid:83694) config Macros = 99, Sorted = 99, StringBytes = 3606, TablesBytes = 3612
> 09/06/19 12:26:22 (pid:83694) CLASSAD_CACHING is ENABLED
> 09/06/19 12:26:22 (pid:83694) Daemon Log is logging: D_ALWAYS D_ERROR
> 09/06/19 12:26:22 (pid:83694) SharedPortEndpoint: waiting for connections to named socket 83647_c6f0_4
> 09/06/19 12:26:22 (pid:83694) DaemonCore: command socket at <10.180.141.148:9618?addrs=10.180.141.148-9618&noUDP&sock=83647_c6f0_4>
> 09/06/19 12:26:22 (pid:83694) DaemonCore: private command socket at <10.180.141.148:9618?addrs=10.180.141.148-9618&noUDP&sock=83647_c6f0_4>
> 09/06/19 12:26:22 (pid:83694) History file rotation is enabled.
> 09/06/19 12:26:22 (pid:83694) Maximum history file size is: 20971520 bytes
> 09/06/19 12:26:22 (pid:83694) Number of rotated history files is: 2
> 09/06/19 12:26:22 (pid:83694) Reloading job factories
> 09/06/19 12:26:22 (pid:83694) Loaded 0 job factories, 0 were paused, 0 failed to load
> 09/06/19 12:26:28 (pid:83694) TransferQueueManager stats: active up=0/100 down=0/100; waiting up=0 down=0; wait time up=0s down=0s
> 09/06/19 12:26:28 (pid:83694) TransferQueueManager upload 1m I/O load: 0 bytes/s 0.000 disk load 0.000 net load
> 09/06/19 12:26:28 (pid:83694) TransferQueueManager download 1m I/O load: 0 bytes/s 0.000 disk load 0.000 net load
> 09/06/19 12:27:01 (pid:83694) DaemonCore: PERMISSION DENIED for 1112 (QMGMT_WRITE_CMD) via TCP from host <10.180.141.148:26321> (access level WRITE)
>
>
> Thanks and regards,
> Asvija
>
>
> ------------------------------------------------------------------------------------------------------------
>
> [ C-DAC is on Social-Media too. Kindly follow us at:
> Facebook: https://www.facebook.com/CDACINDIA & Twitter: @cdacindia ]
>
> This e-mail is for the sole use of the intended recipient(s) and may
> contain confidential and privileged information. If you are not the
> intended recipient, please contact the sender by reply e-mail and destroy
> all copies and the original message. Any unauthorized review, use,
> disclosure, dissemination, forwarding, printing or copying of this email
> is strictly prohibited and appropriate legal action will be taken.
> ------------------------------------------------------------------------------------------------------------
>
>
>
>
>
> _______________________________________________
> HTCondor-users mailing list
> To unsubscribe, send a message to htcondor-users-request@xxxxxxxxxxx with a
> subject: Unsubscribe
> You can also unsubscribe by visiting
> https://lists.cs.wisc.edu/mailman/listinfo/htcondor-users
>
> The archives can be found at:
> https://lists.cs.wisc.edu/archive/htcondor-users/
>
150th Anniversary Mahatma Gandhi
------------------------------------------------------------------------------------------------------------
[ C-DAC is on Social-Media too. Kindly follow us at:
Facebook: https://www.facebook.com/CDACINDIA & Twitter: @cdacindia ]

This e-mail is for the sole use of the intended recipient(s) and may
contain confidential and privileged information. If you are not the
intended recipient, please contact the sender by reply e-mail and destroy
all copies and the original message. Any unauthorized review, use,
disclosure, dissemination, forwarding, printing or copying of this email
is strictly prohibited and appropriate legal action will be taken.
------------------------------------------------------------------------------------------------------------
_______________________________________________
HTCondor-users mailing list
To unsubscribe, send a message to htcondor-users-request@xxxxxxxxxxx with a
subject: Unsubscribe
You can also unsubscribe by visiting
https://lists.cs.wisc.edu/mailman/listinfo/htcondor-users

The archives can be found at:
https://lists.cs.wisc.edu/archive/htcondor-users/
150th Anniversary Mahatma Gandhi
------------------------------------------------------------------------------------------------------------
[ C-DAC is on Social-Media too. Kindly follow us at:
Facebook: https://www.facebook.com/CDACINDIA & Twitter: @cdacindia ]

This e-mail is for the sole use of the intended recipient(s) and may
contain confidential and privileged information. If you are not the
intended recipient, please contact the sender by reply e-mail and destroy
all copies and the original message. Any unauthorized review, use,
disclosure, dissemination, forwarding, printing or copying of this email
is strictly prohibited and appropriate legal action will be taken.
------------------------------------------------------------------------------------------------------------