msheaver

Q: Cannot Bind Clients to Newly Configured Mac Server (10.8)

I have downloaded, installed and configured Server 10.8 on my iMac, and am having difficulty binding clients (all OS X 10.8) to it. Everything seems to be configured corecttly in the Server app, and the clients are able to find it no problem. But it crashes the client side when I try to bind them to the server. I looked in the sysem log file on the server, and there is a whole mess of error messageas appearing, with a sampling here:

 

Oct 23 07:08:56 server.sheavernet.private mdworker[34841]: Unable to talk to lsboxd

Oct 23 07:08:56 server.sheavernet.private sandboxd[34843] ([34842]): mdworker(34842) deny mach-lookup com.apple.ls.boxd

Oct 23 07:08:56 server.sheavernet.private sandboxd[34843] ([34841]): mdworker(34841) deny mach-lookup com.apple.ls.boxd

Oct 23 07:08:56 server kernel[0]: Sandbox: sandboxd(34843) deny mach-lookup com.apple.coresymbolicationd

 

These errors repeat over and over in the log, and may or may not impact what I am trying to do.

 

When trying to bind the client, I get a whole bunch of error, to many to include here. (wish I could upload the text file). Would someone be willing to take a look at the full listing and help me troubleshoot it? It would be MUCH appreciated!

iMac (27-inch Mid 2011), OS X Mountain Lion (10.8.2)

Posted on Oct 23, 2012 8:09 AM

Close

Q: Cannot Bind Clients to Newly Configured Mac Server (10.8)

  • All replies
  • Helpful answers

  • by JaimeMagiera,Helpful

    JaimeMagiera JaimeMagiera Oct 23, 2012 8:39 AM in response to msheaver
    Level 2 (305 points)
    Oct 23, 2012 8:39 AM in response to msheaver

    These are unrelated. Follow these instructions to get relevant logging. Then we can break things down.

     

    http://support.apple.com/kb/HT4696?viewlocale=en_US&locale=en_US

  • by msheaver,

    msheaver msheaver Oct 24, 2012 4:00 PM in response to msheaver
    Level 1 (0 points)
    Oct 24, 2012 4:00 PM in response to msheaver

    I found a couple of discussions that indicated that the mdworker error might be fixed by booting the server into Safe mode and the n rebooting back into regular mode. The following link provides details on this:

     

    http://support.apple.com/kb/HT1455

     

    I tried it on my server, and it did not fix the problem.

  • by msheaver,

    msheaver msheaver Oct 24, 2012 3:57 PM in response to msheaver
    Level 1 (0 points)
    Oct 24, 2012 3:57 PM in response to msheaver

    Thanks Jaime, I went ahead and turned on debug logging and tried again to join my client to the OD. The two screenshots show what I saw on the client side, and the text below contains the log entries associated with this attempt.

     

    skitch.png

     

    skitch 2.png\

     

     

     

    Oct 23 07:08:56 server.sheavernet.private mdworker[34841]: Unable to talk to lsboxd

    Oct 23 07:08:56 server.sheavernet.private sandboxd[34843] ([34842]): mdworker(34842) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:08:56 server.sheavernet.private sandboxd[34843] ([34841]): mdworker(34841) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:08:56 server kernel[0]: Sandbox: sandboxd(34843) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 07:11:27 server.sheavernet.private com.apple.backupd[34898]: Starting automatic backup

    Oct 23 07:11:27 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/UserEventAgent' [15] for authorization created by '/usr/libexec/UserEventAgent' [15] (100012,0)

    Oct 23 07:11:27 server.sheavernet.private com.apple.backupd[34898]: Backup failed with error: 19

    Oct 23 07:11:27 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/UserEventAgent' [15] for authorization created by '/usr/libexec/UserEventAgent' [15] (100012,0)

    Oct 23 07:11:28 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

    Oct 23 07:11:28 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

    Oct 23 07:12:32 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xd1-192.168.1.3:0!

    Oct 23 07:12:56 server.sheavernet.private mdworker[34921]: Unable to talk to lsboxd

    Oct 23 07:12:56 server.sheavernet.private mdworker[34919]: Unable to talk to lsboxd

    Oct 23 07:12:56 server.sheavernet.private mdworker[34920]: Unable to talk to lsboxd

    Oct 23 07:12:57 server.sheavernet.private sandboxd[34923] ([34921]): mdworker(34921) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:12:57 server.sheavernet.private sandboxd[34923] ([34919]): mdworker(34919) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:12:57 server.sheavernet.private sandboxd[34923] ([34920]): mdworker(34920) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:12:57 server kernel[0]: Sandbox: sandboxd(34923) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 07:13:50 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xd2-192.168.1.3:0!

    Oct 23 07:14:57 server.sheavernet.private mdworker[34957]: Unable to talk to lsboxd

    Oct 23 07:14:57 server.sheavernet.private sandboxd[34959] ([34957]): mdworker(34957) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:14:57 server kernel[0]: Sandbox: sandboxd(34959) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 07:18:58 server.sheavernet.private mdworker[35025]: Unable to talk to lsboxd

    Oct 23 07:18:58 server.sheavernet.private mdworker[35024]: Unable to talk to lsboxd

    Oct 23 07:18:58 server.sheavernet.private mdworker[35023]: Unable to talk to lsboxd

    Oct 23 07:18:58 server.sheavernet.private sandboxd[35027] ([35025]): mdworker(35025) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:18:58 server.sheavernet.private sandboxd[35027] ([35024]): mdworker(35024) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:18:58 server.sheavernet.private sandboxd[35027] ([35023]): mdworker(35023) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:18:58 server kernel[0]: Sandbox: sandboxd(35027) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 07:22:59 server.sheavernet.private mdworker[35099]: Unable to talk to lsboxd

    Oct 23 07:22:59 server.sheavernet.private mdworker[35100]: Unable to talk to lsboxd

    Oct 23 07:22:59 server.sheavernet.private mdworker[35101]: Unable to talk to lsboxd

    Oct 23 07:22:59 server kernel[0]: Sandbox: sandboxd(35103) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 07:22:59 server.sheavernet.private sandboxd[35103] ([35099]): mdworker(35099) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:22:59 server.sheavernet.private sandboxd[35103] ([35100]): mdworker(35100) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:22:59 server.sheavernet.private sandboxd[35103] ([35101]): mdworker(35101) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:23:31 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xd3-192.168.1.3:0!

    Oct 23 07:25:00 server.sheavernet.private mdworker[35145]: Unable to talk to lsboxd

    Oct 23 07:25:00 server.sheavernet.private sandboxd[35147] ([35145]): mdworker(35145) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:25:00 server kernel[0]: Sandbox: sandboxd(35147) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 07:27:00 server.sheavernet.private mdworker[35180]: Unable to talk to lsboxd

    Oct 23 07:27:00 server.sheavernet.private mdworker[35179]: Unable to talk to lsboxd

    Oct 23 07:27:00 server.sheavernet.private sandboxd[35181] ([35180]): mdworker(35180) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:27:00 server.sheavernet.private sandboxd[35181] ([35179]): mdworker(35179) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:27:01 server kernel[0]: Sandbox: sandboxd(35181) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 07:30:16 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xd5-192.168.1.3:0!

    Oct 23 07:31:01 server.sheavernet.private mdworker[35247]: Unable to talk to lsboxd

    Oct 23 07:31:01 server.sheavernet.private mdworker[35248]: Unable to talk to lsboxd

    Oct 23 07:31:01 server.sheavernet.private mdworker[35249]: Unable to talk to lsboxd

    Oct 23 07:31:01 server.sheavernet.private sandboxd[35261] ([35247]): mdworker(35247) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:31:01 server.sheavernet.private sandboxd[35261] ([35248]): mdworker(35248) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:31:01 server.sheavernet.private sandboxd[35261] ([35249]): mdworker(35249) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:31:01 server kernel[0]: Sandbox: sandboxd(35261) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 07:33:02 server.sheavernet.private mdworker[35295]: Unable to talk to lsboxd

    Oct 23 07:33:02 server.sheavernet.private sandboxd[35297] ([35295]): mdworker(35295) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:33:02 server kernel[0]: Sandbox: sandboxd(35297) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 07:37:03 server.sheavernet.private mdworker[35361]: Unable to talk to lsboxd

    Oct 23 07:37:03 server.sheavernet.private mdworker[35359]: Unable to talk to lsboxd

    Oct 23 07:37:03 server.sheavernet.private mdworker[35360]: Unable to talk to lsboxd

    Oct 23 07:37:03 server.sheavernet.private sandboxd[35363] ([35361]): mdworker(35361) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:37:03 server.sheavernet.private sandboxd[35363] ([35359]): mdworker(35359) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:37:03 server.sheavernet.private sandboxd[35363] ([35360]): mdworker(35360) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:37:03 server kernel[0]: Sandbox: sandboxd(35363) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 07:41:04 server.sheavernet.private mdworker[35427]: Unable to talk to lsboxd

    Oct 23 07:41:04 server.sheavernet.private mdworker[35429]: Unable to talk to lsboxd

    Oct 23 07:41:04 server.sheavernet.private mdworker[35428]: Unable to talk to lsboxd

    Oct 23 07:41:04 server kernel[0]: Sandbox: sandboxd(35441) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 07:41:04 server.sheavernet.private sandboxd[35441] ([35427]): mdworker(35427) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:41:04 server.sheavernet.private sandboxd[35441] ([35429]): mdworker(35429) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:41:04 server.sheavernet.private sandboxd[35441] ([35428]): mdworker(35428) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:42:11 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xd6-192.168.1.3:0!

    Oct 23 07:43:04 server.sheavernet.private mdworker[35467]: Unable to talk to lsboxd

    Oct 23 07:43:05 server.sheavernet.private sandboxd[35478] ([35467]): mdworker(35467) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:43:05 server kernel[0]: Sandbox: sandboxd(35478) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 07:45:05 server.sheavernet.private mdworker[35503]: Unable to talk to lsboxd

    Oct 23 07:45:05 server.sheavernet.private mdworker[35502]: Unable to talk to lsboxd

    Oct 23 07:45:05 server.sheavernet.private sandboxd[35513] ([35503]): mdworker(35503) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:45:05 server.sheavernet.private sandboxd[35513] ([35502]): mdworker(35502) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:45:06 server kernel[0]: Sandbox: sandboxd(35513) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 07:49:06 server.sheavernet.private mdworker[35577]: Unable to talk to lsboxd

    Oct 23 07:49:06 server.sheavernet.private mdworker[35579]: Unable to talk to lsboxd

    Oct 23 07:49:06 server.sheavernet.private mdworker[35578]: Unable to talk to lsboxd

    Oct 23 07:49:06 server.sheavernet.private sandboxd[35581] ([35577]): mdworker(35577) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:49:06 server.sheavernet.private sandboxd[35581] ([35579]): mdworker(35579) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:49:06 server.sheavernet.private sandboxd[35581] ([35578]): mdworker(35578) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:49:06 server kernel[0]: Sandbox: sandboxd(35581) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 07:51:07 server.sheavernet.private mdworker[35623]: Unable to talk to lsboxd

    Oct 23 07:51:07 server.sheavernet.private sandboxd[35625] ([35623]): mdworker(35623) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:51:07 server kernel[0]: Sandbox: sandboxd(35625) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 07:51:24 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xda-192.168.1.3:0!

    Oct 23 07:55:07 server.sheavernet.private mdworker[35689]: Unable to talk to lsboxd

    Oct 23 07:55:07 server.sheavernet.private mdworker[35687]: Unable to talk to lsboxd

    Oct 23 07:55:07 server.sheavernet.private mdworker[35688]: Unable to talk to lsboxd

    Oct 23 07:55:07 server kernel[0]: Sandbox: sandboxd(35691) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 07:55:07 server.sheavernet.private sandboxd[35691] ([35689]): mdworker(35689) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:55:07 server.sheavernet.private sandboxd[35691] ([35687]): mdworker(35687) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:55:07 server.sheavernet.private sandboxd[35691] ([35688]): mdworker(35688) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:59:08 server.sheavernet.private mdworker[35749]: Unable to talk to lsboxd

    Oct 23 07:59:08 server.sheavernet.private mdworker[35747]: Unable to talk to lsboxd

    Oct 23 07:59:08 server.sheavernet.private mdworker[35748]: Unable to talk to lsboxd

    Oct 23 07:59:08 server.sheavernet.private sandboxd[35761] ([35749]): mdworker(35749) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:59:08 server.sheavernet.private sandboxd[35761] ([35747]): mdworker(35747) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:59:08 server.sheavernet.private sandboxd[35761] ([35748]): mdworker(35748) deny mach-lookup com.apple.ls.boxd

    Oct 23 07:59:09 server kernel[0]: Sandbox: sandboxd(35761) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 08:00:16 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xdb-192.168.1.3:0!

    Oct 23 08:01:09 server.sheavernet.private mdworker[35795]: Unable to talk to lsboxd

    Oct 23 08:01:09 server.sheavernet.private sandboxd[35797] ([35795]): mdworker(35795) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:01:10 server kernel[0]: Sandbox: sandboxd(35797) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 08:03:10 server.sheavernet.private mdworker[35812]: Unable to talk to lsboxd

    Oct 23 08:03:10 server.sheavernet.private mdworker[35811]: Unable to talk to lsboxd

    Oct 23 08:03:10 server.sheavernet.private sandboxd[35813] ([35812]): mdworker(35812) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:03:10 server.sheavernet.private sandboxd[35813] ([35811]): mdworker(35811) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:03:10 server kernel[0]: Sandbox: sandboxd(35813) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 08:07:10 server.sheavernet.private mdworker[35843]: Unable to talk to lsboxd

    Oct 23 08:07:10 server.sheavernet.private mdworker[35842]: Unable to talk to lsboxd

    Oct 23 08:07:10 server.sheavernet.private mdworker[35841]: Unable to talk to lsboxd

    Oct 23 08:07:10 server.sheavernet.private sandboxd[35845] ([35843]): mdworker(35843) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:07:10 server.sheavernet.private sandboxd[35845] ([35842]): mdworker(35842) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:07:10 server.sheavernet.private sandboxd[35845] ([35841]): mdworker(35841) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:07:11 server kernel[0]: Sandbox: sandboxd(35845) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 08:09:11 server.sheavernet.private mdworker[35861]: Unable to talk to lsboxd

    Oct 23 08:09:11 server.sheavernet.private sandboxd[35863] ([35861]): mdworker(35861) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:09:12 server kernel[0]: Sandbox: sandboxd(35863) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 08:11:57 server.sheavernet.private com.apple.backupd[35890]: Starting automatic backup

    Oct 23 08:11:57 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/UserEventAgent' [15] for authorization created by '/usr/libexec/UserEventAgent' [15] (100012,0)

    Oct 23 08:11:57 server.sheavernet.private com.apple.backupd[35890]: Backup failed with error: 19

    Oct 23 08:11:57 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/UserEventAgent' [15] for authorization created by '/usr/libexec/UserEventAgent' [15] (100012,0)

    Oct 23 08:11:58 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

    Oct 23 08:11:58 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

    Oct 23 08:13:12 server.sheavernet.private mdworker[35900]: Unable to talk to lsboxd

    Oct 23 08:13:12 server.sheavernet.private mdworker[35902]: Unable to talk to lsboxd

    Oct 23 08:13:12 server.sheavernet.private mdworker[35901]: Unable to talk to lsboxd

    Oct 23 08:13:12 server.sheavernet.private sandboxd[35904] ([35900]): mdworker(35900) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:13:12 server.sheavernet.private sandboxd[35904] ([35902]): mdworker(35902) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:13:12 server.sheavernet.private sandboxd[35904] ([35901]): mdworker(35901) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:13:12 server kernel[0]: Sandbox: sandboxd(35904) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 08:17:13 server.sheavernet.private mdworker[35933]: Unable to talk to lsboxd

    Oct 23 08:17:13 server.sheavernet.private mdworker[35932]: Unable to talk to lsboxd

    Oct 23 08:17:13 server.sheavernet.private mdworker[35934]: Unable to talk to lsboxd

    Oct 23 08:17:13 server.sheavernet.private sandboxd[35936] ([35933]): mdworker(35933) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:17:13 server.sheavernet.private sandboxd[35936] ([35932]): mdworker(35932) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:17:13 server.sheavernet.private sandboxd[35936] ([35934]): mdworker(35934) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:17:13 server kernel[0]: Sandbox: sandboxd(35936) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 08:17:56 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xdd-192.168.1.3:0!

    Oct 23 08:19:14 server.sheavernet.private mdworker[35952]: Unable to talk to lsboxd

    Oct 23 08:19:14 server.sheavernet.private sandboxd[35954] ([35952]): mdworker(35952) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:19:14 server kernel[0]: Sandbox: sandboxd(35954) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 08:21:14 server.sheavernet.private mdworker[35977]: Unable to talk to lsboxd

    Oct 23 08:21:14 server.sheavernet.private mdworker[35976]: Unable to talk to lsboxd

    Oct 23 08:21:14 server.sheavernet.private sandboxd[35978] ([35977]): mdworker(35977) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:21:14 server.sheavernet.private sandboxd[35978] ([35976]): mdworker(35976) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:21:15 server kernel[0]: Sandbox: sandboxd(35978) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 08:25:15 server.sheavernet.private mdworker[36006]: Unable to talk to lsboxd

    Oct 23 08:25:15 server.sheavernet.private mdworker[36005]: Unable to talk to lsboxd

    Oct 23 08:25:15 server.sheavernet.private mdworker[36007]: Unable to talk to lsboxd

    Oct 23 08:25:15 server.sheavernet.private sandboxd[36009] ([36006]): mdworker(36006) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:25:15 server.sheavernet.private sandboxd[36009] ([36005]): mdworker(36005) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:25:15 server.sheavernet.private sandboxd[36009] ([36007]): mdworker(36007) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:25:15 server kernel[0]: Sandbox: sandboxd(36009) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 08:27:16 server.sheavernet.private mdworker[36025]: Unable to talk to lsboxd

    Oct 23 08:27:16 server kernel[0]: Sandbox: sandboxd(36027) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 08:27:16 server.sheavernet.private sandboxd[36027] ([36025]): mdworker(36025) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:27:41 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xe0-192.168.1.3:0!

    Oct 23 08:30:06 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xe1-192.168.1.3:0!

    Oct 23 08:31:04 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

    Oct 23 08:31:04 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

    Oct 23 08:31:04 server.sheavernet.private kdc[14291]: AS-REQ server.sheavernet.private$@SERVER.SHEAVERNET.PRIVATE from 127.0.0.1:59519 for krbtgt/SERVER.SHEAVERNET.PRIVATE@SERVER.SHEAVERNET.PRIVATE

    Oct 23 08:31:04 --- last message repeated 1 time ---

    Oct 23 08:31:04 server.sheavernet.private kdc[14291]: Client sent patypes: REQ-ENC-PA-REP

    Oct 23 08:31:04 server.sheavernet.private kdc[14291]: Need to use PA-ENC-TIMESTAMP/PA-PK-AS-REQ

    Oct 23 08:31:04 server.sheavernet.private kdc[14291]: AS-REQ server.sheavernet.private$@SERVER.SHEAVERNET.PRIVATE from 127.0.0.1:54377 for krbtgt/SERVER.SHEAVERNET.PRIVATE@SERVER.SHEAVERNET.PRIVATE

    Oct 23 08:31:05 --- last message repeated 1 time ---

    Oct 23 08:31:05 server.sheavernet.private kdc[14291]: Client sent patypes: ENC-TS, REQ-ENC-PA-REP

    Oct 23 08:31:05 server.sheavernet.private kdc[14291]: ENC-TS pre-authentication succeeded -- server.sheavernet.private$@SERVER.SHEAVERNET.PRIVATE

    Oct 23 08:31:05 server.sheavernet.private kdc[14291]: Client supported enctypes: aes256-cts-hmac-sha1-96, aes128-cts-hmac-sha1-96, des3-cbc-sha1, arcfour-hmac-md5, using aes256-cts-hmac-sha1-96/aes256-cts-hmac-sha1-96

    Oct 23 08:31:05 server.sheavernet.private kdc[14291]: Requested flags: forwardable

    Oct 23 08:31:05 server.sheavernet.private kdc[14291]: TGS-REQ server.sheavernet.private$@SERVER.SHEAVERNET.PRIVATE from 127.0.0.1:53253 for host/server.sheavernet.private@SERVER.SHEAVERNET.PRIVATE [canonicalize]

    Oct 23 08:31:05 server.sheavernet.private kdc[14291]: TGS-REQ server.sheavernet.private$@SERVER.SHEAVERNET.PRIVATE from 127.0.0.1:52312 for ldap/server.sheavernet.private@SERVER.SHEAVERNET.PRIVATE [canonicalize]

    Oct 23 08:31:16 server.sheavernet.private mdworker[36066]: Unable to talk to lsboxd

    Oct 23 08:31:16 server.sheavernet.private mdworker[36067]: Unable to talk to lsboxd

    Oct 23 08:31:16 server.sheavernet.private mdworker[36068]: Unable to talk to lsboxd

    Oct 23 08:31:16 server.sheavernet.private sandboxd[36070] ([36066]): mdworker(36066) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:31:16 server.sheavernet.private sandboxd[36070] ([36067]): mdworker(36067) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:31:16 server.sheavernet.private sandboxd[36070] ([36068]): mdworker(36068) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:31:17 server kernel[0]: Sandbox: sandboxd(36070) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 08:32:05 server.sheavernet.private servermgrd[36063]: -[AccountsRequestHandler(AccountsSystemConfigurationObservation) registerForKeychainEventNotifications]: SecKeychainAddCallback() status: -25297

    Oct 23 08:35:17 server.sheavernet.private mdworker[36103]: Unable to talk to lsboxd

    Oct 23 08:35:17 server.sheavernet.private mdworker[36102]: Unable to talk to lsboxd

    Oct 23 08:35:17 server.sheavernet.private mdworker[36104]: Unable to talk to lsboxd

    Oct 23 08:35:17 server.sheavernet.private sandboxd[36106] ([36103]): mdworker(36103) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:35:17 server.sheavernet.private sandboxd[36106] ([36102]): mdworker(36102) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:35:17 server.sheavernet.private sandboxd[36106] ([36104]): mdworker(36104) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:35:18 server kernel[0]: Sandbox: sandboxd(36106) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 08:36:05 server.sheavernet.private servermgrd[36063]: No requests in 300 seconds, shutting down

    Oct 23 08:37:19 server.sheavernet.private mdworker[36122]: Unable to talk to lsboxd

    Oct 23 08:37:19 server.sheavernet.private sandboxd[36124] ([36122]): mdworker(36122) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:37:19 server kernel[0]: Sandbox: sandboxd(36124) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 08:37:26 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xe3-192.168.1.3:0!

    Oct 23 08:39:19 server.sheavernet.private mdworker[36139]: Unable to talk to lsboxd

    Oct 23 08:39:19 server.sheavernet.private mdworker[36138]: Unable to talk to lsboxd

    Oct 23 08:39:19 server.sheavernet.private sandboxd[36140] ([36139]): mdworker(36139) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:39:19 server.sheavernet.private sandboxd[36140] ([36138]): mdworker(36138) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:39:19 server kernel[0]: Sandbox: sandboxd(36140) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 08:40:15 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xe4-192.168.1.3:0!

    Oct 23 08:43:20 server.sheavernet.private mdworker[36177]: Unable to talk to lsboxd

    Oct 23 08:43:20 server.sheavernet.private mdworker[36176]: Unable to talk to lsboxd

    Oct 23 08:43:20 server.sheavernet.private mdworker[36178]: Unable to talk to lsboxd

    Oct 23 08:43:20 server.sheavernet.private sandboxd[36180] ([36177]): mdworker(36177) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:43:20 server.sheavernet.private sandboxd[36180] ([36176]): mdworker(36176) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:43:20 server.sheavernet.private sandboxd[36180] ([36178]): mdworker(36178) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:43:20 server kernel[0]: Sandbox: sandboxd(36180) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 08:45:21 server.sheavernet.private mdworker[36196]: Unable to talk to lsboxd

    Oct 23 08:45:21 server.sheavernet.private sandboxd[36198] ([36196]): mdworker(36196) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:45:21 server kernel[0]: Sandbox: sandboxd(36198) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 08:49:21 server.sheavernet.private mdworker[36226]: Unable to talk to lsboxd

    Oct 23 08:49:21 server.sheavernet.private mdworker[36225]: Unable to talk to lsboxd

    Oct 23 08:49:21 server.sheavernet.private mdworker[36224]: Unable to talk to lsboxd

    Oct 23 08:49:21 server.sheavernet.private sandboxd[36228] ([36226]): mdworker(36226) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:49:21 server.sheavernet.private sandboxd[36228] ([36225]): mdworker(36225) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:49:21 server.sheavernet.private sandboxd[36228] ([36224]): mdworker(36224) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:49:22 server kernel[0]: Sandbox: sandboxd(36228) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 08:53:22 server.sheavernet.private mdworker[36264]: Unable to talk to lsboxd

    Oct 23 08:53:22 server.sheavernet.private mdworker[36265]: Unable to talk to lsboxd

    Oct 23 08:53:22 server.sheavernet.private mdworker[36266]: Unable to talk to lsboxd

    Oct 23 08:53:22 server.sheavernet.private sandboxd[36268] ([36264]): mdworker(36264) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:53:22 server.sheavernet.private sandboxd[36268] ([36265]): mdworker(36265) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:53:22 server.sheavernet.private sandboxd[36268] ([36266]): mdworker(36266) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:53:22 server kernel[0]: Sandbox: sandboxd(36268) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 08:55:23 server.sheavernet.private mdworker[36284]: Unable to talk to lsboxd

    Oct 23 08:55:23 server kernel[0]: Sandbox: sandboxd(36286) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 08:55:23 server.sheavernet.private sandboxd[36286] ([36284]): mdworker(36284) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:57:24 server.sheavernet.private mdworker[36300]: Unable to talk to lsboxd

    Oct 23 08:57:24 server.sheavernet.private mdworker[36301]: Unable to talk to lsboxd

    Oct 23 08:57:24 server.sheavernet.private sandboxd[36302] ([36300]): mdworker(36300) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:57:24 server.sheavernet.private sandboxd[36302] ([36301]): mdworker(36301) deny mach-lookup com.apple.ls.boxd

    Oct 23 08:57:24 server kernel[0]: Sandbox: sandboxd(36302) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 09:01:24 server.sheavernet.private mdworker[36337]: Unable to talk to lsboxd

    Oct 23 09:01:24 server.sheavernet.private mdworker[36338]: Unable to talk to lsboxd

    Oct 23 09:01:24 server.sheavernet.private mdworker[36339]: Unable to talk to lsboxd

    Oct 23 09:01:24 server kernel[0]: Sandbox: sandboxd(36341) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 09:01:24 server.sheavernet.private sandboxd[36341] ([36337]): mdworker(36337) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:01:24 server.sheavernet.private sandboxd[36341] ([36338]): mdworker(36338) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:01:24 server.sheavernet.private sandboxd[36341] ([36339]): mdworker(36339) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:03:25 server.sheavernet.private mdworker[36357]: Unable to talk to lsboxd

    Oct 23 09:03:25 server.sheavernet.private sandboxd[36359] ([36357]): mdworker(36357) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:03:25 server kernel[0]: Sandbox: sandboxd(36359) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 09:07:26 server.sheavernet.private mdworker[36388]: Unable to talk to lsboxd

    Oct 23 09:07:26 server.sheavernet.private mdworker[36386]: Unable to talk to lsboxd

    Oct 23 09:07:26 server.sheavernet.private mdworker[36387]: Unable to talk to lsboxd

    Oct 23 09:07:26 server.sheavernet.private sandboxd[36390] ([36388]): mdworker(36388) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:07:26 server.sheavernet.private sandboxd[36390] ([36386]): mdworker(36386) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:07:26 server.sheavernet.private sandboxd[36390] ([36387]): mdworker(36387) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:07:26 server kernel[0]: Sandbox: sandboxd(36390) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 09:11:27 server.sheavernet.private mdworker[36428]: Unable to talk to lsboxd

    Oct 23 09:11:27 server.sheavernet.private mdworker[36426]: Unable to talk to lsboxd

    Oct 23 09:11:27 server.sheavernet.private mdworker[36427]: Unable to talk to lsboxd

    Oct 23 09:11:27 server.sheavernet.private sandboxd[36430] ([36428]): mdworker(36428) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:11:27 server.sheavernet.private sandboxd[36430] ([36426]): mdworker(36426) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:11:27 server.sheavernet.private sandboxd[36430] ([36427]): mdworker(36427) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:11:27 server kernel[0]: Sandbox: sandboxd(36430) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 09:12:27 server.sheavernet.private com.apple.backupd[36441]: Starting automatic backup

    Oct 23 09:12:27 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/UserEventAgent' [15] for authorization created by '/usr/libexec/UserEventAgent' [15] (100012,0)

    Oct 23 09:12:27 server.sheavernet.private com.apple.backupd[36441]: Backup failed with error: 19

    Oct 23 09:12:27 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/UserEventAgent' [15] for authorization created by '/usr/libexec/UserEventAgent' [15] (100012,0)

    Oct 23 09:12:28 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

    Oct 23 09:12:28 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

    Oct 23 09:13:28 server.sheavernet.private mdworker[36449]: Unable to talk to lsboxd

    Oct 23 09:13:28 server.sheavernet.private sandboxd[36451] ([36449]): mdworker(36449) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:13:29 server kernel[0]: Sandbox: sandboxd(36451) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 09:15:29 server.sheavernet.private mdworker[36466]: Unable to talk to lsboxd

    Oct 23 09:15:29 server.sheavernet.private mdworker[36465]: Unable to talk to lsboxd

    Oct 23 09:15:29 server.sheavernet.private sandboxd[36467] ([36466]): mdworker(36466) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:15:29 server.sheavernet.private sandboxd[36467] ([36465]): mdworker(36465) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:15:29 server kernel[0]: Sandbox: sandboxd(36467) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 09:19:30 server.sheavernet.private mdworker[36496]: Unable to talk to lsboxd

    Oct 23 09:19:30 server.sheavernet.private mdworker[36495]: Unable to talk to lsboxd

    Oct 23 09:19:30 server.sheavernet.private mdworker[36494]: Unable to talk to lsboxd

    Oct 23 09:19:30 server.sheavernet.private sandboxd[36499] ([36496]): mdworker(36496) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:19:30 server.sheavernet.private sandboxd[36499] ([36495]): mdworker(36495) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:19:30 server.sheavernet.private sandboxd[36499] ([36494]): mdworker(36494) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:19:30 server kernel[0]: Sandbox: sandboxd(36499) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 09:21:40 server.sheavernet.private mdworker[36524]: Unable to talk to lsboxd

    Oct 23 09:21:40 server.sheavernet.private sandboxd[36526] ([36524]): mdworker(36524) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:21:40 server kernel[0]: Sandbox: sandboxd(36526) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 09:25:41 server.sheavernet.private mdworker[36554]: Unable to talk to lsboxd

    Oct 23 09:25:41 server.sheavernet.private mdworker[36553]: Unable to talk to lsboxd

    Oct 23 09:25:41 server.sheavernet.private mdworker[36552]: Unable to talk to lsboxd

    Oct 23 09:25:41 server.sheavernet.private sandboxd[36556] ([36554]): mdworker(36554) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:25:41 server.sheavernet.private sandboxd[36556] ([36553]): mdworker(36553) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:25:41 server.sheavernet.private sandboxd[36556] ([36552]): mdworker(36552) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:25:41 server kernel[0]: Sandbox: sandboxd(36556) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 09:29:41 server.sheavernet.private mdworker[36584]: Unable to talk to lsboxd

    Oct 23 09:29:41 server.sheavernet.private sandboxd[36585] ([36584]): mdworker(36584) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:29:41 server.sheavernet.private mdworker[36586]: Unable to talk to lsboxd

    Oct 23 09:29:41 server.sheavernet.private sandboxd[36585] ([36586]): mdworker(36586) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:29:42 server kernel[0]: Sandbox: sandboxd(36585) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 09:29:42 server.sheavernet.private mdworker[36587]: Unable to talk to lsboxd

    Oct 23 09:29:42 server.sheavernet.private sandboxd[36585] ([36587]): mdworker(36587) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:31:42 server.sheavernet.private mdworker[36615]: Unable to talk to lsboxd

    Oct 23 09:31:42 server.sheavernet.private sandboxd[36617] ([36615]): mdworker(36615) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:31:43 server kernel[0]: Sandbox: sandboxd(36617) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 09:33:43 server.sheavernet.private mdworker[36631]: Unable to talk to lsboxd

    Oct 23 09:33:43 server.sheavernet.private mdworker[36632]: Unable to talk to lsboxd

    Oct 23 09:33:43 server.sheavernet.private sandboxd[36633] ([36631]): mdworker(36631) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:33:43 server.sheavernet.private sandboxd[36633] ([36632]): mdworker(36632) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:33:43 server kernel[0]: Sandbox: sandboxd(36633) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 09:37:44 server.sheavernet.private mdworker[36663]: Unable to talk to lsboxd

    Oct 23 09:37:44 server.sheavernet.private mdworker[36662]: Unable to talk to lsboxd

    Oct 23 09:37:44 server.sheavernet.private mdworker[36661]: Unable to talk to lsboxd

    Oct 23 09:37:44 server.sheavernet.private sandboxd[36665] ([36663]): mdworker(36663) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:37:44 server.sheavernet.private sandboxd[36665] ([36662]): mdworker(36662) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:37:44 server.sheavernet.private sandboxd[36665] ([36661]): mdworker(36661) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:37:44 server kernel[0]: Sandbox: sandboxd(36665) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 09:38:45 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xe5-192.168.1.3:0!

    Oct 23 09:39:45 server.sheavernet.private mdworker[36681]: Unable to talk to lsboxd

    Oct 23 09:39:45 server.sheavernet.private sandboxd[36683] ([36681]): mdworker(36681) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:39:45 server kernel[0]: Sandbox: sandboxd(36683) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 09:40:20 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xe6-192.168.1.3:0!

    Oct 23 09:43:45 server.sheavernet.private mdworker[36718]: Unable to talk to lsboxd

    Oct 23 09:43:45 server.sheavernet.private mdworker[36717]: Unable to talk to lsboxd

    Oct 23 09:43:45 server.sheavernet.private mdworker[36719]: Unable to talk to lsboxd

    Oct 23 09:43:45 server.sheavernet.private sandboxd[36721] ([36718]): mdworker(36718) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:43:45 server.sheavernet.private sandboxd[36721] ([36717]): mdworker(36717) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:43:45 server.sheavernet.private sandboxd[36721] ([36719]): mdworker(36719) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:43:46 server kernel[0]: Sandbox: sandboxd(36721) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 09:47:46 server.sheavernet.private mdworker[36749]: Unable to talk to lsboxd

    Oct 23 09:47:46 server.sheavernet.private mdworker[36751]: Unable to talk to lsboxd

    Oct 23 09:47:46 server.sheavernet.private mdworker[36750]: Unable to talk to lsboxd

    Oct 23 09:47:46 server.sheavernet.private sandboxd[36753] ([36749]): mdworker(36749) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:47:46 server.sheavernet.private sandboxd[36753] ([36751]): mdworker(36751) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:47:46 server.sheavernet.private sandboxd[36753] ([36750]): mdworker(36750) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:47:46 server kernel[0]: Sandbox: sandboxd(36753) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 09:49:47 server.sheavernet.private mdworker[36770]: Unable to talk to lsboxd

    Oct 23 09:49:47 server.sheavernet.private sandboxd[36772] ([36770]): mdworker(36770) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:49:48 server kernel[0]: Sandbox: sandboxd(36772) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 09:51:48 server.sheavernet.private mdworker[36795]: Unable to talk to lsboxd

    Oct 23 09:51:48 server.sheavernet.private mdworker[36794]: Unable to talk to lsboxd

    Oct 23 09:51:48 server.sheavernet.private sandboxd[36796] ([36795]): mdworker(36795) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:51:48 server.sheavernet.private sandboxd[36796] ([36794]): mdworker(36794) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:51:48 server kernel[0]: Sandbox: sandboxd(36796) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 09:55:48 server.sheavernet.private mdworker[36825]: Unable to talk to lsboxd

    Oct 23 09:55:48 server.sheavernet.private mdworker[36823]: Unable to talk to lsboxd

    Oct 23 09:55:48 server.sheavernet.private mdworker[36824]: Unable to talk to lsboxd

    Oct 23 09:55:49 server.sheavernet.private sandboxd[36827] ([36825]): mdworker(36825) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:55:49 server.sheavernet.private sandboxd[36827] ([36823]): mdworker(36823) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:55:49 server.sheavernet.private sandboxd[36827] ([36824]): mdworker(36824) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:55:49 server kernel[0]: Sandbox: sandboxd(36827) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 09:57:49 server.sheavernet.private mdworker[36843]: Unable to talk to lsboxd

    Oct 23 09:57:49 server.sheavernet.private sandboxd[36845] ([36843]): mdworker(36843) deny mach-lookup com.apple.ls.boxd

    Oct 23 09:57:50 server kernel[0]: Sandbox: sandboxd(36845) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 10:01:50 server.sheavernet.private mdworker[36879]: Unable to talk to lsboxd

    Oct 23 10:01:50 server.sheavernet.private mdworker[36880]: Unable to talk to lsboxd

    Oct 23 10:01:50 server.sheavernet.private mdworker[36881]: Unable to talk to lsboxd

    Oct 23 10:01:50 server.sheavernet.private sandboxd[36883] ([36879]): mdworker(36879) deny mach-lookup com.apple.ls.boxd

    Oct 23 10:01:50 server.sheavernet.private sandboxd[36883] ([36880]): mdworker(36880) deny mach-lookup com.apple.ls.boxd

    Oct 23 10:01:50 server.sheavernet.private sandboxd[36883] ([36881]): mdworker(36881) deny mach-lookup com.apple.ls.boxd

    Oct 23 10:01:50 server kernel[0]: Sandbox: sandboxd(36883) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 10:05:51 server.sheavernet.private mdworker[36911]: Unable to talk to lsboxd

    Oct 23 10:05:51 server.sheavernet.private mdworker[36912]: Unable to talk to lsboxd

    Oct 23 10:05:51 server.sheavernet.private mdworker[36913]: Unable to talk to lsboxd

    Oct 23 10:05:51 server.sheavernet.private sandboxd[36915] ([36911]): mdworker(36911) deny mach-lookup com.apple.ls.boxd

    Oct 23 10:05:51 server.sheavernet.private sandboxd[36915] ([36912]): mdworker(36912) deny mach-lookup com.apple.ls.boxd

    Oct 23 10:05:51 server.sheavernet.private sandboxd[36915] ([36913]): mdworker(36913) deny mach-lookup com.apple.ls.boxd

    Oct 23 10:05:51 server kernel[0]: Sandbox: sandboxd(36915) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 10:07:52 server.sheavernet.private mdworker[36932]: Unable to talk to lsboxd

    Oct 23 10:07:52 server.sheavernet.private sandboxd[36934] ([36932]): mdworker(36932) deny mach-lookup com.apple.ls.boxd

    Oct 23 10:07:52 server kernel[0]: Sandbox: sandboxd(36934) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 10:09:53 server.sheavernet.private mdworker[36948]: Unable to talk to lsboxd

    Oct 23 10:09:53 server.sheavernet.private mdworker[36949]: Unable to talk to lsboxd

    Oct 23 10:09:53 server.sheavernet.private sandboxd[36950] ([36948]): mdworker(36948) deny mach-lookup com.apple.ls.boxd

    Oct 23 10:09:53 server.sheavernet.private sandboxd[36950] ([36949]): mdworker(36949) deny mach-lookup com.apple.ls.boxd

    Oct 23 10:09:53 server kernel[0]: Sandbox: sandboxd(36950) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 10:12:32 server.sheavernet.private WindowServer[16413]: handle_will_sleep_auth_and_shield_windows: no lock state data

    Oct 23 10:12:44 server.sheavernet.private SecurityAgent[16423]: User info context values set for serveradmin

    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_authenticate(): Got user: serveradmin

    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_authenticate(): Got ruser: (null)

    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_authenticate(): Got service: authorization

    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in od_principal_for_user(): No authentication authority returned

    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in od_principal_for_user(): failed: 7

    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_authenticate(): Failed to determine Kerberos principal name.

    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_authenticate(): Done cleanup3

    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_authenticate(): Kerberos 5 refuses you

    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_authenticate(): pam_sm_authenticate: ntlm

    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_acct_mgmt(): OpenDirectory - Membership cache TTL set to 1800.

    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in od_record_check_pwpolicy(): retval: 0

    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in od_record_attribute_create_cfstring(): returned 2 attributes for dsAttrTypeStandard:AuthenticationAuthority

    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Establishing credentials

    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Got user: serveradmin

    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Context initialised

    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Got euid, egid: 0 0

    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Done getpwnam()

    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Done setegid() & seteuid()

    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): pam_sm_setcred: krb5 user serveradmin doesn't have a principal

    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Done cleanup3

    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Done seteuid() & setegid()

    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Done cleanup4

    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): pam_sm_setcred: ntlm

    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): pam_sm_setcred: no domain found skipping

    Oct 23 10:12:44 server.sheavernet.private SecurityAgent[16423]: Login Window login proceeding

    Oct 23 10:12:44 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.login.console' by client '/System/Library/CoreServices/loginwindow.app' [16412] for authorization created by '/System/Library/CoreServices/loginwindow.app' [16412] (100003,0)

    Oct 23 10:12:44 server.sheavernet.private loginwindow[16412]: Login Window - Returned from Security Agent

    Oct 23 10:12:44 server.sheavernet.private loginwindow[16412]: ERROR | ScreensharingLoginNotification | Failed sending message to screen sharing GetScreensharingPort, err: 1102

    Oct 23 10:12:44 server.sheavernet.private loginwindow[16412]: USER_PROCESS: 16412 console

    Oct 23 10:12:44 server.sheavernet.private launchctl[36981]: Could not open job overrides database at: /private/var/db/launchd.db/com.apple.launchd.peruser.503/overrides.plist: 2: No such file or directory

    Oct 23 10:12:44 server.sheavernet.private launchctl[36981]: launchctl: Dubious permissions on file (skipping): /Library/LaunchAgents/com.adobe.AAM.Updater-1.0.plist

    Oct 23 10:12:44 server com.apple.launchd.peruser.503[11657] (com.apple.gamed): Ignored this key: UserName

    Oct 23 10:12:44 server com.apple.launchd.peruser.503[11657] (com.apple.gamed): Ignored this key: GroupName

    Oct 23 10:12:44 server com.apple.launchd.peruser.503[11657] (com.apple.ReportCrash): Falling back to default Mach exception handler. Could not find: com.apple.ReportCrash.Self

    Oct 23 10:12:44 server.sheavernet.private loginwindow[16412]: Connection with distnoted server was invalidated

    Oct 23 10:12:44 server.sheavernet.private launchproxyls[36985]: FAILURE: Failed to open property list at file://localhost/private/var/db/launchd.db/com.apple.launchd.peruser.503/overri des.plist for reading. (The operation couldn\u2019t be completed. No such file or directory)

    Oct 23 10:12:44 --- last message repeated 3 times ---

    Oct 23 10:12:44 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.login.done' by client '/System/Library/CoreServices/loginwindow.app' [16412] for authorization created by '/System/Library/CoreServices/loginwindow.app' [16412] (100002,0)

    Oct 23 10:12:45 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

    Oct 23 10:12:45 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

    Oct 23 10:12:45 server.sheavernet.private WindowServer[16413]: **DMPROXY** (2) Found `/System/Library/CoreServices/DMProxy'.

    Oct 23 10:12:45 server.sheavernet.private WindowServer[16413]: Display 0x042801c0: MappedDisplay Unit 0; ColorProfile { 2, "iMac"}; TransferFormula (1.000000, 1.000000, 1.000000)

    Oct 23 10:12:45 server.sheavernet.private blued[60]: kBTXPCUpdateUserPreferences gConsoleUserUID = 503

    Oct 23 10:12:45 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.services.systemconfiguration.network' by client '/usr/libexec/UserEventAgent' [36982] for authorization created by '/usr/libexec/UserEventAgent' [36982] (100000,0)

    Oct 23 10:12:45 --- last message repeated 1 time ---

    Oct 23 10:12:45 server.sheavernet.private UserEventAgent[36982]: cannot find fw daemon port 1102

    Oct 23 10:12:45 server.sheavernet.private coreservicesd[66]: SendFlattenedData, got error #268435460 (ipc/send) timed out from ::mach_msg(), sending notification kLSNotifyApplicationLaunch to notificationID=5591

    Oct 23 10:12:45 server.sheavernet.private UserEventAgent[36982]: FAILURE: Failed to open property list at file://localhost/private/var/db/launchd.db/com.apple.launchd.peruser.503/overri des.plist for reading. (The operation couldn\u2019t be completed. No such file or directory)

    Oct 23 10:12:46 --- last message repeated 1 time ---

    Oct 23 10:12:45 server.sheavernet.private UserEventAgent[36982]: FAILURE: Failed to write property list at file://localhost/private/var/db/launchd.db/com.apple.launchd.peruser.503/overri des.plist. (The operation couldn\u2019t be completed. No such file or directory)

    Oct 23 10:12:45 server.sheavernet.private UserEventAgent[36982]: FAILURE: Could not repair overrides database: 0x2

    Oct 23 10:12:45 server.sheavernet.private UserEventAgent[36982]: FAILURE: Failed to open property list at file://localhost/private/var/db/launchd.db/com.apple.launchd.peruser.503/overri des.plist for reading. (The operation couldn\u2019t be completed. No such file or directory)

    Oct 23 10:12:45 server.sheavernet.private UserEventAgent[36982]: com.apple.TMLaunchAgent disabled

    Oct 23 10:12:45 server.sheavernet.private NetworkBrowserAgent[37002]: Starting NetworkBrowserAgent

    Oct 23 10:12:46 server com.apple.launchd.peruser.503[11657] (com.apple.afpstat-qfa[37020]): Job failed to exec(3). Setting up event to tell us when to try again: 2: No such file or directory

    Oct 23 10:12:46 server com.apple.launchd.peruser.503[11657] (com.apple.afpstat-qfa[37020]): Job failed to exec(3) for weird reason: 2

    Oct 23 10:12:46 server kernel[0]: CODE SIGNING: cs_invalid_page(0x1000): p=37021[GoogleSoftwareUp] clearing CS_VALID

    Oct 23 10:12:46 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

    Oct 23 10:12:46 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

    Oct 23 10:12:46 server.sheavernet.private talagent[36991]: _LSSetApplicationInformationItem(kLSDefaultSessionID, asn, _kLSApplicationIsHiddenKey, hidden ? kCFBooleanTrue : kCFBooleanFalse, NULL) produced OSStatus -50 on line 623 in TCApplication.m

    Oct 23 10:12:46 server.sheavernet.private talagent[36991]: _LSSetApplicationInformationItem(kLSDefaultSessionID, asn, TAL_kLSIsProxiedForTALKey, kCFBooleanTrue, NULL) produced OSStatus -50 on line 626 in TCApplication.m

    Oct 23 10:12:46 server com.apple.launchd.peruser.503[11657] (com.apple.mrt.uiagent[37009]): Exited with code: 255

    Oct 23 10:12:47 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

    Oct 23 10:12:47 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

    Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KeystoneDaemon logServiceState] GoogleSoftwareUpdate daemon (1.1.0.3659) vending:

                        com.google.Keystone.Daemon.UpdateEngine: 1 connection(s)

                        com.google.Keystone.Daemon.Administration: 0 connection(s)

    Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KeystoneDaemon logServiceState] GoogleSoftwareUpdate daemon (1.1.0.3659) vending:

                        com.google.Keystone.Daemon.UpdateEngine: 1 connection(s)

                        com.google.Keystone.Daemon.Administration: 1 connection(s)

    Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSDaemonAdministration(PrivateMethods) ticketsAllowUninstallWithError:] KSDaemonAdministration system Keystone will not uninstall with active tickets.

    Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KeystoneDaemon logServiceState] GoogleSoftwareUpdate daemon (1.1.0.3659) vending:

                        com.google.Keystone.Daemon.UpdateEngine: 1 connection(s)

                        com.google.Keystone.Daemon.Administration: 0 connection(s)

    Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KeystoneDaemon logServiceState] GoogleSoftwareUpdate daemon (1.1.0.3659) vending:

                        com.google.Keystone.Daemon.UpdateEngine: 2 connection(s)

                        com.google.Keystone.Daemon.Administration: 0 connection(s)

    Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSUpdateEngine updateProductID:] KSUpdateEngine updating product ID: "com.google.Keystone"

    Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSCheckAction performAction] KSCheckAction checking 1 ticket(s).

    Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSUpdateCheckAction performAction] KSUpdateCheckAction starting update check for ticket(s): {(

                        <KSTicket:0x285710

                                  productID=com.google.Keystone

                                  version=1.1.0.3659

                                  xc=<KSPathExistenceChecker:0x285f50 path=/Library/Google/GoogleSoftwareUpdate/GoogleSoftwareUpdate.bundle/>

                                  serverType=Omaha

                                  url=https://tools.google.com/service/update2

                                  creationDate=2012-02-02 00:47:33

                        >

              )}

              Using server: <KSOmahaServer:0x2176ef0

                        engine=<KSDaemonUpdateEngine:0x2823e0>

                        params={

                                  EngineVersion = "1.1.0.3659";

                                  ActivesInfo = {

                                            "com.google.Keystone" = {

                                                      LastActivePingDate = 2012-10-21 07:00:01 +0000;

                                                      LastActiveDate = 2012-10-23 14:12:48 +0000;

                                                      LastRollCallPingDate = 2012-10-21 07:00:01 +0000;

                                            };

                                            "com.google.Chrome" = {

                                                      LastRollCallPingDate = 2012-10-21 07:00:01 +0000;

                                            };

                                  };

                                  UserInitiated = 0;

                                  IsSystem = 1;

                                  OmahaOSVersion = "10.8.2_i486";

                                  Identity = KeystoneDaemon;

                                  AllowedSubdomains = (

                                            ".omaha.sandbox.google.com",

                                            ".tools.google.com",

                                            ".www.google.com",

                                            ".corp.google.com"

                                  );

                        }

              >

    Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSUpdateCheckAction performAction] KSUpdateCheckAction running KSServerUpdateRequest: <KSOmahaServerUpdateRequest:0x217f260

                        server=<KSOmahaServer:0x2176ef0>

                        url="https://tools.google.com/service/update2"

                        runningFetchers=0

                        tickets=1

                        activeTickets=1

                        rollCallTickets=1

                        body=

                                  <?xml version="1.0" encoding="UTF-8" standalone="yes"?>

                                  <o:gupdate xmlns:o="http://www.google.com/update2/request" protocol="2.0" version="KeystoneDaemon-1.1.0.3659" ismachine="1">

                                      <o:os platform="mac" version="MacOSX" sp="10.8.2_i486"></o:os>

                                      <o:app appid="com.google.Keystone" version="1.1.0.3659" lang="en-us" installage="264" brand="GGLG">

                                          <o:ping r="2" a="2"></o:ping>

                                          <o:updatecheck></o:updatecheck>

                                      </o:app>

                                  </o:gupdate>

              >

    Oct 23 10:12:51 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSUpdateCheckAction(KSServerUpdateRequestDelegate) serverRequest:fetchedWithResponse:] KSUpdateCheckAction received KSServerUpdateResponse: <KSOmahaServerUpdateResponse:0x2076ef0

                        server=<KSOmahaServer:0x2176ef0>

                        url="https://tools.google.com/service/update2"

                        status=200

                        tickets=1

                        activeTickets=1

                        rollCallTickets=1

                        data=

                                  <?xml version="1.0" encoding="UTF-8" standalone="yes"?>

                                  <gupdate xmlns="http://www.google.com/update2/response" protocol="2.0" server="prod">

                                      <daystart elapsed_seconds="25970"></daystart>

                                      <app appid="com.google.Keystone" status="ok">

                                          <ping status="ok"></ping>

                                          <updatecheck status="noupdate"></updatecheck>

                                      </app>

                                  </gupdate>

              >

    Oct 23 10:12:51 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

    Oct 23 10:12:51 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

    Oct 23 10:12:51 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSUpdateCheckAction(PrivateMethods) finishAction] KSUpdateCheckAction found updates: {( )}

    Oct 23 10:12:51 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSPrefetchAction performAction] KSPrefetchAction no updates to prefetch.

    Oct 23 10:12:51 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSMultiUpdateAction performAction] KSSilentUpdateAction had no updates to apply.

    Oct 23 10:12:51 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSMultiUpdateAction performAction] KSPromptAction had no updates to apply.

    Oct 23 10:12:51 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSUpdateEngine(PrivateMethods) updateFinish] KSUpdateEngine update processing complete.

    Oct 23 10:12:51 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSUpdateEngine updateAllProducts] KSUpdateEngine updating all installed products.

    Oct 23 10:12:51 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSCheckAction performAction] KSCheckAction checking 2 ticket(s).

    Oct 23 10:12:51 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSUpdateCheckAction performAction] KSUpdateCheckAction starting update check for ticket(s): {(

                        <KSTicket:0x217a810

                                  productID=com.google.Chrome

                                  version=22.0.1229.94

                                  xc=<KSPathExistenceChecker:0x217f520 path=/Applications/Google Chrome.app>

                                  serverType=Omaha

                                  url=https://tools.google.com/service/update2

                                  creationDate=2012-02-02 00:47:34

                                  tagPath=/Applications/Google Chrome.app/Contents/Info.plist

                                  tagKey=KSChannelID

                                  brandPath=/Library/Google/Google Chrome Brand.plist

                                  brandKey=KSBrandID

                                  versionPath=/Applications/Google Chrome.app/Contents/Info.plist

                                  versionKey=KSVersion

                        >,

                        <KSTicket:0x217a970

                                  productID=com.google.Keystone

                                  version=1.1.0.3659

                                  xc=<KSPathExistenceChecker:0x217fc40 path=/Library/Google/GoogleSoftwareUpdate/GoogleSoftwareUpdate.bundle/>

                                  serverType=Omaha

                                  url=https://tools.google.com/service/update2

                                  creationDate=2012-02-02 00:47:33

                        >

              )}

              Using server: <KSOmahaServer:0x217fea0

                        engine=<KSDaemonUpdateEngine:0x2823e0>

                        params={

                                  EngineVersion = "1.1.0.3659";

                                  ActivesInfo = {

                                            "com.google.Keystone" = {

                                                      LastActivePingDate = 2012-10-23 07:00:01 +0000;

                                                      LastActiveDate = 2012-10-23 14:12:48 +0000;

                                                      LastRollCallPingDate = 2012-10-23 07:00:01 +0000;

                                            };

                                            "com.google.Chrome" = {

                                                      LastRollCallPingDate = 2012-10-21 07:00:01 +0000;

                                            };

                                  };

                                  UserInitiated = 0;

                                  IsSystem = 1;

                                  OmahaOSVersion = "10.8.2_i486";

                                  Identity = KeystoneDaemon;

                                  AllowedSubdomains = (

                                            ".omaha.sandbox.google.com",

                                            ".tools.google.com",

                                            ".www.google.com",

                                            ".corp.google.com"

                                  );

                        }

              >

    Oct 23 10:12:51 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSUpdateCheckAction performAction] KSUpdateCheckAction running KSServerUpdateRequest: <KSOmahaServerUpdateRequest:0x2188680

                        server=<KSOmahaServer:0x217fea0>

                        url="https://tools.google.com/service/update2"

                        runningFetchers=0

                        tickets=2

                        activeTickets=0

                        rollCallTickets=1

                        body=

                                  <?xml version="1.0" encoding="UTF-8" standalone="yes"?>

                                  <o:gupdate xmlns:o="http://www.google.com/update2/request" protocol="2.0" version="KeystoneDaemon-1.1.0.3659" ismachine="1">

                                      <o:os platform="mac" version="MacOSX" sp="10.8.2_i486"></o:os>

                                      <o:app appid="com.google.Chrome" version="22.0.1229.94" lang="en-us" installage="264" brand="GGRO">

                                          <o:ping r="2"></o:ping>

                                          <o:updatecheck></o:updatecheck>

                                      </o:app>

                                      <o:app appid="com.google.Keystone" version="1.1.0.3659" lang="en-us" installage="264" brand="GGLG">

                                          <o:updatecheck></o:updatecheck>

                                      </o:app>

                                  </o:gupdate>

              >

    Oct 23 10:12:52 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSUpdateCheckAction(KSServerUpdateRequestDelegate) serverRequest:fetchedWithResponse:] KSUpdateCheckAction received KSServerUpdateResponse: <KSOmahaServerUpdateResponse:0x57cbe0

                        server=<KSOmahaServer:0x217fea0>

                        url="https://tools.google.com/service/update2"

                        status=200

                        tickets=2

                        activeTickets=0

                        rollCallTickets=1

                        data=

                                  <?xml version="1.0" encoding="UTF-8" standalone="yes"?>

                                  <gupdate xmlns="http://www.google.com/update2/response" protocol="2.0" server="prod">

                                      <daystart elapsed_seconds="25971"></daystart>

                                      <app appid="com.google.Chrome" status="ok">

                                          <ping status="ok"></ping>

                                          <updatecheck status="noupdate"></updatecheck>

                                      </app>

                                      <app appid="com.google.Keystone" status="ok">

                                          <updatecheck status="noupdate"></updatecheck>

                                      </app>

                                  </gupdate>

              >

    Oct 23 10:12:52 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSUpdateCheckAction(PrivateMethods) finishAction] KSUpdateCheckAction found updates: {( )}

    Oct 23 10:12:52 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSPrefetchAction performAction] KSPrefetchAction no updates to prefetch.

    Oct 23 10:12:52 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSMultiUpdateAction performAction] KSSilentUpdateAction had no updates to apply.

    Oct 23 10:12:52 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSMultiUpdateAction performAction] KSPromptAction had no updates to apply.

    Oct 23 10:12:52 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSUpdateEngine(PrivateMethods) updateFinish] KSUpdateEngine update processing complete.

    Oct 23 10:12:52 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

    Oct 23 10:12:52 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

    Oct 23 10:12:53 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KeystoneDaemon logServiceState] GoogleSoftwareUpdate daemon (1.1.0.3659) vending:

                        com.google.Keystone.Daemon.UpdateEngine: 1 connection(s)

                        com.google.Keystone.Daemon.Administration: 0 connection(s)

    Oct 23 10:12:57 server.sheavernet.private com.apple.backupd[37027]: Starting automatic backup

    Oct 23 10:12:57 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/UserEventAgent' [15] for authorization created by '/usr/libexec/UserEventAgent' [15] (100012,0)

    Oct 23 10:12:57 server.sheavernet.private UserEventAgent[36982]: FAILURE: Failed to open property list at file://localhost/private/var/db/launchd.db/com.apple.launchd.peruser.503/overri des.plist for reading. (The operation couldn\u2019t be completed. No such file or directory)

    Oct 23 10:12:57 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/UserEventAgent' [15] for authorization created by '/usr/libexec/UserEventAgent' [15] (100012,0)

    Oct 23 10:12:57 server.sheavernet.private UserEventAgent[36982]: FAILURE: Failed to open property list at file://localhost/private/var/db/launchd.db/com.apple.launchd.peruser.503/overri des.plist for reading. (The operation couldn\u2019t be completed. No such file or directory)

    Oct 23 10:12:57 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

    Oct 23 10:12:57 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

    Oct 23 10:12:58 server.sheavernet.private com.apple.backupd[37027]: Backup failed with error: 19

    Oct 23 10:12:58 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

    Oct 23 10:12:58 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

    Oct 23 10:12:59 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

    Oct 23 10:12:59 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

    Oct 23 10:13:00 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

    Oct 23 10:13:00 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

    Oct 23 10:13:01 server.sheavernet.private xpcd[15997]: restored permissions (100644 -> 100744) on /Users/serveradmin/Library/Containers/com.apple.ShareKitHelper/Container.plist

    Oct 23 10:13:03 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

    Oct 23 10:13:03 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

    Oct 23 10:13:04 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

    Oct 23 10:13:04 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

    Oct 23 10:13:05 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

    Oct 23 10:13:05 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

    Oct 23 10:13:06 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.SoftwareUpdate.scan' by client '/Applications/App Store.app' [37041] for authorization created by '/Applications/App Store.app' [37041] (100003,0)

    Oct 23 10:13:06 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.install.apple-software' by client '/Applications/App Store.app' [37041] for authorization created by '/Applications/App Store.app' [37041] (100003,0)

    Oct 23 10:13:06 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.install.apple-software' by client '/System/Library/PrivateFrameworks/PackageKit.framework/Versions/A/Resources/in stalld' [37050] for authorization created by '/Applications/App Store.app' [37041] (4,0)

    Oct 23 10:13:06 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.install.app-store-software' by client '/System/Library/PrivateFrameworks/PackageKit.framework/Versions/A/Resources/in stalld' [37050] for authorization created by '/Applications/App Store.app' [37041] (4,0)

    Oct 23 10:13:06 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.SoftwareUpdate.scan' by client '/System/Library/PrivateFrameworks/SoftwareUpdate.framework/Versions/A/Resource s/suhelperd' [37044] for authorization created by '/Applications/App Store.app' [37041] (100002,0)

    Oct 23 10:13:07 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

    Oct 23 10:13:07 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

    Oct 23 10:13:08 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

    Oct 23 10:13:08 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

    Oct 23 10:13:09 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

    Oct 23 10:13:09 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

    Oct 23 10:13:19 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KeystoneDaemon main] GoogleSoftwareUpdateDaemon inactive, shutdown.

    Oct 23 10:13:30 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

    Oct 23 10:13:30 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

    Oct 23 10:13:31 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

    Oct 23 10:13:31 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

    Oct 23 10:13:42 server.sheavernet.private com.apple.ShareKitHelper[37047]: --warning: [ShareKit-XPC] Received XPC_ERROR_CONNECTION_INVALID

    Oct 23 10:13:42 server.sheavernet.private com.apple.ShareKitHelper[37047]: --warning: [ShareKit-XPC] connectionWithClientInterrupted

    Oct 23 10:13:42 server.sheavernet.private com.apple.ShareKitHelper[37047]: --warning: [ShareKit] Cancel UI for running services with Client PID: 37041

    Oct 23 10:13:43 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

    Oct 23 10:13:43 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

    Oct 23 10:13:54 server.sheavernet.private mdworker[37071]: Unable to talk to lsboxd

    Oct 23 10:13:54 server.sheavernet.private mdworker[37072]: Unable to talk to lsboxd

    Oct 23 10:13:54 server.sheavernet.private mdworker[37073]: Unable to talk to lsboxd

    Oct 23 10:13:54 server.sheavernet.private sandboxd[37075] ([37071]): mdworker(37071) deny mach-lookup com.apple.ls.boxd

    Oct 23 10:13:54 server.sheavernet.private sandboxd[37075] ([37072]): mdworker(37072) deny mach-lookup com.apple.ls.boxd

    Oct 23 10:13:54 server.sheavernet.private sandboxd[37075] ([37073]): mdworker(37073) deny mach-lookup com.apple.ls.boxd

    Oct 23 10:13:54 server kernel[0]: Sandbox: sandboxd(37075) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 10:13:55 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

    Oct 23 10:13:55 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

    Oct 23 10:14:06 server.sheavernet.private kdc[14291]: AS-REQ server.sheavernet.private$@SERVER.SHEAVERNET.PRIVATE from 127.0.0.1:50307 for krbtgt/SERVER.SHEAVERNET.PRIVATE@SERVER.SHEAVERNET.PRIVATE

    Oct 23 10:14:06 --- last message repeated 1 time ---

    Oct 23 10:14:06 server.sheavernet.private kdc[14291]: Client sent patypes: REQ-ENC-PA-REP

    Oct 23 10:14:06 server.sheavernet.private kdc[14291]: Need to use PA-ENC-TIMESTAMP/PA-PK-AS-REQ

    Oct 23 10:14:06 server.sheavernet.private kdc[14291]: AS-REQ server.sheavernet.private$@SERVER.SHEAVERNET.PRIVATE from 127.0.0.1:65534 for krbtgt/SERVER.SHEAVERNET.PRIVATE@SERVER.SHEAVERNET.PRIVATE

    Oct 23 10:14:06 --- last message repeated 1 time ---

    Oct 23 10:14:06 server.sheavernet.private kdc[14291]: Client sent patypes: ENC-TS, REQ-ENC-PA-REP

    Oct 23 10:14:06 server.sheavernet.private kdc[14291]: ENC-TS pre-authentication succeeded -- server.sheavernet.private$@SERVER.SHEAVERNET.PRIVATE

    Oct 23 10:14:06 server.sheavernet.private kdc[14291]: Client supported enctypes: aes256-cts-hmac-sha1-96, aes128-cts-hmac-sha1-96, des3-cbc-sha1, arcfour-hmac-md5, using aes256-cts-hmac-sha1-96/aes256-cts-hmac-sha1-96

    Oct 23 10:14:06 server.sheavernet.private kdc[14291]: Requested flags: forwardable

    Oct 23 10:14:06 server.sheavernet.private kdc[14291]: TGS-REQ server.sheavernet.private$@SERVER.SHEAVERNET.PRIVATE from 127.0.0.1:49658 for host/server.sheavernet.private@SERVER.SHEAVERNET.PRIVATE [canonicalize]

    Oct 23 10:14:06 server.sheavernet.private kdc[14291]: TGS-REQ server.sheavernet.private$@SERVER.SHEAVERNET.PRIVATE from 127.0.0.1:61606 for ldap/server.sheavernet.private@SERVER.SHEAVERNET.PRIVATE [canonicalize]

    Oct 23 10:14:07 server.sheavernet.private servermgrd[37080]: flushing dns cache

    Oct 23 10:14:07 server.sheavernet.private mDNSResponder[43]: SIGHUP: Purge cache

    Oct 23 10:14:08 server.sheavernet.private kdc[14291]: AS-REQ server.sheavernet.private$@SERVER.SHEAVERNET.PRIVATE from 127.0.0.1:63962 for krbtgt/SERVER.SHEAVERNET.PRIVATE@SERVER.SHEAVERNET.PRIVATE

    Oct 23 10:14:08 --- last message repeated 1 time ---

    Oct 23 10:14:08 server.sheavernet.private kdc[14291]: Client sent patypes: REQ-ENC-PA-REP

    Oct 23 10:14:08 server.sheavernet.private kdc[14291]: Need to use PA-ENC-TIMESTAMP/PA-PK-AS-REQ

    Oct 23 10:14:08 server.sheavernet.private kdc[14291]: AS-REQ server.sheavernet.private$@SERVER.SHEAVERNET.PRIVATE from 127.0.0.1:64867 for krbtgt/SERVER.SHEAVERNET.PRIVATE@SERVER.SHEAVERNET.PRIVATE

    Oct 23 10:14:08 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (2,0)

    Oct 23 10:14:08 server.sheavernet.private kdc[14291]: AS-REQ server.sheavernet.private$@SERVER.SHEAVERNET.PRIVATE from 127.0.0.1:64867 for krbtgt/SERVER.SHEAVERNET.PRIVATE@SERVER.SHEAVERNET.PRIVATE

    Oct 23 10:14:08 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (100000,0)

    Oct 23 10:14:08 server.sheavernet.private kdc[14291]: Client sent patypes: ENC-TS, REQ-ENC-PA-REP

    Oct 23 10:14:08 server.sheavernet.private kdc[14291]: ENC-TS pre-authentication succeeded -- server.sheavernet.private$@SERVER.SHEAVERNET.PRIVATE

    Oct 23 10:14:08 server.sheavernet.private kdc[14291]: Client supported enctypes: aes256-cts-hmac-sha1-96, aes128-cts-hmac-sha1-96, des3-cbc-sha1, arcfour-hmac-md5, using aes256-cts-hmac-sha1-96/aes256-cts-hmac-sha1-96

    Oct 23 10:14:08 server.sheavernet.private kdc[14291]: Requested flags: forwardable

    Oct 23 10:14:09 server.sheavernet.private servermgrd[37080]: nsc_smb XPC: handle_event error : < Connection invalid >

    Oct 23 10:14:09 server.sheavernet.private servermgrd[37080]: --Module servermgr_devicemgr's response has retain count of 3.

    Oct 23 10:14:09 server.sheavernet.private servermgrd[37080]: --request was {

                  command = getState;

              }

    Oct 23 10:14:09 server.sheavernet.private servermgrd[37080]: --response was {

                  state = RUNNING;

              }

    Oct 23 10:14:09 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (2,0)

    Oct 23 10:14:09 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (100000,0)

    Oct 23 10:14:09 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (2,0)

    Oct 23 10:14:09 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (100000,0)

    Oct 23 10:14:09 server.sheavernet.private kdc[14291]: TGS-REQ server.sheavernet.private$@SERVER.SHEAVERNET.PRIVATE from 127.0.0.1:52600 for host/server.sheavernet.private@SERVER.SHEAVERNET.PRIVATE [canonicalize]

    Oct 23 10:14:09 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (2,0)

    Oct 23 10:14:09 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (100000,0)

    Oct 23 10:14:09 server.sheavernet.private kdc[14291]: TGS-REQ server.sheavernet.private$@SERVER.SHEAVERNET.PRIVATE from 127.0.0.1:54210 for ldap/server.sheavernet.private@SERVER.SHEAVERNET.PRIVATE [canonicalize]

    Oct 23 10:14:09 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (2,0)

    Oct 23 10:14:09 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (100000,0)

    Oct 23 10:14:09 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (2,0)

    Oct 23 10:14:09 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (100000,0)

    Oct 23 10:14:10 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (2,0)

    Oct 23 10:14:10 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (100000,0)

    Oct 23 10:14:11 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

    Oct 23 10:14:11 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

    Oct 23 10:14:11 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.collabd.settings

    Oct 23 10:14:11 server.sheavernet.private sudo[37113]:     root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

    Oct 23 10:14:11 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/sbin/serverctl' [37117] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/sbin/serverctl' [37117] (2,0)

    Oct 23 10:14:11 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/sbin/serverctl' [37117] (100000,0)

    Oct 23 10:14:11 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/launchdadd' [37085] for authorization created by '/Library/PrivilegedHelperTools/com.apple.serverd' [65] (100002,0)

    Oct 23 10:14:11 server.sheavernet.private servermgrd[37080]: servermgr_web: enableWebApp command succeeded for web app com.apple.webapp.collabd.settings

    Oct 23 10:14:11 server.sheavernet.private ruby[37118]: CFPreferences: user home directory for user kCFPreferencesCurrentUser at /var/teamsserver is unavailable. User domains will be volatile.

    Oct 23 10:14:11 server.sheavernet.private collabd[37118]: [main.m:714 71dd4180 +4ms] HTTP server listening at localhost:4444

    Oct 23 10:14:12 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.postgres

    Oct 23 10:14:12 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

    Oct 23 10:14:12 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

    Oct 23 10:14:12 server.sheavernet.private collabd[37118]: CFPreferences: user home directory for user kCFPreferencesCurrentUser at /var/teamsserver is unavailable. User domains will be volatile.

    Oct 23 10:14:12 server.sheavernet.private sudo[37139]:     root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

    Oct 23 10:14:12 server.sheavernet.private servermgrd[37080]: servermgr_web: enableWebApp command succeeded for web app com.apple.webapp.postgres

    Oct 23 10:14:13 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.collabd.settings

    Oct 23 10:14:14 server.sheavernet.private sudo[37165]:     root : TTY=unknown ; PWD=/Applications/Server.app/Contents/ServerRoot/usr/share/devicemgr/backend ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

    Oct 23 10:14:14 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/sbin/serverctl' [37169] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/sbin/serverctl' [37169] (2,0)

    Oct 23 10:14:14 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/sbin/serverctl' [37169] (100000,0)

    Oct 23 10:14:14 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/launchdadd' [37085] for authorization created by '/Library/PrivilegedHelperTools/com.apple.serverd' [65] (100002,0)

    Oct 23 10:14:14 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

    Oct 23 10:14:14 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

    Oct 23 10:14:14 server.sheavernet.private servermgrd[37080]: servermgr_web: disableWebApp command succeeded for web app com.apple.webapp.collabd.settings

    Oct 23 10:14:14 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.postgres

    Oct 23 10:14:15 server.sheavernet.private sudo[37187]:     root : TTY=unknown ; PWD=/Applications/Server.app/Contents/ServerRoot/usr/share/devicemgr/backend ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

    Oct 23 10:14:15 server.sheavernet.private servermgrd[37080]: servermgr_web: disableWebApp command succeeded for web app com.apple.webapp.postgres

    Oct 23 10:14:15 server.sheavernet.private servermgrd[37080]: nsc_smb XPC: handle_event error : < Connection invalid >

    Oct 23 10:14:45 --- last message repeated 1 time ---

    Oct 23 10:15:07 server.sheavernet.private servermgrd[37080]: -[AccountsRequestHandler(AccountsSystemConfigurationObservation) registerForKeychainEventNotifications]: SecKeychainAddCallback() status: -25297

    Oct 23 10:15:18 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (2,0)

    Oct 23 10:15:18 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/launchdadd' [37225] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (100002,0)

    Oct 23 10:15:18 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (2,0)

    Oct 23 10:15:18 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (100000,0)

    Oct 23 10:15:18 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (2,0)

    Oct 23 10:15:18 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (100000,0)

    Oct 23 10:15:18 server.sheavernet.private mDNSResponder[43]: SIGHUP: Purge cache

    Oct 23 10:15:18 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (2,0)

    Oct 23 10:15:18 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/launchdadd' [37225] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (100002,0)

    Oct 23 10:15:18 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (2,0)

    Oct 23 10:15:18 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (100000,0)

    Oct 23 10:15:18 server.sheavernet.private named[37230]: starting BIND 9.8.3-P1 -f

    Oct 23 10:15:18 server.sheavernet.private named[37230]: built with '--mandir=/usr/share/man' '--infodir=/usr/share/info' '--disable-dependency-tracking' '--prefix=/usr' '--sysconfdir=/private/etc' '--localstatedir=/private/var' '--enable-atomic=no' '--with-openssl=yes' '--with-gssapi=yes' '--enable-symtable=none' 'CC=/Applications/Xcode.app/Contents/Developer/Toolchains/OSX10.8.xctoolchain/u sr/bin/cc' 'CFLAGS=-arch i386 -arch x86_64 -g -Os -pipe -gdwarf-2 ' 'LDFLAGS=-arch i386 -arch x86_64 -framework IOKit -framework CoreFoundation' 'CXX=/Applications/Xcode.app/Contents/Developer/Toolchains/OSX10.8.xctoolchain/ usr/bin/c++' 'CXXFLAGS=-arch i386 -arch x86_64 -g -Os -pipe '

    Oct 23 10:15:18 server.sheavernet.private named[37230]: ----------------------------------------------------

    Oct 23 10:15:18 server.sheavernet.private named[37230]: BIND 9 is maintained by Internet Systems Consortium,

    Oct 23 10:15:18 server.sheavernet.private named[37230]: Inc. (ISC), a non-profit 501(c)(3) public-benefit

    Oct 23 10:15:18 server.sheavernet.private named[37230]: corporation.  Support and training for BIND 9 are

    Oct 23 10:15:18 server.sheavernet.private named[37230]: available at https://www.isc.org/support

    Oct 23 10:15:18 server.sheavernet.private named[37230]: ----------------------------------------------------

    Oct 23 10:15:18 server.sheavernet.private mDNSResponder[43]: SIGHUP: Purge cache

    Oct 23 10:15:18 server.sheavernet.private named[37230]: Warning: view com.apple.ServerAdmin.DNS.public: 'empty-zones-enable/disable-empty-zone' not set: disabling RFC 1918 empty zones

    Oct 23 10:15:18 server.sheavernet.private named[37230]: command channel listening on 127.0.0.1#54

    Oct 23 10:15:18 server.sheavernet.private SystemUIServer[36992]: Menu Extra: <DisplaysExtra: 0x7fd1faa86fd0> is over retained.

    Oct 23 10:15:19 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

    Oct 23 10:15:19 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

    Oct 23 10:15:20 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

    Oct 23 10:15:20 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

    Oct 23 10:15:27 server.sheavernet.private coreservicesd[66]: SendFlattenedData, got error #268435459 (ipc/send) invalid destination port from ::mach_msg(), sending notification kLSNotifyApplicationDeath to notificationID=5623

    Oct 23 10:15:27 server com.apple.launchd.peruser.503[11657] (com.apple.SystemUIServer.agent[36992]): Job appears to have crashed: Segmentation fault: 11

    Oct 23 10:15:28 server.sheavernet.private ReportCrash[37232]: Saved crash report for SystemUIServer[36992] version 1.7 (369.2) to /Users/serveradmin/Library/Logs/DiagnosticReports/SystemUIServer_2012-10-23-101 528_server.crash

    Oct 23 10:15:54 server.sheavernet.private mdworker[37240]: Unable to talk to lsboxd

    Oct 23 10:15:54 server.sheavernet.private sandboxd[37242] ([37240]): mdworker(37240) deny mach-lookup com.apple.ls.boxd

    Oct 23 10:15:55 server kernel[0]: Sandbox: sandboxd(37242) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 10:16:49 server.sheavernet.private servermgrd[37080]: nsc_smb XPC: handle_event error : < Connection invalid >

    Oct 23 10:16:51 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (2,0)

    Oct 23 10:16:51 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (100000,0)

    Oct 23 10:16:51 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.postgres

    Oct 23 10:16:52 server.sheavernet.private sudo[37283]:     root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

    Oct 23 10:16:52 server.sheavernet.private servermgrd[37080]: servermgr_web: enableWebApp command succeeded for web app com.apple.webapp.postgres

    Oct 23 10:16:52 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.collabd.settings

    Oct 23 10:16:52 server.sheavernet.private sudo[37306]:     root : TTY=unknown ; PWD=/Applications/Server.app/Contents/ServerRoot/usr/share/devicemgr/backend ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

    Oct 23 10:16:52 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/sbin/serverctl' [37310] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/sbin/serverctl' [37310] (2,0)

    Oct 23 10:16:52 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/sbin/serverctl' [37310] (100000,0)

    Oct 23 10:16:52 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/launchdadd' [37248] for authorization created by '/Library/PrivilegedHelperTools/com.apple.serverd' [65] (100002,0)

    Oct 23 10:16:52 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

    Oct 23 10:16:52 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

    Oct 23 10:16:52 server.sheavernet.private servermgrd[37080]: servermgr_web: enableWebApp command succeeded for web app com.apple.webapp.collabd.settings

    Oct 23 10:16:53 server.sheavernet.private ruby[37311]: CFPreferences: user home directory for user kCFPreferencesCurrentUser at /var/teamsserver is unavailable. User domains will be volatile.

    Oct 23 10:16:53 server.sheavernet.private collabd[37311]: [main.m:714 71dd4180 +5ms] HTTP server listening at localhost:4444

    Oct 23 10:16:53 server.sheavernet.private collabd[37311]: CFPreferences: user home directory for user kCFPreferencesCurrentUser at /var/teamsserver is unavailable. User domains will be volatile.

    Oct 23 10:16:53 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.collabd.settings

    Oct 23 10:16:53 server.sheavernet.private sudo[37338]:     root : TTY=unknown ; PWD=/Applications/Server.app/Contents/ServerRoot/usr/share/devicemgr/backend ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

    Oct 23 10:16:53 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/sbin/serverctl' [37342] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/sbin/serverctl' [37342] (2,0)

    Oct 23 10:16:53 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/sbin/serverctl' [37342] (100000,0)

    Oct 23 10:16:53 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/launchdadd' [37248] for authorization created by '/Library/PrivilegedHelperTools/com.apple.serverd' [65] (100002,0)

    Oct 23 10:16:53 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

    Oct 23 10:16:53 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

    Oct 23 10:16:53 server.sheavernet.private servermgrd[37080]: servermgr_web: disableWebApp command succeeded for web app com.apple.webapp.collabd.settings

    Oct 23 10:16:54 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.postgres

    Oct 23 10:16:54 server.sheavernet.private sudo[37360]:     root : TTY=unknown ; PWD=/Applications/Server.app/Contents/ServerRoot/usr/share/devicemgr/backend ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

    Oct 23 10:16:54 server.sheavernet.private servermgrd[37080]: servermgr_web: disableWebApp command succeeded for web app com.apple.webapp.postgres

    Oct 23 10:17:21 server.sheavernet.private servermgrd[37080]: --Module servermgr_swupdate's response has retain count of 3.

    Oct 23 10:17:21 server.sheavernet.private servermgrd[37080]: --request was {

                  command = getLogPaths;

              }

    Oct 23 10:17:21 server.sheavernet.private servermgrd[37080]: --response was {

                  swupdateAccessLog = "/var/log/swupd/swupd_access_log";

                  swupdateErrorLog = "/var/log/swupd/swupd_error_log";

                  swupdateServiceLog = "/var/log/swupd/swupd_syncd_log";

              }

    Oct 23 10:17:21 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.postgres

    Oct 23 10:17:22 server.sheavernet.private sudo[37384]:     root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

    Oct 23 10:17:22 server.sheavernet.private servermgrd[37080]: servermgr_web: enableWebApp command succeeded for web app com.apple.webapp.postgres

    Oct 23 10:17:24 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.postgres

    Oct 23 10:17:24 server.sheavernet.private sudo[37407]:     root : TTY=unknown ; PWD=/Applications/Server.app/Contents/ServerRoot/usr/share/devicemgr/backend ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

    Oct 23 10:17:24 server.sheavernet.private servermgrd[37080]: servermgr_web: disableWebApp command succeeded for web app com.apple.webapp.postgres

    Oct 23 10:17:25 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.postgres

    Oct 23 10:17:25 server.sheavernet.private sudo[37429]:     root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

    Oct 23 10:17:25 server.sheavernet.private servermgrd[37080]: servermgr_web: enableWebApp command succeeded for web app com.apple.webapp.postgres

    Oct 23 10:17:27 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.postgres

    Oct 23 10:17:27 server.sheavernet.private sudo[37453]:     root : TTY=unknown ; PWD=/Applications/Server.app/Contents/ServerRoot/usr/share/devicemgr/backend ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

    Oct 23 10:17:27 server.sheavernet.private servermgrd[37080]: servermgr_web: disableWebApp command succeeded for web app com.apple.webapp.postgres

    Oct 23 10:17:27 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.postgres

    Oct 23 10:17:28 server.sheavernet.private sudo[37473]:     root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

    Oct 23 10:17:28 server.sheavernet.private servermgrd[37080]: servermgr_web: enableWebApp command succeeded for web app com.apple.webapp.postgres

    Oct 23 10:17:29 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.postgres

    Oct 23 10:17:30 server.sheavernet.private sudo[37495]:     root : TTY=unknown ; PWD=/Applications/Server.app/Contents/ServerRoot/usr/share/devicemgr/backend ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

    Oct 23 10:17:30 server.sheavernet.private servermgrd[37080]: servermgr_web: disableWebApp command succeeded for web app com.apple.webapp.postgres

    Oct 23 10:17:30 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.postgres

    Oct 23 10:17:30 server.sheavernet.private sudo[37515]:     root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

    Oct 23 10:17:30 server.sheavernet.private servermgrd[37080]: servermgr_web: enableWebApp command succeeded for web app com.apple.webapp.postgres

    Oct 23 10:17:32 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.postgres

    Oct 23 10:17:32 server.sheavernet.private sudo[37538]:     root : TTY=unknown ; PWD=/Applications/Server.app/Contents/ServerRoot/usr/share/devicemgr/backend ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

    Oct 23 10:17:32 server.sheavernet.private servermgrd[37080]: servermgr_web: disableWebApp command succeeded for web app com.apple.webapp.postgres

    Oct 23 10:17:32 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.postgres

    Oct 23 10:17:33 server.sheavernet.private sudo[37558]:     root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

    Oct 23 10:17:33 server.sheavernet.private servermgrd[37080]: servermgr_web: enableWebApp command succeeded for web app com.apple.webapp.postgres

    Oct 23 10:17:34 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.postgres

    Oct 23 10:17:35 server.sheavernet.private sudo[37580]:     root : TTY=unknown ; PWD=/Applications/Server.app/Contents/ServerRoot/usr/share/devicemgr/backend ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

    Oct 23 10:17:35 server.sheavernet.private servermgrd[37080]: servermgr_web: disableWebApp command succeeded for web app com.apple.webapp.postgres

    Oct 23 10:19:55 server.sheavernet.private mdworker[37600]: Unable to talk to lsboxd

    Oct 23 10:19:55 server.sheavernet.private mdworker[37598]: Unable to talk to lsboxd

    Oct 23 10:19:55 server.sheavernet.private mdworker[37599]: Unable to talk to lsboxd

    Oct 23 10:19:55 server.sheavernet.private sandboxd[37602] ([37600]): mdworker(37600) deny mach-lookup com.apple.ls.boxd

    Oct 23 10:19:55 server.sheavernet.private sandboxd[37602] ([37598]): mdworker(37598) deny mach-lookup com.apple.ls.boxd

    Oct 23 10:19:55 server.sheavernet.private sandboxd[37602] ([37599]): mdworker(37599) deny mach-lookup com.apple.ls.boxd

    Oct 23 10:19:56 server kernel[0]: Sandbox: sandboxd(37602) deny mach-lookup com.apple.coresymbolicationd

    Oct 23 10:21:04 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

    Oct 23 10:21:04 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

  • by Peter Jurg2,

    Peter Jurg2 Peter Jurg2 Oct 25, 2012 7:21 AM in response to msheaver
    Level 1 (60 points)
    Oct 25, 2012 7:21 AM in response to msheaver

    You can lookup OD error codes here:

    https://developer.apple.com/library/mac/#documentation/Networking/Reference/Open DirectoryErrors/Reference/reference.html

     

    2100 means that no connection can be established. Is port 389 open?

  • by stefan schaal,

    stefan schaal stefan schaal Jul 9, 2013 3:00 PM in response to Peter Jurg2
    Level 1 (55 points)
    Jul 9, 2013 3:00 PM in response to Peter Jurg2

    I had the same 2100 error for the client binding (server 10.7 or 10.8). Tried all kinds of things. What finally worked was to archive the OD database, erase the LDAP master from the server, and create a new master from the saved archive. Several of the settings in the OD server were re-initialized in this way (check commandline: "serveradmin setttings dirserv" to see all the setting). All worked again. Note that the archving may not work unless you create an appropriate keychain entry on your server.