Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

Cannot Bind Clients to Newly Configured Mac Server (10.8)

I have downloaded, installed and configured Server 10.8 on my iMac, and am having difficulty binding clients (all OS X 10.8) to it. Everything seems to be configured corecttly in the Server app, and the clients are able to find it no problem. But it crashes the client side when I try to bind them to the server. I looked in the sysem log file on the server, and there is a whole mess of error messageas appearing, with a sampling here:


Oct 23 07:08:56 server.sheavernet.private mdworker[34841]: Unable to talk to lsboxd

Oct 23 07:08:56 server.sheavernet.private sandboxd[34843] ([34842]): mdworker(34842) deny mach-lookup com.apple.ls.boxd

Oct 23 07:08:56 server.sheavernet.private sandboxd[34843] ([34841]): mdworker(34841) deny mach-lookup com.apple.ls.boxd

Oct 23 07:08:56 server kernel[0]: Sandbox: sandboxd(34843) deny mach-lookup com.apple.coresymbolicationd


These errors repeat over and over in the log, and may or may not impact what I am trying to do.


When trying to bind the client, I get a whole bunch of error, to many to include here. (wish I could upload the text file). Would someone be willing to take a look at the full listing and help me troubleshoot it? It would be MUCH appreciated!

iMac (27-inch Mid 2011), OS X Mountain Lion (10.8.2)

Posted on Oct 23, 2012 8:09 AM

Reply
Question marked as Best reply

Posted on Oct 23, 2012 8:39 AM

These are unrelated. Follow these instructions to get relevant logging. Then we can break things down.


http://support.apple.com/kb/HT4696?viewlocale=en_US&locale=en_US

5 replies

Oct 24, 2012 3:57 PM in response to msheaver

Thanks Jaime, I went ahead and turned on debug logging and tried again to join my client to the OD. The two screenshots show what I saw on the client side, and the text below contains the log entries associated with this attempt.


User uploaded file


User uploaded file\




Oct 23 07:08:56 server.sheavernet.private mdworker[34841]: Unable to talk to lsboxd

Oct 23 07:08:56 server.sheavernet.private sandboxd[34843] ([34842]): mdworker(34842) deny mach-lookup com.apple.ls.boxd

Oct 23 07:08:56 server.sheavernet.private sandboxd[34843] ([34841]): mdworker(34841) deny mach-lookup com.apple.ls.boxd

Oct 23 07:08:56 server kernel[0]: Sandbox: sandboxd(34843) deny mach-lookup com.apple.coresymbolicationd

Oct 23 07:11:27 server.sheavernet.private com.apple.backupd[34898]: Starting automatic backup

Oct 23 07:11:27 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/UserEventAgent' [15] for authorization created by '/usr/libexec/UserEventAgent' [15] (100012,0)

Oct 23 07:11:27 server.sheavernet.private com.apple.backupd[34898]: Backup failed with error: 19

Oct 23 07:11:27 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/UserEventAgent' [15] for authorization created by '/usr/libexec/UserEventAgent' [15] (100012,0)

Oct 23 07:11:28 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

Oct 23 07:11:28 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

Oct 23 07:12:32 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xd1-192.168.1.3:0!

Oct 23 07:12:56 server.sheavernet.private mdworker[34921]: Unable to talk to lsboxd

Oct 23 07:12:56 server.sheavernet.private mdworker[34919]: Unable to talk to lsboxd

Oct 23 07:12:56 server.sheavernet.private mdworker[34920]: Unable to talk to lsboxd

Oct 23 07:12:57 server.sheavernet.private sandboxd[34923] ([34921]): mdworker(34921) deny mach-lookup com.apple.ls.boxd

Oct 23 07:12:57 server.sheavernet.private sandboxd[34923] ([34919]): mdworker(34919) deny mach-lookup com.apple.ls.boxd

Oct 23 07:12:57 server.sheavernet.private sandboxd[34923] ([34920]): mdworker(34920) deny mach-lookup com.apple.ls.boxd

Oct 23 07:12:57 server kernel[0]: Sandbox: sandboxd(34923) deny mach-lookup com.apple.coresymbolicationd

Oct 23 07:13:50 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xd2-192.168.1.3:0!

Oct 23 07:14:57 server.sheavernet.private mdworker[34957]: Unable to talk to lsboxd

Oct 23 07:14:57 server.sheavernet.private sandboxd[34959] ([34957]): mdworker(34957) deny mach-lookup com.apple.ls.boxd

Oct 23 07:14:57 server kernel[0]: Sandbox: sandboxd(34959) deny mach-lookup com.apple.coresymbolicationd

Oct 23 07:18:58 server.sheavernet.private mdworker[35025]: Unable to talk to lsboxd

Oct 23 07:18:58 server.sheavernet.private mdworker[35024]: Unable to talk to lsboxd

Oct 23 07:18:58 server.sheavernet.private mdworker[35023]: Unable to talk to lsboxd

Oct 23 07:18:58 server.sheavernet.private sandboxd[35027] ([35025]): mdworker(35025) deny mach-lookup com.apple.ls.boxd

Oct 23 07:18:58 server.sheavernet.private sandboxd[35027] ([35024]): mdworker(35024) deny mach-lookup com.apple.ls.boxd

Oct 23 07:18:58 server.sheavernet.private sandboxd[35027] ([35023]): mdworker(35023) deny mach-lookup com.apple.ls.boxd

Oct 23 07:18:58 server kernel[0]: Sandbox: sandboxd(35027) deny mach-lookup com.apple.coresymbolicationd

Oct 23 07:22:59 server.sheavernet.private mdworker[35099]: Unable to talk to lsboxd

Oct 23 07:22:59 server.sheavernet.private mdworker[35100]: Unable to talk to lsboxd

Oct 23 07:22:59 server.sheavernet.private mdworker[35101]: Unable to talk to lsboxd

Oct 23 07:22:59 server kernel[0]: Sandbox: sandboxd(35103) deny mach-lookup com.apple.coresymbolicationd

Oct 23 07:22:59 server.sheavernet.private sandboxd[35103] ([35099]): mdworker(35099) deny mach-lookup com.apple.ls.boxd

Oct 23 07:22:59 server.sheavernet.private sandboxd[35103] ([35100]): mdworker(35100) deny mach-lookup com.apple.ls.boxd

Oct 23 07:22:59 server.sheavernet.private sandboxd[35103] ([35101]): mdworker(35101) deny mach-lookup com.apple.ls.boxd

Oct 23 07:23:31 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xd3-192.168.1.3:0!

Oct 23 07:25:00 server.sheavernet.private mdworker[35145]: Unable to talk to lsboxd

Oct 23 07:25:00 server.sheavernet.private sandboxd[35147] ([35145]): mdworker(35145) deny mach-lookup com.apple.ls.boxd

Oct 23 07:25:00 server kernel[0]: Sandbox: sandboxd(35147) deny mach-lookup com.apple.coresymbolicationd

Oct 23 07:27:00 server.sheavernet.private mdworker[35180]: Unable to talk to lsboxd

Oct 23 07:27:00 server.sheavernet.private mdworker[35179]: Unable to talk to lsboxd

Oct 23 07:27:00 server.sheavernet.private sandboxd[35181] ([35180]): mdworker(35180) deny mach-lookup com.apple.ls.boxd

Oct 23 07:27:00 server.sheavernet.private sandboxd[35181] ([35179]): mdworker(35179) deny mach-lookup com.apple.ls.boxd

Oct 23 07:27:01 server kernel[0]: Sandbox: sandboxd(35181) deny mach-lookup com.apple.coresymbolicationd

Oct 23 07:30:16 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xd5-192.168.1.3:0!

Oct 23 07:31:01 server.sheavernet.private mdworker[35247]: Unable to talk to lsboxd

Oct 23 07:31:01 server.sheavernet.private mdworker[35248]: Unable to talk to lsboxd

Oct 23 07:31:01 server.sheavernet.private mdworker[35249]: Unable to talk to lsboxd

Oct 23 07:31:01 server.sheavernet.private sandboxd[35261] ([35247]): mdworker(35247) deny mach-lookup com.apple.ls.boxd

Oct 23 07:31:01 server.sheavernet.private sandboxd[35261] ([35248]): mdworker(35248) deny mach-lookup com.apple.ls.boxd

Oct 23 07:31:01 server.sheavernet.private sandboxd[35261] ([35249]): mdworker(35249) deny mach-lookup com.apple.ls.boxd

Oct 23 07:31:01 server kernel[0]: Sandbox: sandboxd(35261) deny mach-lookup com.apple.coresymbolicationd

Oct 23 07:33:02 server.sheavernet.private mdworker[35295]: Unable to talk to lsboxd

Oct 23 07:33:02 server.sheavernet.private sandboxd[35297] ([35295]): mdworker(35295) deny mach-lookup com.apple.ls.boxd

Oct 23 07:33:02 server kernel[0]: Sandbox: sandboxd(35297) deny mach-lookup com.apple.coresymbolicationd

Oct 23 07:37:03 server.sheavernet.private mdworker[35361]: Unable to talk to lsboxd

Oct 23 07:37:03 server.sheavernet.private mdworker[35359]: Unable to talk to lsboxd

Oct 23 07:37:03 server.sheavernet.private mdworker[35360]: Unable to talk to lsboxd

Oct 23 07:37:03 server.sheavernet.private sandboxd[35363] ([35361]): mdworker(35361) deny mach-lookup com.apple.ls.boxd

Oct 23 07:37:03 server.sheavernet.private sandboxd[35363] ([35359]): mdworker(35359) deny mach-lookup com.apple.ls.boxd

Oct 23 07:37:03 server.sheavernet.private sandboxd[35363] ([35360]): mdworker(35360) deny mach-lookup com.apple.ls.boxd

Oct 23 07:37:03 server kernel[0]: Sandbox: sandboxd(35363) deny mach-lookup com.apple.coresymbolicationd

Oct 23 07:41:04 server.sheavernet.private mdworker[35427]: Unable to talk to lsboxd

Oct 23 07:41:04 server.sheavernet.private mdworker[35429]: Unable to talk to lsboxd

Oct 23 07:41:04 server.sheavernet.private mdworker[35428]: Unable to talk to lsboxd

Oct 23 07:41:04 server kernel[0]: Sandbox: sandboxd(35441) deny mach-lookup com.apple.coresymbolicationd

Oct 23 07:41:04 server.sheavernet.private sandboxd[35441] ([35427]): mdworker(35427) deny mach-lookup com.apple.ls.boxd

Oct 23 07:41:04 server.sheavernet.private sandboxd[35441] ([35429]): mdworker(35429) deny mach-lookup com.apple.ls.boxd

Oct 23 07:41:04 server.sheavernet.private sandboxd[35441] ([35428]): mdworker(35428) deny mach-lookup com.apple.ls.boxd

Oct 23 07:42:11 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xd6-192.168.1.3:0!

Oct 23 07:43:04 server.sheavernet.private mdworker[35467]: Unable to talk to lsboxd

Oct 23 07:43:05 server.sheavernet.private sandboxd[35478] ([35467]): mdworker(35467) deny mach-lookup com.apple.ls.boxd

Oct 23 07:43:05 server kernel[0]: Sandbox: sandboxd(35478) deny mach-lookup com.apple.coresymbolicationd

Oct 23 07:45:05 server.sheavernet.private mdworker[35503]: Unable to talk to lsboxd

Oct 23 07:45:05 server.sheavernet.private mdworker[35502]: Unable to talk to lsboxd

Oct 23 07:45:05 server.sheavernet.private sandboxd[35513] ([35503]): mdworker(35503) deny mach-lookup com.apple.ls.boxd

Oct 23 07:45:05 server.sheavernet.private sandboxd[35513] ([35502]): mdworker(35502) deny mach-lookup com.apple.ls.boxd

Oct 23 07:45:06 server kernel[0]: Sandbox: sandboxd(35513) deny mach-lookup com.apple.coresymbolicationd

Oct 23 07:49:06 server.sheavernet.private mdworker[35577]: Unable to talk to lsboxd

Oct 23 07:49:06 server.sheavernet.private mdworker[35579]: Unable to talk to lsboxd

Oct 23 07:49:06 server.sheavernet.private mdworker[35578]: Unable to talk to lsboxd

Oct 23 07:49:06 server.sheavernet.private sandboxd[35581] ([35577]): mdworker(35577) deny mach-lookup com.apple.ls.boxd

Oct 23 07:49:06 server.sheavernet.private sandboxd[35581] ([35579]): mdworker(35579) deny mach-lookup com.apple.ls.boxd

Oct 23 07:49:06 server.sheavernet.private sandboxd[35581] ([35578]): mdworker(35578) deny mach-lookup com.apple.ls.boxd

Oct 23 07:49:06 server kernel[0]: Sandbox: sandboxd(35581) deny mach-lookup com.apple.coresymbolicationd

Oct 23 07:51:07 server.sheavernet.private mdworker[35623]: Unable to talk to lsboxd

Oct 23 07:51:07 server.sheavernet.private sandboxd[35625] ([35623]): mdworker(35623) deny mach-lookup com.apple.ls.boxd

Oct 23 07:51:07 server kernel[0]: Sandbox: sandboxd(35625) deny mach-lookup com.apple.coresymbolicationd

Oct 23 07:51:24 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xda-192.168.1.3:0!

Oct 23 07:55:07 server.sheavernet.private mdworker[35689]: Unable to talk to lsboxd

Oct 23 07:55:07 server.sheavernet.private mdworker[35687]: Unable to talk to lsboxd

Oct 23 07:55:07 server.sheavernet.private mdworker[35688]: Unable to talk to lsboxd

Oct 23 07:55:07 server kernel[0]: Sandbox: sandboxd(35691) deny mach-lookup com.apple.coresymbolicationd

Oct 23 07:55:07 server.sheavernet.private sandboxd[35691] ([35689]): mdworker(35689) deny mach-lookup com.apple.ls.boxd

Oct 23 07:55:07 server.sheavernet.private sandboxd[35691] ([35687]): mdworker(35687) deny mach-lookup com.apple.ls.boxd

Oct 23 07:55:07 server.sheavernet.private sandboxd[35691] ([35688]): mdworker(35688) deny mach-lookup com.apple.ls.boxd

Oct 23 07:59:08 server.sheavernet.private mdworker[35749]: Unable to talk to lsboxd

Oct 23 07:59:08 server.sheavernet.private mdworker[35747]: Unable to talk to lsboxd

Oct 23 07:59:08 server.sheavernet.private mdworker[35748]: Unable to talk to lsboxd

Oct 23 07:59:08 server.sheavernet.private sandboxd[35761] ([35749]): mdworker(35749) deny mach-lookup com.apple.ls.boxd

Oct 23 07:59:08 server.sheavernet.private sandboxd[35761] ([35747]): mdworker(35747) deny mach-lookup com.apple.ls.boxd

Oct 23 07:59:08 server.sheavernet.private sandboxd[35761] ([35748]): mdworker(35748) deny mach-lookup com.apple.ls.boxd

Oct 23 07:59:09 server kernel[0]: Sandbox: sandboxd(35761) deny mach-lookup com.apple.coresymbolicationd

Oct 23 08:00:16 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xdb-192.168.1.3:0!

Oct 23 08:01:09 server.sheavernet.private mdworker[35795]: Unable to talk to lsboxd

Oct 23 08:01:09 server.sheavernet.private sandboxd[35797] ([35795]): mdworker(35795) deny mach-lookup com.apple.ls.boxd

Oct 23 08:01:10 server kernel[0]: Sandbox: sandboxd(35797) deny mach-lookup com.apple.coresymbolicationd

Oct 23 08:03:10 server.sheavernet.private mdworker[35812]: Unable to talk to lsboxd

Oct 23 08:03:10 server.sheavernet.private mdworker[35811]: Unable to talk to lsboxd

Oct 23 08:03:10 server.sheavernet.private sandboxd[35813] ([35812]): mdworker(35812) deny mach-lookup com.apple.ls.boxd

Oct 23 08:03:10 server.sheavernet.private sandboxd[35813] ([35811]): mdworker(35811) deny mach-lookup com.apple.ls.boxd

Oct 23 08:03:10 server kernel[0]: Sandbox: sandboxd(35813) deny mach-lookup com.apple.coresymbolicationd

Oct 23 08:07:10 server.sheavernet.private mdworker[35843]: Unable to talk to lsboxd

Oct 23 08:07:10 server.sheavernet.private mdworker[35842]: Unable to talk to lsboxd

Oct 23 08:07:10 server.sheavernet.private mdworker[35841]: Unable to talk to lsboxd

Oct 23 08:07:10 server.sheavernet.private sandboxd[35845] ([35843]): mdworker(35843) deny mach-lookup com.apple.ls.boxd

Oct 23 08:07:10 server.sheavernet.private sandboxd[35845] ([35842]): mdworker(35842) deny mach-lookup com.apple.ls.boxd

Oct 23 08:07:10 server.sheavernet.private sandboxd[35845] ([35841]): mdworker(35841) deny mach-lookup com.apple.ls.boxd

Oct 23 08:07:11 server kernel[0]: Sandbox: sandboxd(35845) deny mach-lookup com.apple.coresymbolicationd

Oct 23 08:09:11 server.sheavernet.private mdworker[35861]: Unable to talk to lsboxd

Oct 23 08:09:11 server.sheavernet.private sandboxd[35863] ([35861]): mdworker(35861) deny mach-lookup com.apple.ls.boxd

Oct 23 08:09:12 server kernel[0]: Sandbox: sandboxd(35863) deny mach-lookup com.apple.coresymbolicationd

Oct 23 08:11:57 server.sheavernet.private com.apple.backupd[35890]: Starting automatic backup

Oct 23 08:11:57 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/UserEventAgent' [15] for authorization created by '/usr/libexec/UserEventAgent' [15] (100012,0)

Oct 23 08:11:57 server.sheavernet.private com.apple.backupd[35890]: Backup failed with error: 19

Oct 23 08:11:57 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/UserEventAgent' [15] for authorization created by '/usr/libexec/UserEventAgent' [15] (100012,0)

Oct 23 08:11:58 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

Oct 23 08:11:58 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

Oct 23 08:13:12 server.sheavernet.private mdworker[35900]: Unable to talk to lsboxd

Oct 23 08:13:12 server.sheavernet.private mdworker[35902]: Unable to talk to lsboxd

Oct 23 08:13:12 server.sheavernet.private mdworker[35901]: Unable to talk to lsboxd

Oct 23 08:13:12 server.sheavernet.private sandboxd[35904] ([35900]): mdworker(35900) deny mach-lookup com.apple.ls.boxd

Oct 23 08:13:12 server.sheavernet.private sandboxd[35904] ([35902]): mdworker(35902) deny mach-lookup com.apple.ls.boxd

Oct 23 08:13:12 server.sheavernet.private sandboxd[35904] ([35901]): mdworker(35901) deny mach-lookup com.apple.ls.boxd

Oct 23 08:13:12 server kernel[0]: Sandbox: sandboxd(35904) deny mach-lookup com.apple.coresymbolicationd

Oct 23 08:17:13 server.sheavernet.private mdworker[35933]: Unable to talk to lsboxd

Oct 23 08:17:13 server.sheavernet.private mdworker[35932]: Unable to talk to lsboxd

Oct 23 08:17:13 server.sheavernet.private mdworker[35934]: Unable to talk to lsboxd

Oct 23 08:17:13 server.sheavernet.private sandboxd[35936] ([35933]): mdworker(35933) deny mach-lookup com.apple.ls.boxd

Oct 23 08:17:13 server.sheavernet.private sandboxd[35936] ([35932]): mdworker(35932) deny mach-lookup com.apple.ls.boxd

Oct 23 08:17:13 server.sheavernet.private sandboxd[35936] ([35934]): mdworker(35934) deny mach-lookup com.apple.ls.boxd

Oct 23 08:17:13 server kernel[0]: Sandbox: sandboxd(35936) deny mach-lookup com.apple.coresymbolicationd

Oct 23 08:17:56 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xdd-192.168.1.3:0!

Oct 23 08:19:14 server.sheavernet.private mdworker[35952]: Unable to talk to lsboxd

Oct 23 08:19:14 server.sheavernet.private sandboxd[35954] ([35952]): mdworker(35952) deny mach-lookup com.apple.ls.boxd

Oct 23 08:19:14 server kernel[0]: Sandbox: sandboxd(35954) deny mach-lookup com.apple.coresymbolicationd

Oct 23 08:21:14 server.sheavernet.private mdworker[35977]: Unable to talk to lsboxd

Oct 23 08:21:14 server.sheavernet.private mdworker[35976]: Unable to talk to lsboxd

Oct 23 08:21:14 server.sheavernet.private sandboxd[35978] ([35977]): mdworker(35977) deny mach-lookup com.apple.ls.boxd

Oct 23 08:21:14 server.sheavernet.private sandboxd[35978] ([35976]): mdworker(35976) deny mach-lookup com.apple.ls.boxd

Oct 23 08:21:15 server kernel[0]: Sandbox: sandboxd(35978) deny mach-lookup com.apple.coresymbolicationd

Oct 23 08:25:15 server.sheavernet.private mdworker[36006]: Unable to talk to lsboxd

Oct 23 08:25:15 server.sheavernet.private mdworker[36005]: Unable to talk to lsboxd

Oct 23 08:25:15 server.sheavernet.private mdworker[36007]: Unable to talk to lsboxd

Oct 23 08:25:15 server.sheavernet.private sandboxd[36009] ([36006]): mdworker(36006) deny mach-lookup com.apple.ls.boxd

Oct 23 08:25:15 server.sheavernet.private sandboxd[36009] ([36005]): mdworker(36005) deny mach-lookup com.apple.ls.boxd

Oct 23 08:25:15 server.sheavernet.private sandboxd[36009] ([36007]): mdworker(36007) deny mach-lookup com.apple.ls.boxd

Oct 23 08:25:15 server kernel[0]: Sandbox: sandboxd(36009) deny mach-lookup com.apple.coresymbolicationd

Oct 23 08:27:16 server.sheavernet.private mdworker[36025]: Unable to talk to lsboxd

Oct 23 08:27:16 server kernel[0]: Sandbox: sandboxd(36027) deny mach-lookup com.apple.coresymbolicationd

Oct 23 08:27:16 server.sheavernet.private sandboxd[36027] ([36025]): mdworker(36025) deny mach-lookup com.apple.ls.boxd

Oct 23 08:27:41 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xe0-192.168.1.3:0!

Oct 23 08:30:06 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xe1-192.168.1.3:0!

Oct 23 08:31:04 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

Oct 23 08:31:04 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

Oct 23 08:31:04 server.sheavernet.private kdc[14291]: AS-REQ server.sheavernet.private$@SERVER.SHEAVERNET.PRIVATE from 127.0.0.1:59519 for krbtgt/SERVER.SHEAVERNET.PRIVATE@SERVER.SHEAVERNET.PRIVATE

Oct 23 08:31:04 --- last message repeated 1 time ---

Oct 23 08:31:04 server.sheavernet.private kdc[14291]: Client sent patypes: REQ-ENC-PA-REP

Oct 23 08:31:04 server.sheavernet.private kdc[14291]: Need to use PA-ENC-TIMESTAMP/PA-PK-AS-REQ

Oct 23 08:31:04 server.sheavernet.private kdc[14291]: AS-REQ server.sheavernet.private$@SERVER.SHEAVERNET.PRIVATE from 127.0.0.1:54377 for krbtgt/SERVER.SHEAVERNET.PRIVATE@SERVER.SHEAVERNET.PRIVATE

Oct 23 08:31:05 --- last message repeated 1 time ---

Oct 23 08:31:05 server.sheavernet.private kdc[14291]: Client sent patypes: ENC-TS, REQ-ENC-PA-REP

Oct 23 08:31:05 server.sheavernet.private kdc[14291]: ENC-TS pre-authentication succeeded -- server.sheavernet.private$@SERVER.SHEAVERNET.PRIVATE

Oct 23 08:31:05 server.sheavernet.private kdc[14291]: Client supported enctypes: aes256-cts-hmac-sha1-96, aes128-cts-hmac-sha1-96, des3-cbc-sha1, arcfour-hmac-md5, using aes256-cts-hmac-sha1-96/aes256-cts-hmac-sha1-96

Oct 23 08:31:05 server.sheavernet.private kdc[14291]: Requested flags: forwardable

Oct 23 08:31:05 server.sheavernet.private kdc[14291]: TGS-REQ server.sheavernet.private$@SERVER.SHEAVERNET.PRIVATE from 127.0.0.1:53253 for host/server.sheavernet.private@SERVER.SHEAVERNET.PRIVATE [canonicalize]

Oct 23 08:31:05 server.sheavernet.private kdc[14291]: TGS-REQ server.sheavernet.private$@SERVER.SHEAVERNET.PRIVATE from 127.0.0.1:52312 for ldap/server.sheavernet.private@SERVER.SHEAVERNET.PRIVATE [canonicalize]

Oct 23 08:31:16 server.sheavernet.private mdworker[36066]: Unable to talk to lsboxd

Oct 23 08:31:16 server.sheavernet.private mdworker[36067]: Unable to talk to lsboxd

Oct 23 08:31:16 server.sheavernet.private mdworker[36068]: Unable to talk to lsboxd

Oct 23 08:31:16 server.sheavernet.private sandboxd[36070] ([36066]): mdworker(36066) deny mach-lookup com.apple.ls.boxd

Oct 23 08:31:16 server.sheavernet.private sandboxd[36070] ([36067]): mdworker(36067) deny mach-lookup com.apple.ls.boxd

Oct 23 08:31:16 server.sheavernet.private sandboxd[36070] ([36068]): mdworker(36068) deny mach-lookup com.apple.ls.boxd

Oct 23 08:31:17 server kernel[0]: Sandbox: sandboxd(36070) deny mach-lookup com.apple.coresymbolicationd

Oct 23 08:32:05 server.sheavernet.private servermgrd[36063]: -[AccountsRequestHandler(AccountsSystemConfigurationObservation) registerForKeychainEventNotifications]: SecKeychainAddCallback() status: -25297

Oct 23 08:35:17 server.sheavernet.private mdworker[36103]: Unable to talk to lsboxd

Oct 23 08:35:17 server.sheavernet.private mdworker[36102]: Unable to talk to lsboxd

Oct 23 08:35:17 server.sheavernet.private mdworker[36104]: Unable to talk to lsboxd

Oct 23 08:35:17 server.sheavernet.private sandboxd[36106] ([36103]): mdworker(36103) deny mach-lookup com.apple.ls.boxd

Oct 23 08:35:17 server.sheavernet.private sandboxd[36106] ([36102]): mdworker(36102) deny mach-lookup com.apple.ls.boxd

Oct 23 08:35:17 server.sheavernet.private sandboxd[36106] ([36104]): mdworker(36104) deny mach-lookup com.apple.ls.boxd

Oct 23 08:35:18 server kernel[0]: Sandbox: sandboxd(36106) deny mach-lookup com.apple.coresymbolicationd

Oct 23 08:36:05 server.sheavernet.private servermgrd[36063]: No requests in 300 seconds, shutting down

Oct 23 08:37:19 server.sheavernet.private mdworker[36122]: Unable to talk to lsboxd

Oct 23 08:37:19 server.sheavernet.private sandboxd[36124] ([36122]): mdworker(36122) deny mach-lookup com.apple.ls.boxd

Oct 23 08:37:19 server kernel[0]: Sandbox: sandboxd(36124) deny mach-lookup com.apple.coresymbolicationd

Oct 23 08:37:26 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xe3-192.168.1.3:0!

Oct 23 08:39:19 server.sheavernet.private mdworker[36139]: Unable to talk to lsboxd

Oct 23 08:39:19 server.sheavernet.private mdworker[36138]: Unable to talk to lsboxd

Oct 23 08:39:19 server.sheavernet.private sandboxd[36140] ([36139]): mdworker(36139) deny mach-lookup com.apple.ls.boxd

Oct 23 08:39:19 server.sheavernet.private sandboxd[36140] ([36138]): mdworker(36138) deny mach-lookup com.apple.ls.boxd

Oct 23 08:39:19 server kernel[0]: Sandbox: sandboxd(36140) deny mach-lookup com.apple.coresymbolicationd

Oct 23 08:40:15 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xe4-192.168.1.3:0!

Oct 23 08:43:20 server.sheavernet.private mdworker[36177]: Unable to talk to lsboxd

Oct 23 08:43:20 server.sheavernet.private mdworker[36176]: Unable to talk to lsboxd

Oct 23 08:43:20 server.sheavernet.private mdworker[36178]: Unable to talk to lsboxd

Oct 23 08:43:20 server.sheavernet.private sandboxd[36180] ([36177]): mdworker(36177) deny mach-lookup com.apple.ls.boxd

Oct 23 08:43:20 server.sheavernet.private sandboxd[36180] ([36176]): mdworker(36176) deny mach-lookup com.apple.ls.boxd

Oct 23 08:43:20 server.sheavernet.private sandboxd[36180] ([36178]): mdworker(36178) deny mach-lookup com.apple.ls.boxd

Oct 23 08:43:20 server kernel[0]: Sandbox: sandboxd(36180) deny mach-lookup com.apple.coresymbolicationd

Oct 23 08:45:21 server.sheavernet.private mdworker[36196]: Unable to talk to lsboxd

Oct 23 08:45:21 server.sheavernet.private sandboxd[36198] ([36196]): mdworker(36196) deny mach-lookup com.apple.ls.boxd

Oct 23 08:45:21 server kernel[0]: Sandbox: sandboxd(36198) deny mach-lookup com.apple.coresymbolicationd

Oct 23 08:49:21 server.sheavernet.private mdworker[36226]: Unable to talk to lsboxd

Oct 23 08:49:21 server.sheavernet.private mdworker[36225]: Unable to talk to lsboxd

Oct 23 08:49:21 server.sheavernet.private mdworker[36224]: Unable to talk to lsboxd

Oct 23 08:49:21 server.sheavernet.private sandboxd[36228] ([36226]): mdworker(36226) deny mach-lookup com.apple.ls.boxd

Oct 23 08:49:21 server.sheavernet.private sandboxd[36228] ([36225]): mdworker(36225) deny mach-lookup com.apple.ls.boxd

Oct 23 08:49:21 server.sheavernet.private sandboxd[36228] ([36224]): mdworker(36224) deny mach-lookup com.apple.ls.boxd

Oct 23 08:49:22 server kernel[0]: Sandbox: sandboxd(36228) deny mach-lookup com.apple.coresymbolicationd

Oct 23 08:53:22 server.sheavernet.private mdworker[36264]: Unable to talk to lsboxd

Oct 23 08:53:22 server.sheavernet.private mdworker[36265]: Unable to talk to lsboxd

Oct 23 08:53:22 server.sheavernet.private mdworker[36266]: Unable to talk to lsboxd

Oct 23 08:53:22 server.sheavernet.private sandboxd[36268] ([36264]): mdworker(36264) deny mach-lookup com.apple.ls.boxd

Oct 23 08:53:22 server.sheavernet.private sandboxd[36268] ([36265]): mdworker(36265) deny mach-lookup com.apple.ls.boxd

Oct 23 08:53:22 server.sheavernet.private sandboxd[36268] ([36266]): mdworker(36266) deny mach-lookup com.apple.ls.boxd

Oct 23 08:53:22 server kernel[0]: Sandbox: sandboxd(36268) deny mach-lookup com.apple.coresymbolicationd

Oct 23 08:55:23 server.sheavernet.private mdworker[36284]: Unable to talk to lsboxd

Oct 23 08:55:23 server kernel[0]: Sandbox: sandboxd(36286) deny mach-lookup com.apple.coresymbolicationd

Oct 23 08:55:23 server.sheavernet.private sandboxd[36286] ([36284]): mdworker(36284) deny mach-lookup com.apple.ls.boxd

Oct 23 08:57:24 server.sheavernet.private mdworker[36300]: Unable to talk to lsboxd

Oct 23 08:57:24 server.sheavernet.private mdworker[36301]: Unable to talk to lsboxd

Oct 23 08:57:24 server.sheavernet.private sandboxd[36302] ([36300]): mdworker(36300) deny mach-lookup com.apple.ls.boxd

Oct 23 08:57:24 server.sheavernet.private sandboxd[36302] ([36301]): mdworker(36301) deny mach-lookup com.apple.ls.boxd

Oct 23 08:57:24 server kernel[0]: Sandbox: sandboxd(36302) deny mach-lookup com.apple.coresymbolicationd

Oct 23 09:01:24 server.sheavernet.private mdworker[36337]: Unable to talk to lsboxd

Oct 23 09:01:24 server.sheavernet.private mdworker[36338]: Unable to talk to lsboxd

Oct 23 09:01:24 server.sheavernet.private mdworker[36339]: Unable to talk to lsboxd

Oct 23 09:01:24 server kernel[0]: Sandbox: sandboxd(36341) deny mach-lookup com.apple.coresymbolicationd

Oct 23 09:01:24 server.sheavernet.private sandboxd[36341] ([36337]): mdworker(36337) deny mach-lookup com.apple.ls.boxd

Oct 23 09:01:24 server.sheavernet.private sandboxd[36341] ([36338]): mdworker(36338) deny mach-lookup com.apple.ls.boxd

Oct 23 09:01:24 server.sheavernet.private sandboxd[36341] ([36339]): mdworker(36339) deny mach-lookup com.apple.ls.boxd

Oct 23 09:03:25 server.sheavernet.private mdworker[36357]: Unable to talk to lsboxd

Oct 23 09:03:25 server.sheavernet.private sandboxd[36359] ([36357]): mdworker(36357) deny mach-lookup com.apple.ls.boxd

Oct 23 09:03:25 server kernel[0]: Sandbox: sandboxd(36359) deny mach-lookup com.apple.coresymbolicationd

Oct 23 09:07:26 server.sheavernet.private mdworker[36388]: Unable to talk to lsboxd

Oct 23 09:07:26 server.sheavernet.private mdworker[36386]: Unable to talk to lsboxd

Oct 23 09:07:26 server.sheavernet.private mdworker[36387]: Unable to talk to lsboxd

Oct 23 09:07:26 server.sheavernet.private sandboxd[36390] ([36388]): mdworker(36388) deny mach-lookup com.apple.ls.boxd

Oct 23 09:07:26 server.sheavernet.private sandboxd[36390] ([36386]): mdworker(36386) deny mach-lookup com.apple.ls.boxd

Oct 23 09:07:26 server.sheavernet.private sandboxd[36390] ([36387]): mdworker(36387) deny mach-lookup com.apple.ls.boxd

Oct 23 09:07:26 server kernel[0]: Sandbox: sandboxd(36390) deny mach-lookup com.apple.coresymbolicationd

Oct 23 09:11:27 server.sheavernet.private mdworker[36428]: Unable to talk to lsboxd

Oct 23 09:11:27 server.sheavernet.private mdworker[36426]: Unable to talk to lsboxd

Oct 23 09:11:27 server.sheavernet.private mdworker[36427]: Unable to talk to lsboxd

Oct 23 09:11:27 server.sheavernet.private sandboxd[36430] ([36428]): mdworker(36428) deny mach-lookup com.apple.ls.boxd

Oct 23 09:11:27 server.sheavernet.private sandboxd[36430] ([36426]): mdworker(36426) deny mach-lookup com.apple.ls.boxd

Oct 23 09:11:27 server.sheavernet.private sandboxd[36430] ([36427]): mdworker(36427) deny mach-lookup com.apple.ls.boxd

Oct 23 09:11:27 server kernel[0]: Sandbox: sandboxd(36430) deny mach-lookup com.apple.coresymbolicationd

Oct 23 09:12:27 server.sheavernet.private com.apple.backupd[36441]: Starting automatic backup

Oct 23 09:12:27 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/UserEventAgent' [15] for authorization created by '/usr/libexec/UserEventAgent' [15] (100012,0)

Oct 23 09:12:27 server.sheavernet.private com.apple.backupd[36441]: Backup failed with error: 19

Oct 23 09:12:27 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/UserEventAgent' [15] for authorization created by '/usr/libexec/UserEventAgent' [15] (100012,0)

Oct 23 09:12:28 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

Oct 23 09:12:28 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

Oct 23 09:13:28 server.sheavernet.private mdworker[36449]: Unable to talk to lsboxd

Oct 23 09:13:28 server.sheavernet.private sandboxd[36451] ([36449]): mdworker(36449) deny mach-lookup com.apple.ls.boxd

Oct 23 09:13:29 server kernel[0]: Sandbox: sandboxd(36451) deny mach-lookup com.apple.coresymbolicationd

Oct 23 09:15:29 server.sheavernet.private mdworker[36466]: Unable to talk to lsboxd

Oct 23 09:15:29 server.sheavernet.private mdworker[36465]: Unable to talk to lsboxd

Oct 23 09:15:29 server.sheavernet.private sandboxd[36467] ([36466]): mdworker(36466) deny mach-lookup com.apple.ls.boxd

Oct 23 09:15:29 server.sheavernet.private sandboxd[36467] ([36465]): mdworker(36465) deny mach-lookup com.apple.ls.boxd

Oct 23 09:15:29 server kernel[0]: Sandbox: sandboxd(36467) deny mach-lookup com.apple.coresymbolicationd

Oct 23 09:19:30 server.sheavernet.private mdworker[36496]: Unable to talk to lsboxd

Oct 23 09:19:30 server.sheavernet.private mdworker[36495]: Unable to talk to lsboxd

Oct 23 09:19:30 server.sheavernet.private mdworker[36494]: Unable to talk to lsboxd

Oct 23 09:19:30 server.sheavernet.private sandboxd[36499] ([36496]): mdworker(36496) deny mach-lookup com.apple.ls.boxd

Oct 23 09:19:30 server.sheavernet.private sandboxd[36499] ([36495]): mdworker(36495) deny mach-lookup com.apple.ls.boxd

Oct 23 09:19:30 server.sheavernet.private sandboxd[36499] ([36494]): mdworker(36494) deny mach-lookup com.apple.ls.boxd

Oct 23 09:19:30 server kernel[0]: Sandbox: sandboxd(36499) deny mach-lookup com.apple.coresymbolicationd

Oct 23 09:21:40 server.sheavernet.private mdworker[36524]: Unable to talk to lsboxd

Oct 23 09:21:40 server.sheavernet.private sandboxd[36526] ([36524]): mdworker(36524) deny mach-lookup com.apple.ls.boxd

Oct 23 09:21:40 server kernel[0]: Sandbox: sandboxd(36526) deny mach-lookup com.apple.coresymbolicationd

Oct 23 09:25:41 server.sheavernet.private mdworker[36554]: Unable to talk to lsboxd

Oct 23 09:25:41 server.sheavernet.private mdworker[36553]: Unable to talk to lsboxd

Oct 23 09:25:41 server.sheavernet.private mdworker[36552]: Unable to talk to lsboxd

Oct 23 09:25:41 server.sheavernet.private sandboxd[36556] ([36554]): mdworker(36554) deny mach-lookup com.apple.ls.boxd

Oct 23 09:25:41 server.sheavernet.private sandboxd[36556] ([36553]): mdworker(36553) deny mach-lookup com.apple.ls.boxd

Oct 23 09:25:41 server.sheavernet.private sandboxd[36556] ([36552]): mdworker(36552) deny mach-lookup com.apple.ls.boxd

Oct 23 09:25:41 server kernel[0]: Sandbox: sandboxd(36556) deny mach-lookup com.apple.coresymbolicationd

Oct 23 09:29:41 server.sheavernet.private mdworker[36584]: Unable to talk to lsboxd

Oct 23 09:29:41 server.sheavernet.private sandboxd[36585] ([36584]): mdworker(36584) deny mach-lookup com.apple.ls.boxd

Oct 23 09:29:41 server.sheavernet.private mdworker[36586]: Unable to talk to lsboxd

Oct 23 09:29:41 server.sheavernet.private sandboxd[36585] ([36586]): mdworker(36586) deny mach-lookup com.apple.ls.boxd

Oct 23 09:29:42 server kernel[0]: Sandbox: sandboxd(36585) deny mach-lookup com.apple.coresymbolicationd

Oct 23 09:29:42 server.sheavernet.private mdworker[36587]: Unable to talk to lsboxd

Oct 23 09:29:42 server.sheavernet.private sandboxd[36585] ([36587]): mdworker(36587) deny mach-lookup com.apple.ls.boxd

Oct 23 09:31:42 server.sheavernet.private mdworker[36615]: Unable to talk to lsboxd

Oct 23 09:31:42 server.sheavernet.private sandboxd[36617] ([36615]): mdworker(36615) deny mach-lookup com.apple.ls.boxd

Oct 23 09:31:43 server kernel[0]: Sandbox: sandboxd(36617) deny mach-lookup com.apple.coresymbolicationd

Oct 23 09:33:43 server.sheavernet.private mdworker[36631]: Unable to talk to lsboxd

Oct 23 09:33:43 server.sheavernet.private mdworker[36632]: Unable to talk to lsboxd

Oct 23 09:33:43 server.sheavernet.private sandboxd[36633] ([36631]): mdworker(36631) deny mach-lookup com.apple.ls.boxd

Oct 23 09:33:43 server.sheavernet.private sandboxd[36633] ([36632]): mdworker(36632) deny mach-lookup com.apple.ls.boxd

Oct 23 09:33:43 server kernel[0]: Sandbox: sandboxd(36633) deny mach-lookup com.apple.coresymbolicationd

Oct 23 09:37:44 server.sheavernet.private mdworker[36663]: Unable to talk to lsboxd

Oct 23 09:37:44 server.sheavernet.private mdworker[36662]: Unable to talk to lsboxd

Oct 23 09:37:44 server.sheavernet.private mdworker[36661]: Unable to talk to lsboxd

Oct 23 09:37:44 server.sheavernet.private sandboxd[36665] ([36663]): mdworker(36663) deny mach-lookup com.apple.ls.boxd

Oct 23 09:37:44 server.sheavernet.private sandboxd[36665] ([36662]): mdworker(36662) deny mach-lookup com.apple.ls.boxd

Oct 23 09:37:44 server.sheavernet.private sandboxd[36665] ([36661]): mdworker(36661) deny mach-lookup com.apple.ls.boxd

Oct 23 09:37:44 server kernel[0]: Sandbox: sandboxd(36665) deny mach-lookup com.apple.coresymbolicationd

Oct 23 09:38:45 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xe5-192.168.1.3:0!

Oct 23 09:39:45 server.sheavernet.private mdworker[36681]: Unable to talk to lsboxd

Oct 23 09:39:45 server.sheavernet.private sandboxd[36683] ([36681]): mdworker(36681) deny mach-lookup com.apple.ls.boxd

Oct 23 09:39:45 server kernel[0]: Sandbox: sandboxd(36683) deny mach-lookup com.apple.coresymbolicationd

Oct 23 09:40:20 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xe6-192.168.1.3:0!

Oct 23 09:43:45 server.sheavernet.private mdworker[36718]: Unable to talk to lsboxd

Oct 23 09:43:45 server.sheavernet.private mdworker[36717]: Unable to talk to lsboxd

Oct 23 09:43:45 server.sheavernet.private mdworker[36719]: Unable to talk to lsboxd

Oct 23 09:43:45 server.sheavernet.private sandboxd[36721] ([36718]): mdworker(36718) deny mach-lookup com.apple.ls.boxd

Oct 23 09:43:45 server.sheavernet.private sandboxd[36721] ([36717]): mdworker(36717) deny mach-lookup com.apple.ls.boxd

Oct 23 09:43:45 server.sheavernet.private sandboxd[36721] ([36719]): mdworker(36719) deny mach-lookup com.apple.ls.boxd

Oct 23 09:43:46 server kernel[0]: Sandbox: sandboxd(36721) deny mach-lookup com.apple.coresymbolicationd

Oct 23 09:47:46 server.sheavernet.private mdworker[36749]: Unable to talk to lsboxd

Oct 23 09:47:46 server.sheavernet.private mdworker[36751]: Unable to talk to lsboxd

Oct 23 09:47:46 server.sheavernet.private mdworker[36750]: Unable to talk to lsboxd

Oct 23 09:47:46 server.sheavernet.private sandboxd[36753] ([36749]): mdworker(36749) deny mach-lookup com.apple.ls.boxd

Oct 23 09:47:46 server.sheavernet.private sandboxd[36753] ([36751]): mdworker(36751) deny mach-lookup com.apple.ls.boxd

Oct 23 09:47:46 server.sheavernet.private sandboxd[36753] ([36750]): mdworker(36750) deny mach-lookup com.apple.ls.boxd

Oct 23 09:47:46 server kernel[0]: Sandbox: sandboxd(36753) deny mach-lookup com.apple.coresymbolicationd

Oct 23 09:49:47 server.sheavernet.private mdworker[36770]: Unable to talk to lsboxd

Oct 23 09:49:47 server.sheavernet.private sandboxd[36772] ([36770]): mdworker(36770) deny mach-lookup com.apple.ls.boxd

Oct 23 09:49:48 server kernel[0]: Sandbox: sandboxd(36772) deny mach-lookup com.apple.coresymbolicationd

Oct 23 09:51:48 server.sheavernet.private mdworker[36795]: Unable to talk to lsboxd

Oct 23 09:51:48 server.sheavernet.private mdworker[36794]: Unable to talk to lsboxd

Oct 23 09:51:48 server.sheavernet.private sandboxd[36796] ([36795]): mdworker(36795) deny mach-lookup com.apple.ls.boxd

Oct 23 09:51:48 server.sheavernet.private sandboxd[36796] ([36794]): mdworker(36794) deny mach-lookup com.apple.ls.boxd

Oct 23 09:51:48 server kernel[0]: Sandbox: sandboxd(36796) deny mach-lookup com.apple.coresymbolicationd

Oct 23 09:55:48 server.sheavernet.private mdworker[36825]: Unable to talk to lsboxd

Oct 23 09:55:48 server.sheavernet.private mdworker[36823]: Unable to talk to lsboxd

Oct 23 09:55:48 server.sheavernet.private mdworker[36824]: Unable to talk to lsboxd

Oct 23 09:55:49 server.sheavernet.private sandboxd[36827] ([36825]): mdworker(36825) deny mach-lookup com.apple.ls.boxd

Oct 23 09:55:49 server.sheavernet.private sandboxd[36827] ([36823]): mdworker(36823) deny mach-lookup com.apple.ls.boxd

Oct 23 09:55:49 server.sheavernet.private sandboxd[36827] ([36824]): mdworker(36824) deny mach-lookup com.apple.ls.boxd

Oct 23 09:55:49 server kernel[0]: Sandbox: sandboxd(36827) deny mach-lookup com.apple.coresymbolicationd

Oct 23 09:57:49 server.sheavernet.private mdworker[36843]: Unable to talk to lsboxd

Oct 23 09:57:49 server.sheavernet.private sandboxd[36845] ([36843]): mdworker(36843) deny mach-lookup com.apple.ls.boxd

Oct 23 09:57:50 server kernel[0]: Sandbox: sandboxd(36845) deny mach-lookup com.apple.coresymbolicationd

Oct 23 10:01:50 server.sheavernet.private mdworker[36879]: Unable to talk to lsboxd

Oct 23 10:01:50 server.sheavernet.private mdworker[36880]: Unable to talk to lsboxd

Oct 23 10:01:50 server.sheavernet.private mdworker[36881]: Unable to talk to lsboxd

Oct 23 10:01:50 server.sheavernet.private sandboxd[36883] ([36879]): mdworker(36879) deny mach-lookup com.apple.ls.boxd

Oct 23 10:01:50 server.sheavernet.private sandboxd[36883] ([36880]): mdworker(36880) deny mach-lookup com.apple.ls.boxd

Oct 23 10:01:50 server.sheavernet.private sandboxd[36883] ([36881]): mdworker(36881) deny mach-lookup com.apple.ls.boxd

Oct 23 10:01:50 server kernel[0]: Sandbox: sandboxd(36883) deny mach-lookup com.apple.coresymbolicationd

Oct 23 10:05:51 server.sheavernet.private mdworker[36911]: Unable to talk to lsboxd

Oct 23 10:05:51 server.sheavernet.private mdworker[36912]: Unable to talk to lsboxd

Oct 23 10:05:51 server.sheavernet.private mdworker[36913]: Unable to talk to lsboxd

Oct 23 10:05:51 server.sheavernet.private sandboxd[36915] ([36911]): mdworker(36911) deny mach-lookup com.apple.ls.boxd

Oct 23 10:05:51 server.sheavernet.private sandboxd[36915] ([36912]): mdworker(36912) deny mach-lookup com.apple.ls.boxd

Oct 23 10:05:51 server.sheavernet.private sandboxd[36915] ([36913]): mdworker(36913) deny mach-lookup com.apple.ls.boxd

Oct 23 10:05:51 server kernel[0]: Sandbox: sandboxd(36915) deny mach-lookup com.apple.coresymbolicationd

Oct 23 10:07:52 server.sheavernet.private mdworker[36932]: Unable to talk to lsboxd

Oct 23 10:07:52 server.sheavernet.private sandboxd[36934] ([36932]): mdworker(36932) deny mach-lookup com.apple.ls.boxd

Oct 23 10:07:52 server kernel[0]: Sandbox: sandboxd(36934) deny mach-lookup com.apple.coresymbolicationd

Oct 23 10:09:53 server.sheavernet.private mdworker[36948]: Unable to talk to lsboxd

Oct 23 10:09:53 server.sheavernet.private mdworker[36949]: Unable to talk to lsboxd

Oct 23 10:09:53 server.sheavernet.private sandboxd[36950] ([36948]): mdworker(36948) deny mach-lookup com.apple.ls.boxd

Oct 23 10:09:53 server.sheavernet.private sandboxd[36950] ([36949]): mdworker(36949) deny mach-lookup com.apple.ls.boxd

Oct 23 10:09:53 server kernel[0]: Sandbox: sandboxd(36950) deny mach-lookup com.apple.coresymbolicationd

Oct 23 10:12:32 server.sheavernet.private WindowServer[16413]: handle_will_sleep_auth_and_shield_windows: no lock state data

Oct 23 10:12:44 server.sheavernet.private SecurityAgent[16423]: User info context values set for serveradmin

Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_authenticate(): Got user: serveradmin

Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_authenticate(): Got ruser: (null)

Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_authenticate(): Got service: authorization

Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in od_principal_for_user(): No authentication authority returned

Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in od_principal_for_user(): failed: 7

Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_authenticate(): Failed to determine Kerberos principal name.

Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_authenticate(): Done cleanup3

Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_authenticate(): Kerberos 5 refuses you

Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_authenticate(): pam_sm_authenticate: ntlm

Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_acct_mgmt(): OpenDirectory - Membership cache TTL set to 1800.

Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in od_record_check_pwpolicy(): retval: 0

Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in od_record_attribute_create_cfstring(): returned 2 attributes for dsAttrTypeStandard:AuthenticationAuthority

Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Establishing credentials

Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Got user: serveradmin

Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Context initialised

Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Got euid, egid: 0 0

Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Done getpwnam()

Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Done setegid() & seteuid()

Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): pam_sm_setcred: krb5 user serveradmin doesn't have a principal

Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Done cleanup3

Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Done seteuid() & setegid()

Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Done cleanup4

Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): pam_sm_setcred: ntlm

Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): pam_sm_setcred: no domain found skipping

Oct 23 10:12:44 server.sheavernet.private SecurityAgent[16423]: Login Window login proceeding

Oct 23 10:12:44 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.login.console' by client '/System/Library/CoreServices/loginwindow.app' [16412] for authorization created by '/System/Library/CoreServices/loginwindow.app' [16412] (100003,0)

Oct 23 10:12:44 server.sheavernet.private loginwindow[16412]: Login Window - Returned from Security Agent

Oct 23 10:12:44 server.sheavernet.private loginwindow[16412]: ERROR | ScreensharingLoginNotification | Failed sending message to screen sharing GetScreensharingPort, err: 1102

Oct 23 10:12:44 server.sheavernet.private loginwindow[16412]: USER_PROCESS: 16412 console

Oct 23 10:12:44 server.sheavernet.private launchctl[36981]: Could not open job overrides database at: /private/var/db/launchd.db/com.apple.launchd.peruser.503/overrides.plist: 2: No such file or directory

Oct 23 10:12:44 server.sheavernet.private launchctl[36981]: launchctl: Dubious permissions on file (skipping): /Library/LaunchAgents/com.adobe.AAM.Updater-1.0.plist

Oct 23 10:12:44 server com.apple.launchd.peruser.503[11657] (com.apple.gamed): Ignored this key: UserName

Oct 23 10:12:44 server com.apple.launchd.peruser.503[11657] (com.apple.gamed): Ignored this key: GroupName

Oct 23 10:12:44 server com.apple.launchd.peruser.503[11657] (com.apple.ReportCrash): Falling back to default Mach exception handler. Could not find: com.apple.ReportCrash.Self

Oct 23 10:12:44 server.sheavernet.private loginwindow[16412]: Connection with distnoted server was invalidated

Oct 23 10:12:44 server.sheavernet.private launchproxyls[36985]: FAILURE: Failed to open property list at file://localhost/private/var/db/launchd.db/com.apple.launchd.peruser.503/overri des.plist for reading. (The operation couldn\u2019t be completed. No such file or directory)

Oct 23 10:12:44 --- last message repeated 3 times ---

Oct 23 10:12:44 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.login.done' by client '/System/Library/CoreServices/loginwindow.app' [16412] for authorization created by '/System/Library/CoreServices/loginwindow.app' [16412] (100002,0)

Oct 23 10:12:45 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

Oct 23 10:12:45 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

Oct 23 10:12:45 server.sheavernet.private WindowServer[16413]: **DMPROXY** (2) Found `/System/Library/CoreServices/DMProxy'.

Oct 23 10:12:45 server.sheavernet.private WindowServer[16413]: Display 0x042801c0: MappedDisplay Unit 0; ColorProfile { 2, "iMac"}; TransferFormula (1.000000, 1.000000, 1.000000)

Oct 23 10:12:45 server.sheavernet.private blued[60]: kBTXPCUpdateUserPreferences gConsoleUserUID = 503

Oct 23 10:12:45 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.services.systemconfiguration.network' by client '/usr/libexec/UserEventAgent' [36982] for authorization created by '/usr/libexec/UserEventAgent' [36982] (100000,0)

Oct 23 10:12:45 --- last message repeated 1 time ---

Oct 23 10:12:45 server.sheavernet.private UserEventAgent[36982]: cannot find fw daemon port 1102

Oct 23 10:12:45 server.sheavernet.private coreservicesd[66]: SendFlattenedData, got error #268435460 (ipc/send) timed out from ::mach_msg(), sending notification kLSNotifyApplicationLaunch to notificationID=5591

Oct 23 10:12:45 server.sheavernet.private UserEventAgent[36982]: FAILURE: Failed to open property list at file://localhost/private/var/db/launchd.db/com.apple.launchd.peruser.503/overri des.plist for reading. (The operation couldn\u2019t be completed. No such file or directory)

Oct 23 10:12:46 --- last message repeated 1 time ---

Oct 23 10:12:45 server.sheavernet.private UserEventAgent[36982]: FAILURE: Failed to write property list at file://localhost/private/var/db/launchd.db/com.apple.launchd.peruser.503/overri des.plist. (The operation couldn\u2019t be completed. No such file or directory)

Oct 23 10:12:45 server.sheavernet.private UserEventAgent[36982]: FAILURE: Could not repair overrides database: 0x2

Oct 23 10:12:45 server.sheavernet.private UserEventAgent[36982]: FAILURE: Failed to open property list at file://localhost/private/var/db/launchd.db/com.apple.launchd.peruser.503/overri des.plist for reading. (The operation couldn\u2019t be completed. No such file or directory)

Oct 23 10:12:45 server.sheavernet.private UserEventAgent[36982]: com.apple.TMLaunchAgent disabled

Oct 23 10:12:45 server.sheavernet.private NetworkBrowserAgent[37002]: Starting NetworkBrowserAgent

Oct 23 10:12:46 server com.apple.launchd.peruser.503[11657] (com.apple.afpstat-qfa[37020]): Job failed to exec(3). Setting up event to tell us when to try again: 2: No such file or directory

Oct 23 10:12:46 server com.apple.launchd.peruser.503[11657] (com.apple.afpstat-qfa[37020]): Job failed to exec(3) for weird reason: 2

Oct 23 10:12:46 server kernel[0]: CODE SIGNING: cs_invalid_page(0x1000): p=37021[GoogleSoftwareUp] clearing CS_VALID

Oct 23 10:12:46 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

Oct 23 10:12:46 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

Oct 23 10:12:46 server.sheavernet.private talagent[36991]: _LSSetApplicationInformationItem(kLSDefaultSessionID, asn, _kLSApplicationIsHiddenKey, hidden ? kCFBooleanTrue : kCFBooleanFalse, NULL) produced OSStatus -50 on line 623 in TCApplication.m

Oct 23 10:12:46 server.sheavernet.private talagent[36991]: _LSSetApplicationInformationItem(kLSDefaultSessionID, asn, TAL_kLSIsProxiedForTALKey, kCFBooleanTrue, NULL) produced OSStatus -50 on line 626 in TCApplication.m

Oct 23 10:12:46 server com.apple.launchd.peruser.503[11657] (com.apple.mrt.uiagent[37009]): Exited with code: 255

Oct 23 10:12:47 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

Oct 23 10:12:47 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KeystoneDaemon logServiceState] GoogleSoftwareUpdate daemon (1.1.0.3659) vending:

com.google.Keystone.Daemon.UpdateEngine: 1 connection(s)

com.google.Keystone.Daemon.Administration: 0 connection(s)

Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KeystoneDaemon logServiceState] GoogleSoftwareUpdate daemon (1.1.0.3659) vending:

com.google.Keystone.Daemon.UpdateEngine: 1 connection(s)

com.google.Keystone.Daemon.Administration: 1 connection(s)

Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSDaemonAdministration(PrivateMethods) ticketsAllowUninstallWithError:] KSDaemonAdministration system Keystone will not uninstall with active tickets.

Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KeystoneDaemon logServiceState] GoogleSoftwareUpdate daemon (1.1.0.3659) vending:

com.google.Keystone.Daemon.UpdateEngine: 1 connection(s)

com.google.Keystone.Daemon.Administration: 0 connection(s)

Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KeystoneDaemon logServiceState] GoogleSoftwareUpdate daemon (1.1.0.3659) vending:

com.google.Keystone.Daemon.UpdateEngine: 2 connection(s)

com.google.Keystone.Daemon.Administration: 0 connection(s)

Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSUpdateEngine updateProductID:] KSUpdateEngine updating product ID: "com.google.Keystone"

Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSCheckAction performAction] KSCheckAction checking 1 ticket(s).

Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSUpdateCheckAction performAction] KSUpdateCheckAction starting update check for ticket(s): {(

<KSTicket:0x285710

productID=com.google.Keystone

version=1.1.0.3659

xc=<KSPathExistenceChecker:0x285f50 path=/Library/Google/GoogleSoftwareUpdate/GoogleSoftwareUpdate.bundle/>

serverType=Omaha

url=https://tools.google.com/service/update2

creationDate=2012-02-02 00:47:33

>

)}

Using server: <KSOmahaServer:0x2176ef0

engine=<KSDaemonUpdateEngine:0x2823e0>

params={

EngineVersion = "1.1.0.3659";

ActivesInfo = {

"com.google.Keystone" = {

LastActivePingDate = 2012-10-21 07:00:01 +0000;

LastActiveDate = 2012-10-23 14:12:48 +0000;

LastRollCallPingDate = 2012-10-21 07:00:01 +0000;

};

"com.google.Chrome" = {

LastRollCallPingDate = 2012-10-21 07:00:01 +0000;

};

};

UserInitiated = 0;

IsSystem = 1;

OmahaOSVersion = "10.8.2_i486";

Identity = KeystoneDaemon;

AllowedSubdomains = (

".omaha.sandbox.google.com",

".tools.google.com",

".www.google.com",

".corp.google.com"

);

}

>

Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSUpdateCheckAction performAction] KSUpdateCheckAction running KSServerUpdateRequest: <KSOmahaServerUpdateRequest:0x217f260

server=<KSOmahaServer:0x2176ef0>

url="https://tools.google.com/service/update2"

runningFetchers=0

tickets=1

activeTickets=1

rollCallTickets=1

body=

<?xml version="1.0" encoding="UTF-8" standalone="yes"?>

<o:gupdate xmlns:o="http://www.google.com/update2/request" protocol="2.0" version="KeystoneDaemon-1.1.0.3659" ismachine="1">

<o:os platform="mac" version="MacOSX" sp="10.8.2_i486"></o:os>

<o:app appid="com.google.Keystone" version="1.1.0.3659" lang="en-us" installage="264" brand="GGLG">

<o:ping r="2" a="2"></o:ping>

<o:updatecheck></o:updatecheck>

</o:app>

</o:gupdate>

>

Oct 23 10:12:51 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSUpdateCheckAction(KSServerUpdateRequestDelegate) serverRequest:fetchedWithResponse:] KSUpdateCheckAction received KSServerUpdateResponse: <KSOmahaServerUpdateResponse:0x2076ef0

server=<KSOmahaServer:0x2176ef0>

url="https://tools.google.com/service/update2"

status=200

tickets=1

activeTickets=1

rollCallTickets=1

data=

<?xml version="1.0" encoding="UTF-8" standalone="yes"?>

<gupdate xmlns="http://www.google.com/update2/response" protocol="2.0" server="prod">

<daystart elapsed_seconds="25970"></daystart>

<app appid="com.google.Keystone" status="ok">

<ping status="ok"></ping>

<updatecheck status="noupdate"></updatecheck>

</app>

</gupdate>

>

Oct 23 10:12:51 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

Oct 23 10:12:51 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

Oct 23 10:12:51 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSUpdateCheckAction(PrivateMethods) finishAction] KSUpdateCheckAction found updates: {( )}

Oct 23 10:12:51 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSPrefetchAction performAction] KSPrefetchAction no updates to prefetch.

Oct 23 10:12:51 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSMultiUpdateAction performAction] KSSilentUpdateAction had no updates to apply.

Oct 23 10:12:51 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSMultiUpdateAction performAction] KSPromptAction had no updates to apply.

Oct 23 10:12:51 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSUpdateEngine(PrivateMethods) updateFinish] KSUpdateEngine update processing complete.

Oct 23 10:12:51 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSUpdateEngine updateAllProducts] KSUpdateEngine updating all installed products.

Oct 23 10:12:51 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSCheckAction performAction] KSCheckAction checking 2 ticket(s).

Oct 23 10:12:51 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSUpdateCheckAction performAction] KSUpdateCheckAction starting update check for ticket(s): {(

<KSTicket:0x217a810

productID=com.google.Chrome

version=22.0.1229.94

xc=<KSPathExistenceChecker:0x217f520 path=/Applications/Google Chrome.app>

serverType=Omaha

url=https://tools.google.com/service/update2

creationDate=2012-02-02 00:47:34

tagPath=/Applications/Google Chrome.app/Contents/Info.plist

tagKey=KSChannelID

brandPath=/Library/Google/Google Chrome Brand.plist

brandKey=KSBrandID

versionPath=/Applications/Google Chrome.app/Contents/Info.plist

versionKey=KSVersion

>,

<KSTicket:0x217a970

productID=com.google.Keystone

version=1.1.0.3659

xc=<KSPathExistenceChecker:0x217fc40 path=/Library/Google/GoogleSoftwareUpdate/GoogleSoftwareUpdate.bundle/>

serverType=Omaha

url=https://tools.google.com/service/update2

creationDate=2012-02-02 00:47:33

>

)}

Using server: <KSOmahaServer:0x217fea0

engine=<KSDaemonUpdateEngine:0x2823e0>

params={

EngineVersion = "1.1.0.3659";

ActivesInfo = {

"com.google.Keystone" = {

LastActivePingDate = 2012-10-23 07:00:01 +0000;

LastActiveDate = 2012-10-23 14:12:48 +0000;

LastRollCallPingDate = 2012-10-23 07:00:01 +0000;

};

"com.google.Chrome" = {

LastRollCallPingDate = 2012-10-21 07:00:01 +0000;

};

};

UserInitiated = 0;

IsSystem = 1;

OmahaOSVersion = "10.8.2_i486";

Identity = KeystoneDaemon;

AllowedSubdomains = (

".omaha.sandbox.google.com",

".tools.google.com",

".www.google.com",

".corp.google.com"

);

}

>

Oct 23 10:12:51 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSUpdateCheckAction performAction] KSUpdateCheckAction running KSServerUpdateRequest: <KSOmahaServerUpdateRequest:0x2188680

server=<KSOmahaServer:0x217fea0>

url="https://tools.google.com/service/update2"

runningFetchers=0

tickets=2

activeTickets=0

rollCallTickets=1

body=

<?xml version="1.0" encoding="UTF-8" standalone="yes"?>

<o:gupdate xmlns:o="http://www.google.com/update2/request" protocol="2.0" version="KeystoneDaemon-1.1.0.3659" ismachine="1">

<o:os platform="mac" version="MacOSX" sp="10.8.2_i486"></o:os>

<o:app appid="com.google.Chrome" version="22.0.1229.94" lang="en-us" installage="264" brand="GGRO">

<o:ping r="2"></o:ping>

<o:updatecheck></o:updatecheck>

</o:app>

<o:app appid="com.google.Keystone" version="1.1.0.3659" lang="en-us" installage="264" brand="GGLG">

<o:updatecheck></o:updatecheck>

</o:app>

</o:gupdate>

>

Oct 23 10:12:52 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSUpdateCheckAction(KSServerUpdateRequestDelegate) serverRequest:fetchedWithResponse:] KSUpdateCheckAction received KSServerUpdateResponse: <KSOmahaServerUpdateResponse:0x57cbe0

server=<KSOmahaServer:0x217fea0>

url="https://tools.google.com/service/update2"

status=200

tickets=2

activeTickets=0

rollCallTickets=1

data=

<?xml version="1.0" encoding="UTF-8" standalone="yes"?>

<gupdate xmlns="http://www.google.com/update2/response" protocol="2.0" server="prod">

<daystart elapsed_seconds="25971"></daystart>

<app appid="com.google.Chrome" status="ok">

<ping status="ok"></ping>

<updatecheck status="noupdate"></updatecheck>

</app>

<app appid="com.google.Keystone" status="ok">

<updatecheck status="noupdate"></updatecheck>

</app>

</gupdate>

>

Oct 23 10:12:52 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSUpdateCheckAction(PrivateMethods) finishAction] KSUpdateCheckAction found updates: {( )}

Oct 23 10:12:52 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSPrefetchAction performAction] KSPrefetchAction no updates to prefetch.

Oct 23 10:12:52 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSMultiUpdateAction performAction] KSSilentUpdateAction had no updates to apply.

Oct 23 10:12:52 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSMultiUpdateAction performAction] KSPromptAction had no updates to apply.

Oct 23 10:12:52 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSUpdateEngine(PrivateMethods) updateFinish] KSUpdateEngine update processing complete.

Oct 23 10:12:52 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

Oct 23 10:12:52 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

Oct 23 10:12:53 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KeystoneDaemon logServiceState] GoogleSoftwareUpdate daemon (1.1.0.3659) vending:

com.google.Keystone.Daemon.UpdateEngine: 1 connection(s)

com.google.Keystone.Daemon.Administration: 0 connection(s)

Oct 23 10:12:57 server.sheavernet.private com.apple.backupd[37027]: Starting automatic backup

Oct 23 10:12:57 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/UserEventAgent' [15] for authorization created by '/usr/libexec/UserEventAgent' [15] (100012,0)

Oct 23 10:12:57 server.sheavernet.private UserEventAgent[36982]: FAILURE: Failed to open property list at file://localhost/private/var/db/launchd.db/com.apple.launchd.peruser.503/overri des.plist for reading. (The operation couldn\u2019t be completed. No such file or directory)

Oct 23 10:12:57 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/UserEventAgent' [15] for authorization created by '/usr/libexec/UserEventAgent' [15] (100012,0)

Oct 23 10:12:57 server.sheavernet.private UserEventAgent[36982]: FAILURE: Failed to open property list at file://localhost/private/var/db/launchd.db/com.apple.launchd.peruser.503/overri des.plist for reading. (The operation couldn\u2019t be completed. No such file or directory)

Oct 23 10:12:57 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

Oct 23 10:12:57 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

Oct 23 10:12:58 server.sheavernet.private com.apple.backupd[37027]: Backup failed with error: 19

Oct 23 10:12:58 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

Oct 23 10:12:58 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

Oct 23 10:12:59 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

Oct 23 10:12:59 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

Oct 23 10:13:00 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

Oct 23 10:13:00 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

Oct 23 10:13:01 server.sheavernet.private xpcd[15997]: restored permissions (100644 -> 100744) on /Users/serveradmin/Library/Containers/com.apple.ShareKitHelper/Container.plist

Oct 23 10:13:03 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

Oct 23 10:13:03 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

Oct 23 10:13:04 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

Oct 23 10:13:04 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

Oct 23 10:13:05 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

Oct 23 10:13:05 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

Oct 23 10:13:06 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.SoftwareUpdate.scan' by client '/Applications/App Store.app' [37041] for authorization created by '/Applications/App Store.app' [37041] (100003,0)

Oct 23 10:13:06 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.install.apple-software' by client '/Applications/App Store.app' [37041] for authorization created by '/Applications/App Store.app' [37041] (100003,0)

Oct 23 10:13:06 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.install.apple-software' by client '/System/Library/PrivateFrameworks/PackageKit.framework/Versions/A/Resources/in stalld' [37050] for authorization created by '/Applications/App Store.app' [37041] (4,0)

Oct 23 10:13:06 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.install.app-store-software' by client '/System/Library/PrivateFrameworks/PackageKit.framework/Versions/A/Resources/in stalld' [37050] for authorization created by '/Applications/App Store.app' [37041] (4,0)

Oct 23 10:13:06 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.SoftwareUpdate.scan' by client '/System/Library/PrivateFrameworks/SoftwareUpdate.framework/Versions/A/Resource s/suhelperd' [37044] for authorization created by '/Applications/App Store.app' [37041] (100002,0)

Oct 23 10:13:07 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

Oct 23 10:13:07 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

Oct 23 10:13:08 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

Oct 23 10:13:08 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

Oct 23 10:13:09 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

Oct 23 10:13:09 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

Oct 23 10:13:19 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KeystoneDaemon main] GoogleSoftwareUpdateDaemon inactive, shutdown.

Oct 23 10:13:30 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

Oct 23 10:13:30 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

Oct 23 10:13:31 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

Oct 23 10:13:31 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

Oct 23 10:13:42 server.sheavernet.private com.apple.ShareKitHelper[37047]: --warning: [ShareKit-XPC] Received XPC_ERROR_CONNECTION_INVALID

Oct 23 10:13:42 server.sheavernet.private com.apple.ShareKitHelper[37047]: --warning: [ShareKit-XPC] connectionWithClientInterrupted

Oct 23 10:13:42 server.sheavernet.private com.apple.ShareKitHelper[37047]: --warning: [ShareKit] Cancel UI for running services with Client PID: 37041

Oct 23 10:13:43 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

Oct 23 10:13:43 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

Oct 23 10:13:54 server.sheavernet.private mdworker[37071]: Unable to talk to lsboxd

Oct 23 10:13:54 server.sheavernet.private mdworker[37072]: Unable to talk to lsboxd

Oct 23 10:13:54 server.sheavernet.private mdworker[37073]: Unable to talk to lsboxd

Oct 23 10:13:54 server.sheavernet.private sandboxd[37075] ([37071]): mdworker(37071) deny mach-lookup com.apple.ls.boxd

Oct 23 10:13:54 server.sheavernet.private sandboxd[37075] ([37072]): mdworker(37072) deny mach-lookup com.apple.ls.boxd

Oct 23 10:13:54 server.sheavernet.private sandboxd[37075] ([37073]): mdworker(37073) deny mach-lookup com.apple.ls.boxd

Oct 23 10:13:54 server kernel[0]: Sandbox: sandboxd(37075) deny mach-lookup com.apple.coresymbolicationd

Oct 23 10:13:55 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

Oct 23 10:13:55 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

Oct 23 10:14:06 server.sheavernet.private kdc[14291]: AS-REQ server.sheavernet.private$@SERVER.SHEAVERNET.PRIVATE from 127.0.0.1:50307 for krbtgt/SERVER.SHEAVERNET.PRIVATE@SERVER.SHEAVERNET.PRIVATE

Oct 23 10:14:06 --- last message repeated 1 time ---

Oct 23 10:14:06 server.sheavernet.private kdc[14291]: Client sent patypes: REQ-ENC-PA-REP

Oct 23 10:14:06 server.sheavernet.private kdc[14291]: Need to use PA-ENC-TIMESTAMP/PA-PK-AS-REQ

Oct 23 10:14:06 server.sheavernet.private kdc[14291]: AS-REQ server.sheavernet.private$@SERVER.SHEAVERNET.PRIVATE from 127.0.0.1:65534 for krbtgt/SERVER.SHEAVERNET.PRIVATE@SERVER.SHEAVERNET.PRIVATE

Oct 23 10:14:06 --- last message repeated 1 time ---

Oct 23 10:14:06 server.sheavernet.private kdc[14291]: Client sent patypes: ENC-TS, REQ-ENC-PA-REP

Oct 23 10:14:06 server.sheavernet.private kdc[14291]: ENC-TS pre-authentication succeeded -- server.sheavernet.private$@SERVER.SHEAVERNET.PRIVATE

Oct 23 10:14:06 server.sheavernet.private kdc[14291]: Client supported enctypes: aes256-cts-hmac-sha1-96, aes128-cts-hmac-sha1-96, des3-cbc-sha1, arcfour-hmac-md5, using aes256-cts-hmac-sha1-96/aes256-cts-hmac-sha1-96

Oct 23 10:14:06 server.sheavernet.private kdc[14291]: Requested flags: forwardable

Oct 23 10:14:06 server.sheavernet.private kdc[14291]: TGS-REQ server.sheavernet.private$@SERVER.SHEAVERNET.PRIVATE from 127.0.0.1:49658 for host/server.sheavernet.private@SERVER.SHEAVERNET.PRIVATE [canonicalize]

Oct 23 10:14:06 server.sheavernet.private kdc[14291]: TGS-REQ server.sheavernet.private$@SERVER.SHEAVERNET.PRIVATE from 127.0.0.1:61606 for ldap/server.sheavernet.private@SERVER.SHEAVERNET.PRIVATE [canonicalize]

Oct 23 10:14:07 server.sheavernet.private servermgrd[37080]: flushing dns cache

Oct 23 10:14:07 server.sheavernet.private mDNSResponder[43]: SIGHUP: Purge cache

Oct 23 10:14:08 server.sheavernet.private kdc[14291]: AS-REQ server.sheavernet.private$@SERVER.SHEAVERNET.PRIVATE from 127.0.0.1:63962 for krbtgt/SERVER.SHEAVERNET.PRIVATE@SERVER.SHEAVERNET.PRIVATE

Oct 23 10:14:08 --- last message repeated 1 time ---

Oct 23 10:14:08 server.sheavernet.private kdc[14291]: Client sent patypes: REQ-ENC-PA-REP

Oct 23 10:14:08 server.sheavernet.private kdc[14291]: Need to use PA-ENC-TIMESTAMP/PA-PK-AS-REQ

Oct 23 10:14:08 server.sheavernet.private kdc[14291]: AS-REQ server.sheavernet.private$@SERVER.SHEAVERNET.PRIVATE from 127.0.0.1:64867 for krbtgt/SERVER.SHEAVERNET.PRIVATE@SERVER.SHEAVERNET.PRIVATE

Oct 23 10:14:08 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (2,0)

Oct 23 10:14:08 server.sheavernet.private kdc[14291]: AS-REQ server.sheavernet.private$@SERVER.SHEAVERNET.PRIVATE from 127.0.0.1:64867 for krbtgt/SERVER.SHEAVERNET.PRIVATE@SERVER.SHEAVERNET.PRIVATE

Oct 23 10:14:08 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (100000,0)

Oct 23 10:14:08 server.sheavernet.private kdc[14291]: Client sent patypes: ENC-TS, REQ-ENC-PA-REP

Oct 23 10:14:08 server.sheavernet.private kdc[14291]: ENC-TS pre-authentication succeeded -- server.sheavernet.private$@SERVER.SHEAVERNET.PRIVATE

Oct 23 10:14:08 server.sheavernet.private kdc[14291]: Client supported enctypes: aes256-cts-hmac-sha1-96, aes128-cts-hmac-sha1-96, des3-cbc-sha1, arcfour-hmac-md5, using aes256-cts-hmac-sha1-96/aes256-cts-hmac-sha1-96

Oct 23 10:14:08 server.sheavernet.private kdc[14291]: Requested flags: forwardable

Oct 23 10:14:09 server.sheavernet.private servermgrd[37080]: nsc_smb XPC: handle_event error : < Connection invalid >

Oct 23 10:14:09 server.sheavernet.private servermgrd[37080]: --Module servermgr_devicemgr's response has retain count of 3.

Oct 23 10:14:09 server.sheavernet.private servermgrd[37080]: --request was {

command = getState;

}

Oct 23 10:14:09 server.sheavernet.private servermgrd[37080]: --response was {

state = RUNNING;

}

Oct 23 10:14:09 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (2,0)

Oct 23 10:14:09 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (100000,0)

Oct 23 10:14:09 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (2,0)

Oct 23 10:14:09 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (100000,0)

Oct 23 10:14:09 server.sheavernet.private kdc[14291]: TGS-REQ server.sheavernet.private$@SERVER.SHEAVERNET.PRIVATE from 127.0.0.1:52600 for host/server.sheavernet.private@SERVER.SHEAVERNET.PRIVATE [canonicalize]

Oct 23 10:14:09 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (2,0)

Oct 23 10:14:09 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (100000,0)

Oct 23 10:14:09 server.sheavernet.private kdc[14291]: TGS-REQ server.sheavernet.private$@SERVER.SHEAVERNET.PRIVATE from 127.0.0.1:54210 for ldap/server.sheavernet.private@SERVER.SHEAVERNET.PRIVATE [canonicalize]

Oct 23 10:14:09 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (2,0)

Oct 23 10:14:09 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (100000,0)

Oct 23 10:14:09 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (2,0)

Oct 23 10:14:09 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (100000,0)

Oct 23 10:14:10 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (2,0)

Oct 23 10:14:10 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (100000,0)

Oct 23 10:14:11 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

Oct 23 10:14:11 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

Oct 23 10:14:11 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.collabd.settings

Oct 23 10:14:11 server.sheavernet.private sudo[37113]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

Oct 23 10:14:11 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/sbin/serverctl' [37117] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/sbin/serverctl' [37117] (2,0)

Oct 23 10:14:11 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/sbin/serverctl' [37117] (100000,0)

Oct 23 10:14:11 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/launchdadd' [37085] for authorization created by '/Library/PrivilegedHelperTools/com.apple.serverd' [65] (100002,0)

Oct 23 10:14:11 server.sheavernet.private servermgrd[37080]: servermgr_web: enableWebApp command succeeded for web app com.apple.webapp.collabd.settings

Oct 23 10:14:11 server.sheavernet.private ruby[37118]: CFPreferences: user home directory for user kCFPreferencesCurrentUser at /var/teamsserver is unavailable. User domains will be volatile.

Oct 23 10:14:11 server.sheavernet.private collabd[37118]: [main.m:714 71dd4180 +4ms] HTTP server listening at localhost:4444

Oct 23 10:14:12 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.postgres

Oct 23 10:14:12 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

Oct 23 10:14:12 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

Oct 23 10:14:12 server.sheavernet.private collabd[37118]: CFPreferences: user home directory for user kCFPreferencesCurrentUser at /var/teamsserver is unavailable. User domains will be volatile.

Oct 23 10:14:12 server.sheavernet.private sudo[37139]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

Oct 23 10:14:12 server.sheavernet.private servermgrd[37080]: servermgr_web: enableWebApp command succeeded for web app com.apple.webapp.postgres

Oct 23 10:14:13 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.collabd.settings

Oct 23 10:14:14 server.sheavernet.private sudo[37165]: root : TTY=unknown ; PWD=/Applications/Server.app/Contents/ServerRoot/usr/share/devicemgr/backend ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

Oct 23 10:14:14 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/sbin/serverctl' [37169] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/sbin/serverctl' [37169] (2,0)

Oct 23 10:14:14 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/sbin/serverctl' [37169] (100000,0)

Oct 23 10:14:14 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/launchdadd' [37085] for authorization created by '/Library/PrivilegedHelperTools/com.apple.serverd' [65] (100002,0)

Oct 23 10:14:14 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

Oct 23 10:14:14 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

Oct 23 10:14:14 server.sheavernet.private servermgrd[37080]: servermgr_web: disableWebApp command succeeded for web app com.apple.webapp.collabd.settings

Oct 23 10:14:14 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.postgres

Oct 23 10:14:15 server.sheavernet.private sudo[37187]: root : TTY=unknown ; PWD=/Applications/Server.app/Contents/ServerRoot/usr/share/devicemgr/backend ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

Oct 23 10:14:15 server.sheavernet.private servermgrd[37080]: servermgr_web: disableWebApp command succeeded for web app com.apple.webapp.postgres

Oct 23 10:14:15 server.sheavernet.private servermgrd[37080]: nsc_smb XPC: handle_event error : < Connection invalid >

Oct 23 10:14:45 --- last message repeated 1 time ---

Oct 23 10:15:07 server.sheavernet.private servermgrd[37080]: -[AccountsRequestHandler(AccountsSystemConfigurationObservation) registerForKeychainEventNotifications]: SecKeychainAddCallback() status: -25297

Oct 23 10:15:18 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (2,0)

Oct 23 10:15:18 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/launchdadd' [37225] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (100002,0)

Oct 23 10:15:18 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (2,0)

Oct 23 10:15:18 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (100000,0)

Oct 23 10:15:18 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (2,0)

Oct 23 10:15:18 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (100000,0)

Oct 23 10:15:18 server.sheavernet.private mDNSResponder[43]: SIGHUP: Purge cache

Oct 23 10:15:18 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (2,0)

Oct 23 10:15:18 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/launchdadd' [37225] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (100002,0)

Oct 23 10:15:18 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (2,0)

Oct 23 10:15:18 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (100000,0)

Oct 23 10:15:18 server.sheavernet.private named[37230]: starting BIND 9.8.3-P1 -f

Oct 23 10:15:18 server.sheavernet.private named[37230]: built with '--mandir=/usr/share/man' '--infodir=/usr/share/info' '--disable-dependency-tracking' '--prefix=/usr' '--sysconfdir=/private/etc' '--localstatedir=/private/var' '--enable-atomic=no' '--with-openssl=yes' '--with-gssapi=yes' '--enable-symtable=none' 'CC=/Applications/Xcode.app/Contents/Developer/Toolchains/OSX10.8.xctoolchain/u sr/bin/cc' 'CFLAGS=-arch i386 -arch x86_64 -g -Os -pipe -gdwarf-2 ' 'LDFLAGS=-arch i386 -arch x86_64 -framework IOKit -framework CoreFoundation' 'CXX=/Applications/Xcode.app/Contents/Developer/Toolchains/OSX10.8.xctoolchain/ usr/bin/c++' 'CXXFLAGS=-arch i386 -arch x86_64 -g -Os -pipe '

Oct 23 10:15:18 server.sheavernet.private named[37230]: ----------------------------------------------------

Oct 23 10:15:18 server.sheavernet.private named[37230]: BIND 9 is maintained by Internet Systems Consortium,

Oct 23 10:15:18 server.sheavernet.private named[37230]: Inc. (ISC), a non-profit 501(c)(3) public-benefit

Oct 23 10:15:18 server.sheavernet.private named[37230]: corporation. Support and training for BIND 9 are

Oct 23 10:15:18 server.sheavernet.private named[37230]: available at https://www.isc.org/support

Oct 23 10:15:18 server.sheavernet.private named[37230]: ----------------------------------------------------

Oct 23 10:15:18 server.sheavernet.private mDNSResponder[43]: SIGHUP: Purge cache

Oct 23 10:15:18 server.sheavernet.private named[37230]: Warning: view com.apple.ServerAdmin.DNS.public: 'empty-zones-enable/disable-empty-zone' not set: disabling RFC 1918 empty zones

Oct 23 10:15:18 server.sheavernet.private named[37230]: command channel listening on 127.0.0.1#54

Oct 23 10:15:18 server.sheavernet.private SystemUIServer[36992]: Menu Extra: <DisplaysExtra: 0x7fd1faa86fd0> is over retained.

Oct 23 10:15:19 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

Oct 23 10:15:19 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

Oct 23 10:15:20 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

Oct 23 10:15:20 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

Oct 23 10:15:27 server.sheavernet.private coreservicesd[66]: SendFlattenedData, got error #268435459 (ipc/send) invalid destination port from ::mach_msg(), sending notification kLSNotifyApplicationDeath to notificationID=5623

Oct 23 10:15:27 server com.apple.launchd.peruser.503[11657] (com.apple.SystemUIServer.agent[36992]): Job appears to have crashed: Segmentation fault: 11

Oct 23 10:15:28 server.sheavernet.private ReportCrash[37232]: Saved crash report for SystemUIServer[36992] version 1.7 (369.2) to /Users/serveradmin/Library/Logs/DiagnosticReports/SystemUIServer_2012-10-23-101 528_server.crash

Oct 23 10:15:54 server.sheavernet.private mdworker[37240]: Unable to talk to lsboxd

Oct 23 10:15:54 server.sheavernet.private sandboxd[37242] ([37240]): mdworker(37240) deny mach-lookup com.apple.ls.boxd

Oct 23 10:15:55 server kernel[0]: Sandbox: sandboxd(37242) deny mach-lookup com.apple.coresymbolicationd

Oct 23 10:16:49 server.sheavernet.private servermgrd[37080]: nsc_smb XPC: handle_event error : < Connection invalid >

Oct 23 10:16:51 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (2,0)

Oct 23 10:16:51 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/Serve rManagerDaemon.bundle' [37080] (100000,0)

Oct 23 10:16:51 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.postgres

Oct 23 10:16:52 server.sheavernet.private sudo[37283]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

Oct 23 10:16:52 server.sheavernet.private servermgrd[37080]: servermgr_web: enableWebApp command succeeded for web app com.apple.webapp.postgres

Oct 23 10:16:52 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.collabd.settings

Oct 23 10:16:52 server.sheavernet.private sudo[37306]: root : TTY=unknown ; PWD=/Applications/Server.app/Contents/ServerRoot/usr/share/devicemgr/backend ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

Oct 23 10:16:52 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/sbin/serverctl' [37310] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/sbin/serverctl' [37310] (2,0)

Oct 23 10:16:52 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/sbin/serverctl' [37310] (100000,0)

Oct 23 10:16:52 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/launchdadd' [37248] for authorization created by '/Library/PrivilegedHelperTools/com.apple.serverd' [65] (100002,0)

Oct 23 10:16:52 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

Oct 23 10:16:52 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

Oct 23 10:16:52 server.sheavernet.private servermgrd[37080]: servermgr_web: enableWebApp command succeeded for web app com.apple.webapp.collabd.settings

Oct 23 10:16:53 server.sheavernet.private ruby[37311]: CFPreferences: user home directory for user kCFPreferencesCurrentUser at /var/teamsserver is unavailable. User domains will be volatile.

Oct 23 10:16:53 server.sheavernet.private collabd[37311]: [main.m:714 71dd4180 +5ms] HTTP server listening at localhost:4444

Oct 23 10:16:53 server.sheavernet.private collabd[37311]: CFPreferences: user home directory for user kCFPreferencesCurrentUser at /var/teamsserver is unavailable. User domains will be volatile.

Oct 23 10:16:53 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.collabd.settings

Oct 23 10:16:53 server.sheavernet.private sudo[37338]: root : TTY=unknown ; PWD=/Applications/Server.app/Contents/ServerRoot/usr/share/devicemgr/backend ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

Oct 23 10:16:53 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/sbin/serverctl' [37342] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/sbin/serverctl' [37342] (2,0)

Oct 23 10:16:53 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/sbin/serverctl' [37342] (100000,0)

Oct 23 10:16:53 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/launchdadd' [37248] for authorization created by '/Library/PrivilegedHelperTools/com.apple.serverd' [65] (100002,0)

Oct 23 10:16:53 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

Oct 23 10:16:53 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

Oct 23 10:16:53 server.sheavernet.private servermgrd[37080]: servermgr_web: disableWebApp command succeeded for web app com.apple.webapp.collabd.settings

Oct 23 10:16:54 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.postgres

Oct 23 10:16:54 server.sheavernet.private sudo[37360]: root : TTY=unknown ; PWD=/Applications/Server.app/Contents/ServerRoot/usr/share/devicemgr/backend ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

Oct 23 10:16:54 server.sheavernet.private servermgrd[37080]: servermgr_web: disableWebApp command succeeded for web app com.apple.webapp.postgres

Oct 23 10:17:21 server.sheavernet.private servermgrd[37080]: --Module servermgr_swupdate's response has retain count of 3.

Oct 23 10:17:21 server.sheavernet.private servermgrd[37080]: --request was {

command = getLogPaths;

}

Oct 23 10:17:21 server.sheavernet.private servermgrd[37080]: --response was {

swupdateAccessLog = "/var/log/swupd/swupd_access_log";

swupdateErrorLog = "/var/log/swupd/swupd_error_log";

swupdateServiceLog = "/var/log/swupd/swupd_syncd_log";

}

Oct 23 10:17:21 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.postgres

Oct 23 10:17:22 server.sheavernet.private sudo[37384]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

Oct 23 10:17:22 server.sheavernet.private servermgrd[37080]: servermgr_web: enableWebApp command succeeded for web app com.apple.webapp.postgres

Oct 23 10:17:24 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.postgres

Oct 23 10:17:24 server.sheavernet.private sudo[37407]: root : TTY=unknown ; PWD=/Applications/Server.app/Contents/ServerRoot/usr/share/devicemgr/backend ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

Oct 23 10:17:24 server.sheavernet.private servermgrd[37080]: servermgr_web: disableWebApp command succeeded for web app com.apple.webapp.postgres

Oct 23 10:17:25 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.postgres

Oct 23 10:17:25 server.sheavernet.private sudo[37429]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

Oct 23 10:17:25 server.sheavernet.private servermgrd[37080]: servermgr_web: enableWebApp command succeeded for web app com.apple.webapp.postgres

Oct 23 10:17:27 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.postgres

Oct 23 10:17:27 server.sheavernet.private sudo[37453]: root : TTY=unknown ; PWD=/Applications/Server.app/Contents/ServerRoot/usr/share/devicemgr/backend ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

Oct 23 10:17:27 server.sheavernet.private servermgrd[37080]: servermgr_web: disableWebApp command succeeded for web app com.apple.webapp.postgres

Oct 23 10:17:27 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.postgres

Oct 23 10:17:28 server.sheavernet.private sudo[37473]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

Oct 23 10:17:28 server.sheavernet.private servermgrd[37080]: servermgr_web: enableWebApp command succeeded for web app com.apple.webapp.postgres

Oct 23 10:17:29 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.postgres

Oct 23 10:17:30 server.sheavernet.private sudo[37495]: root : TTY=unknown ; PWD=/Applications/Server.app/Contents/ServerRoot/usr/share/devicemgr/backend ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

Oct 23 10:17:30 server.sheavernet.private servermgrd[37080]: servermgr_web: disableWebApp command succeeded for web app com.apple.webapp.postgres

Oct 23 10:17:30 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.postgres

Oct 23 10:17:30 server.sheavernet.private sudo[37515]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

Oct 23 10:17:30 server.sheavernet.private servermgrd[37080]: servermgr_web: enableWebApp command succeeded for web app com.apple.webapp.postgres

Oct 23 10:17:32 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.postgres

Oct 23 10:17:32 server.sheavernet.private sudo[37538]: root : TTY=unknown ; PWD=/Applications/Server.app/Contents/ServerRoot/usr/share/devicemgr/backend ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

Oct 23 10:17:32 server.sheavernet.private servermgrd[37080]: servermgr_web: disableWebApp command succeeded for web app com.apple.webapp.postgres

Oct 23 10:17:32 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.postgres

Oct 23 10:17:33 server.sheavernet.private sudo[37558]: root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

Oct 23 10:17:33 server.sheavernet.private servermgrd[37080]: servermgr_web: enableWebApp command succeeded for web app com.apple.webapp.postgres

Oct 23 10:17:34 server.sheavernet.private servermgrd[37080]: servermgr_web: processing webApp:com.apple.webapp.postgres

Oct 23 10:17:35 server.sheavernet.private sudo[37580]: root : TTY=unknown ; PWD=/Applications/Server.app/Contents/ServerRoot/usr/share/devicemgr/backend ; USER=root ; COMMAND=/usr/bin/psql -U webauth -d webauth -c SELECT max(version) FROM schema_migrations

Oct 23 10:17:35 server.sheavernet.private servermgrd[37080]: servermgr_web: disableWebApp command succeeded for web app com.apple.webapp.postgres

Oct 23 10:19:55 server.sheavernet.private mdworker[37600]: Unable to talk to lsboxd

Oct 23 10:19:55 server.sheavernet.private mdworker[37598]: Unable to talk to lsboxd

Oct 23 10:19:55 server.sheavernet.private mdworker[37599]: Unable to talk to lsboxd

Oct 23 10:19:55 server.sheavernet.private sandboxd[37602] ([37600]): mdworker(37600) deny mach-lookup com.apple.ls.boxd

Oct 23 10:19:55 server.sheavernet.private sandboxd[37602] ([37598]): mdworker(37598) deny mach-lookup com.apple.ls.boxd

Oct 23 10:19:55 server.sheavernet.private sandboxd[37602] ([37599]): mdworker(37599) deny mach-lookup com.apple.ls.boxd

Oct 23 10:19:56 server kernel[0]: Sandbox: sandboxd(37602) deny mach-lookup com.apple.coresymbolicationd

Oct 23 10:21:04 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)

Oct 23 10:21:04 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)

Jul 9, 2013 3:00 PM in response to Peter Jurg2

I had the same 2100 error for the client binding (server 10.7 or 10.8). Tried all kinds of things. What finally worked was to archive the OD database, erase the LDAP master from the server, and create a new master from the saved archive. Several of the settings in the OD server were re-initialized in this way (check commandline: "serveradmin setttings dirserv" to see all the setting). All worked again. Note that the archving may not work unless you create an appropriate keychain entry on your server.

Cannot Bind Clients to Newly Configured Mac Server (10.8)

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.