A standard way to bind client's requests with Principals?

Hi, I'm wondering if does exist a standard (vendor-independent) way to bind Principal objects associated with a client which wants to execute a method on a RemoteInterface with the Principal(s) defined in the deployment descriptor.
If not, that's worrying....
Marco

Ok, suppose I have got a deployment descriptor in which I defined the security elements. How could I pass a Subject to a container, together with a client (let's say a servlet) so that the container applies the security declared in the deployment descriptor?
Marco

Similar Messages

  • Client side paging with jstl or xslt

    Is there any way to provide client side paging with jstl or xslt/xpath. I have a jsp page with a limited amount of data, say less than 30 rows of data. I want to display 10 rows at a time. The data is returned to the page in xml format and I am currently using xslt to display the data (currently displays all rows on the page). I am looking for a way to update my xpath variables so I can provide paging capabilities. Is there any way to get the information from the request from the jsp to the xpath variables? Or does anyone have any other suggestions for implementing client side paging using either xslst - xpath or jstl? Thanks Vic.

    I am loading the entire xml stream in the client and formatting using xslt. I only want to initially display 10 rows. I would like to implement client side paging. Is there any way to communicate with the xpath variables? Javascript?

  • Problems setting up 2way SSL with option Client certs requested Not Enfor

    Hi,
    Iam having problems trying to set up 2 way SSL with the option "Clients Certs Requested But Not Enforced". I am using DefaultIdentityAsserter with my own implementation of UserNameMapper. And I have the login-config set to CLIENT-CERT in web.xml. I have tested this setup and it works when I have "Client Certs Requested and Enforced" but when I change it to "Requested and not enforced" it gives an 401 unauthorized exception.
    Any help with this will be greatly appreciated.
    Thanks
    Praveena.

    Hi Peter,
    I'm afraid not, I turned to Apple support forums, followed their advice for troubleshooting Mac Mail (obviously not relevant to you using Outlook) but It involved scanning ports checking firewalls etc, all of this was clear and I just cannot see the problem.
    I even got one of the Livechat BC guys to look into it, by setting up a dummy email address on the client's account, I think he was rather intrigued, but I'm not sure he's had much luck as he still hasn't got back to and that was over 20 hours ago.
    Can your client receive emails? I can only get my client's account receiving emails, when I try to send an email I just keep receiving an message telling me that it cannot connect to smtp!
    According to the BC fact sheet for sending and receiving emails: "By Default, email software will set the SMTP port to 25, which is the standard port for the smtp protocol. However our mail service has two alternative ports available that you can send through. 8025 or 587.
    However it's not blocked and those port settings didn't work either.
    The Apple fact sheet made mention to firewall settings possibly also blocking, but it's not relevant to me using my version of OS.
    Good luck, and please repost if you get any further.
    I am now just looking for a reason that my client's mail WONT work on Mac Mail, just so I can sound professional when I tell them the answer is "no".
    Penny

  • Standard way of Handling Escalation process in CRM Complaint Management

    Dear experts,
    What is the standard way of mapping Escalation process in SAP CRM Complaints management?
    We need to escalate the complaint to next level if it is not resolved with in the a specific time.
    How can we configure this scenario in SAP CRM. Please help me to solve this issue. Your help will be highly appreciated.
    Thank you
    Raghu ram

    Hi Arup,
    We are setting up a Complaints Mgmt system for our client.
    They have a very standard process of handling complaints.
    The complaints are created in the system and assigned to a CR Agent. The CR agent then forwards to the respective department for investigation. Once the investigation is compelete the department sends it back to the CR who then decides whether the Complaint is justified or not.
    If it is justifed and there is a money refund involved then there is a limit to what the CR agent can approve. If its more than his limit somebody from higher authority needs to approve it. My quesiton to you is:
    - How is the complaint assigned to the CR agent. Do I need to replicate the Org strucutre from HR into CRM? If yes, then once I have the org structure where do I do the CR assignment?
    - Secondly how does the CR agent assign the complaint to other department for investigation. Is this through CRM Complaint Activity or there is another way for it?
    - Third once the investigation is complete and the required department needs to send the feedback how will this be sent back to the CR for making the final decision. Is there a workflow?
    - Finally how can we setup the cap limits like if there is a money refund to the customer from the complaint then if the the amount is between 0 and 500 a CR should be able to approve it, if the amount is between 500 - 1000 the manager should be able to approve it, how can this be setup?
    Many thanks
    AA

  • Client-error-request-value-too-long

    What is this error???? I am trying to add an Epson 1280 printer and I get this error. I have the most current driver and not sure why this isn't working.

    My flatmate had this "client-error-request-value-too-long" problem with her (powerpc) powerbook. Nearly everything I tried didn't work:
    1) Reinstalling drivers
    2) Permissions repair
    3) Resetting print system using Fixamac's Printer Setup Repair Utility
    4) Updating from 10.4.10 to 10.4.11
    5) Using the command line to try and recreate the directory: /var/spool/cups/tmp (which told me it already existed)
    6) Using Transmit (with show invisible files turned on) to browse to /var/spool/cups/ and try and recreate the tmp folder
    On the last point I couldn't change anything about the /var/spool/cups/ directory because the permissions were corrupted in some way. It keep telling me tmp already existed but I couldn't see it.
    In the end what did work was enabling and logging in as root, browsing to /var/spool/ using Transmit and deleting the cups folder and then recreating. It took a few tries to delete too, but in the end I managed to remove it.
    Of course I wouldn't actually recommend this. I'm no Unix geek so god knows what I might have broken in the process, so I'm going to reinstall her system with the Archive and Install options when I get a chance, which is what I'd recommend doing in the first place to anyone having this problem.

  • USB Printing - client-error-request-value-too-long

    A little while back, my iSight suddenly stopped working and so I did a full format and reinstall to 'fix' the problem. The problem wasn't 'fixed' through this action. Instead, I had to disconnect power and let the computer sit there for a bit and think about what it had done (naughty iMac). Anyway... Another USB-related problem just popped up - this time with my printer.
    The printer is a Canon IP4000 and I just installed the latest drivers to try to fix this error. The first error was something about not being able to write to the device. I thought that was stupid and would probably be fixed by deleting the printer and then reinstalling it. I have so far 'uninstalled' the printer (more or less just removed it from the printers list in the printer utility) and now I can't re-add it to the list to install it. The error reads as follows:
    An error occurred while trying to add the selected printer.
    client-error-request-value-too-long
    I have tried Google but I just don't have the time to sort through all kinds of explainations on how CUPS works on Linux (apparently, this error is related to CUPS in some way). I also tried searching the forum for the error message but found nothing. So here I am again asking for some help from those who might have seen this problem before.
    This is on a fresh install and I have tried it on newly created users to no avail.
    Thanks for any help! -Thomas

    I've recently had this error which came up because the spool folder was missing. In the terminal:
    sudo mkdir /private/var/spool
    sudo mkdir /private/var/spool/cups
    puts the proper folders in their place. Repair permissions afterwards.
    Through the cups web interface, the error is "Request entity too large"
    Panther has the same folders, but a different error comes up.
    The above cups folder has different permissions than the default. Probably the same for Tiger and Panther but just to be safe, repair permissions.

  • PowerView Errors in the metadata manager. The current model can only be expressed when the client is requesting tabular view metadata with VERSION restriction of 2.0 or later

    SQL 2012 SP 1 CU4 applied. Now getting " Errors in the metadata manager. The current model can only be expressed when the client is requesting tabular view metadata with VERSION restriction of 2.0 or later"
    Any ideas what could be causing it to send the incorrect version?

    amaltsev1,
    It appears that in the past few days you have not received a response to your
    posting. That concerns us, and has triggered this automated reply.
    Has your problem been resolved? If not, you might try one of the following options:
    - Visit http://support.novell.com and search the knowledgebase and/or check all
    the other self support options and support programs available.
    - You could also try posting your message again. Make sure it is posted in the
    correct newsgroup. (http://forums.novell.com)
    Be sure to read the forum FAQ about what to expect in the way of responses:
    http://forums.novell.com/faq.php
    If this is a reply to a duplicate posting, please ignore and accept our apologies
    and rest assured we will issue a stern reprimand to our posting bot.
    Good luck!
    Your Novell Product Support Forums Team
    http://support.novell.com/forums/

  • Is there a standard way to plug in custom authentication code

    Is there a standard way to plug in use my own custom authentication code using forms authentication when I am using servlets/jsp for my website. I read the spec and found that the spec requires servlet containers to support forms authentication, but, the process seems to be transparent to the developer. This restricts me to store user information in the format imposed by the container provider. I cannot use, MS Active directory for example, to store user attributes and use it for forms authentication. Also, I could not find any standard way in which HttpServletRequest.getRemoteUser() works. Shouldn't there be a set of interfaces abstracting authentication process, which developers can implement for customized authentication mechanisms.
    Thanks
    Nikhil.

    Greetings,
    Is there a standard way to plug in use my own custom authentication code using formsNo. There are standard "authentication mechanisms" but that's not quite the same thing. Like most things in J2EE, the "what" of things are specified but the "how" them are left to the vendor. Consult your vendor docs.
    authentication when I am using servlets/jsp for my website. I read the spec and found that the spec
    requires servlet containers to support forms authentication, but, the process seems to be transparent
    to the developer. This restricts meFor the most part, "forms" authentication is transparent to the developer - at least, with respect to directly responding to and handling the request. The developer, however, does have some significant work to do with regard to the form itself and any associated error "pages". The point of the "standard authentication schemes", however, is to delegate the work of actual authentication processing to the container and, thereby, make it transparent to the developer (one of the many "application services" provided by the application server ;).
    to store user information in the format imposed by the container provider. I cannot use, MS Active
    directory for example, to store user attributes and use it for forms authentication. Also, I could notAgain read your vendor docs on how to "plug in" your own authentication handler(s). Most support it in some fashion which typically involves implementing some interface(s) and/or abstract class(es). Many also support it through their own "standard" component handlers, like an EJB invoker, where the invoked component is expected to function in a pre-determined way.
    Of course, there's nothing in the specification that says authentication must be handled by the container (only that it must be supported)! You're free to implement a login mechanism through your own proprietary JSP page and/or servlet (and/or EJB), and bypass the container entirely. ;)
    find any standard way in which HttpServletRequest.getRemoteUser() works.Regardless of the standard authentication scheme used (i.e. handled by the container), the user's authenticated login ID is returned by the method. Unfortunately, this means the method is useless if your own "authentication system" is used in lieu of the container - but, of course, in such a case the method should also be un-needed. ;)
    Shouldn't there be a set of interfaces abstracting authentication process, which developers can
    implement for customized authentication mechanisms.It's a matter of debate.
    Thanks
    Nikhil.Regards,
    Tony "Vee Schade" Cook

  • Finder crashes on binded client machines

    Having upgraded my mac mini server to Yosemite 10.10.1 and server to V4, I upgraded my iMac and laptop to the same OS. My server user accounts work perfectly if I login on the server machine, however the two binded client machines are not working well. I have checked the directory settings and tried rebinding the machines; however the problem is unresolved.
    The issue is that the finder crashes when I login in as a network user. The local admin account is fine. Exactly the same thing happens on two different machines when using a network login.
    I have tried resetting PRAM, repairing permissions, checked that my DNS resolves correctly and still the problem exists.
    Many thanks in advance for any help you may have.

    Unfortunately not as the network accounts do not work on the server or client machines. I have come up with a work around which works perfectly for me.
    After many days of pulling my hair out I have come up with a new way of running the server which works a treat. Instead of creating network user accounts, I have created local accounts on all of my Macs with the same user names and password for each person. I can then get the client machines to see the home folder on the server for each account. This means that all docs are now on the server machine and we can access them from any computer. This also works for iPhoto and iTunes as I can point the app to look at the library on the server machine for each user.
    What this means is that all other apps are dealt with locally i.e.. mail, address book etc. As I have set these up using google apps, when you update one computer all the other computers will update on login. If you use iCloud keychain this all gets updated automatically!
    The only thing that is not consistent on all machines is the dock and desktop images. I can cope with that to be honest! A very small price to pay to see the system finally working properly.

  • Trouble binding clients

    Hi There,
    I've had to erase and install our server and now that everything is set up, I can't get any clients connected – I see:
    "The version of the server you are trying to connect to is not supported. Please contact your system administrator to resolve the problem."
    The frustrating thing is that all the clients (4x 10.8 and 1x 10.7) were all able to connect previously so I'm not sure the above version error is correct.
    I'm currently focusing on one 10.8 client and I've tried cleaning out the local KDC with:
    – sudo security delete-certificates -c "com.apple.kerberos.kdc" /Library/Keychains/System.keychain
    – sudo dscl . -delete /Config/KerberosKDC
    – sudo rm /var/db/.configureLocalKDC
    – sudo rm -R /var/db/krb5kdc
    – sudo /usr/libexec/configureLocalKDC
    I've then tried binding manually via Open Directory Utility and restarted. I see a green circle beside the server's IP address under Login options so I think everything is setup.
    This server is only running OD, AFP and DNS – nothing else.
    It's been a while since I've had to set up this server (3 years) so I'm not sure what I've missed sorry.
    Any help or pointers in the right direction would be much appreciated – I'm a designer so go easy on me!
    Cheers
    Ben

    Actually, I'm pretty sure I found all this binding confusing (and unesasary with 5 clients) is there a way to let people just login?
    After checking the other 10.7 client, I'm not seeing any LDAP servers configured.

  • Ways to Configure Which UNIX Server a PC Client Application Communicates With

    We have several different MS VC++ "fat client" applications that we want to run
    on the same NT 4.0 PC.
    Each application uses the Tuxedo 7.1 client to communicate with Tuxedo services
    located on a UNIX server.
    Each application needs to communicate with a different UNIX server (e.g., application
    A1 needs Tuxedo
    service T1 located on UNIX server S1, application A2 needs Tuxedo service T2 located
    on UNIX server
    S2). We'd like to load the Tuxedo 7.1 client software in such a way that each
    individual application
    controls which server it uses. One way to do that is through registry entries
    specific to each application.
    We are looking for some documentation or tips on other/better ways to configure
    which server the PC
    application communicates with. We are also looking for some documentation or
    tips on how to best
    configure an application that needs to subscribe to services from several different
    servers (e.g.,
    application A needs Tuxedo service T1 on server S1 and Tuxedo service T2 on server
    S2). Thanks.

    Matt,
    This sounds quite unusual, and I am not sure why you want to do things this way.
    Generally, I would expect that the services would be distributed on the server side over
    different boxes as you describe, but the location would be transparent to a client app.
    which would tpinit once, and Tuxedo would route the requests appropriately. Maybe that's
    not how you want to do things because the apps are all logically independent? I'm not
    sure about that though, since you describe needing services on different servers in
    individual clients... Can you do the integration at the back end?
    To do what you describe, however, you need to control the value of the WSNADDR
    environment variable before you call tpinit() - it is the network address in this
    variable that tells the client libraries which server to connect to. Simply set the
    value (from a command line parameter, the registry, an ini file or wherever) with the
    tuxputenv() API before you call tpinit()
    In Tuxedo 7.1 and higher, it is also possible to connect to multiple different servers
    simultaneousy by calling tpinit multiple times and having multiple contexts in the
    client.
    I hope that helps.
    Regards,
    Peter.
    Got a Question? Ask BEA at http://askbea.bea.com
    The views expressed in this posting are solely those of the author, and BEA
    Systems, Inc. does not endorse any of these views.
    BEA Systems, Inc. is not responsible for the accuracy or completeness of the
    information provided
    and assumes no duty to correct, expand upon, delete or update any of the
    information contained in this posting.
    Matt wrote:
    We have several different MS VC++ "fat client" applications that we want to run
    on the same NT 4.0 PC.
    Each application uses the Tuxedo 7.1 client to communicate with Tuxedo services
    located on a UNIX server.
    Each application needs to communicate with a different UNIX server (e.g., application
    A1 needs Tuxedo
    service T1 located on UNIX server S1, application A2 needs Tuxedo service T2 located
    on UNIX server
    S2). We'd like to load the Tuxedo 7.1 client software in such a way that each
    individual application
    controls which server it uses. One way to do that is through registry entries
    specific to each application.
    We are looking for some documentation or tips on other/better ways to configure
    which server the PC
    application communicates with. We are also looking for some documentation or
    tips on how to best
    configure an application that needs to subscribe to services from several different
    servers (e.g.,
    application A needs Tuxedo service T1 on server S1 and Tuxedo service T2 on server
    S2). Thanks.

  • Cannot Bind Clients to Newly Configured Mac Server (10.8)

    I have downloaded, installed and configured Server 10.8 on my iMac, and am having difficulty binding clients (all OS X 10.8) to it. Everything seems to be configured corecttly in the Server app, and the clients are able to find it no problem. But it crashes the client side when I try to bind them to the server. I looked in the sysem log file on the server, and there is a whole mess of error messageas appearing, with a sampling here:
    Oct 23 07:08:56 server.sheavernet.private mdworker[34841]: Unable to talk to lsboxd
    Oct 23 07:08:56 server.sheavernet.private sandboxd[34843] ([34842]): mdworker(34842) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:08:56 server.sheavernet.private sandboxd[34843] ([34841]): mdworker(34841) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:08:56 server kernel[0]: Sandbox: sandboxd(34843) deny mach-lookup com.apple.coresymbolicationd
    These errors repeat over and over in the log, and may or may not impact what I am trying to do.
    When trying to bind the client, I get a whole bunch of error, to many to include here. (wish I could upload the text file). Would someone be willing to take a look at the full listing and help me troubleshoot it? It would be MUCH appreciated!

    Thanks Jaime, I went ahead and turned on debug logging and tried again to join my client to the OD. The two screenshots show what I saw on the client side, and the text below contains the log entries associated with this attempt.
    Oct 23 07:08:56 server.sheavernet.private mdworker[34841]: Unable to talk to lsboxd
    Oct 23 07:08:56 server.sheavernet.private sandboxd[34843] ([34842]): mdworker(34842) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:08:56 server.sheavernet.private sandboxd[34843] ([34841]): mdworker(34841) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:08:56 server kernel[0]: Sandbox: sandboxd(34843) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 07:11:27 server.sheavernet.private com.apple.backupd[34898]: Starting automatic backup
    Oct 23 07:11:27 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/UserEventAgent' [15] for authorization created by '/usr/libexec/UserEventAgent' [15] (100012,0)
    Oct 23 07:11:27 server.sheavernet.private com.apple.backupd[34898]: Backup failed with error: 19
    Oct 23 07:11:27 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/UserEventAgent' [15] for authorization created by '/usr/libexec/UserEventAgent' [15] (100012,0)
    Oct 23 07:11:28 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)
    Oct 23 07:11:28 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)
    Oct 23 07:12:32 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xd1-192.168.1.3:0!
    Oct 23 07:12:56 server.sheavernet.private mdworker[34921]: Unable to talk to lsboxd
    Oct 23 07:12:56 server.sheavernet.private mdworker[34919]: Unable to talk to lsboxd
    Oct 23 07:12:56 server.sheavernet.private mdworker[34920]: Unable to talk to lsboxd
    Oct 23 07:12:57 server.sheavernet.private sandboxd[34923] ([34921]): mdworker(34921) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:12:57 server.sheavernet.private sandboxd[34923] ([34919]): mdworker(34919) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:12:57 server.sheavernet.private sandboxd[34923] ([34920]): mdworker(34920) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:12:57 server kernel[0]: Sandbox: sandboxd(34923) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 07:13:50 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xd2-192.168.1.3:0!
    Oct 23 07:14:57 server.sheavernet.private mdworker[34957]: Unable to talk to lsboxd
    Oct 23 07:14:57 server.sheavernet.private sandboxd[34959] ([34957]): mdworker(34957) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:14:57 server kernel[0]: Sandbox: sandboxd(34959) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 07:18:58 server.sheavernet.private mdworker[35025]: Unable to talk to lsboxd
    Oct 23 07:18:58 server.sheavernet.private mdworker[35024]: Unable to talk to lsboxd
    Oct 23 07:18:58 server.sheavernet.private mdworker[35023]: Unable to talk to lsboxd
    Oct 23 07:18:58 server.sheavernet.private sandboxd[35027] ([35025]): mdworker(35025) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:18:58 server.sheavernet.private sandboxd[35027] ([35024]): mdworker(35024) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:18:58 server.sheavernet.private sandboxd[35027] ([35023]): mdworker(35023) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:18:58 server kernel[0]: Sandbox: sandboxd(35027) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 07:22:59 server.sheavernet.private mdworker[35099]: Unable to talk to lsboxd
    Oct 23 07:22:59 server.sheavernet.private mdworker[35100]: Unable to talk to lsboxd
    Oct 23 07:22:59 server.sheavernet.private mdworker[35101]: Unable to talk to lsboxd
    Oct 23 07:22:59 server kernel[0]: Sandbox: sandboxd(35103) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 07:22:59 server.sheavernet.private sandboxd[35103] ([35099]): mdworker(35099) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:22:59 server.sheavernet.private sandboxd[35103] ([35100]): mdworker(35100) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:22:59 server.sheavernet.private sandboxd[35103] ([35101]): mdworker(35101) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:23:31 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xd3-192.168.1.3:0!
    Oct 23 07:25:00 server.sheavernet.private mdworker[35145]: Unable to talk to lsboxd
    Oct 23 07:25:00 server.sheavernet.private sandboxd[35147] ([35145]): mdworker(35145) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:25:00 server kernel[0]: Sandbox: sandboxd(35147) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 07:27:00 server.sheavernet.private mdworker[35180]: Unable to talk to lsboxd
    Oct 23 07:27:00 server.sheavernet.private mdworker[35179]: Unable to talk to lsboxd
    Oct 23 07:27:00 server.sheavernet.private sandboxd[35181] ([35180]): mdworker(35180) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:27:00 server.sheavernet.private sandboxd[35181] ([35179]): mdworker(35179) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:27:01 server kernel[0]: Sandbox: sandboxd(35181) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 07:30:16 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xd5-192.168.1.3:0!
    Oct 23 07:31:01 server.sheavernet.private mdworker[35247]: Unable to talk to lsboxd
    Oct 23 07:31:01 server.sheavernet.private mdworker[35248]: Unable to talk to lsboxd
    Oct 23 07:31:01 server.sheavernet.private mdworker[35249]: Unable to talk to lsboxd
    Oct 23 07:31:01 server.sheavernet.private sandboxd[35261] ([35247]): mdworker(35247) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:31:01 server.sheavernet.private sandboxd[35261] ([35248]): mdworker(35248) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:31:01 server.sheavernet.private sandboxd[35261] ([35249]): mdworker(35249) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:31:01 server kernel[0]: Sandbox: sandboxd(35261) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 07:33:02 server.sheavernet.private mdworker[35295]: Unable to talk to lsboxd
    Oct 23 07:33:02 server.sheavernet.private sandboxd[35297] ([35295]): mdworker(35295) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:33:02 server kernel[0]: Sandbox: sandboxd(35297) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 07:37:03 server.sheavernet.private mdworker[35361]: Unable to talk to lsboxd
    Oct 23 07:37:03 server.sheavernet.private mdworker[35359]: Unable to talk to lsboxd
    Oct 23 07:37:03 server.sheavernet.private mdworker[35360]: Unable to talk to lsboxd
    Oct 23 07:37:03 server.sheavernet.private sandboxd[35363] ([35361]): mdworker(35361) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:37:03 server.sheavernet.private sandboxd[35363] ([35359]): mdworker(35359) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:37:03 server.sheavernet.private sandboxd[35363] ([35360]): mdworker(35360) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:37:03 server kernel[0]: Sandbox: sandboxd(35363) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 07:41:04 server.sheavernet.private mdworker[35427]: Unable to talk to lsboxd
    Oct 23 07:41:04 server.sheavernet.private mdworker[35429]: Unable to talk to lsboxd
    Oct 23 07:41:04 server.sheavernet.private mdworker[35428]: Unable to talk to lsboxd
    Oct 23 07:41:04 server kernel[0]: Sandbox: sandboxd(35441) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 07:41:04 server.sheavernet.private sandboxd[35441] ([35427]): mdworker(35427) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:41:04 server.sheavernet.private sandboxd[35441] ([35429]): mdworker(35429) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:41:04 server.sheavernet.private sandboxd[35441] ([35428]): mdworker(35428) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:42:11 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xd6-192.168.1.3:0!
    Oct 23 07:43:04 server.sheavernet.private mdworker[35467]: Unable to talk to lsboxd
    Oct 23 07:43:05 server.sheavernet.private sandboxd[35478] ([35467]): mdworker(35467) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:43:05 server kernel[0]: Sandbox: sandboxd(35478) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 07:45:05 server.sheavernet.private mdworker[35503]: Unable to talk to lsboxd
    Oct 23 07:45:05 server.sheavernet.private mdworker[35502]: Unable to talk to lsboxd
    Oct 23 07:45:05 server.sheavernet.private sandboxd[35513] ([35503]): mdworker(35503) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:45:05 server.sheavernet.private sandboxd[35513] ([35502]): mdworker(35502) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:45:06 server kernel[0]: Sandbox: sandboxd(35513) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 07:49:06 server.sheavernet.private mdworker[35577]: Unable to talk to lsboxd
    Oct 23 07:49:06 server.sheavernet.private mdworker[35579]: Unable to talk to lsboxd
    Oct 23 07:49:06 server.sheavernet.private mdworker[35578]: Unable to talk to lsboxd
    Oct 23 07:49:06 server.sheavernet.private sandboxd[35581] ([35577]): mdworker(35577) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:49:06 server.sheavernet.private sandboxd[35581] ([35579]): mdworker(35579) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:49:06 server.sheavernet.private sandboxd[35581] ([35578]): mdworker(35578) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:49:06 server kernel[0]: Sandbox: sandboxd(35581) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 07:51:07 server.sheavernet.private mdworker[35623]: Unable to talk to lsboxd
    Oct 23 07:51:07 server.sheavernet.private sandboxd[35625] ([35623]): mdworker(35623) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:51:07 server kernel[0]: Sandbox: sandboxd(35625) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 07:51:24 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xda-192.168.1.3:0!
    Oct 23 07:55:07 server.sheavernet.private mdworker[35689]: Unable to talk to lsboxd
    Oct 23 07:55:07 server.sheavernet.private mdworker[35687]: Unable to talk to lsboxd
    Oct 23 07:55:07 server.sheavernet.private mdworker[35688]: Unable to talk to lsboxd
    Oct 23 07:55:07 server kernel[0]: Sandbox: sandboxd(35691) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 07:55:07 server.sheavernet.private sandboxd[35691] ([35689]): mdworker(35689) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:55:07 server.sheavernet.private sandboxd[35691] ([35687]): mdworker(35687) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:55:07 server.sheavernet.private sandboxd[35691] ([35688]): mdworker(35688) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:59:08 server.sheavernet.private mdworker[35749]: Unable to talk to lsboxd
    Oct 23 07:59:08 server.sheavernet.private mdworker[35747]: Unable to talk to lsboxd
    Oct 23 07:59:08 server.sheavernet.private mdworker[35748]: Unable to talk to lsboxd
    Oct 23 07:59:08 server.sheavernet.private sandboxd[35761] ([35749]): mdworker(35749) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:59:08 server.sheavernet.private sandboxd[35761] ([35747]): mdworker(35747) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:59:08 server.sheavernet.private sandboxd[35761] ([35748]): mdworker(35748) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:59:09 server kernel[0]: Sandbox: sandboxd(35761) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:00:16 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xdb-192.168.1.3:0!
    Oct 23 08:01:09 server.sheavernet.private mdworker[35795]: Unable to talk to lsboxd
    Oct 23 08:01:09 server.sheavernet.private sandboxd[35797] ([35795]): mdworker(35795) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:01:10 server kernel[0]: Sandbox: sandboxd(35797) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:03:10 server.sheavernet.private mdworker[35812]: Unable to talk to lsboxd
    Oct 23 08:03:10 server.sheavernet.private mdworker[35811]: Unable to talk to lsboxd
    Oct 23 08:03:10 server.sheavernet.private sandboxd[35813] ([35812]): mdworker(35812) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:03:10 server.sheavernet.private sandboxd[35813] ([35811]): mdworker(35811) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:03:10 server kernel[0]: Sandbox: sandboxd(35813) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:07:10 server.sheavernet.private mdworker[35843]: Unable to talk to lsboxd
    Oct 23 08:07:10 server.sheavernet.private mdworker[35842]: Unable to talk to lsboxd
    Oct 23 08:07:10 server.sheavernet.private mdworker[35841]: Unable to talk to lsboxd
    Oct 23 08:07:10 server.sheavernet.private sandboxd[35845] ([35843]): mdworker(35843) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:07:10 server.sheavernet.private sandboxd[35845] ([35842]): mdworker(35842) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:07:10 server.sheavernet.private sandboxd[35845] ([35841]): mdworker(35841) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:07:11 server kernel[0]: Sandbox: sandboxd(35845) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:09:11 server.sheavernet.private mdworker[35861]: Unable to talk to lsboxd
    Oct 23 08:09:11 server.sheavernet.private sandboxd[35863] ([35861]): mdworker(35861) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:09:12 server kernel[0]: Sandbox: sandboxd(35863) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:11:57 server.sheavernet.private com.apple.backupd[35890]: Starting automatic backup
    Oct 23 08:11:57 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/UserEventAgent' [15] for authorization created by '/usr/libexec/UserEventAgent' [15] (100012,0)
    Oct 23 08:11:57 server.sheavernet.private com.apple.backupd[35890]: Backup failed with error: 19
    Oct 23 08:11:57 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/UserEventAgent' [15] for authorization created by '/usr/libexec/UserEventAgent' [15] (100012,0)
    Oct 23 08:11:58 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)
    Oct 23 08:11:58 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)
    Oct 23 08:13:12 server.sheavernet.private mdworker[35900]: Unable to talk to lsboxd
    Oct 23 08:13:12 server.sheavernet.private mdworker[35902]: Unable to talk to lsboxd
    Oct 23 08:13:12 server.sheavernet.private mdworker[35901]: Unable to talk to lsboxd
    Oct 23 08:13:12 server.sheavernet.private sandboxd[35904] ([35900]): mdworker(35900) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:13:12 server.sheavernet.private sandboxd[35904] ([35902]): mdworker(35902) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:13:12 server.sheavernet.private sandboxd[35904] ([35901]): mdworker(35901) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:13:12 server kernel[0]: Sandbox: sandboxd(35904) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:17:13 server.sheavernet.private mdworker[35933]: Unable to talk to lsboxd
    Oct 23 08:17:13 server.sheavernet.private mdworker[35932]: Unable to talk to lsboxd
    Oct 23 08:17:13 server.sheavernet.private mdworker[35934]: Unable to talk to lsboxd
    Oct 23 08:17:13 server.sheavernet.private sandboxd[35936] ([35933]): mdworker(35933) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:17:13 server.sheavernet.private sandboxd[35936] ([35932]): mdworker(35932) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:17:13 server.sheavernet.private sandboxd[35936] ([35934]): mdworker(35934) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:17:13 server kernel[0]: Sandbox: sandboxd(35936) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:17:56 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xdd-192.168.1.3:0!
    Oct 23 08:19:14 server.sheavernet.private mdworker[35952]: Unable to talk to lsboxd
    Oct 23 08:19:14 server.sheavernet.private sandboxd[35954] ([35952]): mdworker(35952) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:19:14 server kernel[0]: Sandbox: sandboxd(35954) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:21:14 server.sheavernet.private mdworker[35977]: Unable to talk to lsboxd
    Oct 23 08:21:14 server.sheavernet.private mdworker[35976]: Unable to talk to lsboxd
    Oct 23 08:21:14 server.sheavernet.private sandboxd[35978] ([35977]): mdworker(35977) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:21:14 server.sheavernet.private sandboxd[35978] ([35976]): mdworker(35976) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:21:15 server kernel[0]: Sandbox: sandboxd(35978) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:25:15 server.sheavernet.private mdworker[36006]: Unable to talk to lsboxd
    Oct 23 08:25:15 server.sheavernet.private mdworker[36005]: Unable to talk to lsboxd
    Oct 23 08:25:15 server.sheavernet.private mdworker[36007]: Unable to talk to lsboxd
    Oct 23 08:25:15 server.sheavernet.private sandboxd[36009] ([36006]): mdworker(36006) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:25:15 server.sheavernet.private sandboxd[36009] ([36005]): mdworker(36005) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:25:15 server.sheavernet.private sandboxd[36009] ([36007]): mdworker(36007) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:25:15 server kernel[0]: Sandbox: sandboxd(36009) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:27:16 server.sheavernet.private mdworker[36025]: Unable to talk to lsboxd
    Oct 23 08:27:16 server kernel[0]: Sandbox: sandboxd(36027) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:27:16 server.sheavernet.private sandboxd[36027] ([36025]): mdworker(36025) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:27:41 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xe0-192.168.1.3:0!
    Oct 23 08:30:06 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xe1-192.168.1.3:0!
    Oct 23 08:31:04 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)
    Oct 23 08:31:04 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)
    Oct 23 08:31:04 server.sheavernet.private kdc[14291]: AS-REQ [email protected] from 127.0.0.1:59519 for krbtgt/[email protected]
    Oct 23 08:31:04 --- last message repeated 1 time ---
    Oct 23 08:31:04 server.sheavernet.private kdc[14291]: Client sent patypes: REQ-ENC-PA-REP
    Oct 23 08:31:04 server.sheavernet.private kdc[14291]: Need to use PA-ENC-TIMESTAMP/PA-PK-AS-REQ
    Oct 23 08:31:04 server.sheavernet.private kdc[14291]: AS-REQ [email protected] from 127.0.0.1:54377 for krbtgt/[email protected]
    Oct 23 08:31:05 --- last message repeated 1 time ---
    Oct 23 08:31:05 server.sheavernet.private kdc[14291]: Client sent patypes: ENC-TS, REQ-ENC-PA-REP
    Oct 23 08:31:05 server.sheavernet.private kdc[14291]: ENC-TS pre-authentication succeeded -- [email protected]
    Oct 23 08:31:05 server.sheavernet.private kdc[14291]: Client supported enctypes: aes256-cts-hmac-sha1-96, aes128-cts-hmac-sha1-96, des3-cbc-sha1, arcfour-hmac-md5, using aes256-cts-hmac-sha1-96/aes256-cts-hmac-sha1-96
    Oct 23 08:31:05 server.sheavernet.private kdc[14291]: Requested flags: forwardable
    Oct 23 08:31:05 server.sheavernet.private kdc[14291]: TGS-REQ [email protected] from 127.0.0.1:53253 for host/[email protected] [canonicalize]
    Oct 23 08:31:05 server.sheavernet.private kdc[14291]: TGS-REQ [email protected] from 127.0.0.1:52312 for ldap/[email protected] [canonicalize]
    Oct 23 08:31:16 server.sheavernet.private mdworker[36066]: Unable to talk to lsboxd
    Oct 23 08:31:16 server.sheavernet.private mdworker[36067]: Unable to talk to lsboxd
    Oct 23 08:31:16 server.sheavernet.private mdworker[36068]: Unable to talk to lsboxd
    Oct 23 08:31:16 server.sheavernet.private sandboxd[36070] ([36066]): mdworker(36066) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:31:16 server.sheavernet.private sandboxd[36070] ([36067]): mdworker(36067) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:31:16 server.sheavernet.private sandboxd[36070] ([36068]): mdworker(36068) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:31:17 server kernel[0]: Sandbox: sandboxd(36070) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:32:05 server.sheavernet.private servermgrd[36063]: -[AccountsRequestHandler(AccountsSystemConfigurationObservation) registerForKeychainEventNotifications]: SecKeychainAddCallback() status: -25297
    Oct 23 08:35:17 server.sheavernet.private mdworker[36103]: Unable to talk to lsboxd
    Oct 23 08:35:17 server.sheavernet.private mdworker[36102]: Unable to talk to lsboxd
    Oct 23 08:35:17 server.sheavernet.private mdworker[36104]: Unable to talk to lsboxd
    Oct 23 08:35:17 server.sheavernet.private sandboxd[36106] ([36103]): mdworker(36103) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:35:17 server.sheavernet.private sandboxd[36106] ([36102]): mdworker(36102) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:35:17 server.sheavernet.private sandboxd[36106] ([36104]): mdworker(36104) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:35:18 server kernel[0]: Sandbox: sandboxd(36106) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:36:05 server.sheavernet.private servermgrd[36063]: No requests in 300 seconds, shutting down
    Oct 23 08:37:19 server.sheavernet.private mdworker[36122]: Unable to talk to lsboxd
    Oct 23 08:37:19 server.sheavernet.private sandboxd[36124] ([36122]): mdworker(36122) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:37:19 server kernel[0]: Sandbox: sandboxd(36124) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:37:26 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xe3-192.168.1.3:0!
    Oct 23 08:39:19 server.sheavernet.private mdworker[36139]: Unable to talk to lsboxd
    Oct 23 08:39:19 server.sheavernet.private mdworker[36138]: Unable to talk to lsboxd
    Oct 23 08:39:19 server.sheavernet.private sandboxd[36140] ([36139]): mdworker(36139) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:39:19 server.sheavernet.private sandboxd[36140] ([36138]): mdworker(36138) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:39:19 server kernel[0]: Sandbox: sandboxd(36140) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:40:15 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xe4-192.168.1.3:0!
    Oct 23 08:43:20 server.sheavernet.private mdworker[36177]: Unable to talk to lsboxd
    Oct 23 08:43:20 server.sheavernet.private mdworker[36176]: Unable to talk to lsboxd
    Oct 23 08:43:20 server.sheavernet.private mdworker[36178]: Unable to talk to lsboxd
    Oct 23 08:43:20 server.sheavernet.private sandboxd[36180] ([36177]): mdworker(36177) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:43:20 server.sheavernet.private sandboxd[36180] ([36176]): mdworker(36176) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:43:20 server.sheavernet.private sandboxd[36180] ([36178]): mdworker(36178) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:43:20 server kernel[0]: Sandbox: sandboxd(36180) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:45:21 server.sheavernet.private mdworker[36196]: Unable to talk to lsboxd
    Oct 23 08:45:21 server.sheavernet.private sandboxd[36198] ([36196]): mdworker(36196) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:45:21 server kernel[0]: Sandbox: sandboxd(36198) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:49:21 server.sheavernet.private mdworker[36226]: Unable to talk to lsboxd
    Oct 23 08:49:21 server.sheavernet.private mdworker[36225]: Unable to talk to lsboxd
    Oct 23 08:49:21 server.sheavernet.private mdworker[36224]: Unable to talk to lsboxd
    Oct 23 08:49:21 server.sheavernet.private sandboxd[36228] ([36226]): mdworker(36226) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:49:21 server.sheavernet.private sandboxd[36228] ([36225]): mdworker(36225) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:49:21 server.sheavernet.private sandboxd[36228] ([36224]): mdworker(36224) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:49:22 server kernel[0]: Sandbox: sandboxd(36228) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:53:22 server.sheavernet.private mdworker[36264]: Unable to talk to lsboxd
    Oct 23 08:53:22 server.sheavernet.private mdworker[36265]: Unable to talk to lsboxd
    Oct 23 08:53:22 server.sheavernet.private mdworker[36266]: Unable to talk to lsboxd
    Oct 23 08:53:22 server.sheavernet.private sandboxd[36268] ([36264]): mdworker(36264) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:53:22 server.sheavernet.private sandboxd[36268] ([36265]): mdworker(36265) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:53:22 server.sheavernet.private sandboxd[36268] ([36266]): mdworker(36266) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:53:22 server kernel[0]: Sandbox: sandboxd(36268) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:55:23 server.sheavernet.private mdworker[36284]: Unable to talk to lsboxd
    Oct 23 08:55:23 server kernel[0]: Sandbox: sandboxd(36286) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:55:23 server.sheavernet.private sandboxd[36286] ([36284]): mdworker(36284) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:57:24 server.sheavernet.private mdworker[36300]: Unable to talk to lsboxd
    Oct 23 08:57:24 server.sheavernet.private mdworker[36301]: Unable to talk to lsboxd
    Oct 23 08:57:24 server.sheavernet.private sandboxd[36302] ([36300]): mdworker(36300) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:57:24 server.sheavernet.private sandboxd[36302] ([36301]): mdworker(36301) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:57:24 server kernel[0]: Sandbox: sandboxd(36302) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:01:24 server.sheavernet.private mdworker[36337]: Unable to talk to lsboxd
    Oct 23 09:01:24 server.sheavernet.private mdworker[36338]: Unable to talk to lsboxd
    Oct 23 09:01:24 server.sheavernet.private mdworker[36339]: Unable to talk to lsboxd
    Oct 23 09:01:24 server kernel[0]: Sandbox: sandboxd(36341) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:01:24 server.sheavernet.private sandboxd[36341] ([36337]): mdworker(36337) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:01:24 server.sheavernet.private sandboxd[36341] ([36338]): mdworker(36338) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:01:24 server.sheavernet.private sandboxd[36341] ([36339]): mdworker(36339) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:03:25 server.sheavernet.private mdworker[36357]: Unable to talk to lsboxd
    Oct 23 09:03:25 server.sheavernet.private sandboxd[36359] ([36357]): mdworker(36357) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:03:25 server kernel[0]: Sandbox: sandboxd(36359) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:07:26 server.sheavernet.private mdworker[36388]: Unable to talk to lsboxd
    Oct 23 09:07:26 server.sheavernet.private mdworker[36386]: Unable to talk to lsboxd
    Oct 23 09:07:26 server.sheavernet.private mdworker[36387]: Unable to talk to lsboxd
    Oct 23 09:07:26 server.sheavernet.private sandboxd[36390] ([36388]): mdworker(36388) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:07:26 server.sheavernet.private sandboxd[36390] ([36386]): mdworker(36386) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:07:26 server.sheavernet.private sandboxd[36390] ([36387]): mdworker(36387) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:07:26 server kernel[0]: Sandbox: sandboxd(36390) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:11:27 server.sheavernet.private mdworker[36428]: Unable to talk to lsboxd
    Oct 23 09:11:27 server.sheavernet.private mdworker[36426]: Unable to talk to lsboxd
    Oct 23 09:11:27 server.sheavernet.private mdworker[36427]: Unable to talk to lsboxd
    Oct 23 09:11:27 server.sheavernet.private sandboxd[36430] ([36428]): mdworker(36428) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:11:27 server.sheavernet.private sandboxd[36430] ([36426]): mdworker(36426) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:11:27 server.sheavernet.private sandboxd[36430] ([36427]): mdworker(36427) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:11:27 server kernel[0]: Sandbox: sandboxd(36430) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:12:27 server.sheavernet.private com.apple.backupd[36441]: Starting automatic backup
    Oct 23 09:12:27 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/UserEventAgent' [15] for authorization created by '/usr/libexec/UserEventAgent' [15] (100012,0)
    Oct 23 09:12:27 server.sheavernet.private com.apple.backupd[36441]: Backup failed with error: 19
    Oct 23 09:12:27 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/UserEventAgent' [15] for authorization created by '/usr/libexec/UserEventAgent' [15] (100012,0)
    Oct 23 09:12:28 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)
    Oct 23 09:12:28 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)
    Oct 23 09:13:28 server.sheavernet.private mdworker[36449]: Unable to talk to lsboxd
    Oct 23 09:13:28 server.sheavernet.private sandboxd[36451] ([36449]): mdworker(36449) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:13:29 server kernel[0]: Sandbox: sandboxd(36451) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:15:29 server.sheavernet.private mdworker[36466]: Unable to talk to lsboxd
    Oct 23 09:15:29 server.sheavernet.private mdworker[36465]: Unable to talk to lsboxd
    Oct 23 09:15:29 server.sheavernet.private sandboxd[36467] ([36466]): mdworker(36466) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:15:29 server.sheavernet.private sandboxd[36467] ([36465]): mdworker(36465) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:15:29 server kernel[0]: Sandbox: sandboxd(36467) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:19:30 server.sheavernet.private mdworker[36496]: Unable to talk to lsboxd
    Oct 23 09:19:30 server.sheavernet.private mdworker[36495]: Unable to talk to lsboxd
    Oct 23 09:19:30 server.sheavernet.private mdworker[36494]: Unable to talk to lsboxd
    Oct 23 09:19:30 server.sheavernet.private sandboxd[36499] ([36496]): mdworker(36496) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:19:30 server.sheavernet.private sandboxd[36499] ([36495]): mdworker(36495) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:19:30 server.sheavernet.private sandboxd[36499] ([36494]): mdworker(36494) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:19:30 server kernel[0]: Sandbox: sandboxd(36499) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:21:40 server.sheavernet.private mdworker[36524]: Unable to talk to lsboxd
    Oct 23 09:21:40 server.sheavernet.private sandboxd[36526] ([36524]): mdworker(36524) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:21:40 server kernel[0]: Sandbox: sandboxd(36526) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:25:41 server.sheavernet.private mdworker[36554]: Unable to talk to lsboxd
    Oct 23 09:25:41 server.sheavernet.private mdworker[36553]: Unable to talk to lsboxd
    Oct 23 09:25:41 server.sheavernet.private mdworker[36552]: Unable to talk to lsboxd
    Oct 23 09:25:41 server.sheavernet.private sandboxd[36556] ([36554]): mdworker(36554) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:25:41 server.sheavernet.private sandboxd[36556] ([36553]): mdworker(36553) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:25:41 server.sheavernet.private sandboxd[36556] ([36552]): mdworker(36552) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:25:41 server kernel[0]: Sandbox: sandboxd(36556) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:29:41 server.sheavernet.private mdworker[36584]: Unable to talk to lsboxd
    Oct 23 09:29:41 server.sheavernet.private sandboxd[36585] ([36584]): mdworker(36584) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:29:41 server.sheavernet.private mdworker[36586]: Unable to talk to lsboxd
    Oct 23 09:29:41 server.sheavernet.private sandboxd[36585] ([36586]): mdworker(36586) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:29:42 server kernel[0]: Sandbox: sandboxd(36585) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:29:42 server.sheavernet.private mdworker[36587]: Unable to talk to lsboxd
    Oct 23 09:29:42 server.sheavernet.private sandboxd[36585] ([36587]): mdworker(36587) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:31:42 server.sheavernet.private mdworker[36615]: Unable to talk to lsboxd
    Oct 23 09:31:42 server.sheavernet.private sandboxd[36617] ([36615]): mdworker(36615) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:31:43 server kernel[0]: Sandbox: sandboxd(36617) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:33:43 server.sheavernet.private mdworker[36631]: Unable to talk to lsboxd
    Oct 23 09:33:43 server.sheavernet.private mdworker[36632]: Unable to talk to lsboxd
    Oct 23 09:33:43 server.sheavernet.private sandboxd[36633] ([36631]): mdworker(36631) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:33:43 server.sheavernet.private sandboxd[36633] ([36632]): mdworker(36632) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:33:43 server kernel[0]: Sandbox: sandboxd(36633) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:37:44 server.sheavernet.private mdworker[36663]: Unable to talk to lsboxd
    Oct 23 09:37:44 server.sheavernet.private mdworker[36662]: Unable to talk to lsboxd
    Oct 23 09:37:44 server.sheavernet.private mdworker[36661]: Unable to talk to lsboxd
    Oct 23 09:37:44 server.sheavernet.private sandboxd[36665] ([36663]): mdworker(36663) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:37:44 server.sheavernet.private sandboxd[36665] ([36662]): mdworker(36662) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:37:44 server.sheavernet.private sandboxd[36665] ([36661]): mdworker(36661) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:37:44 server kernel[0]: Sandbox: sandboxd(36665) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:38:45 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xe5-192.168.1.3:0!
    Oct 23 09:39:45 server.sheavernet.private mdworker[36681]: Unable to talk to lsboxd
    Oct 23 09:39:45 server.sheavernet.private sandboxd[36683] ([36681]): mdworker(36681) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:39:45 server kernel[0]: Sandbox: sandboxd(36683) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:40:20 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xe6-192.168.1.3:0!
    Oct 23 09:43:45 server.sheavernet.private mdworker[36718]: Unable to talk to lsboxd
    Oct 23 09:43:45 server.sheavernet.private mdworker[36717]: Unable to talk to lsboxd
    Oct 23 09:43:45 server.sheavernet.private mdworker[36719]: Unable to talk to lsboxd
    Oct 23 09:43:45 server.sheavernet.private sandboxd[36721] ([36718]): mdworker(36718) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:43:45 server.sheavernet.private sandboxd[36721] ([36717]): mdworker(36717) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:43:45 server.sheavernet.private sandboxd[36721] ([36719]): mdworker(36719) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:43:46 server kernel[0]: Sandbox: sandboxd(36721) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:47:46 server.sheavernet.private mdworker[36749]: Unable to talk to lsboxd
    Oct 23 09:47:46 server.sheavernet.private mdworker[36751]: Unable to talk to lsboxd
    Oct 23 09:47:46 server.sheavernet.private mdworker[36750]: Unable to talk to lsboxd
    Oct 23 09:47:46 server.sheavernet.private sandboxd[36753] ([36749]): mdworker(36749) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:47:46 server.sheavernet.private sandboxd[36753] ([36751]): mdworker(36751) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:47:46 server.sheavernet.private sandboxd[36753] ([36750]): mdworker(36750) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:47:46 server kernel[0]: Sandbox: sandboxd(36753) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:49:47 server.sheavernet.private mdworker[36770]: Unable to talk to lsboxd
    Oct 23 09:49:47 server.sheavernet.private sandboxd[36772] ([36770]): mdworker(36770) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:49:48 server kernel[0]: Sandbox: sandboxd(36772) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:51:48 server.sheavernet.private mdworker[36795]: Unable to talk to lsboxd
    Oct 23 09:51:48 server.sheavernet.private mdworker[36794]: Unable to talk to lsboxd
    Oct 23 09:51:48 server.sheavernet.private sandboxd[36796] ([36795]): mdworker(36795) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:51:48 server.sheavernet.private sandboxd[36796] ([36794]): mdworker(36794) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:51:48 server kernel[0]: Sandbox: sandboxd(36796) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:55:48 server.sheavernet.private mdworker[36825]: Unable to talk to lsboxd
    Oct 23 09:55:48 server.sheavernet.private mdworker[36823]: Unable to talk to lsboxd
    Oct 23 09:55:48 server.sheavernet.private mdworker[36824]: Unable to talk to lsboxd
    Oct 23 09:55:49 server.sheavernet.private sandboxd[36827] ([36825]): mdworker(36825) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:55:49 server.sheavernet.private sandboxd[36827] ([36823]): mdworker(36823) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:55:49 server.sheavernet.private sandboxd[36827] ([36824]): mdworker(36824) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:55:49 server kernel[0]: Sandbox: sandboxd(36827) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:57:49 server.sheavernet.private mdworker[36843]: Unable to talk to lsboxd
    Oct 23 09:57:49 server.sheavernet.private sandboxd[36845] ([36843]): mdworker(36843) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:57:50 server kernel[0]: Sandbox: sandboxd(36845) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 10:01:50 server.sheavernet.private mdworker[36879]: Unable to talk to lsboxd
    Oct 23 10:01:50 server.sheavernet.private mdworker[36880]: Unable to talk to lsboxd
    Oct 23 10:01:50 server.sheavernet.private mdworker[36881]: Unable to talk to lsboxd
    Oct 23 10:01:50 server.sheavernet.private sandboxd[36883] ([36879]): mdworker(36879) deny mach-lookup com.apple.ls.boxd
    Oct 23 10:01:50 server.sheavernet.private sandboxd[36883] ([36880]): mdworker(36880) deny mach-lookup com.apple.ls.boxd
    Oct 23 10:01:50 server.sheavernet.private sandboxd[36883] ([36881]): mdworker(36881) deny mach-lookup com.apple.ls.boxd
    Oct 23 10:01:50 server kernel[0]: Sandbox: sandboxd(36883) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 10:05:51 server.sheavernet.private mdworker[36911]: Unable to talk to lsboxd
    Oct 23 10:05:51 server.sheavernet.private mdworker[36912]: Unable to talk to lsboxd
    Oct 23 10:05:51 server.sheavernet.private mdworker[36913]: Unable to talk to lsboxd
    Oct 23 10:05:51 server.sheavernet.private sandboxd[36915] ([36911]): mdworker(36911) deny mach-lookup com.apple.ls.boxd
    Oct 23 10:05:51 server.sheavernet.private sandboxd[36915] ([36912]): mdworker(36912) deny mach-lookup com.apple.ls.boxd
    Oct 23 10:05:51 server.sheavernet.private sandboxd[36915] ([36913]): mdworker(36913) deny mach-lookup com.apple.ls.boxd
    Oct 23 10:05:51 server kernel[0]: Sandbox: sandboxd(36915) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 10:07:52 server.sheavernet.private mdworker[36932]: Unable to talk to lsboxd
    Oct 23 10:07:52 server.sheavernet.private sandboxd[36934] ([36932]): mdworker(36932) deny mach-lookup com.apple.ls.boxd
    Oct 23 10:07:52 server kernel[0]: Sandbox: sandboxd(36934) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 10:09:53 server.sheavernet.private mdworker[36948]: Unable to talk to lsboxd
    Oct 23 10:09:53 server.sheavernet.private mdworker[36949]: Unable to talk to lsboxd
    Oct 23 10:09:53 server.sheavernet.private sandboxd[36950] ([36948]): mdworker(36948) deny mach-lookup com.apple.ls.boxd
    Oct 23 10:09:53 server.sheavernet.private sandboxd[36950] ([36949]): mdworker(36949) deny mach-lookup com.apple.ls.boxd
    Oct 23 10:09:53 server kernel[0]: Sandbox: sandboxd(36950) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 10:12:32 server.sheavernet.private WindowServer[16413]: handle_will_sleep_auth_and_shield_windows: no lock state data
    Oct 23 10:12:44 server.sheavernet.private SecurityAgent[16423]: User info context values set for serveradmin
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_authenticate(): Got user: serveradmin
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_authenticate(): Got ruser: (null)
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_authenticate(): Got service: authorization
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in od_principal_for_user(): No authentication authority returned
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in od_principal_for_user(): failed: 7
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_authenticate(): Failed to determine Kerberos principal name.
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_authenticate(): Done cleanup3
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_authenticate(): Kerberos 5 refuses you
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_authenticate(): pam_sm_authenticate: ntlm
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_acct_mgmt(): OpenDirectory - Membership cache TTL set to 1800.
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in od_record_check_pwpolicy(): retval: 0
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in od_record_attribute_create_cfstring(): returned 2 attributes for dsAttrTypeStandard:AuthenticationAuthority
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Establishing credentials
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Got user: serveradmin
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Context initialised
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Got euid, egid: 0 0
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Done getpwnam()
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Done setegid() & seteuid()
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): pam_sm_setcred: krb5 user serveradmin doesn't have a principal
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Done cleanup3
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Done seteuid() & setegid()
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Done cleanup4
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): pam_sm_setcred: ntlm
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): pam_sm_setcred: no domain found skipping
    Oct 23 10:12:44 server.sheavernet.private SecurityAgent[16423]: Login Window login proceeding
    Oct 23 10:12:44 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.login.console' by client '/System/Library/CoreServices/loginwindow.app' [16412] for authorization created by '/System/Library/CoreServices/loginwindow.app' [16412] (100003,0)
    Oct 23 10:12:44 server.sheavernet.private loginwindow[16412]: Login Window - Returned from Security Agent
    Oct 23 10:12:44 server.sheavernet.private loginwindow[16412]: ERROR | ScreensharingLoginNotification | Failed sending message to screen sharing GetScreensharingPort, err: 1102
    Oct 23 10:12:44 server.sheavernet.private loginwindow[16412]: USER_PROCESS: 16412 console
    Oct 23 10:12:44 server.sheavernet.private launchctl[36981]: Could not open job overrides database at: /private/var/db/launchd.db/com.apple.launchd.peruser.503/overrides.plist: 2: No such file or directory
    Oct 23 10:12:44 server.sheavernet.private launchctl[36981]: launchctl: Dubious permissions on file (skipping): /Library/LaunchAgents/com.adobe.AAM.Updater-1.0.plist
    Oct 23 10:12:44 server com.apple.launchd.peruser.503[11657] (com.apple.gamed): Ignored this key: UserName
    Oct 23 10:12:44 server com.apple.launchd.peruser.503[11657] (com.apple.gamed): Ignored this key: GroupName
    Oct 23 10:12:44 server com.apple.launchd.peruser.503[11657] (com.apple.ReportCrash): Falling back to default Mach exception handler. Could not find: com.apple.ReportCrash.Self
    Oct 23 10:12:44 server.sheavernet.private loginwindow[16412]: Connection with distnoted server was invalidated
    Oct 23 10:12:44 server.sheavernet.private launchproxyls[36985]: FAILURE: Failed to open property list at file://localhost/private/var/db/launchd.db/com.apple.launchd.peruser.503/overri des.plist for reading. (The operation couldn\u2019t be completed. No such file or directory)
    Oct 23 10:12:44 --- last message repeated 3 times ---
    Oct 23 10:12:44 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.login.done' by client '/System/Library/CoreServices/loginwindow.app' [16412] for authorization created by '/System/Library/CoreServices/loginwindow.app' [16412] (100002,0)
    Oct 23 10:12:45 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)
    Oct 23 10:12:45 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)
    Oct 23 10:12:45 server.sheavernet.private WindowServer[16413]: **DMPROXY** (2) Found `/System/Library/CoreServices/DMProxy'.
    Oct 23 10:12:45 server.sheavernet.private WindowServer[16413]: Display 0x042801c0: MappedDisplay Unit 0; ColorProfile { 2, "iMac"}; TransferFormula (1.000000, 1.000000, 1.000000)
    Oct 23 10:12:45 server.sheavernet.private blued[60]: kBTXPCUpdateUserPreferences gConsoleUserUID = 503
    Oct 23 10:12:45 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.services.systemconfiguration.network' by client '/usr/libexec/UserEventAgent' [36982] for authorization created by '/usr/libexec/UserEventAgent' [36982] (100000,0)
    Oct 23 10:12:45 --- last message repeated 1 time ---
    Oct 23 10:12:45 server.sheavernet.private UserEventAgent[36982]: cannot find fw daemon port 1102
    Oct 23 10:12:45 server.sheavernet.private coreservicesd[66]: SendFlattenedData, got error #268435460 (ipc/send) timed out from ::mach_msg(), sending notification kLSNotifyApplicationLaunch to notificationID=5591
    Oct 23 10:12:45 server.sheavernet.private UserEventAgent[36982]: FAILURE: Failed to open property list at file://localhost/private/var/db/launchd.db/com.apple.launchd.peruser.503/overri des.plist for reading. (The operation couldn\u2019t be completed. No such file or directory)
    Oct 23 10:12:46 --- last message repeated 1 time ---
    Oct 23 10:12:45 server.sheavernet.private UserEventAgent[36982]: FAILURE: Failed to write property list at file://localhost/private/var/db/launchd.db/com.apple.launchd.peruser.503/overri des.plist. (The operation couldn\u2019t be completed. No such file or directory)
    Oct 23 10:12:45 server.sheavernet.private UserEventAgent[36982]: FAILURE: Could not repair overrides database: 0x2
    Oct 23 10:12:45 server.sheavernet.private UserEventAgent[36982]: FAILURE: Failed to open property list at file://localhost/private/var/db/launchd.db/com.apple.launchd.peruser.503/overri des.plist for reading. (The operation couldn\u2019t be completed. No such file or directory)
    Oct 23 10:12:45 server.sheavernet.private UserEventAgent[36982]: com.apple.TMLaunchAgent disabled
    Oct 23 10:12:45 server.sheavernet.private NetworkBrowserAgent[37002]: Starting NetworkBrowserAgent
    Oct 23 10:12:46 server com.apple.launchd.peruser.503[11657] (com.apple.afpstat-qfa[37020]): Job failed to exec(3). Setting up event to tell us when to try again: 2: No such file or directory
    Oct 23 10:12:46 server com.apple.launchd.peruser.503[11657] (com.apple.afpstat-qfa[37020]): Job failed to exec(3) for weird reason: 2
    Oct 23 10:12:46 server kernel[0]: CODE SIGNING: cs_invalid_page(0x1000): p=37021[GoogleSoftwareUp] clearing CS_VALID
    Oct 23 10:12:46 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)
    Oct 23 10:12:46 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)
    Oct 23 10:12:46 server.sheavernet.private talagent[36991]: _LSSetApplicationInformationItem(kLSDefaultSessionID, asn, _kLSApplicationIsHiddenKey, hidden ? kCFBooleanTrue : kCFBooleanFalse, NULL) produced OSStatus -50 on line 623 in TCApplication.m
    Oct 23 10:12:46 server.sheavernet.private talagent[36991]: _LSSetApplicationInformationItem(kLSDefaultSessionID, asn, TAL_kLSIsProxiedForTALKey, kCFBooleanTrue, NULL) produced OSStatus -50 on line 626 in TCApplication.m
    Oct 23 10:12:46 server com.apple.launchd.peruser.503[11657] (com.apple.mrt.uiagent[37009]): Exited with code: 255
    Oct 23 10:12:47 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)
    Oct 23 10:12:47 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)
    Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KeystoneDaemon logServiceState] GoogleSoftwareUpdate daemon (1.1.0.3659) vending:
                        com.google.Keystone.Daemon.UpdateEngine: 1 connection(s)
                        com.google.Keystone.Daemon.Administration: 0 connection(s)
    Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KeystoneDaemon logServiceState] GoogleSoftwareUpdate daemon (1.1.0.3659) vending:
                        com.google.Keystone.Daemon.UpdateEngine: 1 connection(s)
                        com.google.Keystone.Daemon.Administration: 1 connection(s)
    Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSDaemonAdministration(PrivateMethods) ticketsAllowUninstallWithError:] KSDaemonAdministration system Keystone will not uninstall with active tickets.
    Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KeystoneDaemon logServiceState] GoogleSoftwareUpdate daemon (1.1.0.3659) vending:
                        com.google.Keystone.Daemon.UpdateEngine: 1 connection(s)
                        com.google.Keystone.Daemon.Administration: 0 connection(s)
    Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KeystoneDaemon logServiceState] GoogleSoftwareUpdate daemon (1.1.0.3659) vending:
                        com.google.Keystone.Daemon.UpdateEngine: 2 connection(s)
                        com.google.Keystone.Daemon.Administration: 0 connection(s)
    Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSUpdateEngine updateProductID:] KSUpdateEngine updating product ID: "com.google.Keystone"
    Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSCheckAction performAction] KSCheckAction checking 1 ticket(s).
    Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSUpdateCheckAction performAction] KSUpdateCheckAction starting update check for ticket(s): {(
                        <KSTicket:0x285710
                                  productID=com.google.Keystone
                                  version=1.1.0.3659
                                  xc=<KSPathExistenceChecker:0x285f50 path=/Library/Google/GoogleSoftwareUpdate/GoogleSoftwareUpdate.bundle/>
                                  serverType=Omaha
                                  url=https://tools.google.com/service/update2
                                  creationDate=2012-02-02 00:47:33
                        >
              Using server: <KSOmahaServer:0x2176ef0
                        engine=<KSDaemonUpdateEngine:0x2823e0>
                        params={
                                  EngineVersion = "1.1.0.3659";
                                  ActivesInfo = {
                                            "com.google.Keystone" = {
                                                      LastActivePingDate = 2012-10-21 07:00:01 +0000;
                                                      LastActiveDate = 2012-10-23 14:12:48 +0000;
                                                      LastRollCallPingDate = 2012-10-21 07:00:01 +0000;
                                            "com.google.Chrome" = {
                                                      LastRollCallPingDate = 2012-10-21 07:00:01 +0000;
                                  UserInitiated = 0;
                                  IsSystem = 1;
                                  OmahaOSVersion = "10.8.2_i486";
                                  Identity = KeystoneDaemon;
                                  AllowedSubdomains = (
                                            ".omaha.sandbox.google.com",
                                            ".tools.google.com",
                                            ".www.google.com",
                                            ".corp.google.com"
              >
    Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSUpdateCheckAction performAction] KSUpdateCheckAction running KSServerUpdateRequest: <KSOmahaServerUpdateRequest:0x217f260
                        server=<KSOmahaServer:0x2176ef0>
                        url="https://tools.google.com/service/update2"
                        runningFetchers=0
                        tickets=1
                        activeTickets=1
                        rollCallTickets=1
                        body=
                                  <?xml version="1.0" encoding="UTF-8" standalone="yes"?>
                                  <o:gupdate xmlns:o="http://www.google.com/update2/request" protocol="2.0" version="KeystoneDaemon-1.1.0.3659" ismachine="1">
                                      <o:os platform="mac" version="MacOSX" sp="10.8.2_i486"></o:os>
                                      <o:app appid="com.google.Keystone" version="1.1.0.3659" lang="en-us" installage="264" brand="GGLG">
                                          <o:ping r="2" a="2"></o:ping>
                                          <o:updatecheck></o:updatecheck>
                                      </o:app>
                                  </o:gupdate>
              >
    Oct 23 10:12:51 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSUpdateCheckAction(KSServerUpdateRequestDelegate) serverRequest:fetchedWithResponse:] KSUpdateCheckAction received KSServerUpdateResponse: <KSOmahaServerUpdateResponse:0x2076ef0
                        server=<KSOmahaServer:0x2176ef0>
                        url="https://tools.google.com/service/update2"
                        status=200
                        tickets=1
                        activeTickets=1
                        rollCallTickets=1
                        data=
                                  <?xml version="1.0" encoding="UTF-8" standalone="yes"?>
                                  <gupdate xmlns="

  • Standard way of implementing different timezones.

    Wanted to know the standard way of implementing timezones for an international web application.
    I have the different companies information in a table called company.
    Is it a good idea to store the timeoffset from GMT in the database or create a new table timzone and link this table with the company table.

    The decorator pattern was meant for this =). Look it up; I believe you will find it useful. You can use the decorator pattern with your Weapons.
    Enums do make sense, since the weapon types will be considered constants. Just to let you know, 2D arrays are really only useful for data structures that have a finite 2D shape, such as those found in tictactoe programs. I'd suggest that you look into the topic of data structures sometime.
    I think that a better way to implement the attacking system would be to have the Weapon object do the damage itself -- assign the logic to the object that contains the data necessary to carry out the logic. This way the program is more modular and setter/getter requests, which threaten the maintenance of a program (changes in implementation will ripple throughout), are avoided. (If the player is to carry out the task of doing the attacking, it will have to retrieve information from the weapon. And if all the Weapon objects do is store Weapon-related information, then they're weak objects and it's a clue that you're giving their responsibility to other objects when you shouldn't be.) I would go would this idea.
    Now that I think more about it, your player class could interpret input from the UI (or do stuff based on UI-generated events) and create the appropriate weapon and have the weapon do the damage/attacking itself, as I described above.

  • Taleo Connect Client http request

    Hi guys,
    I'm trying to use Taleo connect client to post http request with the following template:
    POST /way HTTP/1.0
    Host: host
    Content-type: application/x-www-form-urlencoded
    Content-length: request_length
    Accept: */*
    type=type&username=username&password=passwordAccording to user guide: +"Custom HTTP headers are supported through the use of advanced parameters. A parameter having the prefix Header: followed by the name of the header as the name of the parameter can be defined. For example, to define the Content-type the parameter name will be Header:Content-type."+ I have inserted following specification (please read as a table);
    Name Value
    Header: Method POST /way HTTP/1.0
    Header:Host
    Header:Content-type application/x-www-form-urlencoded
    Header: Content-length request_length
    Header: Accept */*
    type=type&username=username&password=password
    Could anyone help me and tell me if it's on the good way or explain me what should i correct?
    Thank you
    N.

    CONNECT command is used when it wants to open another connection. it is similar to secure protocol https. so what i think is you have to open another connection to google and port is 443. but different between connect and GET/POST menthod will send the request header to the server. but connect method will not send any request header but it will transfer some data through that connection. data can be anything like encrypted information, binary file and so on.

  • Is there a way to bind my server to a specific OU within our AD domain?

    Basically, I've discovered that my school has been holding on to accounts of faculty and students that haven't been at the institution for years.  What they do is move the users from an OU called "Active Users" to another OU called "Inactive Users."  Which I'm sure works great within the Windows environment, but when I bind my OS X Server to the domain, I get EVERY user that's in AD (thousands upon thousands), not just the ones from Active Users.  I've been poking around at the Active Directory plug-in and Search Policy settings in Directory Utility, but I haven't been able to figure out how to tell the server to just search within the "Active Users" OU.  I'm hoping that this is a simple request with an answer that I'm just repeatedly over-looking.  Can anyone please assist?

    hello,
    BlackBerry devices do not support ActiveSync.
    you have several ways, from best to less good :
    1)
    if your company has set up Outlook Web Access, you can use the BIS connection of your device to connect to the Exchange server (email + Address book) through the url of the Outlook Web Access. The OWA needs to be accessible from outside the company.
    2)
    if your company has setup an external link to the exchange server (can be accessible from outside the company), you can configure your BIS directly to the Exchange server (email only if I recall correctly)
    3)
    if your company allows it, on your PC you can setup your email account to automatically forward all incoming emails to a third party email (like GMail or Hotmail), and then configure BIS to connect to that email provider. You will get push email. You can then setup a reply-to: field.
    4)
    use a Windows Mobile phone that has the ActiveSync feature.
    The search box on top-right of this page is your true friend, and the public Knowledge Base too:

Maybe you are looking for

  • Report for Under Payments

    Hi, For displaying partial payments and Residual Payments recieved from the customer in AR in a month we want to create a report to display the same. We are not having any different document type for applying the same till now. So please suggest beca

  • Qosmio G30: SPDIF option unavailable in Audio Properties

    Qosmio G30, SigmaTel HD Audio Codec, running XP 2 I'm attempting to route the audio signal thru the built in coaxial out to amp. No signal. When I go to Sounds and Audio Devices>Advanced>Volume control panel /Properties there is no slider /column for

  • Purchase Order Version Management / Amendment Number

    Hi All, Can anyone help with the following...... Everytime we re-print a Purchase order the amendment automatically increases. For audit purposes we have to identify every change to a PO but we do not want to have to document hundred of re-print ever

  • Firefox will not open with the new webroot sofeware

    I installed webroot version 7.0.4.102 Now my firefox will not load, and ones it starts to load it cannot be closed.

  • ORA-01562 in undo_management=AUTO mode

    Hi, Please , is it normal that a database has an ORA-01562 error although it has an undo_management init parameter value equal to AUTO? My database is 10g , I have an an undo_management init parameter value equal to AUTO, but when I try to do an inse