Os x 10.7 lion server - opendirectory RealName attribute

creating users in opendirectory via commandline. those users' real names do not show up properly in Server.app or WorgroupManager.app - only the first component is displayed.
i have found that the RealName attribute is stored with a prepended LF character when the attribute is set via one of those gui apps, but stored without the LF character when set via commandline. this is the only difference i have been able to find. i have been unable to reproduce the prepended LF from the commandline. suggestions?
and yes, commandline usage is required in my case. firing up the gui and setting each user's RealName attribute is an extra step that should not be necessary.

just reposted to the lion server forum; couldn't figure out how to move this one.
https://discussions.apple.com/message/17359701#17359701

Similar Messages

  • Lion Server - OpenDirectory migration woes

    Hi,
    We had a solid Snow Leopard Server but we needed to upgrade to Lion Server.  We waited for 10.7.3 and went for it as per the Apple upgrade guide.  O....M....G.  What a mess.
    OpenDirectory was trashed and pretty much discarded by Lion and any attempt to restore from a backup taken before the upgrade failed miserably.  Tech support from Apple was woefully inadequate.  The priceless "Yes, we have had a few reports of that problem" didn't fix the fault and neither did the "It will be easier for you to restore from a time machine backup but that doesn't back everything up".  So that was a waste of an hour.
    Fortunately, we had a Snow Leopard Server running a replica of the directory and I promoted that to master which allowed users to log in.  I've also imported the users into Lion's directory but that only seems to create a link to the OD master on the SLS server.
    Has anyone else come across this problem and how did you get around it?  Doing an archive of the SLS OD Master and then restoring that on the Lion OD Master doesn't seem to work at all.
    Very reluctant to upgrade the SLS OD Master now following the pain that has ensued from the last upgrade.
    Any input very much appreciated.
    Thanks,
    Stu

    Solved my own question here.
    THE only way around this was to Export users via WM from the SLS OD Master and then Import users via WM into the LS OD Master.  This process lost all user passwords so all accounts needed a password adding through WM and then all users were forced to do a password reset through the Default Website "Change Password" link or by forcing them to change their password on next logon in WM.
    All sorted here, though.  Not ideal and a lot of pain for the user base but all working fine now.
    Stu

  • How do you change the volume used for group folders in Lion Server?

    So I'm slowly acclimating to Lion Server, however, I'm not able to determine how to specify the parent folder for Groups.  By default it's the /Groups root directory on the boot volume however I'm trying to change it to an alternate drive on a separate volume.  I've tried removing the sharepoint from the 'Server' admin utility and adding the alternate Group folder (on a separate volume) but to no avail.
    Has anyone else worked with this?

    Hey,
    Open Workgroup Manager app, from the ServerAdminTools, (link) enter your domain name for your server (FQDN), enter your OpenDirectory administrator user and password, go to Groups > Groups Folder.
    Hope this helps.

  • Mountain Lion Server PHP Upgrade issue

    I need to upgrade my Server PHP, since my web site needs PHP 5.4 or above to work.
    I have followed the steps from previous discussion
    Updated PHP to 5.4 following steps from here
    Updated bash_profile, httpd.conf, and updated $PATH variables.
    In terminal php version and php path points to correct version /usr/local/php5/
    But phpinfo still points to php 5.3.
    I was able make the update on my local machine running Mountain Lion. The issue occurs only on the Mountain Lion Server.
    It there any other settings that needs to be done to udpate PHP path?

    Thanks for the input. Did you have any issues with running MAMP on server? I was under the impression Server tools, (web, ftp, opendirectory, etc..) are tightly integrated to one another.
    Installing MAMP on a server might be the next option. Did you remove Lion server completely or just the web server part?
    I did test out MAMP on server. It seem to have some database issues and give a blank page when it has to connect with Database. Probably have to work on the db issues, if PHP update is impossible.

  • Mail Server problems with Mountain Lion Server

    Well, I don't see a section here for Mountain Lion yet so I'll ask here. I installed Mountain Lion Server and for the most part everything is working well. I am have issues with the Mail Server though. As long as I dissable everthing but the Blacklist filter all works fine. If I enable Junk Mail or Virus filters I get this:
    postfix/smtp[52062]: connect to 127.0.0.1[127.0.0.1]:10024: Connection refused
    From doing some serching it seems to have something to do with amavisd but I don't think it is installed on my system. If it is I can't seem to find it. Should it be installed with the Server Software?
    I'm really lost here so any help would be great.
    Thanks,
    Tom  

    I'm sorry i did it wrong (but I think it's this editor that makes the spaces, because before I update this text, there is no space); here the new one
    server:~ delsup$ sudo launchctl load -w /Applications/Server.app/Contents/ServerRoot/System/Library/LaunchDaemons/org.a mavis.amavisd.plist
    launchctl: Dubious ownership on file (skipping): /Applications/Server.app/Contents/ServerRoot/System/Library/LaunchDaemons/org.a mavis.amavisd.plist
    nothing found to load
    server:~ delsup$ sudo more /var/log/amavis.log
    /var/log/amavis.log: No such file or directory
    server:~ delsup$
    and system.log:
    Sep  5 17:49:37 server.delsup.org System Preferences[832]: *** WARNING: -[NSImage compositeToPoint:operation:] is deprecated in MacOSX 10.8 and later. Please use -[NSImage drawAtPoint:fromRect:operation:fraction:] instead.
    Sep  5 17:49:37 server.delsup.org System Preferences[832]: *** WARNING: -[NSImage compositeToPoint:fromRect:operation:] is deprecated in MacOSX 10.8 and later. Please use -[NSImage drawAtPoint:fromRect:operation:fraction:] instead.
    Sep  5 17:49:37 server.delsup.org System Preferences[832]: *** WARNING: -[NSImage compositeToPoint:operation:fraction:] is deprecated in MacOSX 10.8 and later. Please use -[NSImage drawAtPoint:fromRect:operation:fraction:] instead.
    Sep  5 17:49:37 server.delsup.org System Preferences[832]: *** WARNING: -[NSImage compositeToPoint:fromRect:operation:fraction:] is deprecated in MacOSX 10.8 and later. Please use -[NSImage drawAtPoint:fromRect:operation:fraction:] instead.
    Sep  5 17:49:37 server.delsup.org com.apple.SecurityServer[19]: Succeeded authorizing right 'system.preferences' by client '/System/Library/PrivateFrameworks/Admin.framework/Versions/A/Resources/writeco nfig' [838] for authorization created by '/Applications/System Preferences.app' [832] (100002,0)
    Sep  5 17:49:43 server.delsup.org com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] (2,0)
    Sep  5 17:49:43 server.delsup.org com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [67] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] (100000,0)
    Sep  5 17:49:46 server.delsup.org com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] (2,0)
    Sep  5 17:49:46 server.delsup.org com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [67] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] (100000,0)
    Sep  5 17:51:34 server.delsup.org WindowServer[99]: Received display connect changed for display 0x1c80e590
    Sep  5 17:51:34 server.delsup.org WindowServer[99]: No display devices are on-line. Switching to virtual display mode
    Sep  5 17:51:34 server.delsup.org WindowServer[99]: Received display connect changed for display 0x3f003d
    Sep  5 17:51:34 server.delsup.org WindowServer[99]: Received display connect changed for display 0x3f003e
    Sep  5 17:51:35 server.delsup.org WindowServer[99]: Display 0x41dc9d02: GL mask 0x4; bounds (0, 0)[1 x 1], 2 modes available
            off-line, enabled, built-in, Vendor 756e6b6e, Model 76697274, S/N 0, Unit 2, Rotation 0
            UUID 0xffffffffffffffffffffffff003f003e
    Sep  5 17:51:35 server.delsup.org WindowServer[99]: Display 0x41dc9d01: GL mask 0x2; bounds (2304, 0)[1 x 1], 2 modes available
            off-line, enabled, built-in, Vendor 756e6b6e, Model 76697274, S/N 0, Unit 1, Rotation 0
            UUID 0xffffffffffffffffffffffff003f003d
    Sep  5 17:51:35 server.delsup.org WindowServer[99]: Display 0x41dc9d00: GL mask 0x1; bounds (0, 0)[1920 x 1080], 11 modes available
            Main, Active, on-line, enabled, built-in, Vendor 756e6b6e, Model 76697274, S/N 0, Unit 0, Rotation 0
            UUID 0x00000472000000be0390ca1100000000
    Sep  5 17:51:35 server.delsup.org WindowServer[99]: Created shield window 0x73 for display 0x41dc9d02
    Sep  5 17:51:35 server.delsup.org WindowServer[99]: Created shield window 0x74 for display 0x41dc9d01
    Sep  5 17:51:35 server.delsup.org WindowServer[99]: Created shield window 0x75 for display 0x41dc9d00
    Sep  5 17:51:35 server.delsup.org WindowServer[99]: Display added
    Sep  5 17:51:35 server.delsup.org WindowServer[99]: Display removed
    Sep  5 17:51:35 server.delsup.org WindowServer[99]: Display 0x41dc9d00: GL mask 0x1; bounds (0, 0)[1920 x 1080], 11 modes available
            Main, Active, on-line, enabled, built-in, Vendor 756e6b6e, Model 76697274, S/N 0, Unit 0, Rotation 0
            UUID 0x00000472000000be0390ca1100000000
    Sep  5 17:51:35 server.delsup.org WindowServer[99]: Display 0x41dc9d02: GL mask 0x4; bounds (2944, 0)[1 x 1], 2 modes available
            off-line, enabled, built-in, Vendor 756e6b6e, Model 76697274, S/N 0, Unit 2, Rotation 0
            UUID 0xffffffffffffffffffffffff003f003e
    Sep  5 17:51:35 server.delsup.org WindowServer[99]: Display 0x41dc9d01: GL mask 0x2; bounds (2945, 0)[1 x 1], 2 modes available
            off-line, enabled, built-in, Vendor 756e6b6e, Model 76697274, S/N 0, Unit 1, Rotation 0
            UUID 0xffffffffffffffffffffffff003f003d
    Sep  5 17:51:37 server.delsup.org WindowServer[99]: **DMPROXY** (2) Found `/System/Library/CoreServices/DMProxy'.
    Sep  5 17:51:37 server.delsup.org WindowServer[99]: Created shield window 0x7d for display 0x41dc9d00
    Sep  5 17:51:37 server.delsup.org WindowServer[99]: Display 0x41dc9d00: VirtualDisplay Unit 0; ColorProfile { 1, "Default(sRGB IEC61966-2.1)"}; TransferFormula (1.000000, 1.000000, 1.000000)
    Sep  5 17:51:37 --- last message repeated 1 time ---
    Sep  5 17:51:37 server.delsup.org com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] (2,0)
    Sep  5 17:51:37 server.delsup.org com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [67] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] (100000,0)
    Sep  5 17:56:27 server.delsup.org postfix/smtpd[870]: error: get user record: unable to open user record for user=diradmin
    Sep  5 17:56:27 server.delsup.org postfix/smtpd[870]: error: validate response: unable to lookup user record for: diradmin
    Sep  5 17:56:27 server.delsup.org postfix/smtpd[870]: warning: unknown[192.168.19.50]: SASL CRAM-MD5 authentication failed
    Sep  5 18:01:24 server.delsup.org postfix/qmgr[112]: warning: connect to transport private/smtp-amavis: Connection refused
    Sep  5 18:06:26 server.delsup.org postfix/smtpd[926]: error: get user record: unable to open user record for user=diradmin
    Sep  5 18:06:26 server.delsup.org postfix/smtpd[926]: error: validate response: unable to lookup user record for: diradmin
    Sep  5 18:06:26 server.delsup.org postfix/smtpd[926]: warning: unknown[192.168.19.50]: SASL CRAM-MD5 authentication failed
    Sep  5 18:16:26 server.delsup.org postfix/smtpd[975]: error: get user record: unable to open user record for user=diradmin
    Sep  5 18:16:26 server.delsup.org postfix/smtpd[975]: error: validate response: unable to lookup user record for: diradmin
    Sep  5 18:16:26 server.delsup.org postfix/smtpd[975]: warning: unknown[192.168.19.50]: SASL CRAM-MD5 authentication failed
    Sep  5 18:26:27 server.delsup.org postfix/smtpd[1027]: error: get user record: unable to open user record for user=diradmin
    Sep  5 18:26:27 server.delsup.org postfix/smtpd[1027]: error: validate response: unable to lookup user record for: diradmin
    Sep  5 18:26:27 server.delsup.org postfix/smtpd[1027]: warning: unknown[192.168.19.50]: SASL CRAM-MD5 authentication failed
    Sep  5 18:30:37 server.delsup.org com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] (2,0)
    Sep  5 18:30:37 server.delsup.org com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [67] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] (100000,0)
    Sep  5 18:36:27 server.delsup.org postfix/smtpd[1085]: error: get user record: unable to open user record for user=diradmin
    Sep  5 18:36:27 server.delsup.org postfix/smtpd[1085]: error: validate response: unable to lookup user record for: diradmin
    Sep  5 18:36:27 server.delsup.org postfix/smtpd[1085]: warning: unknown[192.168.19.50]: SASL CRAM-MD5 authentication failed
    Sep  5 18:39:41 server.delsup.org screensharingd[1106]: Authentication: SUCCEEDED :: User Name: Sara Delsupehe :: Viewer Address: 192.168.19.50 :: Type: DH
    Sep  5 18:40:48 server.delsup.org login[1115]: in pam_sm_acct_mgmt(): OpenDirectory - Membership cache TTL set to 1800.
    Sep  5 18:40:48 server.delsup.org login[1115]: in od_record_check_pwpolicy(): retval: 0
    Sep  5 18:40:48 server.delsup.org login[1115]: in od_record_attribute_create_cfstring(): returned 2 attributes for dsAttrTypeStandard:AuthenticationAuthority
    Sep  5 18:40:48 server.delsup.org login[1115]: USER_PROCESS: 1115 ttys000
    Sep  5 18:41:27 server.delsup.org mail_groups[1128]: sleeping for: 1 hour(s)
    Sep  5 18:41:35 server.delsup.org com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] (2,0)
    Sep  5 18:41:35 server.delsup.org com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [67] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] (100000,0)
    Sep  5 18:41:35 server.delsup.org servermgrd[410]: -[AccountsRequestHandler(AccountsSystemConfigurationObservation) registerForKeychainEventNotifications]: SecKeychainAddCallback() status: -25297
    Sep  5 18:41:41 server.delsup.org sudo[1131]:   delsup : TTY=ttys000 ; PWD=/Users/delsup ; USER=root ; COMMAND=/bin/launchctl load -w /Applications/Server.app/Contents/ServerRoot/System/Library/LaunchDaemons/org.a mavis.amavisd.plist
    Sep  5 18:41:42 server.delsup.org com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] (2,0)
    Sep  5 18:41:42 server.delsup.org com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [67] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] (100000,0)
    Sep  5 18:46:24 server.delsup.org postfix/qmgr[112]: warning: connect to transport private/smtp-amavis: Connection refused
    Sep  5 18:46:26 server.delsup.org postfix/smtpd[1152]: error: get user record: unable to open user record for user=diradmin
    Sep  5 18:46:26 server.delsup.org postfix/smtpd[1152]: error: validate response: unable to lookup user record for: diradmin
    Sep  5 18:46:26 server.delsup.org postfix/smtpd[1152]: warning: unknown[192.168.19.50]: SASL CRAM-MD5 authentication failed
    Sep  5 18:48:32 server.delsup.org sudo[1171]:   delsup : TTY=ttys000 ; PWD=/Users/delsup ; USER=root ; COMMAND=/usr/bin/more /var/log/amavis.log
    Sep  5 18:48:32 server.delsup.org com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] (2,0)
    Sep  5 18:48:32 server.delsup.org com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [67] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] (100000,0)
    Sep  5 18:48:54 server.delsup.org sudo[1174]:   delsup : TTY=ttys000 ; PWD=/Users/delsup ; USER=root ; COMMAND=/usr/bin/more /var/log/system.log
    Sep  5 18:48:55 server.delsup.org com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] (2,0)
    Sep  5 18:48:55 server.delsup.org com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [67] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] (100000,0)
    Sep  5 18:56:24 server.delsup.org postfix/qmgr[112]: warning: connect to transport private/smtp-amavis: Connection refused
    Sep  5 18:56:26 server.delsup.org postfix/smtpd[1211]: error: get user record: unable to open user record for user=diradmin
    Sep  5 18:56:26 server.delsup.org postfix/smtpd[1211]: error: validate response: unable to lookup user record for: diradmin
    Sep  5 18:56:26 server.delsup.org postfix/smtpd[1211]: warning: unknown[192.168.19.50]: SASL CRAM-MD5 authentication failed
    Sep  5 18:57:53 server.delsup.org sudo[1225]:   delsup : TTY=ttys000 ; PWD=/Users/delsup ; USER=root ; COMMAND=/bin/launchctl load -w /Applications/Server.app/Contents/ServerRoot/System/Library/LaunchDaemons/org.a mavis.amavisd.plist
    Sep  5 18:57:54 server.delsup.org com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] (2,0)
    Sep  5 18:57:54 server.delsup.org com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [67] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] (100000,0)
    Sep  5 19:00:28 server.delsup.org sudo[1235]:   delsup : TTY=ttys000 ; PWD=/Users/delsup ; USER=root ; COMMAND=/bin/launchctl load -w /Applications/Server.app/Contents/ServerRoot/System/Library/LaunchDaemons/org.a mavis.amavisd.plist
    Sep  5 19:00:28 server.delsup.org com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] (2,0)
    Sep  5 19:00:28 server.delsup.org com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [67] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] (100000,0)
    Sep  5 19:00:48 server.delsup.org sudo[1237]:   delsup : TTY=ttys000 ; PWD=/Users/delsup ; USER=root ; COMMAND=/usr/bin/more /var/log/amavis.log
    Sep  5 19:00:49 server.delsup.org com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] (2,0)
    Sep  5 19:00:49 server.delsup.org com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [67] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] (100000,0)
    Sep  5 19:01:59 server.delsup.org sudo[1248]:   delsup : TTY=ttys000 ; PWD=/Users/delsup ; USER=root ; COMMAND=/usr/bin/more /var/log/system.log
    Sep  5 19:01:59 server.delsup.org com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] (2,0)
    Sep  5 19:01:59 server.delsup.org com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [67] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [115] (100000,0)
    server:~ delsup$  

  • Apple iMac (colorfull old ones) w. OS X 10.4.11 and OS X 10.7.2 Lion Server

    Dear all,
    our Apple Network consists of one Apple Lion 10.7.2 Server based on an Xserve Xeon Server, some very New iMacs running Lion, some eMacs running MacOS 10.5.8 and 10.4.11 and some old iMacs running 10.4.11. We're using OpenDirectory, Filesharing, AFP, DHCP, DNS as Network Services.
    Now since we've upgraded from Leopard Server to Lion server we've got the Problem that our old iMacs running 10.4.11 somehow aren't abled to authenticated against OpenDirectory any more... So if a user tries to Login at the Login screen against the server and he can't login (at the old iMac running 10.4.11). At the eMac side also 10.4.11 everything works fine. Regarding the system.log of the old iMac it says at some point "Input / Output Error".
    Even a fresh 10.4.11 Installation on the old iMac didn't solve the problem.
    Any suggestions what to do and how to fix that problem ?
    Thanks,
    Markus

    First, see if your Mac is compatible with Mountain Lion > http://www.apple.com/osx/specs
    If it's compatible, first you have to upgrade to Snow Leopard, so buy Snow Leopard > http://store.apple.com/us/product/MC573/mac-os-x-106-snow-leopard That's because OS X Mountain Lion requires Mac OS X Snow Leopard or Lion.
    Then, make a backup of your files, insert the Snow Leopard DVD and upgrade to Snow Leopard. After upgrading, go to  > Software Update to update to Mac OS X 10.6.8.
    This update will install the App Store on your Mac, so open it and purchase OS X Mountain Lion. While Mountain Lion is downloading, check if your applications are supported > http://www.roaringapps.com
    When the download finishes, the Mountain Lion installer will show up, so follow the steps to upgrade OS X

  • Where is Lion Server's .ServerBackup Equivalent?

    On a Snow Leopard Server with Time Machine configured, servermgrd would run a TimeMachinePreBackupHook as well as a TimeMachinePostBackupHook which involved creating a backup of key things like the Directory, and more, e.g.:
    bash-3.2# ls -la /Volumes/Time\ Machine\ Backups/Backups.backupdb/Server/Latest/Server\ HD/.ServerBackups/
    total 16
    drwxr-xr-x@  2 root  admin    68 Aug 19 11:01 (null)
    drwxr-xr-x@ 12 root  admin   476 Aug 19 11:01 .
    drwxr-xr-t@ 19 root  admin   952 Aug 19 10:58 ..
    -rw-r--r--@  1 root  admin    37 Aug 19 11:01 .serverBackupSignature
    drwxr-xr-x@  2 root  admin    68 Aug 19 11:01 addressBookServer
    drwxr-xr-x@  2 root  admin    68 Aug 19 11:01 calendarServer
    drwxr-xr-x@  2 root  admin   170 Aug 19 11:01 iChatServer
    drwxr-xr-x@  5 root  admin   204 Aug 19 11:01 mailServer
    -rw-r--r--@  1 root  admin  3282 Aug 19 11:01 master.browse.plist
    drwxr-xr-x@  2 root  admin   136 Aug 19 10:58 openDirectory
    drwxr-xr-x@  2 root  admin  2074 Aug 19 10:59 serverSettings
    drwxr-xr-x@  2 root  admin   170 Aug 19 10:59 sharePoints
    drwxr-xr-x@  3 root  admin   272 Aug 19 11:01 webServer
    drwxr-xr-x@  2 root  admin    68 Aug 19 11:01 wikiServer
    This isn't happening with Lion Server, or at least not in that location. Does anyone have any insight as to whether this process or concept has been maintained, and what its particulars are?

    It appears the Server does not create this is you have Time Machine set to exclude System files. Once I removed that exclusion, this directory is now present in my backups.

  • Lion Server does not support Windows 7 clients?

    I have several clients who have Windows 7 workstations and Mac OS Lion servers. They cannot connect to their shares using any of the server accounts. I just installed Lion clean, bought Lion server and cannot connect to the shares from Windows 7 (Pro 64bit). I can connect from Windows XP Pro workstation. This is a major problem. I have read of some ways of changing the security settings in the bowels of Windows 7 to allow it connect (it is noted that these also say it will not work on Windows Home) but so far none of these methods have for me or my fellow techs. Not to mention that if to connect a Windows 7 client to a Mac we have to get in a muck with the registry every time - even if this were successful - it is a terrible way to support Windows.

    This has been madness. So many alchemist fixes around Google for what seems to be a common problem: edit the registry, alter security settings, configure OpenDirectory, kiss a frog. What happened to the idea of sharing a folder on the LAN and getting back to work?
    How do I confirm the string that serves as my Lion Server's FQDN?
    On a (perhaps) related matter, I am confused because in my PC's "Network" list I see my Lion server as "MACMINI-0302EC" which seems like a generic machine name plus partial MAC address, but I've given the server a customized name in the server's System Preferences... 

  • Share NAS directories on LION Server

    I want to share directories on a Synology NAS via LION Server.
    Currently I have LION setup as Opendirectory server, Synology as LDAP client.
    Synology is connected to LDAP server on Lion, I can see the LDAP users in the Synology LDAP user base, however I can't seem to be able to setup shares residing on the NAS via the server.
    I am sharing a sharepont on synology, can mount it in finder of the server, but then I am unable to publish the mount as a shared directory in either server.app or in system settings for sharing.
    any thoughts?
    best
    -Harald

    Hi Jonathan,
    probably my descripotion is not accurate should, I want to manage the network shares via the server (WGM).
    in principle its like this:
    OD user logs in, gets his network home folder (on NAS) that synchronizes with the local home folder (all this managed and configured via mobility in WGM).
    OD user also gets access to group shares on the NAS, also managed via WGM.
    The storage of data should occur on the NAS.
    I am starting to think that iSCSI may be th eway to go for simplicity.
    best
    -H

  • Lion Server, Windows clients, execute rights?

    I am looking to support client machines running Windows on Parallels on Lion, with a Mac Mini server to store all files. Everything is dandy but for my Installs folder. To install software on Windows you have to have execute rights, and Unix (rightly ) doesn't exose this by default. So I am wondering what best practice is.
    Do people apply an ACL to the Installs folder and sub folders? Do Posix rights on a file by file bases? Punt and run a VM with Windows 7 on the Server to act as a file share?
    Thanks for any insight or suggestions.
    Gordon

    This has been madness. So many alchemist fixes around Google for what seems to be a common problem: edit the registry, alter security settings, configure OpenDirectory, kiss a frog. What happened to the idea of sharing a folder on the LAN and getting back to work?
    How do I confirm the string that serves as my Lion Server's FQDN?
    On a (perhaps) related matter, I am confused because in my PC's "Network" list I see my Lion server as "MACMINI-0302EC" which seems like a generic machine name plus partial MAC address, but I've given the server a customized name in the server's System Preferences... 

  • Addressbook on lion server 10.7.2

    Hi all. I'm trying to configure the addressbook service on a Lion Server 10.7.2. After checking the "Include directory contacts in search" I checked the installation looking at the link http://server:8800. It sends me to https://server:8443. I click on principals and it's ok, click on users and I get Forbidden, you don't have permission to access /principals/users. My server is an open directory master, and the addressbook service has been configured according to the advanced server admin guide, i.e.
    serveradmin settings addressbook:EnableSearchAddressBook = "true",
    serveradmin settings addressbook:DirectoryAddressBook:params:queryUserRecords = "false"
    serveradmin settings addressbook:DirectoryAddressBook:params:queryPeopleRecords = "false"
    changed the hostname via
    serveradmin settings addressbook:ServerHostName = "server fqdn"
    disabled digest and kerberos authentication, enabled basic
    Still getting Forbidden. Any suggestion? Of course I'm missing something, but I don't know what
    Thanks
    Luca

    adding some more info
    addressbook:MaxResourceSize = 1048576
    addressbook:WebCalendarAuthPath = "/auth"
    addressbook:DirectoryService:params:cacheTimeout = 1
    addressbook:DirectoryService:params:node = "/Search"
    addressbook:DirectoryService:type = "twistedcaldav.directory.appleopendirectory.OpenDirectoryService"
    addressbook:Aliases = _empty_dictionary
    addressbook:BindSSLPorts:_array_index:0 = 8443
    addressbook:BindSSLPorts:_array_index:1 = 8843
    addressbook:EnablePrincipalListings = no
    addressbook:EnableDropBox = yes
    addressbook:DocumentRoot = "/Library/Server/Calendar and Contacts"
    addressbook:ConfigRoot = "/etc/caldavd"
    addressbook:SSLPrivateKey = "/etc/certificates/xxxxxx.yyyyy.zz.6D05A46B5ADC7D7297AC96E17FC6D6591C844C6B.key .pem"
    addressbook:FreeBusyURL:AnonymousAccess = no
    addressbook:FreeBusyURL:Enabled = yes
    addressbook:FreeBusyURL:TimePeriod = 14
    addressbook:ProcessType = "Combined"
    addressbook:GlobalStatsSocket = "caldavd-stats.sock"
    addressbook:UserName = "calendar"
    addressbook:MaxInstancesForRRULE = 400
    addressbook:Sharing:Enabled = yes
    addressbook:BindHTTPPorts:_array_index:0 = 8008
    addressbook:BindHTTPPorts:_array_index:1 = 8800
    addressbook:EnableAnonymousReadRoot = no
    addressbook:GroupName = "calendar"
    addressbook:SSLAuthorityChain = "/etc/certificates/xxxxxx.yyyyy.zz.6D05A46B5ADC7D7297AC96E17FC6D6591C844C6B.cha in.pem"
    addressbook:DSN = ":caldav:caldav:::"
    addressbook:HTTPPort = 8008
    addressbook:PIDFile = "caldavd.pid"
    addressbook:ServerRoot = "/Library/Server/Calendar and Contacts"
    addressbook:EnableTimezoneService = yes
    addressbook:UserQuota = 104857600
    addressbook:EnableWebAdmin = yes
    addressbook:EnableCalDAV = yes
    addressbook:MaxCollectionsPerHome = 50
    addressbook:MultiProcess:ProcessCount = 0
    addressbook:EnableProxyPrincipals = yes
    addressbook:Authentication:Digest:Algorithm = "md5"
    addressbook:Authentication:Digest:Enabled = no
    addressbook:Authentication:Digest:Qop = ""
    addressbook:Authentication:Kerberos:ServicePrincipal = "xxxxxx.yyyyy.zz"
    addressbook:Authentication:Kerberos:Enabled = no
    addressbook:Authentication:Wiki:UseSSL = no
    addressbook:Authentication:Wiki:Enabled = yes
    addressbook:Authentication:Wiki:Hostname = "127.0.0.1"
    addressbook:Authentication:Basic:Enabled = yes
    addressbook:ErrorLogFile = "error.log"
    addressbook:EnableMonolithicCalendars = yes
    addressbook:DefaultLogLevel = "info"
    addressbook:MaxAttendeesPerInstance = 100
    addressbook:SSLCertificate = "/etc/certificates/xxxxxx.yyyyy.zz.6D05A46B5ADC7D7297AC96E17FC6D6591C844C6B.cer t.pem"
    addressbook:ReadPrincipals = _empty_array
    addressbook:EnableSACLs = yes
    addressbook:RunRoot = "/var/run/caldavd"
    addressbook:DBType = "postgres"
    addressbook:Notifications:CoalesceSeconds = 3
    addressbook:Notifications:Services:XMPPNotifier:CalDAV:SubscriptionURL = ""
    addressbook:Notifications:Services:XMPPNotifier:CalDAV:APSBundleID = ""
    addressbook:Notifications:Services:XMPPNotifier:Host = "xxxxxx.yyyyy.zz"
    addressbook:Notifications:Services:XMPPNotifier:CardDAV:SubscriptionURL = ""
    addressbook:Notifications:Services:XMPPNotifier:CardDAV:APSBundleID = ""
    addressbook:Notifications:Services:XMPPNotifier:JID = "[email protected]"
    addressbook:Notifications:Services:XMPPNotifier:Enabled = yes
    addressbook:Notifications:Services:XMPPNotifier:Service = "twistedcaldav.notify.XMPPNotifierService"
    addressbook:Notifications:Services:XMPPNotifier:Password = "exActPcl7Hvq1yOB"
    addressbook:Notifications:Services:XMPPNotifier:Port = 5220
    addressbook:Notifications:Services:XMPPNotifier:ServiceAddress = "pubsub.xxxxxx.yyyyy.zz"
    addressbook:EnableAnonymousReadNav = no
    addressbook:ServerHostName = "xxxxxx.yyyyy.zz"
    addressbook:DataRoot = "Data"
    addressbook:EnablePrivateEvents = yes
    addressbook:BindAddresses = _empty_array
    addressbook:AdminPrincipals = _empty_array
    addressbook:RedirectHTTPToHTTPS = yes
    addressbook:EnableSearchAddressBook = yes
    addressbook:EnableCardDAV = yes
    addressbook:DirectoryAddressBook:params:queryPeopleRecords = yes
    addressbook:DirectoryAddressBook:params:queryUserRecords = yes
    addressbook:DirectoryAddressBook:Enabled = yes
    addressbook:LogRoot = "/var/log/caldavd"
    addressbook:SSLPort = 8443
    addressbook:MaxResourcesPerCollection = 10000
    addressbook:AccessLogFile = "access.log"
    addressbook:RotateAccessLog = yes
    addressbook:OpenDirectoryModule = "calendarserver.platform.darwin.od.opendirectory"
    addressbook:EnableSSL = yes
    addressbook:Scheduling:CalDAV:EmailDomain = ""
    addressbook:Scheduling:CalDAV:HTTPDomain = ""
    addressbook:Scheduling:CalDAV:AddressPatterns = _empty_array
    addressbook:Scheduling:iMIP:Sending:Server = "localhost"
    addressbook:Scheduling:iMIP:Sending:UseSSL = yes
    addressbook:Scheduling:iMIP:Sending:Username = "com.apple.calendarserver"
    addressbook:Scheduling:iMIP:Sending:Address = "[email protected]"
    addressbook:Scheduling:iMIP:Sending:Password = "zhjgelh4dnzLNdrw"
    addressbook:Scheduling:iMIP:Sending:Port = 587
    addressbook:Scheduling:iMIP:Enabled = yes
    addressbook:Scheduling:iMIP:MailGatewayPort = 62310
    addressbook:Scheduling:iMIP:Receiving:Server = "localhost"
    addressbook:Scheduling:iMIP:Receiving:UseSSL = yes
    addressbook:Scheduling:iMIP:Receiving:Username = "com.apple.calendarserver"
    addressbook:Scheduling:iMIP:Receiving:PollingSeconds = 30
    addressbook:Scheduling:iMIP:Receiving:Type = "imap"
    addressbook:Scheduling:iMIP:Receiving:Password = "zhjgelh4dnzLNdrw"
    addressbook:Scheduling:iMIP:Receiving:Port = 993
    addressbook:Scheduling:iMIP:AddressPatterns:_array_index:0 = "mailto:.*"
    addressbook:Scheduling:iMIP:MailGatewayServer = "localhost"
    addressbook:Scheduling:iSchedule:Enabled = no
    addressbook:Scheduling:iSchedule:Servers = "servertoserver.xml"
    addressbook:Scheduling:iSchedule:AddressPatterns = _empty_array

  • Lion server corrupted sudo: 3 incorrect password attempts

    A couple of weeks ago I noticed that I was having a problem with sudo on my Lion Server, I went back as far as I could in Time Capsule and restored the entire OS, but the problem seems to have been there since the original install a few months ago. Sudo works fine on my MacBook Pro with Lion 10.7.4 Client.
    I have been using sudo for years, and I've never had this happen.'
    $ sudo echo
    Password:
    Sorry, try again.
    Password:
    Sorry, try again.
    Password:
    Sorry, try again.
    sudo: 3 incorrect password attempts
    ( 0 ) I can log out as system admin, and log in as root with no problems, but sudo at the Terminal always fails
    ( 1 ) I have turned off access to root, restarted, turned it back on umpteen times
    ( 2 ) downloaded an re-installed Lion Server Combo 10.7.4
    ( 3 ) ran Norton Anti Virus, found no problems
    ( 4 ) looked at /etc/sudoers using visudo and it looks normal
    ( 5 ) I am the sys-admin for the server and $id shows that I am in the admin group
    ( 7 ) Server.app -> Menubar -> Tools -> Directory Utility -> Edit -> Disable Root User
    ( 8 ) Re-Boot
    ( 9 ) Server.app -> Menubar -> Tools -> Directory Utility -> Edit -> Enable Root User
    ( 10 ) Server.app -> Menubar -> Tools -> Directory Utility -> Select my shortname on the left scrolling area, delete Authentication Authority from right side display of my record, then save, quit, and re-boot.
    ( 11 ) Enter the requested old and new passwords when booting to restore the Authentication Authority
    Any ideas other than the http://support.apple.com/kb/HT1528 notes on how to turn it on/off
    Most everything I have done on the lion server has not required me to use sudo, but I use it frequently on osx lion client with no problems.
    Something is either corrupted, or somebody forgot to turn it on ?
    I hope I can get this fixed, I sure don't want to have to re-install the server software.
    Thanks for any insights,
    Bill Hernandez
    Plano, Texas
    I can su to root, but not sudo...
    $ sudo echo
    Password:
    Sorry, try again.
    Password:
    Sorry, try again.
    Password:
    Sorry, try again.
    sudo: 3 incorrect password attempts
    myHost:~ usershortname$ su root -c 'tail -30 /var/log/secure.log'
    Password:
    May 28 21:36:44 myHost su[1426]: in od_record_check_pwpolicy(): retval: 0
    May 28 21:36:44 myHost su[1426]: in od_record_attribute_create_cfstring(): returned 2 attributes for dsAttrTypeStandard:AuthenticationAuthority
    May 28 21:36:44 myHost su[1430]: usershortname to root on /dev/ttys000
    May 28 21:37:41 myHost su[1442]: in pam_sm_authenticate(): authentication failed
    May 28 21:37:46 myHost su[1442]: in pam_sm_acct_mgmt(): The group check succeeded.
    May 28 21:37:46 myHost su[1442]: in pam_sm_acct_mgmt(): OpenDirectory - Membership cache TTL set to 1800.
    May 28 21:37:46 myHost su[1442]: in od_record_check_pwpolicy(): retval: 0
    May 28 21:37:46 myHost su[1442]: in od_record_attribute_create_cfstring(): returned 2 attributes for dsAttrTypeStandard:AuthenticationAuthority
    May 28 21:37:46 myHost su[1446]: usershortname to root on /dev/ttys000
    May 28 21:37:57 myHost login[1454]: in pam_sm_acct_mgmt(): OpenDirectory - Membership cache TTL set to 1800.
    May 28 21:37:57 myHost login[1454]: in od_record_check_pwpolicy(): retval: 0
    May 28 21:37:57 myHost login[1454]: in od_record_attribute_create_cfstring(): returned 2 attributes for dsAttrTypeStandard:AuthenticationAuthority
    May 28 21:38:04 myHost com.apple.SecurityServer[44]: Succeeded authorizing right 'system.services.directory.configure' by client '/System/Library/CoreServices/Directory Utility.app' [1003] for authorization created by '/System/Library/CoreServices/Directory Utility.app' [1003]
    May 28 21:38:04 myHost com.apple.SecurityServer[44]: Succeeded authorizing right 'system.preferences' by client '/System/Library/CoreServices/Directory Utility.app' [1003] for authorization created by '/System/Library/CoreServices/Directory Utility.app' [1003]
    May 28 21:38:09 myHost sudo[1485]: usershortname : 3 incorrect password attempts ; TTY=ttys000 ; PWD=/Users/usershortname ; USER=root ; COMMAND=/bin/echo
    May 28 21:38:19 myHost su[1491]: in pam_sm_authenticate(): authentication failed
    May 28 21:38:23 myHost su[1491]: in pam_sm_acct_mgmt(): The group check succeeded.
    May 28 21:38:23 myHost su[1491]: in pam_sm_acct_mgmt(): OpenDirectory - Membership cache TTL set to 1800.
    May 28 21:38:23 myHost su[1491]: in od_record_check_pwpolicy(): retval: 0
    May 28 21:38:23 myHost su[1491]: in od_record_attribute_create_cfstring(): returned 2 attributes for dsAttrTypeStandard:AuthenticationAuthority
    May 28 21:38:23 myHost su[1494]: usershortname to root on /dev/ttys000
    May 28 21:38:39 myHost login[1502]: in pam_sm_acct_mgmt(): OpenDirectory - Membership cache TTL set to 1800.
    May 28 21:38:39 myHost login[1502]: in od_record_check_pwpolicy(): retval: 0
    May 28 21:38:39 myHost login[1502]: in od_record_attribute_create_cfstring(): returned 2 attributes for dsAttrTypeStandard:AuthenticationAuthority
    May 28 21:38:48 myHost sudo[1533]: usershortname : 3 incorrect password attempts ; TTY=ttys000 ; PWD=/Users/usershortname ; USER=root ; COMMAND=/bin/echo
    May 28 21:38:58 myHost su[1537]: in pam_sm_authenticate(): authentication failed
    May 28 21:39:03 myHost su[1537]: in pam_sm_acct_mgmt(): The group check succeeded.
    May 28 21:39:03 myHost su[1537]: in pam_sm_acct_mgmt(): OpenDirectory - Membership cache TTL set to 1800.
    May 28 21:39:03 myHost su[1537]: in od_record_check_pwpolicy(): retval: 0
    May 28 21:39:03 myHost su[1537]: in od_record_attribute_create_cfstring(): returned 2 attributes for dsAttrTypeStandard:AuthenticationAuthority
    May 28 21:39:03 myHost su[1540]: usershortname to root on /dev/ttys000
    myHost:~ usershortname$

    Did you mean that support document?
    Open Terminal.app (Applications > Utilities) and paste the two lines to the Terminal. Hit ENTER and insert your admin password (it dond't show any output to the Terminal, so just type blind and hit ENTER. AND you also have to had set a password, it won't work with a blank password).
    If the first command was successfull it would print "not loaded" and return to a new line, ending on $. Then enter the second command, and hit enter.
    If the first command fails, copy and paste the output here to the discussions.

  • Connecting SL clients to Lion Server issues

    After  a week of use , Snow leopard clients are now no longer able to connect to an afp shared drive on Lion Server.  Worked fine for the first week.
    Here is a crash report from one of the clients:
    Process:         NetAuthAgent [160]
    Path:            /System/Library/CoreServices/NetAuthAgent.app/Contents/MacOS/NetAuthAgent
    Identifier:      com.apple.NetAuthAgent
    Version:         2.1 (2.1)
    Build Info:      NetAuth-710100~1
    Code Type:       X86-64 (Native)
    Parent Process:  launchd [95]
    Date/Time:       2011-09-12 16:13:25.230 -0400
    OS Version:      Mac OS X 10.6.6 (10J567)
    Report Version:  6
    Exception Type:  EXC_BAD_ACCESS (SIGSEGV)
    Exception Codes: KERN_INVALID_ADDRESS at 0x0000000000000000
    Crashed Thread:  3
    Thread 0:  Dispatch queue: com.apple.main-thread
    0   libSystem.B.dylib                       0x00007fff860272da mach_msg_trap + 10
    1   libSystem.B.dylib                       0x00007fff8602794d mach_msg + 59
    2   com.apple.CoreFoundation                0x00007fff817c7932 __CFRunLoopRun + 1698
    3   com.apple.CoreFoundation                0x00007fff817c6dbf CFRunLoopRunSpecific + 575
    4   com.apple.HIToolbox                     0x00007fff86f9a93a RunCurrentEventLoopInMode + 333
    5   com.apple.HIToolbox                     0x00007fff86f9a73f ReceiveNextEventCommon + 310
    6   com.apple.HIToolbox                     0x00007fff86f9a5f8 BlockUntilNextEventMatchingListInMode + 59
    7   com.apple.AppKit                        0x00007fff83658e64 _DPSNextEvent + 718
    8   com.apple.AppKit                        0x00007fff836587a9 -[NSApplication nextEventMatchingMask:untilDate:inMode:dequeue:] + 155
    9   com.apple.AppKit                        0x00007fff8361e48b -[NSApplication run] + 395
    10  com.apple.NetAuthAgent                  0x000000010000be31 0x100000000 + 48689
    11  com.apple.NetAuthAgent                  0x0000000100001478 0x100000000 + 5240
    Thread 1:  Dispatch queue: com.apple.libdispatch-manager
    0   libSystem.B.dylib                       0x00007fff8604016a kevent + 10
    1   libSystem.B.dylib                       0x00007fff8604203d _dispatch_mgr_invoke + 154
    2   libSystem.B.dylib                       0x00007fff86041d14 _dispatch_queue_invoke + 185
    3   libSystem.B.dylib                       0x00007fff8604183e _dispatch_worker_thread2 + 252
    4   libSystem.B.dylib                       0x00007fff86041168 _pthread_wqthread + 353
    5   libSystem.B.dylib                       0x00007fff86041005 start_wqthread + 13
    Thread 2:
    0   libSystem.B.dylib                       0x00007fff86040f8a __workq_kernreturn + 10
    1   libSystem.B.dylib                       0x00007fff8604139c _pthread_wqthread + 917
    2   libSystem.B.dylib                       0x00007fff86041005 start_wqthread + 13
    Thread 3 Crashed:
    0   libSystem.B.dylib                       0x00007fff8602a160 strlen + 16
    1   libSystem.B.dylib                       0x00007fff86030d58 strdup + 28
    2   com.apple.KerberosHelper                0x00007fff818f6520 KRBCreateSessionInfo + 882
    3   com.apple.KerberosHelper                0x00007fff818f7453 KRBCreateSession + 158
    4   com.apple.NetAuthAgent                  0x0000000100019965 0x100000000 + 104805
    5   com.apple.NetAuthAgent                  0x0000000100019556 0x100000000 + 103766
    6   com.apple.NetAuthAgent                  0x000000010001a058 0x100000000 + 106584
    7   com.apple.NetAuthAgent                  0x00000001000087ee 0x100000000 + 34798
    8   com.apple.Foundation                    0x00007fff805040a5 __NSThread__main__ + 1429
    9   libSystem.B.dylib                       0x00007fff86060536 _pthread_start + 331
    10  libSystem.B.dylib                       0x00007fff860603e9 thread_start + 13
    Thread 3 crashed with X86 Thread State (64-bit):
    rax: 0x00000000ffffffff  rbx: 0x00000000fffffffd  rcx: 0x0000000000000000  rdx: 0x0000000000000000
    rdi: 0x0000000000000000  rsi: 0x0000000100614f61  rbp: 0x00000001138d5080  rsp: 0x00000001138d5058
      r8: 0x0000000000800000   r9: 0x00000000100614f7  r10: 0x0000000000000000  r11: 0x0000000100614f70
    r12: 0x00007fff70380490  r13: 0x0000000000000000  r14: 0x00000001006141c0  r15: 0x00000001138d5ab8
    rip: 0x00007fff8602a160  rfl: 0x0000000000010286  cr2: 0x0000000000000000
    Binary Images:
          0x100000000 -        0x100029fff  com.apple.NetAuthAgent 2.1 (2.1) <42B1CD13-9A8F-4882-F5B3-DB9BDB05B147> /System/Library/CoreServices/NetAuthAgent.app/Contents/MacOS/NetAuthAgent
          0x1000e0000 -        0x1000e7fff  com.apple.URLMount.AFPPlugin 3.2.1 (3.2.1) <108073AE-9E03-4455-296C-144C2FCF013C> /System/Library/Filesystems/NetFSPlugins/afp.bundle/Contents/MacOS/afp
          0x100783000 -        0x1007cdfff  com.apple.AppleShareClientCore 2.0 (2.0) <2604D912-AE13-00F6-1C8C-A54A5D1A4923> /System/Library/Frameworks/AppleShareClientCore.framework/Versions/A/AppleShare ClientCore
       0x7fff5fc00000 -     0x7fff5fc3bdef  dyld 132.1 (???) <B536F2F1-9DF1-3B6C-1C2C-9075EA219A06> /usr/lib/dyld
       0x7fff804f3000 -     0x7fff80776ff7  com.apple.Foundation 6.6.4 (751.42) <9A99D378-E97A-8C0F-3857-D0FAA30FCDD5> /System/Library/Frameworks/Foundation.framework/Versions/C/Foundation
       0x7fff807c1000 -     0x7fff807d7fe7  com.apple.MultitouchSupport.framework 207.10 (207.10) <1828C264-A54A-7FDD-FE1B-49DDE3F50779> /System/Library/PrivateFrameworks/MultitouchSupport.framework/Versions/A/Multit ouchSupport
       0x7fff807d8000 -     0x7fff807eafe7  libsasl2.2.dylib 3.15.0 (compatibility 3.0.0) <30FE378B-99FE-8C7C-06D0-A3AA0A0A70D4> /usr/lib/libsasl2.2.dylib
       0x7fff807eb000 -     0x7fff8089afff  edu.mit.Kerberos 6.5.10 (6.5.10) <F3F76EDF-5660-78F0-FE6E-33B6174F55A4> /System/Library/Frameworks/Kerberos.framework/Versions/A/Kerberos
       0x7fff808ad000 -     0x7fff8092afef  libstdc++.6.dylib 7.9.0 (compatibility 7.0.0) <35ECA411-2C08-FD7D-11B1-1B7A04921A5C> /usr/lib/libstdc++.6.dylib
       0x7fff80986000 -     0x7fff80987ff7  com.apple.TrustEvaluationAgent 1.1 (1) <A91CE5B9-3C63-5F8C-5052-95CCAB866F72> /System/Library/PrivateFrameworks/TrustEvaluationAgent.framework/Versions/A/Tru stEvaluationAgent
       0x7fff8101c000 -     0x7fff8101cff7  com.apple.Cocoa 6.6 (???) <C69E895A-1C66-3DA9-5F63-8BE85DB9C4E1> /System/Library/Frameworks/Cocoa.framework/Versions/A/Cocoa
       0x7fff8101d000 -     0x7fff8103aff7  libPng.dylib ??? (???) <14043CBC-329F-4009-299E-DEE411E16134> /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/ ImageIO.framework/Versions/A/Resources/libPng.dylib
       0x7fff8121a000 -     0x7fff8122efff  libGL.dylib ??? (???) <1EB1BD0F-C17F-55DF-B8B4-8E9CF99359D4> /System/Library/Frameworks/OpenGL.framework/Versions/A/Libraries/libGL.dylib
       0x7fff8126a000 -     0x7fff81428fff  libicucore.A.dylib 40.0.0 (compatibility 1.0.0) <781E7B63-2AD0-E9BA-927C-4521DB616D02> /usr/lib/libicucore.A.dylib
       0x7fff814e2000 -     0x7fff814e5ff7  libCoreVMClient.dylib ??? (???) <609598E6-195D-E5D4-3B92-AE8D9768829C> /System/Library/Frameworks/OpenGL.framework/Versions/A/Libraries/libCoreVMClien t.dylib
       0x7fff816b7000 -     0x7fff81743fef  SecurityFoundation ??? (???) <6860DE26-0D42-D1E8-CD7C-5B42D78C1E1D> /System/Library/Frameworks/SecurityFoundation.framework/Versions/A/SecurityFoun dation
       0x7fff81744000 -     0x7fff8174aff7  com.apple.DiskArbitration 2.3 (2.3) <AAB5CC56-334A-3C60-3C27-54E8F34D754E> /System/Library/Frameworks/DiskArbitration.framework/Versions/A/DiskArbitration
       0x7fff8177b000 -     0x7fff818f2fe7  com.apple.CoreFoundation 6.6.4 (550.42) <770C572A-CF70-168F-F43C-242B9114FCB5> /System/Library/Frameworks/CoreFoundation.framework/Versions/A/CoreFoundation
       0x7fff818f3000 -     0x7fff818faff7  com.apple.KerberosHelper 2.1 (1.0) <AD86E835-8CD3-11C6-339C-95A439A9F0E9> /System/Library/PrivateFrameworks/KerberosHelper.framework/Versions/A/KerberosH elper
       0x7fff818fb000 -     0x7fff819b4fff  libsqlite3.dylib 9.6.0 (compatibility 9.0.0) <2C5ED312-E646-9ADE-73A9-6199A2A43150> /usr/lib/libsqlite3.dylib
       0x7fff81a28000 -     0x7fff81ae9fe7  libFontParser.dylib ??? (???) <8B12D37E-3A95-5A73-509C-3AA991E0C546> /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/ ATS.framework/Versions/A/Resources/libFontParser.dylib
       0x7fff81bee000 -     0x7fff81bf3fff  libGFXShared.dylib ??? (???) <991F8197-FD06-2AF1-F99B-E448ED4FB2AC> /System/Library/Frameworks/OpenGL.framework/Versions/A/Libraries/libGFXShared.d ylib
       0x7fff828fc000 -     0x7fff828fcff7  com.apple.vecLib 3.6 (vecLib 3.6) <96FB6BAD-5568-C4E0-6FA7-02791A58B584> /System/Library/Frameworks/vecLib.framework/Versions/A/vecLib
       0x7fff82b0c000 -     0x7fff82b53ff7  com.apple.coreui 2 (114) <31118426-355F-206A-65AB-CCA2D2D3EBD7> /System/Library/PrivateFrameworks/CoreUI.framework/Versions/A/CoreUI
       0x7fff82bb0000 -     0x7fff82e36fff  com.apple.security 6.1.1 (37594) <1B4E1ABD-1BB3-DA49-F574-0EEB23E73C6A> /System/Library/Frameworks/Security.framework/Versions/A/Security
       0x7fff82e37000 -     0x7fff82e57ff7  com.apple.DirectoryService.Framework 3.6 (621.9) <FF6567B5-56BD-F3EC-E59D-1EC583C3CF73> /System/Library/Frameworks/DirectoryService.framework/Versions/A/DirectoryServi ce
       0x7fff830a1000 -     0x7fff83173fe7  com.apple.CFNetwork 454.11.5 (454.11.5) <B3E2BE12-D7AA-5940-632A-1E5E7BF8E6E3> /System/Library/Frameworks/CoreServices.framework/Versions/A/Frameworks/CFNetwo rk.framework/Versions/A/CFNetwork
       0x7fff83203000 -     0x7fff83217ff7  com.apple.speech.synthesis.framework 3.10.35 (3.10.35) <574C1BE0-5E5E-CCAF-06F8-92A69CB2892D> /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/ SpeechSynthesis.framework/Versions/A/SpeechSynthesis
       0x7fff83219000 -     0x7fff83261ff7  libvDSP.dylib 268.0.1 (compatibility 1.0.0) <98FC4457-F405-0262-00F7-56119CA107B6> /System/Library/Frameworks/Accelerate.framework/Versions/A/Frameworks/vecLib.fr amework/Versions/A/libvDSP.dylib
       0x7fff83262000 -     0x7fff83419fef  com.apple.ImageIO.framework 3.0.4 (3.0.4) <2CB9997A-A28D-80BC-5921-E7D50BBCACA7> /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/ ImageIO.framework/Versions/A/ImageIO
       0x7fff83451000 -     0x7fff83451ff7  com.apple.Accelerate.vecLib 3.6 (vecLib 3.6) <4CCE5D69-F1B3-8FD3-1483-E0271DB2CCF3> /System/Library/Frameworks/Accelerate.framework/Versions/A/Frameworks/vecLib.fr amework/Versions/A/vecLib
       0x7fff83452000 -     0x7fff83507fe7  com.apple.ink.framework 1.3.3 (107) <A68339AA-909D-E46C-35C0-72808EE3D043> /System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/Ink.framework /Versions/A/Ink
       0x7fff83508000 -     0x7fff83554fff  libauto.dylib ??? (???) <F7221B46-DC4F-3153-CE61-7F52C8C293CF> /usr/lib/libauto.dylib
       0x7fff83555000 -     0x7fff83576fff  libresolv.9.dylib 41.0.0 (compatibility 1.0.0) <6993F348-428F-C97E-7A84-7BD2EDC46A62> /usr/lib/libresolv.9.dylib
       0x7fff83577000 -     0x7fff835c6ff7  com.apple.DirectoryService.PasswordServerFramework 6.0 (6.0) <F5B744D7-AEAF-6B66-43CF-6E31CDA18EAB> /System/Library/PrivateFrameworks/PasswordServer.framework/Versions/A/PasswordS erver
       0x7fff83615000 -     0x7fff8400bfff  com.apple.AppKit 6.6.7 (1038.35) <9F4DF818-9DB9-98DA-490C-EF29EA757A97> /System/Library/Frameworks/AppKit.framework/Versions/C/AppKit
       0x7fff8400c000 -     0x7fff8409cfff  com.apple.SearchKit 1.3.0 (1.3.0) <45BA1053-9196-3C2F-2421-AFF5E09627CC> /System/Library/Frameworks/CoreServices.framework/Versions/A/Frameworks/SearchK it.framework/Versions/A/SearchKit
       0x7fff842dd000 -     0x7fff842eeff7  libz.1.dylib 1.2.3 (compatibility 1.0.0) <FB5EE53A-0534-0FFA-B2ED-486609433717> /usr/lib/libz.1.dylib
       0x7fff842ef000 -     0x7fff8436dfff  com.apple.CoreText 3.5.0 (???) <4D5C7932-293B-17FF-7309-B580BB1953EA> /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/ CoreText.framework/Versions/A/CoreText
       0x7fff8436e000 -     0x7fff843b7ff7  com.apple.securityinterface 4.0.1 (40418) <E2DC796D-84EC-48F5-34A9-DF614573BE74> /System/Library/Frameworks/SecurityInterface.framework/Versions/A/SecurityInter face
       0x7fff843b8000 -     0x7fff843b9fff  liblangid.dylib ??? (???) <D0666597-B331-C43C-67BB-F2E754079A7A> /usr/lib/liblangid.dylib
       0x7fff843ba000 -     0x7fff843bbff7  com.apple.audio.units.AudioUnit 1.6.5 (1.6.5) <14F14B5E-9287-BC36-0C3F-6592E6696CD4> /System/Library/Frameworks/AudioUnit.framework/Versions/A/AudioUnit
       0x7fff843bc000 -     0x7fff8443bfe7  com.apple.audio.CoreAudio 3.2.6 (3.2.6) <1DD64A62-0DE4-223F-F781-B272FECF80F0> /System/Library/Frameworks/CoreAudio.framework/Versions/A/CoreAudio
       0x7fff8443c000 -     0x7fff84485fef  libGLU.dylib ??? (???) <CCE779A9-2467-A5AA-A558-691E43A1105F> /System/Library/Frameworks/OpenGL.framework/Versions/A/Libraries/libGLU.dylib
       0x7fff84582000 -     0x7fff845b3fff  libGLImage.dylib ??? (???) <1A8E58CF-FA2F-14F7-A097-D34EEA8A7D03> /System/Library/Frameworks/OpenGL.framework/Versions/A/Libraries/libGLImage.dyl ib
       0x7fff845b4000 -     0x7fff84671ff7  com.apple.CoreServices.OSServices 357 (357) <718F0719-DC9F-E392-7C64-9D7DFE3D02E2> /System/Library/Frameworks/CoreServices.framework/Versions/A/Frameworks/OSServi ces.framework/Versions/A/OSServices
       0x7fff84672000 -     0x7fff84793fe7  libcrypto.0.9.8.dylib 0.9.8 (compatibility 0.9.8) <48AEAFE1-21F4-B3C8-4199-35AD5E8D0613> /usr/lib/libcrypto.0.9.8.dylib
       0x7fff84794000 -     0x7fff84819ff7  com.apple.print.framework.PrintCore 6.3 (312.7) <CDFE82DD-D811-A091-179F-6E76069B432D> /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/ PrintCore.framework/Versions/A/PrintCore
       0x7fff84835000 -     0x7fff8483cfff  com.apple.OpenDirectory 10.6 (10.6) <4200CFB0-DBA1-62B8-7C7C-91446D89551F> /System/Library/Frameworks/OpenDirectory.framework/Versions/A/OpenDirectory
       0x7fff8483d000 -     0x7fff848a7fe7  libvMisc.dylib 268.0.1 (compatibility 1.0.0) <7BD7F19B-ACD4-186C-B42D-4DEBA6795628> /System/Library/Frameworks/Accelerate.framework/Versions/A/Frameworks/vecLib.fr amework/Versions/A/libvMisc.dylib
       0x7fff84908000 -     0x7fff8492efe7  libJPEG.dylib ??? (???) <6690F15D-E970-2678-430E-590A94F5C8E9> /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/ ImageIO.framework/Versions/A/Resources/libJPEG.dylib
       0x7fff8492f000 -     0x7fff84981ff7  com.apple.HIServices 1.8.2 (???) <7C91D07D-FA20-0882-632F-0CAE4FAC2B79> /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/ HIServices.framework/Versions/A/HIServices
       0x7fff84d5d000 -     0x7fff84db2ff7  com.apple.framework.familycontrols 2.0.2 (2020) <A3CFF697-B9DB-A7E5-3B39-9DA9B34F0595> /System/Library/PrivateFrameworks/FamilyControls.framework/Versions/A/FamilyCon trols
       0x7fff84e4a000 -     0x7fff84e5fff7  com.apple.LangAnalysis 1.6.6 (1.6.6) <DC999B32-BF41-94C8-0583-27D9AB463E8B> /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/ LangAnalysis.framework/Versions/A/LangAnalysis
       0x7fff84e60000 -     0x7fff84e6bff7  com.apple.speech.recognition.framework 3.11.1 (3.11.1) <C359B93B-CC9B-FC0B-959E-FB10674103A7> /System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/SpeechRecogni tion.framework/Versions/A/SpeechRecognition
       0x7fff84e6c000 -     0x7fff851a0fff  com.apple.CoreServices.CarbonCore 861.23 (861.23) <08F360FA-1771-4F0B-F356-BEF68BB9D421> /System/Library/Frameworks/CoreServices.framework/Versions/A/Frameworks/CarbonC ore.framework/Versions/A/CarbonCore
       0x7fff8521e000 -     0x7fff85246fff  com.apple.DictionaryServices 1.1.2 (1.1.2) <E9269069-93FA-2B71-F9BA-FDDD23C4A65E> /System/Library/Frameworks/CoreServices.framework/Versions/A/Frameworks/Diction aryServices.framework/Versions/A/DictionaryServices
       0x7fff85247000 -     0x7fff8524bff7  libmathCommon.A.dylib 315.0.0 (compatibility 1.0.0) <95718673-FEEE-B6ED-B127-BCDBDB60D4E5> /usr/lib/system/libmathCommon.A.dylib
       0x7fff8524c000 -     0x7fff85302fff  libobjc.A.dylib 227.0.0 (compatibility 1.0.0) <1960E662-D35C-5D98-EB16-D43166AE6A22> /usr/lib/libobjc.A.dylib
       0x7fff85303000 -     0x7fff853a3fff  com.apple.LaunchServices 362.2 (362.2) <A8EDC37C-1D40-5ED0-49BE-90EF110A6B3A> /System/Library/Frameworks/CoreServices.framework/Versions/A/Frameworks/LaunchS ervices.framework/Versions/A/LaunchServices
       0x7fff857f3000 -     0x7fff85c36fef  libLAPACK.dylib 219.0.0 (compatibility 1.0.0) <57D38705-6F21-2A82-F3F6-03CFFF214775> /System/Library/Frameworks/Accelerate.framework/Versions/A/Frameworks/vecLib.fr amework/Versions/A/libLAPACK.dylib
       0x7fff85c37000 -     0x7fff85c70fef  libcups.2.dylib 2.8.0 (compatibility 2.0.0) <561D0DCB-47AD-A12C-9066-70E4CBAD331C> /usr/lib/libcups.2.dylib
       0x7fff85d4a000 -     0x7fff85d58ff7  libkxld.dylib ??? (???) <4016E9E6-0645-5384-A697-2775B5228113> /usr/lib/system/libkxld.dylib
       0x7fff85d59000 -     0x7fff85d59ff7  com.apple.ApplicationServices 38 (38) <0E2FC75E-2BE2-D04D-CA78-76E38A89DD30> /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Application Services
       0x7fff85d70000 -     0x7fff85e4afff  com.apple.vImage 4.0 (4.0) <B5A8B93B-D302-BC30-5A18-922645DB2F56> /System/Library/Frameworks/Accelerate.framework/Versions/A/Frameworks/vImage.fr amework/Versions/A/vImage
       0x7fff85e73000 -     0x7fff85ec2fef  libTIFF.dylib ??? (???) <AE9DC484-1382-F7AD-FE25-C28082FCB5D9> /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/ ImageIO.framework/Versions/A/Resources/libTIFF.dylib
       0x7fff86026000 -     0x7fff861e7fff  libSystem.B.dylib 125.2.1 (compatibility 1.0.0) <71E6D4C9-F945-6EC2-998C-D61AD590DAB6> /usr/lib/libSystem.B.dylib
       0x7fff861e8000 -     0x7fff8629dfe7  com.apple.ColorSync 4.6.3 (4.6.3) <AA93AD96-6974-9104-BF55-AF7A813C8A1B> /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/ ColorSync.framework/Versions/A/ColorSync
       0x7fff862fa000 -     0x7fff86413fef  libGLProgrammability.dylib ??? (???) <4F2DC233-7DD2-1204-CAA5-3E6524F0AB75> /System/Library/Frameworks/OpenGL.framework/Versions/A/Libraries/libGLProgramma bility.dylib
       0x7fff8650d000 -     0x7fff86633fff  com.apple.audio.toolbox.AudioToolbox 1.6.5 (1.6.5) <B51023BB-A5C9-3C65-268B-6B86B901BB2C> /System/Library/Frameworks/AudioToolbox.framework/Versions/A/AudioToolbox
       0x7fff86634000 -     0x7fff8663aff7  IOSurface ??? (???) <04EDCEDE-E36F-15F8-DC67-E61E149D2C9A> /System/Library/Frameworks/IOSurface.framework/Versions/A/IOSurface
       0x7fff8663b000 -     0x7fff8664afff  com.apple.opengl 1.6.12 (1.6.12) <DE3F0528-7759-CDFD-A2CF-C51D3C9C8B39> /System/Library/Frameworks/OpenGL.framework/Versions/A/OpenGL
       0x7fff866c0000 -     0x7fff866c5fff  libGIF.dylib ??? (???) <9A2723D8-61F9-6D65-D254-4F9273CDA54A> /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/ ImageIO.framework/Versions/A/Resources/libGIF.dylib
       0x7fff866c6000 -     0x7fff86701fff  com.apple.AE 496.4 (496.4) <CB905496-4D6B-F26A-399D-840D26DBEE5B> /System/Library/Frameworks/CoreServices.framework/Versions/A/Frameworks/AE.fram ework/Versions/A/AE
       0x7fff86702000 -     0x7fff8672dff7  libxslt.1.dylib 3.24.0 (compatibility 3.0.0) <6589F0FC-41DB-8494-CA8B-487F4E328EB9> /usr/lib/libxslt.1.dylib
       0x7fff867df000 -     0x7fff867dfff7  com.apple.Accelerate 1.6 (Accelerate 1.6) <15DF8B4A-96B2-CB4E-368D-DEC7DF6B62BB> /System/Library/Frameworks/Accelerate.framework/Versions/A/Accelerate
       0x7fff86801000 -     0x7fff868e6fef  com.apple.DesktopServices 1.5.9 (1.5.9) <27890B2C-0CD2-7C27-9D0C-D5952C5E8438> /System/Library/PrivateFrameworks/DesktopServicesPriv.framework/Versions/A/Desk topServicesPriv
       0x7fff86c3a000 -     0x7fff86c9afe7  com.apple.framework.IOKit 2.0 (???) <D107CB8A-5182-3AC4-35D0-07068A695C05> /System/Library/Frameworks/IOKit.framework/Versions/A/IOKit
       0x7fff86c9b000 -     0x7fff86dd9fff  com.apple.CoreData 102.1 (251) <96C5E9A6-C28C-E9CC-A0DB-27801A22A49F> /System/Library/Frameworks/CoreData.framework/Versions/A/CoreData
       0x7fff86dda000 -     0x7fff86ef1fef  libxml2.2.dylib 10.3.0 (compatibility 10.0.0) <AFE91118-DBF3-6313-37B8-8A2002C6A46B> /usr/lib/libxml2.2.dylib
       0x7fff86f55000 -     0x7fff86f5bff7  com.apple.CommerceCore 1.0 (6) <E8A1144C-5666-9840-4729-256FE69CDBDB> /System/Library/PrivateFrameworks/CommerceKit.framework/Versions/A/Frameworks/C ommerceCore.framework/Versions/A/CommerceCore
       0x7fff86f5c000 -     0x7fff86f6bfff  com.apple.NetFS 3.2.1 (3.2.1) <DE59FB56-8536-9999-352A-2016ADCF4FCF> /System/Library/Frameworks/NetFS.framework/Versions/A/NetFS
       0x7fff86f6c000 -     0x7fff8726afe7  com.apple.HIToolbox 1.6.4 (???) <263AD497-F4CC-9610-E7D3-B95CF6F02030> /System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/HIToolbox.fra mework/Versions/A/HIToolbox
       0x7fff87277000 -     0x7fff87311fff  com.apple.ApplicationServices.ATS 4.4 (???) <395849EE-244A-7323-6CBA-E71E3B722984> /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/ ATS.framework/Versions/A/ATS
       0x7fff873ea000 -     0x7fff87787fe7  com.apple.QuartzCore 1.6.3 (227.34) <215222AF-B30A-7CE5-C46C-1A766C1D1D2E> /System/Library/Frameworks/QuartzCore.framework/Versions/A/QuartzCore
       0x7fff87ac1000 -     0x7fff881be06f  com.apple.CoreGraphics 1.545.0 (???) <356D59D6-1DD1-8BFF-F9B3-1CE51D2F1EC7> /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/ CoreGraphics.framework/Versions/A/CoreGraphics
       0x7fff881bf000 -     0x7fff88200fef  com.apple.QD 3.36 (???) <5DC41E81-32C9-65B2-5528-B33E934D5BB4> /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/ QD.framework/Versions/A/QD
       0x7fff88201000 -     0x7fff88217fef  libbsm.0.dylib ??? (???) <0321D32C-9FE1-3919-E03E-2530A0C1191B> /usr/lib/libbsm.0.dylib
       0x7fff8849d000 -     0x7fff8849ffff  libRadiance.dylib ??? (???) <76438F90-DD4B-9941-9367-F2DFDF927876> /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/ ImageIO.framework/Versions/A/Resources/libRadiance.dylib
       0x7fff884a0000 -     0x7fff884eaff7  com.apple.Metadata 10.6.3 (507.15) <5170FCE0-ED6C-2E3E-AB28-1DDE3F628FC5> /System/Library/Frameworks/CoreServices.framework/Versions/A/Frameworks/Metadat a.framework/Versions/A/Metadata
       0x7fff88652000 -     0x7fff88677ff7  com.apple.CoreVideo 1.6.2 (45.6) <E138C8E7-3CB6-55A9-0A2C-B73FE63EA288> /System/Library/Frameworks/CoreVideo.framework/Versions/A/CoreVideo
       0x7fff88779000 -     0x7fff88779ff7  com.apple.CoreServices 44 (44) <DC7400FB-851E-7B8A-5BF6-6F50094302FB> /System/Library/Frameworks/CoreServices.framework/Versions/A/CoreServices
       0x7fff887c5000 -     0x7fff887defff  com.apple.CFOpenDirectory 10.6 (10.6) <CCF79716-7CC6-2520-C6EB-A4F56AD0A207> /System/Library/Frameworks/OpenDirectory.framework/Versions/A/Frameworks/CFOpen Directory.framework/Versions/A/CFOpenDirectory
       0x7fff887df000 -     0x7fff88fe9fe7  libBLAS.dylib 219.0.0 (compatibility 1.0.0) <2F26CDC7-DAE9-9ABE-6806-93BBBDA20DA0> /System/Library/Frameworks/Accelerate.framework/Versions/A/Frameworks/vecLib.fr amework/Versions/A/libBLAS.dylib
       0x7fff88fea000 -     0x7fff8902bfff  com.apple.SystemConfiguration 1.10.5 (1.10.2) <FB39F09C-57BB-D8CC-348D-93E00C602F7D> /System/Library/Frameworks/SystemConfiguration.framework/Versions/A/SystemConfi guration
       0x7fff89124000 -     0x7fff89147fff  com.apple.opencl 12.3 (12.3) <D30A45FC-4520-45AF-3CA5-092313DB5D54> /System/Library/Frameworks/OpenCL.framework/Versions/A/OpenCL
       0x7fff89156000 -     0x7fff89163fe7  libCSync.A.dylib 545.0.0 (compatibility 64.0.0) <397B9057-5CDF-3B19-4E61-9DFD49369375> /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/ CoreGraphics.framework/Versions/A/Resources/libCSync.A.dylib
       0x7fffffe00000 -     0x7fffffe01fff  libSystem.B.dylib ??? (???) <71E6D4C9-F945-6EC2-998C-D61AD590DAB6> /usr/lib/libSystem.B.dylib

    Simplest way is to write the program to create anew thread to handle each client
    when the ServerSocket accepts a new connection a new thread should be created and that will handle the client. The main threadshould go back to accept next client
    while(true){
       Soeket socket = serverSocket.acept();
       new ClientHandler(socket).start(); /ClientHandler is the class that should be handling the communication with the client
    }

  • How To Install A (Almost) Working Lion Server With Profile Management/SSL/OD/Mail/iCal/Address Book/VNC/Web/etc.

    I recently installed a fresh version of Lion Server after attempting to fix a broken upgrade. With some help from others, I've managed to get all the new features working and have kept notes, having found that many or most of the necessary installation steps for both the OS and its services are almost entirely undocumented. When you get them working, they work great, but the entire process is very fragile, with simple setup steps causing breaks or even malicious behaviors. In case this is useful to others, here are my notes.
    Start with an erased, virgin, single guid partitioned drive. Not an upgrade. Not simply a repartitioned drive. Erased. Clean. Anything else can and probably will break the Lion Server install, as I discovered myself more than once. Before erasing my drive, I already had Lion and made a Lion install DVD from instructions widely available on the web. I suppose you could also boot into the Lion recovery partition and use disk utility to erase the OS X partition then install a new partition, but I cut a DVD. The bottom line is to erase any old OS partitions. And of course to have multiple, independent backups: I use both Time Machine with a modified StdExclusions.plist and Carbon Copy Cloner.
    Also, if you will be running your own personal cloud, you will want to know your domain name ahead of time, as this will be propagated everywhere throughout server, and changing anything related to SSL on Lion Server is a nightmare that I haven't figured out. If you don't yet have a domain name, go drop ten dollars at namecheap.com or wherever and reserve one before you start. Soemday someone will document how to change this stuff without breaking Lion Server, but we're not there yet. I'll assume the top-level domain name "domain.com" here.
    Given good backups, a Lion Install DVD (or Recovery Partition), and a domain name, here are the steps, apparently all of which must be more-or-less strictly followed in this order.
    DVD>Disk Utility>Erase Disk  [or Recovery Partition>Disk Utility>Erase Partition]
    DVD>Install Lion
    Reboot, hopefully Lion install kicks in
    Update, update, update Lion (NOT Lion Server yet) until no more updates
    System Preferences>Network>Static IP on the LAN (say 10.0.1.2) and Computer name ("server" is a good standbye)
    Terminal>$ sudo scutil --set HostName server.domain.com
    App Store>Install Lion Server and run through the Setup
    Download install Server Admin Tools, then update, update, update until no more updates
    Server Admin>DNS>Zones [IF THIS WASN'T AUTOMAGICALLY CREATED (mine wasn't): Add zone domain.com with Nameserver "server.domain.com." (that's a FQDN terminated with a period) and a Mail Exchanger (MX record) "server.domain.com." with priority 10. Add Record>Add Machine (A record) server.domain.com pointing to the server's static IP. You can add fancier DNS aliases and a simpler MX record below after you get through the crucial steps.]
    System Prefs>Network>Advanced>Set your DNS server to 127.0.0.1
    A few DNS set-up steps and these most important steps:
    A. Check that the Unix command "hostname" returns the correct hostname and you can see this hostname in Server.app>Hardware>Network
    B. Check that DNS works: the unix commands "host server.domain.com" and "host 10.0.1.2" (assuming that that's your static IP) should point to each other. Do not proceed until DNS works.
    C. Get Apple Push Notification Services CA via Server.app>Hardware>Settings><Click toggle, Edit... get a new cert ...>
    D. Server.app>Profile Manager>Configure... [Magic script should create OD Master, signed SSL cert]
    E. Server.app>Hardware>Settings>SSL Certificate> [Check to make sure it's set to the one just created]
    F. Using Server.app, turn on the web, then Server.app>Profile Manager> [Click on hyperlink to get to web page, e.g. server.domain.com/profilemanager] Upper RHS pull-down, install Trust Profile
    G. Keychain Access>System>Certificates [Find the automatically generated cert "Domain", the one that is a "Root certificate authority", Highlight and Export as .cer, email to all iOS devices, and click on the authority on the device. It should be entered as a trusted CA on all iOS devices. While you're at it, highlight and Export... as a .cer the certificate "IntermediateCA_SERVER.DOMAIN.COM_1", which is listed an an "Intermediate CA" -- you will use this to establish secure SSL connections with remote browsers hitting your server.]
    H. iOS on LAN: browse to server.domain.com/mydevices> [click on LHS Install trust cert, then RHS Enroll device.
    I. Test from web browser server.domain.com/mydevices: Lock Device to test
    J. ??? Profit
    12. Server Admin>DNS>Zones> Add convenient DNS alias records if necessary, e.g., mail.domain.com, smtp.domain.com, www.domain.com. If you want to refer to your box using the convenient shorthand "domain.com", you must enter the A record (NOT alias) "domain.com." FQDN pointing to the server's fixed IP. You can also enter the convenient short MX record "domain.com." with priority 11. This will all work on the LAN -- all these settings must be mirrored on the outside internet using the service from which you registered domain.com.
    You are now ready to begin turning on your services. Here are a few important details and gotchas setting up cloud services.
    Firewall
    Server Admin>Firewall>Services> Open up all ports needed by whichever services you want to run and set up your router (assuming that your server sits behind a router) to port forward these ports to your router's LAN IP. This is most a straightforward exercise in grepping for the correct ports on this page, but there are several jaw-droppingly undocumented omissions of crucial ports for Push Services and Device Enrollment. If you want to enroll your iOS devices, make sure port 1640 is open. If you want Push Notifications to work (you do), then ports 2195, 2196, 5218, and 5223 must be open. The Unix commands "lsof -i :5218" and "nmap -p 5218 server.domain.com" (nmap available from Macports after installing Xcode from the App Store) help show which ports are open.
    SSH
    Do this with strong security. Server.app to turn on remote logins (open port 22), but edit /etc/sshd_config to turn off root and password logins.
    PermitRootLogin no
    PasswordAuthentication no
    ChallengeResponseAuthentication no
    I'm note sure if toggling the Allow remote logins will load this config file or, run "sudo launchctl unload -w /System/Library/LaunchAgents/org.openbsd.ssh-agent.plist ; sudo launchctl load -w /System/Library/LaunchAgents/org.openbsd.ssh-agent.plist" to restart the server's ssh daemon.
    Then use ssh-keygen on remote client to generate public/private keys that can be used to remotely login to the server.
    client$ ssh-keygen -t rsa -b 2048 -C client_name
    [Securely copy ~/.ssh/id_rsa.pub from client to server.]
    server$ cat id_rsa.pub > ~/.ssh/known_hosts
    I also like DenyHosts, which emails detected ssh attacks to [email protected]. It's amazing how many ssh attacks there are on any open port 22. Not really an added security feature if you've turned off password logins, but good to monitor. Here's a Lion Server diff for the config file /usr/share/denyhosts:
    $ diff denyhosts.cfg-dist denyhosts.cfg
    12c12
    < SECURE_LOG = /var/log/secure
    > #SECURE_LOG = /var/log/secure
    22a23
    > SECURE_LOG = /var/log/secure.log
    34c35
    < HOSTS_DENY = /etc/hosts.deny
    > #HOSTS_DENY = /etc/hosts.deny
    40a42,44
    > #
    > # Mac OS X Lion Server
    > HOSTS_DENY = /private/etc/hosts.deny
    195c199
    < LOCK_FILE = /var/lock/subsys/denyhosts
    > #LOCK_FILE = /var/lock/subsys/denyhosts
    202a207,208
    > LOCK_FILE = /var/denyhosts/denyhosts.pid
    > #
    219c225
    < ADMIN_EMAIL =
    > ADMIN_EMAIL = [email protected]
    286c292
    < #SYSLOG_REPORT=YES
    > SYSLOG_REPORT=YES
    Network Accounts
    User Server.app to create your network accounts; do not use Workgroup Manager. If you use Workgroup Manager, as I did, then your accounts will not have email addresses specified and iCal Server WILL NOT COMPLETELY WORK. Well, at least collaboration through network accounts will be handled clunkily through email, not automatically as they should. If you create a network account using Workgroup Manager, then edit that account using Server.app to specify the email to which iCal invitations may be sent. Server.app doesn't say anything about this, but that's one thing that email address entry is used for. This still isn't quite solid on Lion Server, as my Open Directory logs on a freshly installed Lion Server are filled with errors that read:
    2011-12-12 15:05:52.425 EST - Module: SystemCache - Misconfiguration detected in hash 'Kerberos':
         User 'uname' (/LDAPv3/127.0.0.1) - ID 1031 - UUID 98B4DF30-09CF-42F1-6C31-9D55FE4A0812 - SID S-0-8-83-8930552043-0845248631-7065481045-9092
    Oh well.
    Email
    Email aliases are handled with the file /private/etc/postfix/aliases. Do something like this
    root:           myname
    admin:          myname
    sysadmin:       myname
    certadmin:      myname
    webmaster:      myname
    my_alternate:   myname
    Then run "sudo newaliases". If your ISP is Comcast or some other large provider, you probably must proxy your outgoing mail through their SMTP servers to avoid being blocked as a spammer (a lot of SMTP servers will block email from Comcast/whatever IP addresses that isn't sent by Comcast). Use Server.app>Mail to enter your account information. Even then, the Lion Server default setup may fail using this proxy. I had to do this with the file /private/etc/postfix/main.cf:
    cd /etc/postfix
    sudo cp ./main.cf ./main.cf.no_smtp_sasl_security_options
    sudo echo 'smtp_sasl_security_options = noanonymous' >> ./main.cf
    sudo serveradmin stop mail
    sudo serveradmin start mail
    Finally, make sure that you're running a blacklisting srevice yourself! Server Admin>Mail>Filter> Use spamhaus.org as a blacklister. Finally, set up mail to use strong Kerberos/MD5 settings under on Server Admin>Mail>Advanced. Turn off password and clear logins. The settings should be set to "Use" your SSL cert, NOT "Require". "Require" consistently breaks things for me.
    If you already installed the server's Trust Certificate as described above (and opened up the correct ports), email to your account should be pushed out to all clients.
    iCal Server
    Server.app>Calendar>Turn ON and Allow Email Invitations, Edit... . Whatever you do, do NOT enter your own email account information in this GUI. You must enter the account information for local user com.apple.calendarserver, and the password for this account, which is stored in the System keychain: Keychain Access>System> Item com.apple.servermgr_calendar. Double-click and Show Password, copy and paste into Server.app dialog. This is all described in depth here. If you enter your own account information here (DO NOT!), the iCal Server will delete all Emails in your Inbox just as soon as it reads them, exactly like it works for user com.apple.calendarserver. Believe me, you don't want to discover this "feature", which I expect will be more tightly controlled in some future update.
    Web
    The functionality of Server.app's Web management is pretty limited and awful, but a few changes to the file /etc/apache2/httpd.conf will give you a pretty capable and flexible web server, just one that you must manage by hand. Here's a diff for httpd.conf:
    $ diff httpd.conf.default httpd.conf
    95c95
    < #LoadModule ssl_module libexec/apache2/mod_ssl.so
    > LoadModule ssl_module libexec/apache2/mod_ssl.so
    111c111
    < #LoadModule php5_module libexec/apache2/libphp5.so
    > LoadModule php5_module libexec/apache2/libphp5.so
    139,140c139,140
    < #LoadModule auth_digest_apple_module libexec/apache2/mod_auth_digest_apple.so
    < #LoadModule encoding_module libexec/apache2/mod_encoding.so
    > LoadModule auth_digest_apple_module libexec/apache2/mod_auth_digest_apple.so
    > LoadModule encoding_module libexec/apache2/mod_encoding.so
    146c146
    < #LoadModule xsendfile_module libexec/apache2/mod_xsendfile.so
    > LoadModule xsendfile_module libexec/apache2/mod_xsendfile.so
    177c177
    < ServerAdmin [email protected]
    > ServerAdmin [email protected]
    186c186
    < #ServerName www.example.com:80
    > ServerName domain.com:443
    677a678,680
    > # Server-specific configuration
    > # sudo apachectl -D WEBSERVICE_ON -D MACOSXSERVER -k restart
    > Include /etc/apache2/mydomain/*.conf
    I did "sudo mkdir /etc/apache2/mydomain" and add specific config files for various web pages to host. For example, here's a config file that will host the entire contents of an EyeTV DVR, all password controlled with htdigest ("htdigest ~uname/.htdigest EyeTV uname"). Browsing to https://server.domain.com/eyetv points to /Users/uname/Sites/EyeTV, in which there's an index.php script that can read and display the EyeTV archive at https://server.domain.com/eyetv_archive. If you want Apache username accounts with twiddles as in https://server.domain.com/~uname, specify "UserDir Sites" in the configuration file.
    Alias /eyetv /Users/uname/Sites/EyeTV
    <Directory "/Users/uname/Sites/EyeTV">
        AuthType Digest
        AuthName "EyeTV"
        AuthUserFile /Users/uname/.htdigest
        AuthGroupFile /dev/null
        Require user uname
        Options Indexes MultiViews
        AllowOverride All
        Order allow,deny
        Allow from all
    </Directory>
    Alias /eyetv_archive "/Volumes/Macintosh HD2/Documents/EyeTV Archive"
    <Directory "/Volumes/Macintosh HD2/Documents/EyeTV Archive">
        AuthType Digest
        AuthName "EyeTV"
        AuthUserFile /Users/uname/.htdigest
        AuthGroupFile /dev/null
        Require user uname
        Options Indexes MultiViews
        AllowOverride All
        Order allow,deny
        Allow from all
    </Directory>
    I think you can turn Web off/on in Server.app to relaunch apached, or simply "sudo apachectl -D WEBSERVICE_ON -D MACOSXSERVER -k restart".
    Securely copy to all desired remote clients the file IntermediateCA_SERVER.DOMAIN.COM_1.cer, which you exported from System Keychain above. Add this certificate to your remote keychain and trust it, allowing secure connections between remote clients and your server. Also on remote clients: Firefox>Advanced>Encryption>View Certificates>Authorities>Import...> Import this certificate into your browser. Now there should be a secure connection to https://server.domain.com without any SSL warnings.
    One caveat is that there should be a nice way to establish secure SSL to https://domain.com and https://www.domain.com, but the automagically created SSL certificate only knows about server.domain.com. I attempted to follow this advice when I originally created the cert and add these additional domains (under "Subject Alternate Name Extension"), but the cert creation UI failed when I did this, so I just gave up. I hope that by the time these certs expire, someone posts some documentation on how to manage and change Lion Server SSL scripts AFTER the server has been promoted to an Open Directory Master. In the meantime, it would be much appreciated if anyone can post either how to add these additional domain names to the existing cert, or generate and/or sign a cert with a self-created Keychain Access root certificate authority. In my experience, any attempt to mess with the SSL certs automatically generated just breaks Lion Server.
    Finally, if you don't want a little Apple logo as your web page icon, create your own 16×16 PNG and copy it to the file /Library/Server/Web/Data/Sites/Default/favicon.ico. And request that all web-crawling robots go away with the file /Library/Server/Web/Data/Sites/Default/robots.txt:
    User-agent: *
    Disallow: /
    Misc
    VNC easily works with iOS devices -- use a good passphrase. Edit /System/Library/LaunchDaemons/org.postgresql.postgres.plist and set "listen_addresses=127.0.0.1" to allow PostgreSQL connections over localhost. I've also downloaded snort/base/swatch to build an intrusion detection system, and used Macports's squid+privoxy to build a privacy-enhanced ad-blocking proxy server.

    Privacy Enhancing Filtering Proxy and SSH Tunnel
    Lion Server comes with its own web proxy, but chaining Squid and Privoxy together provides a capable and effective web proxy that can block ads and malicious scripts, and conceal information used to track you around the web. I've posted a simple way to build and use a privacy enhancing web proxy here. While you're at it, configure your OS and browsers to block Adobe Flash cookies and block Flash access to your camera, microphone, and peer networks. Read this WSJ article series to understand how this impacts your privacy. If you configure it to allow use for anyone on your LAN, be sure to open up ports 3128, 8118, and 8123 on your firewall.
    If you've set up ssh and/or VPN as above, you can securely tunnel in to your proxy from anywhere. The syntax for ssh tunnels is a little obscure, so I wrote a little ssh tunnel script with a simpler flexible syntax. This script also allows secure tunnels to other services like VNC (port 5900). If you save this to a file ./ssht (and chmod a+x ./ssht), example syntax to establish an ssh tunnel through localhost:8080 (or, e.g., localhost:5901 for secure VNC Screen Sharing connects) looks like:
    $ ./ssht 8080:[email protected]:3128
    $ ./ssht 8080:alice@:
    $ ./ssht 8080:
    $ ./ssht 8018::8123
    $ ./ssht 5901::5900  [Use the address localhost:5901 for secure VNC connects using OS X's Screen Sharing or Chicken of the VNC (sudo port install cotvnc)]
    $ vi ./ssht
    #!/bin/sh
    # SSH tunnel to squid/whatever proxy: ssht [-p ssh_port] [localhost_port:][user_name@][ip_address][:remotehost][:remote_port]
    USERNAME_DEFAULT=username
    HOSTNAME_DEFAULT=domain.com
    SSHPORT_DEFAULT=22
    # SSH port forwarding specs, e.g. 8080:localhost:3128
    LOCALHOSTPORT_DEFAULT=8080      # Default is http proxy 8080
    REMOTEHOST_DEFAULT=localhost    # Default is localhost
    REMOTEPORT_DEFAULT=3128         # Default is Squid port
    # Parse ssh port and tunnel details if specified
    SSHPORT=$SSHPORT_DEFAULT
    TUNNEL_DETAILS=$LOCALHOSTPORT_DEFAULT:$USERNAME_DEFAULT@$HOSTNAME_DEFAULT:$REMOT EHOST_DEFAULT:$REMOTEPORT_DEFAULT
    while [ "$1" != "" ]
    do
      case $1
      in
        -p) shift;                  # -p option
            SSHPORT=$1;
            shift;;
         *) TUNNEL_DETAILS=$1;      # 1st argument option
            shift;;
      esac
    done
    # Get local and remote ports, username, and hostname from the command line argument: localhost_port:user_name@ip_address:remote_host:remote_port
    shopt -s extglob                        # needed for +(pattern) syntax; man sh
    LOCALHOSTPORT=$LOCALHOSTPORT_DEFAULT
    USERNAME=$USERNAME_DEFAULT
    HOSTNAME=$HOSTNAME_DEFAULT
    REMOTEHOST=$REMOTEHOST_DEFAULT
    REMOTEPORT=$REMOTEPORT_DEFAULT
    # LOCALHOSTPORT
    CDR=${TUNNEL_DETAILS#+([0-9]):}         # delete shortest leading +([0-9]):
    CAR=${TUNNEL_DETAILS%%$CDR}             # cut this string from TUNNEL_DETAILS
    CAR=${CAR%:}                            # delete :
    if [ "$CAR" != "" ]                     # leading or trailing port specified
    then
        LOCALHOSTPORT=$CAR
    fi
    TUNNEL_DETAILS=$CDR
    # REMOTEPORT
    CDR=${TUNNEL_DETAILS%:+([0-9])}         # delete shortest trailing :+([0-9])
    CAR=${TUNNEL_DETAILS##$CDR}             # cut this string from TUNNEL_DETAILS
    CAR=${CAR#:}                            # delete :
    if [ "$CAR" != "" ]                     # leading or trailing port specified
    then
        REMOTEPORT=$CAR
    fi
    TUNNEL_DETAILS=$CDR
    # REMOTEHOST
    CDR=${TUNNEL_DETAILS%:*}                # delete shortest trailing :*
    CAR=${TUNNEL_DETAILS##$CDR}             # cut this string from TUNNEL_DETAILS
    CAR=${CAR#:}                            # delete :
    if [ "$CAR" != "" ]                     # leading or trailing port specified
    then
        REMOTEHOST=$CAR
    fi
    TUNNEL_DETAILS=$CDR
    # USERNAME
    CDR=${TUNNEL_DETAILS#*@}                # delete shortest leading +([0-9]):
    CAR=${TUNNEL_DETAILS%%$CDR}             # cut this string from TUNNEL_DETAILS
    CAR=${CAR%@}                            # delete @
    if [ "$CAR" != "" ]                     # leading or trailing port specified
    then
        USERNAME=$CAR
    fi
    TUNNEL_DETAILS=$CDR
    # HOSTNAME
    HOSTNAME=$TUNNEL_DETAILS
    if [ "$HOSTNAME" == "" ]                # no hostname given
    then
        HOSTNAME=$HOSTNAME_DEFAULT
    fi
    ssh -p $SSHPORT -L $LOCALHOSTPORT:$REMOTEHOST:$REMOTEPORT -l $USERNAME $HOSTNAME -f -C -q -N \
        && echo "SSH tunnel established via $LOCALHOSTPORT:$REMOTEHOST:$REMOTEPORT\n\tto $USERNAME@$HOSTNAME:$SSHPORT." \
        || echo "SSH tunnel FAIL."

  • How do I best share an iPhoto library to several users on a Lion Server?

    I am considering setting up a Lion Server to use for our family of five. The one thing I struggle to understand from searching for information here, and throughout the Internet is: Can I set up a Lion server to have shared libraries for iTunes and iPhoto, and what is the best way to set it up? I would also like to understand if such a shared setup would create any issues with reduced functionality and/or performance?
    Today we share libraries across several accounts on one computer, and that works mostly fine, although with some restrictions (only one account can have iPhoto open at a time, which is not much of an issue if on same computer; iTunes can share music but not Apps, ...)

    I followed Apple's support team's instruction to create iPhoto on the new external hard drive (My Passport) - and then drag and drop the existing iPhoto library onto it from the Master file.
    Don't know who told you that but it would be difficult to be more wrong.
    Make sure the drive is formatted Mac OS Extended (Journaled)
    1. Quit iPhoto
    2. Copy the iPhoto Library from your Pictures Folder to the External Disk.
    3. Hold down the option (or alt) key while launching iPhoto. From the resulting menu select 'Choose Library' and navigate to the new location. From that point on this will be the default location of your library.
    4. Test the library and when you're sure all is well, trash the one on your internal HD to free up space.
    Regards
    TD

Maybe you are looking for