Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- WiKID Systems ||| Logs ||| Home ||| Logout |||
- Home
- Users
- Groups
- Domains
- Network Clients
- Configuration
- Reports
- Search for a user: Domain:
- wikid.laclrs.org
- The parameters below narrow the log messages displayed in the log table. To increase/decrease the detail of logs captured into the database use the Configure Loggers page. Log levels are cumulative of messages of greater severity and all filter elements combine to create a single filtered log list.
- Timestamp Level Source Message Substring
- Jump to Page: 1 2 [Next]
- Timestamp Level Source Message Exception
- 2014-04-18 10:03:11.308 INFO com.wikidsystems.radius.log.DBSvrLogImpl <9> Access-Request(1) LEN=82 10.67.109.246:50392 Access-Request by daniel.m.greer Failed: AccessRejectException: Access Denied
- 2014-04-18 10:03:11.307 INFO com.wikidsystems.radius.access.WikidAccess4 Access denied for daniel.m.greer, domain code: 010067123060 client: /10.67.109.246
- 2014-04-18 10:03:07.719 DEBUG com.wikidsystems.server.WikidCode3AES Passcode request processing successfully completed.
- 2014-04-18 10:03:07.719 DEBUG com.wikidsystems.server.WikidCode3AES Sent 272 bytes to client.
- 2014-04-18 10:03:07.718 DEBUG com.wikidsystems.crypto.wJceEncKeys number of blocks converted: 1
- 2014-04-18 10:03:07.718 DEBUG com.wikidsystems.server.DeviceTransactionExec ciphertext length: 272
- 2014-04-18 10:03:07.718 DEBUG com.wikidsystems.crypto.wJceEncKeys Cipher's block size is 117
- 2014-04-18 10:03:07.717 INFO com.wikidsystems.server.DeviceTransactionExec Issued passcode to device -4566245656622438335
- 2014-04-18 10:03:07.717 DEBUG com.wikidsystems.crypto.wJceEncKeys convertBlocks.input length = 11
- 2014-04-18 10:03:07.717 DEBUG com.wikidsystems.crypto.wJceEncKeys packagePayload.input length = 11
- 2014-04-18 10:03:07.703 DEBUG com.wikidsystems.server.DeviceTransactionExec Inserting new valid passcode for device-4566245656622438335
- 2014-04-18 10:03:07.702 DEBUG com.wikidsystems.server.DeviceTransactionExec Submitted PIN verified
- 2014-04-18 10:03:07.702 DEBUG com.wikidsystems.crypto.wJceEncKeys exportPubKey length: 162
- 2014-04-18 10:03:07.701 DEBUG com.wikidsystems.server.DeviceTransactionExec Decrypted client transaction
- 2014-04-18 10:03:07.701 DEBUG com.wikidsystems.server.DeviceTransactionExec Read 16 bytes for AESSeed
- 2014-04-18 10:03:07.701 DEBUG com.wikidsystems.server.DeviceTransactionExec Read PIN from transaction
- 2014-04-18 10:03:07.700 DEBUG com.wikidsystems.crypto.wJceEncKeys number of blocks converted: 1
- 2014-04-18 10:03:07.699 DEBUG com.wikidsystems.crypto.wJceEncKeys Cipher's block size is 128
- 2014-04-18 10:03:07.699 DEBUG com.wikidsystems.crypto.wJceEncKeys convertBlocks.input length = 128
- 2014-04-18 10:03:07.698 DEBUG com.wikidsystems.server.DeviceTransactionExec Loaded domain keys
- 2014-04-18 10:03:07.698 DEBUG com.wikidsystems.crypto.wJceEncKeys pub length = 294
- 2014-04-18 10:03:07.697 DEBUG com.wikidsystems.crypto.wJceEncKeys priv length = 636
- 2014-04-18 10:03:07.697 DEBUG com.wikidsystems.crypto.wJceEncKeys keyAlg = RSA; cipher = RSA/ECB/PKCS1PADDING
- 2014-04-18 10:03:07.697 DEBUG com.wikidsystems.crypto.wJceEncKeys pub length = 162
- 2014-04-18 10:03:07.696 DEBUG com.wikidsystems.crypto.wJceEncKeys keyAlg = RSA; cipher = RSA/ECB/PKCS1PADDING
- 2014-04-18 10:03:07.696 DEBUG com.wikidsystems.crypto.wJceEncKeysFactory keyAlg = RSA; cipher = RSA/ECB/PKCS1PADDING, keySize = 1024
- 2014-04-18 10:03:07.695 DEBUG com.wikidsystems.server.ServletCrypto hashKey: 010067123060/1
- 2014-04-18 10:03:07.695 DEBUG com.wikidsystems.server.ServletCrypto getDomKeyAndFactory()
- 2014-04-18 10:03:07.694 DEBUG com.wikidsystems.server.WikidCode3AES Beginning passcode request processing...
- 2014-04-18 10:03:07.694 DEBUG com.wikidsystems.server.DeviceTransactionExec Got database connection
- 2014-04-18 10:03:07.694 DEBUG com.wikidsystems.server.WikidCode3AES Bulk:: Got 128 bytes of POST data
- 2014-04-18 10:00:56.036 INFO com.wikidsystems.radius.log.DBSvrLogImpl <8> Access-Request(1) LEN=194 10.67.109.246:50392 Access-Request by daniel.m.greer Failed: AccessRejectException: Access Denied
- 2014-04-18 10:00:56.035 INFO com.wikidsystems.radius.access.WikidAccess4 Access denied for daniel.m.greer, domain code: 010067123060 client: /10.67.109.246
- 2014-04-18 10:00:45.934 INFO com.wikidsystems.radius.log.DBSvrLogImpl <7> Access-Request(1) LEN=194 10.67.109.246:50392 Access-Request by daniel.m.greer Failed: AccessRejectException: Access Denied
- 2014-04-18 10:00:45.933 INFO com.wikidsystems.radius.access.WikidAccess4 Access denied for daniel.m.greer, domain code: 010067123060 client: /10.67.109.246
- 2014-04-18 10:00:35.838 INFO com.wikidsystems.radius.log.DBSvrLogImpl <6> Access-Request(1) LEN=194 10.67.109.246:50392 Access-Request by daniel.m.greer Failed: AccessRejectException: Access Denied
- 2014-04-18 10:00:35.838 INFO com.wikidsystems.radius.access.WikidAccess4 Access denied for daniel.m.greer, domain code: 010067123060 client: /10.67.109.246
- 2014-04-18 10:00:32.670 DEBUG com.wikidsystems.server.DeviceTransactionExec ciphertext length: 272
- 2014-04-18 10:00:32.670 DEBUG com.wikidsystems.server.WikidCode3AES Passcode request processing successfully completed.
- 2014-04-18 10:00:32.670 DEBUG com.wikidsystems.server.WikidCode3AES Sent 272 bytes to client.
- 2014-04-18 10:00:32.670 DEBUG com.wikidsystems.crypto.wJceEncKeys number of blocks converted: 1
- 2014-04-18 10:00:32.669 DEBUG com.wikidsystems.crypto.wJceEncKeys convertBlocks.input length = 11
- 2014-04-18 10:00:32.669 DEBUG com.wikidsystems.crypto.wJceEncKeys Cipher's block size is 117
- 2014-04-18 10:00:32.669 DEBUG com.wikidsystems.crypto.wJceEncKeys packagePayload.input length = 11
- 2014-04-18 10:00:32.668 INFO com.wikidsystems.server.DeviceTransactionExec Issued passcode to device -4566245656622438335
- 2014-04-18 10:00:32.655 DEBUG com.wikidsystems.server.DeviceTransactionExec Inserting new valid passcode for device-4566245656622438335
- 2014-04-18 10:00:32.654 DEBUG com.wikidsystems.server.DeviceTransactionExec Submitted PIN verified
- 2014-04-18 10:00:32.654 DEBUG com.wikidsystems.crypto.wJceEncKeys exportPubKey length: 162
- 2014-04-18 10:00:32.653 DEBUG com.wikidsystems.server.DeviceTransactionExec Decrypted client transaction
- 2014-04-18 10:00:32.653 DEBUG com.wikidsystems.server.DeviceTransactionExec Read 16 bytes for AESSeed
- 2014-04-18 10:00:32.653 DEBUG com.wikidsystems.server.DeviceTransactionExec Read PIN from transaction
- 2014-04-18 10:00:32.652 DEBUG com.wikidsystems.crypto.wJceEncKeys number of blocks converted: 1
- 2014-04-18 10:00:32.650 DEBUG com.wikidsystems.crypto.wJceEncKeys Cipher's block size is 128
- 2014-04-18 10:00:32.650 DEBUG com.wikidsystems.crypto.wJceEncKeys convertBlocks.input length = 128
- 2014-04-18 10:00:32.649 DEBUG com.wikidsystems.crypto.wJceEncKeys pub length = 294
- 2014-04-18 10:00:32.649 DEBUG com.wikidsystems.server.DeviceTransactionExec Loaded domain keys
- 2014-04-18 10:00:32.649 DEBUG com.wikidsystems.crypto.wJceEncKeys keyAlg = RSA; cipher = RSA/ECB/PKCS1PADDING
- 2014-04-18 10:00:32.648 DEBUG com.wikidsystems.crypto.wJceEncKeys priv length = 636
- 2014-04-18 10:00:32.648 DEBUG com.wikidsystems.crypto.wJceEncKeys pub length = 162
- 2014-04-18 10:00:32.647 DEBUG com.wikidsystems.server.ServletCrypto hashKey: 010067123060/1
- 2014-04-18 10:00:32.647 DEBUG com.wikidsystems.crypto.wJceEncKeys keyAlg = RSA; cipher = RSA/ECB/PKCS1PADDING
- 2014-04-18 10:00:32.647 DEBUG com.wikidsystems.crypto.wJceEncKeysFactory keyAlg = RSA; cipher = RSA/ECB/PKCS1PADDING, keySize = 1024
- 2014-04-18 10:00:32.647 DEBUG com.wikidsystems.server.ServletCrypto getDomKeyAndFactory()
- 2014-04-18 10:00:32.646 DEBUG com.wikidsystems.server.WikidCode3AES Beginning passcode request processing...
- 2014-04-18 10:00:32.646 DEBUG com.wikidsystems.server.DeviceTransactionExec Got database connection
- 2014-04-18 10:00:32.645 DEBUG com.wikidsystems.server.WikidCode3AES Bulk:: Got 128 bytes of POST data
- 2014-04-18 09:59:18.476 DEBUG com.wikidsystems.server.EventListener Event Reporter Client disconnected.
- 2014-04-18 09:59:18.439 DEBUG com.wikidsystems.server.EventListener Event Reporter Connection Established: 127.0.0.1:8387 -> 33677
- 2014-04-18 09:59:12.524 DEBUG com.wikidsystems.server.EventListener Event Reporter Client disconnected.
- 2014-04-18 09:59:12.490 DEBUG com.wikidsystems.server.EventListener Event Reporter Connection Established: 127.0.0.1:8387 -> 33674
- 2014-04-18 09:57:36.850 INFO com.wikidsystems.radius.log.DBSvrLogImpl <5> Access-Request(1) LEN=82 10.67.109.246:50392 Access-Request by daniel.m.greer Failed: AccessRejectException: Access Denied
- 2014-04-18 09:57:36.849 INFO com.wikidsystems.radius.access.WikidAccess4 Access denied for daniel.m.greer, domain code: 010067123060 client: /10.67.109.246
- 2014-04-18 09:57:32.382 DEBUG com.wikidsystems.server.DeviceTransactionExec ciphertext length: 272
- 2014-04-18 09:57:32.382 DEBUG com.wikidsystems.server.WikidCode3AES Sent 272 bytes to client.
- 2014-04-18 09:57:32.382 DEBUG com.wikidsystems.server.WikidCode3AES Passcode request processing successfully completed.
- 2014-04-18 09:57:32.381 DEBUG com.wikidsystems.crypto.wJceEncKeys convertBlocks.input length = 11
- 2014-04-18 09:57:32.381 DEBUG com.wikidsystems.crypto.wJceEncKeys number of blocks converted: 1
- 2014-04-18 09:57:32.381 DEBUG com.wikidsystems.crypto.wJceEncKeys Cipher's block size is 117
- 2014-04-18 09:57:32.380 DEBUG com.wikidsystems.crypto.wJceEncKeys packagePayload.input length = 11
- 2014-04-18 09:57:32.380 INFO com.wikidsystems.server.DeviceTransactionExec Issued passcode to device -4566245656622438335
- 2014-04-18 09:57:32.375 DEBUG com.wikidsystems.server.DeviceTransactionExec Inserting new valid passcode for device-4566245656622438335
- 2014-04-18 09:57:32.374 DEBUG com.wikidsystems.server.DeviceTransactionExec Submitted PIN verified
- 2014-04-18 09:57:32.373 DEBUG com.wikidsystems.crypto.wJceEncKeys exportPubKey length: 162
- 2014-04-18 09:57:32.373 DEBUG com.wikidsystems.server.DeviceTransactionExec Read 16 bytes for AESSeed
- 2014-04-18 09:57:32.372 DEBUG com.wikidsystems.server.DeviceTransactionExec Decrypted client transaction
- 2014-04-18 09:57:32.372 DEBUG com.wikidsystems.server.DeviceTransactionExec Read PIN from transaction
- 2014-04-18 09:57:32.372 DEBUG com.wikidsystems.crypto.wJceEncKeys number of blocks converted: 1
- 2014-04-18 09:57:32.370 DEBUG com.wikidsystems.crypto.wJceEncKeys Cipher's block size is 128
- 2014-04-18 09:57:32.369 DEBUG com.wikidsystems.crypto.wJceEncKeys convertBlocks.input length = 128
- 2014-04-18 09:57:32.368 DEBUG com.wikidsystems.server.DeviceTransactionExec Loaded domain keys
- 2014-04-18 09:57:32.368 DEBUG com.wikidsystems.crypto.wJceEncKeys pub length = 294
- 2014-04-18 09:57:32.367 DEBUG com.wikidsystems.crypto.wJceEncKeys priv length = 636
- 2014-04-18 09:57:32.367 DEBUG com.wikidsystems.crypto.wJceEncKeys keyAlg = RSA; cipher = RSA/ECB/PKCS1PADDING
- 2014-04-18 09:57:32.367 DEBUG com.wikidsystems.crypto.wJceEncKeys pub length = 162
- 2014-04-18 09:57:32.366 DEBUG com.wikidsystems.crypto.wJceEncKeys keyAlg = RSA; cipher = RSA/ECB/PKCS1PADDING
- 2014-04-18 09:57:32.365 DEBUG com.wikidsystems.crypto.wJceEncKeysFactory keyAlg = RSA; cipher = RSA/ECB/PKCS1PADDING, keySize = 1024
- 2014-04-18 09:57:32.365 DEBUG com.wikidsystems.server.ServletCrypto hashKey: 010067123060/1
- 2014-04-18 09:57:32.365 DEBUG com.wikidsystems.server.ServletCrypto getDomKeyAndFactory()
- 2014-04-18 09:57:32.364 DEBUG com.wikidsystems.server.DeviceTransactionExec Got database connection
- 2014-04-18 09:57:32.363 DEBUG com.wikidsystems.server.WikidCode3AES Beginning passcode request processing...
- 100 rows returned
- Jump to Page: 1 2 [Next]
- Filter Icon = Filter by this item.
- WiKID Systems, Inc. |||
- Top of Page |||
- Feedback |||
- Copyright 2001-2014 WiKID Systems, Inc. :: Terms and Conditions :: wikid-server-enterprise-3.5.0-b1542
Advertisement
Add Comment
Please, Sign In to add comment