Répétition de l'urpmi --update
fichier auth.log
Système et matériels / Installation et configuration

dantou Membre non connecté
-
- Voir le profil du membre dantou
- Inscrit le : 04/01/2011
- Groupes :
Dans "auth.log", je remarque qu'il répète sans cesse la même procédure
Caché:
d[1604]: Server listening on 0.0.0.0 port 22.
Aug 10 10:13:02 localhost sshd[1604]: Server listening on :: port 22.
Aug 10 10:13:16 localhost kdm: :0[2012]: pam_succeed_if(kdm:auth): no condition detected; module succeeded
Aug 10 10:13:16 localhost kdm: :0[2012]: pam_succeed_if(kdm:auth): requirement "user ingroup nopasswdlogin" not met by user "dan"
Aug 10 10:13:16 localhost kdm: :0[2012]: pam_tcb(kdm:auth): Authentication passed for dan from (uid=0)
Aug 10 10:13:16 localhost kdm: :0[2012]: pam_kwallet(kdm:auth): pam_sm_authenticate
Aug 10 10:13:16 localhost kdm: :0[2012]: pam_kwallet(kdm:setcred): pam_sm_setcred
Aug 10 10:13:16 localhost systemd-logind[799]: New session c1 of user dan.
Aug 10 10:13:16 localhost systemd: pam_tcb(systemd-user:session): Session opened for dan by (uid=0)
Aug 10 10:13:16 localhost kdm: :0[2012]: pam_tcb(kdm:session): Session opened for dan by (uid=0)
Aug 10 10:13:16 localhost kdm: :0[2012]: pam_kwallet(kdm:session): pam_sm_open_session
Aug 10 10:13:16 localhost kdm: :0[2012]: pam_kwallet(kdm:session): pam-kwallet: final socket path: /tmp//dan.socket
Aug 10 10:13:22 localhost polkitd[2495]: Loading rules from directory /etc/polkit-1/rules.d
Aug 10 10:13:22 localhost polkitd[2495]: Loading rules from directory /usr/share/polkit-1/rules.d
Aug 10 10:13:22 localhost polkitd[2495]: Finished loading, compiling and executing 4 rules
Aug 10 10:13:22 localhost polkitd[2495]: Acquired the name org.freedesktop.PolicyKit1 on the system bus
Aug 10 10:13:40 localhost polkitd[2495]: Registered Authentication Agent for unix-session:c1 (system bus name :1.48 [/usr/lib64/kde4/libexec/polkit-kde-authentication-agent-1], object path /org/kde/PolicyKit1/AuthenticationAgent, locale fr_FR.UTF-8)
Aug 10 10:16:20 localhost su: pam_tcb(su:auth): Authentication passed for root from dan(uid=1001)
Aug 10 10:16:20 localhost su: (to root) dan on pts/1
Aug 10 10:16:20 localhost su: pam_tcb(su:session): Session opened for root by dan(uid=1001)
Aug 10 10:17:51 localhost polkit-agent-helper-1[4863]: pam_tcb(polkit-1:auth): Authentication passed for root from (uid=1001)
Aug 10 10:17:51 localhost polkitd[2495]: Operator of unix-session:c1 successfully authenticated as unix-user:root to gain TEMPORARY authorization for action org.mageia.drakconf.pkexec.run for unix-process:4858:30820 [/usr/bin/perl /usr/bin/drakconf] (owned by unix-user:dan)
Aug 10 10:17:51 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:17:51 localhost pkexec[4861]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/home/dan] [COMMAND=/usr/libexec/drakconf]
Aug 10 10:18:16 localhost su: pam_tcb(su:session): Session closed for root
Aug 10 10:18:43 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:18:43 localhost pkexec[5290]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update --update]
Aug 10 10:19:02 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:19:02 localhost pkexec[5416]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports]
Aug 10 10:19:08 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:19:08 localhost pkexec[5465]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports]
Aug 10 10:19:14 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:19:14 localhost pkexec[5512]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports]
Aug 10 10:19:21 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:19:21 localhost pkexec[5576]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports]
Aug 10 10:19:27 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:19:27 localhost pkexec[5623]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports]
Aug 10 10:19:33 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:19:33 localhost pkexec[5670]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports]
Aug 10 10:19:40 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:19:40 localhost pkexec[5718]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib7)]
Aug 10 10:19:47 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:19:47 localhost pkexec[5766]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib17)]
Aug 10 10:19:53 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:19:53 localhost pkexec[5813]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib27)]
Aug 10 10:20:00 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:20:00 localhost pkexec[5875]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib34)]
Aug 10 10:20:06 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:20:06 localhost pkexec[5923]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib39)]
Aug 10 10:20:08 localhost su: pam_tcb(su:auth): Authentication failed for root from dan(uid=1001)
Aug 10 10:20:09 localhost su: FAILED SU (to root) dan on pts/1
Aug 10 10:20:12 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:20:12 localhost pkexec[5970]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib44)]
Aug 10 10:20:17 localhost su: pam_tcb(su:auth): Authentication passed for root from dan(uid=1001)
Aug 10 10:20:17 localhost su: (to root) dan on pts/1
Aug 10 10:20:17 localhost su: pam_tcb(su:session): Session opened for root by dan(uid=1001)
Aug 10 10:20:19 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:20:19 localhost pkexec[6061]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib52)]
Aug 10 10:20:25 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:20:25 localhost pkexec[6107]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib62)]
Aug 10 10:20:31 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:20:31 localhost pkexec[6154]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib72)]
Aug 10 10:20:39 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:20:39 localhost pkexec[6221]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib79)]
Aug 10 10:20:45 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:20:45 localhost pkexec[6266]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib84)]
Aug 10 10:20:51 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:20:51 localhost pkexec[6314]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib89)]
Aug 10 10:23:44 localhost polkit-agent-helper-1[7423]: pam_tcb(polkit-1:auth): Authentication passed for root from (uid=1001)
Aug 10 10:23:44 localhost polkitd[2495]: Operator of unix-session:c1 successfully authenticated as unix-user:root to gain TEMPORARY authorization for action org.mageia.drakconf.pkexec.run for unix-process:7418:66209 [/usr/bin/perl /usr/bin/drakconf] (owned by unix-user:dan)
Aug 10 10:23:44 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:23:44 localhost pkexec[7421]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/home/dan] [COMMAND=/usr/libexec/drakconf]
Aug 10 11:01:01 localhost crond[21846]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 10 11:01:03 localhost CROND[21846]: pam_tcb(crond:session): Session closed for root
Aug 10 12:01:01 localhost crond[20062]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 10 12:01:02 localhost CROND[20062]: pam_tcb(crond:session): Session closed for root
Aug 10 13:01:01 localhost crond[11041]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 10 13:01:02 localhost CROND[11041]: pam_tcb(crond:session): Session closed for root
Aug 10 13:18:43 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:18:43 localhost pkexec[20957]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update --update]
Aug 10 13:19:04 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:19:04 localhost pkexec[21179]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports]
Aug 10 13:19:10 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:19:10 localhost pkexec[21253]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports]
Aug 10 13:19:16 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:19:16 localhost pkexec[21331]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports]
Aug 10 13:19:23 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:19:23 localhost pkexec[21414]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports]
Aug 10 13:19:29 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:19:29 localhost pkexec[21486]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports]
Aug 10 13:19:35 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:19:35 localhost pkexec[21567]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports]
Aug 10 13:19:42 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:19:42 localhost pkexec[21659]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib7)]
Aug 10 13:19:49 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:19:49 localhost pkexec[21732]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib17)]
Aug 10 13:19:55 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:19:55 localhost pkexec[21802]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib27)]
Aug 10 13:20:02 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:20:02 localhost pkexec[21884]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib34)]
Aug 10 13:20:08 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:20:08 localhost pkexec[21959]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib39)]
Aug 10 13:20:14 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:20:14 localhost pkexec[22040]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib44)]
Aug 10 13:20:21 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:20:21 localhost pkexec[22126]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib52)]
Aug 10 13:20:27 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:20:27 localhost pkexec[22203]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib62)]
Aug 10 13:20:34 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:20:34 localhost pkexec[22278]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib72)]
Aug 10 13:20:41 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:20:41 localhost pkexec[22359]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib79)]
Aug 10 13:20:47 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:20:47 localhost pkexec[22433]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib84)]
Aug 10 13:20:53 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:20:53 localhost pkexec[22505]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib89)]
Aug 10 14:01:01 localhost crond[16026]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 10 14:01:02 localhost CROND[16026]: pam_tcb(crond:session): Session closed for root
Aug 10 15:01:01 localhost crond[16022]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 10 15:01:01 localhost CROND[16022]: pam_tcb(crond:session): Session closed for root
Aug 10 16:01:01 localhost crond[6901]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 10 16:01:02 localhost CROND[6901]: pam_tcb(crond:session): Session closed for root
Aug 10 16:18:43 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:18:43 localhost pkexec[13649]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update --update]
Aug 10 16:19:02 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:19:02 localhost pkexec[13775]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports]
Aug 10 16:19:08 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:19:08 localhost pkexec[13823]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports]
Aug 10 16:19:14 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:19:14 localhost pkexec[13869]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports]
Aug 10 16:19:21 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:19:21 localhost pkexec[13932]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports]
Aug 10 16:19:28 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:19:28 localhost pkexec[13979]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports]
Aug 10 16:19:34 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:19:34 localhost pkexec[14027]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports]
Aug 10 16:19:41 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:19:41 localhost pkexec[14077]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib7)]
Aug 10 16:19:47 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:19:47 localhost pkexec[14124]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib17)]
Aug 10 16:19:53 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:19:53 localhost pkexec[14169]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib27)]
Aug 10 16:20:01 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:20:01 localhost pkexec[14231]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib34)]
Aug 10 16:20:07 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:20:07 localhost pkexec[14278]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib39)]
Aug 10 16:20:13 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:20:13 localhost pkexec[14327]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib44)]
Aug 10 16:20:20 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:20:20 localhost pkexec[14377]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib52)]
Aug 10 16:20:26 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:20:26 localhost pkexec[14425]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib62)]
Aug 10 16:20:33 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:20:33 localhost pkexec[14485]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib72)]
Aug 10 16:20:40 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:20:40 localhost pkexec[14537]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib79)]
Aug 10 16:20:47 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:20:47 localhost pkexec[14584]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib84)]
Aug 10 16:20:53 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:20:53 localhost pkexec[14629]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib89)]
Aug 10 17:01:01 localhost crond[4200]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 10 17:01:05 localhost CROND[4200]: pam_tcb(crond:session): Session closed for root
Aug 10 18:01:01 localhost crond[5522]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 10 18:01:03 localhost CROND[5522]: pam_tcb(crond:session): Session closed for root
Aug 10 19:01:01 localhost crond[11806]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 10 19:01:02 localhost CROND[11806]: pam_tcb(crond:session): Session closed for root
Aug 10 19:18:43 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:18:43 localhost pkexec[19217]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update --update]
Aug 10 19:19:02 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:19:02 localhost pkexec[19337]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports]
Aug 10 19:19:08 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:19:08 localhost pkexec[19384]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports]
Aug 10 19:19:15 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:19:15 localhost pkexec[19438]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports]
Aug 10 19:19:22 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:19:22 localhost pkexec[19488]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports]
Aug 10 19:19:28 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:19:28 localhost pkexec[19534]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports]
Aug 10 19:19:34 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:19:34 localhost pkexec[19582]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports]
Aug 10 19:19:41 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:19:41 localhost pkexec[19631]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib7)]
Aug 10 19:19:48 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:19:48 localhost pkexec[19690]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib17)]
Aug 10 19:19:54 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:19:54 localhost pkexec[19737]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib27)]
Aug 10 19:20:01 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:20:01 localhost pkexec[19783]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib34)]
Aug 10 19:20:07 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:20:07 localhost pkexec[19830]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib39)]
Aug 10 19:20:13 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:20:13 localhost pkexec[19877]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib44)]
Aug 10 19:20:20 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:20:20 localhost pkexec[19927]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib52)]
Aug 10 19:20:27 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:20:27 localhost pkexec[19985]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib62)]
Aug 10 19:20:33 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:20:33 localhost pkexec[20034]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib72)]
Aug 10 19:20:40 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:20:40 localhost pkexec[20083]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib79)]
Aug 10 19:20:46 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:20:46 localhost pkexec[20130]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib84)]
Aug 10 19:20:53 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:20:53 localhost pkexec[20179]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib89)]
Aug 10 20:01:01 localhost crond[9570]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 10 20:01:01 localhost CROND[9570]: pam_tcb(crond:session): Session closed for root
Aug 10 21:01:01 localhost crond[8941]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 10 21:01:02 localhost CROND[8941]: pam_tcb(crond:session): Session closed for root
Aug 10 22:01:01 localhost crond[15198]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 10 22:01:04 localhost CROND[15198]: pam_tcb(crond:session): Session closed for root
Aug 10 22:18:43 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:18:43 localhost pkexec[26602]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update --update]
Aug 10 22:19:01 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:19:01 localhost pkexec[26801]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports]
Aug 10 22:19:08 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:19:08 localhost pkexec[26873]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports]
Aug 10 22:19:14 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:19:14 localhost pkexec[26930]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports]
Aug 10 22:19:21 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:19:21 localhost pkexec[27021]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports]
Aug 10 22:19:27 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:19:27 localhost pkexec[27092]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports]
Aug 10 22:19:33 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:19:33 localhost pkexec[27164]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports]
Aug 10 22:19:40 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:19:40 localhost pkexec[27246]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib7)]
Aug 10 22:19:46 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:19:46 localhost pkexec[27318]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib17)]
Aug 10 22:19:52 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:19:52 localhost pkexec[27395]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib27)]
Aug 10 22:19:59 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:19:59 localhost pkexec[27471]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib34)]
Aug 10 22:20:05 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:20:05 localhost pkexec[27547]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib39)]
Aug 10 22:20:11 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:20:11 localhost pkexec[27622]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib44)]
Aug 10 22:20:18 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:20:18 localhost pkexec[27719]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib52)]
Aug 10 22:20:24 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:20:24 localhost pkexec[27792]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib62)]
Aug 10 22:20:30 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:20:30 localhost pkexec[27872]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib72)]
Aug 10 22:20:37 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:20:37 localhost pkexec[27953]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib79)]
Aug 10 22:20:43 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:20:43 localhost pkexec[28034]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib84)]
Aug 10 22:20:49 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:20:49 localhost pkexec[28109]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib89)]
Aug 10 23:01:01 localhost crond[21671]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 10 23:01:01 localhost CROND[21671]: pam_tcb(crond:session): Session closed for root
Aug 11 00:01:01 localhost crond[18907]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 11 00:01:02 localhost CROND[18907]: pam_tcb(crond:session): Session closed for root
Aug 11 01:01:01 localhost crond[9234]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 11 01:01:03 localhost CROND[9234]: pam_tcb(crond:session): Session closed for root
Aug 11 01:01:22 localhost su: pam_tcb(su:session): Session closed for root
Aug 11 01:18:43 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:18:43 localhost pkexec[16496]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update --update]
Aug 11 01:19:01 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:19:01 localhost pkexec[16627]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports]
Aug 11 01:19:08 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:19:08 localhost pkexec[16675]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports]
Aug 11 01:19:14 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:19:14 localhost pkexec[16719]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports]
Aug 11 01:19:21 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:19:21 localhost pkexec[16780]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports]
Aug 11 01:19:28 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:19:28 localhost pkexec[16827]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports]
Aug 11 01:19:34 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:19:34 localhost pkexec[16873]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports]
Aug 11 01:19:41 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:19:41 localhost pkexec[16921]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib7)]
Aug 11 01:19:47 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:19:47 localhost pkexec[16969]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib17)]
Aug 11 01:19:53 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:19:53 localhost pkexec[17013]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib27)]
Aug 11 01:20:00 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:20:00 localhost pkexec[17074]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib34)]
Aug 11 01:20:06 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:20:06 localhost pkexec[17122]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib39)]
Aug 11 01:20:12 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:20:12 localhost pkexec[17171]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib44)]
Aug 11 01:20:19 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:20:19 localhost pkexec[17217]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib52)]
Aug 11 01:20:25 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:20:25 localhost pkexec[17280]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib62)]
Aug 11 01:20:31 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:20:31 localhost pkexec[17326]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib72)]
Aug 11 01:20:38 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:20:38 localhost pkexec[17376]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib79)]
Aug 11 01:20:44 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:20:44 localhost pkexec[17422]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib84)]
Aug 11 01:20:50 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:20:50 localhost pkexec[17469]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib89)]
Aug 11 01:22:21 localhost polkitd[2495]: Unregistered Authentication Agent for unix-session:c1 (system bus name :1.48, object path /org/kde/PolicyKit1/AuthenticationAgent, locale fr_FR.UTF-8)
Aug 11 01:22:21 localhost kdm: :0[2012]: pam_tcb(kdm:session): Session closed for dan
Aug 11 01:22:21 localhost kdm: :0[2012]: pam_kwallet(kdm:session): pam_sm_close_session
Aug 11 01:22:21 localhost kdm: :0[2012]: pam_kwallet(kdm:setcred): pam_sm_setcred
Aug 11 01:22:22 localhost sshd[1604]: Received signal 15; terminating.
Aug 11 11:06:06 localhost sshd[1638]: Server listening on 0.0.0.0 port 22.
Aug 11 11:06:06 localhost sshd[1638]: Server listening on :: port 22.
Aug 11 11:06:39 localhost kdm: :0[2016]: pam_succeed_if(kdm:auth): no condition detected; module succeeded
Aug 11 11:06:39 localhost kdm: :0[2016]: pam_succeed_if(kdm:auth): requirement "user ingroup nopasswdlogin" not met by user "dan"
Aug 11 11:06:39 localhost kdm: :0[2016]: pam_tcb(kdm:auth): Authentication passed for dan from (uid=0)
Aug 11 11:06:39 localhost kdm: :0[2016]: pam_kwallet(kdm:auth): pam_sm_authenticate
Aug 11 11:06:39 localhost kdm: :0[2016]: pam_kwallet(kdm:setcred): pam_sm_setcred
Aug 11 11:06:39 localhost systemd-logind[801]: New session c1 of user dan.
Aug 11 11:06:39 localhost systemd: pam_tcb(systemd-user:session): Session opened for dan by (uid=0)
Aug 11 11:06:39 localhost kdm: :0[2016]: pam_tcb(kdm:session): Session opened for dan by (uid=0)
Aug 11 11:06:39 localhost kdm: :0[2016]: pam_kwallet(kdm:session): pam_sm_open_session
Aug 11 11:06:39 localhost kdm: :0[2016]: pam_kwallet(kdm:session): pam-kwallet: final socket path: /tmp//dan.socket
Aug 11 11:06:45 localhost polkitd[2597]: Loading rules from directory /etc/polkit-1/rules.d
Aug 11 11:06:45 localhost polkitd[2597]: Loading rules from directory /usr/share/polkit-1/rules.d
Aug 11 11:06:45 localhost polkitd[2597]: Finished loading, compiling and executing 4 rules
Aug 11 11:06:45 localhost polkitd[2597]: Acquired the name org.freedesktop.PolicyKit1 on the system bus
Aug 11 11:06:59 localhost polkitd[2597]: Registered Authentication Agent for unix-session:c1 (system bus name :1.46 [/usr/lib64/kde4/libexec/polkit-kde-authentication-agent-1], object path /org/kde/PolicyKit1/AuthenticationAgent, locale fr_FR.UTF-8)
Aug 11 11:12:06 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:12:06 localhost pkexec[5033]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update --update]
Aug 11 11:12:24 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:12:24 localhost pkexec[5158]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports]
Aug 11 11:12:30 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:12:30 localhost pkexec[5205]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports]
Aug 11 11:12:37 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:12:37 localhost pkexec[5264]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports]
Aug 11 11:12:44 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:12:44 localhost pkexec[5315]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports]
Aug 11 11:12:50 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:12:50 localhost pkexec[5371]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports]
Aug 11 11:12:56 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:12:56 localhost pkexec[5436]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports]
Aug 11 11:13:03 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:13:03 localhost pkexec[5526]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib7)]
Aug 11 11:13:09 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:13:09 localhost pkexec[5606]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib17)]
Aug 11 11:13:16 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:13:16 localhost pkexec[5653]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib27)]
Aug 11 11:13:23 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:13:23 localhost pkexec[5710]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib34)]
Aug 11 11:13:29 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:13:29 localhost pkexec[5759]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib39)]
Aug 11 11:13:36 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:13:36 localhost pkexec[5814]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib44)]
Aug 11 11:13:43 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:13:43 localhost pkexec[5873]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib52)]
Aug 11 11:13:49 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:13:49 localhost pkexec[5931]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib62)]
Aug 11 11:13:56 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:13:56 localhost pkexec[5980]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib72)]
Aug 11 11:14:02 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:14:02 localhost pkexec[6030]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib79)]
Aug 11 11:14:09 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:14:09 localhost pkexec[6070]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib84)]
Aug 11 11:14:15 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:14:15 localhost pkexec[6109]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib89)]
Aug 11 11:51:39 localhost polkit-agent-helper-1[21202]: pam_tcb(polkit-1:auth): Authentication passed for root from (uid=1001)
Aug 11 11:51:39 localhost polkitd[2597]: Operator of unix-session:c1 successfully authenticated as unix-user:root to gain TEMPORARY authorization for action org.mageia.drakconf.pkexec.run for unix-process:21197:275455 [/usr/bin/perl /usr/bin/drakconf] (owned by unix-user:dan)
Aug 11 11:51:39 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:51:39 localhost pkexec[21200]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/home/dan] [COMMAND=/usr/libexec/drakconf]
Aug 11 11:57:07 localhost polkit-agent-helper-1[23345]: pam_tcb(polkit-1:auth): Authentication passed for root from (uid=1001)
Aug 11 11:57:07 localhost polkitd[2597]: Operator of unix-session:c1 successfully authenticated as unix-user:root to gain TEMPORARY authorization for action org.mageia.drakconf.pkexec.run for unix-process:23340:308213 [/usr/bin/perl /usr/bin/drakconf] (owned by unix-user:dan)
Aug 11 11:57:07 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:57:07 localhost pkexec[23343]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/home/dan] [COMMAND=/usr/libexec/drakconf]
Aug 11 12:01:01 localhost crond[24903]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 11 12:01:02 localhost CROND[24903]: pam_tcb(crond:session): Session closed for root
Aug 11 13:01:01 localhost crond[18824]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 11 13:01:03 localhost CROND[18824]: pam_tcb(crond:session): Session closed for root
Aug 11 14:01:01 localhost crond[20377]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 11 14:01:02 localhost CROND[20377]: pam_tcb(crond:session): Session closed for root
Aug 11 15:01:01 localhost crond[11851]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 11 15:01:03 localhost CROND[11851]: pam_tcb(crond:session): Session closed for root
Aug 11 16:01:01 localhost crond[13307]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 11 16:01:02 localhost CROND[13307]: pam_tcb(crond:session): Session closed for root
Aug 11 17:01:02 localhost crond[7210]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 11 17:01:04 localhost CROND[7210]: pam_tcb(crond:session): Session closed for root
Aug 11 17:12:29 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:12:29 localhost pkexec[11655]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update --update]
Aug 11 17:12:49 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:12:49 localhost pkexec[11804]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports]
Aug 11 17:12:56 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:12:56 localhost pkexec[11852]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports]
Aug 11 17:13:02 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:13:02 localhost pkexec[11902]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports]
Aug 11 17:13:09 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:13:09 localhost pkexec[11994]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports]
Aug 11 17:13:15 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:13:15 localhost pkexec[12086]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports]
Aug 11 17:13:21 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:13:21 localhost pkexec[12173]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports]
Aug 11 17:13:28 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:13:28 localhost pkexec[12282]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib7)]
Aug 11 17:13:34 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:13:34 localhost pkexec[12371]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib17)]
Aug 11 17:13:41 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:13:41 localhost pkexec[12457]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib27)]
Aug 11 17:13:48 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:13:48 localhost pkexec[12553]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib34)]
Aug 11 17:13:54 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:13:54 localhost pkexec[12640]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib39)]
Aug 11 17:14:00 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:14:00 localhost pkexec[12730]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib44)]
Aug 11 17:14:07 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:14:07 localhost pkexec[12836]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib52)]
Aug 11 17:14:14 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:14:14 localhost pkexec[12925]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib62)]
Aug 11 17:14:20 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:14:20 localhost pkexec[13015]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib72)]
Aug 11 17:14:27 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:14:27 localhost pkexec[13110]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib79)]
Aug 11 17:14:33 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:14:33 localhost pkexec[13202]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib84)]
Aug 11 17:14:40 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:14:40 localhost pkexec[13292]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib89)]
Aug 11 18:01:01 localhost crond[9152]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 11 18:01:03 localhost CROND[9152]: pam_tcb(crond:session): Session closed for root
Aug 11 18:21:33 localhost su: pam_tcb(su:auth): Authentication passed for root from (uid=1001)
Aug 11 18:21:33 localhost su: (to root) dan on pts/3
Aug 11 18:21:33 localhost su: pam_tcb(su:session): Session opened for root by (uid=1001)
Aug 11 18:21:33 localhost su: pam_tcb(su:session): Session closed for root
Aug 11 18:21:33 localhost su: pam_tcb(su:auth): Authentication passed for root from (uid=1001)
Aug 11 18:21:33 localhost su: (to root) dan on pts/3
Aug 11 18:21:33 localhost su: pam_tcb(su:session): Session opened for root by (uid=1001)
Aug 11 18:21:33 localhost su: pam_tcb(su:session): Session closed for root
Aug 11 18:21:54 localhost su: pam_tcb(su:auth): Authentication passed for root from (uid=1001)
Aug 11 18:21:54 localhost su: (to root) dan on pts/3
Aug 11 18:21:54 localhost su: pam_tcb(su:session): Session opened for root by (uid=1001)
Aug 11 18:21:54 localhost su: pam_tcb(su:session): Session closed for root
Aug 11 18:21:54 localhost su: pam_tcb(su:auth): Authentication passed for root from (uid=1001)
Aug 11 18:21:54 localhost su: (to root) dan on pts/3
Aug 11 18:21:54 localhost su: pam_tcb(su:session): Session opened for root by (uid=1001)
Aug 11 18:21:55 localhost su: pam_tcb(su:session): Session closed for root
Aug 11 18:23:51 localhost su: pam_tcb(su:auth): Authentication passed for root from (uid=1001)
Aug 11 18:23:51 localhost su: (to root) dan on pts/3
Aug 11 18:23:51 localhost su: pam_tcb(su:session): Session opened for root by (uid=1001)
Aug 11 18:23:51 localhost su: pam_tcb(su:session): Session closed for root
Aug 11 18:23:52 localhost su: pam_tcb(su:auth): Authentication passed for root from (uid=1001)
Aug 11 18:23:52 localhost su: (to root) dan on pts/3
Aug 11 18:23:52 localhost su: pam_tcb(su:session): Session opened for root by (uid=1001)
Aug 11 18:54:29 localhost su: pam_tcb(su:session): Session closed for root
Aug 11 19:01:01 localhost crond[1566]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 11 19:01:03 localhost CROND[1566]: pam_tcb(crond:session): Session closed for root
Aug 11 20:01:01 localhost crond[9434]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 11 20:01:03 localhost CROND[9434]: pam_tcb(crond:session): Session closed for root
Aug 11 20:12:09 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:12:09 localhost pkexec[13911]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update --update]
Aug 11 20:12:28 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:12:28 localhost pkexec[14068]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports]
Aug 11 20:12:35 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:12:35 localhost pkexec[14117]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports]
Aug 11 20:12:41 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:12:41 localhost pkexec[14164]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports]
Aug 11 20:12:48 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:12:48 localhost pkexec[14217]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports]
Aug 11 20:12:54 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:12:54 localhost pkexec[14265]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports]
Aug 11 20:13:00 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:13:00 localhost pkexec[14312]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports]
Aug 11 20:13:07 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:13:07 localhost pkexec[14375]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib7)]
Aug 11 20:13:14 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:13:14 localhost pkexec[14422]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib17)]
Aug 11 20:13:20 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:13:20 localhost pkexec[14470]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib27)]
Aug 11 20:13:27 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:13:27 localhost pkexec[14521]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib34)]
Aug 11 20:13:33 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:13:33 localhost pkexec[14570]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib39)]
Aug 11 20:13:39 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:13:39 localhost pkexec[14622]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib44)]
Aug 11 20:13:46 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:13:46 localhost pkexec[14685]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib52)]
Aug 11 20:13:53 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:13:53 localhost pkexec[14733]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib62)]
Aug 11 20:13:59 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:13:59 localhost pkexec[14780]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib72)]
Aug 11 20:14:06 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:14:06 localhost pkexec[14827]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib79)]
Aug 11 20:14:12 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:14:12 localhost pkexec[14878]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib84)]
Aug 11 20:14:19 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:14:19 localhost pkexec[14939]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib89)]
Aug 11 21:01:01 localhost crond[8059]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 11 21:01:03 localhost CROND[8059]: pam_tcb(crond:session): Session closed for root
Aug 11 22:01:01 localhost crond[20715]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 11 22:01:02 localhost CROND[20715]: pam_tcb(crond:session): Session closed for root
Aug 11 23:01:01 localhost crond[30161]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 11 23:01:03 localhost CROND[30161]: pam_tcb(crond:session): Session closed for root
Aug 11 23:12:07 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 23:12:07 localhost pkexec[2287]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update --update]
Aug 11 23:12:26 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 23:12:26 localhost pkexec[2428]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports]
Aug 11 23:12:32 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 23:12:32 localhost pkexec[2476]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports]
Aug 11 23:12:39 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 23:12:39 localhost pkexec[2527]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports]
Aug 11 23:12:46 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 23:12:46 localhost pkexec[2619]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports]
Aug 11 23:12:52 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 23:12:52 localhost pkexec[2681]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports]
Aug 11 23:12:58 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 23:12:58 localhost pkexec[2750]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports]
Aug 11 23:13:05 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 23:13:05 localhost pkexec[2827]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib7)]
Aug 11 23:13:11 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 23:13:11 localhost pkexec[2957]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib17)]
Aug 11 23:13:17 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 23:13:17 localhost pkexec[3022]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib27)]
Aug 11 23:13:25 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 23:13:25 localhost pkexec[3076]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib34)]
Aug 11 23:13:31 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 23:13:31 localhost pkexec[3144]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib39)]
Aug 11 23:13:37 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 23:13:37 localhost pkexec[3219]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib44)]
Aug 11 23:13:44 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 23:13:44 localhost pkexec[3273]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core
Aug 10 10:13:02 localhost sshd[1604]: Server listening on :: port 22.
Aug 10 10:13:16 localhost kdm: :0[2012]: pam_succeed_if(kdm:auth): no condition detected; module succeeded
Aug 10 10:13:16 localhost kdm: :0[2012]: pam_succeed_if(kdm:auth): requirement "user ingroup nopasswdlogin" not met by user "dan"
Aug 10 10:13:16 localhost kdm: :0[2012]: pam_tcb(kdm:auth): Authentication passed for dan from (uid=0)
Aug 10 10:13:16 localhost kdm: :0[2012]: pam_kwallet(kdm:auth): pam_sm_authenticate
Aug 10 10:13:16 localhost kdm: :0[2012]: pam_kwallet(kdm:setcred): pam_sm_setcred
Aug 10 10:13:16 localhost systemd-logind[799]: New session c1 of user dan.
Aug 10 10:13:16 localhost systemd: pam_tcb(systemd-user:session): Session opened for dan by (uid=0)
Aug 10 10:13:16 localhost kdm: :0[2012]: pam_tcb(kdm:session): Session opened for dan by (uid=0)
Aug 10 10:13:16 localhost kdm: :0[2012]: pam_kwallet(kdm:session): pam_sm_open_session
Aug 10 10:13:16 localhost kdm: :0[2012]: pam_kwallet(kdm:session): pam-kwallet: final socket path: /tmp//dan.socket
Aug 10 10:13:22 localhost polkitd[2495]: Loading rules from directory /etc/polkit-1/rules.d
Aug 10 10:13:22 localhost polkitd[2495]: Loading rules from directory /usr/share/polkit-1/rules.d
Aug 10 10:13:22 localhost polkitd[2495]: Finished loading, compiling and executing 4 rules
Aug 10 10:13:22 localhost polkitd[2495]: Acquired the name org.freedesktop.PolicyKit1 on the system bus
Aug 10 10:13:40 localhost polkitd[2495]: Registered Authentication Agent for unix-session:c1 (system bus name :1.48 [/usr/lib64/kde4/libexec/polkit-kde-authentication-agent-1], object path /org/kde/PolicyKit1/AuthenticationAgent, locale fr_FR.UTF-8)
Aug 10 10:16:20 localhost su: pam_tcb(su:auth): Authentication passed for root from dan(uid=1001)
Aug 10 10:16:20 localhost su: (to root) dan on pts/1
Aug 10 10:16:20 localhost su: pam_tcb(su:session): Session opened for root by dan(uid=1001)
Aug 10 10:17:51 localhost polkit-agent-helper-1[4863]: pam_tcb(polkit-1:auth): Authentication passed for root from (uid=1001)
Aug 10 10:17:51 localhost polkitd[2495]: Operator of unix-session:c1 successfully authenticated as unix-user:root to gain TEMPORARY authorization for action org.mageia.drakconf.pkexec.run for unix-process:4858:30820 [/usr/bin/perl /usr/bin/drakconf] (owned by unix-user:dan)
Aug 10 10:17:51 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:17:51 localhost pkexec[4861]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/home/dan] [COMMAND=/usr/libexec/drakconf]
Aug 10 10:18:16 localhost su: pam_tcb(su:session): Session closed for root
Aug 10 10:18:43 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:18:43 localhost pkexec[5290]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update --update]
Aug 10 10:19:02 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:19:02 localhost pkexec[5416]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports]
Aug 10 10:19:08 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:19:08 localhost pkexec[5465]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports]
Aug 10 10:19:14 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:19:14 localhost pkexec[5512]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports]
Aug 10 10:19:21 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:19:21 localhost pkexec[5576]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports]
Aug 10 10:19:27 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:19:27 localhost pkexec[5623]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports]
Aug 10 10:19:33 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:19:33 localhost pkexec[5670]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports]
Aug 10 10:19:40 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:19:40 localhost pkexec[5718]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib7)]
Aug 10 10:19:47 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:19:47 localhost pkexec[5766]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib17)]
Aug 10 10:19:53 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:19:53 localhost pkexec[5813]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib27)]
Aug 10 10:20:00 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:20:00 localhost pkexec[5875]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib34)]
Aug 10 10:20:06 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:20:06 localhost pkexec[5923]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib39)]
Aug 10 10:20:08 localhost su: pam_tcb(su:auth): Authentication failed for root from dan(uid=1001)
Aug 10 10:20:09 localhost su: FAILED SU (to root) dan on pts/1
Aug 10 10:20:12 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:20:12 localhost pkexec[5970]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib44)]
Aug 10 10:20:17 localhost su: pam_tcb(su:auth): Authentication passed for root from dan(uid=1001)
Aug 10 10:20:17 localhost su: (to root) dan on pts/1
Aug 10 10:20:17 localhost su: pam_tcb(su:session): Session opened for root by dan(uid=1001)
Aug 10 10:20:19 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:20:19 localhost pkexec[6061]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib52)]
Aug 10 10:20:25 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:20:25 localhost pkexec[6107]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib62)]
Aug 10 10:20:31 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:20:31 localhost pkexec[6154]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib72)]
Aug 10 10:20:39 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:20:39 localhost pkexec[6221]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib79)]
Aug 10 10:20:45 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:20:45 localhost pkexec[6266]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib84)]
Aug 10 10:20:51 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:20:51 localhost pkexec[6314]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib89)]
Aug 10 10:23:44 localhost polkit-agent-helper-1[7423]: pam_tcb(polkit-1:auth): Authentication passed for root from (uid=1001)
Aug 10 10:23:44 localhost polkitd[2495]: Operator of unix-session:c1 successfully authenticated as unix-user:root to gain TEMPORARY authorization for action org.mageia.drakconf.pkexec.run for unix-process:7418:66209 [/usr/bin/perl /usr/bin/drakconf] (owned by unix-user:dan)
Aug 10 10:23:44 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 10:23:44 localhost pkexec[7421]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/home/dan] [COMMAND=/usr/libexec/drakconf]
Aug 10 11:01:01 localhost crond[21846]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 10 11:01:03 localhost CROND[21846]: pam_tcb(crond:session): Session closed for root
Aug 10 12:01:01 localhost crond[20062]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 10 12:01:02 localhost CROND[20062]: pam_tcb(crond:session): Session closed for root
Aug 10 13:01:01 localhost crond[11041]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 10 13:01:02 localhost CROND[11041]: pam_tcb(crond:session): Session closed for root
Aug 10 13:18:43 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:18:43 localhost pkexec[20957]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update --update]
Aug 10 13:19:04 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:19:04 localhost pkexec[21179]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports]
Aug 10 13:19:10 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:19:10 localhost pkexec[21253]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports]
Aug 10 13:19:16 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:19:16 localhost pkexec[21331]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports]
Aug 10 13:19:23 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:19:23 localhost pkexec[21414]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports]
Aug 10 13:19:29 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:19:29 localhost pkexec[21486]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports]
Aug 10 13:19:35 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:19:35 localhost pkexec[21567]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports]
Aug 10 13:19:42 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:19:42 localhost pkexec[21659]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib7)]
Aug 10 13:19:49 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:19:49 localhost pkexec[21732]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib17)]
Aug 10 13:19:55 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:19:55 localhost pkexec[21802]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib27)]
Aug 10 13:20:02 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:20:02 localhost pkexec[21884]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib34)]
Aug 10 13:20:08 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:20:08 localhost pkexec[21959]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib39)]
Aug 10 13:20:14 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:20:14 localhost pkexec[22040]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib44)]
Aug 10 13:20:21 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:20:21 localhost pkexec[22126]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib52)]
Aug 10 13:20:27 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:20:27 localhost pkexec[22203]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib62)]
Aug 10 13:20:34 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:20:34 localhost pkexec[22278]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib72)]
Aug 10 13:20:41 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:20:41 localhost pkexec[22359]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib79)]
Aug 10 13:20:47 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:20:47 localhost pkexec[22433]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib84)]
Aug 10 13:20:53 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 13:20:53 localhost pkexec[22505]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib89)]
Aug 10 14:01:01 localhost crond[16026]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 10 14:01:02 localhost CROND[16026]: pam_tcb(crond:session): Session closed for root
Aug 10 15:01:01 localhost crond[16022]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 10 15:01:01 localhost CROND[16022]: pam_tcb(crond:session): Session closed for root
Aug 10 16:01:01 localhost crond[6901]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 10 16:01:02 localhost CROND[6901]: pam_tcb(crond:session): Session closed for root
Aug 10 16:18:43 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:18:43 localhost pkexec[13649]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update --update]
Aug 10 16:19:02 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:19:02 localhost pkexec[13775]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports]
Aug 10 16:19:08 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:19:08 localhost pkexec[13823]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports]
Aug 10 16:19:14 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:19:14 localhost pkexec[13869]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports]
Aug 10 16:19:21 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:19:21 localhost pkexec[13932]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports]
Aug 10 16:19:28 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:19:28 localhost pkexec[13979]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports]
Aug 10 16:19:34 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:19:34 localhost pkexec[14027]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports]
Aug 10 16:19:41 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:19:41 localhost pkexec[14077]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib7)]
Aug 10 16:19:47 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:19:47 localhost pkexec[14124]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib17)]
Aug 10 16:19:53 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:19:53 localhost pkexec[14169]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib27)]
Aug 10 16:20:01 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:20:01 localhost pkexec[14231]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib34)]
Aug 10 16:20:07 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:20:07 localhost pkexec[14278]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib39)]
Aug 10 16:20:13 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:20:13 localhost pkexec[14327]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib44)]
Aug 10 16:20:20 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:20:20 localhost pkexec[14377]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib52)]
Aug 10 16:20:26 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:20:26 localhost pkexec[14425]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib62)]
Aug 10 16:20:33 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:20:33 localhost pkexec[14485]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib72)]
Aug 10 16:20:40 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:20:40 localhost pkexec[14537]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib79)]
Aug 10 16:20:47 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:20:47 localhost pkexec[14584]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib84)]
Aug 10 16:20:53 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 16:20:53 localhost pkexec[14629]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib89)]
Aug 10 17:01:01 localhost crond[4200]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 10 17:01:05 localhost CROND[4200]: pam_tcb(crond:session): Session closed for root
Aug 10 18:01:01 localhost crond[5522]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 10 18:01:03 localhost CROND[5522]: pam_tcb(crond:session): Session closed for root
Aug 10 19:01:01 localhost crond[11806]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 10 19:01:02 localhost CROND[11806]: pam_tcb(crond:session): Session closed for root
Aug 10 19:18:43 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:18:43 localhost pkexec[19217]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update --update]
Aug 10 19:19:02 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:19:02 localhost pkexec[19337]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports]
Aug 10 19:19:08 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:19:08 localhost pkexec[19384]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports]
Aug 10 19:19:15 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:19:15 localhost pkexec[19438]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports]
Aug 10 19:19:22 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:19:22 localhost pkexec[19488]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports]
Aug 10 19:19:28 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:19:28 localhost pkexec[19534]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports]
Aug 10 19:19:34 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:19:34 localhost pkexec[19582]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports]
Aug 10 19:19:41 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:19:41 localhost pkexec[19631]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib7)]
Aug 10 19:19:48 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:19:48 localhost pkexec[19690]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib17)]
Aug 10 19:19:54 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:19:54 localhost pkexec[19737]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib27)]
Aug 10 19:20:01 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:20:01 localhost pkexec[19783]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib34)]
Aug 10 19:20:07 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:20:07 localhost pkexec[19830]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib39)]
Aug 10 19:20:13 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:20:13 localhost pkexec[19877]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib44)]
Aug 10 19:20:20 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:20:20 localhost pkexec[19927]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib52)]
Aug 10 19:20:27 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:20:27 localhost pkexec[19985]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib62)]
Aug 10 19:20:33 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:20:33 localhost pkexec[20034]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib72)]
Aug 10 19:20:40 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:20:40 localhost pkexec[20083]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib79)]
Aug 10 19:20:46 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:20:46 localhost pkexec[20130]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib84)]
Aug 10 19:20:53 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 19:20:53 localhost pkexec[20179]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib89)]
Aug 10 20:01:01 localhost crond[9570]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 10 20:01:01 localhost CROND[9570]: pam_tcb(crond:session): Session closed for root
Aug 10 21:01:01 localhost crond[8941]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 10 21:01:02 localhost CROND[8941]: pam_tcb(crond:session): Session closed for root
Aug 10 22:01:01 localhost crond[15198]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 10 22:01:04 localhost CROND[15198]: pam_tcb(crond:session): Session closed for root
Aug 10 22:18:43 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:18:43 localhost pkexec[26602]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update --update]
Aug 10 22:19:01 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:19:01 localhost pkexec[26801]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports]
Aug 10 22:19:08 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:19:08 localhost pkexec[26873]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports]
Aug 10 22:19:14 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:19:14 localhost pkexec[26930]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports]
Aug 10 22:19:21 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:19:21 localhost pkexec[27021]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports]
Aug 10 22:19:27 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:19:27 localhost pkexec[27092]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports]
Aug 10 22:19:33 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:19:33 localhost pkexec[27164]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports]
Aug 10 22:19:40 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:19:40 localhost pkexec[27246]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib7)]
Aug 10 22:19:46 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:19:46 localhost pkexec[27318]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib17)]
Aug 10 22:19:52 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:19:52 localhost pkexec[27395]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib27)]
Aug 10 22:19:59 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:19:59 localhost pkexec[27471]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib34)]
Aug 10 22:20:05 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:20:05 localhost pkexec[27547]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib39)]
Aug 10 22:20:11 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:20:11 localhost pkexec[27622]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib44)]
Aug 10 22:20:18 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:20:18 localhost pkexec[27719]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib52)]
Aug 10 22:20:24 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:20:24 localhost pkexec[27792]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib62)]
Aug 10 22:20:30 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:20:30 localhost pkexec[27872]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib72)]
Aug 10 22:20:37 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:20:37 localhost pkexec[27953]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib79)]
Aug 10 22:20:43 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:20:43 localhost pkexec[28034]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib84)]
Aug 10 22:20:49 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 10 22:20:49 localhost pkexec[28109]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib89)]
Aug 10 23:01:01 localhost crond[21671]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 10 23:01:01 localhost CROND[21671]: pam_tcb(crond:session): Session closed for root
Aug 11 00:01:01 localhost crond[18907]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 11 00:01:02 localhost CROND[18907]: pam_tcb(crond:session): Session closed for root
Aug 11 01:01:01 localhost crond[9234]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 11 01:01:03 localhost CROND[9234]: pam_tcb(crond:session): Session closed for root
Aug 11 01:01:22 localhost su: pam_tcb(su:session): Session closed for root
Aug 11 01:18:43 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:18:43 localhost pkexec[16496]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update --update]
Aug 11 01:19:01 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:19:01 localhost pkexec[16627]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports]
Aug 11 01:19:08 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:19:08 localhost pkexec[16675]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports]
Aug 11 01:19:14 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:19:14 localhost pkexec[16719]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports]
Aug 11 01:19:21 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:19:21 localhost pkexec[16780]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports]
Aug 11 01:19:28 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:19:28 localhost pkexec[16827]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports]
Aug 11 01:19:34 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:19:34 localhost pkexec[16873]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports]
Aug 11 01:19:41 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:19:41 localhost pkexec[16921]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib7)]
Aug 11 01:19:47 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:19:47 localhost pkexec[16969]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib17)]
Aug 11 01:19:53 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:19:53 localhost pkexec[17013]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib27)]
Aug 11 01:20:00 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:20:00 localhost pkexec[17074]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib34)]
Aug 11 01:20:06 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:20:06 localhost pkexec[17122]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib39)]
Aug 11 01:20:12 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:20:12 localhost pkexec[17171]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib44)]
Aug 11 01:20:19 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:20:19 localhost pkexec[17217]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib52)]
Aug 11 01:20:25 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:20:25 localhost pkexec[17280]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib62)]
Aug 11 01:20:31 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:20:31 localhost pkexec[17326]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib72)]
Aug 11 01:20:38 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:20:38 localhost pkexec[17376]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib79)]
Aug 11 01:20:44 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:20:44 localhost pkexec[17422]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib84)]
Aug 11 01:20:50 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 01:20:50 localhost pkexec[17469]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib89)]
Aug 11 01:22:21 localhost polkitd[2495]: Unregistered Authentication Agent for unix-session:c1 (system bus name :1.48, object path /org/kde/PolicyKit1/AuthenticationAgent, locale fr_FR.UTF-8)
Aug 11 01:22:21 localhost kdm: :0[2012]: pam_tcb(kdm:session): Session closed for dan
Aug 11 01:22:21 localhost kdm: :0[2012]: pam_kwallet(kdm:session): pam_sm_close_session
Aug 11 01:22:21 localhost kdm: :0[2012]: pam_kwallet(kdm:setcred): pam_sm_setcred
Aug 11 01:22:22 localhost sshd[1604]: Received signal 15; terminating.
Aug 11 11:06:06 localhost sshd[1638]: Server listening on 0.0.0.0 port 22.
Aug 11 11:06:06 localhost sshd[1638]: Server listening on :: port 22.
Aug 11 11:06:39 localhost kdm: :0[2016]: pam_succeed_if(kdm:auth): no condition detected; module succeeded
Aug 11 11:06:39 localhost kdm: :0[2016]: pam_succeed_if(kdm:auth): requirement "user ingroup nopasswdlogin" not met by user "dan"
Aug 11 11:06:39 localhost kdm: :0[2016]: pam_tcb(kdm:auth): Authentication passed for dan from (uid=0)
Aug 11 11:06:39 localhost kdm: :0[2016]: pam_kwallet(kdm:auth): pam_sm_authenticate
Aug 11 11:06:39 localhost kdm: :0[2016]: pam_kwallet(kdm:setcred): pam_sm_setcred
Aug 11 11:06:39 localhost systemd-logind[801]: New session c1 of user dan.
Aug 11 11:06:39 localhost systemd: pam_tcb(systemd-user:session): Session opened for dan by (uid=0)
Aug 11 11:06:39 localhost kdm: :0[2016]: pam_tcb(kdm:session): Session opened for dan by (uid=0)
Aug 11 11:06:39 localhost kdm: :0[2016]: pam_kwallet(kdm:session): pam_sm_open_session
Aug 11 11:06:39 localhost kdm: :0[2016]: pam_kwallet(kdm:session): pam-kwallet: final socket path: /tmp//dan.socket
Aug 11 11:06:45 localhost polkitd[2597]: Loading rules from directory /etc/polkit-1/rules.d
Aug 11 11:06:45 localhost polkitd[2597]: Loading rules from directory /usr/share/polkit-1/rules.d
Aug 11 11:06:45 localhost polkitd[2597]: Finished loading, compiling and executing 4 rules
Aug 11 11:06:45 localhost polkitd[2597]: Acquired the name org.freedesktop.PolicyKit1 on the system bus
Aug 11 11:06:59 localhost polkitd[2597]: Registered Authentication Agent for unix-session:c1 (system bus name :1.46 [/usr/lib64/kde4/libexec/polkit-kde-authentication-agent-1], object path /org/kde/PolicyKit1/AuthenticationAgent, locale fr_FR.UTF-8)
Aug 11 11:12:06 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:12:06 localhost pkexec[5033]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update --update]
Aug 11 11:12:24 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:12:24 localhost pkexec[5158]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports]
Aug 11 11:12:30 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:12:30 localhost pkexec[5205]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports]
Aug 11 11:12:37 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:12:37 localhost pkexec[5264]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports]
Aug 11 11:12:44 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:12:44 localhost pkexec[5315]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports]
Aug 11 11:12:50 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:12:50 localhost pkexec[5371]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports]
Aug 11 11:12:56 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:12:56 localhost pkexec[5436]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports]
Aug 11 11:13:03 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:13:03 localhost pkexec[5526]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib7)]
Aug 11 11:13:09 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:13:09 localhost pkexec[5606]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib17)]
Aug 11 11:13:16 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:13:16 localhost pkexec[5653]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib27)]
Aug 11 11:13:23 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:13:23 localhost pkexec[5710]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib34)]
Aug 11 11:13:29 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:13:29 localhost pkexec[5759]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib39)]
Aug 11 11:13:36 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:13:36 localhost pkexec[5814]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib44)]
Aug 11 11:13:43 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:13:43 localhost pkexec[5873]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib52)]
Aug 11 11:13:49 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:13:49 localhost pkexec[5931]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib62)]
Aug 11 11:13:56 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:13:56 localhost pkexec[5980]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib72)]
Aug 11 11:14:02 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:14:02 localhost pkexec[6030]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib79)]
Aug 11 11:14:09 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:14:09 localhost pkexec[6070]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib84)]
Aug 11 11:14:15 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:14:15 localhost pkexec[6109]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib89)]
Aug 11 11:51:39 localhost polkit-agent-helper-1[21202]: pam_tcb(polkit-1:auth): Authentication passed for root from (uid=1001)
Aug 11 11:51:39 localhost polkitd[2597]: Operator of unix-session:c1 successfully authenticated as unix-user:root to gain TEMPORARY authorization for action org.mageia.drakconf.pkexec.run for unix-process:21197:275455 [/usr/bin/perl /usr/bin/drakconf] (owned by unix-user:dan)
Aug 11 11:51:39 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:51:39 localhost pkexec[21200]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/home/dan] [COMMAND=/usr/libexec/drakconf]
Aug 11 11:57:07 localhost polkit-agent-helper-1[23345]: pam_tcb(polkit-1:auth): Authentication passed for root from (uid=1001)
Aug 11 11:57:07 localhost polkitd[2597]: Operator of unix-session:c1 successfully authenticated as unix-user:root to gain TEMPORARY authorization for action org.mageia.drakconf.pkexec.run for unix-process:23340:308213 [/usr/bin/perl /usr/bin/drakconf] (owned by unix-user:dan)
Aug 11 11:57:07 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 11:57:07 localhost pkexec[23343]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/home/dan] [COMMAND=/usr/libexec/drakconf]
Aug 11 12:01:01 localhost crond[24903]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 11 12:01:02 localhost CROND[24903]: pam_tcb(crond:session): Session closed for root
Aug 11 13:01:01 localhost crond[18824]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 11 13:01:03 localhost CROND[18824]: pam_tcb(crond:session): Session closed for root
Aug 11 14:01:01 localhost crond[20377]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 11 14:01:02 localhost CROND[20377]: pam_tcb(crond:session): Session closed for root
Aug 11 15:01:01 localhost crond[11851]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 11 15:01:03 localhost CROND[11851]: pam_tcb(crond:session): Session closed for root
Aug 11 16:01:01 localhost crond[13307]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 11 16:01:02 localhost CROND[13307]: pam_tcb(crond:session): Session closed for root
Aug 11 17:01:02 localhost crond[7210]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 11 17:01:04 localhost CROND[7210]: pam_tcb(crond:session): Session closed for root
Aug 11 17:12:29 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:12:29 localhost pkexec[11655]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update --update]
Aug 11 17:12:49 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:12:49 localhost pkexec[11804]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports]
Aug 11 17:12:56 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:12:56 localhost pkexec[11852]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports]
Aug 11 17:13:02 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:13:02 localhost pkexec[11902]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports]
Aug 11 17:13:09 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:13:09 localhost pkexec[11994]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports]
Aug 11 17:13:15 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:13:15 localhost pkexec[12086]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports]
Aug 11 17:13:21 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:13:21 localhost pkexec[12173]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports]
Aug 11 17:13:28 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:13:28 localhost pkexec[12282]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib7)]
Aug 11 17:13:34 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:13:34 localhost pkexec[12371]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib17)]
Aug 11 17:13:41 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:13:41 localhost pkexec[12457]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib27)]
Aug 11 17:13:48 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:13:48 localhost pkexec[12553]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib34)]
Aug 11 17:13:54 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:13:54 localhost pkexec[12640]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib39)]
Aug 11 17:14:00 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:14:00 localhost pkexec[12730]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib44)]
Aug 11 17:14:07 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:14:07 localhost pkexec[12836]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib52)]
Aug 11 17:14:14 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:14:14 localhost pkexec[12925]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib62)]
Aug 11 17:14:20 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:14:20 localhost pkexec[13015]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib72)]
Aug 11 17:14:27 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:14:27 localhost pkexec[13110]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib79)]
Aug 11 17:14:33 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:14:33 localhost pkexec[13202]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib84)]
Aug 11 17:14:40 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 17:14:40 localhost pkexec[13292]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib89)]
Aug 11 18:01:01 localhost crond[9152]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 11 18:01:03 localhost CROND[9152]: pam_tcb(crond:session): Session closed for root
Aug 11 18:21:33 localhost su: pam_tcb(su:auth): Authentication passed for root from (uid=1001)
Aug 11 18:21:33 localhost su: (to root) dan on pts/3
Aug 11 18:21:33 localhost su: pam_tcb(su:session): Session opened for root by (uid=1001)
Aug 11 18:21:33 localhost su: pam_tcb(su:session): Session closed for root
Aug 11 18:21:33 localhost su: pam_tcb(su:auth): Authentication passed for root from (uid=1001)
Aug 11 18:21:33 localhost su: (to root) dan on pts/3
Aug 11 18:21:33 localhost su: pam_tcb(su:session): Session opened for root by (uid=1001)
Aug 11 18:21:33 localhost su: pam_tcb(su:session): Session closed for root
Aug 11 18:21:54 localhost su: pam_tcb(su:auth): Authentication passed for root from (uid=1001)
Aug 11 18:21:54 localhost su: (to root) dan on pts/3
Aug 11 18:21:54 localhost su: pam_tcb(su:session): Session opened for root by (uid=1001)
Aug 11 18:21:54 localhost su: pam_tcb(su:session): Session closed for root
Aug 11 18:21:54 localhost su: pam_tcb(su:auth): Authentication passed for root from (uid=1001)
Aug 11 18:21:54 localhost su: (to root) dan on pts/3
Aug 11 18:21:54 localhost su: pam_tcb(su:session): Session opened for root by (uid=1001)
Aug 11 18:21:55 localhost su: pam_tcb(su:session): Session closed for root
Aug 11 18:23:51 localhost su: pam_tcb(su:auth): Authentication passed for root from (uid=1001)
Aug 11 18:23:51 localhost su: (to root) dan on pts/3
Aug 11 18:23:51 localhost su: pam_tcb(su:session): Session opened for root by (uid=1001)
Aug 11 18:23:51 localhost su: pam_tcb(su:session): Session closed for root
Aug 11 18:23:52 localhost su: pam_tcb(su:auth): Authentication passed for root from (uid=1001)
Aug 11 18:23:52 localhost su: (to root) dan on pts/3
Aug 11 18:23:52 localhost su: pam_tcb(su:session): Session opened for root by (uid=1001)
Aug 11 18:54:29 localhost su: pam_tcb(su:session): Session closed for root
Aug 11 19:01:01 localhost crond[1566]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 11 19:01:03 localhost CROND[1566]: pam_tcb(crond:session): Session closed for root
Aug 11 20:01:01 localhost crond[9434]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 11 20:01:03 localhost CROND[9434]: pam_tcb(crond:session): Session closed for root
Aug 11 20:12:09 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:12:09 localhost pkexec[13911]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update --update]
Aug 11 20:12:28 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:12:28 localhost pkexec[14068]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports]
Aug 11 20:12:35 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:12:35 localhost pkexec[14117]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports]
Aug 11 20:12:41 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:12:41 localhost pkexec[14164]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports]
Aug 11 20:12:48 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:12:48 localhost pkexec[14217]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports]
Aug 11 20:12:54 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:12:54 localhost pkexec[14265]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports]
Aug 11 20:13:00 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:13:00 localhost pkexec[14312]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports]
Aug 11 20:13:07 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:13:07 localhost pkexec[14375]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib7)]
Aug 11 20:13:14 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:13:14 localhost pkexec[14422]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib17)]
Aug 11 20:13:20 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:13:20 localhost pkexec[14470]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib27)]
Aug 11 20:13:27 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:13:27 localhost pkexec[14521]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib34)]
Aug 11 20:13:33 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:13:33 localhost pkexec[14570]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib39)]
Aug 11 20:13:39 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:13:39 localhost pkexec[14622]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib44)]
Aug 11 20:13:46 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:13:46 localhost pkexec[14685]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib52)]
Aug 11 20:13:53 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:13:53 localhost pkexec[14733]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib62)]
Aug 11 20:13:59 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:13:59 localhost pkexec[14780]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib72)]
Aug 11 20:14:06 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:14:06 localhost pkexec[14827]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib79)]
Aug 11 20:14:12 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:14:12 localhost pkexec[14878]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib84)]
Aug 11 20:14:19 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 20:14:19 localhost pkexec[14939]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib89)]
Aug 11 21:01:01 localhost crond[8059]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 11 21:01:03 localhost CROND[8059]: pam_tcb(crond:session): Session closed for root
Aug 11 22:01:01 localhost crond[20715]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 11 22:01:02 localhost CROND[20715]: pam_tcb(crond:session): Session closed for root
Aug 11 23:01:01 localhost crond[30161]: pam_tcb(crond:session): Session opened for root by (uid=0)
Aug 11 23:01:03 localhost CROND[30161]: pam_tcb(crond:session): Session closed for root
Aug 11 23:12:07 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 23:12:07 localhost pkexec[2287]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update --update]
Aug 11 23:12:26 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 23:12:26 localhost pkexec[2428]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports]
Aug 11 23:12:32 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 23:12:32 localhost pkexec[2476]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports]
Aug 11 23:12:39 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 23:12:39 localhost pkexec[2527]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports]
Aug 11 23:12:46 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 23:12:46 localhost pkexec[2619]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports]
Aug 11 23:12:52 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 23:12:52 localhost pkexec[2681]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports]
Aug 11 23:12:58 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 23:12:58 localhost pkexec[2750]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports]
Aug 11 23:13:05 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 23:13:05 localhost pkexec[2827]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core Backports (distrib7)]
Aug 11 23:13:11 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 23:13:11 localhost pkexec[2957]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree Backports (distrib17)]
Aug 11 23:13:17 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 23:13:17 localhost pkexec[3022]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted Backports (distrib27)]
Aug 11 23:13:25 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 23:13:25 localhost pkexec[3076]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core 32bit Backports (distrib34)]
Aug 11 23:13:31 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 23:13:31 localhost pkexec[3144]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Nonfree 32bit Backports (distrib39)]
Aug 11 23:13:37 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 23:13:37 localhost pkexec[3219]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Tainted 32bit Backports (distrib44)]
Aug 11 23:13:44 localhost pkexec: pam_tcb(polkit-1:session): Session opened for root by (uid=1001)
Aug 11 23:13:44 localhost pkexec[3273]: dan: Executing command [USER=root] [TTY=unknown] [CWD=/] [COMMAND=/usr/libexec/urpmi.update Core
Portable : ASUS Vivobook 15 Pro OLED - 16 G° RAM - SSD Crucial MX500 1 T° - Dual-boot W 10 / Mageia 9 64 bits
PC : be Quiet ! Silent Base 600 - Intel Core I5 12400 - Vent.: be quiet! Shadow Rock 3 + be quiet! LGA1700 mounting-kit - CM: Asus ROG Strix B660-F Gaming WIFI - RAM : Crucial 16GB DDR5-4800 CL40 - SSD: Crucial P5 500GB SSD M.2 2280 PCIe NVMe HDD: Western Digital WD Red Plus 3.5" 4To Série ATA - Alim : be quiet! Pure Power 11 FM 750W - Souris: Logitech MX Anywhere 3. Dual-boot W 10 / Mageia 9 - 64 bits
NAS : Synology DS 215J - DSM 5.2 - WD Red 3.5" 8 T° Série ATA
KDE - Digikam
PC : be Quiet ! Silent Base 600 - Intel Core I5 12400 - Vent.: be quiet! Shadow Rock 3 + be quiet! LGA1700 mounting-kit - CM: Asus ROG Strix B660-F Gaming WIFI - RAM : Crucial 16GB DDR5-4800 CL40 - SSD: Crucial P5 500GB SSD M.2 2280 PCIe NVMe HDD: Western Digital WD Red Plus 3.5" 4To Série ATA - Alim : be quiet! Pure Power 11 FM 750W - Souris: Logitech MX Anywhere 3. Dual-boot W 10 / Mageia 9 - 64 bits
NAS : Synology DS 215J - DSM 5.2 - WD Red 3.5" 8 T° Série ATA
KDE - Digikam

dantou Membre non connecté
-
- Voir le profil du membre dantou
- Inscrit le : 04/01/2011
- Groupes :
Suite au remplissage de / par /var/log, ce qui a bloqué carrément mon PC jusqu'à ces derniers jours, j'ai tout effacé et on m'a conseillé de surveiller mes divers .log, ce que je fais.
Le "auth.log" que tu vois est celui du démarrage du PC. Je n'ai pas encore d'autre commande que de rentrer mon nom et mot de passe sur le système.
Portable : ASUS Vivobook 15 Pro OLED - 16 G° RAM - SSD Crucial MX500 1 T° - Dual-boot W 10 / Mageia 9 64 bits
PC : be Quiet ! Silent Base 600 - Intel Core I5 12400 - Vent.: be quiet! Shadow Rock 3 + be quiet! LGA1700 mounting-kit - CM: Asus ROG Strix B660-F Gaming WIFI - RAM : Crucial 16GB DDR5-4800 CL40 - SSD: Crucial P5 500GB SSD M.2 2280 PCIe NVMe HDD: Western Digital WD Red Plus 3.5" 4To Série ATA - Alim : be quiet! Pure Power 11 FM 750W - Souris: Logitech MX Anywhere 3. Dual-boot W 10 / Mageia 9 - 64 bits
NAS : Synology DS 215J - DSM 5.2 - WD Red 3.5" 8 T° Série ATA
KDE - Digikam
PC : be Quiet ! Silent Base 600 - Intel Core I5 12400 - Vent.: be quiet! Shadow Rock 3 + be quiet! LGA1700 mounting-kit - CM: Asus ROG Strix B660-F Gaming WIFI - RAM : Crucial 16GB DDR5-4800 CL40 - SSD: Crucial P5 500GB SSD M.2 2280 PCIe NVMe HDD: Western Digital WD Red Plus 3.5" 4To Série ATA - Alim : be quiet! Pure Power 11 FM 750W - Souris: Logitech MX Anywhere 3. Dual-boot W 10 / Mageia 9 - 64 bits
NAS : Synology DS 215J - DSM 5.2 - WD Red 3.5" 8 T° Série ATA
KDE - Digikam

magnux77 Membre non connecté
-
- Voir le profil du membre magnux77
- Inscrit le : 21/09/2009
- Groupes :
-
Membre d'Honneur
...depuis Mandrake 7
Membre de l'April - « promouvoir et défendre le Logiciel Libre»
Soutien Framasoft - « Changer le monde, un octet à la fois»
Config n°1 : cpu=AMD64x6 mem=16G SSD=64G HDD=1T OS=Mageia8-64 DE=Xfce, Config n°2 : Dell Latitude E6410 SSD=120G OS=Mageia8 DE=Xfce, Config n°3 : ThinkpadR40 SSD=32G OS=[Manjaro, Parabola, Mageia6] DE=Xfce, Config n°4 : EeePC901 SSD=20Gb, OS=[SliTaz5/Lxde, Mageia8/Xfce]
Membre de l'April - « promouvoir et défendre le Logiciel Libre»
Soutien Framasoft - « Changer le monde, un octet à la fois»
Config n°1 : cpu=AMD64x6 mem=16G SSD=64G HDD=1T OS=Mageia8-64 DE=Xfce, Config n°2 : Dell Latitude E6410 SSD=120G OS=Mageia8 DE=Xfce, Config n°3 : ThinkpadR40 SSD=32G OS=[Manjaro, Parabola, Mageia6] DE=Xfce, Config n°4 : EeePC901 SSD=20Gb, OS=[SliTaz5/Lxde, Mageia8/Xfce]

dantou Membre non connecté
-
- Voir le profil du membre dantou
- Inscrit le : 04/01/2011
- Groupes :
La fréquence est de 24 heures et 5 minutes après l'ouverture.
Portable : ASUS Vivobook 15 Pro OLED - 16 G° RAM - SSD Crucial MX500 1 T° - Dual-boot W 10 / Mageia 9 64 bits
PC : be Quiet ! Silent Base 600 - Intel Core I5 12400 - Vent.: be quiet! Shadow Rock 3 + be quiet! LGA1700 mounting-kit - CM: Asus ROG Strix B660-F Gaming WIFI - RAM : Crucial 16GB DDR5-4800 CL40 - SSD: Crucial P5 500GB SSD M.2 2280 PCIe NVMe HDD: Western Digital WD Red Plus 3.5" 4To Série ATA - Alim : be quiet! Pure Power 11 FM 750W - Souris: Logitech MX Anywhere 3. Dual-boot W 10 / Mageia 9 - 64 bits
NAS : Synology DS 215J - DSM 5.2 - WD Red 3.5" 8 T° Série ATA
KDE - Digikam
PC : be Quiet ! Silent Base 600 - Intel Core I5 12400 - Vent.: be quiet! Shadow Rock 3 + be quiet! LGA1700 mounting-kit - CM: Asus ROG Strix B660-F Gaming WIFI - RAM : Crucial 16GB DDR5-4800 CL40 - SSD: Crucial P5 500GB SSD M.2 2280 PCIe NVMe HDD: Western Digital WD Red Plus 3.5" 4To Série ATA - Alim : be quiet! Pure Power 11 FM 750W - Souris: Logitech MX Anywhere 3. Dual-boot W 10 / Mageia 9 - 64 bits
NAS : Synology DS 215J - DSM 5.2 - WD Red 3.5" 8 T° Série ATA
KDE - Digikam

magnux77 Membre non connecté
-
- Voir le profil du membre magnux77
- Inscrit le : 21/09/2009
- Groupes :
-
Membre d'Honneur
...depuis Mandrake 7
Membre de l'April - « promouvoir et défendre le Logiciel Libre»
Soutien Framasoft - « Changer le monde, un octet à la fois»
Config n°1 : cpu=AMD64x6 mem=16G SSD=64G HDD=1T OS=Mageia8-64 DE=Xfce, Config n°2 : Dell Latitude E6410 SSD=120G OS=Mageia8 DE=Xfce, Config n°3 : ThinkpadR40 SSD=32G OS=[Manjaro, Parabola, Mageia6] DE=Xfce, Config n°4 : EeePC901 SSD=20Gb, OS=[SliTaz5/Lxde, Mageia8/Xfce]
Membre de l'April - « promouvoir et défendre le Logiciel Libre»
Soutien Framasoft - « Changer le monde, un octet à la fois»
Config n°1 : cpu=AMD64x6 mem=16G SSD=64G HDD=1T OS=Mageia8-64 DE=Xfce, Config n°2 : Dell Latitude E6410 SSD=120G OS=Mageia8 DE=Xfce, Config n°3 : ThinkpadR40 SSD=32G OS=[Manjaro, Parabola, Mageia6] DE=Xfce, Config n°4 : EeePC901 SSD=20Gb, OS=[SliTaz5/Lxde, Mageia8/Xfce]

dantou Membre non connecté
-
- Voir le profil du membre dantou
- Inscrit le : 04/01/2011
- Groupes :
OK. Effectivement, ce n'est pas la fréquence par défaut, mais mon réglage. J'essaie de changer comme tu dis et on verra.
Portable : ASUS Vivobook 15 Pro OLED - 16 G° RAM - SSD Crucial MX500 1 T° - Dual-boot W 10 / Mageia 9 64 bits
PC : be Quiet ! Silent Base 600 - Intel Core I5 12400 - Vent.: be quiet! Shadow Rock 3 + be quiet! LGA1700 mounting-kit - CM: Asus ROG Strix B660-F Gaming WIFI - RAM : Crucial 16GB DDR5-4800 CL40 - SSD: Crucial P5 500GB SSD M.2 2280 PCIe NVMe HDD: Western Digital WD Red Plus 3.5" 4To Série ATA - Alim : be quiet! Pure Power 11 FM 750W - Souris: Logitech MX Anywhere 3. Dual-boot W 10 / Mageia 9 - 64 bits
NAS : Synology DS 215J - DSM 5.2 - WD Red 3.5" 8 T° Série ATA
KDE - Digikam
PC : be Quiet ! Silent Base 600 - Intel Core I5 12400 - Vent.: be quiet! Shadow Rock 3 + be quiet! LGA1700 mounting-kit - CM: Asus ROG Strix B660-F Gaming WIFI - RAM : Crucial 16GB DDR5-4800 CL40 - SSD: Crucial P5 500GB SSD M.2 2280 PCIe NVMe HDD: Western Digital WD Red Plus 3.5" 4To Série ATA - Alim : be quiet! Pure Power 11 FM 750W - Souris: Logitech MX Anywhere 3. Dual-boot W 10 / Mageia 9 - 64 bits
NAS : Synology DS 215J - DSM 5.2 - WD Red 3.5" 8 T° Série ATA
KDE - Digikam

magnux77 Membre non connecté
-
- Voir le profil du membre magnux77
- Inscrit le : 21/09/2009
- Groupes :
-
Membre d'Honneur
ce n'est pas la fréquence par défaut, mais mon réglage
Je me doutais bien. Et il est assez bizarre. Cette fréquence est à préciser en heures pour limiter les emmedements trop fréquents d'une mise à jour. Je crains que mettre plus d'une journée ne soit source d'emmerdements. Si j'étais décidé à ne pas faire plus d'une mise à jour par jour, personnellement je me serais arrêté à 12 heures, voire 23, mais plus de 24.
...depuis Mandrake 7
Membre de l'April - « promouvoir et défendre le Logiciel Libre»
Soutien Framasoft - « Changer le monde, un octet à la fois»
Config n°1 : cpu=AMD64x6 mem=16G SSD=64G HDD=1T OS=Mageia8-64 DE=Xfce, Config n°2 : Dell Latitude E6410 SSD=120G OS=Mageia8 DE=Xfce, Config n°3 : ThinkpadR40 SSD=32G OS=[Manjaro, Parabola, Mageia6] DE=Xfce, Config n°4 : EeePC901 SSD=20Gb, OS=[SliTaz5/Lxde, Mageia8/Xfce]
Membre de l'April - « promouvoir et défendre le Logiciel Libre»
Soutien Framasoft - « Changer le monde, un octet à la fois»
Config n°1 : cpu=AMD64x6 mem=16G SSD=64G HDD=1T OS=Mageia8-64 DE=Xfce, Config n°2 : Dell Latitude E6410 SSD=120G OS=Mageia8 DE=Xfce, Config n°3 : ThinkpadR40 SSD=32G OS=[Manjaro, Parabola, Mageia6] DE=Xfce, Config n°4 : EeePC901 SSD=20Gb, OS=[SliTaz5/Lxde, Mageia8/Xfce]
Répondre
Vous n'êtes pas autorisé à écrire dans cette catégorie