Print

Print


We do have a patched voms-client that has been sitting in our testing 
repositories that sets the default to 2048 bits 
(https://opensciencegrid.atlassian.net/browse/SOFTWARE-4889). We'll try 
to move this along and get it out the door.

- Brian

On 2/16/22 08:31, Justas Balcas wrote:
> This is a nice catch! Thanks, to everyone looking into this.
>
> Cheers,
> Justas
>
> On Wed, 16 Feb 2022 at 00:45, Petr Vokac <[log in to unmask]> wrote:
>
>     Proxy generated with 1024 key size seems to be mainly OSG problem,
>     because this size is used by default only by voms-proxy-init2.
>     Those who
>     rely on voms-proxy-init3 > 3.3.2 (released in October 2020) or
>     arcproxy
>      >= 6.4.0 (released in November 2019) gets by default 2048 keys.
>
>     Be aware there might still be software which "accidentally" generate
>     proxies with smaller than default size, e.g. FTS < 3.11.0 (latest
>     version released in September 2021) used fixed key size 1024
>     (https://its.cern.ch/jira/browse/FTS-1700).
>
>     Saying that it would be useful to have more clear error messages.
>
>     Petr
>
>     On 2/16/22 08:18, Matevz Tadel wrote:
>     > Andy and I did some deep debugging of where the cert init fails
>     ... and it
>     > turned out the problem was 1024-bit key of the proxy cert on the
>     client machine
>     > --- openssl-1.1.1k (which comes with cos-8) apparently requires
>     the key to be at
>     > least 2048 bits when calling SSL_CTX_use_certificate_file().
>     >
>     > After we replaced it with my 2048-bit key cert it worked no problem.
>     >
>     > On fedora-34 the default key length generated by voms-proxy-init
>     is already
>     > 2048, on centos-7.9 it is still 1024. One can get longer keys
>     with -bits option:
>     > voms-proxy-init -bits 2048 -voms cms
>     >
>     > Andy will try to get more informative error messages from
>     openssl ... but this
>     > doesn't seem entirely trivial as the error gets set at the
>     top-level function
>     > and we had to go three levels down to see the actual error code
>     that we were
>     > able to google.
>     >
>     > Matevz
>     >
>     > On 2/15/22 19:46, Justas Balcas wrote:
>     >> That is correct, Matevz
>     >>
>     >> On Tue, Feb 15, 2022, 18:39 Matevz Tadel <[log in to unmask]
>     >> <mailto:[log in to unmask]>> wrote:
>     >>
>     >>      Thank you Andy!
>     >>
>     >>      The error is permanent, I think. Justas, can you please
>     confirm?
>     >>
>     >>      Matevz
>     >>
>     >>      On 2/15/22 17:49, Andrew Hanushevsky wrote:
>     >>      > Here are the common problems when the client issues that
>     message:
>     >>      >
>     >>      > 1) The certificate's chain of trust is broken (could be
>     because the root CA
>     >>      > can't be verified, or the root/intermediate certificate
>     has expired). This
>     >>      would
>     >>      > cause sproradic failures (note that if the certificate
>     is improperly installed
>     >>      > then the failure would always occur which is not the
>     case here).
>     >>      >
>     >>      > 2) The certificate must be renewed before the expiry of
>     the certificate to
>     >>      avoid
>     >>      > any conflict arising out of time violation. Ensure that
>     the date/time is set
>     >>      > correctly on your computer since that might be used to
>     assess the validity
>     >>      > period of the SSL certificate of the website. This would
>     cause repated
>     >>      failures
>     >>      > on some sites but not others depending on how close the
>     cert was to expiring.
>     >>      >
>     >>      > 3) The certificate structure is broken, or the
>     certificate's signature
>     >>      can't be
>     >>      > checked. This is the hardest to solve but one reason
>     could me random memory
>     >>      > corruption. I would suggest runningthe client with
>     valgrind and try to
>     >>      match the
>     >>      > valgring log with the invalid cert message.
>     >>      >
>     >>      > 4) Firewall issues may cause problems with they have
>     been enabled for
>     >>      > "encrypted/SSL scanning or checking."
>     >>      >
>     >>      > 5) If tghe server is using only SHA-1 encryption then
>     those cert are
>     >>      flagged as
>     >>      > insecure and need to update their security certificates.
>     However, would most
>     >>      > likely cause permanent errors.
>     >>      >
>     >>      > Andy
>     >>      >
>     >>      >
>     >>      >
>     >>      > On Tue, 15 Feb 2022, Matevz Tadel wrote:
>     >>      >
>     >>      >> Andy,
>     >>      >>
>     >>      >> What's with the invalid certificate in the client log?
>     >>      >>
>     >>      >> [2022-02-15 09:56:19.549139 -0800][Debug 
>     ][XRootDTransport   ]
>     >>      >> [transfer-9.ultralight.org
>     <http://transfer-9.ultralight.org>
>     >>     
>     <https://urldefense.proofpoint.com/v2/url?u=http-3A__transfer-2D9.ultralight.org&d=DwMFaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=9Kg_R4c2zF6HHZSpAb3h3VrMr_pFJQ260VSKabOPtkulYwNWdPSP-sd5LVhMjPpw&s=nlq02y75DI9NFCQLEryIqIoDoyClnOqIZlWhu5rJJMc&e=
>     <https://urldefense.proofpoint.com/v2/url?u=http-3A__transfer-2D9.ultralight.org&d=DwMFaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=9Kg_R4c2zF6HHZSpAb3h3VrMr_pFJQ260VSKabOPtkulYwNWdPSP-sd5LVhMjPpw&s=nlq02y75DI9NFCQLEryIqIoDoyClnOqIZlWhu5rJJMc&e=>>:1095.0]
>     >>      Sending out kXR_login request, username:
>     >>      >> root, cgi:
>     >>      >> ?xrd.cc=us&xrd.tz <http://xrd.tz>
>     >>     
>     <https://urldefense.proofpoint.com/v2/url?u=http-3A__xrd.tz&d=DwMFaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=9Kg_R4c2zF6HHZSpAb3h3VrMr_pFJQ260VSKabOPtkulYwNWdPSP-sd5LVhMjPpw&s=-Rc4_LmnigwN9z03K7gZrf-B9w2_b0g2EkivTF0FV9U&e=
>     <https://urldefense.proofpoint.com/v2/url?u=http-3A__xrd.tz&d=DwMFaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=9Kg_R4c2zF6HHZSpAb3h3VrMr_pFJQ260VSKabOPtkulYwNWdPSP-sd5LVhMjPpw&s=-Rc4_LmnigwN9z03K7gZrf-B9w2_b0g2EkivTF0FV9U&e=>>=-8&xrd.appname=xrdcp&xrd.info
>     <http://xrd.info>
>     >>     
>     <https://urldefense.proofpoint.com/v2/url?u=http-3A__xrd.info&d=DwMFaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=9Kg_R4c2zF6HHZSpAb3h3VrMr_pFJQ260VSKabOPtkulYwNWdPSP-sd5LVhMjPpw&s=j_3eK4Ghw7zsEUpD0XXrLaG5_Maj8wMSMXpXUC-Up5Y&e=
>     <https://urldefense.proofpoint.com/v2/url?u=http-3A__xrd.info&d=DwMFaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=9Kg_R4c2zF6HHZSpAb3h3VrMr_pFJQ260VSKabOPtkulYwNWdPSP-sd5LVhMjPpw&s=j_3eK4Ghw7zsEUpD0XXrLaG5_Maj8wMSMXpXUC-Up5Y&e=>>=&xrd.hostname=xrd-cache-3.ultralight.org
>     <http://xrd-cache-3.ultralight.org>
>     >>     
>     <https://urldefense.proofpoint.com/v2/url?u=http-3A__xrd-2Dcache-2D3.ultralight.org&d=DwMFaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=9Kg_R4c2zF6HHZSpAb3h3VrMr_pFJQ260VSKabOPtkulYwNWdPSP-sd5LVhMjPpw&s=PYd32OF7sFBQVcQsXBH9TGn-f4DSZENRYSAySzIRVUE&e=
>     <https://urldefense.proofpoint.com/v2/url?u=http-3A__xrd-2Dcache-2D3.ultralight.org&d=DwMFaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=9Kg_R4c2zF6HHZSpAb3h3VrMr_pFJQ260VSKabOPtkulYwNWdPSP-sd5LVhMjPpw&s=PYd32OF7sFBQVcQsXBH9TGn-f4DSZENRYSAySzIRVUE&e=>>&xrd.rn=v5.2.0,
>     >>      >> dual-stack: true, private IPv4: false, private IPv6: false
>     >>      >> [2022-02-15 09:56:19.549209 -0800][Debug 
>     ][AsyncSock         ]
>     >>      >> [transfer-9.ultralight.org
>     <http://transfer-9.ultralight.org>
>     >>     
>     <https://urldefense.proofpoint.com/v2/url?u=http-3A__transfer-2D9.ultralight.org&d=DwMFaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=9Kg_R4c2zF6HHZSpAb3h3VrMr_pFJQ260VSKabOPtkulYwNWdPSP-sd5LVhMjPpw&s=nlq02y75DI9NFCQLEryIqIoDoyClnOqIZlWhu5rJJMc&e=
>     <https://urldefense.proofpoint.com/v2/url?u=http-3A__transfer-2D9.ultralight.org&d=DwMFaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=9Kg_R4c2zF6HHZSpAb3h3VrMr_pFJQ260VSKabOPtkulYwNWdPSP-sd5LVhMjPpw&s=nlq02y75DI9NFCQLEryIqIoDoyClnOqIZlWhu5rJJMc&e=>>:1095.0]
>     >>      TLS hand-shake exchange.
>     >>      >>
>     >>      >> ===> HERE:
>     >>      >> [2022-02-15 09:56:19.551762 -0800][Error 
>     ][TlsMsg            ]
>     >>      [TLS_Context:]
>     >>      >> Unable to create TLS context; invalid certificate.
>     >>      >>
>     >>      >> [2022-02-15 09:56:19.551903 -0800][Error 
>     ][AsyncSock         ]
>     >>      >> [transfer-9.ultralight.org
>     <http://transfer-9.ultralight.org>
>     >>     
>     <https://urldefense.proofpoint.com/v2/url?u=http-3A__transfer-2D9.ultralight.org&d=DwMFaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=9Kg_R4c2zF6HHZSpAb3h3VrMr_pFJQ260VSKabOPtkulYwNWdPSP-sd5LVhMjPpw&s=nlq02y75DI9NFCQLEryIqIoDoyClnOqIZlWhu5rJJMc&e=
>     <https://urldefense.proofpoint.com/v2/url?u=http-3A__transfer-2D9.ultralight.org&d=DwMFaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=9Kg_R4c2zF6HHZSpAb3h3VrMr_pFJQ260VSKabOPtkulYwNWdPSP-sd5LVhMjPpw&s=nlq02y75DI9NFCQLEryIqIoDoyClnOqIZlWhu5rJJMc&e=>>:1095.0]
>     >>      Socket error while handshaking: [FATAL] TLS
>     >>      >> error
>     >>      >> [2022-02-15 09:56:19.551920 -0800][Debug 
>     ][AsyncSock         ]
>     >>      >> [transfer-9.ultralight.org
>     <http://transfer-9.ultralight.org>
>     >>     
>     <https://urldefense.proofpoint.com/v2/url?u=http-3A__transfer-2D9.ultralight.org&d=DwMFaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=9Kg_R4c2zF6HHZSpAb3h3VrMr_pFJQ260VSKabOPtkulYwNWdPSP-sd5LVhMjPpw&s=nlq02y75DI9NFCQLEryIqIoDoyClnOqIZlWhu5rJJMc&e=
>     <https://urldefense.proofpoint.com/v2/url?u=http-3A__transfer-2D9.ultralight.org&d=DwMFaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=9Kg_R4c2zF6HHZSpAb3h3VrMr_pFJQ260VSKabOPtkulYwNWdPSP-sd5LVhMjPpw&s=nlq02y75DI9NFCQLEryIqIoDoyClnOqIZlWhu5rJJMc&e=>>:1095.0]
>     >>      Closing the socket
>     >>      >>
>     >>      >> Can I run in gdb to get more info? What is good place
>     to start poking?
>     >>      >>
>     >>      >> I was assuming it's the server cert that client does
>     not like ... but it does
>     >>      >> look ok to me :)
>     >>      >>
>     >>      >> Matevz
>     >>      >>
>     >>      >>
>     >>      >> On 2/15/22 14:04, Andrew Hanushevsky wrote:
>     >>      >>> Hi Bockjoo,
>     >>      >>>
>     >>      >>> Unfortunately, that's not the way it works. While gsi
>     doesn't need to
>     >>      use TLS
>     >>      >>> ztn does. Since the erver doesn't know which protocol
>     the client will
>     >>      eventually
>     >>      >>> settle on, the connection has to use TLS right from
>     the start. That
>     >>      means you
>     >>      >>> cannot use ztn with incapable clients.
>     >>      >>>
>     >>      >>> Andy
>     >>      >>>
>     >>      >>>
>     >>      >>> On Tue, 15 Feb 2022, Bockjoo Kim wrote:
>     >>      >>>
>     >>      >>>> Hi Andy,
>     >>      >>>>
>     >>      >>>> There are two sec.protocols: gsi and ztn.
>     >>      >>>>
>     >>      >>>> Doesn't the interaction go through gsi and if it
>     fails, will it go
>     >>      through ztn?
>     >>      >>>>
>     >>      >>>> For incapable clients, the gsi can succeed, no?
>     >>      >>>>
>     >>      >>>> Thanks,
>     >>      >>>>
>     >>      >>>> Bockjoo
>     >>      >>>>
>     >>      >>>> On 2/15/22 14:52, Andrew Hanushevsky wrote:
>     >>      >>>>> Hi Justas,
>     >>      >>>>>
>     >>      >>>>> If you look into the log you will notice a warning
>     that tells you that TLS
>     >>      >>>>> will always be on regardless of the "capable"
>     setting because
>     >>      authentication
>     >>      >>>>> protocol ztn requires tls. So, this may be the
>     source of the problem,
>     >>      >>>>> certainly it will be for incapable clients.
>     >>      >>>>>
>     >>      >>>>> Andy
>     >>      >>>>>
>     >>      >>>>>
>     >>      >>>>> On Tue, 15 Feb 2022, Justas Balcas wrote:
>     >>      >>>>>
>     >>      >>>>>> Hi,
>     >>      >>>>>>
>     >>      >>>>>> Server's/Clients are running > 5.3.X release (not
>     5.4). I took out 1
>     >>      server
>     >>      >>>>>> from prod and played with full debug mode, on/off tls.
>     >>      >>>>>>
>     >>      >>>>>> Logs from server/client are available here:
>     >>      >>>>>>
>     >>
>     https://urldefense.proofpoint.com/v2/url?u=https-3A__login-2D1.hep.caltech.edu_-7Ejbalcas_tls_&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=tns3GlZokUnAN9f_4ZHOR1kQXE0DrfqOgDK3bos6dS4&e=
>     <https://urldefense.proofpoint.com/v2/url?u=https-3A__login-2D1.hep.caltech.edu_-7Ejbalcas_tls_&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=tns3GlZokUnAN9f_4ZHOR1kQXE0DrfqOgDK3bos6dS4&e=>
>     >>     
>     <https://urldefense.proofpoint.com/v2/url?u=https-3A__login-2D1.hep.caltech.edu_-7Ejbalcas_tls_&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=tns3GlZokUnAN9f_4ZHOR1kQXE0DrfqOgDK3bos6dS4&e=
>     <https://urldefense.proofpoint.com/v2/url?u=https-3A__login-2D1.hep.caltech.edu_-7Ejbalcas_tls_&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=tns3GlZokUnAN9f_4ZHOR1kQXE0DrfqOgDK3bos6dS4&e=>>
>     >>      >>>>>>
>     >>      >>>>>>
>     >>      >>>>>> To turn TLS, I added this config:
>     >>      >>>>>> xrd.tls /etc/grid-security/xrootd/xrootdcert.pem
>     >>      >>>>>> /etc/grid-security/xrootd/xrootdkey.pem
>     >>      >>>>>> xrd.tlsca certdir /etc/grid-security/certificates
>     >>      >>>>>> xrootd.tls capable all
>     >>      >>>>>> sec.protocol /usr/lib64 ztn
>     >>      >>>>>>
>     >>      >>>>>> And with TLS on - I always get:
>     >>      >>>>>> TLS hand-shake exchange.
>     >>      >>>>>> Socket error while handshaking: [FATAL] TLS error
>     >>      >>>>>> Closing the socket
>     >>      >>>>>>
>     >>      >>>>>>
>     >>      >>>>>> If it helps, here is full config:
>     >>      >>>>>>
>     >>      >>>>>> all.export /tmp stage
>     >>      >>>>>> frm.xfr.copycmd /bin/cp /dev/null $PFN
>     >>      >>>>>> all.adminpath /var/spool/xrootd
>     >>      >>>>>> all.pidpath /var/run/xrootd
>     >>      >>>>>>
>     >>      >>>>>> # XrootD Security
>     >>      >>>>>> # ---------------------------------------
>     >>      >>>>>> xrootd.seclib /usr/lib64/libXrdSec.so
>     >>      >>>>>> sec.protocol /usr/lib64 gsi
>     -certdir:/etc/grid-security/certificates
>     >>      >>>>>> -cert:/etc/grid-security/xrootd/xrootdcert.pem
>     >>      >>>>>> -key:/etc/grid-security/xrootd/xrootdkey.pem -crl:3
>     >>      >>>>>> -authzfun:libXrdLcmaps.so -authzto:900
>     >>      >>>>>> -authzfunparms:lcmapscfg=/etc/xrootd/lcmaps.cfg
>     -gmapopt:10 -gmapto:0
>     >>      >>>>>> acc.authdb /etc/xrootd/auth_file_stageout
>     >>      >>>>>> ofs.authorize
>     >>      >>>>>> macaroons.secretkey /etc/xrootd/macaroon-secret
>     >>      >>>>>> ofs.authlib ++ libXrdMacaroons.so
>     >>      >>>>>> ofs.authlib ++ libXrdAccSciTokens.so
>     >>      >>>>>> # --------------------------------------
>     >>      >>>>>> # XrootD Monitoring
>     >>      >>>>>> # --------------------------------------
>     >>      >>>>>> # Monitoring for AAA Dashboard :
>     >>      >>>>>> xrd.report 169.228.130.91:9931
>     <http://169.228.130.91:9931>
>     >>     
>     <https://urldefense.proofpoint.com/v2/url?u=http-3A__169.228.130.91-3A9931&d=DwMFaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=9Kg_R4c2zF6HHZSpAb3h3VrMr_pFJQ260VSKabOPtkulYwNWdPSP-sd5LVhMjPpw&s=AW4Xegl5wxbeERkKViynNkyDzu4pC5VhL7QR8sFGF44&e=
>     <https://urldefense.proofpoint.com/v2/url?u=http-3A__169.228.130.91-3A9931&d=DwMFaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=9Kg_R4c2zF6HHZSpAb3h3VrMr_pFJQ260VSKabOPtkulYwNWdPSP-sd5LVhMjPpw&s=AW4Xegl5wxbeERkKViynNkyDzu4pC5VhL7QR8sFGF44&e=>>
>     >>      every 30s all sync
>     >>      >>>>>> xrootd.monitor all auth flush 30s window 5s fstat
>     60 lfn ops xfr 5 dest
>     >>      >>>>>> files io info user 169.228.130.91:9930
>     <http://169.228.130.91:9930>
>     >>     
>     <https://urldefense.proofpoint.com/v2/url?u=http-3A__169.228.130.91-3A9930&d=DwMFaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=9Kg_R4c2zF6HHZSpAb3h3VrMr_pFJQ260VSKabOPtkulYwNWdPSP-sd5LVhMjPpw&s=9w5jNESVzo8Kp4KzAUI0Ymeo-wcerH5BqhqE0Rfk6oU&e=
>     <https://urldefense.proofpoint.com/v2/url?u=http-3A__169.228.130.91-3A9930&d=DwMFaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=9Kg_R4c2zF6HHZSpAb3h3VrMr_pFJQ260VSKabOPtkulYwNWdPSP-sd5LVhMjPpw&s=9w5jNESVzo8Kp4KzAUI0Ymeo-wcerH5BqhqE0Rfk6oU&e=>>
>     >>      dest fstat info user
>     >>      >>>>>> xrd-mon.osgstorage.org:9930
>     <http://xrd-mon.osgstorage.org:9930>
>     >>     
>     <https://urldefense.proofpoint.com/v2/url?u=http-3A__xrd-2Dmon.osgstorage.org-3A9930&d=DwMFaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=9Kg_R4c2zF6HHZSpAb3h3VrMr_pFJQ260VSKabOPtkulYwNWdPSP-sd5LVhMjPpw&s=lMHFksodly_4DGpPCSpc0-Wb9UGjl1_8yif-C2TNQrI&e=
>     <https://urldefense.proofpoint.com/v2/url?u=http-3A__xrd-2Dmon.osgstorage.org-3A9930&d=DwMFaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=9Kg_R4c2zF6HHZSpAb3h3VrMr_pFJQ260VSKabOPtkulYwNWdPSP-sd5LVhMjPpw&s=lMHFksodly_4DGpPCSpc0-Wb9UGjl1_8yif-C2TNQrI&e=>>
>     >>      >>>>>> all.sitename T2_US_Caltech
>     >>      >>>>>> # -------------------------------------
>     >>      >>>>>> # Configure redirector/server
>     >>      >>>>>> # -------------------------------------
>     >>      >>>>>> set xrdr = xrootd-redir-stageout.ultralight.org
>     <http://xrootd-redir-stageout.ultralight.org>
>     >>     
>     <https://urldefense.proofpoint.com/v2/url?u=http-3A__xrootd-2Dredir-2Dstageout.ultralight.org&d=DwMFaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=9Kg_R4c2zF6HHZSpAb3h3VrMr_pFJQ260VSKabOPtkulYwNWdPSP-sd5LVhMjPpw&s=HTNBiz85qLXQGkB75MafMeY4xc6vwkMUMuatd5_g0mo&e=
>     <https://urldefense.proofpoint.com/v2/url?u=http-3A__xrootd-2Dredir-2Dstageout.ultralight.org&d=DwMFaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=9Kg_R4c2zF6HHZSpAb3h3VrMr_pFJQ260VSKabOPtkulYwNWdPSP-sd5LVhMjPpw&s=HTNBiz85qLXQGkB75MafMeY4xc6vwkMUMuatd5_g0mo&e=>>
>     >>      >>>>>> xrd.port 1095
>     >>      >>>>>> all.manager $(xrdr):1213
>     >>      >>>>>>
>     >>      >>>>>> if $(xrdr)
>     >>      >>>>>>  # It's role is manager
>     >>      >>>>>>  all.role manager
>     >>      >>>>>>  # Redirect all lookup calls to original data
>     servers. Redirector
>     >>      does not
>     >>      >>>>>> have visibility of FS
>     >>      >>>>>>  cms.dfs lookup distrib mdhold 20m redirect immed
>     >>      >>>>>> else
>     >>      >>>>>>  # Role is server
>     >>      >>>>>>  all.role server
>     >>      >>>>>>  # The known managers (local redirector)
>     >>      >>>>>>  all.manager meta $(xrdr):1213
>     >>      >>>>>>
>     >>      >>>>>>  # Enable xrootd checksum calculation "on-the-fly"
>     using multiuser plugin
>     >>      >>>>>>  # This makes XRootD to write the files with the
>     >>      >>>>>>  # ownership of the user that authenticated to the
>     server and not as the
>     >>      >>>>>>  # 'xrootd' user
>     >>      >>>>>>  ofs.osslib ++ libXrdMultiuser.so
>     >>      >>>>>>  # Enable the checksum wrapper
>     >>      >>>>>>  ofs.ckslib * libXrdMultiuser.so
>     >>      >>>>>>  # Control of checksum
>     >>      >>>>>>  xrootd.chksum max 10 adler32
>     >>      >>>>>>  multiuser.checksumonwrite on
>     >>      >>>>>>  multiuser.umask 0002
>     >>      >>>>>>
>     >>      >>>>>> fi
>     >>      >>>>>> # -------------------------------------
>     >>      >>>>>> # Allow only specific path, checksum config
>     >>      >>>>>> # -------------------------------------
>     >>      >>>>>> # Allow any path to be exported; this is further
>     refined in the authfile.
>     >>      >>>>>> all.export /
>     >>      >>>>>>
>     >>      >>>>>> # Hosts allowed to use this xrootd cluster
>     >>      >>>>>> cms.allow host *
>     >>      >>>>>>
>     >>      >>>>>> # Enable xrootd debugging
>     >>      >>>>>> xrootd.trace emsg login stall redirect
>     >>      >>>>>> cms.trace defer files forward redirect
>     >>      >>>>>>
>     >>      >>>>>> # Disable async. Related issue:
>     >>      >>>>>>
>     >>
>     https://urldefense.proofpoint.com/v2/url?u=https-3A__github.com_xrootd_xrootd_issues_1113&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=L2XeYWMRRqstD75CgZb1yCHO9dgWL2K6Uqmqto5rx_Q&e=
>     <https://urldefense.proofpoint.com/v2/url?u=https-3A__github.com_xrootd_xrootd_issues_1113&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=L2XeYWMRRqstD75CgZb1yCHO9dgWL2K6Uqmqto5rx_Q&e=>
>     >>     
>     <https://urldefense.proofpoint.com/v2/url?u=https-3A__github.com_xrootd_xrootd_issues_1113&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=L2XeYWMRRqstD75CgZb1yCHO9dgWL2K6Uqmqto5rx_Q&e=
>     <https://urldefense.proofpoint.com/v2/url?u=https-3A__github.com_xrootd_xrootd_issues_1113&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=L2XeYWMRRqstD75CgZb1yCHO9dgWL2K6Uqmqto5rx_Q&e=>>
>     >>      >>>>>>
>     >>      >>>>>> xrootd.async off
>     >>      >>>>>>
>     >>      >>>>>> # -------------------------------------
>     >>      >>>>>> # Integrate with CMS Namespaces
>     >>      >>>>>> # It will see files under /store/...
>     >>      >>>>>> # -------------------------------------
>     >>      >>>>>> oss.localroot /storage/cms
>     >>      >>>>>> # -------------------------------------
>     >>      >>>>>> # Configure davs/https for TPC
>     >>      >>>>>> # -------------------------------------
>     >>      >>>>>> # Enable https over XrootD
>     >>      >>>>>> if exec xrootd
>     >>      >>>>>>  xrd.protocol http:1095 /usr/lib64/libXrdHttp.so
>     >>      >>>>>>  http.cadir /etc/grid-security/certificates
>     >>      >>>>>>  http.cert /etc/grid-security/xrootd/xrootdcert.pem
>     >>      >>>>>>  http.key /etc/grid-security/xrootd/xrootdkey.pem
>     >>      >>>>>>  http.secxtractor /usr/lib64/libXrdLcmaps.so
>     >>      >>>>>>  http.secretkey XXXXXXX
>     >>      >>>>>>  # Enable third-party-copy
>     >>      >>>>>>  http.exthandler xrdtpc libXrdHttpTPC.so
>     >>      >>>>>>  # Pass the bearer token to the Xrootd
>     authorization framework.
>     >>      >>>>>>  http.header2cgi Authorization authz
>     >>      >>>>>>  http.listingdeny yes
>     >>      >>>>>>  http.desthttps yes
>     >>      >>>>>>  http.selfhttps2http no
>     >>      >>>>>>  http.staticpreload
>     >>      >>>>>>
>     >>
>     https://urldefense.proofpoint.com/v2/url?u=http-3A__static_robots.txt&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=Laz4x7NvD_fTheDJu5m_cEES6_pePEidCLIAkrYNvPs&e=
>     <https://urldefense.proofpoint.com/v2/url?u=http-3A__static_robots.txt&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=Laz4x7NvD_fTheDJu5m_cEES6_pePEidCLIAkrYNvPs&e=>
>     >>     
>     <https://urldefense.proofpoint.com/v2/url?u=http-3A__static_robots.txt&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=Laz4x7NvD_fTheDJu5m_cEES6_pePEidCLIAkrYNvPs&e=
>     <https://urldefense.proofpoint.com/v2/url?u=http-3A__static_robots.txt&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=Laz4x7NvD_fTheDJu5m_cEES6_pePEidCLIAkrYNvPs&e=>>
>     >>      >>>>>>
>     >>      >>>>>> /etc/xrootd/robots.txt
>     >>      >>>>>>  http.exthandler xrdmacaroons libXrdMacaroons.so
>     >>      >>>>>> fi
>     >>      >>>>>>
>     >>      >>>>>>
>     >>      >>>>>> xrd.tls /etc/grid-security/xrootd/xrootdcert.pem
>     >>      >>>>>> /etc/grid-security/xrootd/xrootdkey.pem
>     >>      >>>>>> xrd.tlsca certdir /etc/grid-security/certificates
>     >>      >>>>>> xrootd.tls capable all
>     >>      >>>>>> sec.protocol /usr/lib64 ztn
>     >>      >>>>>>
>     >>      >>>>>>
>     >>      >>>>>>
>     >>      >>>>>> xrootd.trace all
>     >>      >>>>>> xrd.trace    all
>     >>      >>>>>> ofs.trace    all
>     >>      >>>>>> pfc.trace    all
>     >>      >>>>>> cms.trace    all
>     >>      >>>>>> # To debug connections to the fedration (5 Dump, 4
>     Debug, 3 Error, 2
>     >>      >>>>>> Warning, 1 Info)
>     >>      >>>>>> pss.setopt   DebugLevel 4
>     >>      >>>>>>
>     >>      >>>>>>
>     ########################################################################
>     >>      >>>>>> Use REPLY-ALL to reply to list
>     >>      >>>>>>
>     >>      >>>>>> To unsubscribe from the XROOTD-L list, click the
>     following link:
>     >>      >>>>>>
>     >>
>     https://urldefense.proofpoint.com/v2/url?u=https-3A__listserv.slac.stanford.edu_cgi-2Dbin_wa-3FSUBED1-3DXROOTD-2DL-26A-3D1&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=nmhVko_mWVLPvjSwEKtKkm17GDZSKRYlu7FW5xSiWAg&e=
>     <https://urldefense.proofpoint.com/v2/url?u=https-3A__listserv.slac.stanford.edu_cgi-2Dbin_wa-3FSUBED1-3DXROOTD-2DL-26A-3D1&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=nmhVko_mWVLPvjSwEKtKkm17GDZSKRYlu7FW5xSiWAg&e=>
>     >>     
>     <https://urldefense.proofpoint.com/v2/url?u=https-3A__listserv.slac.stanford.edu_cgi-2Dbin_wa-3FSUBED1-3DXROOTD-2DL-26A-3D1&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=nmhVko_mWVLPvjSwEKtKkm17GDZSKRYlu7FW5xSiWAg&e=
>     <https://urldefense.proofpoint.com/v2/url?u=https-3A__listserv.slac.stanford.edu_cgi-2Dbin_wa-3FSUBED1-3DXROOTD-2DL-26A-3D1&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=nmhVko_mWVLPvjSwEKtKkm17GDZSKRYlu7FW5xSiWAg&e=>>
>     >>      >>>>>>
>     >>      >>>>>>
>     >>      >>>>>
>     >>      >>>>>
>     ########################################################################
>     >>      >>>>> Use REPLY-ALL to reply to list
>     >>      >>>>>
>     >>      >>>>> To unsubscribe from the XROOTD-L list, click the
>     following link:
>     >>      >>>>>
>     >>
>     https://urldefense.proofpoint.com/v2/url?u=https-3A__listserv.slac.stanford.edu_cgi-2Dbin_wa-3FSUBED1-3DXROOTD-2DL-26A-3D1&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=nmhVko_mWVLPvjSwEKtKkm17GDZSKRYlu7FW5xSiWAg&e=
>     <https://urldefense.proofpoint.com/v2/url?u=https-3A__listserv.slac.stanford.edu_cgi-2Dbin_wa-3FSUBED1-3DXROOTD-2DL-26A-3D1&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=nmhVko_mWVLPvjSwEKtKkm17GDZSKRYlu7FW5xSiWAg&e=>
>     >>     
>     <https://urldefense.proofpoint.com/v2/url?u=https-3A__listserv.slac.stanford.edu_cgi-2Dbin_wa-3FSUBED1-3DXROOTD-2DL-26A-3D1&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=nmhVko_mWVLPvjSwEKtKkm17GDZSKRYlu7FW5xSiWAg&e=
>     <https://urldefense.proofpoint.com/v2/url?u=https-3A__listserv.slac.stanford.edu_cgi-2Dbin_wa-3FSUBED1-3DXROOTD-2DL-26A-3D1&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=nmhVko_mWVLPvjSwEKtKkm17GDZSKRYlu7FW5xSiWAg&e=>>
>     >>      >>>>>
>     >>      >>>>
>     >>      >>>>
>     >>      >>>>
>     ########################################################################
>     >>      >>>> Use REPLY-ALL to reply to list
>     >>      >>>>
>     >>      >>>> To unsubscribe from the XROOTD-L list, click the
>     following link:
>     >>      >>>>
>     >>
>     https://urldefense.proofpoint.com/v2/url?u=https-3A__listserv.slac.stanford.edu_cgi-2Dbin_wa-3FSUBED1-3DXROOTD-2DL-26A-3D1&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=nmhVko_mWVLPvjSwEKtKkm17GDZSKRYlu7FW5xSiWAg&e=
>     <https://urldefense.proofpoint.com/v2/url?u=https-3A__listserv.slac.stanford.edu_cgi-2Dbin_wa-3FSUBED1-3DXROOTD-2DL-26A-3D1&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=nmhVko_mWVLPvjSwEKtKkm17GDZSKRYlu7FW5xSiWAg&e=>
>     >>     
>     <https://urldefense.proofpoint.com/v2/url?u=https-3A__listserv.slac.stanford.edu_cgi-2Dbin_wa-3FSUBED1-3DXROOTD-2DL-26A-3D1&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=nmhVko_mWVLPvjSwEKtKkm17GDZSKRYlu7FW5xSiWAg&e=
>     <https://urldefense.proofpoint.com/v2/url?u=https-3A__listserv.slac.stanford.edu_cgi-2Dbin_wa-3FSUBED1-3DXROOTD-2DL-26A-3D1&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=nmhVko_mWVLPvjSwEKtKkm17GDZSKRYlu7FW5xSiWAg&e=>>
>     >>      >>>>
>     >>      >>>>
>     >>      >>>
>     >>      >>>
>     ########################################################################
>     >>      >>> Use REPLY-ALL to reply to list
>     >>      >>>
>     >>      >>> To unsubscribe from the XROOTD-L list, click the
>     following link:
>     >>      >>>
>     >>
>     https://urldefense.proofpoint.com/v2/url?u=https-3A__listserv.slac.stanford.edu_cgi-2Dbin_wa-3FSUBED1-3DXROOTD-2DL-26A-3D1&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=nmhVko_mWVLPvjSwEKtKkm17GDZSKRYlu7FW5xSiWAg&e=
>     <https://urldefense.proofpoint.com/v2/url?u=https-3A__listserv.slac.stanford.edu_cgi-2Dbin_wa-3FSUBED1-3DXROOTD-2DL-26A-3D1&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=nmhVko_mWVLPvjSwEKtKkm17GDZSKRYlu7FW5xSiWAg&e=>
>     >>     
>     <https://urldefense.proofpoint.com/v2/url?u=https-3A__listserv.slac.stanford.edu_cgi-2Dbin_wa-3FSUBED1-3DXROOTD-2DL-26A-3D1&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=nmhVko_mWVLPvjSwEKtKkm17GDZSKRYlu7FW5xSiWAg&e=
>     <https://urldefense.proofpoint.com/v2/url?u=https-3A__listserv.slac.stanford.edu_cgi-2Dbin_wa-3FSUBED1-3DXROOTD-2DL-26A-3D1&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=nmhVko_mWVLPvjSwEKtKkm17GDZSKRYlu7FW5xSiWAg&e=>>
>     >>      >>>
>     >>      >>>
>     >>      >>
>     >>
>     >
>     ########################################################################
>     > Use REPLY-ALL to reply to list
>     >
>     > To unsubscribe from the XROOTD-L list, click the following link:
>     >
>     https://listserv.slac.stanford.edu/cgi-bin/wa?SUBED1=XROOTD-L&A=1
>     <https://listserv.slac.stanford.edu/cgi-bin/wa?SUBED1=XROOTD-L&A=1>
>
>
> ------------------------------------------------------------------------
>
> Use REPLY-ALL to reply to list
>
> To unsubscribe from the XROOTD-L list, click the following link:
> https://listserv.slac.stanford.edu/cgi-bin/wa?SUBED1=XROOTD-L&A=1 
> <https://listserv.slac.stanford.edu/cgi-bin/wa?SUBED1=XROOTD-L&A=1>
>

########################################################################
Use REPLY-ALL to reply to list

To unsubscribe from the XROOTD-L list, click the following link:
https://listserv.slac.stanford.edu/cgi-bin/wa?SUBED1=XROOTD-L&A=1