| 
I can no longer reproduce the error.  All I can think of is some race condition where the factory/condor werenât reconfigured/restarted correctly?  Iâve definitely restarted both several times now.  But hereâs a little more context to what Marco reported:
  
 
We had no issues with the install on sl6.  We reinstalled the machine as sl7 and used the same condor and glideinwms versions.  We did not change any configurations of the factory or condor during the installation.  I canât guarantee someone made
 some changes out of band for other things on the sl6 install but the condor configs and gwms configs are completely managed by puppet so you canât adjust settings outside of puppet.   
 
 
The ERROR msgs I saw showed up when running the command as root or in the logs, for example: 
02/24/19 08:47:20 [86680]
ERROR "Gahp Server (pid=86711) unresponsive for 120 seconds" at line 525 in file
 /slots/16/dir_3109781/userdir/.tmpVhmMVH/BUILD/condor-8.6.11/src/condor_gridmanager/gahp-client.cpp 
 
 
 
Iâm still getting the gahp error but the one from running condor_q -g as root no longer shows up.  I no longer have the logs from the sl6 install so I have no idea if these gahp errors were there before or only after we moved to sl7. 
 
 
 
Hi
 Marco,
I
 think Steve was on the right track.
My
 guess is Steve wanted you to try:
  "condor_q
 -global -all"
In
 other words, try using "-all" flag in addition to the "-global" flag.
The
 deal is beginning in HTCondor v8.6, each schedd will try to 
authenticate
 the user issuing the condor_q command and only return jobs 
submitted
 by that same user.  So if user "marco" issues the condor_q, 
only
 jobs submitted by marco will be returned by default. If you include 
"-all",
 that tells the schedd to return all jobs regardless of who 
submitted
 them (and who is asking).
You
 can change the default back to how it was in HTCondor v8.5 and 
earlier
 via the following condor_config knob to False:
CONDOR_Q_ONLY_MY_JOBS
    A
 boolean value that, when True, causes condor_q to request that 
only
 the current user's jobs be queried unless the current user is a 
queue
 superuser. It also causes the condor_schedd to honor that request. 
The
 default value is True. A value of False in either condor_q or the 
condor_schedd
 will result in the old behavior of querying all jobs.
regards,
Todd
On
 2/24/2019 3:32 PM, Marco Mambelli wrote:
Thanks Steve, 
I think authentication is OK. Krista can chime in if she changed anything. 
It is on the same host and using FS authentication and gives AUTHORIZED. 
 
condor_q -all works OK. 
$ condor_q -all 
 
-- Schedd: myhost.fnal.gov : <131.225.X.X:9615?... @ 02/24/19 10:07:49 
OWNER       BATCH_NAME                 SUBMITTED   DONE   RUN    IDLE  TOTAL JOB_IDS 
cmstier0_1  CMD: glidein_startup.sh   2/15 10:31     24    123    169    316 166.9 ... 28956.0 
cmsglobal_1 CMD: glidein_startup.sh   2/16 07:08    634    250    651   1535 2485.1 ... 28954.0 
cmsglobal_2 CMD: glidein_startup.sh   2/21 08:19    664    582    254   1510 19267.0 ... 28927.9 
cmstier0_2  CMD: glidein_startup.sh   2/23 00:44     26    287    119    432 24518.0 ... 28812.5 
 
2445 jobs; 0 completed, 10 removed, 1193 idle, 1242 running, 0 held, 0 suspended 
 
 
$ _CONDOR_TOOL_DEBUG="D_FULLDEBUG  D_SECURITY" condor_q -debug -g 2> /tmp/cq_dbg.txt 
$ cat /tmp/cq_dbg.txt 
02/24/19 15:30:12 KEYCACHE: created: 0x1249a40 
02/24/19 15:30:12 Result of reading /etc/issue:  \S 
 
02/24/19 15:30:12 Result of reading /etc/redhat-release:  Scientific Linux release 7.5 (Nitrogen) 
 
02/24/19 15:30:12 Using IDs: 16 processors, 8 CPUs, 8 HTs 
02/24/19 15:30:12 Reading condor configuration from '/etc/condor/condor_config' 
02/24/19 15:30:12 Enumerating interfaces: lo 127.0.0.1 up 
02/24/19 15:30:12 Enumerating interfaces: eth2 131.225.205.7 up 
02/24/19 15:30:12 WARNING: Config source is empty: /etc/condor/config.d/90_condor_test 
02/24/19 15:30:12 Will use TCP to update collector 
cmsgwms-factory.fnal.gov <131.225.205.7:9618> 
02/24/19 15:30:12 Trying to query collector <131.225.205.7:9618> 
02/24/19 15:30:12 SECMAN: command 6 QUERY_SCHEDD_ADS to collector at <131.225.205.7:9618> from TCP port 24674 (blocking). 
02/24/19 15:30:12 SECMAN: no cached key for {<131.225.205.7:9618>,<6>}. 
02/24/19 15:30:12 SECMAN: Security Policy: 
SessionLease = 3600 
NewSession = "YES" 
CryptoMethods = "3DES,BLOWFISH" 
OutgoingNegotiation = "PREFERRED" 
Authentication = "OPTIONAL" 
Encryption = "OPTIONAL" 
ServerPid = 491937 
Integrity = "OPTIONAL" 
Subsystem = "TOOL" 
Enact = "NO" 
AuthMethods = "FS,GSI" 
SessionDuration = "60" 
02/24/19 15:30:12 SECMAN: negotiating security for command 6. 
02/24/19 15:30:12 SECMAN: sending DC_AUTHENTICATE command 
02/24/19 15:30:12 SECMAN: sending following classad: 
RemoteVersion = "$CondorVersion: 8.6.11 May 10 2018 BuildID: 440910 $" 
SessionLease = 3600 
NewSession = "YES" 
CryptoMethods = "3DES,BLOWFISH" 
OutgoingNegotiation = "PREFERRED" 
Authentication = "OPTIONAL" 
Encryption = "OPTIONAL" 
ServerPid = 491937 
Integrity = "OPTIONAL" 
Subsystem = "TOOL" 
Enact = "NO" 
Command = 6 
AuthMethods = "FS,GSI" 
SessionDuration = "60" 
02/24/19 15:30:12 SECMAN: server responded with: 
Encryption = "NO" 
Integrity = "NO" 
AuthMethodsList = "FS,GSI" 
AuthMethods = "FS" 
CryptoMethods = "3DES,BLOWFISH" 
Authentication = "NO" 
SessionDuration = "60" 
SessionLease = 3600 
RemoteVersion = "$CondorVersion: 8.6.11 May 10 2018 BuildID: 440910 $" 
Enact = "YES" 
02/24/19 15:30:12 SECMAN: received post-auth classad: 
User = "unauthenticated@unmapped" 
Sid = "cmsgwms-factory:41971:1551043812:91585" 
ValidCommands = "60007,457,60020,68,5,6,7,9,12,43,20,46,78,50,56,62,65,48,71,74" 
ReturnCode = "AUTHORIZED" 
02/24/19 15:30:12 SECMAN: policy to be cached: 
User = "unauthenticated@unmapped" 
ValidCommands = "60007,457,60020,68,5,6,7,9,12,43,20,46,78,50,56,62,65,48,71,74" 
Sid = "cmsgwms-factory:41971:1551043812:91585" 
MyRemoteUserName = "unauthenticated@unmapped" 
UseSession = "YES" 
AuthMethodsList = "FS,GSI" 
RemoteVersion = "$CondorVersion: 8.6.11 May 10 2018 BuildID: 440910 $" 
SessionLease = 3600 
CryptoMethods = "3DES,BLOWFISH" 
OutgoingNegotiation = "PREFERRED" 
Authentication = "NO" 
Encryption = "NO" 
Integrity = "NO" 
Subsystem = "TOOL" 
Enact = "YES" 
Command = 6 
AuthMethods = "FS" 
SessionDuration = "60" 
02/24/19 15:30:12 SECMAN: added session cmsgwms-factory:41971:1551043812:91585 to cache for 60 seconds (3600s lease). 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9618>,<60007>} mapped to session cmsgwms-factory:41971:1551043812:91585. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9618>,<457>} mapped to session cmsgwms-factory:41971:1551043812:91585. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9618>,<60020>} mapped to session cmsgwms-factory:41971:1551043812:91585. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9618>,<68>} mapped to session cmsgwms-factory:41971:1551043812:91585. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9618>,<5>} mapped to session cmsgwms-factory:41971:1551043812:91585. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9618>,<6>} mapped to session cmsgwms-factory:41971:1551043812:91585. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9618>,<7>} mapped to session cmsgwms-factory:41971:1551043812:91585. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9618>,<9>} mapped to session cmsgwms-factory:41971:1551043812:91585. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9618>,<12>} mapped to session cmsgwms-factory:41971:1551043812:91585. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9618>,<43>} mapped to session cmsgwms-factory:41971:1551043812:91585. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9618>,<20>} mapped to session cmsgwms-factory:41971:1551043812:91585. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9618>,<46>} mapped to session cmsgwms-factory:41971:1551043812:91585. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9618>,<78>} mapped to session cmsgwms-factory:41971:1551043812:91585. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9618>,<50>} mapped to session cmsgwms-factory:41971:1551043812:91585. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9618>,<56>} mapped to session cmsgwms-factory:41971:1551043812:91585. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9618>,<62>} mapped to session cmsgwms-factory:41971:1551043812:91585. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9618>,<65>} mapped to session cmsgwms-factory:41971:1551043812:91585. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9618>,<48>} mapped to session cmsgwms-factory:41971:1551043812:91585. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9618>,<71>} mapped to session cmsgwms-factory:41971:1551043812:91585. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9618>,<74>} mapped to session cmsgwms-factory:41971:1551043812:91585. 
02/24/19 15:30:12 SECMAN: startCommand succeeded. 
02/24/19 15:30:12 Authorizing server 'unauthenticated@unmapped/131.225.205.7'. 
02/24/19 15:30:12 IPVERIFY: Subsystem TOOL 
02/24/19 15:30:12 IPVERIFY: Permission ALLOW 
02/24/19 15:30:12 IPVERIFY: Subsystem TOOL 
02/24/19 15:30:12 IPVERIFY: Permission READ 
02/24/19 15:30:12 ipverify: READ optimized to allow anyone 
02/24/19 15:30:12 IPVERIFY: Subsystem TOOL 
02/24/19 15:30:12 IPVERIFY: Permission WRITE 
02/24/19 15:30:12 ipverify: WRITE optimized to allow anyone 
02/24/19 15:30:12 IPVERIFY: Subsystem TOOL 
02/24/19 15:30:12 IPVERIFY: Permission NEGOTIATOR 
02/24/19 15:30:12 ipverify: NEGOTIATOR optimized to allow anyone 
02/24/19 15:30:12 IPVERIFY: Subsystem TOOL 
02/24/19 15:30:12 IPVERIFY: Permission ADMINISTRATOR 
02/24/19 15:30:12 ipverify: ADMINISTRATOR optimized to allow anyone 
02/24/19 15:30:12 IPVERIFY: Subsystem TOOL 
02/24/19 15:30:12 IPVERIFY: Permission OWNER 
02/24/19 15:30:12 ipverify: OWNER optimized to allow anyone 
02/24/19 15:30:12 IPVERIFY: Subsystem TOOL 
02/24/19 15:30:12 IPVERIFY: Permission CONFIG 
02/24/19 15:30:12 ipverify: CONFIG optimized to deny everyone 
02/24/19 15:30:12 IPVERIFY: Subsystem TOOL 
02/24/19 15:30:12 IPVERIFY: Permission DAEMON 
02/24/19 15:30:12 ipverify: DAEMON optimized to allow anyone 
02/24/19 15:30:12 IPVERIFY: Subsystem TOOL 
02/24/19 15:30:12 IPVERIFY: Permission SOAP 
02/24/19 15:30:12 ipverify: SOAP optimized to allow anyone 
02/24/19 15:30:12 IPVERIFY: Subsystem TOOL 
02/24/19 15:30:12 IPVERIFY: Permission DEFAULT 
02/24/19 15:30:12 ipverify: DEFAULT optimized to allow anyone 
02/24/19 15:30:12 IPVERIFY: Subsystem TOOL 
02/24/19 15:30:12 IPVERIFY: Permission CLIENT 
02/24/19 15:30:12 IPVERIFY: deny CLIENT: anonymous@* (from config value DENY_CLIENT) 
02/24/19 15:30:12 IPVERIFY: Subsystem TOOL 
02/24/19 15:30:12 IPVERIFY: Permission ADVERTISE_STARTD 
02/24/19 15:30:12 ipverify: ADVERTISE_STARTD optimized to allow anyone 
02/24/19 15:30:12 IPVERIFY: Subsystem TOOL 
02/24/19 15:30:12 IPVERIFY: Permission ADVERTISE_SCHEDD 
02/24/19 15:30:12 ipverify: ADVERTISE_SCHEDD optimized to allow anyone 
02/24/19 15:30:12 IPVERIFY: Subsystem TOOL 
02/24/19 15:30:12 IPVERIFY: Permission ADVERTISE_MASTER 
02/24/19 15:30:12 ipverify: ADVERTISE_MASTER optimized to allow anyone 
02/24/19 15:30:12 Initialized the following authorization table: 
02/24/19 15:30:12 Authorizations yet to be resolved: 
02/24/19 15:30:12 deny CLIENT:  anonymous@*/* 
02/24/19 15:30:12 IPVERIFY: checking 
cmsgwms-factory.fnal.gov against 131.225.205.7 addrs are: 
131.225.205.7 
02/24/19 15:30:12 IPVERIFY: for 
cmsgwms-factory.fnal.gov matched 131.225.205.7 to 131.225.205.7 
02/24/19 15:30:12 IPVERIFY: checking cmsgwms-factory against 131.225.205.7 addrs are: 
131.225.205.7 
02/24/19 15:30:12 IPVERIFY: for cmsgwms-factory matched 131.225.205.7 to 131.225.205.7 
02/24/19 15:30:12 IPVERIFY: unauthenticated@unmapped at <131.225.205.7:9618> not matched to deny list, so allowing. 
02/24/19 15:30:12 Adding to resolved authorization table: unauthenticated@unmapped/131.225.205.7: CLIENT 
02/24/19 15:30:12 SharedPortClient: sent connection request to schedd at <131.225.205.7:9615> for shared port id 41892_018c_9 
02/24/19 15:30:12 SECMAN: command 519 QUERY_JOB_ADS_WITH_AUTH to schedd at <131.225.205.7:9615> from TCP port 26265 (blocking). 
02/24/19 15:30:12 SECMAN: no cached key for {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_9>,<519>}. 
02/24/19 15:30:12 SECMAN: Security Policy: 
SessionLease = 3600 
NewSession = "YES" 
CryptoMethods = "3DES,BLOWFISH" 
OutgoingNegotiation = "PREFERRED" 
Authentication = "OPTIONAL" 
Encryption = "OPTIONAL" 
ServerPid = 491937 
Integrity = "OPTIONAL" 
Subsystem = "TOOL" 
Enact = "NO" 
AuthMethods = "FS,GSI" 
SessionDuration = "60" 
02/24/19 15:30:12 SECMAN: negotiating security for command 519. 
02/24/19 15:30:12 SECMAN: sending DC_AUTHENTICATE command 
02/24/19 15:30:12 SECMAN: sending following classad: 
RemoteVersion = "$CondorVersion: 8.6.11 May 10 2018 BuildID: 440910 $" 
SessionLease = 3600 
NewSession = "YES" 
CryptoMethods = "3DES,BLOWFISH" 
OutgoingNegotiation = "PREFERRED" 
Authentication = "OPTIONAL" 
Encryption = "OPTIONAL" 
ServerPid = 491937 
Integrity = "OPTIONAL" 
Subsystem = "TOOL" 
Enact = "NO" 
Command = 519 
AuthMethods = "FS,GSI" 
SessionDuration = "60" 
02/24/19 15:30:12 SECMAN: server responded with: 
ServerTime = 1551043812 
Encryption = "NO" 
Integrity = "NO" 
AuthMethodsList = "FS,GSI" 
AuthMethods = "FS" 
CryptoMethods = "3DES,BLOWFISH" 
Authentication = "YES" 
SessionDuration = "60" 
SessionLease = 3600 
RemoteVersion = "$CondorVersion: 8.6.11 May 10 2018 BuildID: 440910 $" 
Enact = "YES" 
02/24/19 15:30:12 SECMAN: new session, doing initial authentication. 
02/24/19 15:30:12 SECMAN: authenticating RIGHT NOW. 
02/24/19 15:30:12 SECMAN: AuthMethodsList: FS,GSI 
02/24/19 15:30:12 SECMAN: Auth methods: FS,GSI 
02/24/19 15:30:12 AUTHENTICATE: setting timeout for <131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_9> to 20. 
02/24/19 15:30:12 AUTHENTICATE: in authenticate( addr == '<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_9>', methods == 'FS,GSI') 
02/24/19 15:30:12 AUTHENTICATE: can still try these methods: FS,GSI 
02/24/19 15:30:12 HANDSHAKE: in handshake(my_methods = 'FS,GSI') 
02/24/19 15:30:12 HANDSHAKE: handshake() - i am the client 
02/24/19 15:30:12 HANDSHAKE: sending (methods == 36) to server 
02/24/19 15:30:12 HANDSHAKE: server replied (method = 4) 
02/24/19 15:30:12 AUTHENTICATE: will try to use 4 (FS) 
02/24/19 15:30:12 AUTHENTICATE: do_authenticate is 1. 
02/24/19 15:30:12 AUTHENTICATE_FS: used dir /tmp/FS_XXXs7Ztf1, status: 1 
02/24/19 15:30:12 AUTHENTICATE: auth_status == 4 (FS) 
02/24/19 15:30:12 Authentication was a Success. 
02/24/19 15:30:12 ZKM: setting default map to (null) 
02/24/19 15:30:12 ZKM: name to map is null, not mapping. 
02/24/19 15:30:12 ZKM: post-map: current user is '(null)' 
02/24/19 15:30:12 ZKM: post-map: current domain is '(null)' 
02/24/19 15:30:12 ZKM: post-map: current FQU is '(null)' 
02/24/19 15:30:12 AUTHENTICATE: Exchanging keys with remote side. 
02/24/19 15:30:12 AUTHENTICATE: Result of end of authenticate is 1. 
02/24/19 15:30:12 SECMAN: received post-auth classad: 
ServerTime = 1551043812 
User = "cmsgwmsfactory@xxxxxxxxxxxxxxxxxxxxxxxx" 
Sid = "cmsgwms-factory:41984:1551043812:88392" 
TriedAuthentication = true 
ValidCommands = "60007,457,60020,443,441,6,12,515,516,519,1111,471" 
ReturnCode = "AUTHORIZED" 
02/24/19 15:30:12 SECMAN: policy to be cached: 
TriedAuthentication = true 
User = "unauthenticated@unmapped" 
ValidCommands = "60007,457,60020,443,441,6,12,515,516,519,1111,471" 
Sid = "cmsgwms-factory:41984:1551043812:88392" 
MyRemoteUserName = "cmsgwmsfactory@xxxxxxxxxxxxxxxxxxxxxxxx" 
UseSession = "YES" 
AuthMethodsList = "FS,GSI" 
RemoteVersion = "$CondorVersion: 8.6.11 May 10 2018 BuildID: 440910 $" 
SessionLease = 3600 
CryptoMethods = "3DES" 
OutgoingNegotiation = "PREFERRED" 
Authentication = "YES" 
Encryption = "NO" 
Integrity = "NO" 
Subsystem = "TOOL" 
Enact = "YES" 
Command = 519 
AuthMethods = "FS" 
SessionDuration = "60" 
02/24/19 15:30:12 SECMAN: added session cmsgwms-factory:41984:1551043812:88392 to cache for 60 seconds (3600s lease). 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_9>,<60007>} mapped to session cmsgwms-factory:41984:1551043812:88392. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_9>,<457>} mapped to session cmsgwms-factory:41984:1551043812:88392. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_9>,<60020>} mapped to session cmsgwms-factory:41984:1551043812:88392. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_9>,<443>} mapped to session cmsgwms-factory:41984:1551043812:88392. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_9>,<441>} mapped to session cmsgwms-factory:41984:1551043812:88392. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_9>,<6>} mapped to session cmsgwms-factory:41984:1551043812:88392. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_9>,<12>} mapped to session cmsgwms-factory:41984:1551043812:88392. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_9>,<515>} mapped to session cmsgwms-factory:41984:1551043812:88392. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_9>,<516>} mapped to session cmsgwms-factory:41984:1551043812:88392. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_9>,<519>} mapped to session cmsgwms-factory:41984:1551043812:88392. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_9>,<1111>} mapped to session cmsgwms-factory:41984:1551043812:88392. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_9>,<471>} mapped to session cmsgwms-factory:41984:1551043812:88392. 
02/24/19 15:30:12 SECMAN: startCommand succeeded. 
02/24/19 15:30:12 Authorizing server 'unauthenticated@unmapped/131.225.205.7'. 
02/24/19 15:30:12 Sent classad to schedd 
02/24/19 15:30:12 Got classad from schedd. 
02/24/19 15:30:12 Ad was last one from schedd. 
02/24/19 15:30:12 SharedPortClient: sent connection request to schedd at <131.225.205.7:9615> for shared port id 41892_018c_5 
02/24/19 15:30:12 SECMAN: command 519 QUERY_JOB_ADS_WITH_AUTH to schedd at <131.225.205.7:9615> from TCP port 7176 (blocking). 
02/24/19 15:30:12 SECMAN: no cached key for {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_5>,<519>}. 
02/24/19 15:30:12 SECMAN: Security Policy: 
SessionLease = 3600 
NewSession = "YES" 
CryptoMethods = "3DES,BLOWFISH" 
OutgoingNegotiation = "PREFERRED" 
Authentication = "OPTIONAL" 
Encryption = "OPTIONAL" 
ServerPid = 491937 
Integrity = "OPTIONAL" 
Subsystem = "TOOL" 
Enact = "NO" 
AuthMethods = "FS,GSI" 
SessionDuration = "60" 
02/24/19 15:30:12 SECMAN: negotiating security for command 519. 
02/24/19 15:30:12 SECMAN: sending DC_AUTHENTICATE command 
02/24/19 15:30:12 SECMAN: sending following classad: 
RemoteVersion = "$CondorVersion: 8.6.11 May 10 2018 BuildID: 440910 $" 
SessionLease = 3600 
NewSession = "YES" 
CryptoMethods = "3DES,BLOWFISH" 
OutgoingNegotiation = "PREFERRED" 
Authentication = "OPTIONAL" 
Encryption = "OPTIONAL" 
ServerPid = 491937 
Integrity = "OPTIONAL" 
Subsystem = "TOOL" 
Enact = "NO" 
Command = 519 
AuthMethods = "FS,GSI" 
SessionDuration = "60" 
02/24/19 15:30:12 SECMAN: server responded with: 
ServerTime = 1551043812 
Encryption = "NO" 
Integrity = "NO" 
AuthMethodsList = "FS,GSI" 
AuthMethods = "FS" 
CryptoMethods = "3DES,BLOWFISH" 
Authentication = "YES" 
SessionDuration = "60" 
SessionLease = 3600 
RemoteVersion = "$CondorVersion: 8.6.11 May 10 2018 BuildID: 440910 $" 
Enact = "YES" 
02/24/19 15:30:12 SECMAN: new session, doing initial authentication. 
02/24/19 15:30:12 SECMAN: authenticating RIGHT NOW. 
02/24/19 15:30:12 SECMAN: AuthMethodsList: FS,GSI 
02/24/19 15:30:12 SECMAN: Auth methods: FS,GSI 
02/24/19 15:30:12 AUTHENTICATE: setting timeout for <131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_5> to 20. 
02/24/19 15:30:12 AUTHENTICATE: in authenticate( addr == '<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_5>', methods == 'FS,GSI') 
02/24/19 15:30:12 AUTHENTICATE: can still try these methods: FS,GSI 
02/24/19 15:30:12 HANDSHAKE: in handshake(my_methods = 'FS,GSI') 
02/24/19 15:30:12 HANDSHAKE: handshake() - i am the client 
02/24/19 15:30:12 HANDSHAKE: sending (methods == 36) to server 
02/24/19 15:30:12 HANDSHAKE: server replied (method = 4) 
02/24/19 15:30:12 AUTHENTICATE: will try to use 4 (FS) 
02/24/19 15:30:12 AUTHENTICATE: do_authenticate is 1. 
02/24/19 15:30:12 AUTHENTICATE_FS: used dir /tmp/FS_XXX9QjUHi, status: 1 
02/24/19 15:30:12 AUTHENTICATE: auth_status == 4 (FS) 
02/24/19 15:30:12 Authentication was a Success. 
02/24/19 15:30:12 ZKM: setting default map to (null) 
02/24/19 15:30:12 ZKM: name to map is null, not mapping. 
02/24/19 15:30:12 ZKM: post-map: current user is '(null)' 
02/24/19 15:30:12 ZKM: post-map: current domain is '(null)' 
02/24/19 15:30:12 ZKM: post-map: current FQU is '(null)' 
02/24/19 15:30:12 AUTHENTICATE: Exchanging keys with remote side. 
02/24/19 15:30:12 AUTHENTICATE: Result of end of authenticate is 1. 
02/24/19 15:30:12 SECMAN: received post-auth classad: 
ServerTime = 1551043812 
User = "cmsgwmsfactory@xxxxxxxxxxxxxxxxxxxxxxxx" 
Sid = "cmsgwms-factory:41974:1551043812:88289" 
TriedAuthentication = true 
ValidCommands = "60007,457,60020,443,441,6,12,515,516,519,1111,471" 
ReturnCode = "AUTHORIZED" 
02/24/19 15:30:12 SECMAN: policy to be cached: 
TriedAuthentication = true 
User = "unauthenticated@unmapped" 
ValidCommands = "60007,457,60020,443,441,6,12,515,516,519,1111,471" 
Sid = "cmsgwms-factory:41974:1551043812:88289" 
MyRemoteUserName = "cmsgwmsfactory@xxxxxxxxxxxxxxxxxxxxxxxx" 
UseSession = "YES" 
AuthMethodsList = "FS,GSI" 
RemoteVersion = "$CondorVersion: 8.6.11 May 10 2018 BuildID: 440910 $" 
SessionLease = 3600 
CryptoMethods = "3DES" 
OutgoingNegotiation = "PREFERRED" 
Authentication = "YES" 
Encryption = "NO" 
Integrity = "NO" 
Subsystem = "TOOL" 
Enact = "YES" 
Command = 519 
AuthMethods = "FS" 
SessionDuration = "60" 
02/24/19 15:30:12 SECMAN: added session cmsgwms-factory:41974:1551043812:88289 to cache for 60 seconds (3600s lease). 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_5>,<60007>} mapped to session cmsgwms-factory:41974:1551043812:88289. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_5>,<457>} mapped to session cmsgwms-factory:41974:1551043812:88289. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_5>,<60020>} mapped to session cmsgwms-factory:41974:1551043812:88289. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_5>,<443>} mapped to session cmsgwms-factory:41974:1551043812:88289. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_5>,<441>} mapped to session cmsgwms-factory:41974:1551043812:88289. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_5>,<6>} mapped to session cmsgwms-factory:41974:1551043812:88289. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_5>,<12>} mapped to session cmsgwms-factory:41974:1551043812:88289. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_5>,<515>} mapped to session cmsgwms-factory:41974:1551043812:88289. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_5>,<516>} mapped to session cmsgwms-factory:41974:1551043812:88289. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_5>,<519>} mapped to session cmsgwms-factory:41974:1551043812:88289. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_5>,<1111>} mapped to session cmsgwms-factory:41974:1551043812:88289. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_5>,<471>} mapped to session cmsgwms-factory:41974:1551043812:88289. 
02/24/19 15:30:12 SECMAN: startCommand succeeded. 
02/24/19 15:30:12 Authorizing server 'unauthenticated@unmapped/131.225.205.7'. 
02/24/19 15:30:12 Sent classad to schedd 
02/24/19 15:30:12 Got classad from schedd. 
02/24/19 15:30:12 Ad was last one from schedd. 
02/24/19 15:30:12 SharedPortClient: sent connection request to schedd at <131.225.205.7:9615> for shared port id 41892_018c_6 
02/24/19 15:30:12 SECMAN: command 519 QUERY_JOB_ADS_WITH_AUTH to schedd at <131.225.205.7:9615> from TCP port 14362 (blocking). 
02/24/19 15:30:12 SECMAN: no cached key for {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_6>,<519>}. 
02/24/19 15:30:12 SECMAN: Security Policy: 
SessionLease = 3600 
NewSession = "YES" 
CryptoMethods = "3DES,BLOWFISH" 
OutgoingNegotiation = "PREFERRED" 
Authentication = "OPTIONAL" 
Encryption = "OPTIONAL" 
ServerPid = 491937 
Integrity = "OPTIONAL" 
Subsystem = "TOOL" 
Enact = "NO" 
AuthMethods = "FS,GSI" 
SessionDuration = "60" 
02/24/19 15:30:12 SECMAN: negotiating security for command 519. 
02/24/19 15:30:12 SECMAN: sending DC_AUTHENTICATE command 
02/24/19 15:30:12 SECMAN: sending following classad: 
RemoteVersion = "$CondorVersion: 8.6.11 May 10 2018 BuildID: 440910 $" 
SessionLease = 3600 
NewSession = "YES" 
CryptoMethods = "3DES,BLOWFISH" 
OutgoingNegotiation = "PREFERRED" 
Authentication = "OPTIONAL" 
Encryption = "OPTIONAL" 
ServerPid = 491937 
Integrity = "OPTIONAL" 
Subsystem = "TOOL" 
Enact = "NO" 
Command = 519 
AuthMethods = "FS,GSI" 
SessionDuration = "60" 
02/24/19 15:30:12 SECMAN: server responded with: 
ServerTime = 1551043812 
Encryption = "NO" 
Integrity = "NO" 
AuthMethodsList = "FS,GSI" 
AuthMethods = "FS" 
CryptoMethods = "3DES,BLOWFISH" 
Authentication = "YES" 
SessionDuration = "60" 
SessionLease = 3600 
RemoteVersion = "$CondorVersion: 8.6.11 May 10 2018 BuildID: 440910 $" 
Enact = "YES" 
02/24/19 15:30:12 SECMAN: new session, doing initial authentication. 
02/24/19 15:30:12 SECMAN: authenticating RIGHT NOW. 
02/24/19 15:30:12 SECMAN: AuthMethodsList: FS,GSI 
02/24/19 15:30:12 SECMAN: Auth methods: FS,GSI 
02/24/19 15:30:12 AUTHENTICATE: setting timeout for <131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_6> to 20. 
02/24/19 15:30:12 AUTHENTICATE: in authenticate( addr == '<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_6>', methods == 'FS,GSI') 
02/24/19 15:30:12 AUTHENTICATE: can still try these methods: FS,GSI 
02/24/19 15:30:12 HANDSHAKE: in handshake(my_methods = 'FS,GSI') 
02/24/19 15:30:12 HANDSHAKE: handshake() - i am the client 
02/24/19 15:30:12 HANDSHAKE: sending (methods == 36) to server 
02/24/19 15:30:12 HANDSHAKE: server replied (method = 4) 
02/24/19 15:30:12 AUTHENTICATE: will try to use 4 (FS) 
02/24/19 15:30:12 AUTHENTICATE: do_authenticate is 1. 
02/24/19 15:30:12 AUTHENTICATE_FS: used dir /tmp/FS_XXXTD8lYO, status: 1 
02/24/19 15:30:12 AUTHENTICATE: auth_status == 4 (FS) 
02/24/19 15:30:12 Authentication was a Success. 
02/24/19 15:30:12 ZKM: setting default map to (null) 
02/24/19 15:30:12 ZKM: name to map is null, not mapping. 
02/24/19 15:30:12 ZKM: post-map: current user is '(null)' 
02/24/19 15:30:12 ZKM: post-map: current domain is '(null)' 
02/24/19 15:30:12 ZKM: post-map: current FQU is '(null)' 
02/24/19 15:30:12 AUTHENTICATE: Exchanging keys with remote side. 
02/24/19 15:30:12 AUTHENTICATE: Result of end of authenticate is 1. 
02/24/19 15:30:12 SECMAN: received post-auth classad: 
ServerTime = 1551043812 
User = "cmsgwmsfactory@xxxxxxxxxxxxxxxxxxxxxxxx" 
Sid = "cmsgwms-factory:41975:1551043812:87485" 
TriedAuthentication = true 
ValidCommands = "60007,457,60020,443,441,6,12,515,516,519,1111,471" 
ReturnCode = "AUTHORIZED" 
02/24/19 15:30:12 SECMAN: policy to be cached: 
TriedAuthentication = true 
User = "unauthenticated@unmapped" 
ValidCommands = "60007,457,60020,443,441,6,12,515,516,519,1111,471" 
Sid = "cmsgwms-factory:41975:1551043812:87485" 
MyRemoteUserName = "cmsgwmsfactory@xxxxxxxxxxxxxxxxxxxxxxxx" 
UseSession = "YES" 
AuthMethodsList = "FS,GSI" 
RemoteVersion = "$CondorVersion: 8.6.11 May 10 2018 BuildID: 440910 $" 
SessionLease = 3600 
CryptoMethods = "3DES" 
OutgoingNegotiation = "PREFERRED" 
Authentication = "YES" 
Encryption = "NO" 
Integrity = "NO" 
Subsystem = "TOOL" 
Enact = "YES" 
Command = 519 
AuthMethods = "FS" 
SessionDuration = "60" 
02/24/19 15:30:12 SECMAN: added session cmsgwms-factory:41975:1551043812:87485 to cache for 60 seconds (3600s lease). 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_6>,<60007>} mapped to session cmsgwms-factory:41975:1551043812:87485. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_6>,<457>} mapped to session cmsgwms-factory:41975:1551043812:87485. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_6>,<60020>} mapped to session cmsgwms-factory:41975:1551043812:87485. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_6>,<443>} mapped to session cmsgwms-factory:41975:1551043812:87485. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_6>,<441>} mapped to session cmsgwms-factory:41975:1551043812:87485. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_6>,<6>} mapped to session cmsgwms-factory:41975:1551043812:87485. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_6>,<12>} mapped to session cmsgwms-factory:41975:1551043812:87485. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_6>,<515>} mapped to session cmsgwms-factory:41975:1551043812:87485. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_6>,<516>} mapped to session cmsgwms-factory:41975:1551043812:87485. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_6>,<519>} mapped to session cmsgwms-factory:41975:1551043812:87485. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_6>,<1111>} mapped to session cmsgwms-factory:41975:1551043812:87485. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_6>,<471>} mapped to session cmsgwms-factory:41975:1551043812:87485. 
02/24/19 15:30:12 SECMAN: startCommand succeeded. 
02/24/19 15:30:12 Authorizing server 'unauthenticated@unmapped/131.225.205.7'. 
02/24/19 15:30:12 Sent classad to schedd 
02/24/19 15:30:12 Got classad from schedd. 
02/24/19 15:30:12 Ad was last one from schedd. 
02/24/19 15:30:12 SharedPortClient: sent connection request to schedd at <131.225.205.7:9615> for shared port id 41892_018c_7 
02/24/19 15:30:12 SECMAN: command 519 QUERY_JOB_ADS_WITH_AUTH to schedd at <131.225.205.7:9615> from TCP port 9505 (blocking). 
02/24/19 15:30:12 SECMAN: no cached key for {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_7>,<519>}. 
02/24/19 15:30:12 SECMAN: Security Policy: 
SessionLease = 3600 
NewSession = "YES" 
CryptoMethods = "3DES,BLOWFISH" 
OutgoingNegotiation = "PREFERRED" 
Authentication = "OPTIONAL" 
Encryption = "OPTIONAL" 
ServerPid = 491937 
Integrity = "OPTIONAL" 
Subsystem = "TOOL" 
Enact = "NO" 
AuthMethods = "FS,GSI" 
SessionDuration = "60" 
02/24/19 15:30:12 SECMAN: negotiating security for command 519. 
02/24/19 15:30:12 SECMAN: sending DC_AUTHENTICATE command 
02/24/19 15:30:12 SECMAN: sending following classad: 
RemoteVersion = "$CondorVersion: 8.6.11 May 10 2018 BuildID: 440910 $" 
SessionLease = 3600 
NewSession = "YES" 
CryptoMethods = "3DES,BLOWFISH" 
OutgoingNegotiation = "PREFERRED" 
Authentication = "OPTIONAL" 
Encryption = "OPTIONAL" 
ServerPid = 491937 
Integrity = "OPTIONAL" 
Subsystem = "TOOL" 
Enact = "NO" 
Command = 519 
AuthMethods = "FS,GSI" 
SessionDuration = "60" 
02/24/19 15:30:12 SECMAN: server responded with: 
ServerTime = 1551043812 
Encryption = "NO" 
Integrity = "NO" 
AuthMethodsList = "FS,GSI" 
AuthMethods = "FS" 
CryptoMethods = "3DES,BLOWFISH" 
Authentication = "YES" 
SessionDuration = "60" 
SessionLease = 3600 
RemoteVersion = "$CondorVersion: 8.6.11 May 10 2018 BuildID: 440910 $" 
Enact = "YES" 
02/24/19 15:30:12 SECMAN: new session, doing initial authentication. 
02/24/19 15:30:12 SECMAN: authenticating RIGHT NOW. 
02/24/19 15:30:12 SECMAN: AuthMethodsList: FS,GSI 
02/24/19 15:30:12 SECMAN: Auth methods: FS,GSI 
02/24/19 15:30:12 AUTHENTICATE: setting timeout for <131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_7> to 20. 
02/24/19 15:30:12 AUTHENTICATE: in authenticate( addr == '<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_7>', methods == 'FS,GSI') 
02/24/19 15:30:12 AUTHENTICATE: can still try these methods: FS,GSI 
02/24/19 15:30:12 HANDSHAKE: in handshake(my_methods = 'FS,GSI') 
02/24/19 15:30:12 HANDSHAKE: handshake() - i am the client 
02/24/19 15:30:12 HANDSHAKE: sending (methods == 36) to server 
02/24/19 15:30:12 HANDSHAKE: server replied (method = 4) 
02/24/19 15:30:12 AUTHENTICATE: will try to use 4 (FS) 
02/24/19 15:30:12 AUTHENTICATE: do_authenticate is 1. 
02/24/19 15:30:12 AUTHENTICATE_FS: used dir /tmp/FS_XXXaYEzdk, status: 1 
02/24/19 15:30:12 AUTHENTICATE: auth_status == 4 (FS) 
02/24/19 15:30:12 Authentication was a Success. 
02/24/19 15:30:12 ZKM: setting default map to (null) 
02/24/19 15:30:12 ZKM: name to map is null, not mapping. 
02/24/19 15:30:12 ZKM: post-map: current user is '(null)' 
02/24/19 15:30:12 ZKM: post-map: current domain is '(null)' 
02/24/19 15:30:12 ZKM: post-map: current FQU is '(null)' 
02/24/19 15:30:12 AUTHENTICATE: Exchanging keys with remote side. 
02/24/19 15:30:12 AUTHENTICATE: Result of end of authenticate is 1. 
02/24/19 15:30:12 SECMAN: received post-auth classad: 
ServerTime = 1551043812 
User = "cmsgwmsfactory@xxxxxxxxxxxxxxxxxxxxxxxx" 
Sid = "cmsgwms-factory:41978:1551043812:79289" 
TriedAuthentication = true 
ValidCommands = "60007,457,60020,443,441,6,12,515,516,519,1111,471" 
ReturnCode = "AUTHORIZED" 
02/24/19 15:30:12 SECMAN: policy to be cached: 
TriedAuthentication = true 
User = "unauthenticated@unmapped" 
ValidCommands = "60007,457,60020,443,441,6,12,515,516,519,1111,471" 
Sid = "cmsgwms-factory:41978:1551043812:79289" 
MyRemoteUserName = "cmsgwmsfactory@xxxxxxxxxxxxxxxxxxxxxxxx" 
UseSession = "YES" 
AuthMethodsList = "FS,GSI" 
RemoteVersion = "$CondorVersion: 8.6.11 May 10 2018 BuildID: 440910 $" 
SessionLease = 3600 
CryptoMethods = "3DES" 
OutgoingNegotiation = "PREFERRED" 
Authentication = "YES" 
Encryption = "NO" 
Integrity = "NO" 
Subsystem = "TOOL" 
Enact = "YES" 
Command = 519 
AuthMethods = "FS" 
SessionDuration = "60" 
02/24/19 15:30:12 SECMAN: added session cmsgwms-factory:41978:1551043812:79289 to cache for 60 seconds (3600s lease). 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_7>,<60007>} mapped to session cmsgwms-factory:41978:1551043812:79289. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_7>,<457>} mapped to session cmsgwms-factory:41978:1551043812:79289. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_7>,<60020>} mapped to session cmsgwms-factory:41978:1551043812:79289. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_7>,<443>} mapped to session cmsgwms-factory:41978:1551043812:79289. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_7>,<441>} mapped to session cmsgwms-factory:41978:1551043812:79289. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_7>,<6>} mapped to session cmsgwms-factory:41978:1551043812:79289. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_7>,<12>} mapped to session cmsgwms-factory:41978:1551043812:79289. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_7>,<515>} mapped to session cmsgwms-factory:41978:1551043812:79289. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_7>,<516>} mapped to session cmsgwms-factory:41978:1551043812:79289. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_7>,<519>} mapped to session cmsgwms-factory:41978:1551043812:79289. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_7>,<1111>} mapped to session cmsgwms-factory:41978:1551043812:79289. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_7>,<471>} mapped to session cmsgwms-factory:41978:1551043812:79289. 
02/24/19 15:30:12 SECMAN: startCommand succeeded. 
02/24/19 15:30:12 Authorizing server 'unauthenticated@unmapped/131.225.205.7'. 
02/24/19 15:30:12 Sent classad to schedd 
02/24/19 15:30:12 Got classad from schedd. 
02/24/19 15:30:12 Ad was last one from schedd. 
02/24/19 15:30:12 SharedPortClient: sent connection request to schedd at <131.225.205.7:9615> for shared port id 41892_018c_8 
02/24/19 15:30:12 SECMAN: command 519 QUERY_JOB_ADS_WITH_AUTH to schedd at <131.225.205.7:9615> from TCP port 13724 (blocking). 
02/24/19 15:30:12 SECMAN: no cached key for {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_8>,<519>}. 
02/24/19 15:30:12 SECMAN: Security Policy: 
SessionLease = 3600 
NewSession = "YES" 
CryptoMethods = "3DES,BLOWFISH" 
OutgoingNegotiation = "PREFERRED" 
Authentication = "OPTIONAL" 
Encryption = "OPTIONAL" 
ServerPid = 491937 
Integrity = "OPTIONAL" 
Subsystem = "TOOL" 
Enact = "NO" 
AuthMethods = "FS,GSI" 
SessionDuration = "60" 
02/24/19 15:30:12 SECMAN: negotiating security for command 519. 
02/24/19 15:30:12 SECMAN: sending DC_AUTHENTICATE command 
02/24/19 15:30:12 SECMAN: sending following classad: 
RemoteVersion = "$CondorVersion: 8.6.11 May 10 2018 BuildID: 440910 $" 
SessionLease = 3600 
NewSession = "YES" 
CryptoMethods = "3DES,BLOWFISH" 
OutgoingNegotiation = "PREFERRED" 
Authentication = "OPTIONAL" 
Encryption = "OPTIONAL" 
ServerPid = 491937 
Integrity = "OPTIONAL" 
Subsystem = "TOOL" 
Enact = "NO" 
Command = 519 
AuthMethods = "FS,GSI" 
SessionDuration = "60" 
02/24/19 15:30:12 SECMAN: server responded with: 
ServerTime = 1551043812 
Encryption = "NO" 
Integrity = "NO" 
AuthMethodsList = "FS,GSI" 
AuthMethods = "FS" 
CryptoMethods = "3DES,BLOWFISH" 
Authentication = "YES" 
SessionDuration = "60" 
SessionLease = 3600 
RemoteVersion = "$CondorVersion: 8.6.11 May 10 2018 BuildID: 440910 $" 
Enact = "YES" 
02/24/19 15:30:12 SECMAN: new session, doing initial authentication. 
02/24/19 15:30:12 SECMAN: authenticating RIGHT NOW. 
02/24/19 15:30:12 SECMAN: AuthMethodsList: FS,GSI 
02/24/19 15:30:12 SECMAN: Auth methods: FS,GSI 
02/24/19 15:30:12 AUTHENTICATE: setting timeout for <131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_8> to 20. 
02/24/19 15:30:12 AUTHENTICATE: in authenticate( addr == '<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_8>', methods == 'FS,GSI') 
02/24/19 15:30:12 AUTHENTICATE: can still try these methods: FS,GSI 
02/24/19 15:30:12 HANDSHAKE: in handshake(my_methods = 'FS,GSI') 
02/24/19 15:30:12 HANDSHAKE: handshake() - i am the client 
02/24/19 15:30:12 HANDSHAKE: sending (methods == 36) to server 
02/24/19 15:30:12 HANDSHAKE: server replied (method = 4) 
02/24/19 15:30:12 AUTHENTICATE: will try to use 4 (FS) 
02/24/19 15:30:12 AUTHENTICATE: do_authenticate is 1. 
02/24/19 15:30:12 AUTHENTICATE_FS: used dir /tmp/FS_XXXaLAjeM, status: 1 
02/24/19 15:30:12 AUTHENTICATE: auth_status == 4 (FS) 
02/24/19 15:30:12 Authentication was a Success. 
02/24/19 15:30:12 ZKM: setting default map to (null) 
02/24/19 15:30:12 ZKM: name to map is null, not mapping. 
02/24/19 15:30:12 ZKM: post-map: current user is '(null)' 
02/24/19 15:30:12 ZKM: post-map: current domain is '(null)' 
02/24/19 15:30:12 ZKM: post-map: current FQU is '(null)' 
02/24/19 15:30:12 AUTHENTICATE: Exchanging keys with remote side. 
02/24/19 15:30:12 AUTHENTICATE: Result of end of authenticate is 1. 
02/24/19 15:30:12 SECMAN: received post-auth classad: 
ServerTime = 1551043812 
User = "cmsgwmsfactory@xxxxxxxxxxxxxxxxxxxxxxxx" 
Sid = "cmsgwms-factory:41980:1551043812:92791" 
TriedAuthentication = true 
ValidCommands = "60007,457,60020,443,441,6,12,515,516,519,1111,471" 
ReturnCode = "AUTHORIZED" 
02/24/19 15:30:12 SECMAN: policy to be cached: 
TriedAuthentication = true 
User = "unauthenticated@unmapped" 
ValidCommands = "60007,457,60020,443,441,6,12,515,516,519,1111,471" 
Sid = "cmsgwms-factory:41980:1551043812:92791" 
MyRemoteUserName = "cmsgwmsfactory@xxxxxxxxxxxxxxxxxxxxxxxx" 
UseSession = "YES" 
AuthMethodsList = "FS,GSI" 
RemoteVersion = "$CondorVersion: 8.6.11 May 10 2018 BuildID: 440910 $" 
SessionLease = 3600 
CryptoMethods = "3DES" 
OutgoingNegotiation = "PREFERRED" 
Authentication = "YES" 
Encryption = "NO" 
Integrity = "NO" 
Subsystem = "TOOL" 
Enact = "YES" 
Command = 519 
AuthMethods = "FS" 
SessionDuration = "60" 
02/24/19 15:30:12 SECMAN: added session cmsgwms-factory:41980:1551043812:92791 to cache for 60 seconds (3600s lease). 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_8>,<60007>} mapped to session cmsgwms-factory:41980:1551043812:92791. 
02/24/19 15:30:12 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_8>,<457>} mapped to session cmsgwms-factory:41980:1551043812:92791. 
02/24/19 15:30:13 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_8>,<60020>} mapped to session cmsgwms-factory:41980:1551043812:92791. 
02/24/19 15:30:13 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_8>,<443>} mapped to session cmsgwms-factory:41980:1551043812:92791. 
02/24/19 15:30:13 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_8>,<441>} mapped to session cmsgwms-factory:41980:1551043812:92791. 
02/24/19 15:30:13 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_8>,<6>} mapped to session cmsgwms-factory:41980:1551043812:92791. 
02/24/19 15:30:13 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_8>,<12>} mapped to session cmsgwms-factory:41980:1551043812:92791. 
02/24/19 15:30:13 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_8>,<515>} mapped to session cmsgwms-factory:41980:1551043812:92791. 
02/24/19 15:30:13 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_8>,<516>} mapped to session cmsgwms-factory:41980:1551043812:92791. 
02/24/19 15:30:13 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_8>,<519>} mapped to session cmsgwms-factory:41980:1551043812:92791. 
02/24/19 15:30:13 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_8>,<1111>} mapped to session cmsgwms-factory:41980:1551043812:92791. 
02/24/19 15:30:13 SECMAN: command {<131.225.205.7:9615?addrs=131.225.205.7-9615&noUDP&sock=41892_018c_8>,<471>} mapped to session cmsgwms-factory:41980:1551043812:92791. 
02/24/19 15:30:13 SECMAN: startCommand succeeded. 
02/24/19 15:30:13 Authorizing server 'unauthenticated@unmapped/131.225.205.7'. 
02/24/19 15:30:13 Sent classad to schedd 
02/24/19 15:30:13 Got classad from schedd. 
02/24/19 15:30:13 Ad was last one from schedd. 
02/24/19 15:30:13 KEYCACHEENTRY: deleted: 0x12df310 
02/24/19 15:30:13 KEYCACHEENTRY: deleted: 0x1266070 
02/24/19 15:30:13 KEYCACHEENTRY: deleted: 0x12dce30 
02/24/19 15:30:13 KEYCACHEENTRY: deleted: 0x12e0040 
02/24/19 15:30:13 KEYCACHEENTRY: deleted: 0x12dce70 
02/24/19 15:30:13 KEYCACHEENTRY: deleted: 0x12baab0 
02/24/19 15:30:13 KEYCACHE: deleted: 0x1249a40 
 
Thanks, 
Marco 
 
 
 
 
 
On Feb 22, 2019, at 5:47 PM, Steven C Timm <timm@xxxxxxxx> wrote: 
 
Is your Authentication ok.? 
 
Also what happens when you do condor_q -all? 
 
 
Strve 
From: HTCondor-users <htcondor-users-bounces@xxxxxxxxxxx> on behalf of Marco Mambelli <marcom@xxxxxxxx> 
Sent: Friday, February 22, 2019 11:46:27 AM 
To: HTCondor-Users Mail List 
Cc: Krista Majewski 
Subject: [HTCondor-users] schedds not returning the jobs correctly 
 
The schedds on a GlideinWMS factory seem not to work correctly: 
- there are jobs running and queued and they are visible via condor_status -schedd 
- condor_q -g returns nothing, not even "All queues are empty" 
 
 
$ condor_q -g -xml 
<?xml version="1.0"?> 
<!DOCTYPE classads SYSTEM "classads.dtd"> 
<classads> 
</classads> 
<?xml version="1.0"?> 
<!DOCTYPE classads SYSTEM "classads.dtd"> 
<classads> 
</classads> 
<?xml version="1.0"?> 
<!DOCTYPE classads SYSTEM "classads.dtd"> 
<classads> 
</classads> 
<?xml version="1.0"?> 
<!DOCTYPE classads SYSTEM "classads.dtd"> 
<classads> 
</classads> 
<?xml version="1.0"?> 
<!DOCTYPE classads SYSTEM "classads.dtd"> 
<classads> 
</classads> 
 
$ condor_q -g 
 
$ condor_status -schedd 
Name                                      Machine                  RunningJobs   IdleJobs   HeldJobs 
 
cmsgwms-factory.fnal.gov                  cmsgwms-factory.fnal.gov        1174       1001          0 
schedd_glideins2@myhost                  myhost        1635        831         22 
schedd_glideins3@myhost                 myhost         285        812         22 
schedd_glideins4@myhost                 myhost        1794        997          1 
schedd_glideins5@myhost                 myhost        2007       1074          8 
 
                      TotalRunningJobs      TotalIdleJobs      TotalHeldJobs 
 
 
               Total              6895               4715                 53 
 
 
[I replaced the hostname w/ "myhost" here, it was correct] 
$ condor_q -version 
$CondorVersion: 8.6.11 May 10 2018 BuildID: 440910 $ 
$CondorPlatform: x86_64_RedHat7 $ 
 
The schedd logs are all unusually flat, a bunch of "Number of Active Workers 0" lines (rarely w/ N<>0) and with a strange line 
"Can't find address for startd myhost" 
There is no startd on the factory host, it is not in the daemon list 
 
02/22/19 11:20:18 (pid:41978) Number of Active Workers 0 
02/22/19 11:20:19 (pid:41978) Number of Active Workers 0 
02/22/19 11:20:19 (pid:41978) TransferQueueManager stats: active up=0/100 down=0/100; waiting up=0 down=0; wait time up=0s down=0s 
02/22/19 11:20:19 (pid:41978) TransferQueueManager upload 1m I/O load: 0 bytes/s  0.000 disk load  0.000 net load 
02/22/19 11:20:19 (pid:41978) TransferQueueManager download 1m I/O load: 0 bytes/s  0.000 disk load  0.000 net load 
02/22/19 11:20:19 (pid:41978) Started condor_gmanager for owner cmsglobal_1 pid=1423401 
02/22/19 11:20:19 (pid:41978) Can't find address for startd myhost 
02/22/19 11:20:20 (pid:41978) Number of Active Workers 0 
 
 
Something is wrong but I cannot understand what. 
 
condor_config_val seems to return the correct spool and address files, also querying directly w/ -address 
d_fulldebug is not much of help: 
 
 _CONDOR_TOOL_DEBUG="D_FULLDEBUG" condor_q -debug -g 
02/22/19 11:39:51 Result of reading /etc/issue:  \S 
 
02/22/19 11:39:51 Result of reading /etc/redhat-release:  Scientific Linux release 7.5 (Nitrogen) 
 
02/22/19 11:39:51 Using IDs: 16 processors, 8 CPUs, 8 HTs 
02/22/19 11:39:51 Reading condor configuration from '/etc/condor/condor_config' 
02/22/19 11:39:51 Enumerating interfaces: lo 127.0.0.1 up 
02/22/19 11:39:51 Enumerating interfaces: eth2 131.225.X.X up 
02/22/19 11:39:51 WARNING: Config source is empty: /etc/condor/config.d/90_condor_test 
02/22/19 11:39:51 Will use TCP to update collector 
cmsgwms-factory.fnal.gov <131.225.X.X:9618> 
02/22/19 11:39:51 Trying to query collector <131.225.X.X:9618> 
02/22/19 11:39:51 SharedPortClient: sent connection request to schedd at <131.225.X.X:9615> for shared port id 41892_018c_9 
02/22/19 11:39:51 Sent classad to schedd 
02/22/19 11:39:51 Got classad from schedd. 
02/22/19 11:39:51 Ad was last one from schedd. 
02/22/19 11:39:51 SharedPortClient: sent connection request to schedd at <131.225.X.X:9615> for shared port id 41892_018c_5 
02/22/19 11:39:51 Sent classad to schedd 
02/22/19 11:39:51 Got classad from schedd. 
02/22/19 11:39:51 Ad was last one from schedd. 
02/22/19 11:39:51 SharedPortClient: sent connection request to schedd at <131.225.X.X:9615> for shared port id 41892_018c_6 
02/22/19 11:39:51 Sent classad to schedd 
02/22/19 11:39:51 Got classad from schedd. 
02/22/19 11:39:51 Ad was last one from schedd. 
02/22/19 11:39:51 SharedPortClient: sent connection request to schedd at <131.225.X.X:9615> for shared port id 41892_018c_7 
02/22/19 11:39:51 Sent classad to schedd 
02/22/19 11:39:52 Got classad from schedd. 
02/22/19 11:39:52 Ad was last one from schedd. 
02/22/19 11:39:52 SharedPortClient: sent connection request to schedd at <131.225.X.X:9615> for shared port id 41892_018c_8 
02/22/19 11:39:52 Sent classad to schedd 
02/22/19 11:39:52 Got classad from schedd. 
02/22/19 11:39:52 Ad was last one from schedd. 
 
$ _CONDOR_TOOL_DEBUG="D_FULLDEBUG" condor_q -debug -g -xml 
02/22/19 11:42:45 Result of reading /etc/issue:  \S 
 
02/22/19 11:42:45 Result of reading /etc/redhat-release:  Scientific Linux release 7.5 (Nitrogen) 
 
02/22/19 11:42:45 Using IDs: 16 processors, 8 CPUs, 8 HTs 
02/22/19 11:42:45 Reading condor configuration from '/etc/condor/condor_config' 
02/22/19 11:42:45 Enumerating interfaces: lo 127.0.0.1 up 
02/22/19 11:42:45 Enumerating interfaces: eth2 131.225.X.X up 
02/22/19 11:42:45 WARNING: Config source is empty: /etc/condor/config.d/90_condor_test 
02/22/19 11:42:45 Will use TCP to update collector 
cmsgwms-factory.fnal.gov <131.225.X.X:9618> 
02/22/19 11:42:45 Trying to query collector <131.225.X.X:9618> 
02/22/19 11:42:45 SharedPortClient: sent connection request to schedd at <131.225.X.X:9615> for shared port id 41892_018c_9 
02/22/19 11:42:45 Sent classad to schedd 
02/22/19 11:42:45 Got classad from schedd. 
02/22/19 11:42:45 Ad was last one from schedd. 
<?xml version="1.0"?> 
<!DOCTYPE classads SYSTEM "classads.dtd"> 
<classads> 
</classads> 
02/22/19 11:42:45 SharedPortClient: sent connection request to schedd at <131.225.X.X:9615> for shared port id 41892_018c_5 
02/22/19 11:42:45 Sent classad to schedd 
02/22/19 11:42:45 Got classad from schedd. 
02/22/19 11:42:45 Ad was last one from schedd. 
<?xml version="1.0"?> 
<!DOCTYPE classads SYSTEM "classads.dtd"> 
<classads> 
</classads> 
02/22/19 11:42:45 SharedPortClient: sent connection request to schedd at <131.225.X.X:9615> for shared port id 41892_018c_6 
02/22/19 11:42:45 Sent classad to schedd 
02/22/19 11:42:45 Got classad from schedd. 
02/22/19 11:42:45 Ad was last one from schedd. 
<?xml version="1.0"?> 
<!DOCTYPE classads SYSTEM "classads.dtd"> 
<classads> 
</classads> 
02/22/19 11:42:45 SharedPortClient: sent connection request to schedd at <131.225.X.X:9615> for shared port id 41892_018c_7 
02/22/19 11:42:45 Sent classad to schedd 
02/22/19 11:42:45 Got classad from schedd. 
02/22/19 11:42:45 Ad was last one from schedd. 
<?xml version="1.0"?> 
<!DOCTYPE classads SYSTEM "classads.dtd"> 
<classads> 
</classads> 
02/22/19 11:42:45 SharedPortClient: sent connection request to schedd at <131.225.X.X:9615> for shared port id 41892_018c_8 
02/22/19 11:42:45 Sent classad to schedd 
02/22/19 11:42:45 Got classad from schedd. 
02/22/19 11:42:45 Ad was last one from schedd. 
<?xml version="1.0"?> 
<!DOCTYPE classads SYSTEM "classads.dtd"> 
<classads> 
</classads> 
 
Krista saw also: 
ERROR "Assertion ERROR on (!(pjr->flags & 0x0004))" at line 4319 in file /slots/16/dir_3109781/userdir/.tmpVhmMVH/BUILD/condor-8.6.11/src/condor_q.V6/queue.cpp 
 
 
Any suggestion about what is wrong? 
Thanks you, 
Marco 
 
 
_______________________________________________ 
HTCondor-users mailing list 
To unsubscribe, send a message to 
htcondor-users-request@xxxxxxxxxxx with a 
subject: Unsubscribe 
You can also unsubscribe by visiting 
https://urldefense.proofpoint.com/v2/url?u=https-3A__lists.cs.wisc.edu_mailman_listinfo_htcondor-2Dusers&d=DwIGaQ&c=gRgGjJ3BkIsb5y6s49QqsA&r=mJexXERGCKhKDmLAi9CMy5Qiwxk7cUYXIkq26-Rs1Xc&m=QFouSebgOX7hNPaI2nmOAWys5N4zb6bz06tOeocXeR0&s=dJulsnmBzaEYEusHaJRODDceeGATphwFnAABKe9-qqI&e= 
 
The archives can be found at: 
https://urldefense.proofpoint.com/v2/url?u=https-3A__lists.cs.wisc.edu_archive_htcondor-2Dusers_&d=DwIGaQ&c=gRgGjJ3BkIsb5y6s49QqsA&r=mJexXERGCKhKDmLAi9CMy5Qiwxk7cUYXIkq26-Rs1Xc&m=QFouSebgOX7hNPaI2nmOAWys5N4zb6bz06tOeocXeR0&s=3BRxeuq2TXZPdxODCB7vL1eRWSuo61b3xiVGJB-bFL8&e= 
_______________________________________________ 
HTCondor-users mailing list 
To unsubscribe, send a message to htcondor-users-request@xxxxxxxxxxx with a 
subject: Unsubscribe 
You can also unsubscribe by visiting 
https://urldefense.proofpoint.com/v2/url?u=https-3A__lists.cs.wisc.edu_mailman_listinfo_htcondor-2Dusers&d=DwICAg&c=gRgGjJ3BkIsb5y6s49QqsA&r=EF06-Wh4L9CNLgD8bnIjNQ&m=LLThFt5zVyRgnhEaJy3f7kZm9aANkYCB_IFrjHcDH8M&s=SHBxZ6Otmr1TbH79ipsQlHeM8f3D5jdq65sIxK2LUqQ&e= 
 
The archives can be found at: 
https://urldefense.proofpoint.com/v2/url?u=https-3A__lists.cs.wisc.edu_archive_htcondor-2Dusers_&d=DwICAg&c=gRgGjJ3BkIsb5y6s49QqsA&r=EF06-Wh4L9CNLgD8bnIjNQ&m=LLThFt5zVyRgnhEaJy3f7kZm9aANkYCB_IFrjHcDH8M&s=6xHhbsVm0AcQ8XCXn308bDdJ557B0YM6W1GwsDYUr0w&e= 
 
 
 
_______________________________________________ 
HTCondor-users mailing list 
To unsubscribe, send a message to htcondor-users-request@xxxxxxxxxxx with a 
subject: Unsubscribe 
You can also unsubscribe by visiting 
https://urldefense.proofpoint.com/v2/url?u=https-3A__lists.cs.wisc.edu_mailman_listinfo_htcondor-2Dusers&d=DwIGaQ&c=gRgGjJ3BkIsb5y6s49QqsA&r=mJexXERGCKhKDmLAi9CMy5Qiwxk7cUYXIkq26-Rs1Xc&m=QFouSebgOX7hNPaI2nmOAWys5N4zb6bz06tOeocXeR0&s=dJulsnmBzaEYEusHaJRODDceeGATphwFnAABKe9-qqI&e= 
 
The archives can be found at: 
https://urldefense.proofpoint.com/v2/url?u=https-3A__lists.cs.wisc.edu_archive_htcondor-2Dusers_&d=DwIGaQ&c=gRgGjJ3BkIsb5y6s49QqsA&r=mJexXERGCKhKDmLAi9CMy5Qiwxk7cUYXIkq26-Rs1Xc&m=QFouSebgOX7hNPaI2nmOAWys5N4zb6bz06tOeocXeR0&s=3BRxeuq2TXZPdxODCB7vL1eRWSuo61b3xiVGJB-bFL8&e= 
 
 
-- 
Todd
 Tannenbaum <tannenba@xxxxxxxxxxx>
 University of Wisconsin-Madison
Center
 for High Throughput Computing   Department of Computer Sciences
HTCondor
 Technical Lead                1210 W. Dayton St. Rm #4257
Phone:
 (608) 263-7132                  Madison, WI 53706-1685 
 
 
 
 |