Network Proxies and GSAS-II

Network access is not required for installing or running GSAS-II but it is optimal to for GSAS-II to have this because then the program can be used to update iteself to the latest software version. This update process will download only the lines of code that have been changed or created, so the update is usually very quick, even over slow network connections.

To obtain the latest versions of GSAS-II, a program named subversion (svn) is used to access the APS software server where the code is kept ( If this directory can be seen in a web browser, but if running svn fails, it is likely your network is configured to require a network proxy. This is not common at universities, or with commercially-provided internet services, but is somewhat common for government and corporate sites. When one is needed, it will typically be of form such as If you are not able to get the GSAS-II download to work, you probably need a proxy. Check with your network/computer administrators, but my experience is that the first-line response people rarely have any knowledge about proxies, alas, so you need to find someone who really knows about the network configuration. You may be able to get information from this website: ​ which can detect if your browser is using a proxy.

When the file is run, it will prompt to request the name of the proxy (supply either a name, such as or an IP address, such as The second prompt is for the port number which is typically a two or four digit integer (above 7070). If GSAS-II is installed, this information can also be entered using the File/"Edit Proxy..." menu command.

Proxy Username/Password, etc.

If you have an even more secure network, you may be required to supply even more information, such as an account or password. This can be done by editing the file named proxyinfo.txt in the main GSAS-II directory that is created for the GSAS-II files. This file is added when proxy information is entered. That file can hold additional options to be added to the svn command can be added. Below shows what this file looks like with addition of a proxy account (ABCD) and password (xyz123). Note that this information is being stored in a plain-text file so the security for this information is not high if anyone will have access to your computer. If greater security is needed, the file should be created as needed to perform updates and edited immediately after use to remove sensitive information.
Last modified 7 months ago Last modified on Mar 14, 2022 3:21:36 PM