Thanks to all for their helpful responses about user acceptance of AFS.
The issue hasn't been decided here, but I'm making progress.
A major concern in the conversion of NFS home directory to AFS ones is
how to structure the home directory permissions. I have users that
range from very technical to minimally computer-conscious. I'd like
the default configuration to be secure, and the more sophisticated
users can relax the permissions if they want to.
Our analysis (subject to correction) is that we have two choices for
this transfer of home directories:
1. Make the top level directory system:anyuser rl, and create a
private subdirectory for all users. Move their protected
files into the private directory and use symbolic links to
make the top level look the same.
The problems we see with this are
a. a user can save mail into his/her top level and it's readable
b. some user will do rm * in the private directory because "they
were just duplicate files". Don't laugh, we've been there.
c. cp mbox mbox.hold creates a readable copy.
etc. There are non-intuitive ramifications to regular UNIX
commands.
2. Protect the top level directory with system:anyuser l permissions
only. Everything is still unreadable, and the user can create
a public subdirectory if he/she wants to.
However, this means that many files now expected to be readable
by root are unreadable. Specifically,
.forward - sendmail expects to read this
.plan - finger expects to read this
calendar
.rhosts
and I've probably missed a few here.
And if you 'rlogin' rather than 'telnet' from one of our trusted
machines, you come in without a token and can't even read your
.login. [Side question - since rsh machine csh -i carries your
token along, has anyone modified an rlogin to do the same?]
I'm sure many other sites have faced this choice. What did you do?
Thanks in advance.