Hmm, in one part, [EMAIL PROTECTED] (Randolph J. Herber, CD/DCD/SPG, x2966) writes:

++> Another thing I do not understand is why AFS did not implement full Unix file
++> semantics and instead implemented ``ACL''s.  

Later he says,
++>     My objection was not to ACLs.  My objection was to ACLs
++>     instead of the customary UNIX semantics.

To me, "full Unix file semantics" means "exactly" Unix file semantics.
Not semantics Plus Y or semantics minus X.  Interestingly,
IBM AIX has "unix file semantics plus" (well, more
or less, excepting the odd bug :-))  I can, under AIX, create
a file I can read, even though "ls -l" might lead me to
believe I can't.  That's certainly not "exactly" Unix file semantics,
and one might argue that the difference is pretty scary, and
perhaps even worthy of being called a "minus".  DFS and AFS both
offer "unix file semantics minus X plus Y."  DFS has a slightly
smaller set of Y.  It seems obvious to me that X can't be zero
(just for starters, the SUID problem and execute permissions)
in a proper networked environment, so to me, the only relevant
questions are that of performance and functionality.

Later on, I said some other stuff ending with:
+system over the area of, say, Ann Arbor.  Anyone who can type L1-A can
+"read" a program from NFS.  Anyone who can alter their UID or GID,
+or write an RPC interface to NFS, can get around NFS file permissions.

And [EMAIL PROTECTED] (Randolph J. Herber, CD/DCD/SPG, x2966) writes:

++>     At this level, is AFS any more secure?

Yes, AFS is more secure.  I cannot masquerade as someone
else without an AFS token - essentially a kerberos ticket,
for that person.  It's not perfect (to be more secure,
it ought to have per-machine keys and there should be
a "reload" button on the side that would cause the machine
to execute ROM code to obtain a fresh copy of all the
local workstation software from a remote site, also the
data as well as the checksum should be encrypted), but it's
definitely a lot better than NFS.  Basically, you still
have to trust root on your workstation.  You no longer have
to trust root on all the other workstations.

                                -Marcus Watts
                                UM ITD RS Umich Systems Group

Reply via email to