Paul Howell <[EMAIL PROTECTED]> writes:
> IP addresses that appear in your protection server (afs 3.2)
> will be handled as system:authuser even if you're not klog'd
> yet.  
> 
> So you could have system:authuser set and not be authenticated
> but still execute programs in your bin directory, and not have
> system:anyuser set.

When I first read this message, I found it very surprising that hosts
with pts-defined IP addresses would receive the benefits of
system:authuser membership.  I finally got around to testing this
today and it seems that the statement is (thankfully!) wrong.

I created a new subdirectory in a public part of my cell.  The ACL was
simply 'system:authuser read'.  The pts entry "158.98.0.0" had already
been created a long while back.  I got on a machine in that subnet,
but didn't authenticate to AFS, and I wasn't able to get a listing of
the test directory.  Then I created a group containing "158.98.0.0"
and placed it on the ACL.  That *did* give me read access to the
directory.  To convince myself of what was going on, I gave
system:authuser write access to the directory.  I could still read the
directory, but couldn't create a new file in it, confirming that the
new group entry was being used instead of system:authuser.

It is quite possible that the original CMU implementation behaved
differently than is described here.  What I tested was AFS 3.2a.

Joe Jackson,
AFS Product Support,
Transarc Corp.

Reply via email to