* I am concerned at the number of things an unauthenticated root
    user can do: rename or move any volume, for example.

Why does this concern you?  I like it, because it makes it clear to the
system administrators that file servers have to be locked up.  Or are you
saying that you wish you didn't have to lock up the file servers?  How would
you guard against, for example, "rm -rf /"?

Reply via email to