also sprach Moritz Muehlenhoff <[EMAIL PROTECTED]> [2005.05.26.0109 +0200]:
> Disclaimer: I don't know davfs2 and I don't use. But I disgree
> that every file system should implement POSIX access semantics.
> There are production class systems that don't, e.g. the Andrew
> file system. And as Coda, which according to the package
> description is used as the backend, is a descandant of AFS this
> may very well be in order.

Thanks for this valuable information.

One way to secure a davfs2 mount is to enclose the mount point in
a directory that can only be accessed by the authorised people.
However, this still gives everyone write access, even if some should
only have read access.

DAV does implement a fine-grained set of permissions. However,
a davfs2 resource is mounted with a single username and password.
Essentially, thus, mounting a DAV resource on a publicly accessible
place (e.g. /mnt) has the same effect as distributing the username
and password to each user with access to the system. And *this*
would be a security problem. :)

How does AFS/Coda work wrt this? I cannot imagine that every user of
a system with AFS mounts has unconditional read and write access to
those resources...

-- 
 .''`.     martin f. krafft <[EMAIL PROTECTED]>
: :'  :    proud Debian developer, admin, user, and author
`. `'`
  `-  Debian - when you have better things to do than fixing a system
 
Invalid/expired PGP subkeys? Use subkeys.pgp.net as keyserver!
 
"for art to exist, for any sort of aesthetic activity or perception to
 exist, a certain physiological precondition is indispensable:
 intoxication."
                                                -- friedrich nietzsche

Attachment: signature.asc
Description: Digital signature

Reply via email to