(Illustration by Gaich Muramatsu)
>A cron script is run to assign tokens: > >for u in `ls /usr/local/lib/coda-auth` >do > echo "Setting token for " $u; > fn=`echo "/usr/local/lib/coda-auth/$u" | sed -e 's/ //g'` > su -c "clog $u < $fn" - $u; >done This whole cron-job-that-acquires-tokens system seems to be pointing to a fundamental problem with the integration between CODA's security model and the regular Unix security model. IMO authentication and file systems are totally independent components of an operating system; CODA's ad hoc security model appears to exist only as a kludge to overcome limitations of the standard Unix /etc/passwd system. Is there an existing standard Unix/Linux security model that would be easier to integrate with CODA? For example, do these problems go away when Kerberos is being used for authentication? Pete GonzalezReceived on 1999-07-24 22:26:59