>A cron script is run to assign tokens:
>
>for u in `ls /usr/local/lib/coda-auth`
>do
> echo "Setting token for " $u;
> fn=`echo "/usr/local/lib/coda-auth/$u" | sed -e 's/ //g'`
> su -c "clog $u < $fn" - $u;
>done
This whole cron-job-that-acquires-tokens system seems to be
pointing to a fundamental problem with the integration between
CODA's security model and the regular Unix security model.
IMO authentication and file systems are totally independent
components of an operating system; CODA's ad hoc security model
appears to exist only as a kludge to overcome limitations of
the standard Unix /etc/passwd system.
Is there an existing standard Unix/Linux security model that
would be easier to integrate with CODA? For example, do these
problems go away when Kerberos is being used for authentication?
Pete Gonzalez