This is a transcript of a user following the instructions in README.servers. It is best read side-by-side with that documentation while you are setting up your cell. This transcript includes creation of a loopback mount on /vicepa using file full of zeros. This is useful to know how to do because it allows you to test an AFS server without repartitioning. However, for production cells, you should repartition and create a /vicepa partition. Thanks to Faheem Mitha for the transcript. ########################################################################## riverside:/home/faheem# apt-get install krb5-admin-server ... The following extra packages will be installed: krb5-config krb5-kdc krb5-user The following NEW packages will be installed: krb5-admin-server krb5-config krb5-kdc krb5-user 0 upgraded, 4 newly installed, 0 to remove and 0 not upgraded. Need to get 348kB of archives. After unpacking 889kB of additional disk space will be used. Do you want to continue? [Y/n] ... Configuring krb5-config ----------------------- When users attempt to use Kerberos and specify a principal or user name without specifying what administrative Kerberos realm that principal belongs to, the system appends the default realm. Normally default realm is the upper case version of the local DNS domain. What is the default Kerberos version 5 realm? DULCI.BIOSTAT.DUKE.EDU Configuring krb5-kdc -------------------- By default, Kerberos4 requests are allowed from principals that do not require preauthentication. This allows Kerberos4 services to exist while requiring most users to use Kerberos5 clients to get their initial tickets. These tickets can then be converted to Kerberos4 tickets. Alternatively, the mode can be set to full, allowing Kerberos4 to get initial tickets even when preauthentication would normally be required, or to disable, which will disable all Kerberos4 support. 1. disable 2. full 3. nopreauth 4. none Kerberos4 compatibility mode to use: 3 Configuring krb5-admin-server ----------------------------- Setting up a Kerberos Realm This package contains the administrative tools necessary to run on the Kerberos master server. However, installing this package does not automatically set up a Kerberos realm. Doing so requires entering passwords and as such is not well-suited for package installation. To create the realm, run the krb5_newrealm command. You may also wish to read /usr/share/doc/krb5-kdc/README.KDC and the administration guide found in the krb5-doc package. Don't forget to set up DNS information so your clients can find your KDC and admin servers. Doing so is documented in the administration guide. Selecting previously deselected package krb5-config. (Reading database ... 81199 files and directories currently installed.) Unpacking krb5-config (from .../krb5-config_1.6_all.deb) ... Selecting previously deselected package krb5-user. Unpacking krb5-user (from .../krb5-user_1.3.6-2sarge2_i386.deb) ... Selecting previously deselected package krb5-kdc. Unpacking krb5-kdc (from .../krb5-kdc_1.3.6-2sarge2_i386.deb) ... Selecting previously deselected package krb5-admin-server. Unpacking krb5-admin-server (from .../krb5-admin-server_1.3.6-2sarge2_i386.deb) ... Setting up krb5-config (1.6) ... Configuring krb5-config ----------------------- Enter the hostnames of Kerberos servers in the DULCI.BIOSTAT.DUKE.EDU Kerberos realm separated by spaces. What are the Kerberos servers for your realm? riverside.dulci.biostat.duke.edu Enter the hostname of the administrative (password changing) server for the DULCI.BIOSTAT.DUKE.EDU Kerberos realm. What is the administrative server for your Kerberos realm? riverside.dulci.biostat.duke.edu Setting up krb5-user (1.3.6-2sarge2) ... Setting up krb5-kdc (1.3.6-2sarge2) ... Setting up krb5-admin-server (1.3.6-2sarge2) ... Starting Kerberos Administration Servers: kadmind: No such file or directory while initializing, aborting kadmind. riverside:/home/faheem# krb5_newrealm This script should be run on the master KDC/admin server to initialize a Kerberos realm. It will ask you to type in a master key password. This password will be used to generate a key that is stored in /etc/krb5kdc/stash. You should try to remember this password, but it is much more important that it be a strong password than that it be remembered. However, if you lose the password and /etc/krb5kdc/stash, you cannot decrypt your Kerberos database. Loading random data Initializing database '/var/lib/krb5kdc/principal' for realm 'DULCI.BIOSTAT.DUKE.EDU', master key name 'K/M@DULCI.BIOSTAT.DUKE.EDU' You will be prompted for the database Master Password. It is important that you NOT FORGET this password. Enter KDC database master key: Re-enter KDC database master key to verify: Starting Kerberos KDC: krb5kdc krb524d. Starting Kerberos Administration Servers: kadmind. Now that your realm is set up you may wish to create an administrative principal using the addprinc subcommand of the kadmin.local program. Then, this principal can be added to /etc/krb5kdc/kadm5.acl so that you can use the kadmin program on other computers. Kerberos admin principals usually belong to a single user and end in /admin. For example, if jruser is a Kerberos administrator, then in addition to the normal jruser principal, a jruser/admin principal should be created. Don't forget to set up DNS information so your clients can find your KDC and admin servers. Doing so is documented in the administration guide. riverside:/home/faheem# kadmin.local Authenticating as principal root/admin@DULCI.BIOSTAT.DUKE.EDU with password. kadmin.local: addprinc faheem/admin WARNING: no policy specified for faheem/admin@DULCI.BIOSTAT.DUKE.EDU; defaulting to no policy Enter password for principal "faheem/admin@DULCI.BIOSTAT.DUKE.EDU": Re-enter password for principal "faheem/admin@DULCI.BIOSTAT.DUKE.EDU": Principal "faheem/admin@DULCI.BIOSTAT.DUKE.EDU" created. kadmin.local: addprinc faheem WARNING: no policy specified for faheem@DULCI.BIOSTAT.DUKE.EDU; defaulting to no policy Enter password for principal "faheem@DULCI.BIOSTAT.DUKE.EDU": Re-enter password for principal "faheem@DULCI.BIOSTAT.DUKE.EDU": Principal "faheem@DULCI.BIOSTAT.DUKE.EDU" created. kadmin.local: exit riverside:/home/faheem# apt-get install openafs-dbserver openafs-krb5 ... The following extra packages will be installed: openafs-client openafs-fileserver The following NEW packages will be installed: openafs-client openafs-dbserver openafs-fileserver openafs-krb5 0 upgraded, 4 newly installed, 0 to remove and 0 not upgraded. Need to get 2927kB of archives. After unpacking 6898kB of additional disk space will be used. Do you want to continue? [Y/n] ... Configuring openafs-client -------------------------- AFS filespace is organized into cells or administrative domains. Each workstation belongs to one cell. Usually the cell is the DNS domain name of the site. What AFS cell does this workstation belong to? dulci.biostat.duke.edu AFS uses an area of the disk to cache remote files for faster access. This cache will be mounted on /var/cache/openafs. It is important that the cache not overfill the partition it is located on. Often, people find it useful to dedicate a partition to their AFS cache. How large is your AFS cache (kB)? 50000 /afs generally contains an entry for each cell that a client can talk to. Traditionally, these entries were generated by servers in the client's home cell. However, OpenAFS clients can generate the contents of /afs dynamically based on the contents of /etc/openafs/CellServDB and DNS. If you generate /afs dynamically, you may need to create /etc/openafs/CellAlias to include aliases for common cells. DO NOT SELECT THIS OPTION IF THIS MACHINE IS THE FIRST DATABASE SERVER IN A NEW CELL . Dynamically generate the contents of /afs? no Selecting previously deselected package openafs-client. (Reading database ... 81267 files and directories currently installed.) Unpacking openafs-client (from .../openafs-client_1.3.81-3sarge1_i386.deb) ... Selecting previously deselected package openafs-fileserver. Unpacking openafs-fileserver (from .../openafs-fileserver_1.3.81-3sarge1_i386.deb) ... Selecting previously deselected package openafs-dbserver. Unpacking openafs-dbserver (from .../openafs-dbserver_1.3.81-3sarge1_i386.deb) ... Selecting previously deselected package openafs-krb5. Unpacking openafs-krb5 (from .../openafs-krb5_1.3-10.1_i386.deb) ... Setting up openafs-client (1.3.81-3sarge1) ... Configuring openafs-client -------------------------- AFS uses the file /etc/openafs/CellServDB to hold the list of servers that should be contacted to find parts of a cell. The cell you claim this workstation belongs to is not in that file. Enter the host names of the database servers separated by spaces. IMPORTANT: If you are creating a new cell and this machine is to be a database server in that cell, only enter this machine's name; add the other servers later after they are functioning. Also, do not enable the AFS client to start at boot on this server until the cell is configured. When you are ready you can edit /etc/openafs/afs.conf.client to enable the client. What hosts are DB servers for your home cell? riverside.dulci.biostat.duke.edu Should the Openafs filesystem be started and mounted at boot? Normally, most users who install the openafs-client package expect to run it at boot. However, if you are planning on setting up a new cell or are on a laptop, you may not want it started at boot time. If you choose not to start AFS at boot , run /etc/init.d/openafs-client force-start to start the client when you wish to run it. Run Openafs client now and at boot? no Setting up openafs-fileserver (1.3.81-3sarge1) ... Starting AFS Server: bosserver. Setting up openafs-dbserver (1.3.81-3sarge1) ... Setting up openafs-krb5 (1.3-10.1) ... riverside:/home/faheem# kadmin.local Authenticating as principal root/admin@DULCI.BIOSTAT.DUKE.EDU with password. kadmin.local: addprinc -randkey -e des-cbc-crc:v4 afs WARNING: no policy specified for afs@DULCI.BIOSTAT.DUKE.EDU; defaulting to no policy Principal "afs@DULCI.BIOSTAT.DUKE.EDU" created. kadmin.local: ktadd -k /tmp/afs.keytab -e des-cbc-crc:v4 afs Entry for principal afs with kvno 3, encryption type DES cbc mode with CRC-32 added to keytab WRFILE:/tmp/afs.keytab. kadmin.local: getprinc afs Principal: afs@DULCI.BIOSTAT.DUKE.EDU Expiration date: [never] Last password change: Wed Aug 24 03:09:42 EDT 2005 Password expiration date: [none] Maximum ticket life: 0 days 10:00:00 Maximum renewable life: 7 days 00:00:00 Last modified: Wed Aug 24 03:09:42 EDT 2005 (root/admin@DULCI.BIOSTAT.DUKE.EDU) Last successful authentication: [never] Last failed authentication: [never] Failed password attempts: 0 Number of keys: 1 Key: vno 3, DES cbc mode with CRC-32, no salt Attributes: Policy: [none] kadmin.local: exit riverside:/home/faheem# asetkey add /tmp/afs.keytab afs riverside:/home/faheem# dd if=/dev/zero of=/var/lib/openafs/vicepa bs=1024k count=32 32+0 records in 32+0 records out 33554432 bytes transferred in 0.093776 seconds (357814258 bytes/sec) riverside:/home/faheem# mke2fs /var/lib/openafs/vicepa mke2fs 1.37 (21-Mar-2005) /var/lib/openafs/vicepa is not a block special device. Proceed anyway? (y,n) y Filesystem label= OS type: Linux Block size=1024 (log=0) Fragment size=1024 (log=0) 8192 inodes, 32768 blocks 1638 blocks (5.00%) reserved for the super user First data block=1 4 block groups 8192 blocks per group, 8192 fragments per group 2048 inodes per group Superblock backups stored on blocks: 8193, 24577 Writing inode tables: done Writing superblocks and filesystem accounting information: done This filesystem will be automatically checked every 20 mounts or 180 days, whichever comes first. Use tune2fs -c or -i to override. riverside:/home/faheem# mkdir /vicepa riverside:/home/faheem# mount -oloop /var/lib/openafs/vicepa /vicepa riverside:/home/faheem# afs-newcell Prerequisites In order to set up a new AFS cell, you must meet the following: 1) You need a working Kerberos realm with Kerberos4 support. You should install Heimdal with Kth-kerberos compatibility or MIT Kerberos5. 2) You need to create the single-DES AFS key and load it into /etc/openafs/server/KeyFile. If your cell's name is the same as your Kerberos realm then create a principal called afs. Otherwise, create a principal called afs/cellname in your realm. The cell name should be all lower case, unlike Kerberos realms which are all upper case. You can use asetkey from the openafs-krb5 package, or if you used AFS3 salt to create the key, the bos addkey command. 3) This machine should have a filesystem mounted on /vicepa. If you do not have a free partition, then create a large file by using dd to extract bytes from /dev/zero. Create a filesystem on this file and mount it using -oloop. 4) You will need an administrative principal created in a Kerberos realm. This principal will be added to susers and system:administrators and thus will be able to run administrative commands. Generally the user is a root or admin instance of some administrative user. For example if jruser is an administrator then it would be reasonable to create jruser/root (or jruser/admin) and specify that as the user to be added in this script. 5) The AFS client must not be running on this workstation. It will be at the end of this script. Do you meet these requirements? [y/n] y If the fileserver is not running, this may hang for 30 seconds. /etc/init.d/openafs-fileserver stop Stopping AFS Server: bos: could not find entry (can't find cell '' in cell database) bosserver. What administrative principal should be used? faheem/admin /etc/openafs/server/CellServDB already exists, renaming to .old /etc/init.d/openafs-fileserver start Starting AFS Server: bosserver. bos adduser riverside.dulci.biostat.duke.edu faheem.admin -localauth pt_util: /var/lib/openafs/db/prdb.DB0: Bad UBIK_MAGIC. Is 0 should be 354545 Ubik Version is: 2.0 Error while creating system:administrators: Entry for id already exists pt_util: Ubik Version number changed during execution. Old Version = 2.0, new version = 33554432.0 bos create riverside.dulci.biostat.duke.edu ptserver simple /usr/lib/openafs/ptserver -localauth bos create riverside.dulci.biostat.duke.edu vlserver simple /usr/lib/openafs/vlserver -localauth bos create riverside.dulci.biostat.duke.edu fs fs -cmd /usr/lib/openafs/fileserver -cmd /usr/lib/openafs/volserver -cmd /usr/lib/openafs/salvager -localauth Waiting for database elections: done. vos create riverside.dulci.biostat.duke.edu a root.afs -localauth Volume 536870912 created on partition /vicepa of riverside.dulci.biostat.duke.edu /etc/init.d/openafs-client force-start Starting AFS services: afsd: All AFS daemons started. afsd. Now, get tokens as faheem/admin in the dulci.biostat.duke.edu cell. Then, run afs-rootvol. riverside:/home/faheem# bos status localhost -local Instance ptserver, currently running normally. Instance vlserver, currently running normally. Instance fs, currently running normally. Auxiliary status is: file server running. riverside:/home/faheem# kinit faheem/admin@DULCI.BIOSTAT.DUKE.EDU Password for faheem/admin@DULCI.BIOSTAT.DUKE.EDU: riverside:/home/faheem# aklog dulci.biostat.duke.edu -k DULCI.BIOSTAT.DUKE.EDU riverside:/home/faheem# tokens Tokens held by the Cache Manager: User's (AFS ID 1) tokens for afs@dulci.biostat.duke.edu [Expires Aug 24 13:22] --End of list-- riverside:/home/faheem# boss status riverside Instance ptserver, currently running normally. Instance vlserver, currently running normally. Instance fs, currently running normally. Auxiliary status is: file server running. riverside:/home/faheem# afs-rootvol Prerequisites In order to set up the root.afs volume, you must meet the following pre-conditions: 1) The cell must be configured, running a database server with a volume location and protection server. The afs-newcell script will set up these services. 2) You must be logged into the cell with tokens in for a user in system:administrators and with a principal that is in the UserList file of the servers in the cell. 3) You need a fileserver in the cell with partitions mounted and a root.afs volume created. Presumably, it has no volumes on it, although the script will work so long as nothing besides root.afs exists. The afs-newcell script will set up the file server. 4) The AFS client must be running pointed at the new cell. Do you meet these conditions? (y/n) y You will need to select a server (hostname) and AFS partition on which to create the root volumes. What AFS Server should volumes be placed on? riverside.dulci.biostat.duke.edu What partition? [a] vos create riverside.dulci.biostat.duke.edu a root.cell -localauth Volume 536870915 created on partition /vicepa of riverside.dulci.biostat.duke.edu fs sa /afs system:anyuser rl fs mkm /afs/dulci.biostat.duke.edu root.cell -cell dulci.biostat.duke.edu -fast || true fs mkm /afs/grand.central.org root.cell -cell grand.central.org -fast || true fs mkm /afs/wu-wien.ac.at root.cell -cell wu-wien.ac.at -fast || true fs mkm /afs/hephy.at root.cell -cell hephy.at -fast || true fs mkm /afs/itp.tugraz.at root.cell -cell itp.tugraz.at -fast || true fs mkm /afs/cern.ch root.cell -cell cern.ch -fast || true fs mkm /afs/ams.cern.ch root.cell -cell ams.cern.ch -fast || true fs mkm /afs/ethz.ch root.cell -cell ethz.ch -fast || true fs mkm /afs/psi.ch root.cell -cell psi.ch -fast || true fs mkm /afs/extundo.com root.cell -cell extundo.com -fast || true fs mkm /afs/mekinok.com root.cell -cell mekinok.com -fast || true fs mkm /afs/membrain.com root.cell -cell membrain.com -fast || true fs mkm /afs/midnightlinux.com root.cell -cell midnightlinux.com -fast || true fs mkm /afs/setfilepointer.com root.cell -cell setfilepointer.com -fast || true fs mkm /afs/sodre.cx root.cell -cell sodre.cx -fast || true fs mkm /afs/desy.de root.cell -cell desy.de -fast || true fs mkm /afs/gppc.de root.cell -cell gppc.de -fast || true fs mkm /afs/ifh.de root.cell -cell ifh.de -fast || true fs mkm /afs/lrz-muenchen.de root.cell -cell lrz-muenchen.de -fast || true fs mkm /afs/ipp-garching.mpg.de root.cell -cell ipp-garching.mpg.de -fast || true fs mkm /afs/mpe.mpg.de root.cell -cell mpe.mpg.de -fast || true fs mkm /afs/i1.informatik.rwth-aachen.de root.cell -cell i1.informatik.rwth-aachen.de -fast || true fs mkm /afs/tu-bs.de root.cell -cell tu-bs.de -fast || true fs mkm /afs/tu-chemnitz.de root.cell -cell tu-chemnitz.de -fast || true fs mkm /afs/e18.ph.tum.de root.cell -cell e18.ph.tum.de -fast || true fs mkm /afs/uni-bonn.de root.cell -cell uni-bonn.de -fast || true fs mkm /afs/atlass01.physik.uni-bonn.de root.cell -cell atlass01.physik.uni-bonn.de -fast || true fs mkm /afs/uni-freiburg.de root.cell -cell uni-freiburg.de -fast || true fs mkm /afs/physik.uni-freiburg.de root.cell -cell physik.uni-freiburg.de -fast || true fs mkm /afs/urz.uni-heidelberg.de root.cell -cell urz.uni-heidelberg.de -fast || true fs mkm /afs/uni-hohenheim.de root.cell -cell uni-hohenheim.de -fast || true fs mkm /afs/rz.uni-jena.de root.cell -cell rz.uni-jena.de -fast || true fs mkm /afs/meteo.uni-koeln.de root.cell -cell meteo.uni-koeln.de -fast || true fs mkm /afs/rrz.uni-koeln.de root.cell -cell rrz.uni-koeln.de -fast || true fs mkm /afs/physik.uni-mainz.de root.cell -cell physik.uni-mainz.de -fast || true fs mkm /afs/uni-mannheim.de root.cell -cell uni-mannheim.de -fast || true fs mkm /afs/physik.uni-wuppertal.de root.cell -cell physik.uni-wuppertal.de -fast || true fs mkm /afs/s-et.aau.dk root.cell -cell s-et.aau.dk -fast || true fs mkm /afs/ies.auc.dk root.cell -cell ies.auc.dk -fast || true fs mkm /afs/asu.edu root.cell -cell asu.edu -fast || true fs mkm /afs/hep.caltech.edu root.cell -cell hep.caltech.edu -fast || true fs mkm /afs/clarkson.edu root.cell -cell clarkson.edu -fast || true fs mkm /afs/andrew.cmu.edu root.cell -cell andrew.cmu.edu -fast || true fs mkm /afs/club.cc.cmu.edu root.cell -cell club.cc.cmu.edu -fast || true fs mkm /afs/chem.cmu.edu root.cell -cell chem.cmu.edu -fast || true fs mkm /afs/cs.cmu.edu root.cell -cell cs.cmu.edu -fast || true fs mkm /afs/ece.cmu.edu root.cell -cell ece.cmu.edu -fast || true fs mkm /afs/scotch.ece.cmu.edu root.cell -cell scotch.ece.cmu.edu -fast || true fs mkm /afs/qatar.cmu.edu root.cell -cell qatar.cmu.edu -fast || true fs mkm /afs/sbp.ri.cmu.edu root.cell -cell sbp.ri.cmu.edu -fast || true fs mkm /afs/msc.cornell.edu root.cell -cell msc.cornell.edu -fast || true fs mkm /afs/dbic.dartmouth.edu root.cell -cell dbic.dartmouth.edu -fast || true fs mkm /afs/northstar.dartmouth.edu root.cell -cell northstar.dartmouth.edu -fast || true fs mkm /afs/eecs.harvard.edu root.cell -cell eecs.harvard.edu -fast || true fs mkm /afs/iastate.edu root.cell -cell iastate.edu -fast || true fs mkm /afs/athena.mit.edu root.cell -cell athena.mit.edu -fast || true fs mkm /afs/dev.mit.edu root.cell -cell dev.mit.edu -fast || true fs mkm /afs/net.mit.edu root.cell -cell net.mit.edu -fast || true fs mkm /afs/sipb.mit.edu root.cell -cell sipb.mit.edu -fast || true fs mkm /afs/msu.edu root.cell -cell msu.edu -fast || true fs mkm /afs/nd.edu root.cell -cell nd.edu -fast || true fs mkm /afs/pitt.edu root.cell -cell pitt.edu -fast || true fs mkm /afs/cs.pitt.edu root.cell -cell cs.pitt.edu -fast || true fs mkm /afs/psc.edu root.cell -cell psc.edu -fast || true fs mkm /afs/scoobydoo.psc.edu root.cell -cell scoobydoo.psc.edu -fast || true fs mkm /afs/cede.psu.edu root.cell -cell cede.psu.edu -fast || true fs mkm /afs/rose-hulman.edu root.cell -cell rose-hulman.edu -fast || true fs mkm /afs/cs.rose-hulman.edu root.cell -cell cs.rose-hulman.edu -fast || true fs mkm /afs/rpi.edu root.cell -cell rpi.edu -fast || true fs mkm /afs/hep.sc.edu root.cell -cell hep.sc.edu -fast || true fs mkm /afs/cs.stanford.edu root.cell -cell cs.stanford.edu -fast || true fs mkm /afs/ir.stanford.edu root.cell -cell ir.stanford.edu -fast || true fs mkm /afs/slac.stanford.edu root.cell -cell slac.stanford.edu -fast || true fs mkm /afs/cats.ucsc.edu root.cell -cell cats.ucsc.edu -fast || true fs mkm /afs/acm.uiuc.edu root.cell -cell acm.uiuc.edu -fast || true fs mkm /afs/ncsa.uiuc.edu root.cell -cell ncsa.uiuc.edu -fast || true fs mkm /afs/umbc.edu root.cell -cell umbc.edu -fast || true fs mkm /afs/glue.umd.edu root.cell -cell glue.umd.edu -fast || true fs mkm /afs/wam.umd.edu root.cell -cell wam.umd.edu -fast || true fs mkm /afs/umich.edu root.cell -cell umich.edu -fast || true fs mkm /afs/atlas.umich.edu root.cell -cell atlas.umich.edu -fast || true fs mkm /afs/citi.umich.edu root.cell -cell citi.umich.edu -fast || true fs mkm /afs/lsa.umich.edu root.cell -cell lsa.umich.edu -fast || true fs mkm /afs/math.lsa.umich.edu root.cell -cell math.lsa.umich.edu -fast || true fs mkm /afs/umr.edu root.cell -cell umr.edu -fast || true fs mkm /afs/physics.unc.edu root.cell -cell physics.unc.edu -fast || true fs mkm /afs/uncc.edu root.cell -cell uncc.edu -fast || true fs mkm /afs/eng.utah.edu root.cell -cell eng.utah.edu -fast || true fs mkm /afs/cs.uwm.edu root.cell -cell cs.uwm.edu -fast || true fs mkm /afs/cs.wisc.edu root.cell -cell cs.wisc.edu -fast || true fs mkm /afs/engr.wisc.edu root.cell -cell engr.wisc.edu -fast || true fs mkm /afs/hep.wisc.edu root.cell -cell hep.wisc.edu -fast || true fs mkm /afs/physics.wisc.edu root.cell -cell physics.wisc.edu -fast || true fs mkm /afs/ifca.unican.es root.cell -cell ifca.unican.es -fast || true fs mkm /afs/ific.uv.es root.cell -cell ific.uv.es -fast || true fs mkm /afs/biocenter.helsinki.fi root.cell -cell biocenter.helsinki.fi -fast || true fs mkm /afs/dapnia.saclay.cea.fr root.cell -cell dapnia.saclay.cea.fr -fast || true fs mkm /afs/in2p3.fr root.cell -cell in2p3.fr -fast || true fs mkm /afs/anl.gov root.cell -cell anl.gov -fast || true fs mkm /afs/rhic.bnl.gov root.cell -cell rhic.bnl.gov -fast || true fs mkm /afs/usatlas.bnl.gov root.cell -cell usatlas.bnl.gov -fast || true fs mkm /afs/fnal.gov root.cell -cell fnal.gov -fast || true fs mkm /afs/ic-afs.arc.nasa.gov root.cell -cell ic-afs.arc.nasa.gov -fast || true fs mkm /afs/jpl.nasa.gov root.cell -cell jpl.nasa.gov -fast || true fs mkm /afs/nersc.gov root.cell -cell nersc.gov -fast || true fs mkm /afs/bme.hu root.cell -cell bme.hu -fast || true fs mkm /afs/caspur.it root.cell -cell caspur.it -fast || true fs mkm /afs/fusione.it root.cell -cell fusione.it -fast || true fs mkm /afs/icemb.it root.cell -cell icemb.it -fast || true fs mkm /afs/infn.it root.cell -cell infn.it -fast || true fs mkm /afs/kloe.infn.it root.cell -cell kloe.infn.it -fast || true fs mkm /afs/le.infn.it root.cell -cell le.infn.it -fast || true fs mkm /afs/lnf.infn.it root.cell -cell lnf.infn.it -fast || true fs mkm /afs/lngs.infn.it root.cell -cell lngs.infn.it -fast || true fs mkm /afs/pi.infn.it root.cell -cell pi.infn.it -fast || true fs mkm /afs/psm.it root.cell -cell psm.it -fast || true fs mkm /afs/tgrid.it root.cell -cell tgrid.it -fast || true fs mkm /afs/ictp.trieste.it root.cell -cell ictp.trieste.it -fast || true fs mkm /afs/ing.uniroma1.it root.cell -cell ing.uniroma1.it -fast || true fs mkm /afs/vn.uniroma3.it root.cell -cell vn.uniroma3.it -fast || true fs mkm /afs/italia root.cell -cell italia -fast || true fs mkm /afs/cmf.nrl.navy.mil root.cell -cell cmf.nrl.navy.mil -fast || true fs mkm /afs/lcp.nrl.navy.mil root.cell -cell lcp.nrl.navy.mil -fast || true fs mkm /afs/es.net root.cell -cell es.net -fast || true fs mkm /afs/laroia.net root.cell -cell laroia.net -fast || true fs mkm /afs/sinenomine.net root.cell -cell sinenomine.net -fast || true fs mkm /afs/slackers.net root.cell -cell slackers.net -fast || true fs mkm /afs/nikhef.nl root.cell -cell nikhef.nl -fast || true fs mkm /afs/1ts.org root.cell -cell 1ts.org -fast || true fs mkm /afs/bazquux.org root.cell -cell bazquux.org -fast || true fs mkm /afs/coed.org root.cell -cell coed.org -fast || true fs mkm /afs/dementia.org root.cell -cell dementia.org -fast || true fs mkm /afs/firelion.org root.cell -cell firelion.org -fast || true fs mkm /afs/hackish.org root.cell -cell hackish.org -fast || true fs mkm /afs/idahofuturetruck.org root.cell -cell idahofuturetruck.org -fast || true fs mkm /afs/nimlabs.org root.cell -cell nimlabs.org -fast || true fs mkm /afs/nomh.org root.cell -cell nomh.org -fast || true fs mkm /afs/oc7.org root.cell -cell oc7.org -fast || true fs mkm /afs/openafs.org root.cell -cell openafs.org -fast || true fs mkm /afs/e.kth.se root.cell -cell e.kth.se -fast || true fs mkm /afs/hallf.kth.se root.cell -cell hallf.kth.se -fast || true fs mkm /afs/isk.kth.se root.cell -cell isk.kth.se -fast || true fs mkm /afs/it.kth.se root.cell -cell it.kth.se -fast || true fs mkm /afs/md.kth.se root.cell -cell md.kth.se -fast || true fs mkm /afs/mech.kth.se root.cell -cell mech.kth.se -fast || true fs mkm /afs/nada.kth.se root.cell -cell nada.kth.se -fast || true fs mkm /afs/pdc.kth.se root.cell -cell pdc.kth.se -fast || true fs mkm /afs/stacken.kth.se root.cell -cell stacken.kth.se -fast || true fs mkm /afs/syd.kth.se root.cell -cell syd.kth.se -fast || true fs mkm /afs/physto.se root.cell -cell physto.se -fast || true fs mkm /afs/sanchin.se root.cell -cell sanchin.se -fast || true fs mkm /afs/su.se root.cell -cell su.se -fast || true fs mkm /afs/f9.ijs.si root.cell -cell f9.ijs.si -fast || true fs mkm /afs/p-ng.si root.cell -cell p-ng.si -fast || true fs mkm /afs/phy.bris.ac.uk root.cell -cell phy.bris.ac.uk -fast || true fs mkm /afs/hep.man.ac.uk root.cell -cell hep.man.ac.uk -fast || true fs mkm /afs/rl.ac.uk root.cell -cell rl.ac.uk -fast || true fs sa /afs/dulci.biostat.duke.edu system:anyuser rl fs mkm /afs/.dulci.biostat.duke.edu root.cell -cell dulci.biostat.duke.edu -rw fs mkm /afs/.root.afs root.afs -rw vos create riverside.dulci.biostat.duke.edu a user -localauth Volume 536870918 created on partition /vicepa of riverside.dulci.biostat.duke.edu fs mkm /afs/dulci.biostat.duke.edu/user user fs sa /afs/dulci.biostat.duke.edu/user system:anyuser rl vos create riverside.dulci.biostat.duke.edu a service -localauth Volume 536870921 created on partition /vicepa of riverside.dulci.biostat.duke.edu fs mkm /afs/dulci.biostat.duke.edu/service service fs sa /afs/dulci.biostat.duke.edu/service system:anyuser rl ln -s dulci.biostat.duke.edu /afs/dulci ln -s .dulci.biostat.duke.edu /afs/.dulci vos addsite riverside.dulci.biostat.duke.edu a root.afs -localauth Added replication site riverside.dulci.biostat.duke.edu /vicepa for volume root.afs vos addsite riverside.dulci.biostat.duke.edu a root.cell -localauth Added replication site riverside.dulci.biostat.duke.edu /vicepa for volume root.cell vos release root.afs -localauth Released volume root.afs successfully vos release root.cell -localauth Released volume root.cell successfully riverside:/home/faheem# cd /afs/dulci.biostat.duke.edu/ riverside:/afs/dulci.biostat.duke.edu# ls service user