Hello , I would like to report some strange behavior. (It might be a misconfiguration on my part). I am not able to delete files using xrootfs Here is the error. [xrootd@atl003 osg-v1.2.13]$ rm /xrootdfs/group10/perf-egamma/data10_7TeV/group10.perf-egamma.data10_7TeV.periodF1.physics_Egamma.PhysCont.NTUP_EGAMMA.v1.Filtr.1g1eORALL_v1/group10.perf-egamma.01879_000616._00011.NTUP.Filtred.periodF1_0.root rm: cannot remove `/xrootdfs/group10/perf-egamma/data10_7TeV/group10.perf-egamma.data10_7TeV.periodF1.physics_Egamma.PhysCont.NTUP_EGAMMA.v1.Filtr.1g1eORALL_v1/group10.perf-egamma.01879_000616._00011.NTUP.Filtred.periodF1_0.root': Permission denied [xrootd@atl003 osg-v1.2.13]$ ls -l /xrootdfs/group10/perf-egamma/data10_7TeV/group10.perf-egamma.data10_7TeV.periodF1.physics_Egamma.PhysCont.NTUP_EGAMMA.v1.Filtr.1g1eORALL_v1/group10.perf-egamma.01879_000616._00011.NTUP.Filtred.periodF1_0.root -rw-rw-rw- 1 xrootd xrootd 1230413299 Sep 28 17:27 /xrootdfs/group10/perf-egamma/data10_7TeV/group10.perf-egamma.data10_7TeV.periodF1.physics_Egamma.PhysCont.NTUP_EGAMMA.v1.Filtr.1g1eORALL_v1/group10.perf-egamma.01879_000616._00011.NTUP.Filtred.periodF1_0.root I apologize for the very long paths. The user running the xrootd is xrootd. xrootdfs is running on the redirector node - Here are the xrootdfs environmental variables - export XROOTDFS_RDRURL=root://atl003.phy.duke.edu:1094//atlas export XROOTDFS_FASTLS="RDR" export XROOTDFS_USER=xrootd MOUNT_POINT=/xrootdfs $dir/xrootdfsd $MOUNT_POINT -o allow_other,fsname=xrootdfs,max_write=131072 Here is the xrootd config file from the redirector node and the data nodes: ----------------------------------------------------- set thishostname=$HOSTNAME set xrootdlocation = /opt/osg-v1.2.13/xrootd set xrdr = atl003.phy.duke.edu all.export /atlas all.adminpath ${xrootdlocation}/var/admin all.manager $(xrdr):1213 cms.allow host *.phy.duke.edu xrootd.fslib ${xrootdlocation}/lib/libXrdOfs.so if $(xrdr) && named cns all.export /atlas/inventory xrd.port 1095 else if $(xrdr) xrd.port 1094 all.role manager else xrd.port 1093 all.role server xrootd.chksum max 3 adler32 ${xrootdlocation}/bin/xrdadler32 #set osscachepath = /atlas #oss.cache public $(osscachepath)/* xa oss.usage log ${xrootdlocation}/var/admin # ENABLE_SECURITY_WITHOUT_CNSD_BEGIN xrootd.seclib /opt/osg-v1.2.13/xrootd/lib/libXrdSec.so # this specify that we use the 'unix' authentication module, additional one can be specified. sec.protocol /opt/osg-v1.2.13/xrootd/lib unix # this is the authorization file acc.authdb /opt/osg-v1.2.13/xrootd/etc/auth_file ofs.authorize sec.protbind *.phy.duke.edu unix # ENABLE_SECURITY_WITHOUT_CNSD_END ofs.notify closew create mkdir mv rm rmdir trunc | $(xrootdlocation)/bin/XrdCnsd -d -D 2 -i 90 -b atl003.phy.duke.edu:1095:/atlas/inventory # ofs.notify closew create mkdir mv rm rmdir trunc | $(xrootdlocation)/bin/XrdCnsd -d -D 2 -i 90 -b /atlas/inventory fi --------------------------------------------------------- Here is the auth file - --------------------------------------------------------- # This means that all the users have read access to the datasets u * /atlas lr # This means that all the users have full access to their private dirs u = /atlas/local/@=/ a # This means that this privileged user can do everything # You need at least one user like that, in order to create the # private dir for each user willing to store his data in the facility u xrootd /atlas a -------------------------------------------------------- Regards, Doug Benjamin